Internet Protocol Group of answer choices is a Link Layer protocol. is a connection oriented protocol. performs routing functions. provides end-to-end service

Answers

Answer 1

Internet Protocol (IP) performs routing functions. The correct answer is option C.

IP (Internet Protocol) is responsible for providing internet working. It is responsible for the routing of data packets between the computer networks.The protocols in the TCP/IP protocol suite make use of IP to deliver data from one device to another device across a network.

A data packet sent through a network is routed based on the network layer protocol, which is the IP protocol. The primary functions of the Internet Protocol (IP) are the following:IP provides connection less, unreliable, and best-effort delivery of datagrams, which are packets of data.IP defines a logical addressing scheme that enables the identification of a host's location on an IP network.

IP is responsible for routing packets from one host to another, which involves forwarding them through intermediate routers.

Hence, option C is the right one.

To know more about Internet Protocol, visit https://brainly.com/question/16224929

#SPJ11


Related Questions

_____ changes all occurrences of misspelled words in a document.
A. Options
B. Replace
C. Change All
D. Explain

Answers

Answer:

My answer is C.

Choose the correct function to yield the shown result.
>>>____(3)
3.0

- int
-round
-float
-str

Answers

Answer:

int

Explanation:

Correct on edg test 2021

any one know how to fix forzas camera bc it shutters to much

any one know how to fix forzas camera bc it shutters to much
any one know how to fix forzas camera bc it shutters to much
any one know how to fix forzas camera bc it shutters to much

Answers

Answer:

LEDs are powered by alternating current AC.

Explanation:

The electricity will move in and out of cycles.

When the FPS won't math it'll flicker. Try switching to your camera's shutter speed instead. ( May be times your camera won't support it.)

Which line of the function has an error? int computesumofsquares(int num1, int num2) { int sum; // line 1 sum = (num1 * num1) (num2 * num2); // line 2 return; // line 3 }

Answers

The line of the function that has an error is (num1 * num1) and (num2 * num2)

Which line of the function?

The mistake is in 2 of the function. The multiplication movement betwixt (num1 * num1) and (num2 * num2) should be recouped accompanying an adding operation to estimate the total of squares right.

The corrected line 2 bear express: scsssum = (num1 * num1) + (num2 * num2);Additionally, the return assertion following 3 bear specify the changeable reach be returned, in this manner:bashreturn total;

Learn more about error from

https://brainly.com/question/30062195

#SPJ1

Python and using function

Takes two integer parameters. Returns the integer that is closest to 10

Answers

Answer:

def closest_to_10(num1, num2):

   if num1-10 < num2-10:

       return num2

   else:

       return num1

Explanation:

Give one (1) advantage and one(1) disadvantage of using and integrated software package over a custom written one.

Answers

Answer:

See explanation

Explanation:

An Integrated software package is a kind of software package that combines various applications in just one program. It basically provides one spreadsheet, one word processing and database management. A good example is the Microsoft Office.

A custom written software package on the other hand is the type that is specially created for a particular business. It is created to meet the client's specifications and preferences.

An advantage of using integrated software is the low cost and fast deployment. Integrated software packages are relatively affordable and easy to acquire unlike that custom based ones that take time to create.

A disadvantage of the integrated software is the lack of control and flexibility. Because it is an integrated software package, you have no control over how it is built and on the long run their updates may not be what you want. And unlike the Custom written one, you cannot tell the developers to add or remove features that suit your needs.

An integrated software suite is a form of software bundle that combines multiple programs into a single application. It contains a single spreadsheet, word process, and database administration tool.

The content and quality software suite, on either hand, is specifically created for a specific firm. It is made to fulfill a client's needs and preferences.

Advantage:

Its low cost and ease of deployment of integrated software. Unlike made-to-order software applications, which take time to develop, integrated software is very inexpensive & straightforward to obtain.

Disadvantage:

It is the loss of oversight and flexibility therefore it is embedded system software, you have no control over how it is produced; as a result, any upgrades aren't always what you want in the long run. In addition, unlike the Manually created one, you may instruct the programmers to add or delete features that meet your requirements.

Learn more about integrated software packages:

brainly.com/question/17541095

The ________ compares your entry against its database and returns the result, a list of sites on that topic.

Answers

The answer is: search engine.

The Search Engine compares your entry against its database and returns the result, a list of sites on that topic.

The term you're looking for is "search engine." A search engine is a software system that compares the query or keywords you enter against its vast database of websites, documents, and other online content.

When you use a search engine, you're essentially asking it to find information related to a specific topic. The search engine's algorithms analyze billions of web pages and documents to identify those that best match your query.  

These algorithms take into account various factors, including keywords, website authority, relevance, and user engagement.

Learn more about Search Engine here:

https://brainly.com/question/32419720

#SPJ3

What is software that is available for use at no cost, but usually has some restricted usage rights?.

Answers

Answer:

Shareware software is distributed at low (or sometimes no) cost, but usually requires payment and registration for full legal use.

Hope This Helps!!!

Print the numbers from 20 to 1 using a while loop

Answers

This is python:
X=0

While (x<20):
Print(20-x)
X+=1

Please use Excel and it's formula show me with ell reference

Calculate the value of a bond that matures in 16 years and has a $1,000 par value. The annual coupon interest rate is 14 percent and the​ market's required yield to maturity on a​ comparable-risk bond is 16 percent

Answers

Finally, calculate the total value of the bond by summing up the present values in column D:

=SUM(D2:D17)

To calculate the value of a bond using Excel, you can use the present value formula. Here's how you can do it:

Open Excel and set up the following column headers in cells A1 to D1:

A1: Years

B1: Cash Flow

C1: Discount Rate

D1: Present Value

In cells A2 to A17, enter the years from 1 to 16 (representing the maturity of the bond).

In cell B2, enter the coupon payment, which is 14% of the par value: =1000*0.14

In cell C2, enter the market's required yield to maturity: 0.16

In cell D2, enter the present value formula to calculate the present value of the cash flow:

=B2/(1+C2)^A2

Copy the formula from cell D2 and paste it into cells D3 to D17 to calculate the present value for each year.

The resulting value in the total sum cell will be the value of the bond.

Learn more about bond  here

https://brainly.com/question/31994049

#SPJ11

Assembly language does not allow the use of symbolic operation codes: true or false

Answers

The statement "Assembly language does not allow the use of symbolic operation codes" is false. Assembly language does, in fact, allow the use of symbolic operation codes.

Assembly language is a low-level programming language that represents machine instructions using mnemonics, which are symbolic operation codes.

In assembly language, mnemonic instructions are used to represent specific machine operations, such as arithmetic, logical operations, memory manipulation, and control flow. These mnemonics provide a human-readable representation of the corresponding machine instructions.

For example, in x86 assembly language, the mnemonic "ADD" is used to represent the addition operation, "SUB" for subtraction, "MOV" for data movement, and so on. These mnemonics are mapped to the actual machine instructions when the code is assembled or translated into machine code.

Symbolic operation codes make assembly language programming more intuitive and readable compared to working directly with binary machine instructions. They allow programmers to express operations concisely and aid in understanding and maintaining assembly code.

For more questions Assembly language, click on:

https://brainly.com/question/13171889

#SPJ8

which type of cabling does the 10baset standard specify?

Answers

The 10BASE-T standard specifies unshielded twisted pair (UTP) cabling.What is the 10BASE-T standard?10BASE-T is a type of Fast Ethernet that uses twisted pair cables to transmit data at a rate of 10 Mbps (megabits per second).

The 10BASE-T standard was introduced in 1990 as part of the IEEE 802.3i specification. It was the first Fast Ethernet standard and allowed existing copper wiring to be used for Ethernet networks.

Unshielded twisted pair (UTP) cabling is a type of copper cable that is used for networking. It consists of four pairs of wires that are twisted together to reduce interference from other devices and electrical signals. UTP cabling is often used for Ethernet networks because it is relatively inexpensive and easy to install. It is also used for telephone systems and other types of data transmission.

To know more about Unshielded twisted pair (UTP)  click here,

https://brainly.com/question/32131387

#SPJ11

A set of data with a correlation coefficient of -0.855 has a a. moderate negative linear correlation b. strong negative linear correlation c. weak negative linear correlation d. little or no linear correlation

Answers

A set of data with a correlation coefficient of -0.855 has a  weak negative linear correlation.

Thus, A correlation coefficient gauges how closely two variables are related to one another. The Pearson coefficient, which has a range of -1.0 to +1.0, is the correlation coefficient that is most frequently employed.

Two variables that have a positive correlation tend to move in the same direction. Two variables with a negative correlation tend to move in the opposing directions.

While a correlation value of -0.3 or lower shows a very weak association, one of -0.8 or lower suggests a strong negative relationship.

Thus, A set of data with a correlation coefficient of -0.855 has a  weak negative linear correlation.

Learn more about Corelation, refer to the link:

https://brainly.com/question/30116167

#SPJ4

quality is first and foremost a function of what in a lean-agile environment?

Answers

Quality is first and foremost a function of continuous improvement in a lean-agile environment.

In a lean-agile environment, what is the primary factor that determines quality?

Quality in a lean-agile environment is primarily determined by the ongoing process of continuous improvement. This means that quality is not seen as a static characteristic but rather as an evolving outcome that is constantly refined and enhanced through iterative cycles of feedback, learning, and adaptation. In such an environment, quality is not solely the responsibility of a specific team or department but is ingrained into the entire organizational culture, encouraging everyone to actively contribute to the improvement of products, processes, and practices.

To achieve high-quality outcomes, a lean-agile environment promotes the principles of transparency, collaboration, and relentless improvement. It emphasizes the importance of regular inspections and adaptations, empowering teams to identify areas for improvement and implement changes accordingly. By embracing a mindset of continuous learning and adaptability, organizations foster an environment where quality becomes a shared responsibility and a collective effort.

Learn more about Lean-agile environment

brainly.com/question/8799238

#SPJ11

Computers with AI use machine intelligence to make decisionsTrueFalse

Answers

Computers with AI use machine intelligence to make decisions is TRUE.

What is machine learning?

The process by which computers learn to recognize patterns, or the capacity to continuously learn from and make predictions based on data, then make adjustments without being specifically programmed to do so, is known as machine learning (ML), a subcategory of artificial intelligence.

The operation of machine learning is quite complicated and varies according to the task at hand and the algorithm employed to do it. However, at its foundation, a machine learning model is a computer that analyzes data to spot patterns before using those realizations to better fulfill the work that has been given to it. Machine learning can automate any task that depends on a set of data points or rules, even the more difficult ones.

Here you can learn more about artificial intelligence.

brainly.com/question/28144983

#SPJ4

Could someone please tell me what is the error in my code?

I'm trying to write a code for finding the cube of a number using C programming.

Could someone please tell me what is the error in my code?I'm trying to write a code for finding the

Answers

I think you have to remove the semicolon at the end of line 15. From what I see, this is not a logic error, rather than a syntax error.

Looking at the error on the bottom, it's expecting a '(' before the '{'.

Natasha wants to organize the files on her hard drive by grouping and storing related files together in a common area. How should she accomplish this

Answers

Answer: She must create new folders to group related files within them.

Explanation:

What is the benefit of hosting a website on a personali
O A.
lesser cost of buying hardware
B. good Internet speed
o c.
better cooling of web server machines
D.
easier backups

Answers

I believe the answer is D :)

According to the segment, which of the following is NOT an element typically included in scripts?

Answers

A script's main function is to give performers guidance on how to represent particular characters in the best possible light. An actor may be better able to prepare for the part and give a more compelling performance.

What is the name of the person who is in charge of cutting and putting the movie together?

It is the job of a film editor to put a vision together using the director's interpretation of the script. They will meet with the director and frequently travel to the setting to experience the story from the director's perspective as it is captured on camera.

What constitutes a script's five components?

For the purposes of this introduction, we'll refer to them as character, want and need, story, structure, conflict, and resolution.

To know more about function visit:-

https://brainly.com/question/28939774

#SPJ1

You do not have to move your fingers to click the bottom row reach keys.
1. True
2. False

Answers

Answer:

2false

Explanation:

hope dis helps u ^_^

the answer is 2 false

Which statement is most accurate?Batteries with higher voltage will always produce a lower current rating than batteries with low voltages. Voltage is not a good indicator of electrical current that batteries can produce. A 1.5 volt battery has less ability to move electrons than a 6 volt battery. A 12 volt battery creates more electrical pressure than a 24 volt battery.

Answers

A 12 volt battery creates more electrical pressure than a 24 volt battery.

What is meant by volt?

-A measurement of the electromotive force and electrical potential difference between two places in a conducting wire carrying a continuous current of one amp when the power applied between these two sites is equal to one watt.

-A volt is defined as the energy consumption of one joule for every coulomb of electrical charge. 1V = 1J/C.

One volt is the difference in potential between two locations in a wire carrying one ampere of current when the power expended between the places is one watt.

-Volts are units of electrical potential, potential difference, and electromotive force in the metre-kilogram-second system (SI).

To know more about volt visit:-

brainly.com/question/27861305

#SPJ1

Implementing encryption on a large scale, such as on a busy web site, requires a third party, called a(n) ________.

Answers

certificate authority

In the list of top ten activities Canadians perform on a smartphone, the first one is:
a) sending/receiving email or text
b) messaging
c) connecting to a social network
d) listening to music

Answers

In the list of top ten activities Canadians perform on a smartphone, the first one is sending/receiving email or text.

According to the provided options, the first activity that Canadians commonly perform on their smartphones is sending/receiving email or text messages. This activity involves using the smartphone's messaging apps or email clients to communicate with others via text-based messages or emails. Canadians rely on their smartphones for instant messaging, staying connected with friends, family, and colleagues, and managing their email correspondence on the go. Texting and email communication have become essential functions of smartphones, enabling Canadians to stay in touch and maintain efficient communication in both personal and professional spheres.

To know more about text-based messages here: brainly.com/question/30737224

#SPJ11

6.6 PRACTICE: Loops (for)*: Output sequence
(1) Given an integer n, write a for loop that outputs the numbers from -n to +n. Assume n is nonnegative. End the sequence with a newline.

Enter an integer:
2
Sequence: -2 -1 0 1 2
(2) If n is negative, treat as the absolute value. So n of -2 is the same as n of 2. Hint: Use an if statement before the for loop, to compute the absolute value of n.

Enter an integer:
-2
Sequence: -2 -1 0 1 2
Template given:

import java.util.Scanner;

public class Main {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int n;
int i;

System.out.println("Enter an integer:");
n = scnr.nextInt();

System.out.print("Sequence: ");
/* Type your code here. */
}
}

Answers

For problem (1), the solution can be implemented using a for loop that iterates from -n to n, with a step of 1. Here's the code:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       int n;

       System.out.println("Enter an integer:");

       n = scnr.nextInt();

      System.out.print("Sequence: ");

       for (int i = -n; i <= n; i++) {

           System.out.print(i + " ");

       }

       System.out.println();

   }

}

For problem (2), we can use an if statement to compute the absolute value of n before the for loop, if n is negative. Here's the modified code:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       int n;

      System.out.println("Enter an integer:");

       n = scnr.nextInt();

       if (n < 0) {

           n = -n;

       }

       System.out.print("Sequence: ");

       for (int i = -n; i <= n; i++) {

           System.out.print(i + " ");

       }

       System.out.println();

   }

}

What is the rationale for the above response?  

The above response provides two solutions for the problem of outputting a sequence of numbers from -n to n, with n being a non-negative integer.

The first solution uses a for loop with a step of 1 to iterate over the sequence, while the second solution includes an if statement to compute the absolute value of n before the for loop.

The solutions are provided in Java programming language and are accompanied by an explanation of the code.

Learn more about loops at:

https://brainly.com/question/25955539

#SPJ1

I’m building a pc name some good parts I need some help on some parts? And prices plz

Answers

Answer:$25

Explanation:

imagine you insert a modulator in one of the slits that can change the phase of the radiation in that slit. if it changes the phase randomly and rapidly (much faster than your eye can observe changes) what sort of intensity pattern would you expect to observe?

Answers

You would expect to observe a pattern of intensity that is quite unpredictable and irregular, with areas of light and dark that fluctuate rapidly and change in unpredictable ways. This is known as a 'speckle' pattern.

A speckle pattern is created when a modulator is inserted into one of the slits and rapidly changes the phase of the radiation it emits. This rapidly changing phase causes the interference pattern to become unpredictable and irregular, with varying levels of intensity across the screen.

Learn more about pattern: https://brainly.com/question/17386984

#SPJ4

let g = ( v , e ) be an undirected graph where v = { a , b , c , d , e , f , g , h }

Answers

g = ( v , e ), where v = { a , b , c , d , e , f , g , h } is an undirected graph. Here are the definitions of undirected graph, vertices, and edges:

An undirected graph is a graph in which all edges are bidirectional, or in other words, there is no direction for an edge.Edges:An edge is a line between two vertices that represents a connection between two vertices.

Vertices:Vertices are a set of points in which each point represents an object, person, or node. They are also known as nodes. An undirected graph is graph, i.e., a set of objects (called vertices or nodes) that are connected together, where all the edges are bidirectional. An undirected graph is sometimes called an undirected network. In contrast, a graph where the edges point in a direction is called a directed graph.

Let's add some edges to our graph (g).Below is the graph, g with all the edges connected:We now have a fully connected graph with 8 vertices.

Learn more about undirected graph at

brainly.com/question/13198984

#SPJ11

in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4

Answers

Answer:

c)4

Explanation:

Hope it could helps you

James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?
a) Unexpected cloud downtime
b) Insufficient storage capacity
c) Inadequate data security
d) Inflexible pricing structure

Answers

Unexpected cloud downtime  is the most likely to face as a result.

Thus, A disruption in cloud-based services is known as cloud downtime. The migration of more businesses to the cloud means that any disruption in cloud services might be expensive.

According to Gartner, the average cost of cloud downtime is $300,000 per hour. Major cloud service companies appear to routinely report disruptions. These interruptions can endure for a few hours or several days. Three outages affected AWS in a single month in 2021.

An outage of any length can have a negative impact on the bottom line for businesses that are still working to incorporate cloud technology into their business strategy.

Thus, Unexpected cloud downtime  is the most likely to face as a result.

Learn more about Downtime, refer to the link:

https://brainly.com/question/28334501

#SPJ4

Congratulationsill You have just been hired on as a Network Specialist by MW5G Network Consulting. The police have asked for the wireless support staff for Melille's Coffee Cale to meet with them; you are sent on behalf of MWSG as their representative. Apparently three customers of Melville's coffee Gafe have had their identity stolen and it seems they were all at the colfee shop during the first week of November of this year, and they were all using their laptops. The police suspect someone at the cafe was somehow snooping on the customer's computers. They hwe a suspect from the video survellance camera, but they want to know how the bad gay did it. 1. You take a look at the router at Metvite's Coffee Cafe: it's using Channel 1, has an SS1D of MELVILIFSCAFE, and the WEP security key is 17 characters long ["AhoyYetandlubbers") Do you Mee any issues here? does x −1 have ony gseriol charotius. [wrak passue 2. What do you think the method of attack was? - mion in the ridelle. 3. Explain how the bad guy did it. - Attaetur just bijak the wite. 4. The police are confused - why wouldn't the custemers have been aware of the attack? - Pecause we disn't trel mon in the middle a thaw no delay. 5. What steps will you take to try to ensure the problem stops?

Answers

From the information provided, it appears that there are several issues with the router at Melville's Coffee Cafe. Firstly, it is using channel 1 which is a common channel and can cause interference with other devices in the area.

Additionally, the SSID (MELVILIFSCAFE) is easily guessable and the WEP security key is only 17 characters long which is not considered secure. This makes it relatively easy for an attacker to gain access to the network.

What is Network Specialist?

Based on the information provided, it is likely that the method of attack was a "man-in-the-middle" attack. This type of attack involves intercepting and manipulating communication between two parties without either party being aware of the attack.

The bad guy likely used tools such as a wireless sniffer to gain access to the network and intercept the communication between the customers' laptops and the router. They may have also used techniques such as ARP spoofing to redirect the traffic to a device under their control, allowing them to intercept and read the data.

The customers may not have been aware of the attack because the man-in-the-middle attack likely did not cause any noticeable changes to their experience, such as delays or connectivity issues. Additionally, the attacker may have been able to hide their actions by encrypting the intercepted data.

To try to ensure that the problem stops, I would take several steps:

Change the SSID and WEP key to something more secureConfigure the router to use a different channel to avoid interferenceImplement a more secure encryption method such as WPA2Monitor the network for suspicious activity and take appropriate action

Learn more about Network Specialist from

https://brainly.com/question/29352369

#SPJ1

Other Questions
Tom is considering opening a pool cleaning business as a summer job. He wants to determine the percentage of people in his town that own a pool. Which is the best group of people for Tom to survey?A150 people who are members of the swim teamB150 people randomly selected from customers at a local pool supply storeC150 people randomly selected from the town telephone bookD150 people who completed and returned a survey by mail Why was the amendment process discussed in the Constitution? A. to create a way for future generations to change the Constitution B. to stop the president from making too many changes to the Constitution C. to make sure that people were always making changes to the Constitution D. to be sure that only the federal government could change the Constitution Can the Brown-Squard syndrome be diagnosed if one lower limb has pyramidal weakness and the other has hypoaesthesia but neither lower limb has dissociative sensory loss? Is there more than one way to show upper-limb dysdiadochokinesia? What distinguishes kinetic from intentional tremors? In addition to addressing the underlying cause, what is the best way to treat rubral tremors? What does "inversion of reflexes" mean? In a few membership exams, I came across this phrase. what does x equal to In the context of making a capital budgeting decision, which is not an example of an incremental cash flow? Research costs that have been already paid. Taxes paid from profits generated by the project. The cost of building a new factory needed for the project. The cost of hiring more workers. Although the alarm reactions experienced in both ptsd and panic disorder are very similar and result in conditioned responses, in panic disorder the alarm is _______. What artifacts did historian Tom Garner find in the Pensacola Bay area? Below is an actual job description for a purchasing and procurement internship position that was available at Disney Consumer Products/ Studios. Based on the information in the job description, create accountabilities, objectives, and standards for this position. Title Graduate Associate, Purchasing & Procurement (Disney Consumer Products/Studios) The Position Provide analytical support for projects impacting business units, specifically targeting Disney Consumer Products & Studios. Survey current pricing models and develop new approaches to pricing/buying various prod ucts and services that yield creative and business advantage. Support the continuing efforts to increase the percentage of spend influenced, specifically as it relates to business units where we have had only a minor impact. Assist in the development of key stakeholder lists and savings opportunities regarding existing contracts. Assist in developing overall Purchasing & Procurement strategy for partnering with business units, specifically targeting Disney Consumer Products & Studios. The Company The Walt Disney Company is a diversified, international family entertainment and media company with 2016 annual revenues of US$55.63 billion. Its operations include theme parks and resorts, filmed entertainment, includi ng motion pictures and television shows, home video and DVD prod ucts, records, broadcast and cable networks, Internet and direct marketing, consumer products, radio and television stations, theatrical productions, publishing activities, and professional sports enterprises. The Ideal Candidate Ability to conceptualize issues and problems and develop hypotheses around appropriate responses. Intellectual curiosity and professional commitment to excellence. Superior analytical skills defined by an ability to identify and rearticulate critical aspects of a business situation from a large data pool (both qualitative and quantitative). Superior Microsoft Excel modeling skills. Strong written and verbal communication skills with the ability to build relationships. Ability to work independently. Demonstrated ability to manage multiple tasks, meanwhile retaining focus on project deliverables and strategic priorities. The Opportunity This will be an opportunity for an MBA intern to utilize project management skills he or she has learned in the classroom. The intern will be faced with difficult and/ or skeptical clients and will learn how to work with them. This will also be an opportunity for those individuals who have not experienced working in Corporate America, and for those that have had some experience, to further their learnings. The intern will gain experience from working in the Media and Entertainment industry. Through these various experiences, we hope the intern will find value in the internship we are offering. Which function has zeros at x = -2 and x = 5? How many minutes a day do you need to exercise Lines 186207: What words or phrases describe places, events, or people? What kind of feeling do these descriptions convey? Using these clues, what might you infer about Bradfords purpose? What would be the length of OB' if segment OB, which is 18 cm long, wasdilated by a scale factor of 2/3 ?*6 cm12 cm16 cm36 cm Think about the text The Tragedy of Romeo and Juliet by William Shakespeare to answer question 7, Drag to arrange each incident from the story in the correct chronological order. = Juliet determines to marry Romeo despite any obstacles. = Romeo kills Tybalt. = Lord Montague asks Benvolio to advise his conflicted son. = The Nurse arranges to keep secret Romeo and Juliet's affair. = At the Capulet ball, Romeo meets the new love of his life. = The Friar decides to help the teens marry to resolve the feud between families. what is the order of the texts What accomplishments did Henry the Navigator achieve? helppp please help me I'm almost done 6(4g+2)+2(4g-4) expand and simplify need help asap Write an essay responding to the following prompt: Who do you think is the tragic hero - Caesar or Brutus - in Shakespeare's play Julius Caesar? Why?HELP ASAP! Due today!!!Giving the crownNo spam!! if the body temperature in 98.6. what is the temperature in celcius Answer first and i will mark brainliest A group of voters writes a new law banning cell phone use in cars. The groupcirculates a petition demanding that their proposed law be put to a popularvote in their city. Which of the following Progressive Era political mechanismsis the group using?A. ConservationB. ReferendumC. RecallD. Initiative