Segmentation of a data stream happens at which layer of the OSI model?

Answers

Answer 1

The Open Systems Interconnection (OSI) model is a conceptual framework that describes the functions of a networking or telecommunication system.

It consists of seven layers, each with its own set of protocols and functions.

Segmentation of a data stream typically happens at the Transport layer of the OSI model, which is the fourth layer.

The Transport layer is responsible for ensuring reliable communication between end-to-end applications across a network.

It breaks down large data streams into smaller segments, which are then sent as individual packets over the network.

The Transport layer also handles flow control, error recovery, and congestion control.

Some of the commonly used protocols at the Transport layer include Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

For similar questions on OSI

https://brainly.com/question/31023625

#SPJ11


Related Questions

Which of the following is not a primary hive found in the Window 10 registry
a. HKEY_USERS
b. HKEY_CLASSES_ROOT
c. HKEY_REMOTE_ADMIN
d. HKEY_LOCAL_MACHINE

Answers

The primary hives found in the Windows 10 registry are HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE, HKEY_USERS, and HKEY_CURRENT_CONFIG. Out of the options given, the answer to which of these is not a primary hive found in the Windows 10 registry is option c. HKEY_REMOTE_ADMIN.

HKEY_USERS contains the profile information for each user on the computer. It stores information about user-specific settings, preferences, and configurations. HKEY_CLASSES_ROOT contains file type associations and OLE information. It also stores information about installed applications. HKEY_LOCAL_MACHINE contains system-wide settings and configurations, including software and hardware information. HKEY_CURRENT_USER contains the settings and configurations for the current user that is logged in. It is a subset of HKEY_USERS, specifically for the currently logged-in user. HKEY_CURRENT_CONFIG contains the hardware profiles currently in use by the computer.

In summary, HKEY_REMOTE_ADMIN is not a primary hive found in the Windows 10 registry, whereas HKEY_USERS, HKEY_CLASSES_ROOT, HKEY_LOCAL_MACHINE, HKEY_CURRENT_USER, and HKEY_CURRENT_CONFIG are all primary hives found in the registry.

To know more about primary hives visit:

https://brainly.com/question/7603117

#SPJ11

Step 1 (3 pts). Input the arrow base height (int) and width (int). Draw a rectangle using asterisks (height x width). Hint: use a nested loop in which the inner loop draws one row of *s, and the outer loop iterates a number of times equal to the height. Submit for grading to confirm two tests pass. Ex: if input is:-. 6-. 4

Answers

Answer:

height = int(input("Enter the arrow base height: "))

width = int(input("Enter the arrow base width: "))

# Draw rectangle

for i in range(height):

for j in range(width):

print('*', end='')

print()

Output:

For the input 6 and 4, the output would be:

****

****

****

****

****

****

The answer is in the comments

Which action can reduce the risk of ESD damage when computer equipment is being worked on?
O working on a grounded antistatic mat
O keeping the computer plugged into a surge protector
O lowering the humidity level in the work area
O moving cordless phones away from the work area

Answers

Working on a grounded antistatic mat can reduce the risk of ESD (electrostatic discharge) damage when computer equipment is being worked on.

ESD stands for Electrostatic Discharge, which refers to the sudden flow of electricity between two objects with different electrical charges. ESD can occur when two objects with different electrical potentials come into contact, or when an object with a high static charge is brought close to a conductor. ESD can cause damage to electronic devices and components, as the sudden flow of electricity can disrupt or destroy their normal operation.

To prevent ESD, it is important to take appropriate precautions such as:

Using ESD-safe equipment and materials.Properly grounding yourself and electronic devices.Avoiding activities that can generate static electricity.Wearing ESD-safe clothing and shoes.Using ESD-safe workstations and storage containers.Maintain a safe level of humidity.

ESD can also cause a failure in electronic devices and components, which can be dangerous and costly.

Learn more about ESD here:

https://brainly.com/question/10800815

#SPJ4

Some clues left on a drive that might indicate steganography include which of the following?
a. Graphics files with the same name but different file sizes
b. Multiple copies of a graphics file
c. Steganography programs in the suspect's All Programs list
D. All of the above

Answers

Some clues left on a drive that might indicate steganography include option D: All of the above.

a. Graphics files with the same name but different file sizes.

b. Multiple copies of a graphics file.

c. Steganography programs in the suspect's All Programs list.

What is steganography?

Steganography is a technique for concealing sensitive information within a regular, non-sensitive file or message so as to avoid detection; the sensitive information is then extracted at its intended location. To further conceal or protect data, steganography can be used in conjunction with encryption.

Hence, Steganography is the practice of enclosing openly available information inside of something that seems normal. Steganography is a technique used by cybercriminals to conceal malicious code or stolen data in media like images and audio files.

Learn more about Steganography from

https://brainly.com/question/13089179
#SPJ1

Is playing hockey output force or input force?

Answers

Answer:

Input

Explanation:

got it right on a edunuity test

I think it’s more output

How is video compression accomplished?
Video compression works by making the pixel size smaller.
Video compression works by removing the sound.
Video compression works by smoothing the pixels.
Video compression works by removing unnecessary parts of frames

Answers

Video compression works by making pixels smaller, so A.

Answer:

A. Video compression works by making the pixel size smaller.

Explanation:

E2020!

this sensor is used for burglar alarms
A. temperature
b. humidity
c. movement
d. PH​

Answers

Answer:

C

Explanation:

Have a great summer :)

what is the mass of a cookbook

Answers

Answer:

it varies on the size of the cookbook

Explanation:

How does a fully integrated Data and Analytics Platform enable organizations to convert data into consumable information and insight?

Answers

Answer: How are you

Explanation:como estas meaning

In Scratch, you have to choose backdrops from a limited number in the Scratch image library.
Group of answer choices

True

False

Answers

I would say it would be True

Answer:

True

Explanation: im Awsome

in the following code example, add the necessary code tell python to read and print just the first line of the text file being opened, if the file already exists. import os.path

Answers

Answer:

Here is one possible way to do that:

```python

import os.path

# check if the file exists

if os.path.isfile("textfile.txt"):

 # open the file in read mode

 with open("textfile.txt", "r") as f:

   # read and print the first line

   first_line = f.readline()

   print(first_line)

else:

 # print an error message

 print("The file does not exist.")

```

You want the output to be left justified in a field that is nine characters wide. What format string do you need?

print('{: __ __ }' .format(23)

Answers

Answer:

> and 8

Explanation:

> and 8 format string one will need in this particular input of the java string.

What is a format string?

The Format String is the contention of the Format Function and is an ASCII Z string that contains text and configuration boundaries, as printf. The parameter as %x %s characterizes the sort of transformation of the format function.

Python String design() is a capability used to supplant, substitute, or convert the string with placeholders with legitimate qualities in the last string. It is an inherent capability of the Python string class, which returns the designed string as a result.

The '8' specifies the field width of the input The Format String is the contention of the Configuration Capability and is an ASCII Z string that contains the text.

Learn more about format string, here:

https://brainly.com/question/28989849

#SPJ3

On Ethereum ________________________________ accounts can be used to store program code.
a. utility
b. wallet
c. cryptographic
d. contract

Answers

On Ethereum, "contract" accounts can be used to store program code.

The Ethereum blockchain allows the deployment and execution of smart contracts, which are self-executing contracts with predefined rules and conditions written in programming languages like Solidity.

These smart contracts are deployed on the Ethereum network as "contract" accounts. Contract accounts have their own address and are capable of storing program code and executing predefined functions based on the rules and conditions specified within the smart contract.

To learn more about The Ethereum blockchain refer to;

brainly.com/question/24251696

#SPJ11

differentiatethe following types of computers Desktop computers and laptopa​

Answers

We can’t see the options
Was there supposed to be options to choose from?

What is computing device

Answers

Please do mark me as Brainiest. I would be so happy!!!

Answer:

Any electronic equipment controlled by a CPU, including desktop and laptop computers, smartphones and tablets. It usually refers to a general-purpose device that can accept software for many purposes in contrast with a dedicated unit of equipment such as a network switch or router.

Have a great day.

Answer:

google

Explanation:

google

the most powerful computers, , can evaluate complex data very quickly. many of these computers in the united states are owned by the government or major research institutions and can cost $1 million dollars or more.

Answers

The most powerful computers, supercomputers, can evaluate complex data very quickly. Many of these computers in the United States are owned by the government or major research institutions and can cost $1 million dollars or more.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data through the central processing unit (CPU) into an output (information) that could be seen and used by an end user.

What is a supercomputer?

A supercomputer simply refers to one of the most powerful computers that is designed and developed for handling, evaluating, and solving very complicated problems or tasks. Additionally, supercomputers have the ability to carry out trillions of calculations per second.

Read more on supercomputer here: https://brainly.com/question/14883920

#SPJ1

Complete Question:

The most powerful computers, _____, can evaluate complex data very quickly. Many of these computers in the United States are owned by the government or major research institutions and can cost $1 million dollars or more.

En la historia del Computador porque se caracteriza la primera generación? *
1 punto
a.Por que se reemplazo el ábaco
b.ninguna de las anteriores
c.Por la implementación del calculo
d.Por el uso de tubos de vacío

Answers

D. Por el uso de tubos de vacio.

A client is looking to maximize value from its Cloud investments by baselining, profiling, and prioritizing its human capital needs.Which myNav module will help this client?

Answers

myNav is to be present inn the Accenture software. It aim is to helps companies manage the human, technology and business dimensions of cloud change. The myNav module that will help this client is Cloud Advisor.

Cloud Advisor is simply known to be one of the many modules within the myNav platform. It was set up to handle the difficulties of cloud for digital transformation.

These Advisors are  known worldwide community of technical resources. They have a thorough  knowledge of cloud technologies and practices.

Their mission is to know the trends, regulatory implications, and our clients' needs so as to help them to set goals and create plans to achieve their desired outcome.

Learn more from

https://brainly.com/question/24918185

Please help!!
comp sci

Please help!!comp sci

Answers

A(n) _____ goal is connected to and has bearing on a situation.

Answers

Hi :)

Answer:

relevant

Explanation:

Hope this helps :) !!!

A relevant goal is connected to and has bearing on a situation. A relevant goal is one that is related to the situation at hand and can help to achieve a desired outcome. It is important to set relevant goals in order to focus one's efforts and resources on the most important tasks and objectives. Relevant goals help to ensure that one's actions are aligned with the desired outcomes and can increase the likelihood of success.

how to transfer opera bookmarks from one pc to another create this pc shortcut on desktop in windows 10

Answers

Ctrl+Shift+B will bring up your full bookmarks manager. On the bottom left, select the Import/Export button. Drag it to your desktop after launching File Explorer and choosing This PC from the left pane.

From Windows 95 onwards, editions of the Microsoft Windows operating system come with File Explorer, formerly known as Windows Explorer, a file manager program. Accessing the file systems is made possible by a graphical user interface. The taskbar and desktop are just two examples of the numerous user interface elements that it is also the operating system component that displays on the screen. The File Run command in Task Manager on NT-derived versions of Windows and commands entered in a command prompt window both work without Windows Explorer running, demonstrating how to control the computer without it.

File Manager, which included all versions of the Windows 3. x operating system, was replaced by Windows Explorer when Windows 95 was first released.

Learn more about File Explorer here:

https://brainly.com/question/28456036

#SPJ4

What ethical issues are raised by the possibility of editing photos? What do you
think are good guidelines to follow?

Answers

Answer:

The possibility of editing photos raises several ethical issues. One of the main issues is the potential for misleading or deceiving people by altering the appearance of individuals, products, or events. This can have negative consequences, such as influencing public opinion, damaging reputations, or promoting unrealistic beauty standards. Additionally, there is a concern that photo editing can perpetuate harmful stereotypes or reinforce discriminatory practices, such as altering skin color, body shape, or facial features. There is also a risk that photo editing can invade individuals' privacy or violate their rights by using their likeness without their consent.

To address these ethical issues, some good guidelines to follow when editing photos include being transparent about the editing process, clearly indicating when a photo has been altered, and avoiding any changes that could misrepresent reality or harm individuals or groups. It is also important to respect individuals' privacy and obtain their consent before using their photos in any public or commercial context. Additionally, it may be helpful to consult with others or seek feedback to ensure that the edited photos are appropriate and do not perpetuate harmful stereotypes or biases. Ultimately, the goal should be to use photo editing as a tool for enhancing creativity, expression, and communication, while maintaining respect for ethical standards and values.

Explanation:

Project: Math Tutor Program with Error Handling
image of a man sitting on a branch he is about to cut off

Sawing off the branch you are sitting on can only end badly (Imagery supplied by photoschmidt/iStock via Getty)
Unlike the man in the picture, you already know how to plan for and handle errors before they happen. You know how to create and use lists. You know how to use loops. You are going to put these abilities to work in this project. You are going to write a program to help young children with their arithmetic skills.

Objectives
Plan and create a program to practice math facts with error handling.

Your Goal
Your users are young children learning their arithmetic facts. The program will give them a choice of practicing adding or multiplying.

You will use two lists of numbers.

numA = [4, 1, 6, 10, 2, 3, 7, 9, 11, 12, 5, 8]

numB = [2, 12, 10, 11, 1, 3, 7, 9, 4, 8, 5, 6]

If the user chooses adding, you will ask them to add the first number from each list. Tell them if they are right or wrong. If they are wrong, tell them the correct answer.
Then ask them to add the second number in each list and so on.

If the user chooses multiplying, then do similar steps but with multiplying.

Whichever operation the user chooses, they will answer 12 questions.

Write your program and test it on a sibling, friend, or fellow student.

Errors
Think about the types of errors a user can make. Add at least one kind of error handling to your program.

What to Submit
Save your program with a .txt extension. You cannot upload a .py file.
Before you turn your project in, read the rubric.

I need this to be original work

Answers

Answer:

finished = False

numA = [4, 1, 6, 10, 2, 3, 7, 9, 11, 12, 5, 8]

numB = [2, 12, 10, 11, 1, 3, 7, 9, 4, 8, 5, 6]

while True:

 pick = input("Would you like to practice addition (+) or multiplication (*)?")  

 

 if pick == "+":

   for o, k in zip(numA, numB):

     ans = input(f"What is {o} + {k}?")

     

     if ans == str(o + k):

       print('Correct!\n')

     else:

       print(f"Incorrect! The correct answer was {o + k}\n")

   finished = True

 

 elif pick == "*":

   for o, k in zip(numA, numB):

     ans = input(f"What is {o} * {k}?")

     

     if ans == str(o * k):

       print('Correct!\n')

     else:

       print(f"Incorrect! The correct answer was {o * k}\n")

   finished = True

 

 else:

   print('Incorrect Input!')

 

 if finished:

   print('Thanks for playing!')

   break

Explanation:

aduhhhh

C-strings have built-in member functions that return how many total characters there are in the string?

Answers

C-strings in C++ are null-terminated arrays of characters. Unlike standard strings in C++, C-strings do not have built-in member functions to directly return the total number of characters in the string.

However, you can use the standard C library function `strlen()` to determine the length of a C-string. `strlen()` returns the number of characters in a C-string, excluding the null character ('\0') at the end.

Here's an example:

```cpp
#include

int main() {
   const char* cstring = "Hello, World!";
   int length = strlen(cstring);
   // length will be 13, as there are 13 characters in the C-string excluding the null character

   return 0;
}
```

In this example, the `strlen()` function is used to determine the length of the C-string `cstring`. The length is then stored in the variable `length`.

Please note that `strlen()` counts the number of characters until it encounters the null character ('\0'). If the C-string is not properly null-terminated, using `strlen()` may lead to undefined behavior.

In summary, while C-strings don't have built-in member functions to directly return the total number of characters in the string, you can use the `strlen()` function from the C library to determine the length of a C-string.

To know more about C-strings in C++ visit:

https://brainly.com/question/32141804

#SPJ11

I WILL MARK BRAINLIEST FOR WHO EVER CAN DO THIS FIRST

Read the paragraph and use the RACE writing strategy to answer the questions.

Studies have found that the more time a teenager spends on social media, the more likely they are to suffer from anxiety and depression. Some people think that it is because they are developing fewer real-life connections to friends and spending less time playing outside. Another issue is cyber-bullying. Furthermore, teens feel bad when they see friends partaking in activities to which they have not been invited. Social media can make people feel isolated and like their life is less exciting than average, since people tend to publish their highlights on their feeds. Girls especially struggle with self-esteem issues, feel pressure to keep up with their peers who are dressing up, putting on makeup, and presenting their most polished selves to the world.

What are some of the risks involved with teens using social media? Explain. (Note that this is asking for reasons-plural-meaning you must give more than one reason.)

Answers

Answer:

i hope this help

Explanation:

Overuse of social media can have negative consequences on the well-being of adolescents. Social media use has been linked to lower self-esteem, increased depression, risk-taking behavior, and cyberbullying.

Social media can cause people to not be able to interact in real life. Sure you are talking to people, but not in a face to face conversation. It's easier to hide behind a screen than to talk to someone in the eye. So this can make them get anxious if they try to talk to people face to face. And peer pressure, teasing, can make teens stressed. Peer pressure can cause stress on teens thinking that they are not trying hard enough, or not living up to standards. Plus it can result in dangerous acts. Bullying can cause depression and make them think no one cares about them, and since this is behind a screen no one could know about the teen's problems. In short, Social media can cause stress, anxiety, depression, and dangerous acts from peer pressure.

Java Complete the incrementIfDuplicate() method and update the main() method within the DuplicateCounter cla to ue the incrementIfDuplicate() method

Answers

To complete the incrementIfDuplicate() method and update the main() method within the DuplicateCounter class, you need to use a HashMap to store the words and their counts.

The method should iterate over the words and check if the word is already present in the HashMap. If it is, the count should be incremented by 1, else the word should be added to the HashMap with a count of 1. The main() method should then call the incrementIfDuplicate() method with the input words. Here is an example of how this can be done:

public void incrementIfDuplicate(String[] words) {

   Map<String, Integer> map = new HashMap<>();

   for (String word : words) {

       if (map.containsKey(word)) {

           map.put(word, map.get(word) + 1);

       } else {

           map.put(word, 1);

       }

   }

}

public void main(String[] args) {

   String[] words = {"hello", "world", "hello"};

   incrementIfDuplicate(words);

}

Learn more about programming:

https://brainly.com/question/26134656

#SPJ4

the taskbar contains what

Answers

Answer:The taskbar is anchored to the bottom of the screen by default, but can be moved to any screen side, and contains the Start button, buttons for pinned and running applications, and a system tray area that contains notification icons and a clock.

Explanation:

write a matlab program that computes the latitude and azimuth for your trip at each 5 degrees of longitude, i.e., at each value 5; 10; 15; : : : ; 90 degrees of longitude. make a matlab plot with two curves: the longitude values on the x-axis and the latitude and azimuth on the y-axis. turn in your code listing and your plot

Answers

Here's a sample MATLAB program to compute the latitude and azimuth for a trip at each 5 degrees of longitude:

% Define the starting longitude

lon = 5:5:90;

% Compute the latitude

lat = sin(lon);

% Compute the azimuth

az = cos(lon);

% Plot the results

plot(lon, lat, '-b', lon, az, '-r')

xlabel('Longitude (degrees)')

ylabel('Latitude and Azimuth')

legend('Latitude', 'Azimuth')

This code calculates the latitude and azimuth for travel in every 5 degrees of longitude between 5 and 90 degrees. Latitude is calculated using the sine function, and azimuth is calculated using the cosine function. The results are then plotted on a single image with two curves, one for latitude and one for azimuth, with longitude values on the x-axis and latitude and azimuth values on the y-axis.

You can learn more about azimuth here brainly.com/question/17112550

#SPJ4

John is writing a code instructing the character to move forward 10 steps, choose a number between 1 to 10, and if the number is greater than 5, the character says "Hello." The code is not working as John wants. What is the error in his code?

A set of code with the following code blocks in order. When down arrow key pressed, move 10 steps, if pick random 1 to 10 equals 5 then, say hello, if on edge bounce.

"if on edge, bounce" needs to be removed.

The equal sign (=) should be a greater than sign (>).

The equal sign (=) should be a lesser than sign (<).

The pick random field should be from 0 to 10.

Answers

Answer: bro im suck on the same thing

Explanation:

Which output device allows a user to create a copy of what is on the screen?

Which output device allows a user to create a copy of what is on the screen?

Answers

well it's obviously printer

Answer:

display or monitor

Explanation:

because those are things a user can create a copy of what is on the sceen

Other Questions
what is equal to21/28 which event convinced southerners that northerners were trying to kill them? Evaluate the assertion that culture unifies society f(x) = x +1g(x) = 3x + 1Find (f g)(x)Someone please help!!!! 1. on a linux system with disk blocks of 1 kbyte and 48-bit block numbers, how many disk seeks are needed to read each of the following block numbers: 6, 53, 484, 72, 65422, 3729? A person looks in a convex side view mirror at the traffic 10.0 meters behind her car. The mirror has a radius of curvature of 0,500 m Where is the image that the person sees? a) 0.250 meters behind the mirror. b) 10.0 meters behind the person. c) 0.244 meters behind the mirror. d) 0.500 meters behind the mirror. e) 0.244 meters in front of the mirror. Describe the steps a plant would take to move sugars from a source to a sink. If you have ever been on the shore of a large lake, you may have noticed that you cannot see the beaches, piers, or rocks at water level across the lake on the opposite shore. The lake seems to bulge out between you and the opposite shore - a good clue that the Earth is round. Suppose you climb a stepladder and discover that when your eyes are 10 ft (3.0 m) above the water, you can just see the rocks at water level on the opposite shore. From a map, you estimate the distance to the opposite shore as d 6.1 km. Use h = 3.0 m to estimate the radius R of the Earth. what type of bond links amino acids in the first level of protein structure? I don't even know what this means I need help what does being a dipole allow water to do which events occur during the resistance phase of the general adaptation syndrome? HELP NOW PLEASE Which sentence shows the BEST use of a coordinating conjunction? A) She paid for the extra ticket, so please pay her back. B) She paid for the extra ticket because Joe didn't bring money. C) She paid for the extra ticket as if she knew Joe had no money. D) She paid for the extra ticket so that both kids could see the play. An economy has the following sectors: private households, government, flour producers and bread producers. The government levies a value added tax (VAT) on both flour and bread of 10%. In 2020, flour producers pay their workers $200 and sell 300 kilos of flour to bread makers and 240 kilos of flour to final consumers. The net price for one kilo of flour is $0.5. The bread producers pay their workers $220 and sell 170 kilo bread to domestic consumers. Moreover, 75 kilos of bread are exported (the VAT levied by the government also applies to the exported goods). The net price for one kilo of bread is $2. i) Compute the GDP of the above economy using all three different methods. Are your answers the same for the three possibilities? If yes, explain. [5] ii) Calculate the shares of GDP attributable to labour income, capital income and indirect taxes as a percentage of GDP. [3] b) Consider an imaginary economy called Nachu, whose currency is Ford. The consumption function of Nachu, in the absence of taxes, can be represented as C = 200 + 0.8Y. Investment is autonomous at 300. At this point, there is no government. i) Derive the saving function for Nachu. [2] ii) Calculate the equilibrium level of income using the aggregate expenditure approach (i.e., where Y = C + I). [2] iii) Present the equilibrium situation graphically by using the 45degree line diagram. [3] iv) Calculate the equilibrium level of income using the withdrawal-injections approach. [2] v) On the graph drawn in (iii), present the equilibrium situation graphically by using the withdrawal-injections approach. [2] vi) What is the value of the multiplier in this simple two-sector economy? [1] vii) Out of the blues, a government appears that does two things: (i) it buys goods and services to the value of 150 and (ii) it imposes a 10% tax on income of households a) Derive the consumption function for Nachu. [2] b) Derive the new saving function for Nachu. [2] c) According to the IS - LM model, the impact of a policy depends on how the central bank responds to tax changes. Assuming the goods and financial markets are initially in equilibrium and the PF led Government decides to increase taxes as a way of mitigating the ever-increasing budget deficit. With the help of the IS - LM model, explain how this move will affect the economy when Bank of Zambia responds by holding output constant. What potential difference is needed to accelerate an electron so it has a 0.125nm wavelength List three organelles found in PLANT cells, but absent from animal cells. Explain why animal cells do NOT need the organelles that are found in plant cells, but abdent in animal cells. Z Find zw and Leave your answers in polar form. W z = 5( cos 30 + i sin 30) w = 3(cos 15 + i sin 15) C What is the product? zw = [cos+ i sin] (Simplify your answers. Type any angle measures in degrees. Use angle measures greater than or equal to 0 and less than 360.) What is the quotient? =[cos+ i sin] (Simplify your answers. Type any angle measures in degrees. Use angle measures greater than or equal to 0 and less than 360.) What is the meaning of defense mechanisms? naomi has earned $54 mowing lawns the past two days. she worked 2 1/2 hours yesterday and 4 1/4 hours today. if naomi is pains the same amount for every hour she works, how much does she earn per hour to mow lawns Rashad is considering two designs for a garden. In Design 1 he would use fencing to surround a square plot of land that has an area of 1,296 square feet. In Design 2 he would divide a plot of land into two rectangular sections, each 15 feet by 36 feet, and surround the plot with fencing, as well as place fencing along the dividing line of the two sections.Two designs for a garden are shown. Design 1 is a square with an area of 1,296 square feet. Design 2 is 2 rectangles with lengths of 15 feet and 36 feet that are connected at one side.Which plan would cost less in fencing? Explain.Design 1, because it requires 12 fewer feet of fencing than Design 2Design 1, because it requires 24 fewer feet of fencing than Design 2Design 2, because it requires 12 fewer feet of fencing than Design 1Design 2, because it requires 24 fewer feet of fencing than Design 1