Why does a bus network need regular hubs if it is to cover very much ground?
1because otherwise the signal will fade out
2because otherwise the packets will bounce back and forth from end to end repeatedly
3because otherwise the signal-to-noise ratio will not be high enough
4because otherwise it would be a ring network

Answers

Answer 1

The answer is-

B.) because otherwise the packets will bounce back and forth from end to end repeatedly

Bus topology can be regarded as a kind of topology for a Local Area Network, it is one that has it's nodes connected to a single cable(backbone) and any break in the so called backbone, there will be failure in the entire segment. However a Terminator is usually attached to the end-points of a bus network so that the signal is absorbed by the Terminator and as a result of this the signal will not reflect back down the line. If there is no Terminator there would be bouncing back and forth of packet in an endless loop.It should be noted that a bus topology require a terminator because otherwise the packets will bounce back and forth from end to end repeatedly


Related Questions

Which answer choice correctly correlates the three pieces of data with their TCP/IP layers?
- Plece of data 1 has no footer, but it does have an IP address,
- Plece of data 2 has no headers.
Plece of data 3 has a footer.
1 is in the physical layer, 2 is in the transport layer, 3 is in the Internet layer.
1 is in the Internet layer, 2 is in the application layer, 3 is in the physical layer,
1 is in the transport layer, 2 is in the Internet layer, 3 is in the application layer,
1 is in the application layer, 2 is in the physical layer, 3 is in the transport layer,

Answers

Answer:

1 is in the application layer, 2 is in the physical layer, 3 is in the transport layer

Explanation:

The application layer is the upper layer, and it does not have a footer but it has an IP Address, and the physical layer its stream of bits, and it has neither header nor footer. And the transport layer has the footer and header both. Remember the destination address is attached as a part of the header with the data at the Datalink Layer, which carries details of all physical addresses, and the whole packet is converted to a stream of bits before it reaches the physical layer. And thus everything is encapsulated and converted in the form of bits only to be carried by the physical layer to the destination address, The NAT at router maps the legal public address, and the private address, which is the part of the internet LAN at the destination. This process is conducted at the host as well. You can check the HTTP of the application layer. It carries Header and IP address of the destination, but no footer. Ans it is data 1 here. And only layer here that has no header is the Physical layer, as all others have it. And all which are part of the middle layer, the network, and transport layer have footer but here, we only have the transport layer, and hence Data 3 is the Transport layer. And this gives us the correct option, and which is the fourth one.

Answer: number 1 is in the application layer, 2 is in the physical layer, 3 is in the transport layer

Explanation:

~Ban~

Which of the following definitions best sums up the study of geography?
A the study of biological processes in the human body
B. the study of financial processes and world economies
C. the study of world cultures and their impact on various social institutions
D. the study of the Earth's surface and the processes that affect each other
Please select the best answer from the choices provided.

Answers

C . The study of world cultures and their impact various social institutions

The study of the Earth's surface and the processes that affect each other. The correct option is D.

Thus, Geography is the study of the physical characteristics, environment, and ecosystems of the planet, as well as the interaction between human society and its surroundings.

Physical geography and human geography are the two main divisions used to classify the study of geography.

Human geography is the study of people, their environments, and their cultures on the surface of the globe. Physical geography is the study of the world's seasons, landforms, and environmental processes like the geosphere and biosphere.

Thus, The study of the Earth's surface and the processes that affect each other. The correct option is D.

Learn more about Geogrophy, refer to the link:

https://brainly.com/question/5359171

#SPJ7

20 POINTS!

Answer the following questions using the information you have learned: In your own words define fracking. What are the possible benefits and costs of fracking? Do you believe that the benefits are worth the risks to the environment?

Answers

Answer:

the process of injecting liquid at high pressure into subterranean rocks, boreholes, etc. so as to force open existing fissures and extract oil or gas.

users can resize a table in word 2016 by utilizing the anchor point in the__cornor of the table of the table

Answers

Answer:

Top left and bottom right

Explanation:

If you will look at the top left and the bottom right corner of the table, you will find the anchor point, and this anchor point can be used to resize the table. You can use any of these, and the table can be resized using these. Also, if you want to autofit the text, or table, in a two-column format, you need to use the Autofit text option. And your table and text inside will be autofitted to the column in which they are placed. This is quite useful when you prepare a research paper, in the two-column style of documentation. You can autofit to size almost anything, whether it is a table. images, videos, shapes or anything.

which of the following type of data might be used in an iot connected device


A weather data
B human created data
C both a and b
D neither a and b​

Answers

Answer:

D. neither a and b

Hope it will help you Champ....

Final answer:

IoT connected devices use both weather data and human-created data, serving functions ranging from environmental monitoring to health tracking, while also posing security and privacy concerns.

Explanation:

The type of data that might be used in an IoT (Internet of Things) connected device includes both weather data and human-created data. IoT devices leverage a variety of data sources to function and provide value. For instance, weather stations with embedded sensors gather environmental data such as temperature, sunlight, and precipitation, which are essential for IoT devices focused on climate monitoring or agriculture.

Similarly, human-created data, such as biometric data from devices like Fitbits or Apple Watches, are used to monitor health and fitness indices for personal benefit, as well as for corporate purposes like advertising and insurance premium adjustments.

Moreover, IoT security concerns arise as devices can sometimes control critical infrastructure or gather private information about individuals, underscoring the importance of robust security measures in IoT applications.

Which of the following is NOT a likely risk from driving in rural areas?
A. Distracting billboards
B. Unpaved, poorly maintained roads
C. Wildlife or livestock crossing roads
D. Poorly lit roads at night

Answers

Answer:

A

Explanation:

Rural areas are not ideal hubs for advertisement as there is reduced traffic compared to urban areas.

Generally, there are no billboards that can distract a driver while driving in the rural areas.

What is driving?

The act of operating a vehicle with proper traffic and transport guidelines is known as driving. There are less to zero billboards in rural areas, and driving is not distracted due to them.

Hence, option A holds true regarding driving.

Learn more about driving here:

https://brainly.com/question/2619161

#SPJ2

any executable files???

Answers

Doesn't look like there are any..

The closer to 100% a machines efficiency is, the better it is at reducing__

Answers

The closer to 100% a machines efficiency is, the better it is at reducing friction?

An imbalance in the presentation of the content can decrease the
__________of a website.
Website Development Process: Mastery Test

Answers

Answer:

Search Engine Ranking

Explanation:

The search engine ranking is compromised certainly. And this is because due to the imbalance in the presentation of the content, the upload speed of the website is reduced, and this can be due to some heavy image or animation. Also, an imbalance in the presentation of the content can make the website design unresponsive, and the search engine ranks the sites higher if they are responsive.

Children may be placed in restraining devices such as high chairs, swings or bouncy seats

Answers

Children are individuals who have not reached maturity or reached the legal age of duty or competence to carry out certain responsibilities.

When children are being placed in restraining devices; by the term restraining devices, we mean anything that is meant to keep a person under bodily control or decapitate them.

Then, it is not ideal to put children in this scenarios for safety purposes.

If children are going to be placed in such restraining devices (high chairs, swings or bouncy seats). Then few things must be considered:

Either they are under the supervision or under a care of a trainer who keep watch on them; ORA soft landing zone must be placed around these restraining devices such that, if these children should fall, accident caused as a result of these fall can be reduced.

Therefore, we can conclude that it is not ideal to place children in restraining devices without proper guidance or providing a safety zone around these restraining devices.

Learn more about safety purposes here:

https://brainly.com/question/17309155?referrer=searchResults

When do you use an else statement?
To Input a variable
To tell what will happen when an if-statement is false.
To end an IF statement.
To handle string values

Answers

Answer:

To tell what will happen when an if-statement is false

Explanation:

We use else statement if if-statement get false.

for example

if(a>20)

{

print "your age is greater than 20"

}

else

{

print "Your age is less than 20"

}

In the pseudo code, you see the use of else statement, that if age is greater than 20 then display message "you are age is greater than 20". if this statement get false, i.e. you are age is not greater than 20 then else statement will be executed and message will be displayed that your age is less than 20.

Why other option are not correct

To input a variable:

to get input, we use input statement of respective programming language not if-else statement.

To end an if statement

we don't use else statement to end if statement. when condition met then if statement will be ended

To handle string value

we use input validation statement to handle if statement.

Which of the following would be a show stopper for the development of an enterprise mobile app? The app demands data throughput that may not be available in the areas in which it might be deployed. The target device platform does not have a good market share at the global level. The cost of the app development is far greater than the tangible and intangible projected benefit of the app. The app will require adherence to standards mandated by government.

Answers

Answer:

The cost of the app development is far greater than the tangible and intangible projected benefit of the app.

Explanation:

The first option is not correct, as in such cases, the app will be available in other areas. Also in case of a bad market share, it is not clear whether the app business will be profitable or not. And hence this is also not a correct option. However, the third option can be a show stopper, as it suggests the app business is not profitable, and no business or app developer is going to make such an app. And the fourth option is wrong, as some Governments will allow the app usage, and the app can still earn the profit. And hence, the correct option is as mentioned in the Answer section.

which inserted element in an email message displays a graphic from a data source

Answers

Answer:

Merging is the element inserted in an email message displays a graphic from a data source

Explanation:

Merging is the process of attaching  the contents of a data source with the  main body of the message.The mail merge element is designed keeping in mind the graphic and the pictureThis feature also enables user to send similar elements or document to multiple receipts

Answer:

A Chart is the answer

Explanation:

PLEASE HELP FAST !!!!!!!!!!
which of these is the binary number 11 when converted binary ? 011,1011,1001,111

Answers

Answer:

1011

Explanation:

11 in binary is 1011.

Write about the hierarchy (highest to lowest) of job opportunities in chosen industry:

Answers

Answer:

Suppose you are working in a Software development company. The hierarchy of job opportunities in a given industry is as mentioned in the explanation section.

Explanation:

Board of Directors

Executives

Program Managers

Project Managers

Programmer analyst.

Quality Testing Officer

Team Leader

Senior Software Engineer.

Software Testing Officer.

Software Engineer.

Software developer.

Junior Developer.

So at the top, we have the board of directors. And then comes the Executive officers. Under them are the Program managers, and they look after multiple projects. The Project Manager, however, handles one project at a time. They are followed by a Programmer analyst, and then comes a Quality testing officer. And then comes the Team leader, and there can be several team leaders under a single project Manager. Remember Programmer analyst and Quality test officer are a separate entity altogether. And same is the case with the technical writer who interacts with each of the team members for collecting data so that he can process the data into meaningful information. The team leader heads Senior Software Engineer. Software Testing Officer,Software Engineer, Software developer and Junior Developer. The technical writer remains in close contact with the team leader all the time, and he ensures that all the writing work like SRS, BRD, FRD, Technical specifications, test report document, user manuals, etc are ready on time. The software Engineer ensures that coding is ready on time, and Senior software engineers ensure that the coding is correct. Software developers work on one technology and the Software Engineer covers all technologies. Software test Engineer tests each module. Junior developers pass through the training, and on completion of their training, they become the Software developer. And each one of these are highly in demand. Though, top officials are required in less numbers and subordinates in more numbers, as they need to do more work guided by expert advice of all the top officials. And this way, the team unitedly completes several software projects each year. And the best team completes in maximum number, and with least bugs.

Like the tool bar, this allow the user to easily move from one page of the website to another.

Answers

Answer:

Navigation Bar

Explanation:

It is certainly the Navigation bar that provides us the complete information, about the website structure. You can find from here the location of each page of the website, and thus you can easily shift to that particular page if you require to do that, and anytime. Without the Navigation bar, a website is never considered to be complete, as then we do not know which page is located where. it can comprise of breadcrumbs, path or favorite list. Breadcrumbs allow us to remember the location within the program, file system or website. And thus, it helps in navigating through a certain website, file system, or program, and it comes under the navigation bar.

What controls the amount of light entering the camera?
A.
aperture
B. iso
C. shutter speed
D. sensor​

Answers

Answer:

d

Explanation:


A. Aperture

The aperture setting is indicated by the f-number, whereas each f-number represents a “stop” of light.

JAVASCRIPT or BLUEJ:
Make a program that asks the user for 3 integers through Scanner or BufferedReader and display them in order in console.

Example:
If you enter 25, 5, 18
They should show: 5, 18, 25

Answers

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

   Scanner entries = new Scanner(System.in);

   System.out.print("Enter 3 Numbers: ");

   int n1 = entries.nextInt();

   int n2 = entries.nextInt();

   int n3 = entries.nextInt();

   printSortedNumbers(n1, n2, n3);

}

public static void printSortedNumbers(double n1, double n2, double n3){

if ((n1 < n2) && (n2 < n3)){

   System.out.println("Sorted list is"+ n1 + " " + n2 + "" + n3);

   }

if ((n1 < n2) && (n2 > n3)){

   System.out.println("Sorted list is " + n1 + " " + n3 + " " + n2);

   }

if ((n1 > n2) && (n2 > n3)){

   System.out.println("Sorted list is" + n3 + " " + n2 + " " + n1);

   }

if ((n1 > n2) && (n2 < n3)){

   System.out.println("Sorted list is" + n2 + " " + n1 + " " + n3);

   }

}

}

Explanation:

The program uses a function, in which three numbers are compared and then sorted list is printed out. For inputing three numbers Scanner has been used.

Compose one paragraph (three to four sentences) explaining the difference between a courtesy copy and a blind courtesy copy (this is explained in Outlook Module 1 chapter reading).

Answers

Courtesy copy and a Blind courtesy copy.

Courtesy Copy is also known as Carbon Copy (CC), similarly Blind Courtesy Copy is also known as Blind Carbon Copy (Bcc). We often find these abbreviations in the e mails. In CC we can send the same copies to a large group of people, and the list of copies will be visible to all them. Say for example: if you CC an email to Abc@instance.com and Xyz@instance.com then both abc and xyz will get to known that the email is received to the other person as well.

Bcc on the other hand, list the multiple address only to the sender. Only the sender can view the recipients of Bcc. For example: If you send a Bcc to five recipients, then none of them will known that the same copy is send to other recipients as well except the sender. The Bcc list is secret, while Cc’s list isn’t.

Is a ryzen 5 3600 and a gtx 1660 super a good combo? ​

Answers

Answer:

Its decent for 1080p gaming and can also run at 60fps at 4k

Explanation:

Final answer:

Yes, a Ryzen 5 3600 and a GTX 1660 Super is a good combo for gaming and other multimedia tasks.

Explanation:

Yes, a Ryzen 5 3600 and a GTX 1660 Super is a good combo for gaming and other multimedia tasks. The Ryzen 5 3600 is a powerful processor that provides excellent performance and multitasking capabilities. The GTX 1660 Super is a mid-range graphics card that can handle modern games at 1080p resolution with ease.

With this combo, you can expect smooth gameplay in most AAA titles and high frame rates in eSports games. The Ryzen 5 3600 and GTX 1660 Super complement each other well and offer a balanced price-to-performance ratio.

Question 1:

Now it is time for you to put on your creative hat and envision ways that VR might be used in the future. We’ve looked at a few already. But do you foresee other applications once the technology improves? Explain your ideas in a paragraph of no less than 150 words.

OR

Question 2:

Consider the moral and ethical implications of a world in which VR is pervasive. Do you think this would ultimately be a force for good or evil in society? Please explain your ideas in a paragraph of no less than 150 words.

Assignment Guidelines:

Only complete one of the two questions.

Submission Requirements:

Submit a 150-word response to one of the two questions.

When submitting written assignments please remember to:

Submit the assignment question(s) and your responses.
Proof-read for spelling, grammar, and punctuation.
Remember to use complete sentence structure.
Paragraphs need to have a minimum of six sentences.

Answers

Answer:

Explanation:

Now later in the future vr will most likely be used in some things but not for daily use however If it were to to be used daily  vr can be used therapy/medical training for up close training. but one thing i would think is awesome is if the military use Virtual technology to drive military vehicles and even a real virtual person but that would take an extreme amount of technology and wiring hoped i helped xd :}

In this lab, you declare and initialize variables in a Java program. The program file named NewAge.java, calculates your age in the year 2050.

Answers

Final answer:

To calculate your age in the year 2050, you would need to input your birth year, the current year, and the desired year, which in this case is 2050. The program would then use these inputs to perform the necessary calculations and output your age in the year 2050.

Explanation:

In this lab, you declare and initialize variables in a Java program. The program file named NewAge.java calculates your age in the year 2050. To calculate your age in the year 2050, you would need to input your birth year, the current year, and the desired year, which in this case is 2050. The program would then use these inputs to perform the necessary calculations and output your age in the year 2050.

Final answer:

In this lab, you will use a Java program to calculate your age in 2050 by inputting your birth year and other relevant data.

Explanation:

In this lab, you are declaring and initializing variables in a Java program named NewAge.java to calculate your age in the year 2050. You need to input three numbers: the year of your birth, the amount of money you would like to translate in terms of its purchasing power, and the most recent year the calculator will accept. These values will be used to perform calculations and give you the result of your age in 2050. By utilizing Java variables and programming concepts, the program can accurately compute your age based on the given inputs.

memory is stored on chips located on the motherboard​

Answers

Answer:

Primary memory

Explanation:

Primary memory is stored on chips located on the motherboard

Secondary memory is stored on a hard drive

What is the best way to submit your assignments?

Answers

Pencil and Brain epic

To best submit your assignments, confirm email submission protocols with your instructor, use a platform like Canvas to format your document and check it against the rubric, and always submit by the due date. Maintain backup copies of your work.

Best Practices for Submitting Assignments

The best way to submit your assignments is to follow your instructor's guidelines and the submission protocol for the platform used by your educational institution. Generally, here are some steps you can follow:Plan and confirm with your instructor if you can submit assignments via email and pay attention to their preference for attachment formats. Never assume that late submissions via email are acceptable.When you are ready to submit your work, use the specified online platform such as Canvas. Make sure to:Format your document according to the instructor's guidelines or the platform's requirements.Check the submission against the rubric if one is provided to ensure all criteria are met.Abide by the deadline and submit all assignments on or before the due date. Always maintain printed and/or electronic backup copies of your work.

Finally, once you have completed the above steps, use the submit button on the platform to finalize your submission.

What is the answer of this question

-Calculate the bit rate required for a UHD TV whose picture resolution is 3840 pixels wide by 2160 tall.

Answers

Answer:

Dubbed DVB-UHDTV comes with two standards, which are known as UHD-1 (4k) and UHD-2 ( 8k). We are concerned with 3840 x 2160 and that is 4k. It has a frame rate of 60 Hz, and the color depth is 30 bit/pix. So the bit rate = no. of pixels in a frame x frame rate x bit depth

= 3840 x 2160 x 60 x 30 bit/ sec

=14929.92 Mbit/sec.

Explanation:

We need to find the number of bits in a frame, which is frame size x bits per pixel x number of pixels, where bits per pixel is bit depth. And for bit rate, we need to multiply this by frame rate, and the number of frames being processed per second, and which is the frequency. The rest is as explained in the answer section.

What is 8 hours, 5 minutes, 22 seconds minus (-) 7 hours, 24 minutes, 37 seconds?

8 hrs 5 mins 22 secs
- 7 hrs 24 mins 37 secs
————————————

Answers

Answer:

Enter time 1 HH:MM:SS8:5:22                                                                                                    

Enter time 2 HH:MM:SS7:24:37                                                                                                  

0:40:45

Explanation:

The program for above in Python is:

from datetime import datetime

s1 = input("Enter time 1 HH:MM:SS")

s2 = input("Enter time 2 HH:MM:SS")

Format1 = '%H:%M:%S'

tdiff = datetime.strptime(s1, Format1) - datetime.strptime(s2, Format1)

print(tdiff)

We are using the datetime class in datetime module for using strptime to find the difference between the two times.

3.3 Code Practice: Question 1

Answers

Answer:

Question1:

day = int(input("Enter in Numeric Today's day:"))

if (x == 15 or x == 30):

  print("You have a payday today!")

if (x != 15 and x != 30):

  print("Its is not certainly a payday today but dont feel bad.")

Question 2:

red = int(input("Enter the value for red: "))

green = int(input("Enter the value for green: "))

blue = int(input("Enter the value for blue: "))

if (red > 255 or red < 0):

  print("The value of Red is not correct.")

if (green > 255 or green < 0):

  print("The value of Green is not correct.")

if (blue > 255 or blue < 0):

  print("The value of Blue is not correct.")

Explanation:

Please check the answer section.

Answer:

Question 1)

x = int(input("Enter in Numeric Today's day:"))

if (x == 15 or x == 30):

 print("It's payday!")

if (x != 15 and x != 30):

 print("Sorry, not a payday.")

Question 2)

red = int(input("Enter the value for red: "))

green = int(input("Enter the value for green: "))

blue = int(input("Enter the value for blue: "))

if (red > 255 or red < 0):

 print("Red number is not correct.")

if (green > 255 or green < 0):

 print("Green number is not correct.")

if (blue > 255 or blue < 0):

 print("Blue number is not correct.")

Explanation:

The answers above are correct but it'll only give you a 20% because its not what the program wanted, follow instructions to see what they want you to print

Write a Qbasic program to read the value of base and height of a triangle and find its area. ​

Answers

Answer:

The program to this question as follows:

Program:

PRINT "Program: Area of Triangle" 'print message

INPUT "Enter base: ", base 'defining the variable base and input value from the user

INPUT "Enter height:",height 'defining variable height and input a value from user

Area=base*height/2 'formula to calculate Area

PRINT "Area of Triangle:", Area 'print Area

Output:

Program: Area of Triangle

Enter base:   2

Enter height:  3

Area of Triangle: 3

Explanation:

In the above Qbasic program, first, a print function is used to print the message. In the next line, the input function is defined, which uses the "base and height" variable for user input.

Then another variable "Area" is defined that uses user input values to calculate the area of a triangle, and also store its calculated value.  At the last, the print function is used to print Area variable value  

1) Put the following in order from smallest to largest A) 1,500,000 bytes B) 2,000 kilobytes C) 0.01 petabytes D) 1 Terabyte E) 3 Megabytes F) 2,000 Gigabytes

Answers

Answer:

A, B, E, D, F, C

The values from smallest to largest:

A) 1,500,000 bytes

E) 3,145,728 bytes

B) 2,048,000 bytes

D) 1,099,511,627,776 bytes

F) 2,147,483,648,000 bytes

C) 10,737,418,240 bytes

We have,

1 megabyte (MB) is equal to 1,024 kilobytes (KB).

1 kilobyte (KB) is equal to 1,024 bytes.

Convert all values to a common unit (bytes):

A)

1,500,000 bytes (No conversion needed, already in bytes)

E)

3 Megabytes

= 3 * 1,024 kilobytes

= 3,072 kilobytes

= 3,072 * 1,024 bytes

= 3,145,728 bytes

B)

2,000 kilobytes

= 2,000 * 1,024 bytes

= 2,048,000 bytes

D)

1 Terabyte

= 1,024 gigabytes

= 1,024 * 1,024 megabytes

= 1,024 * 1,024 * 1,024 kilobytes

= 1,073,741,824 kilobytes

= 1,073,741,824 * 1,024 bytes

= 1,099,511,627,776 bytes

F)

2,000 Gigabytes

= 2,000 * 1,024 megabytes

= 2,048,000 megabytes

= 2,048,000 * 1,024 kilobytes

= 2,097,152,000 kilobytes

= 2,097,152,000 * 1,024 bytes

= 2,147,483,648,000 bytes

C)

0.01 petabytes

= 0.01 * 1,024 terabytes

= 0.01 * 1,024 * 1,024 gigabytes

= 0.01 * 1,024 * 1,024 * 1,024 megabytes

= 0.01 * 1,024 * 1,024 * 1,024 * 1,024 kilobytes

= 10,485,760 kilobytes

= 10,485,760 * 1,024 bytes

= 10,737,418,240 bytes

Thus,

Arrange the values from smallest to largest:

A) 1,500,000 bytes

E) 3,145,728 bytes

B) 2,048,000 bytes

D) 1,099,511,627,776 bytes

F) 2,147,483,648,000 bytes

C) 10,737,418,240 bytes

Learn more about memory units here:

https://brainly.com/question/28234711

#SPJ3

Are Most job applications are online

Answers

Answer:

i would say yes since technology has evolved a lot over the years

Explanation:

Other Questions
In 1937 (SELECT ALL THAT APPLY) a. the threat of FDRs "court packing plan" may have been the catalyst that led the Supreme Court to interpret the Constitution in a new way: one that gave the federal government unprecedented levels of constitutional authority to regulate the economy and create the modern welfare state. b. the Supreme Court continued to insist the that federal government has no constitutional authority to regulate economic production. c. the Twentieth and Twenty-first Amendments were enacted, thus granting the federal government unprecedented levels of constitutional authority to regulate the economy and create the modern welfare state. d. FDR started his second term in office with an incredibly high percentage of seats in the House (69%) and Senate (82%) held by members of his Democratic Party. e. the Supreme Court held that the federal government can never have constitutional authority to spend money merely for benefiting particular groups in need (e.g., the elderly, poor children, or the disabled). When You are Oldby W. B. YeatsWhen you are old and grey and full of sleep,And nodding by the fire, take down this book,And slowly read, and dream of the soft lookYour eyes had once, and of their shadows deep;How many loved your moments of glad grace,And loved your beauty with love false or true,But one man loved the pilgrim soul in you,And loved the sorrows of your changing face;And bending down beside the glowing bars,Murmur, a little sadly, how Love fledAnd paced upon the mountains overheadAnd hid his face amid a crowd of stars.8As it is used in the fifth line of the poem, the word grace most likely means A. a prayer. B. clumsy. C. to decorate. D. kindness. Is 4 a solution of 2x = 8 I tend to be highly critical of others work A folding domain of a polypeptide chain has a primary structure containing 5 phenylalanine residues as shown below, where F represents the side chain of phenylalanine.F F F_|____|____|_| |F FIf this domain folds in one of the two orientations below, which is more likely - the one on the left or the one on the right?Would all the side chains be inside a circle or would they be outside a circle?a. The one on the leftb. The one on the right What is one power of the legislative branch Wen's Noodles wants to increase the quantity of noodles that it sells by 20 percent. The price elasticity of demand for noodles sold by Wen's Noodles is 3.8. What is the percentage price cut that will achieve the firm's objective? A heading eliminates the need for a transitional sentence such as "Let us now turn to the advantages of the mandatory enrollment process." False True Change the verb into its noun form.depend a0 PLEASE HELPPP!!! The password to my tablet consists of 4 numbers. 0-9. Order doesn't matter. Repetition is allowed. How many possible combinations are there? One probable reason that the Constitution's framers included very strong wording protecting private property and contracts was __________. - 4(x 4) 3 = 12 + 6x Name the object that exhibits rotational symmetry.1.)Ferris wheel2.)sunglasses3.)tent4.)a pair of scissors Molecules of dna are composed of long chains of Describe how to solve any equation in the form ax + b = c for the variable x. Recovery periods following each action potential help prevent propagation of the action potential in the wrong direction. A recovery period in which the axon is not responsive to any strength of stimulus is called _______. catherine is paying off a $2400 loan by making equal payments over a 12-month period until the loan is paid. express the amount of debt remaining as a function of time in months What effect did the movement of glaciers have on the region? 1. caused the formation of fjords 2. created thousands of lakes 3. formed the North Atlantic Current4. left the soil rocky resulted in the eruption of the Askja volcano If f(x)=2(3^*)+1 which is the value of f(2) Elements in a period have _____________.Press enter to interact with the item, and press tab button or down arrow until reaching the Submit button once the item is selectedAThe same atomic radiusBSimilar chemical propertiesCThe same number of protonsDA wide range of chemical properties