2. here we assume that client hosts send requests for files directly to the server ( caches are not used or off in this case). what is the maximum data rate at which client 1 can receive data from the server if we assume client 2 is not making requests?

Answers

Answer 1

Assuming that client 2 is not making requests and caches are not used or off, the maximum data rate at which client 1 can receive data from the server depends on several factors such as the available bandwidth, network congestion, and server capacity.

In order to determine the maximum data rate, it is important to consider these factors and conduct a network analysis to determine the optimal transfer server capacity rate. Without more specific information about the network and server, it is difficult to provide a precise answer to this question.

The capacity of the network links linking a server to the larger internet is referred to as network bandwidth.

The amount of data that may be transmitted via a network at a given time and place is referred to as the network bandwidth. Bits per second (bps) are a popular unit of measurement.

A data link may send and receive more data simultaneously when it has more bandwidth.  When selecting a platform for your website, bandwidth should be taken into account because it affects how quickly a web page loads in a browser.

When assessing your bandwidth, take into account people on the connection, background consumption, and internet usage. You should be aware that internet speed increases as bandwidth increases.

Learn more about server capacity here

https://brainly.com/question/28319008

#SPJ11


Related Questions

Find the error in the following code fragment. int a: System.out.print(a):​

Answers

Answer:

If your using java, then its supposed to be "System.out.print("a")"    

Explanation:

its supposed to have quotations

The library is purchasing Argus TL2530P All-In-One Thin clients. What does it mean that the thin clients are 802.3at compliant?

Answers

In this set up, the servers are workstations which perform computations or provide services such as print service, data storage, data computing service, etc. The servers are specialized workstations which have the hardware and software resources particular to the type of service they provide.

1. Server providing data storage will possess database applications.

2. Print server will have applications to provide print capability.

The clients, in this set up, are workstations or other technological devices which rely on the servers and their applications to perform the computations and provide the services and needed by the client.

The client has the user interface needed to access the applications on the server. The client itself does not performs any computations while the server is responsible and equipped to perform all the application-level functions.

Each server handles a smaller number of thin clients since all the processing is done at the server end. Each server handles more thick clients since less processing is done at the server end.

Learn more about server on:

https://brainly.com/question/29888289

#SPJ1

Consider the following correct implementation of the selection sort algorithm.


public static void selectionSort(int[] elements)


{


for (int j = 0; j < elements. Length - 1; j++)


{


int minIndex = j;


for (int k = j + 1; k < elements. Length; k++)


{


if (elements[k] < elements[minIndex])


{


minIndex = k; // Line 11


}


}


if (j != minIndex)


{


int temp = elements[j];


elements[j] = elements[minIndex];


elements[minIndex] = temp;


}


}


}


The following declaration and method call appear in the same class as selectionSort.


int[] vals = {5, 10, 2, 1, 12};


selectionSort(vals);


How many times is the statement minIndex = k; in line 11 of the method executed as a result of the call to selectionSort ?

Answers

Answer:

The statement minIndex = k; in line 11 of the selectionSort method is executed n*(n-1)/2 times, where n is the length of the elements array.

Explanation:

This is because the inner loop starts at j+1 and iterates through the remaining elements in the array. In the first iteration of the outer loop, the inner loop iterates n-1 times. In the second iteration of the outer loop, the inner loop iterates n-2 times, and so on. The total number of iterations of the inner loop is:

(n-1) + (n-2) + ... + 2 + 1

= n*(n-1)/2

Therefore, the statement minIndex = k; in line 11 is executed n*(n-1)/2 times in the selectionSort method.

In the specific case of the vals array given in the question, which has length 5, the statement minIndex = k; in line 11 is executed 5*(5-1)/2 = 10 times.

what is the plan to make optimum usage of available spaces?

Answers

Answer:

dergragmentation or share to speed up procceces

What is the measure of each angle of an equilateral traingle what is that answer is it 30 or 45or 60 or 90 hmmmm

Answers

Answer:

60°

Explanation:

The measure of each angle of an equilateral triangle is 60°.

An equilateral triangle is a kind of triangle where all angles are equal to each other.

The sum of angles of a triangle is equal to 180

A triangle has 3 sides

Calculating the measure of each angle,

a + a + a = 180°

3a = 180°

a  = 180 / 3

Therefore a = 60°

How many total numbers can be represented with an 8-bit binary system

Answers

Answer:

256

Explanation:

2^8 = 256, i.e. 2 times 2 times 2 times ... etc.

A favorably adjudicated background investigation is required for access to classified information

a. True
b. False

Answers

A favorably adjudicated background investigation is required for access to classified information: A. True.

What is a classified source material?

In Computer technology, a classified source material is sometimes referred to as classified information and it  can be defined as an information source that comprises very important, restricted, and sensitive information that must only be shared and disseminated secretly with authorized persons.

What is an adjudicative process?

In Computer technology, an adjudicative process can be defined as a strategic process which typically involves an examination and background investigation of a sufficient period of the life of a person, in order to make an affirmative determination that he or she is eligible for a security clearance and access to a classified source material or classified information.  

Read more on classified source material here: brainly.com/question/15346759

#SPJ1

Dan and daniel wish to communicate with each other using a secret key. which algorithm can they use to have a shared secret key in a secure manner

Answers

Dan and Daniel can use the Diffie-Hellman key exchange algorithm to securely generate a shared secret key that can be used for secure communication.

The Diffie-Hellman key exchange algorithm is a public-key cryptography algorithm that allows two parties to securely establish a shared secret key over an insecure communication channel. The algorithm works by allowing each party to generate a public-private key pair, with the public keys exchanged between the parties. Using these public keys, each party can then generate a shared secret key without ever transmitting the key itself over the insecure channel.

The security of the Diffie-Hellman key exchange algorithm is based on the difficulty of computing discrete logarithms in finite fields. Essentially, this means that it is computationally infeasible to determine the private key used to generate a public key without knowing the prime numbers and the original public key used in the algorithm. As such, the algorithm provides a secure method for two parties to generate a shared secret key without exposing it to potential attackers.

To learn more about the Diffie-Hellman key exchange, visit:

https://brainly.com/question/19308947

#SPJ11

When you want to express the ratio of all outputs to all inputs, you should use a ________ productivity measure.

Answers

When you want to express the ratio of all outputs to all inputs, you should use a total productivity measure.

What is total measure productivity?

Productivity is known to be one that can be calculated by the act of measuring the number of units that is made and that is relative to employee labor hours or by the act of measuring a firm's net sales that is known to be relative to employee labor hours.

Note that Multifactor productivity connote the fact that the productivity of all the inputs that are said to be used in the production process.

Therefore, When you want to express the ratio of all outputs to all inputs, you should use a total productivity measure.

Learn more about productivity from

https://brainly.com/question/2992817

#SPJ1

Which of the following is not a type of statement found in a typical high-level imperative programming language?
Imperative statement
Comment statement
Declarative statement
Exclamatory statement

Answers

Among the options provided, the statement that is not typically found in a high-level imperative programming language is the "Exclamatory statement."  So fourth option is the correct answer.

Imperative statements, such as assignments and control flow statements, are the core building blocks of imperative programming languages. Comment statements are used for adding explanatory or descriptive text that is ignored by the compiler or interpreter.

Declarative statements, although not as prevalent in imperative languages, can still be present in the form of declarative constructs like function or procedure declarations.

However, exclamatory statements do not have a standard representation or purpose in high-level imperative languages, as they are more commonly associated with expressing strong emotions rather than programming logic. So the correct answer is fourth option.

To learn more about programming language: https://brainly.com/question/16936315

#SPJ11

Which PowerPoint feature will you use to apply motion effects to different objects of a slide? A. Slide transition B. Slide design C. Animation movement D. Animation effects

Answers

Answer:

D. animation effects

Assume you are an IT manager for a small- to medium-sized company. You are currently working on a new website and need someone to help develop your website. You need to place an ad for the position. Without listing the specific skills, state a name for the position and the minimum requirements for the position. Defend your answer with reasons why these are necessary minimum requirements.

Answers

Since You need to place an ad for the position. The position is Ad specialist, and the specific skills,  is to have a good knowledge of marketing and ad making. The minimum requirements for the position is  a BSC in advertising and media production or in marketing'

Who is a marketing expert?

Creative concepts are transformed into advertising campaigns by advertising pros. They could specialize in advertising mediums like print, radio, television, and digital.

The daily management of paid digital marketing initiatives, including paid search, display, and social advertising strategies for B2B and B2C organization, is the responsibility of paid media specialists.

Most jobs are full-time or more. Sales representatives for advertising frequently put in extra hours. This profession has a dismal employment prognosis. The U.S. Bureau of Labor Statistics predicts a drop in employment through 2024.

Hence, People can prove they are experts in internet advertising by showing they have a Go ogle Ads certification and others.

Learn more about advertising from

https://brainly.com/question/1658517
#SPJ1

What is another term for the notes that a reader can add to text in a word- processing document?

Answers

Answer:

Comments

.....

Semiconductors are only somewhat conductive electronic components.

True or False?

Answers

Answer:

True

Explanation:

A semi conductor can be defined as a material , a component or a substance that has the ability to conduct or transmit electricity partially.

This is because their ability to conduct electricity or to be conductive occurs between a conductor and an insulator.

Examples include silicon, carbon, germanium, e.t.c.

Semiconductors help to control and regulate the rate at which electricity is conducted or transmitted.

Therefore, semiconductors are only somewhat conductive electronic components.

A Chief Security Officer (CSO) has asked a technician to devise a solution that can detect unauthorized execution privileges from the OS in both executable and data files, and can work in conjunction with proxies or UTM. Which of the following would BEST meet the CSO's requirements?
A. Fuzzing.
B. Sandboxing.
C. Static code analysis.
D. Code review.

Answers

A solution which would best meet the CSO's requirements is: B. Sandboxing.

What is a sandbox?

A sandbox can be defined as an isolated environment in a computer system or on a network that is designed and developed to mimic end user operating system (OS) and environments, so as to detect unauthorized execution privileges from the operating system (OS).

In cybersecurity, sandboxing is typically used to safely execute suspicious code and data files without causing any harm to the host device or network. Also, sandboxing can work in conjunction with proxies or unified threat management (UTM).

Read more on sandboxing here: https://brainly.com/question/25883753

What caused accident? into passive voice​

Answers

Accident was caused by what

raid solution that offers redundancy over performance

Answers

If you need solid performance but also need a level of redundancy, RAID 10 is the best way to go.

Which RAID is the most performant?

A RAID 1 array is made up of two disk drives, one of which is a mirror of the other (the same data is stored on each disk drive).

RAID 10 is the ideal option if you want both high performance and redundancy. Remember that you will lose half of your available storage space, so plan appropriately! If redundancy is most essential to you, you’ll be OK with either a RAID 10 or a RAID 60.

RAID-10 provides the highest speed and redundancy features, but it reduces useable capacity by half, making it costly to implement at scale.

To learn more about RAID-10 to refer:

https://brainly.com/question/14669307

#SPJ4

Consider the following snippet of code, Assume $t0 and $t1 are initialized to 0 and 100, respectively.

loop: beq $t0, $t1, exit
addi $t0, $t0, #1
lw $s0, 32($0)
add $s2, $s1, $s0
add $s2, $s2, #2
B loop

exit:...

1) What are the effective total number of instructions in this snippet?
2) Point out all hazard/dependencies in this code. Draw the timing diagram for one iteration on all 3 architectures.

Describe your answers and conclusions briefly

3) What are the total number of clock cycles this code snippet will take to run on a single cycle, multicycle and pipelined architecture? How will these numbers change if forwarding is enabled? Assume that branch mispredictions result in a pipeline flush penalty that adds 5 extra clock cycles.

4) Also calculate the CPI for each of the conditions mentioned above, for all three architectures.

Answers must be presented as a neat table, and your scratch work must also be attached or typed below.

If the delay for each stage is as follows:

IF - 50ps, ID - 70ps, EX - 100ps, MEM- 150ps, WB - 100ps

5) What is the execution time of one single iteration on all 3 architectures with and without forwarding?
6) What is the total execution time of the entire code on all 3 architectures with and without forwarding

Answers

The effective total number of instructions in this snippet is 6.

Hazards/dependencies in the code:

a) Data hazard between the addi instruction and the lw instruction. The result of the addi instruction is needed as an operand for the lw instruction.

b) Data hazard between the lw instruction and the first add instruction. The result of the lw instruction is needed as an operand for the add instruction.

c) Control hazard due to the branch instruction. The branch instruction depends on the comparison result of the beq instruction.

Timing diagram for one iteration on all 3 architectures:

Single-cycle architecture:

IF ID EX MEM WB

| | | | |

|beq |addi | | |

| |lw |add | |

| | | |add |

| | | | |

Multi-cycle architecture:

IF ID EX MEM WB

| | | | |

|beq | | | |

| |addi | | |

Read more about code snippets here:

https://brainly.com/question/28235208

#SPJ4

what must a system be doing in order for momentum to exist?

Answers

For a quantity of motion to exist in a system, two conditions must be met: the existence of mass and the presence of velocity. The quantity of motion, also known as linear momentum, is defined as the product of the mass of an object and its velocity.

The factors that contribute to the existence of quantity of motion in a system are listed below:

Mass: The amount of motion is directly related to the mass of an object. The greater the mass of an object, the greater its amount of motion.Velocity: The amount of motion is also directly related to the velocity of an object. The greater the velocity of an object, the greater its amount of motion.Direction: The amount of motion also depends on the direction of motion. Two objects moving in the same direction and direction will have a greater total amount of motion than two objects moving in the same direction, but in opposite directions.

In conclusion, for a quantity of motion to exist in a system, mass and velocity must be present. The greater the mass and velocity of an object, the greater its amount of motion.

Lear More About Number of movements

https://brainly.com/question/28951226

#SPJ11

A recursive function includes ______ which are not necessary in a loop structure. A. function calls. B. overhead actions. C. conditional clauses

Answers

A) A recursive function includes function calls that are not necessary for a loop structure.

In a recursive function, the function calls itself within its own definition. This recursive call is the key characteristic of recursive functions and distinguishes them from loop structures. Each recursive call leads to a new invocation of the function, potentially with modified parameters, until a base case is reached to terminate the recursion. On the other hand, in a loop structure, repetitive iterations occur based on a predefined condition or set of conditions. The loop structure does not involve function calls within itself but relies on looping constructs like for loops, while loops, or do-while loops. Therefore, the presence of function calls is a distinct feature of recursive functions that sets them apart from loop structures.

learn more about loop structure here:

https://brainly.com/question/31764554

#SPJ11

Help with this please guys<3
here are the things for the answer
Exaggeration
Timing

Help with this please guys&lt;3here are the things for the answer ExaggerationTiming

Answers

Answer: the answer is exaggeration

Explain briefly what would happen if marketing research is not conducted before a product is developed and produced for sale.

Answers

Neglecting to do market research can result in indecision and inaction, fear of risk or the truth, and/or too many options, which can lead to paralysis. ... When launching a new product, effective market research will help you narrow down your true market potential and your most likely customers.

Choose the term that best matches the definition.
v rules used by a computer network.

A. Network protocol
B. Hierarchy protocol
C. Procedure

Answers

Answer: it’s network protocol

Explanation:

Answer:

A. Network protocol

Explanation:

On Edge, it states that network protocol are, "rules used by computers in a network." Therefore, it's confirmed.

I hope this helped!

Good luck <3

Kelly is fond of pebbles, during summer, her favorite past-time is to cellect peblles of the same shape and size

Answers

The java code for the Kelly is fond of pebbles is given below.

What is the java code about?

import java.util.Arrays;

public class PebbleBuckets {

   public static int minBuckets(int numOfPebbles, int[] bucketSizes) {

       // Sort the bucket sizes in ascending order

       Arrays.sort(bucketSizes);

       // Initialize the minimum number of buckets to the maximum integer value

       int minBuckets = Integer.MAX_VALUE;

       // Loop through the bucket sizes and find the minimum number of buckets needed

       for (int i = 0; i < bucketSizes.length; i++) {

           int numBuckets = 0;

           int remainingPebbles = numOfPebbles;

           // Count the number of buckets needed for each size

           while (remainingPebbles > 0) {

               remainingPebbles -= bucketSizes[i];

               numBuckets++;

           }

           // Update the minimum number of buckets if needed

           if (remainingPebbles == 0 && numBuckets < minBuckets) {

               minBuckets = numBuckets;

           }

       }

       // If the minimum number of buckets is still the maximum integer value, return -1

       if (minBuckets == Integer.MAX_VALUE) {

           return -1;

       }

       return minBuckets;

   }

   public static void main(String[] args) {

       // Test the minBuckets function

       int numOfPebbles = 5;

       int[] bucketSizes = {3, 5};

       int minBuckets = minBuckets(numOfPebbles, bucketSizes);

       System.out.println("Minimum number of buckets: " + minBuckets);

   }

}

Learn more about java code from

https://brainly.com/question/18554491

#SPJ1

See full question below

Write a java code for the following Kelly is fond of pebbles. During summer, her favorite past-time is to collect pebbles of same shape and size. To collect these pebbles, she has buckets of different sizes. Every bucket can hold a certain number of pebbles. Given the number of pebbles and a list of bucket sizes, determine the minimum number of buckets required to collect exactly the number of pebbles given, and no more. If there is no combination that covers exactly that number of pebbles, return -1. Example numOfPebbles = 5 bucketSizes = [3, 5] One bucket can cover exactly 5 pebbles, so the function should return 1.

In the game Badland, how do you get to the next level?

A.
If you get close enough to the exit pipe, it sucks you up and spits you out in the next level.
B.
If you shoot enough enemies, you automatically advance to the next level.
C.
If you reach the end of the maze, you hear the sound of a bell and are taken to the next level.
D.
If you answer enough puzzles correctly, you advance to the next level.

Answers

In the game Badland, the  way a person get to the next level is option C: If you reach the end of the maze, you hear the sound of a bell and are taken to the next level.

What is the story of BADLAND game?

The story occurs throughout the span of two distinct days, at various times during each day's dawn, noon, dusk, and night. Giant egg-shaped robots start to emerge from the water and background and take over the forest as your character is soaring through this already quite scary environment.

Over 30 million people have played the side-scrolling action-adventure game BADLAND, which has won numerous awards. The physics-based gameplay in BADLAND has been hailed for being novel, as have the game's cunningly inventive stages and breathtakingly moody sounds and visuals.

Therefore, in playing this game, the player's controller in Badland is a mobile device's touchscreen. The player's Clone will be raised aloft and briefly become airborne by tapping anywhere on the screen.ult for In the game Badland, the way a person get to the next level.

Learn more about game from

https://brainly.com/question/908343
#SPJ1

Which phrase is the best definition of sparklines in Excel 2016?

A. a type of graphic that users can insert into a worksheet
B. a type of mini chart that users can insert into a worksheet
C. a simple image that is displayed in Excel
B. a link to an outside source that is referenced in a worksheet

Answers

Answer:

The correct answer is:

B. a type of mini chart that users can insert into a worksheet

Explanation:

Microsoft excel is a spreadsheet software that is used for calculations and making payrolls.

Excel provides many visual features to display the data in graphical form. One of them is Spark lines.

Spark lines are used to show trends and variations in the collected data. Spark lines are just like mini charts.

So,

From the given options the best option is: B. a type of mini chart that users can insert into a worksheet

Hence,

The correct answer is:

B. a type of mini chart that users can insert into a worksheet

Which of the following expressions shows the correct amount of sales tax for the computer at Store A? Select all that apply.
6%($1,200)
0.6($1,200)
0.06($1,200)
One-sixth($1,200)
StartFraction 3 over 50 EndFraction($1,200)

Answers

Answer:

6%($1,200)  0.06($1,200)  3/50($1,200)

Explanation:

hope this helps sorry if i am wrong

have a nice day

Answer:

a,c,e

Explanation:

it just makes sense U^U

Select all the correct answers.
Which TWO of the following are recommended practices to protect users' privacy while using email services?
Avoid forwarding a personal emails to others.
Avoid forwarding jokes and trivia using email.
Avoid using webmail if you have an email client on your computer.
Avoid opening emails from unrecognized senders.
Avoid using webmail in the workplace:

Answers

Answer: Avoid forwarding a personal email to others and most likely Avoid forwarding jokes and trivia using email.

The recommended practices to protect users' privacy while using email services are options A and C: avoid forwarding a personal emails to others and avoid using webmail if you have an email client on your computer.

What do you mean by term E-mail?

An E-mail is refers to as the communication source. It is a specialized computer network that stores, processes, and send the material from one person to another within seconds..

E-mail is considered as the computer equivalent but it has many advantages like timeliness and flexibility.

Moreover, the content of email include text, files, images or other kind of attachments send by the specified person to the one or more than one groups.

In order to protect the personal data of the user, it is recommend that people should note share their personal information with other and specially the young generation do not use webmail if the another party already utilize your computer.

Nowadays more frauds are happen due to the fact that people are more indulge in these communications for their better advancements. So, we have to take every step very carefully.

Therefore, correct options are A and C.

Learn more about E-mail, refer to the link:

https://brainly.com/question/13313275

#SPJ2

Assignment: Blues Progression
Blues is a sub-genre of jazz that follows some specific guidelines: specifically, the Blues scale and the Blues chord progression.
In this assignment, you’ll write out a 12-bar Blues chord progression. This assignment is a MuseScore assignment. Do not turn in this document for grading.

Directions:

1. Create a new document in MuseScore
a. For the title, write “MuseScore Assignment: Blues”.
b. For the composer, write your name., then click "next".
c. Under "general", choose “Grand Staff”, then click “Next”.
d. Choose G major for your key signature (1 sharp), then click next.
e. Choose “Piano” (in the Keyboards section) for your instrument. (This step may or may not show for you. It's ok either way!)
f. Choose 4/4 for your Time Signature and 12 measures for number of measure.
g. Click “Finish”.

2. In the Bass Clef, write out a 12-bar Blues Chord Progression.
a. Use whole notes for your chords
b. I – I – I – I – IV – IV – I – I – V7 – IV – I – V7

Save your assignment (with your name!) and submit it to the Composition: Blues Progression Dropbox basket. Turn in the MuseScore file only.

Answers

Explanation:

I can provide you with the 12-bar Blues chord progression as you requested:

In the key of G major:

I (G) – I (G) – I (G) – I (G)

IV (C) – IV (C) – I (G) – I (G)

V7 (D7) – IV (C) – I (G) – V7 (D7)

The Roman numerals in parentheses represent the chords to play in each measure, and the chord names outside the parentheses indicate the actual chords to play in the key of G major.

Diego Simeone is a PHD student and would like to research depreciation of non-current assets in China, he would like to collect his data via documents (documentary analysis).
Diego has heard about a ‘Coding Scheme’ and has asked you the following questions.
Required:
What is a coding scheme?. Answer the question in your OWN WORDS
How would a coding scheme assist Diego in his research?, Explain your answer

Answers

A coding scheme is a type of research technique used to assist researchers in categorizing and analyzing data in a systematic and structured manner. Diego Simeone can use a coding scheme to categorize and label the documents he is analyzing into specific categories or themes.

A coding scheme is a set of rules that researchers utilize to analyze documents (text, audio, visual) for the purpose of research. A coding scheme is essentially a set of rules or a system that is used to assign codes to data during the coding process.

It is a method used to sort and analyze research data, primarily used in qualitative research, as it provides researchers with a way of identifying patterns or themes within the data being analyzed.  

These codes are subsequently used to identify or extract information of interest from the documents that the researchers are analyzing.

Diego Simeone's research involves analyzing and researching the depreciation of non-current assets in China using documentary analysis.

By using coding scheme to categorize and label the documents, Diego can easily identify and extract data of interest from the documents, allowing him to draw patterns and conclusions from the information he has collected.

Therefore, a coding scheme would be extremely useful to Diego in his research as it will help him categorize the documents and extract meaningful data from them.

To learn more about research: https://brainly.com/question/26177190

#SPJ11

Other Questions
Fill in the blanks to answer the question: what is likely to happen to consumer and producer surplus when taxes increase on smartphones?. 5. Which of the following can produce a therapeutic response? A drug that is:Bound to plasma albuminConcentrated in the bileNot absorbed from the GI tractUnbound to plasma proteins Which sentences use a time-related term correctly?Select all correct answers.William of Normandy crossed the English Channel and defeated King Harold II in A.D. 1066.Julius Caesar was assassinated in B.C. 44.Romulus Augustulus, the last Roman emperor, was taken prisoner by the German king Odovacar in C.E. 476.Alexander the Great died in 323 B.C.E Discuss the purpose of an Information Security Policy and how it fits into an effective information security architecture. Your discussion should include the different levels of policies and what should be covered in an information security policy. 15. Two like charges: A. Attract each other B. Repel each other C. Must be neutrons D. Neutralize each other What two men led rebellions against Victoriano Huerta? What parts of Mexico did each represent? Which statement is correct? [Ancient Greece Unit - Lesson 2: The Rise of Greek City-States]1. Sparta was famous for being a society of warriors; Athens was famous for its thinkersand philosophers.2. Athens was famous for being a society of warriors; Sparta was famous for its thinkersand philosophers. i need help asap pls Write the expression as the sine or cosine of an anglesin 7y cos 3y-cos 7y sin 3ySin(?y) 1. saber (t) _supiste___2. estar (ustedes) ______________3. dar (nosotros) _______________4. querer (yo) _________________5. poner (vosotros) _________________6. ser (ellos) ___________________7. decir (vosotros) _______________8. Tener (yo) __________________9. decir (nosotros) _______________10. tener (usted) __________________11. ser (nosotros) _________________12. poner (yo) ____________________13. poder (ellos) _________________14. estar (ella) __________________15. hacer (ella y yo) __________________16. dar (usted) ____________________17. Ir (yo) _______________________18. dar (ellos) ____________________19. ir (ella) ________________________20. traer (yo) ______________________ Make infographics for the 5 major account in accounting, and include examples. More examples, much better 31 Four points are plotted on the number line.0W+X YZ1Which point best represents 331% of the distance between 0and 1?A Point WB Point XC Point YD Point Z Which of the following sources of financial information should you be most skeptical of? Annual Report Brokerage firm research Dun and Bradstreet report Form 10K Please help with 4 no files or links please 88800 x 10 to the power of 2 Dites o on est et ce quon fait ce weekend.MODLE:les ados (faire une randonne pied)Les ados sont dans la fort. Ils font une randonne pied.1. tu (faire du sport)2. Luc et moi (faire du camping)3. je (faire des hamburgers)4. Alima (faire la vaisselle)5. Les Castinot (faire une excursion)6. vous (faire du shopping) If p(x) = 5(x^2 +1) + 16, what is the value of p(11)? A. 622 B. 736 C. 626 D. 690 The graph below shows how solubility changes with temperature.A graph with the horizontal axis showing temperature ranging from 0 to 10 in units of 10 and the vertical axis solubility in grams of salt per 100 grams of water. Several compounds are shown. All data are approximate. The substances and their coordinates are as follows: upper N a upper C l: 0, 38; 10, 38; 20, 38; 30, 38; 40, 39; 50, 39; 60, 39; 70, 40; 80, 40; 90, 40; 100, 40. Upper N a subscript 2 upper H upper A s upper O subscript 4: 0, 5; 10, 18; 20, 28; 30, 39; 40, 49; 60, 65; 80, 82. Upper B a (upper N upper O subscript 3) subscript 2: 0, 5; 10, 8; 30, 12; 40, 15; 50, 18; 60, 20; 80, 28; 100, 33. Upper N a subscript 2 upper S upper O subscript 4: 0, 5; 5, 8; 10, 10; 15, 15; 20, 20; 25, 20; 28, 35; 30, 40; 32, 49; 33, 50; 35, 50; 40, 48; 50, 47; 60, 46; 70, 45; 80, 43; 90, 32; 100, 40. Upper C 3 subscript 2 (upper S upper O subscript 4) subscript 3 dot 9 upper H subscript 2 upper O: 0, 18; 20, 10; 30, 8; 50, 5; 60, 3; 80, 1; 100, 0.Which two solutions have similar solubilities at 40C?Na2SO4 and NaClNa2HAsO4 and NaClNa2HAsO4 and Na2SO4Ba(NO3)2 and Ce2(SO4)3 9H2O Staywell health insurance is offering a plan with a premium of $250, a deductible of $3500, and maximum out-of-pocket expenses of $6000. if sheldon chooses this insurance, what is the most he should pay in one calendar year? $6,000 $9,000 $9,500 $9,750 -84+39Negative 84 plus 39 equals