Your company needs to deploy a single physical DNS and IIS using Windows Server 2016. You decide to perform a Nano Server installation to minimize resource consumption on the server. Which two steps will enable you to complete this installation

Answers

Answer 1

Two steps are : You can use the tool to select the appropriate packages and settings, and generate a bootable ISO file.you can then configure DNS and IIS as needed, using the Server Manager or PowerShell commands.

To complete the installation of a Nano Server with DNS and IIS on Windows Server 2016, you can follow these two steps:

1. First, download the Nano Server Image Builder tool from the Microsoft website. This tool will allow you to create a custom Nano Server image with the necessary roles and features enabled, including DNS and IIS.

2. Once you have created the custom Nano Server image, you can then use the Windows Deployment Services (WDS) to deploy the image to the physical server.

This can be done by adding the ISO file to the WDS server, creating a new deployment image, and selecting the appropriate settings for the deployment.

Once the image is deployed, By using Nano Server, you can minimize resource consumption on the server and optimize its performance for DNS and IIS roles.

To learn more about : Server

https://brainly.com/question/31060720

#SPJ11


Related Questions

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

Random.choice will choose a number between 1 and 100. True False​

Answers

Answer: False.

Explanation: Random.choice can choose between any 2 numbers.

Answer:

The person above me is right

Explanation:

Edge 2022

Which statement of the visualization is incorrect? A) Virtualization works on the desktop, allowing only one operating system(Mac OS, Linux, or Windows) to run on the platform B) A server running virtualization software can create smaller compartments in memory that each behaves like a separate computer with its own operating system and resources C) Virtualization is referred to as the operating system for operating systems D) Virtualization can generate huge savings for firms by increasing the usage of their hardware capacity.

Answers

The incorrect statement is A) Virtualization works on the desktop, allowing only one operating system (Mac OS, Linux, or Windows) to run on the platform. Virtualization on the desktop enables the concurrent execution of multiple operating systems.

Explanation:

A) Virtualization works on the desktop, allowing only one operating system (Mac OS, Linux, or Windows) to run on the platform.

This statement is incorrect because virtualization on the desktop allows multiple operating systems to run concurrently on the same platform. Virtualization software, such as VMware or VirtualBox, enables users to create and run virtual machines (VMs) that can host different operating systems simultaneously, including Mac OS, Linux, and Windows.

B) A server running virtualization software can create smaller compartments in memory that each behaves like a separate computer with its own operating system and resources.

This statement is correct. Virtualization software allows the creation of virtual compartments or containers within a server's memory. Each compartment, known as a virtual machine, can operate independently with its own dedicated operating system and allocated resources.

C) Virtualization is referred to as the operating system for operating systems.

This statement is correct. Virtualization is often referred to as the "operating system for operating systems" because it provides a layer of abstraction and management for multiple operating systems running on the same physical hardware.

D) Virtualization can generate huge savings for firms by increasing the usage of their hardware capacity.

This statement is correct. Virtualization enables efficient utilization of hardware resources by consolidating multiple virtual machines onto a single physical server. This consolidation reduces the need for additional physical servers, leading to cost savings in terms of hardware procurement, maintenance, and power consumption.

To know more about operating system visit :

https://brainly.com/question/29532405

#SPJ11

PLEASE HURRY!!!
Wyatt has a database to keep track of an enormous collection of videos. How can Wyatt find the record for the game Lost on Mars?
a)sort the data
b)filter the data
c)query the data
d)edit the data

Answers

Answer:

Wyatt could sort the data by month

Explanation:

How is data transmitted between computers?

Answers

Answer:

Data is transmitted from one computer to another through a process called serial transmittion

Serial data transmission sends data bits one after another over a single channel.

Hope this helps

Select the correct answer. The sum of two numbers is -18. If the first number is 10, which equation represents this situation, and what is the second number? A. The equation that represents this situation is 10 − x = -18. The second number is 28. B. The equation that represents this situation is 10 + x = -18. The second number is -28. C. The equation that represents this situation is x − 10 = -18. The second number is -8. D. The equation that represents this situation is -10 + x = -18. The second number is -8.

Answers

Answer:

B. The equation that represents this situation is 10 + x = -18. The second number is -28.

Explanation:

A sum is a number that is calculated by adding together a set of other numbers. The sum of our equation is -18, which means that we will place this number on the right side of the equal sign.

We also know that one of the components of this sum is 10, so that would go on the left.

What we want to find out is what the other part of the sum is. We don't know this yet, but we can't just write the equation as 10 = -18, so we'll put an x in place of our hidden value.

\(10 + x = - 18\)

We already have one part of our answer, so now we need to find the value of x. First, we need to get the x by itself, so we'll subtract 10 from each side of the equation.

\(10 + x = - 18 \\ - 10 \: \: \: \: \: \: \: \: \: \: \: \: - 10 \\ x = - 18 - 10\)

Now we just need to add -18 and -10 together, which would give us -28.

\(x = - 18 - 10 \\ x = - 28\)

WHERE CAN I FIND HOW MANY POINTS I EARNED!
BE SPECIFIC PLS

EXACT LOCATION

Answers

Answer:

This is the option if you are using brainly in the browser.

On the right top corner click on your account, then click view profile.

In your profile under your username, you have the number of points you earned.

If you are using the app brainly

Go on the app, click profile on the right low corner and under your username you should be able to see your points

I hope that helped.

Explanation:

This is the option if you are using brainly in the browser.

On the right top corner click on your account, then click view profile.

In your profile under your username, you have the number of points you earned.

If you are using the app brainly

Go on the app, click profile on the right low corner and under your username you should be able to see your points

I hope that helped.

Which file format is most often used with the CMYK color model and allows the image to be increased or decreased in size with minimal loss in quality?

GIF
PNG
TIFF
JPEG

Answers

The file format  that is most often used with the CMYK color model and allows the image to be increased or decreased in size with minimal loss in quality is option C: TIFF.

What is the purpose of a TIF file?

Computer files called TIFFs, which stand for Tag Image File Format, are used to store raster graphics and image data. If you want to avoid lossy file formats, TIFFs, which are a favorite among photographers, are a useful option to keep high-quality photographs before editing.

Hence, With a high color depth of up to 32 bits per color component, the format supports both the RGB and CMYK color models. Transparencies, masks, and layers can also be stored. You may copy or save data without sacrificing quality thanks to lossless compression.

Learn more about  file format from

https://brainly.com/question/24102638
#SPJ1

Why is it important to organize your computer files?

“With a explanation”

Answers

Answer: So then every thing is not cluster together and you have everything where you can get to it faster and it just makes everything  100 times better then it not being organized :) hope this helped and if it didn't I'm so sorry

Explanation:

7. What enhancing techniques that lines the interior of drawers and boxes resulted to soft velvety finish? A. Wood Turning b. Painting c. Etching d. Flocking

Answers

Answer:

d. Flocking

Explanation:

Flocking is one of the methods that is used to bring a finishing and decorative touch in the furniture. It is a process in which very fine particles are placed on the surface of the furniture to provide a texture to it. This process helps in adding a texture, providing a distinct color, and for better maintenance of the product. In the interior of the drawers and boxes, flocking is done so as to bring a soft and velvety finish.

I NEED HELP!!! BRAINLIEST!!!
Drag each function to its protocol name.
Classify the functions of DHCP and DNS protocols.

assigns an IP address to each host

translates domain names into IP addresses

makes it easy to create English or language names for IP addresses

eliminates manual errors in setting up IP addresses

Answers

Answer:

DHCP Dynamic Host Configuration Protocol:

Is a network service that automatically assigns IP addresses and other TCP/IP configuration information on network nodes configured as DHCP clients. Server allocates IP addresses to DHCP clients dynamically. Should be configured with at least one DHCP scope. Scope contains a range of IP addresses and a subnet mask, and can contain other options, such as a default gateway and Domain Name System. Scope also needs to specify the duration of the lease and usage of an IP affects after which the node needs to renew the lease with the SHCP server. Determines the duration, which can be set for a defined time period or for an unlimited length of time.

DNS Domain Name Service: Is a TCP/IP name resolution service that translates FQDNs into IP addresses. System of hierarchical databases that are stored on separate DNS servers on all networks that connect to the Internet. DNS servers store, maintains and update databases, they respond to DNS client name resolution requests to translate host names into IP addresses.

DNS Components

DNS database is divided logically into a heieratchical grouping of domains. Physically into files called zones. Zone files contain the actual IP-to-host name mapping for one or more domains. Zone files is stored on the DNS server that is responsible for resolving hot names for the domains contained in the zone. Each network node in that domain will have a host record within the domain's zone files. Includes the node's host name, FQDN, and assigned IP address.

DNS Servers

*If you are configuring static IP addresses, including the IP address of the default DNS servers as you configure each client.

*If you are using DHCP, use the DHCP scope options to specify the IP Explanation:

dhcp provides an ip addrrss

dns creates language names for ip addresses

dns translates domain names into ip addresses

dhcp eliminates errors

im pretty sure

the cache is used as a temporary storage area for order by or group by operations, as well as for index-creation functions. question 4 options: a) optimizer b) data c) sort d) sql

Answers

The cache is used as a temporary storage area for order-by or group-by operations, as well as for index-creation functions.

During the execution of SQL queries, the cache can be utilized to store frequently accessed data, improving the overall performance of the database.

Specifically, the cache is often used for sorting and grouping operations that require temporary storage to complete. This is because such operations can be computationally expensive, and the use of temporary storage can help reduce the processing time required.

Additionally, the cache can be used for index-creation functions, helping to optimize the performance of the database over the long term. Overall, the cache is an important component of many database systems, helping to improve their efficiency and speed.

For more questions like Database click the link below:

https://brainly.com/question/30634903

#SPJ11

I just clicked on an icon. I must be using what to navigate through the EHR?a. presentation layerb. screen layoutc. alertd. graphical user interface

Answers

The graphical user interface (GUI) is the element that allows you to navigate through the electronic health record (EHR) system. The GUI is the visual representation of the EHR that presents information to the user in a way that is easy to understand and navigate.

It includes icons, menus, buttons, and other interactive elements that allow you to access and use the various features of the EHR. When you click on an icon, you are using the GUI to interact with the EHR. The GUI translates your input into commands that the EHR system can understand, and it displays the appropriate information or performs the requested action. The GUI is designed to be intuitive and user-friendly, allowing you to quickly and easily find the information you need and complete the tasks you need to do.

The GUI is just one part of the overall EHR system, however. The system also includes a presentation layer that handles the formatting and display of data, a screen layout that defines how information is organized and presented on the screen, and alerts that provide important information or notifications to the user. Together, these elements create a comprehensive and powerful EHR system that supports the delivery of high-quality patient care.

To know more about Graphical User Interface visit:

https://brainly.com/question/14758410

#SPJ11

In selling process, the first thinf you must do is to
A. Conduct an opening party B. Invite all people in the community C. Request the services of an advertising agent D. Conduct a survey of prospective and qualified buyers of the product

Answers

In the selling process, the first thing you must do is to conduct a survey of prospective and qualified buyers of the product (D). This step is crucial as it helps you understand your target audience and their needs.

By conducting a survey, you can gather valuable information about their preferences, buying habits, and expectations. This knowledge allows you to tailor your sales approach and product offering to better meet their needs. For example, if your product is a smartphone, the survey may reveal that potential buyers prioritize camera quality and battery life.

Armed with this information, you can highlight these features during your sales pitch. By starting with a survey, you can ensure that your selling efforts are targeted and effective, maximizing your chances of success. Remember, understanding your customers is the key to successful selling.

To know more about selling process visit :-

https://brainly.com/question/32095723

#SPJ11

A gaming website wanted to find out which console its visitors owned. Which choice best represents the population of interest?
a) Visitors to the 3DS section.
b) All of the website visitors.
c) Visitors to the PS4 section.
d) Visitors who are on the website for more than 5 minutes.

Answers

The population of interest for a gaming website that wanted to find out which console its visitors owned is the set of individuals who have visited the gaming website. The choice that best represents the population of interest is All of the website visitors (option b).

The choice that best represents the population of interest for a gaming website that wanted to find out which console its visitors owned is b) All of the website visitors. Here's an explanation as to why:Population of interest is the set of people or objects which the study aims to investigate. In this context, the population of interest is the group of individuals who have visited the gaming website. The visitors of the gaming website were the focus of this research. To obtain accurate results and valid conclusions, a survey or poll can be conducted on all website visitors.Therefore, all website visitors (option b) is the correct answer that best represents the population of interest.

To know more about website visit:

brainly.com/question/32113821

#SPJ11

Which of the following does not reflect the second step of effective communication?
a.
Ken bows to a Japanese businessman when he greets him.
b.
Joy lowers her voice when she asks about her friend’s condition.
c.
KC interrupts his teacher’s lecture to ask a question.
d.
Eric conducts himself in a professional manner during his interview.

Answers

Answer:

c

Explanation:

Effective communication is the process of communication. The correct option is C.

What is Effective Communication?

Effective communication is the process of communication, where the idea, thought, or concept shared by the speaker is properly received and understood by the listener.

The condition which does not reflect the second step of effective communication is that KC interrupts his teacher’s lecture to ask a question. Hence, the correct option is C.

Learn more about Effective Communication:

https://brainly.com/question/1423564

#SPJ2

NOT!!! Do not use a library (queue) and (stack) , you write it
Write function to check the vowel letter at the beginning of
names in Queue?

Answers

The provided function allows you to check if names in a queue start with a vowel letter. It does not rely on any library functions and utilizes a comparison with a predefined list of vowels. This function facilitates the identification of names that meet the vowel letter criteria within the given queue.

The following function can be used to check if the names in a queue begin with a vowel letter:

```python

def check_vowel_at_beginning(queue):
   vowels = ['a', 'e', 'i', 'o', 'u']
   while not queue.empty():
       name = queue.get()
       first_letter = name[0].lower()
       if first_letter in vowels:
           print(f"The name '{name}' starts with a vowel letter.")
       else:
           print(f"The name '{name}' does not start with a vowel letter.")

```

In this function, we first define a list of vowel letters. Then, we iterate through the elements in the queue until it is empty. For each name in the queue, we extract the first letter using `name[0]` and convert it to lowercase using `.lower()`. We check if the first letter is present in the list of vowels. If it is, we print a message stating that the name starts with a vowel letter. If it's not, we print a message indicating that the name does not start with a vowel letter.

This function allows you to process the names in the queue and identify which ones begin with a vowel letter.

To learn more about Functions, visit:

https://brainly.com/question/15683939

#SPJ11

How to fix "driver failed programming external connectivity on endpoint"?

Answers

HTTP/HTTPS proxy

Create a systemd drop-in listing for the docker service: $ sudo mkdir -p /etc/systemd/system/docker.service.d.

Flush changes and restart Docker. $ sudo systemctl daemon-reload $ sudo systemctl restart docker.

How to restart docker command?

Users can kind docker ps to take a look at if the restart coverage is active; it will be shown as either Up , when the container is up and running, or Restarting when the container is in the restart state.

Does Docker compose down delete containers?

Description. Stops containers and removes containers, networks, volumes, and photographs created by means of up .

Learn more about "driver failed programming here;

brainly.com/question/29649549

#SPJ4

assuming static scoping is used, for each variable name in sub2, find the program unit where it is declared.

Answers

It combines and strengthens ideas about scope. As a result, the scope is a crucial concept that governs the accessibility of variables. The scope, which is the foundation of closures, defines the ideas of global and local variables.

The program units and all the variables are listed below:

A(sub1), Y(sub1), Z(sub1), and X(sub1) (main)

A(sub2), B(sub2), Z(sub2), Y(sub1), and X are all sub2 (main)

A, X, W, Y, and Z are all subscripts of three (main)

The several unit modules that make up a finished, executable Delphi application are connected by a single source code module known as a project file. All source code, including the main program, is kept in.pas files in conventional Pascal programming. The primary software source module for Embarcadero tools is designated by the file extension.dpr,

Learn more about scope here:

https://brainly.com/question/30088177

#SPJ4

explain briefly how learning how to follow can make a person a good leader

Answers

By  learning how to follow, one can  be a good leader because: Looking up to a leader and following them help to:

Keep one's ego in check and one can be able to be a good ego manager.They create strong credibility. They help use to focus our efforts for maximum impact.

How does being a good follower make you a good leader?

As a good follower, a person can be able to have the boldness and confidence to be able to respectfully talk about a lot of things with their leader if you see that you're not going in the right way.

Note that  one can trust your leader and this will boast up the spirit of your input and engagement in all.

Hence, By  learning how to follow, one can  be a good leader because: Looking up to a leader and following them help to:

Keep one's ego in check and one can be able to be a good ego manager.They create strong credibility. They help use to focus our efforts for maximum impact.

Learn more about good leader from

https://brainly.com/question/12522775

#SPJ1

Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?

No messages will ever be blocked from the user’s mailbox.
Messages can still be blocked at the server level.
Messages cannot be blocked at the network firewall.
Most obvious spam messages will still reach the client computer.

Answers

Answer:

The last one

Explanation I think it is D because all of the other answers are saying what happen if you filter it.

The majority of obvious spam messages will continue to reach the client's computer. The correct answer is D.

What is junk mail?

Email spam, also known as junk email, spam mail, or plainly spam, is an unrequested email sent in mass. The name is derived from a Monty Programming languages sketch that includes the name of a canned pork product is mentioned. Spam is pervasive, unavoidable, and monotonous.

Back out of the Folder or any message folders users are viewing to access the Mailboxes view. The Junk folder is located beneath the Drafts and Sent directories in the Mailboxes view.

The Junk Email Filter settings can be changed in the Junk E-mail Dialogue box. Click Junk in the Deactivate group on the Home tab, and then click Garbage E-mail Options.

Most obvious spam messages will still reach the client's computer. Then the correct option is D.

More about the junk mail link is given below.

https://brainly.com/question/28354330

#SPJ6

. George wrote a blog about playing baseball using a password-protected site. On his blog, George described his little league team and their season. He gave detailed descriptions of the location of each game and the full names and photographs of all the players on the team, including himself.

Which of the following risky blogging behaviors did George engage in? Check all that apply. (2 points)
He used a password-protected site.
He gave detailed information about the location of his little league games.
He posted pictures of himself and his teammates online.
He wrote on the topic of baseball.

Answers

Answer:

2 and 3.

Explanation:

They are both giving private information. The first one is good, there is no security risk in a website being password protected, actually quite the opposite. And writing on the topic of baseball has nothing to do with him specifically and gives no personal information.

how to 5.4.4 on codehs?

Answers

The program is an illustration of the square function.

The square function takes a number, and returns the square of the number; i.e. the product of the number twice.

So, the square function in Python, where comments are used to explain each line is as follows:

#This defines the square function

def square(num):

   #This returns the square of the argument

   return num**2

   

#This gets input for the number

num = int(input("Number: "))

#This calculates the square of the number

x = square(num)

#This prints the square

print("Square:",x)

Read more about Python functions at:

https://brainly.com/question/25120954

You are going to open a file in your program to use what is already in the file.

The program is saved in a folder, which has a subfolder called "dataFiles."

In the textFiles folder is a text file called "games.txt."

Which line of code will open games.txt?

O

fileln.open("dataFiles/games.txt","r")

O

fileln.open("games.txt","r")

O fileln = open("games.txt","r")

O fileln = open("dataFiles/games.txt","r")

Answers

Where one is going to open a file in your program to use what is already in the file. The program is saved in a folder, which has a subfolder called "dataFiles." In the textFiles folder is a text file called "games.txt."

The  line of code will open games.txt is "fileln = open("dataFiles/games.txt","r") (option D)

What is a line of Code?

Source lines of code, often known as lines of code, is a software metric that counts the number of lines in the text of a computer program's source code to determine the size of the program.

One line of code should ideally be a unit element that means or accomplishes something particular - a sentence fragment, if you will.

Learn more about line of code:
https://brainly.com/question/27591534
#SPJ1

tamara is behind on her work as an analyst and decides she needs to do some work at home tonight. she copies the files she has been working on (which contain phi) to a flash drive and drops the flash drive in her purse for later use. when tamara gets home, the flash drive is missing. is this a security breach?

Answers

On the way home from work, Tamara who works as an analyst decides she needs to do some advanced work at home tonight. The files that he had copied and worked on at the office were stored on the flash drive, but when he got home the flash drive was gone. The incident that Tamara experienced was not a security breach.

What is security breach?

A security breach is any incident or occurrence that results in unauthorized access to data on a computer, on an application, on a network, or on a device. This will result in information being accessed without involving authorization. This leads to unauthorized access to information.

Learn more about serious security breach occurred in your organization here https://brainly.com/question/23077661

#SPJ4

True/False : Computer scientists refer to the process of planning and organizing a program as software development.

Answers

The given statement " Computer scientists refer to the process of planning and organizing a program as software development." is true because software development refers to the process of planning, designing, creating, testing, and maintaining software programs.

Computer scientists and software developers use this term to describe the entire process of building software, from conception to deployment. This includes activities such as project planning, requirements analysis, system design, coding, testing, debugging, and maintenance. Therefore, the statement "Computer scientists refer to the process of planning and organizing a program as software development" is true.

You can learn more about software development at

https://brainly.com/question/26135704

#SPJ11

What is a problem (worldwide or personal) that was solved by social media?
I need to write about some sort of problem that what fixed by the use of social media

Answers

You could write about any natural disaster, in which through social media they were able to raise funds to help those affected by said disaster

How can you switch from editing the header and footer back to editing the main text of the document.

Answers

The way that you can switch from editing the header and footer back to editing the main text of the document is;  use the 'skip' and 'switch' icons to move between header and footer and then click the Show/Hide Document Text icon and that will return you to the main document.

How to switch between header, footer and main document in MS Word?

How to switch between header, footer and main document in MS Word?

In Microsoft word, we make use of the 'skip' and 'switch' icons to move backwards and forwards from the headers to the footers, and also from the footer back to the header.

Now, to go back to the main document, immediately you finish the editing work on the headers/footers, click the Show/Hide Document Text icon again and that will return you to the main document.

Read more about some features of Microsoft Word at; https://brainly.com/question/25813601

It is not possible to have more than one optimal solution to a linear programming problem.
a. true. b. false.

Answers

Answer:false

Explanation:

In an attempt to reach an all-time record for its premier, ads for the highly anticipated Avengers: Endgame are run on all the major networks and cable stations across the country from 8:00 p.m. to 10:00 p.m., or during ________ time.

Answers

Based on the contextual situation, the cable stations across the country from 8:00 p.m. to 10:00 p.m., or during Late-fringe time.

What is Late-Fringe Time?

Late Fringe time is a term used in television that describes the television hours that follow the prime time.

Generally, the prime period is usually between 8:00 p.m. to 10:00 p.m., while the Late Fringe time is around 11 p.m. to 1 a.m.

Hence, in this case, it is concluded that the correct answer is "Late-Fringe period."

Learn more about Television hours here: https://brainly.com/question/1006994

Other Questions
A group of students is studying for an economics quiz about economic cycles and how the government manages in an economy. In a market economy, strategies that change spending or taxes in order to influence economic conditions are known as:O fiscal policy. O equity promotion. O monetary policy. O economic stimulus. Give a brief explanation of what the First Amendment means to a student. What did we learn from the cost assessment you recommend? If the company wants to manager? emphasize customer retention, what would you 2. Which of the first two managers' directions (direct recommend? mail or email) would you support? 4. What else would you like to know for a more thor- 3. What is the strategy? If the company wants to ough assessment? emphasize customer acquisition, what would Why are group IA elements called alkali metals?? 100 POINTS+BRAINLIEST 8TH GRADE MATH PT 5: WRITE THE EQUATION OF A LINE- this one was strange because the slope is supposed to be a negative fraction but that never appeared in the answer choices so please explain why I got it wrong thanks!! What is the solution of the following system? Use the substitution method. y 2x = 8 16 + 4x = 2y O The only solution is (24, 0). O The only solution is (1, 10).There is no solution. O There are an infinite number of solutions. hello I need the answer quickly just to confirm if I have it right what were the effects of trade networks on islam? Which of the following wound states is most likely to require a skin graft?Primary intentionSecondary intentionTertiary intentionAcute intentionChronic intention The product of two whole numbers is 360 an their sum is less than 100 what are the possible for the two numbers Pick an abolitionist you read/listened and learned about today. Write a summary on their accomplishments and how they have impacted and shaped our country. Why are they considered important? link: https://video.link/w/5Tum You start driving west for 20 miles, turn left, and drive south for another 14 miles. At the end of driving, what is your straight line distance from your starting point? Round to the nearest tenth of a mile Which of the following are examples of primary sources? Check all that apply. newspaper articlespersonal letterspublic recordsjournals encyclopedias textbooks photographs if 17.3 g of ammonia is produced by the reaction of 20.2 g of nitrogen with an excess of hydrogen, what is the percent yield of the reaction? A cross section is made by the intersection of a plane and a square pyramid at an angle either parallel or perpendicular to the base. the cross section can be which of these shapes? select three options. Read the two excerpts from the red umbrella. excerpt 1 "no, its all right, lucy. here, sit next to me, too." pap scooted over in the chair so i could squeeze in next to him. "and no, frankie, i dont expect the soldiers to come back. but things are going to change for us." he sighed and looked at mam sitting by his feet. "here, first let me give you this." he reached into his pocket and pulled out mams wedding ring. excerpt 2 that night, pap called frankie and me into the living room. he was pacing back and forth. something was terribly wrong. "mi hija, sit down." he gestured over to the sofa. "please." "whats going on?" i looked over at my mother, sitting in the armchair, hands crossed on her lap. a vacant look in her eyes. which best describes how pap changes from the first excerpt to the second? he becomes bitter about the time he spent in jail away from his family. he becomes withdrawn from his family after having been away for so long. he becomes excited at the thought of fighting for his beliefs. he becomes distressed as he realizes his children are in danger. Can snails jump yes or no? which of the following is true about the distribution of sample means? a.) the mean distribution of sample means is the same as the population mean. b.) the mean distribution of sample means is normally greater than the population mean. c.) the mean distribution of sample means is normally less than the population mean. d.) the mean distribution of sample means is more variable than population means. Write an exponential function y=abx whose graph passes through the points (1,2) and (3,50) . 10. photons of infrared radiation are responsible for much of the warmth we feel when holding our hands before a fire. these photons will also warm other objects. how many infrared photons with a wavelength of'