which statement describes a characteristic of standard ipv4 acls

Answers

Answer 1

A characteristic of standard IPv4 ACLs (Access Control Lists) is that they filter network traffic based on source IP addresses only.Standard IPv4 ACLs are used to control network traffic based on the source IP address of the packets.

They can be configured on routers or network devices to permit or deny traffic based on the source IP address of the packets. Standard ACLs do not consider destination IP addresses, protocols, port numbers, or other factors when filtering traffic.Here are some key characteristics of standard IPv4 ACLs:Filtering based on Source IP Address: Standard ACLs allow you to specify specific source IP addresses or ranges to permit or deny traffic.Applied on Ingress Interfaces: Standard ACLs are typically applied on the inbound direction of the interface, controlling the traffic entering the network.Sequential Order: Standard ACLs are evaluated in sequential order, from top to bottom, until a match is found. Once a match is found, the corresponding permit or deny action is applied, and the evaluation stops.

To know more about filter click the link below:

brainly.com/question/13260440

#SPJ11

Answer 2
Final answer:

Standard IPv4 ACL is used to filter network traffic based on source and destination IP addresses, protocols, and port numbers. They can allow or block specific traffic.

Explanation:

A characteristic of standard IPv4 ACLs is they are applied to traffic as it enters or exits an interface. They are used to filter network traffic based on source and destination IP addresses, protocols, and port numbers. Standard IPv4 ACLs can be configured with permit or deny statements to allow or block specific traffic.

For example, a standard IPv4 ACL can be used to block all traffic from a specific IP address or to allow only certain types of traffic from a specific network.

Learn more about Standard IPv4 ACLs here:

https://brainly.com/question/32374322

#SPJ11


Related Questions

What is an example of a manufactured product ?
A. A shirt purchased at a store
B. Cotton in a field
C. Wood on a sheep’s back
D. Silk made from a worm

Answers

A shirt purchased in a store

Answer:

A shirt purchased at a store

Explanation:

anybody wanna be friends?

Answers

i wouldn't mind......

yes Avacado?????????????????????

A professional photographer working for a top newspaper would like control over the quality and editing
process of digital photos. Which file format should be used on the digital camera to ensure the
photographer has this flexibility?
A. AI
B. JPEG
C. RAW
D. SVG

Answers

Answer:

RAW

Explanation:

raw usually gives you the best quality possible and its easy to go through the editing process with flexibility compared to the other options.

Answer: raw

Explanation: got a 100%

PLEASE HELP ME!!! I REALLY NEED YOU TO HELP ME NOW!!!! THANKS!

PLEASE ANSWER CORRECTLY!!!!!!!!!!!!! DONT ANSWER FOR THE POINTS!!!


In this project, you will plan and write a program to solve a math algorithm. You will identify possible errors and handle them in your program. Choosing Your Math Algorithm Think of a math question that takes several steps to solve. It should not be a math question already programmed in the unit. The question should require input from the user, process the information, and display the results. You can choose your own algorithm. It does not need to be one of these. Find the surface area of a cylinder. Find the surface area of a pyramid. Find the hypotenuse of a right triangle. Your Task Write a pseudocode plan for your program. Write the code for your program. Test your program. Run it at least three times with different inputs. Save your program as a .txt file for you cannot upload a .py file. Evaluate your project using this rubric. What to Submit Submit the .txt file holding your program.

Answers

Answer:

Surface of a Cylinder Code:

#import math package to use math.pi for the value of PI

import math

#take radius of the base of a cylinder from user

r=float(input("Enter r of a cylinder"))

#take height of the curve surface of a cylinder from user

h=float(input("Enter the Height of a cylinder"))

#calculate the surface area of cylinder

s_area=2*math.pi*pow(r,2)*h

#calculate the volume of cylinder

volume=math.pi*pow(r,2)*h

print("surface area of a cylinder wll be %.2f" %s_area)

print("volume of a cylinder will be %.2f" %volume)

Quadratic Equation Code:

import math

a = int(input("Enter the coefficients of a: "))

b = int(input("Enter the coefficients of b: "))

c = int(input("Enter the coefficients of c: "))

d = b**2-4*a*c # discriminant

if d < 0:

print ("This equation has no real solution")

elif d == 0:

x = (-b+math.sqrt(b**2-4*a*c))/2*a

print ("This equation has one solutions: "), x

else:

x1 = (-b+math.sqrt((b**2)-(4*(a*c))))/(2*a)

x2 = (-b-math.sqrt((b**2)-(4*(a*c))))/(2*a)

print ("This equation has two solutions: ", x1, " or", x2)

e. Which type of computers comes in briefcase style


Answers

Answer: Laptop computers.

Explanation: Laptops are the one type of computers that come in briefcase style.

What are the differences and similarities between a local area network (LAN) and a wide area network (WAN)?

As the different network types have evolved, careers in the Network Systems pathway have changed over time. Discuss an example of how network system careers have changed and how those changes have impacted society.

What is an Internet Service Provider? Describe at least two types of ISP connections.

Explain two ways that you can stay safe while working in the Network Systems career pathway.

There are many different careers available within the Network Systems career pathway, but they all have some similar characteristics. What are two of these characteristics?

Answers

Local Area Networks (LANs) and Wide Area Networks (WANs) differ in terms of scope, ownership, speed, cost, and security. LANs cover a smaller area, are privately owned, offer higher speeds and greater bandwidth, are cost-effective, and have more control over security.

The  differences and similarities between a local area network (LAN) and a wide area network (WAN)?

On the other hand, WANs span larger distances, involve multiple organizations, may have slower speeds and limited bandwidth, require more infrastructure and connectivity options, and carry higher security risks.

Network system careers have evolved with the rise of cloud computing and virtualization, shifting from traditional networking to managing virtual networks and cloud platforms. This change has enabled more flexible and scalable IT infrastructure, facilitated remote work and collaboration, and promoted the growth of cloud-based services, impacting society positively.

An Internet Service Provider (ISP) is a company that provides internet access. DSL utilizes telephone lines for connectivity, while cable internet uses coaxial cable TV infrastructure. Staying safe in the Network Systems career pathway involves implementing security measures like strong passwords and regular updates, as well as staying informed and educated about security threats and industry trends.

Characteristics of Network Systems careers include technical expertise in areas such as network protocols and troubleshooting, as well as the need for continuous learning and adaptability to keep up with evolving technologies and industry standards.

Read more on WLAN here https://brainly.com/question/27975067

#SPJ1

a way in which something is usually done within a particular area or activity

C _ D _ _ N _ _ _ _

Answers

Answer:

condom

Explanation:

because i cipy his answer hehe

Planning to finance higher education helps people prepare for their financial future because it teaches them about

Loans and interest
Savings and accounts
Filing taxes
Short term goals

Answers

Answer:

savings and account

Explanation:

because that will convince them

Answer:

Loans and Interests.

Explanation:

Edge

What would be a suitable device to transfer 12 photos from one PC to another?

Answers

Answer:

A memory stick.

Explanation:

A memory stick can be defined as a storage media device with flash memory. They are mainly used in smart or portable electronic devices such as mobile phones, digital cameras, mp3 players, camcorders, etc.

Memory sticks are usually small in size and as such are easily accessible for the transfer of digital files such as images, videos, audios from a portable device or computer to another device such as a computer.

Hence, a memory stick would be a suitable device to transfer 12 photos from one PC to another.

What is the best CPU you can put inside a Dell Precision T3500?

And what would be the best graphics card you could put with this CPU?

Answers

Answer:

Whatever fits

Explanation:

If an intel i9 or a Ryzen 9 fits, use that. 3090's are very big, so try adding a 3060-3080.

Hope this helps!

I don't understand any of this please try your best and help if you can.

I don't understand any of this please try your best and help if you can.

Answers

I don’t understand it either lol

Select the correct answer.
What needs to be defined throughout an animation sequence to define the start and end points of motion?

A frames
B. characters
C. key frames
D. movement

Answers

i think the answer is c

How to fix "files required to play gta online could not be downloaded"?

Answers

This error message typically appears when there is a problem with the files required to play Grand Theft Auto (GTA) Online on a computer or gaming console. Here are a few troubleshooting steps that may help fix the problem

Check your internet connection.Restart the game.Clear the cache.Check for updates.Check for server status.Reinstall the game.

Make sure your device is connected to the internet and that you have a stable connection. Close the game and restart it to see if that fixes the issue. Clear the cache on your console or computer to make sure that the game is using the most recent files. Make sure that you have the latest update for the game installed. Check the official Rockstar Games Social Club website to see if the servers are down for maintenance or experiencing technical issues. If none of the above steps work, try uninstalling and reinstalling the game. This will delete all the game files, but will also ensure that the game is running the latest version and that all files are present.

Learn more about fix problem, here https://brainly.com/question/20371101

#SPJ4

which of the following constitute some of the roles of use cases? question 41 options: all of the above able to use that interaction to more fully describe functional requirements use cases express and clarify user requirements. each use case describes how an external user triggers an event to which the system must respond. in event-driven modeling, everything in the system can be thought of as a response to some triggering event.

Answers

Use cases express and clarify user requirements. Each use case describes how an external user triggers an event to which the system must respond. The given statement constitute some of the roles of use cases.

What is a Use Case?

A use case is a type of diagram that depicts a set of steps that are executed by a system in order to accomplish a particular task or objective. They depict interactions between the system and the actors who use it, and they outline the desired results of those interactions. A use case should be created from the point of view of an external user who interacts with the system. It should be used to show the capabilities of the system, as well as how those capabilities may be employed to accomplish particular goals.

A use case is made up of several elements that work together to describe a particular aspect of the system. An actor is an external user who interacts with the system. The main flow is the simplest set of steps that a system follows to complete a specific job. The extensions are optional steps that may be included in the main flow. Preconditions are the conditions that must be met in order for a use case to be executed. Post-conditions are the conditions that must be met in order for a use case to be completed.

A use case is a scenario that describes the interactions between a system and its external actors. It should be written in such a way that it is clear what the system is supposed to do. In addition, it should be written in a way that is easy to read and understand.

Learn more about the Use Case:

https://brainly.com/question/12975184

#SPJ11

The tp sensor indicates the engine is idling but the map sensor indicates the engine is under a heavy load. this could cause a dtc to set for the ________. group of answer choices

Answers

This situation could cause a Diagnostic Trouble Code (DTC) to set for the "MAP/TPS Mismatch" or "MAP/TPS Inconsistency."

The TP sensor (Throttle Position sensor) is responsible for monitoring the position of the throttle plate, which indicates the throttle opening and the engine load. The MAP sensor (Manifold Absolute Pressure sensor) measures the intake manifold pressure, which correlates with the engine load as well.

If the TP sensor indicates that the engine is idling (throttle position is low) while the MAP sensor indicates a heavy load (high intake manifold pressure), it suggests a discrepancy or inconsistency between the two sensor readings. This could be caused by a malfunction or misalignment of either sensor, a problem with the wiring or connectors, or an issue with the engine control module (ECM) or its programming.

In response to this mismatch between the TP and MAP sensor readings, the ECM may detect the inconsistency and set a DTC related to the MAP/TPS mismatch, indicating a potential problem with the engine load sensing system.

Learn more about Diagnostic here

https://brainly.com/question/10249908

#SPJ11

Consider you are asked to decode a secret message. The coded message is in numbers and each number stands for a
specific letter. You discover enough of the secret code to decode the current message. So far, you know:
• 1 represents “D”
• 2 represents “W”
• 3 represents “E”
• 4 represents “L”
• 5 represents “H”
• 6 represents “O”
• 7 represents “R”
Write a program that prompts the user for 10 numbers, one at a time, and prints out the decoded message. If the user
enters a number that is not one of those already deciphered, prompt him/her for a new number. Test your code with the
following input: 5 3 4 4 6 2 6 7 4 1

WRITE IN THE PROGRAMMING LANGUAGE: JAVA

Answers

Here is an example of a program in Java that prompts the user for 10 numbers, one at a time, and prints out the decoded message based on the code you provided:

import java.util.Scanner;

public class DecodeMessage {

public static void main(String[] args) {

Scanner scanner = new Scanner(System.in);

// Create a mapping of numbers to letters

char[] letters = {'D', 'W', 'E', 'L', 'H', 'O', 'R'};

int[] numbers = {1, 2, 3, 4, 5, 6, 7};

// Prompt the user for 10 numbers

StringBuilder decodedMessage = new StringBuilder();

for (int i = 0; i < 10; i++) {

System.out.print("Enter a number: ");

int input = scanner.nextInt();

// Check if the input is a valid number

boolean valid = false;

for (int j = 0; j < numbers.length; j++) {

if (input == numbers[j]) {

decodedMessage.append(letters[j]);

valid = true;

break;

}

}

// If the input is not a valid number, prompt the user again

if (!valid) {

System.out.println("Invalid number. Please enter a valid number.");

i--;

}

}

// Print the decoded message

System.out.println("Decoded message: " + decodedMessage.toString());

}

}

This program uses a Scanner to prompt the user for input, a StringBuilder to construct the decoded message, and two arrays letters and numbers to store the mapping of letters and numbers. The program uses a for loop to prompt the user for 10 numbers, and inside the loop, it checks if the input is a valid number (by checking if it exists in the numbers array) and, if it is, it appends the corresponding letter to the decoded message. If the input is not a valid number, the program prints an error message and the loop iterates again, prompting the user for a new number. Finally, it prints the decoded message.

The test input you provided will output "HELHOR"

Can someone give me the code for the edhesive 3.7 code practice for python? Thanks. The first person to give a correct answer will get brainlyist.

Answers

Answer:

Try

568458

448952

123456

Also just keep hitting keys till u get it :)

Explanation:

Hope this helps u plz mark brainliest

Which of the following uses replication to Infect multiple computers?
Viruses
Trojan horse
Spyware
Worms​

Answers

Answer:

Trojan horse

Explanation:

mostly all the above mentioned use replication to infect computers but the one that uses replication to invest multiple computers at a time is Trojan horse.

hope it helps .

Answer:

trojan house

Explanation:

i just took the house

Digital citizenship focuses on _____. Select 3 options.

Answers

Respect, Education, and Protect.

Digital citizenship focuses on the following:

B. helping and leading others

C. targeting potential cyber criminals.

D. creating positive online experiences

What is digital citizenship?

The capacity to operate a keyboard, mouse, and other components of the digital system, as well as to interact with others online, is known as digital citizenship.

It also refers to learning how to behave with respect and decency on digital platforms, as well as how to communicate effectively online and build relationships.

The major goal of digital citizenship is to foster a pleasant environment by teaching others about cybercrime and bullying and raising their awareness of these issues.

Thus, the correct options are B. helping and leading others

C. targeting potential cyber criminals.

D. creating positive online experiences

To learn more about digital citizenship, refer to the link:

brainly.com/question/11542933

#SPJ5

The question is incomplete. You most probably the complete question is given below:

enforcing your rights on others

helping and leading others

targeting potential cybercriminals

creating positive online experiences

promoting the common good

Which of the following activities are performed by computer programmers? Choose all that apply.

They write step-by-step instructions for a computer to follow.

They produce a solution as quickly as possible, even it it means working from guesses at first.

They define the programming language.

They create a logic problem that the computer program can solve.

Answers

Answer:

A, D

Explanation:

The activities that are performed by computer programmers are:

A. They write step-by-step instructions for a computer to follow.

D. They create a logic problem that the computer program can solve.

Who are the computer programmers?


A series of instructions written in a programming language for a computer to follow is referred to as a computer program. Software, which also contains documentation and other intangible components, comprises computer programs as one of its components.

Code and scripts are written by computer programmers, modified, and tested to ensure that software and applications work as intended. They convert the blueprints made by engineers and software developers into computer-readable instructions.

Therefore, the correct options are A and D regarding computer programmers.

To learn more about computer programs, visit here:

https://brainly.com/question/14618533

#SPJ2

What is the Abacus?
full explanation please

Answers

Answer:

The abacus (plural abaci or abacuses), also called a counting frame, is a calculating tool which has been used since ancient times.

Explanation:

It was used in the ancient Near East, Europe, China, and Russia, centuries before the adoption of the Hindu-Arabic numeral system.[1] The exact origin of the abacus has not yet emerged. It consists of rows of movable beads, or similar objects, strung on a wire. They represent digits. One of the two numbers is set up, and the beads are manipulated to perform an operation such as addition, or even a square or cubic root.

An abacus is a manual aid to calculating that consists of beads or disks that can be moved up and down on a series of sticks or strings within a usually wooden frame. The abacus itself doesn't calculate; it's simply a device for helping a human being to calculate by remembering what has been counted.

as the software development process matures, who is increasingly responsible for safeguarding applications?

Answers

Software developers are increasingly responsible for safeguarding applications. This includes making sure the software is secure and reliable, as well as tested for potential vulnerabilities.

Developers are also responsible for developing secure coding practices, auditing code and systems, and monitoring for suspicious activity. They may also need to collaborate with security teams and other stakeholders to ensure that security measures are implemented correctly.

The Growing Responsibility of Software Developers in Securing Applications

The development of software is a crucial and ever-evolving process. As the complexity of software grows, so too does the responsibility of the software developer in ensuring that applications remain secure and reliable. From developing secure coding practices to auditing code and systems, software developers are increasingly being held accountable for safeguarding applications against potential vulnerabilities.

Software developers must be vigilant in their efforts to protect applications. This includes developing secure coding practices and auditing code and systems for potential vulnerabilities. Developers must also be aware of the latest security developments and trends, as well as any new security threats that may arise. Additionally, developers must stay up-to-date on any changes in the software development process, as these changes can impact security measures.

Learn more about software development:

https://brainly.com/question/26135704

#SPJ4

Commons is a place where Canvas users can search and share resources. Commons allows teachers to search by ....................... .

Answers

Commons is a place where Canvas users can search and share resources. Commons allows teachers to search by specific criteria or keywords to find relevant resources.

Commons is a collaborative platform within the Canvas learning management system that provides educators with a vast collection of shared resources. It serves as a hub where teachers can search for and discover a wide range of materials, including course modules, assignments, quizzes, multimedia files, and more. By leveraging the power of a shared community, teachers can save time and effort by accessing pre-existing resources and adapting them to their own teaching needs.

When searching in Commons, teachers have the ability to narrow down their results by specifying certain criteria or using keywords related to their desired resource. They can filter resources based on factors such as subject, grade level, language, file type, and tags. This enables teachers to find resources that align with their specific instructional goals, content areas, or student demographics. By refining their searches, teachers can quickly locate relevant materials that suit their teaching objectives and enhance their classroom instruction.

The search functionality in Commons empowers teachers to leverage the collective expertise and creativity of the Canvas user community. It fosters collaboration and resource-sharing among educators, creating a valuable ecosystem of educational materials that can be easily accessed, utilized, and modified to meet individual teaching requirements.

Learn more about Canvas users

brainly.com/question/31285077

#SPJ11

hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me ​

Answers

Answer:

a pseu code is a is an artificial and informal language that helps programmers develop algorithms.

Explanation:

If a network goes down, thin clients are more useful than fat clients because they do not have all that extra software running True False

Answers

The statement, "If a network goes down, thin clients are more useful than fat clients because they do not have all that extra software running" is false.

Thin clients are used to access servers that store programs, databases, and files rather than using a local disk. They do not need powerful hardware and can function on low-cost devices. When it comes to storing data, thin clients do not have storage devices on their own. However, they can access and store data on the server through the network connection. Fat clients, on the other hand, are the opposite of thin clients. They store software and data on their own devices, making them more expensive. These clients may be laptops or desktops that are powerful enough to store and process software on their own. Thin clients are more efficient in an environment where a network outage occurs, as they rely on servers for processing. Because the software is stored on the server, if the network goes down, thin clients will be unresponsive. As a result, it is incorrect to say that thin clients are more useful than fat clients when a network goes down because thin clients rely on the network to function. Therefore, the given statement is false.

To learn more about network, visit:

https://brainly.com/question/15002514

#SPJ11

PLZ HELP QUICK!! I NEED THE ANSWER RN!! IM BEING TIMED!
What is the output of this program?
numA = 3
for count in range(4,7):
numA = numA + count
print(numA)
Output:

Answers

Answer:

The answer is 18

Explanation:

Answer:

the answer is 18

Explanation:

edge 2020

IT WORKSHEET FOR GRADE 7 STUDENT'S PART L WRITE TRUE IF THE STATEMENT IS CORRECT AND FALSE IF IT IS L 1. It is not mandatory to unplug power cable from the main powe cleaning a computer I need help

Answers

False. It is mandatory to unplug the power cable from the main power before cleaning a computer to prevent electrical shock or damage to the components.

What is the explanation for the above response?

The statement "It is not mandatory to unplug the power cable from the main power when cleaning a computer" is false. It is important to unplug the power cable from the main power before cleaning a computer because it can prevent electrical shock or damage to the computer's components.

If the power is still connected, there is a risk of electric shock from accidental contact with live components. Also, cleaning the computer while it's powered on may also lead to damage or data loss due to electrostatic discharge or accidental spills.

Learn more about computers at:

https://brainly.com/question/21047147

#SPJ1

1.) what major accomplishment is achieved by the deep mind software described by koch?

Answers

Without additional information on the specific article or reference to which you are referring, it is difficult to provide a precise answer. However, DeepMind is a company that has developed advanced artificial intelligence (AI) systems for various applications, including gaming, robotics, and healthcare.

One of the major accomplishments of DeepMind is its development of AlphaGo, an AI system that defeated the world champion at the ancient Chinese game of Go. AlphaGo's success was significant because Go is a complex game that requires strategic thinking and intuition, making it much harder for a computer to play than games like chess. AlphaGo's victory was seen as a major milestone in the development of AI and demonstrated the potential of machine learning techniques, particularly deep neural networks, to solve complex problems.

DeepMind has also made significant contributions to the development of AI in other areas, such as natural language processing, protein folding prediction, and drug discovery. Its research has helped to advance the field of AI and has the potential to lead to significant breakthroughs in a variety of fields.

Learn more about machine learning here:

https://brainly.com/question/16042499

#SPJ11

why is this python code giving me problems?
This is having the user input a decimal number and the code has to round it up to the 2nd decimal place. This code is giving me problems, please fix it.

num3 = int(input("Please input a decimal number:")

num3 = int(round(num3, 2))

print ("your decimal rounded to the 2nd decimal place is:", x)

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The given code in this program has syntax errors.

In the given code, at line 1, input will cast or convert to int. It will generate an error on the second line because integer numbers can't be rounded. In simple, integer numbers don't have decimals. So, to correct the line you must use float instead of int.

In the second line, you need also to emit the int casting (data type conversion), because you have already converted the input into the float. In line 3, the second parameter to print function is num3, not x.

So the correct lines of the python code are given below:

num3 = float(input("Please input a decimal number:"))

num3 = (round(num3, 2))

print ("your decimal rounded to the 2nd decimal place is:", num3)

 

When you will run the above bold lines of code, it will run the program successfully without giving you any syntax and semantic error.

What is a computer? What is computing? Define this in your own words and then check your understanding with a dictionary. Have you ever thought about how many computers are in your home? Have a look here and then brainstorm a list of items that could be considered a 'computer.' Next, group the items in the list. Think about how and why you are grouping the items. Select one type of computer group that you feel you could not live without and why. Share your list with groupings and the one group you would not live without and your rationale. PLEASE HELP

Answers

Answer:

A computer is a machine that accepts data as input, processes that data using programs, and outputs the processed data as information. Many computers can store and retrieve information using hard drives. Computers can be connected together to form networks, allowing connected computers to communicate with each other.

Computing is any activity that uses computers to manage, process, and communicate information

yes i have thought of it before.

central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.

we can not live without motherboard or any of these .It is like a human without bones even one part missing would be dangerous.

Explanation:

Other Questions
I WILL GIVE YOU BRAINLIEST IF YOU HELP me at what point in a products life cycle do companies typically expand their product mix? Correct answers only please put number with answer ex:(1.A, 2.B, 3.C etc.) How is carbonexchanged betweenliving and thenonliving parts of theenvironment? ASAP NEED NOW Question 3 (Essay Worth 10 points)(01.07 MC)Show all work to multiply (6+-64)(3--16). Let x represent the volume of blood drawn for a blood test. Is the random variable x discrete or continuous this person proposed legislation to prohibit two deaf adults from marrying, eliminate residential schools, ban the use of manual communication, and prevent people who were deaf from becoming teachers. Please help me this is the last question and I need to get it right please help me.If John and Sam both push on a boulder with a force of 30N, but in opposite directions, what will happen to the boulder?Question 4 options:The boulder moves towards SamThe boulder moves away from John and SamThe boulder moves towards JohnThe boulder will not move. Gven that the expression p dollars for every q items describes a unit price. which statement must be true? can anyone help please?? Eliezer tells the reader, Eight words spoken quietly, indifferently, without emotion. Eightsimple, short words. What are those words and why is Eliezer unable to forgetthem? How do they help explain why Eliezer and his father cling to one another inAuschwitz? A child with a history of seizures arrives in the emergency department (ED) in status epilepticus. Which is the priority nursing action what evidence exists that suggests the scientific legitimacy of dissociative identity disorder? a psychotherapists who specialize in treating did confirm its existence b the diagnoses of people with did peaked in the mid-1900s and began to decrease c localized personality traits are different between each alter d western cultures and asian cultures show a similar rate of diagnosis e evoked potentials for each alter are different Find the equation of a line passing through (-2/3, 5) that is parallel to 4x-2y=6. Express your answer in point-slope form. To calculate the atomic mass of an element, the percentabundance of etch isotope is needed. ? Bullet Proof Inc. manufactures high-end protective screens for Smartphones and Tablets. The plant equipment limits both kinds that can be made in one day. The limits are as follows: No more than 80 Tablet screens, < 80 No more than 110 Smartphone screens, y 110 No more than 150 total, z + y 150 Tablet screens cost $120 each to manufacture Smartphone screens cost $85 each to manufacture Using the above information, the objective function for the cost of screens produced at this manufacturer is C-$80+ $110y C=$150z + 150y C=$85z + $120y C-$120x + $85y rao has a budget of $250 and goes to amazon to buy goods x and y. if the price of x is $5, and price of y is $10; and he buys 20 units of good x, what is the maximum amount of units of y he can buy? 100,000 divided by 3 In a class of 48 students, one fourth of them regularly watch a particular tv programme. how many of the students do not regularly watch the programme? During an investigation on vehicle safety, four different vehicles were driven at a test wall at the same speed. The data from this investigation is in the table below. Which vehicle would most likely hit the test wall with the greatest amount of force? *