A network has the ability to direct traffic toward all of the receiving service. what provides this ability in the transport layer? ​

Answers

Answer 1

Answer:

Multiplexing is the correct answer

Explanation:

End-to-end communication over a network is done by transport layer.

Provides a logical communication between various application processes running on different hosts and this layer is set in OSI(open system interconnection) model.

Transport layer also manages error and correction and also it provides reliability to users.

Multiplexing gets allowed by the transport layer which enables to transfer messages over a network and also the error and corrected data.


Related Questions

Provide the EXACT C++ line of code necessary to return the heap-dynamic variable ptr to the operating system.

Answers

Full question:

Provide the EXACT C++ line of code necessary to return the heap-dynamic variable ptr to the operating system.

Pokemon *ptr;

ptr = new Pokemon[6];

Answer:

delete ptr;

Explanation:

The command in the answer above deallocates memory(preventing memory leaks) and returns control to the operating system.

The command in the question dynamically allocates memory to the the heap(dynamically allocated memory is called heap) while the program is running(different from statically allocated memory that allocates before program compiles). When the variable is no longer needed, deallocation occurs using the command in our answer where the variable is deleted using the pointer(keeps track of dynamic variables).

Complete the AscendingAndDescending application so that it asks a user to enter three integers. Display them in ascending and descending order.An example of the program is shown below:Enter an integer... 1 And another... 2 And just one more... 3 Ascending: 1 2 3 Descending: 3 2 1GradingWrite your Java code in the area on the right. Use the Run button to compile and run the code. Clicking the Run Checks button will run pre-configured tests against your code to calculate a grade.Once you are happy with your results, click the Submit button to record your score.

Answers

Answer:

Following are the solution to the given question:

import java.util.Scanner;//import package

public class AscendingAndDescending//defining a class AscendingAndDescending  

{

   public static void main(String[] args) //main method

   {

       int n1,n2,n3,min,max,m;

       Scanner in = new Scanner(System.in);//creating Scanner class object

       System.out.print("Enter an integer: ");//print message

       n1 = in.nextInt();//input value

       System.out.print("And another: ");//print message

       n2 = in.nextInt();//input value

       System.out.print("And just one more: ");//print message

       n3 = in.nextInt();//input value

       min = n1; //use min variable that holds value

       max = n1; //use mix variable that holds value

       if (n2 > max) max = n2;//use if to compare value and hols value in max variable

       if (n3 > max) max = n3;//use if to compare value and hols value in max variable

       if (n2 < min) min = n2;//use if to compare value and hols value in min variable

       if (n3 < min) min = n3;//use if to compare value and hols value in min variable

       m = (n1 + n2 + n3) - (min + max);//defining m variable that arrange value

       System.out.println("Ascending: " + min + " " + m + " " + max);//print Ascending order value

       System.out.println("Descending: " + max + " " + m + " " + min);//print Descending order value

   }

}

Output:

Enter an integer: 8

And another: 9

And just one more: 7

Ascending: 7 8 9

Descending: 9 8 7

Explanation:

In this program inside the main method three integer variable "n1,n2, and n3" is declared that inputs value from the user end and also defines three variable "min, max, and m" that uses the conditional statement that checks inputs value and assigns value according to the ascending and descending order and prints its values.

Connie works for a medium-sized manufacturing firm. She keeps the operating systems up-to-date, ensures that memory and disk storage are available, and oversees the physical environment of the computer. Connie is employed as a __________. Hardware Engineer Computer Operator Database Administrator Computer Engineer

Answers

Answer: Computer operator

Explanation:

Following the information given, we can deduce that Connie is employed as a computer operator. A computer operator is a role in IT whereby the person involved oversees how the computer systems are run and also ensures that the computers and the machines are running properly.

Since Connie keeps the operating systems up-to-date, ensures that memory and disk storage are available, and oversees the physical environment of the computer, then she performs the role of a computer operator.

write short note on the following: Digital computer, Analog Computer and hybrid computer​

Answers

Answer:

Hybrid Computer has features of both analogue and digital computer. It is fast like analogue computer and has memory and accuracy like digital computers. It can process both continuous and discrete data. So it is widely used in specialized applications where both analogue and digital data is processed.

Write a program that reads in the size of the side of a square and then prints a hollow square of that size out of asterisks and
blanks. Your program should work for squares of all side sizes between 1 and 20. For example, if your program reads a size of 5, it
should print

Answers

Answer:

Explanation:

#include <iostream>

using std::cout;

using std::endl;  

using std::cin;  

int main()

{

int side, rowPosition, size;

cout << "Enter the square side: ";

cin >> side;

size = side;

while ( side > 0 ) {

rowPosition = size;

 while ( rowPosition > 0 ) {

if ( size == side || side == 1 || rowPosition == 1 ||  

rowPosition == size )

cout << '*';

else

cout << ' ';

--rowPosition;

}  

cout << '\n';

--side;

}

cout << endl;

return 0;

}

convert FA23DE base 16 to octal

Answers

kxjhdjshdjdjrhrjjd

snsjjwjsjsjjsjejejejd

s

shsjskkskskskekkes

slskekskdkdksksnsjs

djmsjs

s JM jsmsjjdmssjsmjdjd s

jsmsjjdmssjsmjdjd

HS shhsys

s

s

sujdjdjd s

sujdjdjd

syshdhjdd

Answer:

764217360

Explanation:

Write a program that removes all non-alpha characters from the given input. Ex: If the input is: -Hello, 1 world$! the output is: Helloworld

Also, this needs to be answered by 11:59 tonight.

Answers

Answer:

Explanation:

The following code is written in Python. It is a function that takes in a string as a parameter, loops through the string and checks if each character is an alpha char. If it is, then it adds it to an output variable and when it is done looping it prints the output variable. A test case has been provided and the output can be seen in the attached image below.

def checkLetters(str):

   output = ''

   for char in str:

       if char.isalpha() == True:

           output += char

   return output

Write a main function that declares an array of 100 ints. Fill the array with random values between 1 and 100.Calculate the average of the values in the array. Output the average.

Answers

Answer:

#include <stdio.h>

int main()

{

   int avg = 0;

   int sum =0;

   int x=0;

   /* Array- declaration – length 4*/

   int num[4];

   /* We are using a for loop to traverse through the array

    * while storing the entered values in the array

    */

   for (x=0; x<4;x++)

   {

       printf("Enter number %d \n", (x+1));

       scanf("%d", &num[x]);

   }

   for (x=0; x<4;x++)

   {

       sum = sum+num[x];

   }

   avg = sum/4;

   printf("Average of entered number is: %d", avg);

   return 0;

}

Write an expression that evaluates to True if the string associated with s1 is greater than the string associated with s2

Answers

Answer:

Explanation:

The following code is written in Python. It is a function that takes two string parameters and compares the lengths of both strings. If the string in variable s1 is greater then the function returns True, otherwise the function returns False. A test case has been provided and the output can be seen in the attached image below.

def compareStrings(s1, s2):

   if len(s1) > len(s2):

       return True

   else:

       return False

print(compareStrings("Brainly", "Competition"))







Program is set of instruction written in programming language.​

Answers

Answer:

Program is set of instruction written in programming language.

 program is a collection of instructions that can be executed by a computer to perform a specific task

In python,
Here's some fake data.
df = {'country': ['US', 'US', 'US', 'US', 'UK', 'UK', 'UK'],
'year': [2008, 2009, 2010, 2011, 2008, 2009, 2010],
'Happiness': [4.64, 4.42, 3.25, 3.08, 3.66, 4.08, 4.09],
'Positive': [0.85, 0.7, 0.54, 0.07, 0.1, 0.92, 0.94],
'Negative': [0.49, 0.09, 0.12, 0.32, 0.43, 0.21, 0.31],
'LogGDP': [8.66, 8.23, 7.29, 8.3, 8.27, 6.38, 6.09],
'Support': [0.24, 0.92, 0.54, 0.55, 0.6, 0.38, 0.63],
'Life': [51.95, 55.54, 52.48, 53.71, 50.18, 49.12, 55.84],
'Freedom': [0.65, 0.44, 0.06, 0.5, 0.52, 0.79, 0.63, ],
'Generosity': [0.07, 0.01, 0.06, 0.28, 0.36, 0.33, 0.26],
'Corruption': [0.97, 0.23, 0.66, 0.12, 0.06, 0.87, 0.53]}
I have a list of happiness and six explanatory vars.
exp_vars = ['Happiness', 'LogGDP', 'Support', 'Life', 'Freedom', 'Generosity', 'Corruption']
1. Define a variable called explanatory_vars that contains the list of the 6 key explanatory variables
2. Define a variable called plot_vars that contains Happiness and each of the explanatory variables. (Hint: recall that you can concatenate Python lists using the addition (+) operator.)
3. Using sns.pairplot, make a pairwise scatterplot for the WHR data frame over the variables of interest, namely the plot_vars. To add additional information, set the hue option to reflect the year of each data point, so that trends over time might become apparent. It will also be useful to include the options dropna=True and palette='Blues'.

Answers

Answer:

Here the answer is given as follows,

Explanation:

import seaborn as sns  

import pandas as pd  

df = {'country': ['US', 'US', 'US', 'US', 'UK', 'UK', 'UK'],  

  'year': [2008, 2009, 2010, 2011, 2008, 2009, 2010],  

  'Happiness': [4.64, 4.42, 3.25, 3.08, 3.66, 4.08, 4.09],  

  'Positive': [0.85, 0.7, 0.54, 0.07, 0.1, 0.92, 0.94],  

  'Negative': [0.49, 0.09, 0.12, 0.32, 0.43, 0.21, 0.31],  

  'LogGDP': [8.66, 8.23, 7.29, 8.3, 8.27, 6.38, 6.09],  

  'Support': [0.24, 0.92, 0.54, 0.55, 0.6, 0.38, 0.63],  

  'Life': [51.95, 55.54, 52.48, 53.71, 50.18, 49.12, 55.84],  

  'Freedom': [0.65, 0.44, 0.06, 0.5, 0.52, 0.79, 0.63, ],  

  'Generosity': [0.07, 0.01, 0.06, 0.28, 0.36, 0.33, 0.26],  

  'Corruption': [0.97, 0.23, 0.66, 0.12, 0.06, 0.87, 0.53]}  

dataFrame = pd.DataFrame.from_dict(df)  

explanatory_vars = ['LogGDP', 'Support', 'Life', 'Freedom', 'Generosity', 'Corruption']  

plot_vars = ['Happiness'] + explanatory_vars  

sns.pairplot(dataFrame,  

            x_vars = explanatory_vars,  

            dropna=True,  

            palette="Blues")    

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workstation. An application you are using is unable to connect to a Windows server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?

Answers

Answer:

PING

Explanation:

To check if there's still connectivity between the computer and server, I would use the ping command.

The ping command is primarily a TCP/IP command. What this command does is to troubleshoot shoot. It troubleshoots connection and reachability. This command also does the work of testing the name of the computer and also its IP address.

Write a java program that reads a list of integers and outputs those integers in reverse. The input begins with an integer indicating the number of integers that follow. For coding simplicity, follow each output integer by a comma, including the last one. Assume that the list will always contain fewer than 20 integers.


Ex: If the input is:


5 2 4 6 8 10

the output is:


10,8,6,4,2,

To achieve the above, first read the integers into an array. Then output the array in reverse.

Answers

Answer:

Explanation:

using namespace std;

#include <iostream>

int Go()

{

 

int N;

int A[20];

 

 

cout << " How many integers do you have ??? :>";

cin >> N;

if (N>20) { N=20; }

 

for (int iLoop=0; iLoop<N; iLoop++)

{

 

 cout << "Input integer # " << (iLoop+1) << " :>";  

  cin >> A[iLoop];  

 

}

 

for (int iLoop=N-1; iLoop>=0; iLoop--)

{

 cout << A[iLoop] << " ";

}

cout << endl;

 

 

}

int main()

{

Go();

}

A Java program that reads a list of integers and outputs them in reverse is written as,

import java.util.Scanner;

public class ReverseList {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       

       // Read the number of integers

       int numIntegers = scnr.nextInt();

       

       // Create an array to store the integers

       int[] integers = new int[numIntegers];

       

       // Read the integers into the array

       for (int i = 0; i < numIntegers; i++) {

           integers[i] = scnr.nextInt();

       }

       

       // Output the integers in reverse order

       for (int i = numIntegers - 1; i >= 0; i--) {

           System.out.print(integers[i]);

           

           // Add comma unless it's the last integer

           if (i > 0) {

               System.out.print(",");

           }

       }

       

       System.out.println(); // Add a new line at the end

   }

}

Given that,

Write a Java program that reads a list of integers and outputs those integers in reverse.

Here, The input begins with an integer indicating the number of integers that follow.

For coding simplicity, follow each output integer by a comma, including the last one.

So, A Java program that reads a list of integers and outputs them in reverse:

import java.util.Scanner;

public class ReverseList {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       

       // Read the number of integers

       int numIntegers = scnr.nextInt();

       

       // Create an array to store the integers

       int[] integers = new int[numIntegers];

       

       // Read the integers into the array

       for (int i = 0; i < numIntegers; i++) {

           integers[i] = scnr.nextInt();

       }

       

       // Output the integers in reverse order

       for (int i = numIntegers - 1; i >= 0; i--) {

           System.out.print(integers[i]);

           

           // Add comma unless it's the last integer

           if (i > 0) {

               System.out.print(",");

           }

       }

       

       System.out.println(); // Add a new line at the end

   }

}

Read more about java programming language at:

brainly.com/question/2266606

#SPJ4

1. Describe data and process modeling concepts and tools.

Answers

Answer:

data is the raw fact about its process

Explanation:

input = process= output

data is the raw fact which gonna keeps in files and folders. as we know that data is a information keep in our device that we use .

Answer:

Data and process modelling involves three main tools: data flow diagrams, a data dictionary, and process descriptions. Describe data and process tools. Diagrams showing how data is processed, transformed, and stored in an information system. It does not show program logic or processing steps.

g 1-1 Which network model layer provides information about the physical dimensions of a network connector like an RJ45

Answers

Answer:

Physical layer

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

In the OSI model, the physical layer is the first and lowest layer. Just like its name physical, it addresses and provides information about the physical characteristics such as type of connector, cable type, length of cable, etc., of a network.

This ultimately implies that, the physical layer of the network (OSI) model layer provides information about the physical dimensions of a network connector such as a RJ45. A RJ45 is used for connecting a CAT-5 or CAT-6 cable to a networking device.

Your organization has started receiving phishing emails. You suspect that an attacker is attempting to find an employee workstation they can compromise. You know that a workstation can be used as a pivot point to gain access to more sensitive systems. Which of the following is the most important aspect of maintaining network security against this type of attack?
A. Network segmentation.B. Identifying a network baseline.C. Documenting all network assets in your organization.D. Identifying inherent vulnerabilities.E. User education and training.

Answers

Answer:

E). User education and training.

Explanation:

In the context of network security, the most significant aspect of ensuring security from workstation cyberattacks would be 'education, as well as, training of the users.' If the employee users are educated well regarding the probable threats and attacks along with the necessary safety measures to be adopted and trained adequately to use the system appropriately so that the sensitive information cannot be leaked while working on the workstation and no networks could be compromised. Thus, option E is the correct answer.

You have a shared folder named Reports. Members of the Managers group have been given Write access to the shared folder. Mark Mangum is a member of the Managers group. He needs access to the files in the Reports folder, but he should not have any access to the Confidential.xls file. What should you do

Answers

Answer:

Following are the solution to the given question:

Explanation:

The common folder called Report has also been shared. Writing access to a shared folder was given to management group members. Mark is a member of a group of managers. We can access the files within your reporting directory, but you really should not access the Confidential.xls file. We want to add Mark Mangum to our ACL files using Deny permissions on Confidential.xls.

Why input screens are better data entry than entreing data dirrctly to a table

Answers

Answer:

are better data entry designs than entering data directly to a table. ... hence a user can design input fields linked to several tables/queries.

Explanation:

Input screens are better data entry designs than entering data directly to a table because a user can design input fields linked to several tables/queries.

What is digital information?

Digital information generally consists of data that is created or prepared for electronic systems and devices such as computers, screens, calculators, communication devices. These information are stored by cloud.

They are converted from digital to analog and vice versa with the help of a device.

Data entered in the table directly is easier than data entry method.

Thus, input screens are better data entry than entering data directly to a table.

Learn more about digital information.

https://brainly.com/question/4507942

#SPJ2


describe the evolution of computers.​

Answers

Answer:

First remove ur mask then am to give you the evolutions

Print the two-dimensional list mult_table by row and column. Hint: Use nested loops.
Sample output with input: '1 2 3,2 4 6,3 6 9':
1 | 2 | 3
2 | 4 | 6
3 | 6 | 9
How can I delete that whitespace?

Answers

Answer:

The program is as follows:

[tex]mult\_table = [[1, 2, 3], [2, 4, 6], [3, 6, 9]][/tex]

count = 1

for row in mult_table:

   for item in row:

       if count < len(row):

           count+=1

           print(item,end="|")

       else:

           print(item)

   count = 1

Explanation:

This initializes the 2D list

[tex]mult\_table = [[1, 2, 3], [2, 4, 6], [3, 6, 9]][/tex]

This initializes the count of print-outs to 1

count = 1

This iterates through each rows

for row in mult_table:

This iterates through each element of the rows

   for item in row:

If the number of print-outs is less than the number of rows

       if count < len(row):

This prints the row element followed by |; then count is incremented by 1

           count+=1

           print(item,end="|")

If otherwise

       else:

This prints the row element only

           print(item)

This resets count to 1, after printing each row

   count = 1

To delete the whitespace, you have to print each element as:            print(item,end="|")

See that there is no space after "/"

Answer:

count = 1

for row in mult_table:

  for item in row:

      if count < len(row):

          count+=1

          print(item,end=" | ")

      else:

          print(item)

  count = 1

Explanation: Other answers didnt have the spacing correct

Miguel has decided to use cloud storage. He needs to refer to one of the files he has stored there, but his internet service has been interrupted by a power failure in his area. Which aspect of his resource (the data he stored in the cloud) has been compromised

Answers

Answer: Availability

Explanation:

From which panel can you insert Header and Footer in MS Word?​

Answers

Answer:

Insert tap is the answer

the answer is ..

insert tab

14. For the declaration, int a[4] = {1, 2, 3};, which one is right in the following description-
(
A. The meaning of &a[1] and a[1] are same B. The value of a[1] is 1-
C. The value of a[2] is 3
D. The size of a is 12 bytes

Answers

Answer:

A.

thanks later baby HAHAHAHAHAA

What is the default return type of a method in Java language?

A.Void

B.Int

C.None

D.Short

Answers

Answer:

The default return data type in function is int

Answer: Option (b)

Explanation:

The default return data type in a function is int. In other words commonly if it is not explicitly mentioned the default return data type of a function by the compiler will be of an integer data type.

If the user does not mention a return data type or parameter type, then C programming language will inevitably make it an int.

mark me brainlist

im sure its option b!!

An e-mail program allows?
A. users to access and view web pages on the internet.
B. geographically separated people to transfer audio and video.
C. real-time exchange of messages or files with another online user.
D. transmission of messages and files via a network such as the internet.​

Answers

Answer:

C

Explanation:

Real time exchange of messages or files with another online user

A small company with 100 computers has hired you to install a local area network. All fo the users perform functions like email, browsing and Office software. In addition, 25 of them also do a large number of client/server requests into a database system. Which local area network operating system would you recommend?

Answers

Answer:

Based on the requirements indicated in the question above, the best Local Area Network (LAN) operating system that can be used is

Windows 7 , 8.1 or Windows 10. This is because they all are configured to handle extensive LAN activity and can connect over 200 users.

Explanation:  

Generally speaking, Windows 10 packs more improvement over the previous windows.

Cheers

What order? (function templates) Define a generic function called CheckOrder() that checks if four items are in ascending, neither, or descending order. The function should return -1 if the items are in ascending order, 0 if the items are unordered, and 1 if the items are in descending order. The program reads four items from input and outputs if the items are ordered. The items can be different types, including integers, strings, characters, or doubles. Ex. If the input is:

Answers

Answer:

Explanation:

The following code was written in Java and creates the generic class to allow you to compare any type of data structure. Three different test cases were used using both integers and strings. The first is an ascending list of integers, the second is a descending list of integers, and the third is an unordered list of strings. The output can be seen in the attached image below.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Order: " + checkOrder(10, 22, 51, 53));

       System.out.println("Order: " + checkOrder(55, 44, 33, 22));

       System.out.println("Order: " + checkOrder("John", " Gabriel", "Daniela", "Zendaya"));

   }

   public static <E extends Comparable<E>> int checkOrder(E var1, E var2, E var3, E var4) {

       E prevVar = var1;

       if (var2.compareTo(prevVar) > 0) {

           prevVar = var2;

       } else {

           if (var3.compareTo(prevVar) < 0) {

               prevVar = var3;

           } else {

               return 0;

           }

           if (var4.compareTo(prevVar) < 0) {

               return 1;

           }  else {

               return 0;

           }

       }

       if (var3.compareTo(prevVar) > 0) {

           prevVar = var3;

       }

       if (var4.compareTo(prevVar) > 0) {

           return -1;

       }

       return 0;

   }

}

fill in the blanks Pasaline could ----- and ------- very easily.​

Answers

Answer:

Hot you too friend's house and be safe and have a great time to take care of the following is not a characteristic it was a circle whose equation o

Please help urgently

Answers

Whats your question

If we have a book object but we do not give it a "subtitle" property, the following code will return undefined. bar len = book.subtitle.length;
a) true
b) false

Answers

Answer:

The answer is "Option a"

Explanation:

In the given question, this statement is true because in this bar len as a reference is declared that creates a book class object that calls the subtitle length method, that's why it is true.

Other Questions
Give examples of various costs Attending college involves incurring many costs. Give an example of a college cost that could be assigned to each of the following classifications. Explain your reason for assigning each cost to the classification.a. Sunk cost.b. Discretionary cost.c. Committed cost.d. Opportunity cost.e. Differential cost.f. Allocated cost. In this diagram, ABAC AEDF. If thearea of ABAC = 6 in?, what is thearea of AEDF? solve for x[tex] \sqrt{x^2-4x+8} +x=2 - x[/tex]please show all workings what is the value of 24 * 0.03 Consider the markets for three products below. Indicate which characteristics of a competitive market are met by these markets. Market : Gasolinea. Large number of buyersb. Standardized goodc. Full informationd. No transaction coste. Participants are price takersMarket: barbershop haircuts a. Large number of buyersb. Standardized goodc. Full informationd. No transaction coste. Participants are price takersMarket: bicycles a. Large number of buyersb. Standardized goodc. Full informationd. No transaction coste. Participants are price takers Which redox reaction would most likely occur if silver and zinc metal were added to a solution that contained silver and zinc ions? What was education like for African Americans at the turn of the twentieth century? 1. digital ink pen a miniature electronic circuit or device that electricity flows through. The circuit is made of silicon. It may also be called a chip 2. Electronic Paper Display a pocket-sized card that can store data and process information 3. integrated circuit an automatic identification device that lets you store and retrieve information 4. radio transceiver a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor 5. RFID display or sign with the ability to update the information electronically 6. smart card an electronic device that uses an antenna to read and send information by way of a radio signal Page 1:I grew up with Tourette's in New York City public schools and I was just amazed at the bravery and the fortitude of this young man, Mihok said. "I sent him an email letting him know he had a friend in Los Angeles and his mother asked me to be his mentor. I happily accepted.Together, Jaylen and Mihok have been taking their knowledge into the Polk County school system, holding assemblies to educate students on bullying. Taking on Bullying,Clifford ParodyPage 2:I grew up with Tourette (syndrome) in the New York City public schools, Mihok told Ledger reporter Clifford Parody. And I was just amazed at the bravery and fortitude of this young man.Jaylen and Mihok soon became friends.And this month, theyve reportedly visited at least 10 schools together.According to Mihok, Jaylen is getting his message across.Florida Kid Helps Other Kids Say, 'Bullying No Way!',Nick News with Linda EllerbeeRead the excerpts from the two articles. Then, explain what you understand better by connecting the details in the two texts. What poetic device does Whitman employ in the line "I lean and loaf at my ease observing a spear of summer grass"?Select one:a.repetitionb.catalogingc.alliterationd.simile which of the following points are in the first quadrant of the xy-plabe? check all that apply In a right triangle ABC angle B is the right angle and m angle C = 30 degrees if AC = 10 what is AB 1 pointWhat is the slope of a line perpendicular to 3x + 4y = -2? State the final conclusion in simple nontechnical terms.Original claim: The proportion of male golfers is less than 0.6.Initial conclusion: Fail to reject the null hypothesis.Which of the following is the correct conclusion?A. There is suffficient evidence to support the claim that the proportion of male golfers is less than 0.6.B. There is not sufficient evidence to support the claim that the proportion of male golfers is less than 0.6. please help its easy ill give u brainilest What transformation to the linear parent function, f(x) = x, gives the functiong(x) = x + 7?OA. Shift 7 units down.B. Vertically stretch by a factor of 7.C. Shift 7 units right.D. Shift 7 units left.Helping my home girls for the future 5a2 + b(a2 + 5) + b2 In the context of Albert Bandura's social learning theory, Bandura asserts that learning: Group of answer choices increases task motivation while reducing role conflict and ambiguity. occurs when we observe other people and model their behavior. is central to the design and administration of organizational reward systems. is the process of modifying behavior by following specific behaviors with positive consequences. ( t^15/27x^9 ) ^-2/3Please solve thisit is fraction with a negative fraction exponent the question is in the attachment