In fedora 20, the logging system used to record the messages normally stored within the boot.log, messages, and syslog files has been replaced by a journaling database system called?

Answers

Answer 1

The logging system which has replaced the journaling database system for use in recording messages that are normally stored within the boot.log is Journald.

What is Journald?

Journald refers to a logging system service which allows for messages to be stored and does so in an easier way so that system administrators can find relevant and interesting information when they look through log messages.

In the past, these messages that Journald now stores would have been stored in boot.log, messages, and syslog files but thanks to Journald using the special file format which is made especially for log messages, this has changed.

Find out more on log messages at https://brainly.com/question/4595770?referrer=searchResults

#SPJ1


Related Questions

Write the removeevens() method, which receives an array of integers as a parameter and returns a new array of integers containing only the odd numbers from the original array. the main program outputs values of the returned array.
hint: if the original array has even numbers, then the new array will be smaller in length than the original array and should have no blank element.
ex: if the array passed to the removeevens() method is [1, 2, 3, 4, 5, 6, 7, 8, 9], then the method returns and the program output is:
[1, 3, 5, 7, 9]
ex: if the array passed to the removeevens() method is [1, 9, 3], then the method returns and the program output is:
[1, 9, 3]
lab: remove all even numbers from an array
labprogram.java l.
1 import java.util.arrays;
2
3 public class labprogram {
4
5 public static int[] removeevens(int [] nums) {
6
7
8 }
9
10 public static void main(string[] args) {
11
12 int [] input {1,2,3,4,5,6,7,8,9};
13 int [] result = removeevens(input);
14
15 // helper method arrays.tostring() converts int[] to a string
16 system.out.println(arrays.tostring(result)); // should print [1, 3, 5, 7, 9]
17 }
18 }

Answers

Answer:

import java.util.*;

import java.util.Arrays;

public class LabProgram

{

// called function

public static int[] removeEvens(int [] nums)

{

// calculates the length of array

int len = nums.length;

int j=0;

// loop to keep count how many odd are there in array

for(int i=0;i<len;i++)

{

// condition for odd

if(nums[i]%2!=0)

{

// keeps count of odd

j++;

}

}

// declaration of array for odd nums

int newarray[] = new int[j];

j = 0;

// loop

for(int i=0;i<len;i++)

{

// condition for odd

if(nums[i]%2!=0)

{

// assigning odd number to new array

newarray[j] = nums[i];

// increment of j

j++;

}

}

// returning new array

return newarray;

}

// main program

public static void main(String[] args)

{

// array declaration

int [] input = {1,2,3,4,5,6,7,8,9};

// calling a function, passing the paramtere

int [] result = removeEvens(input);

//

System.out.println(Arrays.toString(result));

}

}

Explanation:

Write the first line of a function named Days. The function should return an integer value. It should have three integer parameters: intYears, intMonths, and intWeeks. All arguments should be passed by value.

Answers

Answer:

Program:

Module Module1

Function Days(intYears As Integer, intMonths As Integer, intWeeks As Integer) As Integer

' 1 year = 365days

' 1 month=30.417 days

' 1 week = 7 days

Days = 365 * intYears + 30.417 * intMonths + 7 * intWeeks

End Function

Sub Main()

Dim years, months, weeks As Integer

Console.Write("Enter the number of years: ")

years = Convert.ToInt32(Console.ReadLine())

Console.Write("Enter the number of months: ")

months = Convert.ToInt32(Console.ReadLine())

Console.Write("Enter the number of weeks: ")

weeks = Convert.ToInt32(Console.ReadLine())

Console.WriteLine("Days: " & Days(years, months, weeks))

Console.ReadKey()

End Sub

End Module

If you try to add a new item to a full stack the resulting condition is called a(n)?

Answers

Answer:

it's called an overflow

A piece of rigging hardware used to couple the end of a wire rope to eye fittings, hooks, or other connections is a(n)?

Answers

A piece of rigging hardware used to couple the end of a wire rope to eye fittings, hooks, or other connections is a(n) hitch.

What is Hardware?

This is referred to as the physical components of a computer or electronic system and can be seen or felt and examples include keyboard, mouse etc.

The hitch is a rigging hardware which consists of a shank and ball platform used for various types of function such as coupling the end of a wire rope to eye fittings , towing etc. This therefore ensures they are well attached and less likely to remove or fall off thereby makes it the most appropriate choice.

Read more about Hitch here https://brainly.com/question/4351358

#SPJ1

Which data protection process provides prebuilt capabilities, mapped to specific regulations, to create the necessary resources to implement and demonstrate compliance with these regulations

Answers

The data protection process  that provides prebuilt capabilities, mapped to specific regulations, to create the necessary resources to implement and demonstrate compliance with these regulations is known as The European Union General Data Protection Regulation (GDPR).

Who are held responsible for your compliance with data protection laws and processes?

Employers are known to be people who must be held accountable for data processing works while also working and complying with data protection principles.

The General Data Protection Regulation (GDPR) is known to be one of the hardest privacy and security law in the globe as it is known to be a body that imposes obligations onto its firm anywhere.

Hence, The data protection process  that provides prebuilt capabilities, mapped to specific regulations, to create the necessary resources to implement and demonstrate compliance with these regulations is known as The European Union General Data Protection Regulation (GDPR).

Learn more about data protection  from

https://brainly.com/question/27113550

#SPJ1

Write a while loop that adds 5 to userNum while userNum is less than 20, displaying the result after each addition. Ex: For userNum

Answers

Using the computational knowledge in JAVA it is possible to write a code that Write a while loop that adds 5 to userNum while userNum

Writting the code in JAVA:

// declaring variable userNum

var userNum = 5;

// variable ans to store all answers and print them in single line

// (as expected in sample output)

var ans = "";

// while loop, while userNum is <= 20

// (to get output 25 on screen, we need to run loop till less-than-equal)

while(userNum <= 20) {

 userNum += 5;

 ans += userNum + " ";

}

// displaying final output on console

console.log(ans);

See more about JAVA at brainly.com/question/12975450

#SPJ1

Question 3 options: Abstractions in a BNF description that can have two or more distinct definitions, representing two or more possible syntactic forms in the language.

Answers

Abstractions in a BNF description that can have two or more distinct definitions, representing two or more possible syntactic forms in the language and this is known to be  Nonterminal symbols.

What are these symbols about?

Nonterminal symbols are known to be a kind of symbols that one can be able to replaced.

Note that they are often called simply syntactic variables and as such,  Abstractions in a BNF description that can have two or more distinct definitions, representing two or more possible syntactic forms in the language and this is known to be  Nonterminal symbols.

Learn more about Abstractions from

https://brainly.com/question/7994244

#SPJ1

When using sftp to share files, what is encrypted in addition to the authentification information?.

Answers

In using SFTP to share files, the encryption in addition to the authentication information is seen in the user's email address.

What is authentication information?

Authentication Information is known to be that which tells about the usernames, passwords, electronic certificates, etc., that a one can use to know or be assured of a User's true identity.

Note that In using SFTP to share files, the encryption in addition to the authentication information is seen in the user's email address.

Learn more about email address from

https://brainly.com/question/24688558

#SPJ1

To generate a control break report, your input records must be organized in ____ order based on the field that will cause the breaks.

Answers

To generate a control break report, your input records must be organized in directory order based on the field that will cause the breaks.

What is directory?

Directory serves as guide in locating a particular item.

The directory is written in a way for an individual or an employee to understand and be able to retrieved needed information.

Therefore, to generate a control break report, your input records must be organized in directory order based on the field that will cause the breaks.

Learn more on directory below

https://brainly.com/question/14364696

#SPJ1

A web developer requires an environment to perform application testing. Which cloud service type does the developer choose to use

Answers

The cloud service type that the developer choose to use is known to be PaaS.

What is PaaS?

Platform as a service (PaaS) is known to be a full development and deployment environment that is seen in the cloud, and it is made up of resources that helps users to deliver a lot of things from simple cloud-based apps to strong, cloud-enabled firm's applications.

Hence, in the case above, The cloud service type that the developer choose to use is known to be PaaS.

Learn more about PaaS from

https://brainly.com/question/20600180

#SPJ1

If an algorithm created to help make hiring decisions is based on previous unfair decisions, then the algorithm may be

Answers

If an algorithm created to help make hiring decisions is based on previous unfair decisions, then the algorithm may be flawed.

What are algorithms being used for?

Algorithms are known to be tools that are made to help in calculation, data processing, and a kind of automated reasoning.

Hence, If an algorithm created to help make hiring decisions is based on previous unfair decisions, then the algorithm may be flawed.

Learn more about algorithm from

https://brainly.com/question/23282908

#SPJ1

Answer:

biased

Explanation:

The nurse assesses the heart sounds of a 77-year-old client with chronic heart failure. Which heart sound should the nurse document

Answers

If the nurse assesses the heart sounds of a 77-year-old client is one that has chronic heart failure, the heart sound that the nurse document is known as S3 extra heart sound.

What does an extra S3 heart sound mean?

The term Third Heart Sound S3 is known to be the outcome or the result obtained from increased atrial pressure that brought about an increased flow rates, and this is one that is often seen in congestive heart failure.

Note that it is one that is said to be the most common cause of a S3 and it is links dilated cardiomyopathy with that of dilated ventricles and it is one that also adds to the sound.

Hence, If the nurse assesses the heart sounds of a 77-year-old client is one that has chronic heart failure, the heart sound that the nurse document is known as S3 extra heart sound.

Learn more about chronic heart failure from

https://brainly.com/question/934133

#SPJ1

44.4% complete Question A hacker, wanting to gain data on organizational ideas and inventions, uses a spear-phishing attack by creating a believable email containing malware and sending it to an executive, who thinks the email is legitimate and opens it, activating the malware. What is the hacker's goal?

Answers

The hacker's goal is to infiltrate the system by making their victims see reasons or believe that they will help them to handle or resolve their specific problems.

What is a spear phishing attack?

Spear phishing” is known to be a form of phishing goal that is said to often targets a particular person or group and it is one that do include information that is well known to be of interest to the target.

Note that the hacker's goal is to infiltrate the system by making their victims see reasons or believe that they will help them to handle or resolve their specific problems.

Learn more about Spear phishing from

https://brainly.com/question/13202003

#SPJ1

Many programmers think object-oriented programming is a superior approach to procedural programming. Others think it adds a level of complexity that is not needed in many scenarios. Find and summarize arguments on both sides. With which side do you agree

Answers

I agree with the programmers who think object-oriented programming is a superior approach to procedural programming.

Why is OOP better than procedural programming?

In terms of Security, Object-oriented programming is said to have more of a secure based than procedural programming, due to the level of abstraction or that is due to data hiding property.

Note that  It hinders the access of data to any member functions of the same class and one cannot see a thing like that such as data hiding in the procedural programming framework.

Learn more about object-oriented programming  from

https://brainly.com/question/12342989

#SPJ1

In cell H5, create a formula to divide the value in cell F5 by cell F12 using relative cell references.

Answers

The Excel formula to enter in cell H5 using the relative style of cell referencing is = F5/F12

What are Excel formulas?

Excel formulas are expressions or equations used alongside Excel functions to perform arithmetic and logical formulas for computation.

How to create the Excel formula to enter in cell H5?

From the question, we understand that we are to make use of the relative style of referencing

This means that we make use of the cell name as it is, without adding the  "$" sign, as it is in absolute style of cell referencing and mixed style of cell referencing

So, we make use of cell F5 as F5 and we make use of cell F12 as F12

The value in cell F5 divided by cell F12 using relative cell references is represented as:

F5 divided by F12

Rewrite the above formula as follows:

F5/F12

Excel formulas begin with the "=' sign

So, the above formula becomes

= F5/F12

Hence, the Excel formula to enter in cell H5 using the relative style of cell referencing is = F5/F12

Read more about Excel formulas at:

brainly.com/question/1285762

#SPJ1

The _________________ can be used to repair common causes of unbootable operating systems. It is based on the Windows Preinstallation Environment (Windows PE).

Answers

The Windows Recovery Environment (Windows RE or WinRE) can be used to repair common causes of unbootable operating systems. It is based on the Windows Preinstallation Environment (Windows PE).

What can be used to repair common causes of unbootable operating system?

The use of the Windows Recovery Environment (WinRE) is known to be a kind of tools that is often used in the recovery environment that is said to often helps in the repair of the common issues of unbootable operating systems.

Hence, The Windows Recovery Environment (Windows RE or WinRE) can be used to repair common causes of unbootable operating systems. It is based on the Windows Preinstallation Environment (Windows PE).

Learn more about operating systems from

https://brainly.com/question/22811693

#SPJ1

You wish to use your personal laptop computer at work, but the it department folks will not allow this. the likely reason is that ______.

Answers

Answer: Your non-work related use of a laptop could increase vulnerability.

Explanation: Vulnerability is one of the most important and stressed out section in IT, so it's best to decrease that possibility whenever!

I hope this helps!

Your team at amazon is overseeing the design of a new high-efficiency data center at hq2. a power grid need to be generated for supplying power to n servers. all servers in the grid have to be connected such that they have access to power. the cost of connections between different servers varies. assume that there are no ties, names of servers are unique, connections are directionless, there is at most one connection between a pair of servers, all costs are greater than zero, and a server does not connect to itself. write an algorithm to minimize the cost of connecting all servers in the power grid. input two arguments - num, an integer representing number of connections. connectons, representing a list of connections where each element of the list consists of two servers and the cost of connection between the servers. note: the cost of connection between the servers is always greater than 0.

example input num = 5 connection = [[a,b,1], [b,c,4], [b,d,6], [d,e,5], [c,e,1]]

output [[a,b,1], [b,c,4], [c,e,1], [d,e,5]]

Answers

Answer:

void print2(int row) {

for (int i = 0; i < row; i++) {

 char ch = 'a';

 char print = ch;

 for (int j = 0; j <= i; j++) {

  cout << print++;

 }

 cout << endl;

}

}

int count_digits(int num) {

int count = 0;

int temp = num;

while (temp != 0) {

 temp = temp / 10;

 count++;

}

return (num % count);

}

Explanation:

2023 murano’s available intelligent awd adjusts the ________ to help maintain cornering control.

Answers

2023 Murano's available intelligent awd adjusts the Torque delivered to the wheels to help maintain cornering control.

How does torque moves wheels?

The torque from the engine is known to be that tool that moves a car. A lot of torque can be transferred to the wheels in first gear and it is better than in fifth gear.

Hence, 2023 Murano's available intelligent awd adjusts the Torque delivered to the wheels to help maintain cornering control.

Learn more about cornering control from

https://brainly.com/question/17371984

#SPJ1

(a). suppose you are going to transmit a packet over osi network model. explain the working of router, gateway and switch. which device will be used if you face an issue of weak signals during transmission? also, mention on which level of osi model these devices will work efficiently. (b). attenuation, distortion and noise are the causes of transmission impairment. what would be the solution or how these causes can be improved.

Answers

Answer:

Step 1:

OSI stands for Open Systems Interconnection.

OSI model was developed by the International Organization for Standardization(ISO). It is a reference model for how applications communicate over a network. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.

The OSI model can be considered as a universal language for computer networking. It is based on the concept of divide and conquers, it splits up the communication system into 7 abstract layers, and the layer is stacked upon the previous layer.

Layers of OSI Model:

OSI model has seven layers which are as follows:

The Physical LayerThe Data Link LayerThe Network LayerThe Transport LayerThe Session LayerThe Presentation LayerThe Application Layer

Step 2

Routers – A router is a device like a switch that routes data packets based on their IP addresses. Router is mainly a Network Layer device. Routers normally connect LANs and WANs together and have a dynamically updating routing table based on which they make decisions on routing the data packets. Router divide broadcast domains of hosts connected through it.

Gateway – A gateway, as the name suggests, is a passage to connect two networks together that may work upon different networking models. They basically work as the messenger agents that take data from one system, interpret it, and transfer it to another system. Gateways are also called protocol converters and can operate at any network layer. Gateways are generally more complex than switch or router.

Switch – A switch is a multiport bridge with a buffer and a design that can boost its efficiency(a large number of ports imply less traffic) and performance. A switch is a data link layer device. The switch can perform error checking before forwarding data, that makes it very efficient as it does not forward packets that have errors and forward good packets selectively to correct port only. In other words, switch divides collision domain of hosts, but broadcast domain remains same.

Which device will be used if you face an issue of weak signals during transmission.

Router device will be useful mostly for issue of weak signals during transmissin.

Mention on which level of OSI model these devices will work efficiently.

All these three devices router, gateway and switch work efficiently at hardware layers such as physical layer, datalink layer and network layer.

Step 3

Transmission impairment:

In the data communication system, analog and digital signals go through the transmission medium. Transmission media are not ideal. There are some imperfections in transmission mediums. So, the signals sent through the transmission medium are also not perfect. This imperfection cause signal impairment.

It means that signals that are transmitted at the beginning of the medium are not the same as the signals that are received at the end of the medium that is what is sent is not what is received. These impairments tend to deteriorate the quality of analog and digital signals.

There are three main causes of impairment are,

Attenuation

Distortion

Noise

1.Attenuation:

Here attenuation Means loss of energy that is the weaker signal. Whenever a signal transmitted through a medium it loses its energy, so that it can overcome by the resistance of the medium.

That is why a wire carrying electrical signals gets warm, if not hot, after a while. Some of the electrical energy is converted to heat in the signal.

Amplifiers are used to amplify the signals to compensate for this loss.

2.Distortion:

If a signal changes its form or shape, it is referred to as distortion. Signals made up of different frequencies are composite signals. Distortion occurs in these composite signals.

Each component of frequency has its propagation speed traveling through a medium and therefore, different components have different delay in arriving at the final destination.

It means that signals have different phases at the receiver than they did at the source.

3. Noise:

Noise is another problem. There are some random or unwanted signals mix up with the original signal is called noise. Noises can corrupt the signals in many ways along with the distortion introduced by the transmission media.

Noise may be divided into four categories:

Thermal noiseIntermediation noiseCrosstalkImpulse noise

When we determine the age of the universe using the Hubble Time, what important simplifying assumption goes into our calculations

Answers

The factor that is important in simplifying assumption that goes into our calculations is:

Option a. that the expansion of the universe has been happening at the same rate - neither speeding up or slowing down.What is Hubble time?

The Hubble time is  known to be a form of an estimate that is given to the age of the universe and it is one that is often based on the Hubble constant.

Note therefore, The factor that is important in simplifying assumption that goes into our calculations is:

Option a. that the expansion of the universe has been happening at the same rate - neither speeding up or slowing down.

See full question below

When we determine the age of the universe using the Hubble Time (1/H0), what important simplifying assumption goes into our calculations?

a. that the expansion of the universe has been happening at the same rate - neither speeding up or slowing down

b. that all the galaxies are moving away from us at exactly the same speed, no matter how far away they are

c. that the cosmological principle doesn't hold: the universe is not isotropic and homogeneous

d. that we have accounted correctly for the effects of dark energy e. that the universe is actually contracting instead of expanding

Learn more about assumption from

https://brainly.com/question/2875871

#SPJ1

An object with a density of 871.0 kg/m3 and a mass of 1255.0 kg is thrown into the ocean. Find the volume that sticks out of the water.

Answers

The object can only stick out of the water because of the Archimede's principle.

What is the Archimede's principle?

Archimedes' principle states that the buoyant force acts vertically and upwards on bodies totally or partially immersed in fluids, moreover, according to this principle, such force has the same value as the weight of the fluid, displaced by the insertion of the body.

With that being said, following the Archimede's principle:

Weight of water displaced by floating object = Weight of object; so

Volume of water displaced = Part below water line; changing values and using the pseawater = [tex]1024kg/m^{3}[/tex]:

[tex]\frac{m}{\rho} \\\\\frac{1255}{1024} = 1,2255859375m^{3}[/tex]

Volume of entire object = [tex]\frac{m}{\rho}[/tex]

[tex]\frac{1255}{871} = 1,4408725603m^{3}[/tex]

Volume that sticks out of the water: Volume of entire object - Volume of water displaced; so: 1,4408725603 - 1,2255859375 = 0,2152866228m3

See more about buoyancy at: brainly.com/question/19168433

#SPJ1

A _______ engine is a specialized program that assists you in locating information on the web and the internet.

Answers

Answer:

search

Explanation:

A search engine is a type of software that is used to carry out web searches. It works by "crawling" through the World Wide Web one web page at a time and indexing the pages.

The cell tower’s base transmission station is connected to a mobile ____ station.

Answers

The cell tower’s base transmission station is connected to a mobile switching station.

What is a switching station?

A switching station is known to be a kind of a substation that is known to be without transformers and it is one that often operate  only based or at a single voltage level.

Note that Switching stations are known to be often used as collector and they also acts as a distribution stations.

Hence,  The cell tower’s base transmission station is connected to a mobile switching station.

Learn more about transmission station from

https://brainly.com/question/1312500

#SPJ1

Why are digital computers more popular these days?​

Answers

Answer:

The small size of the transistor, its greater reliability, and its relatively low power consumption made it vastly superior to the tube.

Because people can easily use it to browse, read and play games. It is also a way for others to communicate

The command-line interface tells a user that it's ready to receive commands by displaying a specific set of characters called a(n) _____

Answers

Answer:

it's called the prompt, mean yeah

Canvas allows instructors to utilize powerful edtech apps to create dynamic learning environments for their students. In canvas, apps are identified as.

Answers

In canvas, apps are identified as:

LTIs External Tools

What are Canvas External Tools?

An External Tool is one that helps Canvas users along with the use of LTI learning resources and activities gotten from other websites and academic technologies.

Note that Canvas is known to have a unique features that are said to be available so that one can link to courses such as external tools.

Hence,  In canvas, apps are identified as:

LTIs External Tools

Learn more about Canvas from

https://brainly.com/question/5527678

#SPJ1

For the IPv4 CIDR address 153.10.22.56 /22 What is the... Netmask: [ Select ] Network Address: [ Select ] Host Mask: [ Select ] Broadcast Address: [ Select ] Number of possible hosts: [ Select ] Host Number: [ Select ]

Answers

Netmask:

The netmask is calculated by putting the number of 1’s equal to the given mask value (here 22).

Netmask = 11111111.11111111.11111100.00000000

= 255.255.252.0

Therefore, the netmask is equal to 255.255.252.0

Network Address:

The network address is obtained by performing the AND operation of the bits in the given IP address with the bits of the netmask.

IP address (153.10.22.56) = 10011001.00001010.00010110.00111000

Netmask (255.255.252.0) = 11111111.11111111.11111100.00000000

Network address = 10011001.00001010.00010100.00000000

= 153.10.20.0

Therefore, the network address is equal to 153.10.20.0

Host Mask:

The remaining or the unused bits in the netmask are used as the host mask. In other words, the host mask is obtained by complementing each bit of the netmask.

Netmask = 11111111.11111111.11111100.00000000

Host mask = 00000000.00000000.00000011.11111111

= 0.0.3.255

Therefore, the host mask is equal to 0.0.3.255

Broadcast address:

The broadcast address is used to send the packages to all the hosts in the network. It is obtained by setting all the bits after the network address to 1.

Network address (153.10.20.0) = 10011001.00001010.00010100.00000000

Broad cast address = 10011001.00001010.00010111.11111111

= 153.10.23.255

Therefore, the broadcast address is equal to 153.10.23.255

The number of possible hosts:

The number of possible hosts is computed as follows:

Possible hosts = 2n, where n is the number of host bits.

Out of the above 2n hosts, 2 are reserved and hence the number of usable hosts is equal to 2n – 2.

Number of hosts = 210 – 2 = 1024 – 2 = 1022

Host number:

Host number is the decimal equivalent of the host bits in the IP address.

Ip address (153.10.22.56) = 10011001.00001010.00010110.00111000

Host bits = 10.00111000

Host number = 29 + 0 + 0 + 0 + 25 + 24 + 23 + 0 + 0 + 0

= 512 + 32 +16 + 8

= 568

Hence, the host number is equal to 568.

See more abou computing at: brainly.com/question/14971369

#SPJ1

A touch screen _____.

Answers

A touch screen is known to be a kind of a display device that gives room for its users to be able to interact with a computer through the use of their finger or stylus.

What is a Touch Screen?

Touch screen are regarded as output device as a person can be able to touch and  use screen that displays the content in their mobile.

Hence, A touch screen is known to be a kind of a display device that gives room for its users to be able to interact with a computer through the use of their finger or stylus.

Learn more about touch screen from

https://brainly.com/question/17654061

#SPJ1

Javascript is an object-based programming language that involves working with the properties and methods associated with objects.
a) True
b) False

Answers

Answer:

True

Explanation:

You can set variables and make method functions.

Other Questions
According to Darcy's Law, soil water flow is faster when: a. Soil water content increases b. Matric potential of the soil increases There is a higher proportion of clay particles d. the hydraulic conductivity of the soil decreases The zone of inhibition is used as part of the Kirby Bauer test is critical for determination of the sensitivity or resistance to antibiotics. But why doesnt the antibiotic just keep diffusing and inhibit growth all over the plate? More specifically, what is going on at the edge of the zones? Why do cells grow on one side of the zone, but not the other? if the small gear of radius 7 inches has a torque of 225 n-in applied to it, what is the torque on the large gear of radius 21 inches? 1. Consider the following linear programming problem:Min A + 2Bs.t.A + 4B 212A + B 73A + 1.5B 21-2A + 6B 0A, B 0a. Find the optimal solution using the graphical solution procedure and the value of the objective function.b. Determine the amount of slack or surplus for each constraint.c. Suppose the objective function is changed to max 5A + 2B. Find the optimal solutionand the value of the objective function. A pair of shoes is on a sale for 45% off the original price. The original price is $38.00. What is the sale price? how many grams of o2 are required to produce 100. g of so2? fes2 o2 -----> fe2o3 so2 6A population of animals feeds entirely on plants. Some of these animals are good at digesting Plant A, while others are good atdigesting Plant B, and others are good at digesting Plant C.Plant APlant BPlant CWhat might be an advantage of a single population of animals having a large amount of variability surrounding certain traits? What are the three most important criteria in airline risk selection? Which of the following observations pertaining to the EU's Court of Justice is incorrect? A. It is comprised of one judge from each country. B. It is the supreme appeals court for EU law. C. Its judges are required to act as representatives of national interests. D. A member country can bring other members to the court for failing to meet EU treaty obligations. Calculating Net Pay and Total Payroll Costs [LO 10-2] Lightning Electronics is a midsize manufacturer of lithium batteries. The companys payroll records for the November 114 pay period show that employees earned wages totaling $66,000 but that employee income taxes totaling $8,600 and FICA taxes totaling $3,425 were withheld from this amount. The net pay was directly deposited into the employees bank accounts. 1. What was the amount of net pay? 2. Assuming Lightning Electronics must also pay $410 of unemployment taxes for this pay period, what amount would be reported as the total payroll costs? 14. the most successful innovator in the american musical for the past thirty-plus years has been: a). stephen merman b). stephen sondheim c). stephen schwartz d). stefan brecht A mass attached to a spring is in simple harmonic motion of amplitude A and amplitude 2A, what i total energy of the new motion? A) E/4 B) E/2 C) E D) 4E E) 2E During 2016, Miller, Inc.s net income was $800,000. Its common stockholders equity was $2,800,000 at January 1, 2016 and $3,600,000 at December 31, 2016. During December 2016, Troys board of directors declared a $300,000 preferred stock dividend and a $240,000 common stock dividend. What is Millers 2016 return on common stockholders equity? A. 21.9% B. 8.1% C. 15.6% D. 25.0% Can someone please help me ASAP?? Its due today!! I will give brainliest If Its correct. Which of the following would have made some landowners sell their property nearSpindletop in Beaumont, Texas, in January, 1901? A gas sample at STP contains 1.42 g oxygen and 1.84 g nitrogen. What is the volume of the gas sample?. O2:59 L O158L O 518L 0 7661 Following are the given data for Bank A. It is assumed that the profit margin of bank is derived from the rate-sensitive assets and liabilities only. The current interest rate in market is 13%, but it is estimated to fall by 1%. With a view of integrated bank management, show how changes in interest rates affect the ROE of banks. Interpret the change in ROE due to the change in interest rate.AROE of Bank decreased due to changes in interest rate.BROE of Bank had no effect due to changes in interest rate.CROE of Bank is zero to changes in interest rate.DROE of Bank increased due to changes in interest rate. how are executive functions related to behavioral patterns of individuals with autism spectrum disorder? predator and prey populations appear to ? directly control each other, be largely independent of each other, cycly in relation to each other Electrolytic Cells and the Determination of Avogadros Number What are some possible sources of error in this experiment? Would solid sodium chloride conduct electricity? And why. What did you notice about the solution as the experiment proceeded?