Suppose we use a checksum scheme based on the addition of successive 8-bit fields rather than 16-bit fields as in the Internet Transport layer. Now suppose that the following 3 bytes are received, in which the last byte is the checksum field. 0 1 0 1 0 01 1 1 1 0 1 0 1 0 0 1 1 0 1 0 1 1 1 Does the receiver detect an error that might have occurred during the transmission of these three bytes

Answers

Answer 1

Since the calculated checksum (224) does not match the received checksum (7), it can be concluded that an error occurred during transmission. The receiver will detect the error based on the mismatched checksum values.

To determine if the receiver can detect an error using the checksum scheme based on the addition of successive 8-bit fields, it is required to calculate the checksum and verify its validity.

First, let's calculate the checksum by adding successive 8-bit fields:

0 1 0 1 0 0 1 1 = 11 (in decimal)

1 0 1 1 1 0 1 0 = 90 (in decimal)

0 1 1 1 1 0 1 1 = 123 (in decimal)

Now, let's add the three values together:

11 + 90 + 123 = 224 (in decimal)

To check if an error occurred during transmission, it is required to verify if the calculated checksum matches the received checksum. The last byte in the received message is the checksum field, which is 111 in binary or 7 in decimal.

Learn more about checksum, here:

https://brainly.com/question/31386808

#SPJ4


Related Questions

when you issue the ping command, what protocol are you using?

Answers

Answer:

You use internet control message protocol

What are 3 ways I plan to promote ethical use of technology when students use it your classroom?

Answers

For Technology, Ethics Utilize in Classroom- Maintain your technical equipment, Investigate suitable and secure websites for study and research, The Fair Use Act, Creative Commons, and copyright laws are important, assist in preventing cyberbullying, Self-image is significant, Use proper netiquette.

Simply said, ethical marketing refers to the practise of promoting a good, service, or brand in a way that is consistent with your beliefs and values. This can entail being completely transparent and upfront, as well as refraining from making exaggerated statements. Here are our top suggestions for setting higher standards and fostering an ethical workplace: Develop a code, Engage with both your staff and customers, Reiterate the advantages of the code, Set a positive example for others, Educate your staff, Promote your moral conduct, Encourage moral behavior, Take note of your errors, Adjective. ethical. ethical e-thi-kl.: of or connected to ethics.: adhering to recognised codes of conduct for professionals.

Learn more about ethical from

brainly.com/question/29552906

#SPJ4

These statements describe LANs. SELECT ALL THAT APPLY
1) are not able to connect to the Internet
2) connect networks over a large geographic area
3) don't have to be connected to other networks
4) located in one building or adjacent buildings
5)wires connecting the network owned by the organization

Answers

Local area networks connect computers and give users shared access to printers, data, and other resources. Peer-to-peer or client-server architectures are the two main types of local area network architecture. Thus, option B, D, E is correct.

What is the significance of local area network?

Computers may swiftly and readily exchange data and messages using local area networks. This expedites the process and saves time.

Therefore, Any user on the network can send and receive messages and data using LAN. Users can access the server-stored data via the network from any computer.

Learn more about local area network here:

https://brainly.com/question/1167985

#SPJ1

What is an "Expert System"?

If you can’t answer pls leave It

Answers

Answer:

program that use artifical intelligents

Explanation:

Expert system, a computer program that uses artificial-intelligence methods to solve problems within a specialized domain that ordinarily requires human expertise.

When opening and closing a security container, complete the _____.
a. SF 701
b. SF 700
c. SF 702
d. SF 703

Answers

Option c is correct. SF 702 is the answer to this question. SF 702 is used to open and close security containers. Track security containers.

The security container can be opened and closed at any time. However, if possible, security containers should only be opened for privacy and security reasons. Security containers should use all possible safeguards such as guard protection, password protection, fingerprint protection, etc. Standard Form (SF 702) – Security Container Inspection Sheet. A standard form (SF 702 Security Container Sheet) tracks who opens, closes, and inspects security containers containing sensitive information.

SF 702 or "Security Container Check Sheet" is used to record the opening and closing of the data carrier. An area check is carried out in the SF 701 after the daily check is finished. The

SF 702 must be stored and disposed of according to a component records management program. SF 702 will be stored in the NDC until the next conformance inspection by a higher level control center.

Know more about information here:

https://brainly.com/question/29244533

#SPJ4

What is the acronym of COMPUTER​

Answers

Answer:

See Explanation

Explanation:

Computer is not an acronym, it is a word derived from a word "compute" which means to calculate. So, in simple words you can say that computer is an electronic device which is used for fast calculation.

Order the steps to take when drawing electron dot diagrams.


Count the dots to make sure that all of the valence electrons are represented. 1,2,3,4


Draw dots around the chemical symbol to represent the valence electrons of the atom.1,2,3,4


Use the periodic table to find the chemical symbol of the atom and the number of electrons in the valence shell. 1,2,3,4





write the chemical symbol of the atom. 1,2,3,4

Answers

Answer:

i just got to this question but the answers are

Explanation:

4

3

1

2

Challenges in creating operating system for mobile phones

Answers

Creating an operating system for mobile phones presents unique challenges that are different from developing other types of operating systems. These challenges arise due to the need for portability, energy efficiency, and security in mobile devices.

Here are some of the significant challenges that developers face while creating an operating system for mobile phones.Portability: The OS must be adaptable to a wide range of devices with varying capabilities. Each device has a different hardware architecture and processor, so the operating system must be built to accommodate these differences. It must also be able to operate on different types of hardware with different capabilities.

Energy Efficiency: Mobile devices are known for their limited battery life, so the operating system must be energy efficient to conserve power. The OS must be designed to consume less power, and its various components must be optimized to use less energy. It should also manage power consumption by different applications, so the phone doesn't drain the battery quickly. Security:

To know more about phones visit:

https://brainly.com/question/1441659

#SPJ11

Technicians are testing the security of an authentication system that uses passwords. When a technician examines the password tables, the technician discovers the passwords are stored as hash values. However, after comparing a simple password hash, the technician then discovers that the values are different from those on other systems. What are two causes of this situation

Answers

The causes of the situation include:

The systems use different hashing algorithms.One system uses hashing and the other used hashing and salting.

How to depict the information?

From the information given, the technicians are testing the security of an authentication system that uses passwords.

The technician discovers that the values are different from those on other systems because the systems use different hashing algorithms and one system uses hashing and the other used hashing and salting.

Learn more about technicians on:

brainly.com/question/14599022

#SPJ12

hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me ​

Answers

Answer:

a pseu code is a is an artificial and informal language that helps programmers develop algorithms.

Explanation:

give me rationale about brake system???

Answers

The brake system in a vehicle plays a critical role in ensuring safety, control, and efficient operation.

Here are some rationales for the importance of a well-designed and functioning brake system:

1)Safety: The primary purpose of the brake system is to provide reliable and efficient stopping power, allowing the driver to slow down or bring the vehicle to a complete stop when necessary.

A properly functioning brake system is crucial for avoiding accidents, preventing collisions, and protecting the driver, passengers, and others on the road.

2)Control and Handling: A well-designed brake system enhances the driver's control over the vehicle.

It enables smooth deceleration and allows for precise modulation of braking force, providing better handling and maneuverability.

This allows the driver to respond to changing road conditions, traffic situations, and emergencies effectively.

3)Energy Conversion: The brake system converts kinetic energy into thermal energy through friction, allowing the vehicle to reduce its speed or stop.

This energy conversion process is essential for managing the vehicle's speed and preventing excessive heat buildup in the braking components.

4)Performance and Responsiveness: An efficient brake system ensures prompt response and reliable performance, allowing the driver to trust the brakes when needed.

It should provide consistent braking force, even under different driving conditions such as wet or slippery surfaces.

A well-designed brake system improves the overall driving experience by instilling confidence and predictability in the braking process.

5)Maintenance and Longevity: Regular maintenance of the brake system, including inspections, pad and rotor replacements, and fluid flushes, is crucial for its longevity and optimal performance.

A properly maintained brake system minimizes the risk of component failure, extends the lifespan of brake components, and reduces the chances of costly repairs.

For more questions on brake system

https://brainly.com/question/30262553

#SPJ8

An external style sheet uses the ________ file extension and are applied to an html document with the ________ element.

Answers

An external style sheet uses the .css file extension and is applied to an HTML document with the  element.


An external style sheet is a separate file that contains CSS (Cascading Style Sheet) rules. It is used to define the appearance and layout of multiple HTML documents. By using an external style sheet, you can maintain a consistent look and feel across your website.  An external style sheet is a powerful tool for managing the visual design of a website. It allows you to define CSS rules in a separate file with a .css file extension. This file can be linked to multiple HTML documents using the  element. The  element is placed within the  section of an HTML document, and it specifies the location of the external style sheet using the "href" attribute. By separating the CSS rules into an external file, you can easily make changes to the visual design of your website without modifying each individual HTML document. This not only saves time and effort but also ensures consistency throughout your website.

In summary, an external style sheet uses the .css file extension and is applied to an HTML document with the  element. This approach allows you to maintain a consistent visual design across multiple web pages by defining CSS rules in a separate file.

Learn more about HTML visit:

brainly.com/question/32819181

#SPJ11

One of the files is substr.awk. Your job is to edit this file so it will output all of the character sequences of a certain length found in a text input file. Another file is wordlist.txt, which is a text file containing about 60,000 English words, one word per line. Here are the first lines of wordlist.txt:

a

aardvark

aardwolf

ab

aba

abaca

abacist

Answers

The `substr.awk` file is responsible for outputting all the character sequences of a particular length, found in a text input file. Below is how to edit it to output all of the character sequences of a specific length:

```
#!/usr/bin/awk -fBEGIN {
   length = 3 # Change this value to the desired length of the character sequences
}
{
   for (i=1; i<=length; i++) {
       for (j=1; j<=length-i+1; j++) {
           print substr ($0, j, i);
       }
   }
}
```

For instance, if you need to output all the 4-letter character sequences, replace `length = 3` with `length = 4`. And here is a sample of how to use `wordlist.txt` to obtain all the 4-letter words:`awk 'length($0) == 4' wordlist.txt` This command will print all the words in `wordlist.txt` that have a length of 4 characters.

Learn more about character sequences: https://brainly.com/question/32352749

#SPJ11

What is a special type of variable used in subroutines that refers to a piece of data?

a parameter

a constant

a function

a routine

Answers

Answer:parameter

Explanation:

I got it right

Answer:

answer is A :)

Explanation:

Edge 2021

how to get amount after a percentage increase in excel​

Answers

Answer:

First: work out the difference (increase) between the two numbers you are comparing.

Increase = New Number - Original Number.

Then: divide the increase by the original number and multiply the answer by 100.

% increase = Increase ÷ Original Number × 100.

Explanation:

Which type of security threat would be responsible if a spreadsheet add-on disables the local software firewall

Answers

The type of security threat responsible for disabling the local software firewall would be a malware or virus attack.

A malware or virus attack can infiltrate the system and disable security measures such as firewalls to allow the attacker to gain access to sensitive information or to spread the virus further.

Malware, short for malicious software, is a type of security threat that can infiltrate and damage a computer system without the user's consent. In this case, the spreadsheet add-on that disables the local software firewall is likely to be malware. This is because it's performing a malicious action (disabling the firewall) which can leave your system vulnerable to other threats.

To know more about Software visit:-

https://brainly.com/question/29766600?referrer=searchResults

#SPJ11

what is the difference between mass and madrigal

Answers

Mass and Madrigal are both types of musical compositions, but they differ in several ways:

Structuretext

What is mass?

Structure: A mass is a religious musical composition that consists of several movements, such as Kyrie, Gloria, Credo, Sanctus, and Agnus Dei, while a madrigal is a secular vocal composition that typically consists of several verses or stanzas.

Text: The text of a mass is usually in Latin and is taken from the liturgy of the Catholic Church, while the text of a madrigal is often in the vernacular language and can be about a variety of subjects, such as love, nature, or mythology.

Therefore, in Musical Style: Masses are typically composed for choir, orchestra, and soloists and are often written in a more complex, polyphonic style, while madrigals are usually written for a small group of singers

Read more about mass  here:

https://brainly.com/question/86444

#SPJ1

What color model should Joe use if he will be using an offset printing press?

A. RGB

B. hexadecimal

C. CMYK

D. index

Answers

Answer:

CMYK

Explanation:

Monitors typically use RGB color (additive model — adding to make white), but offset printing uses CMYK pigments (subtractive color — subtracting from the existing white). Printed images have less visual range, saturation, and contrast than digital images, so in print, colors will usually appear darker and less vibrant.

Answer:

The correct answer is letter C. CMYK

Explanation:

Which statement is true about input and output devices? A. An input device receives information from the computer and an output device sends information to the computer. B. An output device receives information from the computer and an input device sends information to the computer. C. Neither statement is true. D. Both statements are true

Answers

Answer:

B. An output device receives information from the computer and an input device sends information to the computer.

Explanation:

Output device: The term "output device" is described as a device that is responsible for providing data in multitude forms, a few of them includes hard copy, visual, and audio media. The output devices are generally used for projection, physical reproduction, and display etc.

Example: Printer and Monitor.

Input device: The term "input device" is determined as a device that an individual can connect with the computer in order to send some information inside the computer.

In the question above, the correct answer is option-B.

Write a program that calculates and prints the bill for a cellular telephone company. The company offers two types of service: Regular and Premium. The rates vary, depending on the type of service. The rates are computed as follows: Regular service: $10. 00 The first 50 minutes are free. Any minutes over 50 are $0. 20 per minute. Premium service: $25. 00 The first 75 minutes from 6:00 a. M. To 6:00 p. M. Are free and minutes over 75 between these times are $0. 10 per minute. The first 100 minutes from 6:00 p. M. To 6:00 a. M. Are free and minutes over 100 are $0. 05 per minute

Answers

To calculate and print the bill for a cellular telephone company that offers two types of service, regular and premium, you can use the following program:

#include <iostream>

int main() {

   // Regular service

   double regular_cost = 10.00;

   int regular_free_minutes = 50;

   double regular_extra_minutes_cost = 0.20;

   // Premium service

   double premium_cost = 25.00;

   int premium_daytime_free_minutes = 75;

   double premium_daytime_extra_minutes_cost = 0.10;

   int premium_nighttime_free_minutes = 100;

   double premium_nighttime_extra_minutes_cost = 0.05;

   // Read in the total number of minutes used

   int minutes_used;

   std::cout << "Enter the total number of minutes used: ";

   std::cin >> minutes_used;

   // Calculate the bill for regular service

   double regular_bill = regular_cost;

   if (minutes_used > regular_free_minutes) {

       regular_bill += (minutes_used - regular_free_minutes) * regular_extra_minutes_cost;

   }

   // Calculate the bill for premium service

   double premium_bill = premium_cost;

   if (minutes_used > premium_daytime_free_minutes) {

       premium_bill += (minutes_used - premium_daytime_free_minutes) * premium_daytime_extra_minutes_cost;

   }

   if (minutes_used > premium_nighttime_free_minutes) {

       premium_bill += (minutes_used - premium_nighttime_free_minutes) * premium_nighttime_extra_minutes_cost;

   }

   // Print the bills

   std::cout << "Regular service bill: $" << regular_bill << std::endl;

   std::cout << "Premium service bill: $" << premium_bill << std::endl;

   return 0;

}

Learn more about programming:

https://brainly.com/question/26134656

#SPJ4

Write a program that calculates and prints the bill for a cellular telephone company. The company offers
Write a program that calculates and prints the bill for a cellular telephone company. The company offers

Paul wants to store addresses and phone numbers for clients. Paul wants to use this information to send form letters. Paul should enter the addresses in a _____.

spreadsheet
graphic software
database
word processor

Answers

Answer:

Spreadsheet or database depending on how he's setting it up and what tools he's using.

The question makes it sound like Paul wants to store some arbitrary data and does not have any particular tool set up for it, so spreadsheet is probably the "correct" answer.

A database would be used more by developers to build a system that can be used to store such data (e.g. back end on a web site that takes the data).

_____ elements may not be equally distributed; however, they can still promote some form of equilibrium by placing numerous small items on one side of the page and just a few large objects on the other side.


Symmetrical


Emphasized


Contrasting


Asymmetrical
HURRY IM TIMED

Answers

Asymmetrical elements may not be equally distributed; however, they can still promote some form of equilibrium by placing numerous small items on one side of the page and just a few large objects on the other side. The correct option is D.

What is asymmetrical elements?

Asymmetrical balance occurs when different visual images are used on either side of a design and the image still appears balanced.

A design must have unequal visual weight on either side to be considered asymmetrical, but those unequal visuals must balance each other.

Although asymmetrical elements are not evenly distributed, they can still promote some form of equilibrium by placing many small objects on one side of the page and only a few large objects on the other.

Thus, the correct option is D.

For more details regarding asymmetrical balance, visit:

https://brainly.com/question/27961150

#SPJ1

Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional questions.
Online Content: Site 1

Describe the ways in which the speakers can cause difficulty in the listening process. (Site 1)

Answers

Ways in which speakers can cause difficulty in the listening process are speaking indistinctly, rapidly, or impolitely, leading to disinterest and intimidation.

Challenges in the listening process

We must explain here that we do not know which site we should access to obtain information for this question. Therefore, we will provide you with an answer that will likely help you, containing the most common difficulties and challenges concerning the listening process.

It can be challenging to listen to someone who speaks softly, indistinctly, curtly, rapidly, tediously, or in a discourteous tone. Moreover, if the speaker expresses something contentious or impolite or loses concentration while speaking, it can lead to the listener feeling uneasy or disinterested in what is being conveyed.

Learn more about the listening process here:

https://brainly.com/question/806755

#SPJ1

A personal directory of e-mail addresses stored and maintained with one’s e-mail program

Answers

Answer:

It’s a address book

you need to use task manager to analyze memory utilization on a windows system. for example, you need to see how much system ram is currently in use and how much is available. click on the tab in task manager that you would use to do this.

Answers

Answer:

Performance tab

Explanation:

If you press on the performance tab you should be able to see how much memory is in use and how much is free. For example 50% or 8GB/16GB

state three differences between text data and number data​

Answers

Answer:

Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.

Answer:

Explanation:

text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech

number data is just numbers.

Which two protocols manage neighbor discovery processes on IPv4 networks? a. ICMP and ARP b. IPv4 and IPv6 c. TCP and UDP d. BGP and OSPF.

Answers

The two protocols that manage neighbor discovery processes on IPv4 networks are ICMP and ARP.

Explanation:

ICMP (Internet Control Message Protocol) and ARP (Address Resolution Protocol) are two protocols used to manage neighbor discovery processes on IPv4 networks.

ICMP is used to diagnose network problems and send error messages. It is also used to discover the IP address of a device on the network.

ARP is used to map an IP address to a MAC address. When a device wants to send a packet to another device on the network, it needs to know the MAC address of the device. ARP resolves the MAC address of a device based on its IP address.

Together, ICMP and ARP manage the neighbor discovery processes on IPv4 networks. ICMP helps devices discover each other's IP addresses, while ARP helps devices map those IP addresses to MAC addresses.

To get similar answer on ICMP (Internet Control Message Protocol):

https://brainly.com/question/27961582

#SPJ11

Drag each label to the correct location on the image.
Match the different types of mounting techniques with their definitions.
uses triangular pockets
to hold the corners of a
photograph to the mount
board
uses wet glue to stick
the print to a mount
board
uses a heat-activated
adhesive to permanently
stick the photograph to
a rigid backing board
uses different patterns
of tape to create hinges,
which attach the print to
a mount board
dry mount
photo corners

Answers

Answer: uses a heat activated.... the answer is dry mount

Use triangular pockets to hold the corners....the answer is photo corners

Use different patterns of tape.....hinge mount

Uses wet glue to stick the print....wet mount

Explanation: I got this right on a post test

The matchup of the mounting techniques are:

uses a heat activated-  dry mountUse triangular pockets to hold the corners-  photo corners Use different patterns of tape-h/in/ge mountUses wet glue to stick the print- wet mount

What is the mounting techniques

Mounting could be a handle by which a computer's working framework makes records and registries on a capacity gadget (such as difficult drive, CD-ROM, or organize share) accessible for clients to get to through the computer's record system.

There are diverse sorts of strategies in mounting craftsmanship work, exhibition hall mounting and dry mounting. Gallery mounting is authentic and reversible and dry mounting is authentic (in most cases) and non-reversible.

Read more about mounting techniques here:

https://brainly.com/question/20258766

Hello guys
I need help. Does software developer require selenium and django? Can I work as software developer using python only?

Answers

You can accomplish everything as a Python developer, from web or game development to quantitative research and building new programming languages.

Django as a Python framework

Django is a Python-based web framework that adheres to the model-template-views architectural paradigm. It is maintained by the Django Software Foundation, an independent non-profit organization based in the United States.

Django has a more flexible and well-structured admin panel than Laravel. Django also permits developers to reuse code from previous projects. It even includes a library of reusable programs, tools, and features.

Learn more about Python here:

https://brainly.com/question/26497128

#SPJ1

a movie streaming company is offering an online deal on hd movies to new customers who live in a certain country. how can authentication help the company protect its assets and resources from fraudulent use of the deal? more than one answer may be correct.

Answers

1. The company can require customers to provide proof of address in the specified country before they can access the HD movies.

2. The company can use multi-factor authentication (MFA) to verify the customer's identity before they can access the HD movies.

3. The company can limit access to the HD movies to a certain number of devices per account.

4. The company can use IP address validation to ensure customers are connecting from the specified country.

What is IP
IP stands for Internet Protocol. It is a set of rules used to define how data is transferred across the internet. It defines how two computers interact with each other over the internet, including how data is formatted, addressed, transmitted, routed and received. It is the basis of all communication over the internet and is responsible for the success of the internet.

To know more about IP
https://brainly.com/question/16011753
#SPJ4

Other Questions
? QuestionLook at your annotations and the notes you made in your notebook. How do Mandela's calls to action work to developanother central idea of his speech?O He is expressing his happiness at being elected president.O He is highlighting the need for South Africa to reflect on its past.He is asking people to change and move forward from the past.O He is warning of the dangers facing the country's future.Submit plato Match the mountains with the plates involved.North AmericanCordillera?Two continental platesAppalachians2One continental plate, oneoceanic plateAleutians?Two oceanic platesAndes?One island plateau, onecontinental plate Which organelle makes energy for the animal cell?A. mitochondriaB. chloroplastsC. chromatinD. golgi apparatus what is the fifth amendment A product has a demand of 2000 units per year. Ordering cost is $20, and holding cost is $2 per unit per year. The cost-minimizing solution for this product is to order:Question 3 options:every 100 days100 units per order10 times per year200 units per orderall 2000 units per year The following transactions pertain to the operations of Ewing Company for Year 1: 1. Acquired $30.000 cash from the issue of common stock 2. Provided $65,000 of services on account 3. Paid $22,000 cash on accounts payable. 4. Performed services for $8,000 cash. 5. Collected $51000 cash from accounts receivable. 6. Incurred $37,000 of operating expenses on account. 7. Paid $6,500 cash for one year's rent in advance. 8. Paid $4.000 cash dividend to the stockholders. 9. Paid $1.200 cash for supplies to be used in the future. 0. Recognized $3,100 of accrued salaries expense. Required a. Classify the cash flows from these transactions as operating activities (OA), investing activities (IA), or financing activities (FA). b. Prepare a statement of cash flows. (There is no beginning cash balance.) Required A Required B Classify the cash flows from these (FA). (Not all cells require entry.) Transaction Classification 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Required A Required B Prepare a statement of cash flows. (There is no beginning cash balance.) (Enter cash outflow= EWING COMPANY Statement of Cash Flows For the Year Ended December 31, Year 1 Cash flows from operating activities Net cash flow from operating activities Cash flows from investing activities Cash flows from financing activities Net cash flow from financing activities Net change in cash Ending cash balance < Required A Required B What proportion of people surveyed would be willing to pay more than $6.75 for a sandwich? the graph of y = - square root x is shifted two units up and five units left which of the following statements is true? students receiving financial aid awards may only qualify for one type of federal financial aid. students receiving financial aid awards may qualify for all three types of federal financial aid and also receive additional financial aid awards from the state or school. financial aid applications are due before the school year starts and cannot be submitted after the start date. what are the reason for the development of most of the old human civilization on the banks of river? Which development occurred aspart of the Second Industrial Revolution inthe late 1800s? Match each online activity with the sense or senses it engages.Hearingwatching a videolooking at pictures on the screenSight and hearinglistening to a radio interviewTouchdragging items across the screen with amouseSighttaking a test or surveySight and touch5) Intra John wants to buy a new motorcycle. Tax rate is 6% how much tax would you pay if the motorcycles $450?Answers :$270 $27 $2,700$2.70 What scale factor would you use to create the copy on the right? in order to be considered developmental, change must be which of the following? select all that apply. A certain radioactive material is known to decay at a rate proportional to the amount present. If after one hour it is observed that 10 percent of the material has decayed, find the half-life (period of time it takes for the amount of material to decrease by half) of the material (in hrs.).a.6.58b.8.58c.10.58d.12.58 Which process caused initially by nitrogen monoxide emissions from jet or automobile engines is not involved in contributing to acid deposition?A: NO(g) + H2O(l) H2NO2(aq)B: 2NO2(g) + H2O(l) HNO2(aq) + HNO3(aq)C: 2NO(g) + O2(g) 2NO2(g)D: 4NO2(g) + O2(g) + 2H2O(l) 4HNO3(aq) Michelle was fishing in her canoe at point A in the lake depictedabove. After trying to fish there, she decided to paddle due eastat a steady speed of 10 miles per hour. As she paddled, a windblowing due south at 5 miles per hour caused a change in herdirection. To the nearest tenth of a mile, what is the velocity,represented by vector AC, of her canoe?A 8.6 miles per hourB 10 miles per hour11.2 miles per hourD 17.2 miles per hour 1+30.0069/1-3 0.0069 The base of a right prism is a regular hexagon with side 4. The height of the prism is 6. Find the lateral area and volume.