You are assembling components in a network rack and need a device that connects three network segments. Which of the following devices will meet your networking needs?Wireless controllerEthernet patch panelEthernet switchEthernet router

Answers

Answer 1

You are assembling components in a network rack and need a device that connects three network segments. Ethernet router devices will meet your networking needs.

Devices known as Ethernet Routing Devices provide for full connectivity between more than two hosts on an Ethernet network without the need for more than one network interface card on any one host (NIC). Each NIC has a direct connection to the router, which controls the data flow on the network. Even bigger Ethernet networks can be built by connecting multiple routing devices together in the same way.

A Switch and an Ethernet Router are extremely similar, but an Ethernet Router has more features. It scans the destination address from each incoming data packet, just like a switch, and only transmits it to that NIC. Similar to a switch, a router performs this selective forwarding by storing the IP address and corresponding MAC address for each NIC in a routing table.

To know more about Ethernet router:

https://brainly.com/question/29982740

#SPJ4


Related Questions

What types of E&M services were identified as the top three CERT errors in E&M servicecategories? What did these errors consist of?

Answers

The Comprehensive Error Rate Testing (CERT) program is described in this instructional guide, which was created by the CERT A/B MAC Outreach & Education Task Force to inform clinicians on how to write medical records correctly and persuasively.

The CERT program was put in place by the Centers for Medicare & Medicaid Services (CMS) to track erroneous payments made under the Medicare Fee-for-Service (FFS) program.

This tool examines a random sample of all Medicare FFS claims to evaluate whether the provider or supplier who submitted the claim by letter had supporting documentation. Professionals in the medical review then examine the submitted documentation to determine whether the claim was appropriately paid or refused.

To guarantee that claims are supported as billed, providers must submit sufficient proof.

To learn more about CERT the given link:

https://brainly.com/question/3449068

#SPJ4

Each of the following are advanced strategies you may use to help you conduct a search on the internet except _____. Using a wild card in your search trying a different search engine doing a boolean search entering keywords into a web crawler.

Answers

Each of the following are advanced strategies you may use to help you conduct a search on the internet except entering keywords into a Web crawler .

Correct answer: letter D.

Other advanced strategies include using a wild card in your search, trying a different search engine, and doing a Boolean search. These strategies can help you narrow down the results of your search and make it easier to find the information you are looking for.

Entering keywords into a web crawler is not an advanced strategy to help you conduct a search on the internet.

Learn more about keywords :

https://brainly.com/question/26355510

#SPJ4

which tcs unit is designed specifically to help in building rapid prototypes

Answers

The "TCS IgnioDevOps" unit is specifically designed to assist in building rapid prototypes. It provides tools, methodologies, and practices to enable quick development and deployment of prototypes for testing and validation purposes.

TCS IgnioDevOps is a unit within TCS (Tata Consultancy Services) that focuses on enabling DevOps practices and methodologies for efficient software development and delivery. It offers a comprehensive suite of tools, frameworks, and services designed to streamline the software development lifecycle and foster collaboration between development and operations teams.

IgnioDevOps encompasses various aspects such as continuous integration, continuous delivery, infrastructure automation, configuration management, and monitoring.

By leveraging automation, DevOps principles, and agile methodologies, TCS IgnioDevOps aims to accelerate development cycles, improve software quality, enhance collaboration, and enable the rapid delivery of applications, thereby supporting organizations in building and deploying prototypes more efficiently.

Learn more about prototypes  here:

https://brainly.com/question/29784785

#SPJ12

What is the delay of a 64 byte data packet sent over a 50 meter 2Gb connection?I converted 64 bytes to gigabit to solve this which is______.

Answers

The bandwidth is 10Mbps, and data packets can be sent continuously.

What is bandwidth?

Network bandwidth is a term used to describe the maximum speed at which data can be transmitted over a wired or wireless communications link. The amount of bits, kilobits, megabits, or gigabits that can be transmitted in a second is the standard unit of measurement for bandwidth. Data transfer rate is referred to by the term bandwidth, which is synonymous with capacity. Contrary to popular belief, bandwidth is not a measure of network speed.

A data connection can send and receive more data at once if it has more bandwidth. The amount of water that can theoretically flow through a pipe can be compared to bandwidth. More water can flow through a pipe at once if its diameter is larger. The same idea underlies how bandwidth functions.

To know more about bandwidth, click the link given below:

https://brainly.com/question/28436786

#SPJ4

a(n) provides a detailed description of all tables found within the user/designer-created database.

Answers

A(n) data dictionary provides a detailed description of all tables found within the user/designer-created database. Data dictionary is used as entralized repository of information about data.

In computer and technology, A data dictionary also known as metadata repository generally can be described as a "centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format". The definition of data dictionary refers to the IBM Dictionary of Computing. In the other side, Oracle also defines it as a collection of tables with metadata. Generally  a data dictionary is a centralized metadata repository.

Here you can learn more about data dictionary https://brainly.com/question/14960489

#SPJ4

How do you draw a line in CodeHS?

Answers

rect(x, y, w, [h]) uses the x, y, width, and height to draw a rectangle on the screen. line(x1, y1, x2, y2) creates a line on the screen (a straight line connecting two points).

What is CodeHS line?The name of your function must be horizontalLine. You should receive a horizontal line of length 200 starting at position 100 if you call, for instance, horizontalLine(100, 200). Keep in mind that you can draw a line with a larger pen size OR use the advanced circle command (circle(radius, extent)) to create a circle with a curved end. Using the begin fill() command before Tracy starts moving and the end fill() command after the shape has been drawn, you may fill in your shape.In several languages, including JavaScript, the newline character is written as n. To add a new line to a string, simply add the character n whenever one is necessary.

To learn more about CodeHS line, refer to:

https://brainly.com/question/25979913

#SPJ4

6. (10 pts) what is wrong with the following code? how should it be fixed? 1 public class h2classg { 2 final int x; 3 4 h2classg () {} 5 h2classg (int a) {x = a;} 6 } // end class h2classg

Answers

The problem with the code is that the instance variable x is declared final but it's not initialized in the default constructor (h2classg () {}). This results in a compile-time error.

How to correct the given the code?

To fix the code, initialize x in the default constructor:

public class h2classg {

   final int x;

   h2classg () {

       x = 0;

   }

   h2classg (int a) {

       x = a;

   }

}

What is compile-time error?

A compile-time error, also known as a syntax error, is an error that occurs when a program is being compiled, indicating that the code written does not follow the rules of the programming language and cannot be executed.

Compile-time errors prevent a program from being executed and must be fixed before the program can be compiled successfully.

To learn more about compile-time error, visit: https://brainly.com/question/27286142

#SPJ4

TRUE/FALSE. a computer that is part of the workgroup can exist on the same network but is not authorized to access the domain resources.

Answers

Answer: False

Explanation:

Would an "index of accessibility to radial highways" be considered discrete numerical data or ordinal categorical data?

Answers

An "index of accessibility to radial highways" would typically be considered ordinal categorical data, as it is an ordering of categories.

Why an index of accessibility to radial highways?

An "index of accessibility to radial highways" is ordinal categorical data because it is a classification of categories (e.g., very accessible, moderately accessible, slightly accessible, not accessible) rather than a numerical measurement that can be used to perform mathematical operations like addition, subtraction, multiplication, and division.

An index of accessibility to radial highways is a classification of accessibility levels into categories, rather than a numerical value, making it ordinal categorical data. It is a ranking system, not a continuous measurement that can be used in mathematical operations.

To learn more about data, visit: https://brainly.com/question/179886

#SPJ4

How do you mitigate risk in security?

Answers

Mitigate risk in security are ; Identify risks,Assess the risks, Develop a risk management plan,Implement the plan,Monitor and review,Train personnel,Implement security controls.

What is the Implement ?

Implementation is the process of carrying out a plan or policy. It involves putting into action a plan, idea, model, design, or policy so that it will become a reality. It involves the execution of the steps necessary to realize the desired end goal. Implementation is a critical part of the process of turning ideas into reality. It requires the coordination of people, resources, and activities to ensure that the plan is carried out effectively and efficiently. It also involves monitoring progress and making adjustments as needed. The success of implementation relies on proper planning and execution.

To learn more about Implement

https://brainly.com/question/26986135

#SPJ4

Mariel types a sentence. She then decides to include that sentence four more times. She then decides she only
wants the sentence three more times, but changes her mind again to include the last sentence. Which commands
could have been used by Mariel? Check all that apply.
More Symbols
Insert Symbol
Undo
Redo
Repeat

Answers

The commands that could have been used by Mariel are:

UndoRedo

What is an Undo Command?

This refers to the command that is used in a computer environment to remove the last action done and this is usually used in word processing and this is done by pressinf Ctrl + Z which then undoes the action.

Hence, because Mariel typed the sentence and then wants to removes some things and then wants to include the last sentence, she probably used redo and undo commands.

Read more about undo commands here:

https://brainly.com/question/6413908

#SPJ1

t/f it’s best practice to convert to srgb when saving for the web unless you have a specific reason not to.

Answers

Yes, it is true that one should convert image to sRGB when saving for the web unless you have a specific reason not to. The majority of devices can only reproduce colours from the sRGB colour space because it is the colour space that is used on the web.

For this reason, before exporting your finished modifications for the web, you should convert them to sRGB.

You might have seen different colour profile settings when using applications like Adobe Lightroom or Photoshop (also known as working spaces or colour spaces). In actuality, there are 16 possibilities available when you start a new document in Photoshop or select Edit > Color Settings > Working Spaces > RGB. But the top three options are as follows:

sRGBFlash RGB (1998)RGB ProPhoto

To achieve the finest colour representation of your image for the eyes of your visitors, you will need to choose one, but which one you select will rely on a number of factors.

To learn more about image click here:

brainly.com/question/13490668

#SPJ4

an employee reports that the antivirus software cannot obtain updates. the support technician notices that the license for the software has expired. the technician adds a new license to the software and completes the update service. what should the technician do next?

Answers

Document each test that was tried.

What stages should a troubleshooting procedure on a customer’s machine take?

Make a data backup. A technician implements a series of recommended fixes to a workstation computer problem after reviewing the manufacturer’s documentation.

Determine the issue.

Create a likely cause theory.

To discover the reason, put the theory to the test.

Make a plan of action to solve the problem and put it into action.

Verify complete system operation and, if necessary, put preventative measures in place.

The stages are as follows: identify the problem, develop a hypothesis of probable cause, test the theory, develop a plan (including any consequences of the plan), implement the plan, validate complete system operation, and record everything.

To learn more about  troubleshooting to refer;

https://brainly.com/question/30048504

#SPJ4

What are the symbols for the elements with the following valence electron configurations.

Answers

The symbols for the elements with the following valence electron configurations are:

s²:

Be: BerkeliumMg: MagnesiumCa: CalciumSr: StrontiumBa: BariumRa: Radium

The symbol of an element corresponds to the number of protons in the nucleus of the atom, which determines the element's atomic number.

Here are some elements with their respective valence electron configurations:

1 valence electron: Hydrogen (H)

2 valence electrons: Helium (He)

3 valence electrons: Lithium (Li)

4 valence electrons: Beryllium (Be)

5 valence electrons: Boron (B)

6 valence electrons: Carbon (C)

7 valence electrons: Nitrogen (N)

8 valence electrons: Oxygen (O)

9 valence electrons: Fluorine (F)

10 valence electrons: Neon (Ne)

The complete question is shown below.

What are the symbols for each of the elements with the following valence electron configuration s²?

Be, Mg, Ca, Sr, Ba, Ra.

Here you can learn more about valence electron configurations

brainly.com/question/14331305

#SPJ4

Write a program that prompts the user to enter 3 names. Store each name in a separate variable. Then display the names back to the user in every possible order. Print the first three combinations all on one line separated by commas. Print the second three combinations with one name per line

Answers

Here is a program in Python that implements this requirement:

# Prompt the user to enter 3 names

name1 = input("Enter the first name: ")

name2 = input("Enter the second name: ")

name3 = input("Enter the third name: ")

# Store the names in a list

names = [name1, name2, name3]

# First three combinations all on one line separated by commas

print(name1 + ", " + name2 + ", " + name3)

print(name1 + ", " + name3 + ", " + name2)

print(name2 + ", " + name1 + ", " + name3)

# Second three combinations with one name per line

print(name2 + ", " + name3 + ", " + name1)

print(name3 + ", " + name1 + ", " + name2)

print(name3 + ", " + name2 + ", " + name1)

This program will prompt the user to enter three names, store each name in a separate variable, and then display the names back to the user in every possible order. The first three combinations are displayed all on one line separated by commas, and the second three combinations are displayed with one name per line.

You can learn more about Python here brainly.com/question/30427047

#SPJ4

What are the characteristics of a progressive dimensioning system in engineering drawing

Answers

We shall discover what dimensions are in this post, along with the many dimensioning systems that are employed in engineering drawings.

What does engineering drawing progressive dimensioning mean?

Running parallel dimensions or progressive dimensioning are not practical when there is a lack of space. In these situations, overlaid running dimensioning, a more straightforward method, can be utilized to utilise the dimensions.

What does "progressive dimensioning" mean to you?

It uses a streamlined dimensioning method and controls cumulative mistake. It has a single origin and only has arrowheads that point in one direction. This can be utilized in situations with little space and no issues with legibility.

To know more about progressive dimensioning visit:-

https://brainly.com/question/3882192

#SPJ1

Select all of the following ways you can calculate percentages of normal populations between 2 values. a. z-tables b. Excel c. Slide rule d. Some Calculators e. Mean Tables

Answers

Z-tables and M-tables can be used to calculate the normal population percentages that differ between two values. As a result, options A and E are the correct ones.

Why are Z-Tables useful?

By minimizing the I/O utilization and CPU cycle consumption inherent with database access, the IBM Z Table Accelerator is a piece of software that aids businesses in enhancing the efficiency of their mainframe programs. Your applications are optimized by the IBM Z Table Accelerator using indexes and in-memory access strategies.

The total set of "less-than" probabilities can be calculated using the z-score formula for a wide range of z-values.

To know more about IBM, visit:

https://brainly.com/question/17355332

#SPJ1

what is dijkstra's two-stack algorithm used for?

Answers

It takes an infix expression as input and uses two stacks, one for the operands and one for the operator, to create a correctly ordered postfix expression that can be easily evaluated.

What is Dijkstra's two-stack algorithm?

Dijkstra's two-stack algorithm, also known as the Marshalling Yard Algorithm, is used to parse mathematical expressions written in infix notation and convert them to equivalent expressions in postfix notation (RPN).

The Dijkstra algorithm is a one-source shortest path algorithm. Single source here means that only one source is specified and the shortest path from the source to all nodes must be found.

To know more about Algorithm visit:

https://brainly.com/question/22984934

#SPJ4

unfortunately, there are some bad news for you. around several months ago i have obtained access to your devices that you were using to browse internet. subsequently, i have proceeded with tracking down internet activities of yours.

Answers

This email scam known as Phishing tries to trick you into believing that your computer or email has been compromised before demanding money or else sending compromising information to all of your friends and family.

The links and attachments that are included in the email body may contain malware. We advise you to disregard the email's contents and remove it from your Inbox.

Scammers may use one of your passwords in this email in order to make the threats seem more legitimate.

If the password that was sent to you via email is one that you still use, change it RIGHT AWAY. Additionally, anytime two-factor authentication is an option, you should turn it on for your online and email accounts.

If you believe your computer may be infected with malware as a result of downloading any attachments or clicking any links in this email, you can scan it with Malwarebytes and get rid of the infection for free.

To learn more about Phishing click here:

brainly.com/question/30051494

#SPJ4

what do coding constructs in blocks look like in text-based languages?

Answers

The programming language uses drag-and-drop using block coding, which turns text-based code into visual blocks. Each block contains actual code, and when they are put together, they create animations and games.

Because they are syntax and semantics, programming language discussion and use are independent of any particular tool. Since they don't have access to computers for computer science lessons, many students in India learn to code C and Java on chalkboards.

In light of this, we shouldn't refer to Scratch as a block-based programming language because the language has nothing to do with the editor.

Programming languages can be studied and used without the use of any particular tool due to their syntax and semantics. In India, many students instead learn C and Java on chalkboards since they lack computers on which to study CS.

To learn more about Programming language click here:

brainly.com/question/13563563

#SPJ4

in a windows environment how many hops

Answers

In response to your inquiry, the IP packet should arrive at its destination after 30 hops.

The TTL reported by ping represents the packet's actual final TTL at the destination. Subtract the initial TTL of a packet (which is always 255) from the TTL that ping reports to determine how many hops it travels. To update just the modified computer policies, enter gpupdate /target: computer in the Command Prompt window and hit Enter. Instead of the previous command, enter gpupdate /target: computer /force to update all computer policies. In computer networking, the word "hop" describes how many routers a packet—a chunk of data—passes through on its way from its source to its destination. A hop may occasionally be tallied.

To learn more about IP click the link below:

brainly.com/question/26230428

#SPJ4

What value of x will produce the output:HelloMikex = "A"if(x == "A"):print('Hello')else:print('Hi')print('Mike')

Answers

The value of x that will be produced as a result of the program would be any given input that is NOT "A"

What is an Output?

This refers to the result that is given in a computer interface and in this case, a programming input and this is the result that is gotten after all the conditions are met and the program executes.

From here, I can see that conditional statements "If else" is used and if the user inputs "A", it would print "Hello", but the output is "Hello Mike" and this is shown because an input that is NOT "A" was put.

Read more about programming outputs here:

https://brainly.com/question/20727977
#SPJ1

What is virtual private network in network security?

Answers

The ability to create a secure network connection when using public networks is known as a virtual private network, or VPN.

What is meant by virtual private network?The ability to create a secure network connection when using public networks is known as a virtual private network, or VPN. Your internet traffic is encrypted by VPNs, which also mask your online identity. Third parties will find it more challenging to monitor your internet activity and steal data as a result.A virtual private network, or VPN, is an encrypted connection made between a device and a network via the Internet. Sensitive data is safely delivered thanks to the encrypted connection. It allows the user to work remotely and prevents unauthorized individuals from listening in on the traffic. Virtual private network, or VPN, is a service that helps you remain anonymous online.

To learn more about virtual private network refer to:

https://brainly.com/question/16632709

#SPJ4

Which options must be used with DISM to save changes to an image? (Choose all that apply.) A. /unmount-image. B. /commit. C. /mountrw. D. /mount-image.

Answers

a. /commit & b. /unmount-image In order to save modifications to an images, options must be used with DISM.

Visual representations of things are called images. It can communicate information visually in two dimensions, three dimensions, or in some other way. An artefact that resembles a subject can be an image, such as a photograph or other two-dimensional representation. An image is a dispersed amplitude of colour in the context of signal processing (s).

The word "picture" may specifically refer to a 2D image in optics.

To be a visual representation, an image does not need to utilise the complete visual system. Greyscale images, which rely solely on the visual system's sensitivity to brightness across all wavelengths and ignore colour, are a common illustration of this. An picture is still a visual representation of something in black and white.

Learn more about images here:

https://brainly.com/question/29752618

#SPJ4

Break and continue statements allow you to:
A. prevent flags.
B. control a sentinel value.
C. close loops.
D. alter the flow of a program.

Answers

Answer:

D: Alter the flow of a program

Explanation:

Break statements are used to terminate the current loop and resume execution at the next statement. Continue statements are used to skip over the part of a loop where an external condition occurs/is triggered, but will go on the complete the rest of the loops.

Therefore, the answer is D because both of these statements alter the flow of a program whether it is terminating or skipping.

which two cloud capabilities are combined to deliver sase? (choose two)
- Security as a Service;
- API as a Service;
- Network as a Service;
- Database as a Service;

Answers

Security as a Service; Network as a Service

The two cloud capabilities are combined to deliver sase are Security as a Service and  Database as a Service.

What is security as a service?

With security as a service (SECaaS), businesses may outsource cybersecurity management to a third party. Outsourced security solutions include functions including intrusion detection, antivirus administration, and data loss prevention.

What is Network as a Service?

Network as a Service (NaaS) is a flexible method of consuming enterprise network infrastructure that gives businesses the ability to keep up with innovation, adapt to quickly changing business needs, and enhance user experiences and network performance through a subscription model that is similar to the cloud.

What are the 2 main types of cloud services?

Infrastructure-as-a-Service (IaaS), platforms-as-a-Service (PaaS), and apps are the three primary categories of cloud computing services (SaaS).

Hence Security as a Service and  Database as a Service is a correct answer.

To know more about cloud services follow link https://brainly.com/question/13468612

#SPJ4

according to the systems viewpoint, what are three types of inputs?

Answers

According to the systems viewpoint, the three types of inputs are people, technology, and feedback.

These inputs are used to achieve the desired outcome and create the desired results. People provide the necessary skills, knowledge, and insights to create the desired output.

Technology provides the tools and resources for the system to function. Feedback provides information about the system performance and helps to identify areas of improvement.

This can include customer feedback, performance data, and other metrics. Additionally, people can use feedback to develop an understanding of how different components of the system interact with each other and how to make adjustments to achieve the desired outcome.

Learn more about systems viewpoint:

https://brainly.com/question/14588173

#SPJ4

Answer: Equipment, Money, People

Explanation:

assuming a data set with 2,306 training outcomes of which 895 are negatives, what is the entropy?

Answers

The entropy of the data set/database is 0.971 bits for a data set with 2,306 training outcomes of which 895 are negatives.

How to calculate entropy?

The entropy of a data set with 2,306 training outcomes, where 895 are negatives, can be calculated as follows:

Let's call the probability of a negative outcome p(neg) = 895/2306 and the probability of a positive outcome p(pos) = 1411/2306.

The entropy H can then be calculated as:

H = -p(neg) * log2(p(neg)) - p(pos) * log2(p(pos))

Plugging in the values:

H = -(895/2306) * log2(895/2306) - (1411/2306) * log2(1411/2306)

H = 0.971 bits

So the entropy of the data set is 0.971 bits.

To learn more about entropy, visit:

To learn more about data set/database, visit: https://brainly.com/question/25704927

#SPJ4

what event convinced netflix to switch to a cloud-based service?

Answers

When we had a significant database corruption in August 2008 and were unable to mail DVDs to subscribers for three days, that is when Netflix decided to start using the cloud.

What is software?

Software is defined as a group of guidelines, facts, or software used to run machines and carry out particular activities. The entirety of a computer system's programs, functions, and routines are collectively referred to as software.

A cloud-based utility is software that employs cloud application technology to give up-to-date information to all users while centrally storing data. The application is frequently accessed online or through an app, and the data is typically kept on distant servers.

Thus, a software product or service known as a cloud access security broker (CASB) sits in between a company's on-premises infrastructure and a cloud provider's infrastructure.

To learn more about software, refer to the link below:

https://brainly.com/question/29809198

#SPJ1

how to write a recommendation letter for a coworker?

Answers

I believe that [Name] is highly qualified for [role] and would be an asset to any organization. I highly recommend [Name] without reservation and wish them all the best in their future endeavors.

What is the reservation ?

Reservation is the act of reserving something for a particular person or purpose in advance. It is a form of pre-booking that is often used to secure goods, services, or tickets before they become available to the public. Reservation can be done in a variety of ways, including in person, over the phone, or online. When opting to reserve something, the person or organization reserves it exclusively and is given priority over any other customers or applicants who may be interested in the same item. Reservation is typically used to ensure that certain goods, services, or tickets are available when they are needed and can help to avoid disappointment when supplies are limited.

To learn more about reservation

https://brainly.com/question/30100711

#SPJ4

Other Questions
Art that simplifies forms of the visible world is known as ______. Select the correct answer from each drop-down menu. 7/5The area of the shaded square is 125 squared inches. The length of the unshaded rectangle is 75 inches. The estimated value of the length of the shaded square is Inches. The estimated value of the area of the unshaded rectangle issquare Inches what is the slope of the line tangent to the polar curve r=42 at the point where =4 ? What height is 6 2 in cm? ara sells apples at a farmers market she begins the day with 35 1/2 pounds of apples she sells half of the apples in the mornning 4/19 of the apples in the afternoon and 1/4 of the apples in the evening how many pounds of apples dose she have left A construction company ordered 45 wood beams for a new project. Altogether,the beams had a total length of 328.5 yd. If each beam was the same length,how long was each beam? Write your answer in feet.Use the table of conversion facts as necessary, and do not round your answer. (2 points) if p and q are predicates over some domain, and if it is true that x(p(x) q(x)), must xp(x) xq(x) also be true? explain. a cube has a volume of 1000 cm cube calculate the surface area of the cube by what mechanism would an increase in venous return increase stroke volume? There is a block on your desk that acts as a paperweight. Its measurements are 3 cm by 4 cm by 6 cm. The block has a mass of 184.32 g. What is the block made of? Explain why learning reduces the effective marginal cost of production.If firms set prices inproportion to their marginal costs, as suggested by the Economics Primer, how can learning firmsever hope to make a profit? what does heuristic mean? question 1 options:1) a function in Excel2) a randomly generated number3) an equation4) Rule of thumb how many cl- ions are there in 400.5 grams of alcl3? how much does 5 gallons of water weigh Ella is 88 years old and was living at home until very recently. Her children, who visited her regularly, noticed she was becoming more forgetful. At first, she mislaid objects, and then she began to forget her doctor's appointments. With time, her personality changed and she became withdrawn. At home she would forget to turn off the stove or leave the kettle on until it boiled dry. After seeking advice from a gerontologist and social worker, Ella's children placed her in a nursing home with a unit equipped for patients with Alzheimer disease.1. What is dementia? Why is Alzheimer disease based on a "diagnosis of exclusion"?2. What are the macroscopic and microscopic features of the brain that are typical in Alzheimer disease?3. One of Ella's children brought her a new pair of slippers to wear in the nursing home. A minute after she received them, Ella could not remember the exchange and asked what they were doing on her bed. What part of the brain has largely been affected to produce this behavior, and what is the pathophysiology involved? Which of the following points is closest to (4,0)?50 points each? determine the correct check digit for the upc 6-73419-23216-? (lego architecture set) Which of the following statements best describes how professionals use their specialized knowledge and skills? Professionals use their specialized knowledge and skills:- in service to others.- to advance their career.- for the exclusive benefit of their employers. Elena is a therapist assessing the needs of a family whose case she was just assigned. In interviewing the teenager, Vlad, she learns that Vlad is having sucidal thoughts. According to professional ethical guidelines, what is the BEST course of action for Elena to take? A. Elena must break confidentiality and inform Vlads parents and/or other authorities to ensure Vlads safety. B. Elena should try to talk Vlad out of his sucidal thoughts, and keep the conversation confidential. C. Elena should prescribe Vlad anti-depressants, and keep the conversation confidential. D. Elena must break confidentiality and tell Vlads high school teachers so they can watch him closely at school. Read the lines from The Elements of San Joaqun.When the season ends,And the onions are unplugged from their sleep,We wont forget what you failed to see,And nothing will healUnder the rains broken fingers.Which statement is a theme in this excerpt?A. Few Americans care about the seasonal workers, which harms them.B. Laboring in the fields causes serious physical injuries to most seasonal workers.C. The seasonal workers will remember their experiences throughout their lives.D. Most Americans understand how difficult life is for seasonal workers.