Using the OSI model, indicate the layer that is responsible for the functions by filling the blanks: ..... protocol transfers datagram from host to neighboring host, using network-layer services; it also handles bit errors and use MAC addresses
..... protocol transfers M (e.g., reliably) from one process to another, using services of network layer and ports
...... exchanges messages to implement some application service using services of transport layer; one example is DNS ......protocol transfers transport-layer segment from one host to another, using link layer services and IP addressing

Answers

Answer 1

The Data Link Layer is responsible for transferring datagrams between hosts, handling errors, and utilizing MAC addresses. Meanwhile, the Transport Layer is responsible for transferring messages between processes, utilizing network layer services, and employing ports for identification and delivery.

1. In the OSI model, the layer responsible for transferring datagrams from host to neighboring host, handling bit errors, and using MAC addresses is the Data Link Layer. This layer is responsible for the reliable transfer of data between adjacent network nodes, typically within a local area network (LAN). It ensures that data packets are transmitted without errors, handles flow control, and uses MAC addresses to identify and deliver packets to the correct destination.

2. On the other hand, the layer responsible for transferring messages (e.g., reliably) from one process to another, using the services of the network layer and ports, is the Transport Layer. This layer establishes end-to-end communication between processes on different hosts. It ensures reliable and efficient data delivery, handles segmentation and reassembly of data, and provides mechanisms such as error control and flow control. Ports are used to identify specific processes or services on a host so that the data can be correctly directed to the intended application.

3. To summarize, these layers play vital roles in ensuring reliable and efficient communication within computer networks, each focusing on different aspects of data transmission and delivery.

learn more about OSI model here: brainly.com/question/31023625

#SPJ11


Related Questions

Which sphere is responsible for climate change?

Answers

Answer:

troposphere sphere

Explanation:

contains 99% (by weight) of the total atmosphere. C02 is water soluble and continuously washed during rain. some c02 is also getting dissolved in surface water. A big percentage is trapped during photosynthesis.

Type the correct answer in each box. Spell all words correctly. Programmers utilize to convert a program from language, which is human readable, to language, which is a low-level language that the system can understand.

Answers

The completed sentences are:

Programmers utilize compilers to convert a program from high level language, which is human readable, to machine language, which is a low-level language that the system can understand.

What are compilers?

When working with source codes written in high-level programming languages like Java or C++, software developers rely on specialized professional tools known as compilers.

The purpose of these programs is to translate the human comprehensible language of source codes into low-level binaries like machine code or bytecode that computers can understand better while producing an executable product.

Ultimately, compiling remains a vital step in creating functional applications by translating software's instructions expressing business logic via understandable texts into computer-readable instructions kept within binomial-code-based files.

Learn more about Compliers:
https://brainly.com/question/30780600
#SPJ1

Which computer memory is higher among digital & analog computer​

Answers

A digital computer has a higher memory. Analog is very low and limited.

What is the difference between the complete scan and the resident shield?

Answers

A complete scan and resident shield are two types of antivirus scans. The main difference between them is that a complete scan checks all files and folders on your computer, while a resident shield scans only files as they are accessed or modified.

A complete scan is a thorough antivirus scan that checks all files and folders on your computer's hard drive. This scan examines all of your system's files to detect viruses, malware, and other threats that may be present. A complete scan is time-consuming and can take several hours to complete, depending on the size of your hard drive.

As you work on your computer and open or modify files, the resident shield scans the files for malicious code and alerts you if any are found. This type of scan is very useful because it provides immediate protection against threats that may try to infect your computer while you're working on it.

To know more about antivirus visit:

https://brainly.com/question/29356216

#SPJ11

Biyu knows that she spends more time than she should on the computer. Lately, she has been getting a lot of
headaches. She is not sure if there is any connection between this and the time she spends on her laptop. What is
the BEST response to Biyu?
She may be exposed to too much red light from her computer screen.
O
There is a good chance it is eye strain, so she should cut back and see if that helps.
She is definitely injuring herself and should avoid all screens going forward.
Computers do not cause physical health problems, so it is likely something else.

Answers

There is a good chance it is eye strain, so she should cut back and see if that helps.

What is meant by eye ?

The visual system's organs include the eyes. They give living things the ability to see, to take in and process visual information, and to perform a number of photoresponse functions that are not dependent on vision.Light is detected by the eyes, which transform it into neuronal electro-chemical impulses.There are 10 essentially diverse types of eyes with resolving capacity, and 96% of animal species have an intricate optical system.Arthropods, chordates, and molluscs all have image-resolving eyes.The simplest eyes, known as pit eyes, are eye-spots that can be placed inside a pit to lessen the angle at which light enters and influences the eye-spot and to enable the organism to determine the angle of incoming light.

To learn more about eye refer to

https://brainly.com/question/1835237

#SPJ1

i need help. match the commands to the task it helps to complete

i need help. match the commands to the task it helps to complete

Answers

Answer is
1:4
2:3
3:2
4:1

Which statement is most accurate?Batteries with higher voltage will always produce a lower current rating than batteries with low voltages. Voltage is not a good indicator of electrical current that batteries can produce. A 1.5 volt battery has less ability to move electrons than a 6 volt battery. A 12 volt battery creates more electrical pressure than a 24 volt battery.

Answers

A 12 volt battery creates more electrical pressure than a 24 volt battery.

What is meant by volt?

-A measurement of the electromotive force and electrical potential difference between two places in a conducting wire carrying a continuous current of one amp when the power applied between these two sites is equal to one watt.

-A volt is defined as the energy consumption of one joule for every coulomb of electrical charge. 1V = 1J/C.

One volt is the difference in potential between two locations in a wire carrying one ampere of current when the power expended between the places is one watt.

-Volts are units of electrical potential, potential difference, and electromotive force in the metre-kilogram-second system (SI).

To know more about volt visit:-

brainly.com/question/27861305

#SPJ1

Select all the steps needed to create a maintenance schedule. Identify individuals to perform the maintenance. Document or log maintenance that has been performed. Take an inventory of the equipment. Obtain test equipment if necessary. Define maintenance tasks. Review the manufacturers' manuals. Establish frequency of tasks. Run the defragmentation utility. Develop a reminder system.

Answers

Answer:

Maintenance planning and scheduling, arguably the most neglected functions of modern asset management, are at the heart of an effective maintenance management system. Through the use of work orders and a CMMS, maintenance planning covers the daily or weekly planning, scheduling and control activities to ensure that scheduled work is undertaken, and that available resources are being used optimally. Yet many organizations still struggle to make their maintenance planning and scheduling as effective as it should be.

Maintenance planning

Without planning and scheduling, the wrench-on time for a company is on average only 35%. That means that for every technician working an 8-hour day, only 2.8 hours of that day is spent working on assets. Implementing proper maintenance planning and scheduling, however, can increase the wrench time from 35% to 65%. At this level of efficiency, a technician working an 8-hour day will complete 5.2 hours of actual work. With 65% of the engineer’s time being used efficiently, only 35% of their time is wasted. This improvement would enable an organization to move away from a reactive (firefighting) state of maintenance, and improve overall workforce efficiency.

Explanation:

1. Identify the problem

The need for maintenance can be triggered by a failure, a noisy bearing or an oil leak. Once identified, the problem must be reported to the maintenance department. This is normally done through a work request so that planning and scheduling can take place.

2. Plan the maintenance task

‘Planning’ involves deciding on what exactly needs to be done, determining priority, and defining the sequence of activities and skills required. Ensure that all the resources, material, labor, contract services, specialist equipment, tools and information are available. There may even be a need for outside contractors, items to be purchased or work permits to be obtained, all of which must be arranged in advance.

A maintenance planning function is a critical tool for reducing downtime and maximising the value of preventive maintenance. The maintenance planner must therefore have the technical skills and equipment knowledge to do this planning.

3. Schedule the work

‘Scheduling’ involves deciding when to do the work. This will depend on the priority level of the task, and the availability of both the resources and the equipment to be repaired. Many organizations schedule maintenance for a specific period during the working week or month. Weekend maintenance is never desirable because, in many cases, suppliers are not available and personnel are expensive.

The legal requirements with regard to statutory inspections are generally quite rigid, so try and devise a 52-week maintenance plan at the beginning of each year. Review this plan periodically to improve the accuracy and quality of the information. Communicate the preventive and corrective maintenance requirements to production so that they fully understand the need for the maintenance window.

4. Allocate the task to specific people

Although this will depend on organizational arrangements, consider the following:

Allocate your maintenance personnel to specific areas or pieces of equipment

Ensure the allocated person has the skills to perform the task

Be very clear about the type of work that will be allocated to outside contractors

Where necessary, undertake hazard analyses to identify risks and formulate action plans to control access to high-risk areas; your plans should include hot work permits, confined space permits and lockout procedures.

5. Ensure the work is executed properly

It is usually the responsibility of the maintenance supervisor to confirm that the maintenance work meets the required quality standards, usually through selected planned job observations. The planner (or, in some instances, a maintenance scheduler) should monitor outstanding schedules or work requests to ensure that the planned work was actually done.

6. Analyze the problem and decide how to prevent it from happening again

Analyze the root cause of major failures and take corrective action to prevent recurrence. Corrective action could include training, a change to the preventive maintenance programme or equipment redesign. Breakdown or failure of the management process is often overlooked in a major failure. In those cases, corrective action may be a systems upgrade.

When all six of these foundational steps are implemented and combined correctly, maintenance planning can attain much greater levels of efficiency. This leads to important asset-related data and information being shared across the plant, and even across multiple plants. It’s not an overnight process though, so don’t give up if you think it might take too long. The benefits are well worth it.

Identify and eliminate problems quickly and effectively with How-to Guide: How to use a problem-solving A3 Report, an essential guide to compiling an A3 report

Exercise 6.8.6: Totals of Lots of Rolls 5 points
Use the previous program that rolls a 6-sided die 100 times.

This time, instead of printing out the result of EACH roll, only print out the sum of the rolls for each number.

For example:

You rolled 24 ones.
You rolled 15 twos.

etc.

Write down the summary from one of the simulations to use in the next exercise.

Help plz

Answers

Answer: good luck

Explanation:

Select all statements from the given choices that are the negation of the statement:
Michael's PC runs Linux.
Select one or more:
a. It is not true that Michael's PC runs Linux.
b. It is not the case that Michael's PC runs Linux.
c. None of these
d. Michael's PC runs Mac OS software.
e. Michael's PC runs Mac OS software and windows.
f. It is false that Michael's PC runs Linux.
g. Michael's PC doesn't run Linux.
h. Michael's PC runs Mac OS software or windows.
i. Michael's PC runs Windows

Answers

The statements that are the negation of "Michael's PC runs Linux" are: a. It is not true that Michael's PC runs Linux. b. It is not the case that Michael's PC runs Linux. d. Michael's PC runs Mac OS software. e. Michael's PC runs Mac OS software and windows. f. It is false that Michael's PC runs Linux. g. Michael's PC doesn't run Linux. h. Michael's PC runs Mac OS software or windows. i. Michael's PC runs Windows.

The negation of a statement is the opposite or contradictory statement. In this case, the statement "Michael's PC runs Linux" can be negated in multiple ways.

Options a, b, f, and g all express the negation by denying the truth of the original statement. Option d states that Michael's PC runs Mac OS software, which contradicts the statement that it runs Linux. Option e extends the negation by adding the condition that Michael's PC runs both Mac OS software and Windows, further diverging from the original statement. Option h also offers a contradictory statement by stating that Michael's PC runs either Mac OS software or Windows, but not Linux. Finally, option i simply states that Michael's PC runs Windows, which excludes Linux.

In summary, options a, b, d, e, f, g, h, and i all provide statements that negate the original claim that Michael's PC runs Linux.

Learn more about software.

brainly.com/question/32393976

#SPJ11

the vast majority of the population associates blockchain with the cryptocurrency bitcoin; however, there are many other uses of blockchain; such as litecoin, ether, and other currencies. describe at least two cryptocurrencies with applicable/appropriate examples and discuss some of the similarities and differences.'

Answers

Litecoin is a cryptocurrency similar to Bitcoin but with faster transaction confirmation times and a different hashing algorithm.

What are the advantages of using litecoin?

It enables quick and low-cost transfers, making it suitable for everyday transactions. For instance, a person can use Litecoin to buy goods or services online, such as purchasing a digital product.

Ether, on the other hand, powers the Ethereum blockchain, which is a decentralized platform for building smart contracts and decentralized applications (DApps). It serves as the native currency for executing transactions and powering operations on the Ethereum network.

Read more about cryptocurrency here:

https://brainly.com/question/26103103

#SPJ4

What do microphone means

Answers

Answer:

A tiny phone

Explanation:

It means a tiny phone

What is the principle where all data should be treated equally?

Answers

The principle of data equality states that all data should be treated with equal respect, free from bias and discrimination, for fair and reliable analysis.

The principle that all data should be treated equally is known as the principle of "data equality." This principle holds that all data, regardless of its source or format, should be treated with the same level of respect and given equal consideration in processing and analysis. This means that data should not be subjected to bias or discrimination based on factors such as its origin, type, or format, and should be processed and analyzed in a consistent and impartial manner. The principle of data equality is an important consideration in fields such as data science, where it is critical to ensure that data is treated objectively and fairly in order to produce accurate and reliable results.

Adhering to the principle of data equality helps to ensure the validity and integrity of the data, leading to more trustworthy and actionable insights and decisions based on the analysis.

Learn more about integrity of the data here:

https://brainly.com/question/28863007

#SPJ4

A _________________ can also contain a single character or be entirely empty.

Answers

In Computer programming, a string can either contain a single character or be entirely empty.

The kinds of data type.

In Computer programming, there are five (5) main recognized data types and these include the following:

Integer type (int).Character type (char).Floating point type (float).Boolean (bool)String (str)

What is a string?

A string is a data type which is typically used for data values that comprises ordered sequences of characters. Also, a string can either contain a single character or be entirely empty.

An example of a string in computer programming is "Hello world"

Read more on a string here: https://brainly.com/question/25619349

Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that ebba should undertake?.

Answers

The first step that Ebba should take is: Information gathering and Reconnaissance.

What is an In-house Penetration Test?

An in-house Penetration test is a form of offensive test that is aimed at finding the lapses that a system has and initiating attacks to know the best way to prevent them.

Before launching such a test it is advised to plan and gather information about the possible lapses.

This will help the pen tester to know what attacks to launch and the right measures to resolve them. So, the first step that Ebba should take is Information gathering and Reconnaissance.

Learn more about In-house Penetration test here:

https://brainly.com/question/19085749

4) Programming a) WAp to find the greatest number among any three numbers.​

Answers

def comp_num (num1, num2, num3):

try:

if num1 > num2 and num1 > num3:

print ( "{0} is the biggest".format(num1) )

elif num2 > num1 and num2 > num3:

print ( "{0} is the biggest".format(num2))

elif num3 > num2 and num3 > num1:

print ( "{0} is the biggest".format(num3))

except ValueError:

return "Invalid input"

num_1 = int (input (" Please enter a number: "))

num_2 = int (input (" Please enter a second number: "))

num_3 = int (input (" Please enter a third number: "))

print (comp_num (num_1, num_2, num_3))

Answer:

this is in qbasic programming

4) Programming a) WAp to find the greatest number among any three numbers.

what do you understand by local technology?

Answers

Answer:

It's basically people that assist to their activities in a daily life

Explanation:

Answer:

People that assist with each daily activities

Explanation:

:what is the most important part of a computer
:what are the modern processors called
:what is the most important part of a computer
:what is the engine that drives every computer

goodluck :)​

Answers

Answer:

a

Explanation:

1. CPU. CPU - Central Processing Unit - inevitably referred to as the "brains" of the computers. The CPU does the active "running" of code, manipulating data, while the other components have a more passive role, such as storing data. Hope this helps! Mark brainly please!

Which snippet of code is in XML?​

Which snippet of code is in XML?

Answers

Answer:

The top left

Explanation: It uses XML Syntax

Answer: Bottom left '<cd>'

Explanation:

PLAYTO i got it right

This question has two parts : 1. List two conditions required for price discrimination to take place. No need to explain, just list two conditions separtely. 2. How do income effect influence work hours when wage increases? Be specific and write your answer in one line or maximum two lines.

Answers

Keep in mind that rapid prototyping is a process that uses the original design to create a model of a part or a product. 3D printing is the common name for rapid prototyping.

Accounting's Business Entity Assumption is a business entity assumption. It is a term used to allude to proclaiming the detachment of each and every monetary record of the business from any of the monetary records of its proprietors or that of different organizations.

At the end of the day, we accept that the business has its own character which is unique in relation to that of the proprietor or different organizations.

Learn more about Accounting Principle on:

brainly.com/question/17095465

#SPJ4

use humorous and monster in a sentence.

Answers

Answer: Here are a few...

1) The monstrous elephant trampled through the jungle crushing everything in its path.

2) Because it was so monstrous, the maid often got lost in the massive home she cleaned.

3) Monstrous amounts of foods are needed to feed the hundreds of refugees who showed up at the soup kitchen.

Explanation:

I hope this helps :D

True or false
A compiler translates a source program one line of code at a time.

Answers

Answer:

True

Explanation:

yes It translates one line at a time to be able to confirm all information.

Answer:

True

Explanation:

I hope this helps you

Cross-cultural team members might live in different time zones.
Members might send an email to other team members.

Email is a type of ________ communication.

O simoultaneous
O synchronous
O alternating
O asynchronous

Answers

Answer:

d. asynchronous

Explanation:

How do you answer this ?

How do you answer this ?

Answers

Answer:

Just put True or false for your answer

Explanation:

Use a Dictionary

What is block palette

Answers

The block palette is an area of the graphical user interface located between the stage, sprite pane and scripting area.

Write the technical terms for each of the following:
a. The use of the Internet to buy and sell goods and services.
b. Voice communication through the Internet. C. A program that allows the user to log into a remote computer on the Internet as a user on that system.
d. High speed digital communication network evolving from existing telephony.
e. Software that is used for surfing information through the Internet.​

Answers

Explanation:

network" (and any subsequent words) was ignored because we limit queries to 32 words.

Which of the following is NOT a correct flowchart shape?

A. Parallelogram
B. Oval
C. Diamond
D. Rectangle
E. Star

Answers

I think the answer is star because in a flowchart, the most common shapes are a parallelogram, ovals, diamonds, and rectangles. Stars aren’t used in flowcharts.

Hope this helps :)

Answer: Star

Explanation:

While in high school, you need to complete a specific number of ___ to be accepted into a four-year college

Answers

Answer:

credits

Explanation:

I'm still in highschool

Answer:

If these are your options:

A: electives

B: Advanced Placement courses

C: course requirements

D: dual enrollment courses

It's C, course requirements

Explanation:

Phase One Start by building an 8-bit ALU using Logisim. This ALU can implement 16 instructions on 8-bit operands. We would suggest the following minimum list of instructions: Arithmetic addition Increment Decrement Comparison (with 3 outputs: one for equals, one for less than and one for greater than) Logic bitwise Not Logic bitwise And Logic bitwise Or Register right logic shift Register left logic shift In addition to these nine instructions, please suggest ve more instructions that the ALU can implement for a total of 14 instructions (we are reserving 2 instructions for branching). Justify the importance of the ve instructions you added in a Word doc to submitted as part of this assignment. Label these instructions as 'Phase One.' After you've suggested and justied your ve suggested instructions, please build at least the nine above-mentioned operations as blocks in Logisim.

Answers

The five additional instructions for the 8-bit ALU are:

Bitwise XOR - For logical operations on binary data.Clear register - To reset a register's value to zero.Load immediate - For loading a constant value into a register directly.Rotate left - Shifts bits to the left and wraps them around.Rotate right - Shifts bits to the right and wraps them around.

Here are five additional instructions that can be implemented in the 8-bit ALU, along with their justifications:

Bitwise XOR (exclusive OR): This instruction is important for performing logical operations on binary data. XOR allows for toggling or flipping specific bits, which is useful in various applications such as data encryption and error detection.Clear register: The clear register instruction resets the value of a register to zero. This is valuable for initializing registers before performing calculations or clearing data when needed, ensuring accurate and predictable results.Load immediate: This instruction enables loading a constant value directly into a register. It eliminates the need for multiple instructions to load immediate values, improving efficiency and reducing program sizeRotate left: The rotate left instruction shifts the bits of a register to the left, moving the leftmost bit to the rightmost position and wrapping the shifted bits around. This operation is beneficial for circular shifting and bitwise rotation in various algorithms and data processing tasks.Rotate right: Similar to the rotate left instruction, rotate right shifts the bits of a register to the right, wrapping the shifted bits from the rightmost position to the leftmost position. This operation is valuable for symmetric bit manipulation and circular shifting.

Implementing these additional instructions enhances the ALU's functionality by providing more operations for data manipulation, initialization, and bitwise rotation, expanding its capabilities in various computational tasks.

For more such question on ALU

https://brainly.com/question/7994884

#SPJ8

Explain whether you think that algorithms should be protected under copyright law, and therefore whether it is possible to ‘steal' them?

Answers

Answer:

no no and no you cant steal them

Explanation:

Other Questions
in the checklist of document evaluation criteria, format refers to whether a documents layout helps guide the reader and whether format elements are used consistently. I WILL GIVE OUT BRAINLIST!!!!!! The 5000 that invested in Fund A returned a 3% profit. The amount that invested in Fund B returned a 10% profit. How much did she invest in Fund B, if both funds together returned a 5% profit? I need help with 53 1.2 And 2.1 82 _ What does the man with the red eyes want to do to the children?(Pls help Ill give 11 points) Thabo opens an investment account and invest an amount of money at 8. 00% interest per year, compounded monthly. After a number of years, he has accumulated an amount of R 7 365. 00 in the account. The investment earned R2 000. 00 interest in this period. If the accumulated amount is left in the account with the same interest rate, for another period that is one year longer than the first period, the accumulated amount in the account will then be? If youre are doing a gift exchange, and everyone has to spend at least 10 dollars but less than 20 dollars, what inequality represents the situation? A. 10 > x > 20B. 10 x < 20C. 10 x 20D. 10 < x < 20 Which verb form best completes Ritas advice to her friend? Rita: No _______ tu nmero de telfono a los desconocidos por el internet!A. darB. darlesC. desD. da Priya takes out a loan from the Deep Bay Bank for $30,000 to buy a new Prius. The interest rate changed is j26 = 7.54% p.a. The loan is to be repaid over 4 years with the first payment due in a fortnights time. The terms of the loan are that it is an interest only loan for the first year (first 26 payments), at which time it converts to a fully amortized P&I loan.1. ANSWER IN THE FORMAT "$XX.XX". The size of each fortnightly payment during the first year to two decimal places is:2. ANSWER IN THE FORMAT "$XX,XXX.XX". The outstanding principle after the 26th payment is:3. ANSWER IN THE FORMAT "$XXX.XX". The fortnightly payment size during the P&I phase of the loan is: Which table is a nonlinear function? Union Corp. uses the retail method of inventory valuation. The following information is available:Beginning inventoryCost : $12,000 Retail $30,000PurchasesCost: 60,000 Retail 110,000Net additional markups Retail: 10,000Sales revenueRetail: 90,000If the lower of cost market rule is disregarded, what would be the estimated cost of the ending inventory?A. $20,000 B. $19,200 C. $20,800 D. $22,000 Caroline has a unique pet chimpanzee that is relatively likely to have twins. Each pregnancy is independent, and Caroline's chimpanzee has a 60% chance of having 1 baby and a 40% chance of having 2 babies eachpregnancyIf X is a random variable that represents the total number of chimpanzee babies if Caroline's chimpanzee getspregnant twice, drag the bars to graph the probability distribution for all possible values of X. What is the hydrosphere composed of? question 6 options: all the minerals on the earth all the air molecules on the earth all the water on or surrounding the earth all the life living on the earth FIRST TO ANSWER GETS 30 POINTSClassify the following as physical, biological, applied science1. Chemistry 7. Parasitology2. Zoology 8. Volcanology3. Engineering 9. Genetics4. Metallurgy 10. Pasteurization5. Medicine 11. Aviation6. Microbiology 12. Bacteriology which of the following is not equivalent to 1 atm pressure? a. 101.325 kpa b. 760 mm hg c. 10 cm hg d. 14.7 psi e. 760 torr US HISTORY WILL GIVE 60 POINTS!!!Use the passage to answer the question. Based only on the passage, what was the Lincoln's primary purpose for the Emancipation Proclamation? A. to save the Union B. to defeat the Confederacy C. to keep European powers out of the war D. to destroy slavery What was decided by the Great Compromise? Select the two correct answers. A. how many houses of Congress the government would include B. how enslaved people would be counted in the population of each state C. how the national government would be funded D. how to keep government from disregarding individual rights E. how states would be represented in CongressWhat happened in the South as a result of John Browns raid at Harpers Ferry? Select the two correct answers. A. Support for slavery decreased among wealthy landowners. B. Support grew for secession from the Union. C. Slave owners regarded Brown as a hero. D. States passed laws to prevent rebellions by enslaved people. E. Slave owners elected Republicans to prevent bloodshed.What does the image illustrate in terms of how strategies of the Union and Confederacy differed?A. The image shows that General Lee took a more offensive tactic by surrounding sea ports. B. The image shows that General Grant took a more offensive attack-and-strike strategy. C. The image shows the pressure General Grant put on the Union. D. The image shows that General Lee sought to control areas around the Mississippi. The points d ( 5 , 5 ) , e ( 7 , 3 ) , f ( 1 , 5 ) and G(3,3) form quadrilateral DEFG. Plot the points then click the "Graph Quadrilateral" button. What is an example of positive work?O A fleeing princess is lowered on a rope.O A pitcher throws a baseball.A skydivers parachute opens.O A catcher catches a baseball. Which steps can be used to solve for the value of y ? 23(y+57)=178 Please helpppp!!!Find any solution(s) of [tex]x=\frac{2}{x+1}[/tex] and select the correct statement.The equation has no solution.The equation has two solutions.The equation has one solution.The equation has one solution and one extraneous solution.