how would as6 tell the world that it prefers receiving traffic for the upper half of its address space only via the c-y link, unless of course it is broken?

Answers

Answer 1

The main answer to your question is that AS6 can use a routing protocol such as BGP to advertise to its neighboring Autonomous Systems (ASes) that it prefers to receive traffic for the upper half of its address space only via the c-y link. This can be achieved by setting a higher preference or metric for routes received from other links.

Furthermore, AS6 can also configure its border routers to filter incoming traffic from other links for the upper half of its address space, except for the c-y link. This can be done using Access Control Lists (ACLs) or prefix-lists.

In case the c-y link is broken, AS6 can use BGP to advertise to its neighboring ASes that it is no longer preferring traffic via that link. The other links can be configured with lower preference or metric to ensure traffic flows through the c-y link when it is operational again.

In conclusion, AS6 can use BGP and network filtering techniques to prefer receiving traffic for the upper half of its address space only via the c-y link and ensure proper traffic flow in case of link failures.
Hi! I'm happy to help you with your question.

Main answer: To inform the world that AS6 prefers receiving traffic for the upper half of its address space only via the C-Y link, it would use BGP (Border Gateway Protocol) with selective route advertisement and path prepending.

Explanation:
1. AS6 would configure its BGP routers to only advertise the upper half of its address space to the C-Y link's neighboring autonomous system.
2. AS6 would prepend its own AS number multiple times to the AS_PATH attribute for the upper half of its address space. This makes the path via C-Y appear longer and therefore more preferable, directing incoming traffic to use this link.
3. If the C-Y link is broken, BGP will automatically detect the failure and stop advertising the route. Traffic will then be rerouted using alternative paths available.

Conclusion: AS6 can control its preferred traffic flow for the upper half of its address space by using BGP route advertisement and path prepending, ensuring that traffic is primarily received via the C-Y link unless it is broken.


Related Questions

Select the correct answers.
Which are the benefits of leveraging web technologies?
processing of large amounts of data
more manpower
better marketing and customer service
increased production costs
difficulty in handling customer complaints

Select the correct answers.Which are the benefits of leveraging web technologies?processing of large

Answers

Answer:

Explanation:

Select the correct answers.

Which are the benefits of leveraging web technologies?

1) Processing of large amounts of data

2) Better marketing and customer service

Think of an active scene in a 3D game you recently enjoyed. Explain how at least 3 of the 12 Disney principles of animation were used in that scene to increase immersion.

Answers

Answer:

One of the 3D games I recently enjoyed is "The Legend of Zelda: Breath of the Wild". One of the active scenes in this game that stands out to me is when the player character, Link, is running and jumping across a large gap to reach a high platform. Here are three Disney principles of animation that were used in this scene to increase immersion:

Anticipation: Before Link jumps, he crouches down and his body language suggests that he is preparing for the jump. This creates a sense of anticipation and builds tension, making the player feel more engaged in the action.

Follow-through and overlapping action: After Link jumps, his body continues to move in the direction of the jump even after he lands. This creates a follow-through action that makes the jump feel more realistic. Additionally, his arms and legs move slightly out of sync with each other, which creates overlapping action that gives the animation a more natural look.

Exaggeration: Link's jump is exaggerated in the game, making him soar through the air with a sense of weightlessness. This exaggeration adds to the feeling of excitement and thrill that the player experiences during the jump. Additionally, the wind effect on Link's clothing and hair is also exaggerated, which adds to the sense of motion and immersion in the scene.

By using these Disney principles of animation, the game developers were able to make the jump scene in "The Legend of Zelda: Breath of the Wild" feel more engaging and immersive, making the player feel like they are really experiencing the action

what are the advantages of customer relationship managment​

Answers

Answer:

Enhances Better Customer Service.

Facilitates discovery of new customers.

Increases customer revenues.

Helps the sales team in closing deals faster.

Enhances effective cross and up-selling of products.

Simplifies the sales and marketing processes.

Makes call centers more efficient.

Enhances customer loyalty.

So, my mom was trying to unlock her old iPhone 7, and it said connect to iTunes, and so I did, following a tutorial, but when I opened the phone again, it said in white letters:iPhone is disabled, connect to iTunes. Now, It cant even go into recovery mode(Volume down and side button on iPhone 7). Unfortunately, because it is quite old, its not on the Find My app, and I don't know any other way to fix it. Can anyone help me?

Answers

Answer:

i would either go to the apple store, or try connecting it to your computer

Explanation:

Answer:

You can either call or go to your nearest apple store, or hit a hard reset on your iphone. I suggest going to their website for help because the iphone is an older model.

Please mark me as brainliest if this works for you.

Hope this helps! :)

what type of keys do you need to use to create a relational database model?

Answers

To create a relational database model, you need to use certain types of keys that help establish relationships between the tables in the database. These keys are known as primary keys, foreign keys, and candidate keys.

A primary key is a unique identifier that is assigned to each row in a table. This key is used to establish relationships between tables and ensures that each row in a table can be identified and accessed easily.A foreign key is a field in a table that refers to the primary key in another table. It is used to create relationships between tables and helps to maintain data integrity by ensuring that the data in the tables remains consistent.A candidate key is a unique key that could be used as a primary key in a table. It is an alternative key that can be used instead of the primary key and ensures that each row in a table can be uniquely identified.In summary, to create a relational database model, you need to use primary keys, foreign keys, and candidate keys. These keys help establish relationships between tables and ensure that the data in the database remains consistent and accurate.

For more such question on accessed

https://brainly.com/question/13118068

#SPJ11

Consider the following code:

start = int(input("Enter the starting number: "))
stop = int(input("Enter the ending number: "))

x = 3
sum = 0
for i in range (start, stop, x):
sum = sum + i

print (sum)
What is output if the user enters 10 then 15?

Group of answer choices

10

15

23

39

Answers

Answer:

23

Explanation:

The user is prompted to enter the starting number and ending number, which in this case are 10 and 15 respectively. The variable x is assigned the value of 3. The variable sum is initialized to 0. The for loop is executed, with the loop variable i taking on the values start, start+x, start+2x, and so on, up to but not including stop. In this case, the loop variable i will take on the values 10, 13, and 16 (since start is 10, and x is 3). The loop will not include 15 because it is the stopping point and not included. The statement sum = sum + i adds each value of i to the sum variable on each iteration of the loop. After the loop has completed, the value of sum (which is 10 + 13 = 23) is printed. So the correct answer is 23.

10. A loop statement is given as:
for(i=10;i<10;i++)
{
Statement
}
For how many times will the given loop statement be executed:
(a) none
(b) 1 time
(c) 10 times (d) infinite​

Answers

Answer: a. None

Explanation:

The loop will not run as the condition always returns false.

i=10 and the condition given: i<10 which is false always. So, the loop will not run.

Within a word processing program, predesigned files that have layout and some page elements already completed are called
text boxes
templates.
frames
typography

Answers

Answer:

I think it's B) templates

     

                   Sorry if it's wrong I'm not sure!!

Explanation:

Within a word processing program, predesigned files that have layout and some page elements already completed are called: B. templates.

In Computers and Technology, word processor can be defined as a processing software program that is typically designed for typing and formatting text-based documents. Thus, it is an application software that avail end users the ability to type, format and save text-based documents such as .docx, .txt, and .doc files.

A template refers to a predesigned file or sample in which some of its page elements and layout have already completed by the software developer.

In this context, predesigned files in a word processing program, that have layout and some page elements already completed by the software developer is referred to as a template.

Read more on template here: https://brainly.com/question/13859569

when a picture is downloaded off the internet and then posted to social media, can the social media platform tell it was downloaded off the internet

Answers

short answer yes. kinda long answer people can scan the photo and easily see or they can just look up the same image

Sora is preparing a presentation describing policies included in President Lyndon Johnson’s "Great Society” and wants to use a relevant online source.


Which source is the most relevant for the presentation?


a]-an interview with history students about the “Great Society”


b]-a photograph of Johnson making his “Great Society” speech


c]-a chart describing the conditions that led to the “Great Society”


d]-an audio recording of Johnson’s “Great Society” speech

Answers

Answer:

Option d) is correct

Explanation:

To prepare a presentation describing policies included in President Lyndon Johnson’s "Great Society”, the most relevant source that Sora should use is an audio recording of Johnson’s “Great Society” speech.

An audio recording of Johnson’s “Great Society” speech can give a more proper clarification and information regarding policies included in President Lyndon Johnson’s "Great Society”.

So,

Option d) is correct

Answer:

the answer is D

Explanation:

I just took the quiz :)

Raul is a 13-year-old teenager interested in taking up photography as a new hobby. His dad wants to buy him a camera for his birthday that will be easy to use and simple enough for a beginner, meaning that Raul won’t have to mess with any settings if he doesn’t want to. What type of camera might be a good starter camera for his teen aged son?

a. point and shoot
b. hybrid
c. DSLR
d. format field camera

Answers

Answer:

c. DSLR can be good camera for the teenager son or any beginner photographer

Answer:

Point and shoot

Explanation:

With a point and shoot camera, all you literally do is point and shoot. It is a very simple camera with no buttons and the lens don't move. Is it the perfect camera for a beginner.

If you need anything in the interim, please contact my assistant"
What can the reader most likely infer from the fact that the author referred to George Washington as ""the Union's 'great political cement'"" in the passage?

Answers

If you require any assistance during the Interim period, please do not hesitate to get in touch with my assistant. They are highly capable and will gladly provide you with the necessary support or information.

To contact my assistant, you can use any of the following methods:
1. Email: Send a detailed message with your query to my assistant's email address, and they will promptly respond to your concerns.
2. Phone: Call my assistant at their dedicated contact number during working hours to discuss your needs directly.
3. In-person meeting: If you prefer face-to-face communication, you can schedule an appointment with my assistant at a mutually convenient time.
Please remember to clearly outline the nature of your inquiry, so my assistant can address your concerns efficiently. They are well-versed in managing various tasks and are always ready to help.

To Learn More About Interim

https://brainly.com/question/8015443

#SPJ11

starting at vertex f, use prim's algorithm to find the minimum spanning tree. what are the 4 nodes added to the tree after node f?

Answers

16 spanning trees can be created from a complete network with 4 vertices using prim's approach to determine the smallest spanning tree.

How many spanning trees can there be in a graph?

When a network has n vertices and is considered complete, the total number of spanning trees is equal to n(n-2) where n is the total number of nodes in the graph.

How many different graphs are possible with four nodes?

There are only two realizations that are isomorphic, hence the solution is straightforward. They have a size of two automorphism groups (they are symmetric to reflection, see also IGBlissAutomorphismCount ). Accordingly, only 4! / 2 = 12 of the 4! = 24 permutations of vertices result in distinctive labelled graphs.

To know more about spanning trees visit :-

https://brainly.com/question/13148966

#SPJ4

PHOTOGRAPHY: In 200 words or more explain the difference between deep and shallow depth field and when would you use either technique when taking a photograph?

Answers

The differences are:

A shallow depth of field is said to be a small area in view and its background is always blurred but a A deep depth of field is known to be one that captures a bigger area in view and its image are said to be sharp and clear.

What is the difference between deep and shallow focus?

The Images gotten in shallow focus is one that needs little or shallow depths of field, and its lenses also needs long focal lengths, and big apertures. But Deep focus images needs small focal lengths and long  depths of field.

In the case above i recommend deep depth field and therefore, The differences are:

A shallow depth of field is said to be a small area in view and its background is always blurred but a A deep depth of field is known to be one that captures a bigger area in view and its image are said to be sharp and clear.

Learn more about photograph from

https://brainly.com/question/13600227

#SPJ1

Which normalized form introduces the concept of enforcing primary keys and removing composite columns

Answers

The First Normal Form (1NF) is the first step in organizing and structuring data in a relational database. It introduces the concept of enforcing primary keys and removing composite columns.

Here,

Enforcing primary keys means that each table in the database must have a unique identifier for each row, known as the primary key. This primary key ensures that each row in the table can be uniquely identified and accessed.

It is typically a single column, but it can also be a combination of columns.

By enforcing primary keys, we eliminate data redundancy and improve data consistency. Redundancy occurs when the same data is repeated in multiple places, which can lead to inconsistencies and anomalies in the database.

With primary keys, we ensure that each piece of data is stored only once and can be easily accessed and updated without duplication.

Additionally, 1NF also involves removing composite columns. A composite column is a column that contains multiple attributes or pieces of data within a single field.

Know more about 1NF,

https://brainly.com/question/32284517

#SPJ4

Complete question :

Which normalized form introduces the concept of enforcing primary keys and removing composite columns?

How does accenture work to build trust in artificial intelligence (ai)?

by assuming control of a client's data collection

by promoting explainable and responsible al

by investing in differentiated intellectual property

by combining al with analytics and business logic

i don't know this yet.

Answers

Accenture strives to boost public confidence in artificial intelligence by investing in unique copyrighted material.

What exactly do you understand by data gathering?

To answer specified research questions, test hypotheses, and assess results, data collection is the act of acquiring and measuring measuring information on targeted variables in a systematic and defined manner.

What are the definitions and categories of data collection?

A paper questionnaire or a system for computer-assisted interviews are examples of the types of tools/devices that are used to collect data and are referred to as "data gathering tools." Case studies, checklists, interviews, sporadic observation, surveys, and surveys are some of the instruments used to collect data.

To know more about data collection visit:

https://brainly.com/question/21605027

#SPJ4

Excel's random number generator was usad to draw a number between 1 and 10 at random 100 times. Note: The command is =randbetween (1,10). Your values will change each time you save or change something an the spreadsheet, and if someone else opens the spreadsheet. To lock them in, copy them and "paste values" somewhere else. You don' need to use this here. How many times would you expect the number 1 to show up? How many times did it show up? How many times would you expect the number 10 to show up? How many times did it show up? How many times would you expect the number 5 to show up? How many times did it show up? Which number showed up the most? How many times did it show up? How far above the amount you expected is that?

Answers

Excel 's random number generator was used to draw a number between 1 and 10 at random 100 times. the formula: Number of times an event is expected to happen = (number of times the experiment is run) x (probability of the event occurring).

Since each number has an equal chance of appearing in this case, each number will be expected to show up 10 times. Therefore, we would expect the number 1 to show up 10 times. Similarly, we would expect the number 10 to show up 10 times and the number 5 to show up 10 times.We have to first run the command =randbetween (1,10) to get 100 different random numbers between 1 to 10. Then we have to count how many times each number between 1 to 10 has appeared.

The table below shows the frequency of each number:|Number|Number of times appeared|Expected number of times|Difference||---|---|---|---Hence, we can conclude that the number 1 showed up 5 more times than expected, the number 5 showed up 3 less times than expected, and the number 8 showed up 4 less times than expected. The number that showed up the most was 1, which showed up 15 times. This is 5 more than expected.

To know more Excel visit:

https://brainly.com/question/3441128

#SPJ11

How do you add a new comment to a document?
A. Choose the References tab, then New Comment.
B. Choose the Layout tab, then Insert Comment.
C. Choose the File tab, then New Comment.
D. Choose the Review tab, then New Comment.

Answers

Answer:

D. Choose the Review tab, then New Comment

Explanation:

It's quite easy to add comments to word documents.

From the list of given options, only option D satisfy the given question.

To add comments to a text, you simply highlight the text

Go to the review tab then select new comment.

Once you follow these simple steps, a new comment will be created in your word document.

The correct answer is D. Choose the Review tab, then New Comment.

If you go to the review tab in Microsoft Word, the center there is a group labeled Comments. There's a large button on the left-hand side in that group labeled New Comment.

Hope this helps :)

3.19 lab: convert from seconds people find it easier to read time in hours, minutes, and seconds rather than just seconds. write a program that reads in seconds as input, and outputs the time in hours, minutes, and seconds. ex: if the input is: 4000 the output is: hours: 1 minutes: 6 seconds: 40

Answers

Calculate the seconds, subtract the corresponding seconds in hours and minutes you previously found, the remaining is the seconds you have

Print the hours, minutes, and seconds

seconds = int(input("Enter time in seconds: "))

hours = int(seconds / 3600)

minutes = int((seconds - (hours * 3600)) / 60)

seconds = seconds - ((hours * 3600) + (minutes * 60))

print("{} hour(s) {} minute(s) {} second(s)".format(hours, minutes, seconds))

*The code is in Python.

Ask the user to enter the time in seconds

Calculate the hours, divide the seconds by 3600 and cast it to the integer

Calculate the minutes, subtract the corresponding seconds in hours you previously found, divide it by 60 and cast the result to the integer

Calculate the seconds, subtract the corresponding seconds in hours and minutes you previously found, the remaining is the seconds you have

Print the hours, minutes, and seconds

Learn more about print here-

https://brainly.com/question/14668983

#SPJ4

You are now going to prepare some reports for the company. Measurements are in metres and volume
n cubic metres. Prices are per cubic metre. Mako sure al currency values are displayed with 2 decimal
places
20 -
Using a suitable database package, import the file M2017BOARDS.CSV
Use these field names and data types:
Field Name Data Type Description/Specification
Board ID
Text
This is a unique identification for each board
Tree_ID
Text
This code identifies the type of tree
Thickness
Numeric
Width
Numeric
Numeric
Length
Drying
Text
Ready
Sold
Boolean/Logical Display as Yes/No or checkbox
Boolean/Logical Display as Yes/No or checkbox
Numeric/Currency Currency of your choice
Price
.
Set the Board_ID field as the primary key.
[3]
Import the file M2017TREES.CSV into your database as a new table with appropriate data
types. Set the Tree_ID field as the primary key.
121
21.
12.
Examine the file M2017LOCATIONS.CSV and decide on appropriate data types for each field
Import the file M2017LOCATIONS.CSV into your database as a new table with appropriate
data types. Set the Location_code field as the primary key.
121
EVIDENCE 4
Place in your Evidence document screenshot(s) showing the field names and data
types used in each of the three tables.
23
Create one-to-many relationships as links between the three tables.
Use the Tree_ID field in the Trees table to link to the Tree_ID field in the Boards table, and
the Location_code field in the Locations table to link to the Location_code field in the Trees
table.
EVIDENCE 5
Place in your Evidence document screenshot(s) showing the relationships between
the three tables.

Answers

if you follow me and like and mark in brainliest answer only I will tell the answer

How do I fix Java Lang StackOverflowError?

Answers

Answer:

A StackOverflowError in Java is usually caused by a recursive method that calls itself indefinitely or by an excessively deep call stack.

Explanation:

To fix this error, you can try the following:

Check your code for any recursive calls that may be causing the error and modify them to avoid infinite recursion.Increase the stack size of your JVM by adding the "-Xss" option when running your application. For example, you can use the command "java -Xss2m MyClass" to increase the stack size to 2MB.Simplify your code or optimize it to reduce the depth of the call stack.If none of the above solutions work, you may need to consider refactoring your code or using a different approach to solve the problem.

what windows cli command can be used to change a local user password?

Answers

Answer:

net user

Explanation:

Use the Net User Command to Change a Windows Password but you must have admin right to that PC

The CLI command used for 'net user'.

To change a local user password using the Windows command-line interface (CLI), you can utilize the net user command.

Here's how you can do it:

Open the command prompt: Press the Windows key, type "cmd," and hit Enter. This will open the Command Prompt window.

Type the following command and press Enter:

net user username newpassword

Replace "username" with the actual username of the user account for which you want to change the password.

Replace "newpassword" with the desired new password for that user.

For example, if you want to change the password for a user named "John" and set the new password as "MyNewPassword," the command would be:

net user John MyNewPassword

If the operation is successful, you will see a message stating, "The command completed successfully." This indicates that the password has been changed.

It's important to note that changing a user's password from the command line typically requires administrative privileges.

Therefore, you may need to run the Command Prompt as an administrator by right-clicking on the Command Prompt icon and selecting "Run as administrator."

Hence the CLI command used for 'net user'.

Learn more about Windows click;

https://brainly.com/question/33363536

#SPJ2

who loves juice wld as much as i do?

Answers

Answer:

ehhh he was ok

Explanation:

Answer:abc

Explanation:

Create a flowchart that will accept 10 whole numbers one at a time and print the highest and the lowest. Use Switch.

Answers

I will create a sequence of steps that would accept 10 whole numbers one at a time and print the highest and the lowest in Java:

Import javax.swing.JOptionPane;

public class loop_exer2 {

public static void main(String agrs[])

{ String input; int trial=10, sc=0, h=0, l=0, test=0;

System.out.print("Scores: ");

for (int ctr=1;ctr<=10;ctr ) {

input=JOptionPane.showInputDialog("Enter the Scores [" trial "] trials "); sc=Integer.valueOf(input); System.out.print(sc ", ");

if(test==0){h=sc;l=sc;test=1;}

if(sc>h){h=sc;}

else if(sc>h){

h=sc; {

else if(sc<1) {

l=sc;

}

JOptionPane.showMessageDialog (null, "Highest score is:" h "Lowest score is:" l);
System.out.println();

System.out.println ("Highest score is: " h);

System.out.println ( "Lowest score is: "l);

}

}

What is a Flowchart?

This refers to a diagram which is used to represent the various steps which a system uses to create a step by step solution.

From the above code, there is the command to accept whole numbers in String and then request for them one at a time and after the computation, display the highest and lowest numbers.

Read more about flowcharts here:
https://brainly.com/question/6532130

True or False: Cross-functional teams are optimized to work on one technical layer of a system only (e.g. GUI, database, middle tier, interfaces).

Answers

The statement that “Cross-functional teams are optimized to work on one technical layer of a system only (e.g. GUI, database, middle tier, interfaces)” is FALSE.

Cross-functional teams are optimized to work across multiple technical layers of a system. In cross-functional teams, team members with diverse skill sets collaborate to tackle complex projects, and the team has members from multiple technical layers of the system who work together to achieve common goals.

It includes individuals with different technical and functional skillsets working together to accomplish a common goal.Cross-functional teams work together in a collaborative effort that promotes skill sharing, expertise, and experience to enable innovation, progress, and overall team success.

Learn more about cross-functional teams at:

https://brainly.com/question/31625757

#SPJ11

What is the primary way that social networks work? Multiple Choice providing a security system for communication online connecting people by matching profile information helping grow website traffic by viral advertisements charging users each time they use the service

Answers

Answer:

Providing a security system for communication online.

Explanation:

Social Networks are built to provide a platform for people to connect online.

The primary way that social networks work is by connecting people by matching profile information.

Social networks are online platforms that allow individuals to connect and interact with others through virtual communities. These platforms provide users with tools and features to create personal profiles, share information, communicate, and engage with others who have similar interests, backgrounds, or affiliations.

Social networks enable users to share content such as photos, videos, and status updates, and they facilitate communication through messaging systems, comments, and likes.

Therefore, The primary way that social networks work is by connecting people by matching profile information.

Learn more about social networks on:

https://brainly.com/question/3158119

#SPJ6

Plant Roots are strong enough to break rock.


False


True

Answers

Answer:

True

Explanation:

Plants and animals can be agents of mechanical weathering. The seed of a tree may sprout in soil that has collected in a cracked rock. As the roots grow, they widen the cracks, eventually breaking the rock into pieces.

the discipline of building hardware architectures, operating systems, and specialized algorithms for running a program on a cluster of processors is known by what term?question 29 options:multi-computingresource sharingprocess distributingparallel computing

Answers

The discipline of building hardware architectures, operating systems, and specialized algorithms for running a program on a cluster of processors is commonly known as parallel computing.

Parallel computing involves dividing a large task into smaller sub-tasks that can be processed simultaneously on multiple processors, resulting in faster and more efficient processing times. This type of computing requires specialized hardware architectures, such as multi-core processors and high-speed interconnects, as well as operating systems and software that can manage the distribution of tasks across the processors. Additionally, parallel computing often involves resource sharing and process distributing, which allows multiple users and programs to access and utilize the same resources simultaneously. Overall, parallel computing has become increasingly important in fields such as scientific computing, data analysis, and machine learning, as it allows for faster and more efficient processing of complex tasks.

Learn more about parallel computing here:

https://brainly.com/question/30189640

#SPJ11

HELP PLEASE 50 POINTS

HELP PLEASE 50 POINTS

Answers

Answer:

do u know the muffin man

Explanation:

Answer:dk this old anyways

Explanation:tyftp

if ordertotal has a value of 50 and quantity has a value of 10, what is the value of discount after these statements are executed? if (quantity

Answers

In order to answer this question, we need to know what the statements following "if (quantity" are. Without knowing the full condition and subsequent action in the if statement, it is not possible to determine the value of discount.

Please provide the full code for us to accurately answer your question.

In general, if statements are used to execute a specific action or set of actions when a certain condition is met. The condition is typically a comparison of two values, and the action is a statement or set of statements that are executed when the condition is true.

For example, if we have the following if statement:

if (quantity > 5) {
 discount = ordertotal * 0.1;
}

This would set the value of discount to 10% of the ordertotal if the quantity is greater than 5. However, without knowing the full if statement in your question, we cannot accurately determine the value of discount.

Learn more about programming: https://brainly.com/question/26134656

#SPJ11

Other Questions
I need help with this one the rectus femoris is one of the major muscles in the quads. these muscles are used for large movements like squats, deadlifts, and drop kicking. would its muscles be considered small motor neurons or large motor neurons? I have to show my work using the LCM strategy or fraction models. what is the value of the function f(x)=1/4s-3 when x=12 A particular load has a power factor of 0.70 lagging. The average power delivered to the load is 55 KW from a 480 Vrms, 60Hz line. A capacitor is placed in parallel with the load to raise the power factor to 0.90 lagging. a) What is the value of Gold? b) What is the value of Qrew? c) What is the value of the capacitor? Find the indefinite integral. (Use C for the constant of integration.) tan(2x)(sec(2x))2dx Annie is touring Europe for the summer and is traveling by train from Paris, France to Brussels, Belgium. The distance between the two cities is about 195 miles. If she takes the train, which travels an average of 150.0 km/hr, how long, in hours, will the train trip take? (1 km = 0.62 mi) Due in 5 mins!!!! Pls hurryWhich of the following would be the best example of potential energy?A racecar moving at 120 miles per hour around a track.a bullet shot out of a guna rollercoaster at the bottom of the first hilla rubber band stretched to its fullest length right before someone lets it go Which statement about DNA replication is FALSE?A). Because the two strands of parental DNA run in opposite directions, the new strands must be made in different ways.B). The lagging strand is made of a series of pieces that must be joined together to make a continuous strand.C). DNA polymerase builds a new strand by adding DNA nucleotides one at a time.D). DNA ligase adds nucleotides to the lagging strand.E). The two strands of parental DNA are separated during DNA replication. (20 points total) A person living with type 1 diabetes has self-injected their morning dose of insulin. Under these conditions for the liver: a. describe the status (i.e., enzyme activity increases or Question 3: Complex numbers (10 marks) a. Which of the following is a definition of the modulus of a complex number z? A. The real part of z.B. The distance between z and the origin in the Argand plane. C. The result of turning each imaginary part of a negative. D. The angle between the x-axis and the line from the origin to z. (1 mark) Using the finite difference method, find the numerical solution of the heat equation: Utt + 2ut = uxx, x 0x , t>0. A guitar effects pedal enthusiast is going to a gear convention where people sometimes break out their own custom pedals to show off or trade. She has 5 different pedals she's thinking about packing with her, but she's not sure whether she should bring all of them, some of them, or none of them. How many different ways are there for her to decide whether and how many pedals to pack? Use subsets to help you figure this out, and write your answer as a whole number. deals are most commonly used as a sales promotion for which two reasons? 1. Evaluate the composition of the Board of Directors in Bell Pottinger, based on best practices in corporate governance. (Will give brainiest to whoever answers correctly)PLEASE this is do tomorrow and I don't know how to do it, also explain step by step how you got your answer The risk-free rate is 1.84% and the market risk premium is 5.13%. A stock with a B of 1.13 just paid a dividend of $2.07. The dividend is expected to grow at 20.20% for three years and then grow at 3.04% forever. What is the value of the stock? In 1969, Apollo 11 landed on the Moon. It took four days for the spacecraft to travel from Earth to the Moon. In 2006, New Horizons left Earth and reached Pluto in 2015. Based on this information, what is the most reasonable estimate for a spacecraft to travel from Earth to Mars? Find (f g)(0). *f(x) = 5x 4g(x) = x^2 1O A.3OB. -9O c.-4O D.-17 felicia is a network engineer deploying a virtual private network (vpn) solution. the vpn operates using secure shell (ssh). when asked by a new helpdesk tech about which layer of the osi model it employs, how does felicia answer?