A TCP ________ segment is a request to the other transport process to close a connection. ACK FIN SYN CLS

Answers

Answer 1

Answer:

FIN

Explanation:

A TCP is an acronym for Transmission Control Protocol and it is one of the essential and important protocol of the internet protocol network. This simply means that, it is an essential part of the TCP/IP network.

The TCP has a wide range of applications in the following areas, file transfers, world wide web, remote administration, e-mail, etc.

The TCP connection are mainly established in the network using the three-way handshake.

A TCP FIN segment is a request to the other transport process to close a connection. The FIN in transmission control protocol (TCP) is an acronym for finish and it involves the packets associated with termination or closing of a network connection.

Generally, the TCP in networking is made up of all of the following flag bits, namely;

1. SYN: used for synchronizing packets associated with a connection.

2. ACK: this is mainly where an acknowledgement of packets in a network takes place.

3. FIN:  it is used for closing connections.

4. PSH: used for pushing packets that are to meant to be delivered at the far end.

5. RST: used as a reset in times of errors in the connection.

6. URG: used to denote urgent and high priority packets in the network.

7


Related Questions

what button should be clicked to add a record to a table

Answers

Open the table in Datasheet View or the form in Form View to add a record to it. Click New in the Records group on the Home tab, or click New (blank) record, or press Ctrl+Plus Sign (+). In the record picker, look for the record with an asterisk and enter your updated information.

What is the purpose of record on a table?

A table consists of records (rows) and fields (columns). Text, numbers, dates, and hyperlinks are examples of data types found in fields. For the record: Contains specialized data, such as information on a certain employee or product.

A Tuple, Record, or Row is a single entry in a table. In a table, a tuple represents a collection of connected data. As a result, Option 1 is correct.

Learn more about tables:
https://brainly.com/question/22536427?
#SPJ1

Please help I have no idea what to do :(



Write a program that simulates a coin flipping. Each time the program runs, it should print either “Heads” or “Tails”.

There should be a 0.5 probability that “Heads” is printed, and a 0.5 probability that “Tails” is printed.

There is no actual coin being flipped inside of the computer, and there is no simulation of a metal coin actually flipping through space. Instead, we are using a simplified model of the situation, we simply generate a random probability, with a 50% chance of being true, and a 50% chance of being false.

Answers

A Java Script program that simulates a coin flipping, so that each time the program runs, it should print either “Heads” or “Tails” along with the other details given is stated below.

Code for the above coin simulation

var NUM_FLIPS = 10;

var RANDOM = Randomizer.nextBoolean();

var HEADS = "Heads";

var TAILS = "Tails";

function start(){

var flips = flipCoins();

printArray(flips);

countHeadsAndTails(flips);

}

// This function should flip a coin NUM_FLIPS

// times, and add the result to an array. We

// return the result to the caller.

function flipCoins(){

var flips = [];

for(var i = 0; i < NUM_FLIPS; i++){

if(Randomizer.nextBoolean()){

flips.push(HEADS);

}else{

flips.push(TAILS);

}

}

return flips;

}

function printArray(arr){

for(var i = 0; i < arr.length; i++){

println("Flip Number " + (i+1) + ": " + arr[i]);

}

}

function countHeadsAndTails(flips){

   var countOne = 0;

   var countTwo = 0;

   for(var i = 0; i < flips.length; i++){

       if(flips[i] == HEADS){

           countOne+=1;

       }

       else {

           countTwo+=1;

       }

   }

   println("Number of Heads: " + countOne);

   println("Number of Tails: " + countTwo);

}

Learn more about Java Script:
https://brainly.com/question/18554491
#SPJ1

What does it mean when someone says your voice doesn’t match how u look

Answers

Explanation:

it means that your voice it doesn't match with your personality like 2 characteristics by voice and by personality

1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:

4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
 WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
 WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:

Answers

Network controls that would meet the requirements is option a) Stateful Firewall

Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option  b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEP

What is the statement about?

A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.

A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.

Learn more about network administrator  from

https://brainly.com/question/28729189

#SPJ1

what measures can you take to control access to the master production schedules so that only authorized customers may enter their data?

Answers

Answer:

There are several measures you can take to control access to the master production schedules to ensure that only authorized customers can enter their data. Some possible measures are:

Implement strong authentication: Require users to authenticate themselves with a username and password, or use more secure authentication methods such as two-factor authentication or biometric authentication.

Implement access controls: Grant access only to authorized users and restrict access to sensitive data. Access controls can be implemented using various techniques such as role-based access control, mandatory access control, or discretionary access control.

Monitor user activity: Monitor user activity on the system and track access to sensitive data. This can help identify any unauthorized access attempts or suspicious activity.

Implement data encryption: Protect data in transit and at rest by encrypting it. Encryption can help prevent unauthorized access to sensitive data, even if an attacker gains access to the system.

Train users on security awareness: Educate users on security best practices, such as not sharing passwords, logging out after use, and reporting suspicious activity. This can help prevent security breaches due to user error or negligence.

Regularly review security measures: Regularly review security measures to ensure they are effective and up-to-date with the latest security standards and best practices.

What does the list "car_makes" contain after these commands are executed?

car_makes = ["Ford", "Volkswagen", "Toyota"]
car_makes.remove("Ford")


1. ['', 'Porsche', 'Vokswagen', 'Toyota']
2. ['Volkswagen', 'Toyota']
3. ['Toyota', 'Ford']
4. [null, 'Porsche', 'Toyota']

Answers

Answer:

The correct answer is option 2: ['Volkswagen', 'Toyota']

Explanation:

After the remove method is called on the car_makes list to remove the element "Ford", the list car_makes will contain the elements "Volkswagen" and "Toyota"


When do you use online reading tools? Check all that apply.
when there is a word that I do not know how to pronounce
when the text is in a language that I do not fully understand
o when I need to know the meaning of a word
O O O O
O when there are main ideas or details I want to take notes on
when there is information in my reading that I want to look up quickly

Answers

Answer:

the answers are all of them

Answer:

A, B, C, D, E, F

Explanation:

It's any of them. There is no wrong answer.

Got right, on warm up! Hope this helps.

We would like the set of points given in the following figure into 1D space. The set of points has been
generated using this instruction [X, y = make_moons(n_samples = 100)], where X are the 2D features
and y are the labels(blue or red).
How to do that while keeping separable data point with linear classification? Give the
mathematics and the full algorithm.
How to apply the SVM algorithm on this data without dimension reduction? Give the
mathematics and full algorithm.

Answers

One way to project the 2D data points onto a 1D space while preserving linear separability is through the use of a linear discriminant analysis (LDA) technique. LDA finds the linear combination of the original features that maximizes the separation between the different classes.

What is the mathematics  in SVM algorithm?

The mathematics behind LDA involve finding the eigenvectors of the within-class scatter matrix and the between-class scatter matrix and selecting the eigenvector that corresponds to the largest eigenvalue. The full algorithm for LDA can be outlined as follows:

Compute the mean vectors for each class

Compute the within-class scatter matrix (SW) and the between-class scatter matrix (SB)Compute the eigenvectors and eigenvalues of the matrix (SW⁻¹SB)Select the eigenvector that corresponds to the largest eigenvalue as the linear discriminantProject the original data onto the new 1D space using the linear discriminant

Regarding the SVM algorithm, it can be applied directly to the original 2D data without the need for dimension reduction. The mathematics behind SVM involve finding the hyperplane that maximizes the margin, or the distance between the closest data points of each class, while also ensuring that the data points are correctly classified.

The full algorithm for SVM can be outlined as follows:

Select a kernel function (e.g. linear, polynomial, radial basis function)Train the model by solving the optimization problem that maximizes the marginUse the trained model to classify new data points by finding the hyperplane that separates the different classesIt is important to note that, in case of non-linearly separable data, SVM algorithm uses the kernel trick to map the original data into a higher dimensional space, where the data is linearly separable.

Learn more about algorithm from

https://brainly.com/question/24953880
#SPJ1

1. Which of the following is a new
generation optical storage device?
CD
DVD
Blu-ray disc
Pen drive

Answers

Answer:

CD or CD Rom

fhiykkoojnddeyui

Name:

Sup-R Game Desktop – Model EEXL
Inteel® Core i7
6GB Tri-Channel DDR3
500GB SATA-II (7200 rpm)
16x CD/DVD burner
21.5” HD widescreen monitor
NVIDIA® GeForce
Creative Sound Blaster® X-Fi Titanium
Altec Lansing speakers
Gigabit Ethernet port
3 – year limited warranty
Windows 10


1. Suppose you are reading a computer magazine and you come across the ad pictured above. By looking at the specs, you can see that: (2 Points)

The amount of RAM is ___________.

The microprocessor manufacturer is __________.

The amount of disk storage is _______________.

The amount of Solid State Drive storage is ______________

2. In the table below, list the hardware/peripheral components in the ad and check which function the component performs. (Add additional rows to the table if needed). (5 Points)

Component
Processor
Memory
Storage
Input
Output
Other












































3. In the table below, list 5 functions/features you would look for in purchasing a computer and explain why each is important to you. (3 Points)

Function/Feature
Explanation as to why and size, capacity, etc. you need this feature/function












5. List and describe the factors that affect the performance of a microprocessor. Name two manufacturers of central processing units (CPUs) and some for the different models of processors that they manufacture. (5 points)









6. At the beginning of an update for your smart phone, you notice a warning that says “Make sure your device is connected to a wall outlet and do not turn the device off until the update is complete.” You suspect that the update is going to _______________ the ROM boot loader to fix a security vulnerability. (2 Points)

7. You are working on a group project and you suggest to your team that they use a ______________ storage service where members can access a shared folder. (2 Points)

8. One of the ports on your laptop is rectangular and the inside of it is blue. It is a(n) _________ port. (2 Points)

9. You need an external keyboard for your Android device, and thankfully you can add a wireless one because it has ________________ capability. (2 Points)

10. You volunteer to produce a large quantity of black-and-white leaflets for a charity organization. It is fortunate that you have access to a(n) _____________________ printer with a high duty cycle and low operating costs.

Answers

1 6gb of ram
inteel
500gb
500gb


Select the correct answer.
For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which feature or menu
option should she use?

ОА SmartArt
OB. Clip Art
OC Charts
OD Shapes

Reset
Next

PLEASE HELP!!

Answers

Answer: B- Clip art

Explanation:

Answer:

Clip Art

Explanation:

In which sections of your organizer should the outline be located?

Answers

The outline of a research proposal should be located in the Introduction section of your organizer.

Why should it be located here ?

The outline of a research proposal should be located in the Introduction section of your organizer. The outline should provide a brief overview of the research problem, the research questions, the approach, the timeline, the budget, and the expected outcomes. The outline should be clear and concise, and it should be easy for the reader to follow.

The outline should be updated as the research proposal evolves. As you conduct more research, you may need to add or remove sections from the outline. You may also need to revise the outline to reflect changes in the project's scope, timeline, or budget.

Find out more on outline at https://brainly.com/question/4194581

#SPJ1

by identifying the fields within a bin by identifying the fields with a tooltip incorrect tooltips are text boxes that appear when hovering over a mark on a sheet, to provide more information. by identifying the fields that each sheet has in common by identifying the fields within a crosstab

Answers

To access the Tooltip Editor in the source sheet, click the Tooltip button in the Marks card. In the Tooltip Editor, select Insert from the menu. Choose Sheets from the Insert menu, then pick a target sheet.

In Tableau, which of the following approaches is appropriate for bolding the tooltip content?

Right-click, select Format, and then, beneath the worksheet's normal formatting, select Tooltip and Bold. Choose bold under Analysis, Tooltip choices.

In Tableau, how do I add a tooltip to a text box?

By choosing the Tooltip option from the Marks shelf, you may add a tooltip. Place the visual you made for this blog post above the relevant textbox on the dashboard where you want the tooltip to appear. You  should now have a textbox with a tooltip that appears when you hover over it.

To know more about Tooltip visit:-

https://brainly.com/question/9409585

#SPJ4

Which type of operating system would be the best choice to control the braking system
on a car?

Answers

Answer:Real type Operating Systems

Answer. Answer: Real type Operating Systems be the best choice to control the braking system on a ca

Explanation:

Sorry if it is late.But hope it helps!\( ̄︶ ̄*\))

Explain the three major Subassembly
of a computer Keyboard​

Answers

The keyboard is divided into four sections: alphabetical keys, function keys, cursor keys, and the numeric keypad.  Additional special-purpose keys perform specialized functions.  The mouse is a pointing device used to input data.  Input devices enable you to input data and commands into the computer.

The  three major Subassembly of a computer Keyboard​ are as follows;  alphabetical keys, function keys, and the numeric keypad.

What are the three major Subassembly of a computer Keyboard​?

The keyboard is divided into four components as; alphabetical keys, function keys, cursor keys, and the numeric keypad.

An Keyboard is an input Device used to enter characters and functions into the computer system by pressing buttons.

An Keyboard is a panel of keys that operate a computer or typewriter.

Additional special-purpose keys perform specialized functions.

The mouse is a pointing device used to input data.

The Input devices enable to input data and commands into the computer.

The  three major Subassembly of a computer Keyboard​ are as follows;  alphabetical keys, function keys, and the numeric keypad.

Learn more about the keybord here;

https://brainly.com/question/24921064

#SPJ2

DSL full form in computer
please give me answer fast​

Answers

Answer:

Digital subscriber line

true or false hardware diagnostics let you run a quick check of system hardware and can verify that most systems components are working correctly

Answers

Answer:

True

Explanation:

And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase

Answers

There were 5 staff members in the office before the increase.

To find the number of staff members in the office before the increase, we can work backward from the given information.

Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.

Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.

Moving on to the information about the year prior, it states that there was a 500% increase in staff.

To calculate this, we need to find the original number of employees and then determine what 500% of that number is.

Let's assume the original number of employees before the increase was x.

If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:

5 * x = 24

Dividing both sides of the equation by 5, we find:

x = 24 / 5 = 4.8

However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.

Thus, before the increase, there were 5 employees in the office.

For more questions on staff members

https://brainly.com/question/30298095

#SPJ8

Jennifer turns on her laptop and hears a series of beeps. What do they probably indicate?

A) operating system error

B) out-of-date device driver

C) internal hardware problem

D) low battery

Answers

Answer:

Option "C" is the correct answer to the following question.

Explanation:

Laptop or computer desktop usually provide beep sounds in series when there is a problem with their internal hardware this is called  Power On Self Test (POST),

The laptop probably indicates an internal hardware problem

Often times, the computer makes sounds (beeps) to call the attention of the computer user. A series of beeps probably indicates that the computer has an internal hardware problem.

Beeps do not necessarily indicate that the computer is faulty. A single beep could indicate that the computer is just coming up (i.e. booting).

However, when the beep is continuous and repeated, it most likely means that the laptop has an internal hardware problem. The beeps usually come up after the computer is coming on, because that is when the computer runs the Power On Self Test (POST),

Read more about computer beeps at:

https://brainly.com/question/9302891

diagram of a central processing unit​

Answers

Hehehehehehehehehehdurnrjrir

In this assignment, you will use all of the graphics commands you have learned to create an animated scene. Your program should have a clear theme and tell a story. You may pick any school-appropriate theme that you like.

The program must include a minimum of:

5 circles
5 polygons
5 line commands
2 for loops
1 global variable
You may wish to use the standard code for simplegui graphics below:

import simplegui

def draw_handler(canvas):

frame = simplegui.create_frame('Testing', 600, 600)
frame.set_canvas_background("Black")
frame.set_draw_handler(draw_handler)
frame.start()

Answers

Using the knowledge of computational language in python it is possible to write a code that graphics commands you have learned to create an animated scene.

Writting the code:

def screensaver(canvas):

   global position

   position[0] += 2

   if not position[0] < limits[1] - square_size:

       position[0] = limits[0]

   position[1] += 3

   if not position[1] < limits[3] - square_size:

       position[1] = limits[2]

   for i in range(5):

            # dx, dy = 0, 0

       px, py = position[0] + dx, position[1] + dy

       if px >= limits[1] - square_size:

           px = limits[0] + px - limits[1] + square_size

       if py >= limits[3] - square_size:

           py = limits[2] + py - limits[3] + square_size

       sq = square(px, py, square_size)

       canvas.draw_polygon(sq, pen_width, 'White')

       cnt = center(px, py, square_size)

       canvas.draw_circle(cnt, circle_size, pen_width / 2, colors[color])

       pl = plus(px, py, square_size)

       for ln in pl:

           canvas.draw_line(ln[0], ln[1], pen_width / 2, 'Blue')

def draw_handler(canvas):

   text_width = frame.get_canvas_textwidth(message, font_size)

   centered_x = (width - text_width) / 2

   canvas.draw_text(message, [centered_x, 112], font_size, 'Red')

See more about python at brainly.com/question/30427047

#SPJ1

In this assignment, you will use all of the graphics commands you have learned to create an animated

Differences between the function and structure of computer architecture​

Answers

Answer:

The primary difference between a computer structure and a computer function is that the computer structure defines the overall look of the system while the function is used to define how the computer system works in a practical environment.

The computer structure primarily deals with the hardware components, while the computer function deal with computer software.

A computer structure is a mechanical component such as a hard disk. A computer function is an action such as processing data.

Explanation:

if it helped u please mark me a brainliest :))

Fritz is a big fan of the racerville rockets. unfortunate;y, the team has been accused of cheating during their games. Fritz reads many articles and posts about this developing news story. His social media algorithms have "learned" that he's a fan of the team, so his feed doesnt show him any articles that argue the accusations are true. From this, Fritz decides his favorite team must be innocent of all cheating charges. Fritz is now in

A. a filter bubble
B. A third party
C. A subculture
D. an echo chamber

Answers

Option(D) is the correct answer. Fritz is now in an echo chamber.

Fritz's situation aligns with the concept of an echo chamber. An echo chamber refers to an environment, such as social media, where individuals are exposed to information and opinions that reinforce their existing beliefs and perspectives.

In this case, Fritz's social media algorithms have filtered out articles that present arguments in favor of the cheating accusations, creating an echo chamber that only confirms his preconceived notion of the team's innocence.

As a result, Fritz is insulated from diverse viewpoints and alternative perspectives, which can hinder critical thinking and a comprehensive understanding of the situation.

for similar questions on Fritz.

https://brainly.com/question/5100081

#SPJ8

It’s pretty much impossible to have a bug-free game upon initial release for anything but the simplest game.
True
False

Answers

Answer:

True

Explanation:

There are usually thousands of line of code and the programmers have to account for serveral different things. For that reason, most complex games will have at least some bugs.

Use the drop-down tool to select the word or phrase that completes each sentence.

The manipulation of data files on a computer using a file browser is
.

A
is a computer program that allows a user to manipulate files.

A
is anything that puts computer information at risk.

Errors, flaws, mistakes, failures, or problems in a software program are called
.

Software programs that can spread from one computer to another are called
.

Answers

Answer:

file management file manager security threat bugs virus

Explanation:

Discuss Internet communications, including social networking, blogs, microblogs, webcasts, podcasts, wikis, client-based and web-based e-mail, and messaging.

Answers

Answer:

Internet communications-Internet communication refers to the sharing of information, data, ideas, or words over the internet. The internet comprises worldwide connected networks that transmit data thru packet switching using the standardized Internet Protocol Suite

social networking-involves the use of online social media platforms to connect with new and existing friends, family, colleagues, and businesses.

blogs- an informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts).

Explanation:

How do you increase the number of tries by one?

tries.add(1)

tries = tries + 1

tries = 1

Answers

Answer:

tries = tries + 1

Explanation:

This is a universal way to increment your variable. In some languages, the following notation also works:

tries++;

tries += 1;

Again, it depends upon the language you are using. Each language has it's own syntax.

Auto-Invest enables users to buy crypto on a recurring basis. What investment strategy is applied?

Answers

dollar-cost averaging (DCA)

The variable "num" holds an integer user input
Write a conditional statement that does the following:

If num is positive, print "__ is positive"
If num is negative, print "__ is negative"

Answers

Answer:

import java.util.*;

class Main {

  public static void main(String[] args) {

         Scanner inp = new Scanner(System.in);

         System.out.print("In");

         int num = inp.nextInt();

         if(num>0) {

                   System.out.println(num + "is positive");

         }

         else if(num < 0) {

                    System.out.println.(num+ "is negative");

        }

        }

}

RUNTIME ORGANIZATION AND DATA LAYOUT.​

Answers

Explanation:

run time organization is the structure of the target computer register and memory .....

Other Questions
A linear function is shown on the graph. A linear function beginning with open circle at negative 3 comma negative 5 and ending with an open circle at 3 comma 7. What is the domain of the function? {y | 5 y 7} {y | 5 < y < 7} {x | 3 x 3} {x | 3 < x < 3} Which table has a constant of proportionality between yyy and xxx of 0.60.60, point, 6?Choose 1 answer:Choose 1 answer:(Choice A)Axxxyyy444777666101010888131313(Choice B)Bxxxyyy4442.42.42, point, 49995.45.45, point, 41414148.48.48, point, 4(Choice C)Cxxxyyy333222999666151515101010 Find the values of x and x2 where the following two constraints intersect. (Round your answers to 3 decimal places.) (1) 10x1 + 5x2 50 (2) 1x + 2x2 12 x1 X x2 Han accidentally drops his water bottle from the balcony of his apartment building. D=32-5t2 complete the table and plot the data Please help will mark Brainly During the first 13 weeks of the television season, the Saturday evening 8:00 P.M. to 9:00 P.M. audience proportions were recorded as ABC 29%, CBS 26%, NBC 24%, and Independents 21%. A sample of 300 homes two weeks after a Saturday night schedule revision yielded the following viewing audience data: ABC 93 homes, CBS 61 homes, NBC 85 homes, and Independents 61 homes. Test with a = 0.05 to determine whether the viewing audience proportions changed. Find the test statistic and p-value. (Round your test statistic to two decimal places. Use Table 3 of Appendix B.) X Test statistic = p-value is between 0.05 and 0.10 Conclusion: There is no significant change in the viewing audience proportions. 01:54:37You have been appointed to a health education team at your school. Your job is to develop the criteria for the health information that another member of the team will be sharing with students. Which term BEST represents your role in the project?A.critical thinkerB.problem solverC.effective communicatorD.self-directedPlease select the best answer from the choices provided.ABCD Hey please help be geniune please help me no links will mark brainliest :( ! The location of three fish relative to the water's surface are -10 feet -3 feet, and -12 feet. Which number has the least absolute value? what is identify if customers needs are being met Imagine that a patient has damage to the semicircular canals on one sideof the head only. What would you expect to happen. (2choose1)A.The patient would lose one member of the pair of opponent angular motionchannels. They would therefore perceive the world as spinning.B.Since the damaged vestibular system cannot send any nerve impulses, nothingwould happen. The patient would simply have less good balance because helost half of his vestibular input. 23.Which statement about the United Kingdom's parliamentary system iscorrect?A. The queen decides which laws Parliament will debate.B. Members of Parliament do not belong to political parties.C. The prime minister is not directly chosen by citizen voters.Members of both houses of Parliament are elected for life. What is the equation: If F=10 N, a=5 m/s, m=? A nucleotide is made up of a A. sugar B. phosphate C. nitrogen base D. all of the above Write three ratios equivalent to the ratios described in each situation.The ratio of cows to chickens is 3:7 Calculate the sum between the fractions below in simplest form *(write as a mixed number)*PLZ HELP!!!!!! from which elements lanthanide series start if someone could please help that would be great is the form of government that was created after a hurricane hit Galveston in 1900.a. Mayor-councilb. Commissionc. Council-managerd. Commissioner's court a 0.32 kg pendulum bob passes through the lowest part of its path at a speed of 2.36 m/s. the acceleration of gravity is 9.8 m/s 2 . what is the tension in the pendulum cable at this point if the pendulum is 75 cm long? answer in units of n.