company has a central office with 150 hosts, and two remote sites with 130 and 50 hosts. the remote sites are connected to the central office and to each other by serial links. decide the network of public ips that the company should aquire. develop an appropriate subnetting plan for their internetwork

Answers

Answer 1

To determine the network of public IPs that the company should acquire, we need to consider the total number of hosts in the company's network.

The central office has 150 hosts, and the two remote sites have 130 and 50 hosts respectively. Therefore, the total number of hosts in the network is 330 (150 + 130 + 50).

To create an appropriate subnetting plan for this network, we can use Classless Inter-Domain Routing (CIDR) notation.

First, we need to calculate the number of bits required for the host portion of each subnet. To do this, we can use the formula:

2^n - 2 >= number of hosts

where n is the number of bits required for the host portion of the subnet.

For the central office, we need at least 8 bits (2^8 - 2 = 254, which is greater than 150). For the remote sites, we need at least 7 bits (2^7 - 2 = 126, which is greater than 130 and 50).

Using this information, we can create the following subnetting plan:

Central office:

Subnet mask: 255.255.255.0 (/24)

Network address range: 192.168.0.0 - 192.168.0.255

Broadcast address: 192.168.0.255

Usable IP addresses: 192.168.0.1 - 192.168.0.254

Remote site 1:

Subnet mask: 255.255.254.0 (/23)

Network address range: 192.168.2.0 - 192.168.3.255

Broadcast address: 192.168.3.255

Usable IP addresses: 192.168.2.1 - 192.168.3.254

Remote site 2:

Subnet mask: 255.255.254.0 (/23)

Network address range: 192.168.4.0 - 192.168.5.255

Broadcast address: 192.168.5.255

Usable IP addresses: 192.168.4.1 - 192.168.5.254

Note that we have used private IP addresses in this example. If the company requires public IP addresses, they will need to obtain a block of IPs from their Internet Service Provider (ISP) and use them accordingly.

Learn more about network here:

https://brainly.com/question/1167985

#SPJ11


Related Questions

5 evaluation criteria

Answers

Answer:

relevance, efficiency, effectiveness, impact and sustainability. 

When two 3NF relations are merged to form a single relation: A. IS-A relationships are formed B. weak entities are created C. recursive relationships may result D. transitive dependencies may result

Answers

When two 3NF (third normal form) relations are merged to form a single relation, transitive dependencies may result, i.e., Option D is the correct answer.

Transitive dependencies occur when a non-key attribute is dependent on another non-key attribute, which in turn is dependent on the primary key. In a merged relation, transitive dependencies may arise if there are common attributes between the two original relations, and if those attributes are not part of the primary key or a candidate key in either relation.

For example, consider two 3NF relations: Employees and Departments. The Employees relation includes the attributes EmployeeID, EmployeeName, and DepartmentID, where DepartmentID is a foreign key referencing the Departments relation. The Department's relation includes the attributes DepartmentID and DepartmentName. If these two relations are merged into a single relation, a transitive dependency may arise between EmployeeName and DepartmentName. This is because DepartmentName is not directly dependent on the primary key of the merged relation, but rather on DepartmentID, which is dependent on the primary key.

Therefore, Option D. Transitive dependencies are the correct answer.

To learn more about the Third Normal Form, visit:

https://brainly.com/question/30508782

#SPJ11

Verizon Wireless created the first national consumer 3G service. The Vcast service included video streaming, online gaming, and other capabilities. Verizon was the first telecomm firm with a full-scale combination of 3G business and consumer services. This new wireless service gave Verizon Wireless ________.

Answers

Verizon Wireless's launch of the first national consumer 3G service, called Vcast, brought various capabilities to its customers. This included video streaming, online gaming, and other features. This new wireless service gave Verizon Wireless Vcast.

The introduction of Vcast allowed Verizon Wireless to offer its customers improved connectivity and access to advanced multimedia experiences on their mobile devices. By providing video streaming, users could enjoy on-the-go entertainment, such as watching videos or movies. The inclusion of online gaming allowed gamers to play their favorite games anytime, anywhere, using Verizon's high-speed 3G network. Additionally, this service offered other capabilities that enhanced the overall user experience.

Overall, Verizon Wireless's launch of the first national consumer 3G service, Vcast, enabled them to bring advanced multimedia capabilities to their customers. This offering marked a significant step in the evolution of mobile communication, as it provided enhanced connectivity and access to a wide range of entertainment options.

Learn more about Verizon wireless

https://brainly.com/question/13738715?

#SPJ11

true/false. The following procedure was developed to determine if a list contains a negative number. If the list contains a negative number it should return true, otherwise it should return false. An error was made in writing this function so that it does not work as intended. Which line of code would need to be fixed in order for the function to work as designed

Answers

By understanding what the procedure does without understanding how it does it, the student is recycling the procedural abstraction of the computer scientist.

What exactly is a group of programs that can be used procedures?

A software is a group of instructions and programs that tells a computer how to carry out various tasks. A software can be thought of as a set of predefined guidelines and instructions that direct a system's operation and compilation of user-oriented programs.

A procedural abstraction is defined.

Writing code sections (referred to as "procedures" or, in Java, "static methods") that are generalized by having variable parameters is known as procedural abstraction.

To know more about software visit:-

brainly.com/question/1022352

#SPJ4

7.4 Code 1 Edhesive assignment

7.4 Code 1 Edhesive assignment

Answers

Answer:

I have attached a screenshot of the program. This ensures that the formatting is not destroyed

Explanation:

The isnumeric() method checks to see if the string is composed of only digits 0 - 9. So entering a float number such as 4.2 or a negative number will fail the test on line 3

7.4 Code 1 Edhesive assignment

could someone please list the psychological impacts of Video games that differ the mind of teenagers. If you’ve previously completed a essay or report on this, please show me as an example. Thank you!

Answers

Answer:

Previous studies show that violent video games increase adolescent aggressiveness, but new Dartmouth research finds for the first time that teenagers who play mature-rated, risk-glorifying video games are more likely subsequently to engage in a wide range of behaviors beyond aggression, including alcohol use, smoking.

Explanation:

it has effected me by the way but im fine now it was for a short amount of time

You are asked to recommend an email retrieval protocol for a company's sales team. The sales team needs to access email from various locations and possibly different computers. The sales team does not want to worry about transferring email messages or files back and forth between these computers. Which email protocol is designed for this purpose

Answers

With IMAP4, a mail server can store messages that users can access from different locations and client devices. A POP3 server necessitates the user downloading their email.

Which of the following protocols allows for safe email retrieval?

Email on a remote web server can be accessed from a local client using the Internet Message Access Protocol (IMAP), a mail protocol. The two most often used Internet mail protocols for obtaining emails are IMAP and POP3.

What one of the following protocols do email servers communicate with one another using?

Over the Internet, emails are delivered using the Simple Mail Transfer Protocol (SMTP). Most email clients send messages to the server using this protocol.

To know more about IMAP4 visit :-

https://brainly.com/question/14289109

#SPJ4

Use the drop-down menus to complete statements that describe SmartArt categories.


Information that does not need to be shown sequentially can be displayed as a_
A _shows a continuous process.


The way various elements in a system interconnect can be shown as a_


A _ displays different elements according to importance or size.
i did this because we don't have a lot of answers for computer classes I know the answers no need to answer

Answers

Answer:

List, Cycle, Relationship, Pyramid.

Explanation:

100%

PLEASE ANSWER FAST IM TIMED
A WYSIWYG editor will save time and make the process of Web site design an artistic practice rather than a ------- practice.

Answers

This open source software helps you either create a website through code, or design it with the help of templates and facile customizations.

What is the difference between HTML and WYSIWYG?

A WYSIWYG editor shows you a rendered web page as you edit the page. You do not see the actual HTML. When using manual coding, you see the HTML, but you must load the document in a web browser to view the rendered page.

Is WYSIWYG easy to use?

An efficient free WYSIWYG Editor comes with an easy-to-use toolbar, keyboard shortcuts, and other features that allow you to easily add or edit content, images, videos, tables, or links. A WYSIWYG editor saves time and makes web content creation quick and easy.

To know more about  WYSIWYG visit:

https://brainly.com/question/12340404

#SPJ1

Answer:

Programming

Explanation:

WYSIWYG (sometimes pronounced "wizzy wig") is an acronym that stands for "What You See Is What You Get." It is a phrase that was coined when most word processing, desktop publishing, and typesetting programs were text and code based. HTML, at its code level, is much like the early interfaces on this sort of software. A WYSIWYG editor saves time and makes the process of website design an artistic practice rather than a programming practice.

To excel at these professions, you need to be able to combine an eye for elegant design with a mind that delights in efficient order. In order to excel in web design, you need to combine design with ______. A web presence creative communication a complete vision an organized mind

Answers

Answer: An organized mind

Drive
0101
0102
0103
0104
0105
0106
0107
0108
0109
0110
0111
0112
0113
0114
0115
0166
Sorting Minute
True
102
162
165
91
103
127
112
137
102
147
163
109
91
107
93
100
An Excel table can help
you organize your data in
preparation for using it
with charts and other
analysis tools.
Copyright © 2003-2022 International Academy of Science. All Rights Reserved.
False

Answers

Answer:

What

Explanation:

True

Compare the City of Austin and AISD bond sites and pull up some of the project data and graphics. What aspects of these sites do you think are useful (or not)? Why or why not?

Answers

The couple, both architects, immediately raised a family and began remodelling the 1939 home they purchased in 2015, but their lush, tranquil East Austin neighbourhood began to change.

Friends and neighbours were priced out. Older bungalows were demolished and rebuilt with multimillion-dollar mansions. Daniel sold his property in 2018, and a real estate speculator bulldozed the historic trees.

Then, in the summer of 2020, a developer called Anmol Mehra attended a neighbourhood association meeting and stated that he was considering purchasing the cleared site as well as the lot next door in order to create a mixed-income, multifamily building on the four-acre parcel. He was curious as to what the rest of the neighbourhood thought.

Learn more about architects here:

https://brainly.com/question/15802668

#SPJ4

How would the grain crusher work

Answers

Answer:

Grain crusher is used to crush various kinds of grains, peas, buckwheat, beans, corn, linseed seeds and etc. Crushed grains are usually used to feed ruminant animals. Crushed grain are easier to digest, nutrients are assimilated more easily.

Use the drop-down menus to complete the statements about creating a table of authorities.
Before inserting a table of authorities, you must first create or mark
To insert a table of authorities, look under the command group in the
tab.

Answers

Explanation:

1st drop down: citations

2nd drop down: References

Answer:

Use the drop-down menus to complete the statements about creating a table of authorities.

Before inserting a table of authorities, you must first create or mark  

✔ citations

.

To insert a table of authorities, look under the command group in the  

✔ References

tab.

Explanation:

For function isreverse, write the two missing base case conditions. Given two strings, this function returns true if the two strings are identical, but are in reverse order. Otherwise it returns false. For example, if the inputs are tac and cat, then the function should return true.

Answers

Answer:

def isrreverse(str1, str2):

       return str1 == str2[::-1]

Explanation:

Which of the following algorithms is used to control network access and handle collisions on the shared Ethernet Network?

Answers

The algorithm used to control network access and handle collisions on a shared Ethernet network is the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) algorithm.

In CSMA/CD, devices on the network listen for carrier signals before transmitting data. If a carrier signal is detected, indicating that the network is busy, the device waits for a random period before attempting to transmit again. If multiple devices attempt to transmit simultaneously and a collision occurs, CSMA/CD employs collision detection to detect the collision and then initiates a collision resolution process. After the resolution, the devices involved in the collision wait for random time intervals before retransmitting. CSMA/CD is widely used in Ethernet networks to ensure fair and efficient access to the shared medium and to handle collisions effectively.

To learn more about network  click on the link below:

brainly.com/question/32149786

#SPJ11

_______ is used for the creation of documents using page layout with high quality typographic text and graphics.Choose matching definitionA. subscription softwareB. computer modelingC. all of these optionsD. desktop publishing software

Answers

Desktop publishing software is used for the creation of documents using page layout with high-quality typographic text and graphics.

So, the correct answer is D.

This type of software allows users to design and produce professional-looking documents such as brochures, newsletters, posters, and more.

Unlike subscription software (A) or computer modeling (B), desktop publishing software specifically focuses on combining text and visual elements to create visually appealing and well-organized content.

In this case, option C (all of these options) is not accurate, as only desktop publishing software fits the given description.

Hence, the answer of the question is D.

Learn more about software at https://brainly.com/question/9234026

#SPJ11

Which of the following BEST describes the differences between sequential and event-driven programming?

Answers

Answer:

In sequential programming, commands run in the order they are written. In event-driven programming, some commands run in response to user interactions or other events.

Explanation:

Event-driven program : A program designed to run blocks of code or functions in response to specified events.

Sequential programming: The order that commands are executed by a computer, allows us to carry out tasks that have multiple steps. In programming, sequence is a basic algorithm: A set of logical steps carried out in order.

The missing options are;

A) In sequential programming commands run one at a time. In event-driven programming all commands run at the same time.

B) In sequential programming commands run faster than in event-driven programming.

C) In sequential programming each command is run many times in sequence. In event-driven programming all commands are run a single time as an event.

D) In sequential programming commands run in the order they are written. In event-driven programming some commands run in response to user interactions or other events.

This question is about sequential programming and event-driven programming.

Option D is correct.

To answer this question, we need to first of all define what the two terminologies in computer programming are;

Event-driven programming; This is a programming pattern whereby the program flow is determined by a sequence of events that arise from activities/interaction of the user or the system.

Sequential programming: This is a programming pattern whereby the program flow is determined by the sequence in which it was written.

Looking at the given options, the only one that fits perfectly into the description I have given above about sequential and event-driven programming is Option D.

Read more at; brainly.com/question/17970226

What needs to be public and what needs to be private?

What needs to be public and what needs to be private?

Answers

In this scenario, the most appropriate implementation of the Car class would be:

public class Car
{
public String make;
public String model;
public Car(String myMake, String myModel) { /* implementation not shown */ }
}
In this implementation, the attributes make and model are both declared as public, which means that they can be accessed and modified by code outside of the Car class. This is appropriate, as the make and model of a car are typically considered to be public information that can be accessed by anyone.

The constructor for the Car class is also declared as public, which means that it can be called by code outside of the Car class. This is appropriate, as the constructor is used to create new instances of the Car class, and this functionality should be available to code outside of the class.

In contrast, if the attributes make and model were declared as private, they would only be accessible within the Car class and would not be available to code outside of the class. Similarly, if the constructor were declared as private, it would only be accessible within the Car class and could not be called by code outside of the class. These declarations would limit the ability of code outside of the Car class to access and use the make, model, and constructor functionality, which would not be appropriate for this scenario.

What best describes the difference between plagiarism and fair use?
a Plagiarism is copying material without crediting the source, while fair use is a limited, nonprofit use.
b Plagiarism is copying material for profit, while fair use is a limited, non-profit use.
c Plagiarism is any copying of material without credit to the source, while fair use is unlimited nonprofit use.
d Plagiarism allows for unlimited, nonprofit use, while fair use is copying material for profit.

Answers

Answer:

What best describes the difference between plagiarism and fair use?

Explanation:

b Plagiarism is copying material for profit, while fair use is a limited, non-profit use.

Answer:

Its A    Not B!!!!!

Plagiarism is copying material without crediting the source, while fair use is a limited, nonprofit use.

Explanation:

Does anyone know these ? 63 points!

Does anyone know these ? 63 points!

Answers

try reposting with better lighting and closer to the paper

Components can be removed from a GameObject if they are no longer needed (T/F):

Answers

The statement given "Components can be removed from a GameObject if they are no longer needed " is true because In unity, components can be added and removed from GameObjects dynamically.

Components are responsible for adding specific functionalities and behaviors to GameObjects. If a component is no longer needed or desired for a particular GameObject, it can be removed from that GameObject.

Removing a component can be done through the Unity Editor interface or through scripting. In the Unity Editor, components can be removed by selecting the GameObject, navigating to the Inspector panel, and clicking on the "Remove Component" button for the specific component. In scripting, the Destroy or RemoveComponent methods can be used to remove a component from a GameObject.

You can learn more about Unity Editor at

https://brainly.com/question/31843948

#SPJ11

Write a program that: Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint: use Mod). Displays the sum.

Answers

Answer:

Following are the code to this question:

#include <iostream>//defining header file

using namespace std;

int main()//defining main method

{

int x[]={2,3,4,6,7,8,9,1,11,12};//defining 1-D array and assign value

int i,sum=0;//defining integer variable

for(i=0;i<10;i++)//defining loop for count value

{

   if(x[i]%2==1)//defining if block to check odd value

   {

       sum=sum+x[i];//add value in sum variable

   }

}

cout<<sum;//print sum

return 0;

}

Output:

31

Explanation:

In the above-given program, an integer array "x" is declared that holds some integer values, and in the next line two integer variable "i and sum" is defined which is used to calculate the value.

In the next line, a for loop is declared, that counts all array value, and it uses the if block to check the odd value and add all the value into the sum variable.

The code is in Java.

It uses for loop, if-else structure, and mod to calculate the sum of odd numbers in a list.

Comments are used to explain each line of code.

You may see the output in the attachment.

//Main.java

import java.util.*;

public class Main

{

public static void main(String[] args) {

   

    //create a list with some numbers

    List<Integer> lotsOfNumbers = Arrays.asList(7, 20, 1002, 55, 406, 99);

   

    //initialize the sum as 0

    int sumOfOdds = 0;

   

    //create a for each loop to iterate over the lotsOfNumbers list

    //check each number, if it is odd or not using the mod

    //if it is odd, add the number to the sum (cumulative sum)

    for (int number : lotsOfNumbers){

        if(number % 2 == 1)

            sumOfOdds += number;

    }

   

    //print the sum

    System.out.println("The sum of odd numbers: " + sumOfOdds);

}

}

You may check out another question at:

https://brainly.com/question/24914609

Write a program that: Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd

Which of the following should you consider when choosing a file format?

the browser you use most often

the age of the person who created the file

the need for future access and digital preservation

the length of time a file is under copyright law​

Answers

Answer:

“The need for future access and digital preservation”

Explanation:

When choosing a file format, it is important to consider the need for future access and digital preservation. The correct option is 3.

What is file format?

A file format is a method of organizing and storing data in a file that is standardized. It specifies how data in the file is organized and represented.

It is critical to consider the need for future access and digital preservation when selecting a file format.

This is due to the fact that different file formats have varying levels of compatibility with different software and operating systems, and some formats may become obsolete over time, making future access or opening of the file difficult or impossible.

Other factors to consider when selecting a file format include the intended use of the file, the file's quality and size, and any specific requirements or limitations of the software or platform being used.

Thus, the correct option is 3.

For more details regarding file format, visit:

https://brainly.com/question/1856005

#SPJ7

CYBERSECURITY. ITS THE ONLY ONE I GOT STUCK ON PLS HELP.
Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?

Answers

Answer:  How might these features enhance cybersecurity for Windows users:

1) Boot in safe mode - The safe mode only loads minimal and trusted drivers and services (excluding third-party options) thereby allowing isolation of potential issues, viruses, and trojan malware.

2) Boot from disk - The boot from disk option loads the operating system from a disk image, rather than loading it from the host system. This eliminates the loading of corrupted, infected, or altered boot loader files from a suspect system.

3) Start-up Utility - The startup utility provides the user with direct control over what applications, services, batch files, drivers, and scripts are run during the startup process. This can remove third-party bloatware or malware that can impact system performance or compromise cybersecurity for the user(s) data, access, identity, and applications.

Explanation:

All of these Windows tools enable different options for users to manage, troubleshoot, and protect their systems, data, identity, and applications from cybersecurity breaches, hackers, monitoring, and potential trojan malware. Used in together, they provide a comprehensive set of tools that can protect and disable cybersecurity threats and exploited vulnerabilities.

Please remember to vote this as Brainliest if I earn it!   :)

Which type of software can be used without paying a license fee and can be modified to add capabilities not realized by its originators?.

Answers

A type of software which can be used without paying a license fee and modified to add capabilities not realized by its originators is referred to as an: C. Open-source software.

What is a software license?

A software license can be defined as a formal agreement between an end user (customer) and the owner of a software program or software developer, that allows him or her to perform certain tasks with the software application (program), usually after paying a license fee.

The types of software license.

In Computer technology, there are three (3) main types of software programs based on usage rights and these include the following:

Shareware softwareFreeware softwareOpen source softwarePurchased license

In Computer science, an open source can be defined as a terminology for software that all end users can use or modify for free without paying any license fee (money).

Read more on software here: brainly.com/question/25703767

#SPJ1

Complete Question:

Which type of software can be used without paying a license fee and can be modified to add capabilities not realized by its originators? *

10 points

Application software

System software

Open-source software

Proprietary software

7.5 Code Practice I need help

Answers

Answer:

ok hold on ok

Explanation: ok

which network node is responsible for all signaling exchanges between the base station and the core network and between users and the core network. group of answer choices enodeb radio base station mme serving gateway none of the above

Answers

The MME (Mobility Management Entity) is responsible for all signaling exchanges between the base station (eNodeB) and the core network and between users and the core network. The MME is a key component in LTE (Long-Term Evolution) cellular networks, and its main role is to manage user mobility and perform authentication and security functions.

MME is responsible for handling the initial attachment of a user to the network, as well as tracking the user's location and maintaining their context as they move between cells. The MME also communicates with the Serving Gateway (S-GW) to route data between the user and the core network, and it communicates with the eNodeB to control the radio access network and manage user connections. In this way, the MME acts as a bridge between the radio access network and the core network, and it is critical to the smooth operation of LTE networks.

Learn more about network node: https://brainly.com/question/16009226

#SPJ4

We Are Given A Data Model That Contains Three Measures: ManASales =160 ManBSales =30 Manager Performance =

Answers

A wins is correct.

How to get the answer

The output of the given SWITCH formula in DAX would depend on the values of ManASales and ManBSales.

If ManASales is greater than ManBSales (ManASales > ManBSales), the output would be "A Wins".

If ManBSales is greater than ManASales (ManBSales > ManASales), the output would be "B Wins".

If both ManASales and ManBSales are equal (a tie), the output would be "Tie".

If any of the measures (ManASales or ManBSales) is BLANK, the output would also be BLANK.

Read moe on data models here https://brainly.com/question/13437423

#SPJ1

Question

We are given a data model that contains three measures: ManASales =160 ManBSales =30 Manager Performance = SWITCH(TRUE(), ManASales > ManBSales, "A Wins", ManBSales > ManASales, "B Wins", "Tie") What would be the output of this SWITCH formula in DAX? Tie A Wins BLANK) B Wins

What are Apps?
How do we interact with them?

Answers

Answer:

Sliding elements in list format.

Cards.

Images.

Buttons.

Overflow screens.

Multiple selection app interactions.

Text input fields.Explanation:

Other Questions
List the kings of England and France and their achievements. In an attempt to keep the poor of Rome from revolting, the Roman emperors: Gretta is having a birthday party and is buying pizza for everyone. She buys 32 pizza for 8.00 dollars. What is the unit rate? here's a better picture from the last one What is the inverse of the function f(x) = 4x + 8? Which of the following is true regarding the sequence graphed below?an353025 (5, 25)2015- (4. 16)10 - (3,9)5 (2, 4)1 2 345 67 89nThe sequence is arithmetic because the terms have a common difference.O The sequence is arithmetic because the terms do not have a common difference which word applies to the process that returns refrigerant to new product specifications and that requires chemical analysis? A major benefit of the daguerreotype process is that ________. Group of answer choices daguerreotypes can be made very quickly it creates very detailed images daguerreotypes are negatives that can be readily reproduced it can photograph in the dark it records color the treatment model advocated by alcoholics anonymous is an example of a approach. a) behavioral b) cognitive c) psychodynamic d) sociocultural Which of the following was a border state during the US Civil War?A)ArkansasB)Kentucky C)OhioD)Texas Which letter has rotational symmetry? E B Z V The body temperature of an Oryx can reach 47 oC, however, there is one organ that they ensure is kept cooler than this. Which of the following organs is it? A.Lungs.B.Heart.C.Brain.D.Liver.E.Kidneys.Fish scales and swim bladders contain _______________, which is a common nitrogenous excretory product of spiders and scorpions. A.Ammonia.B.Uric acid.C.Urea.D.Guanine.E.Guano.____________ is essentially the ratio between the reaction rates of a process adjusted for a 10oC temperature difference. A.An Arrhenius plot.B.Semilog plot.C.Log plot.D.Q10.E.QPSU.If I want to be light and live on land, which one of the following compounds is likely to be my main nitrogenous excretory product? A.Uric acid.B.Urea.C.Nitrates.D.Ammonia.E.Nitrogen gas. A 2 Kg Particle Is Given A Displacement Of F=(3 M)I+ (3 M)J - (2 M)K During The Displacement, A Constant Force F = (2 N)I - (1 N)I + (1 N) Acts On The Particle. a. Find The Work Done By F For This Displacement b. Find The Component Of F In The Direction Of This Displacement The English would become the dominant power in North America by 1750. What features were common to ALL of the English southern colonies and which were unique to just South Carolina, Vlrginia, or Maryland?(This is the 5th time I've posted this same question because people don't understand that you must also find things that were unique to the colonies SOUTH CAROLINA, VlGINIA, AND MARYLAND. Please remember that you must find things unique for all of the colonies and then for just the 3!)Im desperate! Please answer fully! - Bng l lun v thc tin chng minh cu tc ng B khng vin, c gy cnh+ Gii thch ngha n d+ Chng minh iu ng vi tt c tr trong bt k thi i no+ Nn gio dc tr ci g? An automobile weighing 1000 lb empty and 3000 lb fully loaded, vibrates in a vertical direction while traveling at 55 mph on a rough road having a sinusoidal waveform with an amplitude Y ft and a wavelength of 12 ft. Assuming that the automobile can be modeled as a single-degree-of-freedom system with stiffness 30,000 lb/ft and damping ratio zeta = 0.2, determine the amplitude of vibration of the automobile when (a) It is empty (b) It is fully loaded. dentify whether the Muslims believe in an infinite nature of the world. Using the periodic table, find the neutral atom that has the same electron configuration as 1s2s22p.boronneonOphosphorusO carbon Nitrogen in(N2)PlantsAssim lationDelenitvingNitrogen-flingbactena inroot nodulesof legumesNitrates (NO)DecomposersWWWatenNitrily ngbacteriaNecationArmonificationAmmonium (NH2Nitrogen-firingsoll BacteriaNitrites (NO2NitrifyingBacteriaDefinition: This is the cycling of nutrients among soil, litter, plant roots, and above-ground plant parts. What biomolecule is a cell with a lot of ribosomes attached to its rough endoplasmic reticulum probably specialized to manufacture?