NAT addresses concerns over the dwindling IPv4 address space by ___________________. 1 point allowing networks to use fewer IP addresses overall. allowing users to move to IPv6 when they want. allowing computers using non-routable address space to communicate with the Internet. performing IP masquerading.

Answers

Answer 1

Answer:

Allowing computers using non-routable address space to communicate with the Internet.

Explanation:

Self explanatory

Answer 2

NAT addresses concerns over the dwindling IPv4 address space by allowing computers using non-routable address space to communicate with the Internet.

What is NAT used for?

NAT is known to be a tool that lowers  the number of public IP addresses a  firm or company must use because of economy and security reasons.

Note that NAT addresses concerns over the dwindling IPv4 address space by allowing computers using non-routable address space to communicate with the Internet.

Learn more about NAT from

https://brainly.com/question/26210840

#SPJ1


Related Questions

PLEASE I NEED HELP 100 POINTS for digital design and this was the only thing close
If you would like your text to have an italic effect, but increase the slant, which control would you use?

Answers

Answer:

press the Ctrl + I keys on your keyboard

____ is a family of ieee standards that define a portable operating system interface to enhance the portability of programs from one operating system to another.

Answers

The family of IEEE standards that define a portable operating system interface to enhance the portability of programs from one operating system to another is known as POSIX.

To provide a Long Explanation, POSIX stands for Portable Operating System Interface for Unix and is a set of standards that defines an interface for software compatibility with Unix and Unix-like operating systems. The standardization of this interface allows software developers to write programs that can be easily ported from one system to another, thereby improving software interoperability across different platforms.

Additionally, POSIX provides a standardized set of APIs, utilities, and commands that enable software developers to write portable, efficient, and reliable applications.

To know more about operating system visit:-

https://brainly.com/question/6689423

#SPJ11

Why do companies collect information about consumers? A. Because they want to meet new friends on social networks B. Because they take consumers' best interests to heart C. Because they want to effectively advertise to consumers D. Because they are looking for good employees to hire​

Answers

Answer:

C. Because they want to effectively advertise to consumers.

Explanation:

Companies collect info for more accurate advertisements, which are designed to make people interact with them more commonly.

Which one?..........

Which one?..........

Answers

Answer:

d. Clock

Explanation:

A flip flop is an circuit, an electrical circuit precisely that is used as a means to story data or information. This type of data or information stored in a flip flop is binary data or information. A flip flop has a high stable state and a low stable state.

A flip flop is a circuit that is very essential and must be present when building systems like the computer or communication system.

A flip flop must have a CLOCK signal or indicator because this helps control the triggering(i.e the change from one state to another) that occurs in a flip flop.

Andrew likes to purchase his school supplies online. What are two advantages of doing so?


A.
It is possible for his information to be accessed or stolen by a third party.

B.
All his personal information is sent digitally and does not change when transmitted.


C.
Because the information is sent digitally, there are an infinite number of different signals possible.

D.
Because the information is sent quickly, he can receive his order more quickly.

Answers

Answer:

bd

Explanation:

Answer:

The answer is B.All his personal information is sent digitally and does not change when transmitted. And D.Because the information is sent quickly, he can receive his order more quickly.

Explanation:

I took AP EX quiz.

Ben is writing web page content on a newly launched gaming gadget. He has to use hyperlinks to help visitors navigate to web pages that deal with other types of electronic gadgets. Where should he place the hyperlinks in the web page?

Answers

Answer:

at the bottom of the web page

Explanation:

Ben is creating a web page content for the gaming gadget that  has been newly launched. He uses hyperlinks so that the visitors can navigate the web pages properly which deals with some other electronic gadgets also. So Ben should place the hyperlinks at the bottom of the web page as it will provide anyone viewing the web pages easily.

do the procedures build-max-heap and build-max-heap’ always create the same heap when run on the same input array? prove that they do, or provide a counterexample

Answers

Yes, the procedures `build-max-heap` and `build-max-heap'` always create the same heap from the same input array. Both procedures follow the same principles of constructing a max-heap by applying the `max-heapify` operation to the non-leaf nodes.

Do the procedures `build-max-heap` and `build-max-heap'` always create the same heap from the same input array?

The procedures `build-max-heap` and `build-max-heap'` do not always create the same heap when run on the same input array.

The `build-max-heap` procedure constructs a max-heap by repeatedly calling the `max-heapify` procedure on the non-leaf nodes, ensuring that the maximum element is at the root and the heap property is maintained.

On the other hand, `build-max-heap'` is a modified version that performs a bottom-up approach. It starts from the last non-leaf node and calls `max-heapify` on each node in reverse order, moving up towards the root.

While both procedures result in a valid max-heap, the order in which the nodes are processed can differ.

This means that the internal structure of the heap might vary, resulting in different arrangements of elements at each level. Hence, it is possible for `build-max-heap` and `build-max-heap'` to create different heaps from the same input array.

Learn more about`build-max-heap

brainly.com/question/30859468

#SPJ11

Which of these is the most common combination or a combo chart? A) pie and line. B) column and pie. C) column and line. D) column and bar.

Answers

The most common combination for a combo chart is a column and line chart.

The correct answer to the given question is option C.

A combo chart is a type of chart that combines two or more chart types to show different sets of data together. Combo charts are commonly used in data visualization when one set of data has significantly different scales or categories from the other set. A common example of a combo chart is a column and line chart, where the column chart shows one set of data using vertical bars while the line chart displays another set of data using a line.

Out of the options provided, the most common combination for a combo chart is a column and line chart (option C). This is because column charts are great for displaying categories, while line charts are ideal for tracking trends over time.

Pie charts, on the other hand, are not commonly used in combo charts because they are best suited for displaying proportions of a whole, rather than comparing data. However, it is possible to combine a pie chart with another chart type, such as a line chart, to show trends in proportion over time.

Similarly, bar charts are also not commonly used in combo charts because they are essentially the same as column charts but in a horizontal orientation. Thus, column charts are preferred due to their vertical orientation and ease of use.

In conclusion, the most common combination for a combo chart is a column and line chart, making option C the correct answer.

For more such questions on combo chart, click on:

https://brainly.com/question/32145072

#SPJ8

Intrusion detection and prevention systems can deal effectively with switched networks.

a. true
b. false

Answers

Intrusion detection and prevention systems (IDPS) can deal effectively with switched networks. The statement is true.


1. IDPS: Intrusion detection and prevention systems are security measures used to identify and respond to potential threats or attacks on a network. These systems monitor network traffic and analyze it for any suspicious activities.
2. Switched Networks: In a switched network, data is transmitted through switches, which create dedicated connections between devices. This means that data sent from one device is only received by the intended recipient, enhancing network security.
3. Effectiveness of IDPS in Switched Networks: IDPS can effectively detect and prevent intrusions in switched networks by monitoring network traffic and analyzing packets of data. They can identify unauthorized access attempts, unusual patterns, or malicious activities within the network.
4. Benefits of IDPS in Switched Networks: Since switched networks provide increased security compared to other types of networks (like hubs or wireless networks), IDPS can leverage this security to better detect and prevent intrusions. The isolation of data in switched networks reduces the likelihood of unauthorized access, making it easier for IDPS to identify and respond to any potential threats.
In conclusion, intrusion detection and prevention systems can deal effectively with switched networks due to the enhanced security provided by these networks. These systems monitor network traffic, detect suspicious activities, and prevent potential intrusions to maintain network security. Therefore, the statement that IDPS can deal effectively with switched networks is true.

To learn more about switched networks
https://brainly.com/question/2908502
#SPJ11

Which of the following would include a company's audited annual financial statements with no spin?

Answers

The option that would include a company's audited annual financial statements with no spin is: "10-K filing." (Option A)

Why is this so?

A 10-K is a thorough report on a public company's financial performance that is filed yearly. The Securities and Exchange Commission (SEC) requires the report, which is significantly more extensive than the annual report.

This form must be filed within 60-90 days of a company's fiscal year ending, which may or may not coincide with the end of the calendar year. The 10-K is published online, through the SEC database, and on a company's website.

Learn more about annual financial statements at:

https://brainly.com/question/13161732

#SPJ1

Which of the following would include a company's audited annual financial statements with no spin?

O 10K

O 10-0

O Earnings Estimates

O Annual Report

The company generates a lot of revenue and is rapidly growing. They're expecting to hire hundreds of new employees in the next year or so, and you may not be able to scale your operations at the pace you're working.

Answers

Answer:

The most appropriate way to deal with the situation presented above is to acquire more space at the current office site at additional rent beforehand.

Explanation:

The Scaling of a revenue-generating business is a crucial task in which a lot of pre-planning and thinking is required.

In order to scale the business in the next year, the planning of it is to be carried out at the moment and proper necessary arrangements are ensured. These steps could be one from:

Looking for bigger spaces for renting for a full shift of the operationsLooking for a site office for an additional officeAcquiring more space in the current office site.

This process would result in acquiring a bigger place beforehand but in order to mitigate the risk, try to keep the place in view by providing them a bare minimum advance for the additional units.

clients can select their own operating systems, development environments, underlying applications like databases, or other software packages (i.e., clients, and not cloud vendors, get to pick the platform), while the cloud firm usually manages the infrastructure (providing hardware and networking)
Infrastructure as a Service (IaaS)

Answers

You are correct. Infrastructure as a Service (IaaS) is a cloud computing model.

What is Infrastructure as a Service (IaaS)?

Infrastructure as a Service (IaaS) is a cloud computing model in which clients have the flexibility to select their own operating systems, development environments, and other software packages, while the cloud provider manages the underlying infrastructure, such as hardware, networking, and storage.

In this model, the client is responsible for deploying and managing their own applications and services, but the cloud provider takes care of the underlying infrastructure, including the physical servers, storage systems, and network devices.

This allows clients to have more control over their computing environment, while benefiting from the scalability, reliability, and security of the cloud provider's infrastructure.

To Know More About IaaS, Check Out

https://brainly.com/question/23864885

#SPJ1

Please help me with this

Please help me with this
Please help me with this

Answers

Answer:

Explanation:

what?

This is the piece of code that you add to a program to indicate that the program should run the code inside a function at a certain time.

Answers

The piece of code that you add to a program to indicate that the program should run the code inside a function at a certain time is a cell.

What is a program?

A program is a set of instructions that a computer follows to complete a specific task. As a computer program grows in size, the likelihood of an error occurring increases.

A program, or software program, is a set of instructions that directs the hardware of a computer to perform a task.

Cell is a very high-level embeddable language that was created to implement some fairly general classes of software systems that are difficult to implement using traditional languages.

A cell is a piece of code that you add to a program to tell it that the code inside a function should be run at a specific time.

For more details regarding a programming, visit:

https://brainly.com/question/11023419

#SPJ1

Which of the following statements describe surge protectors and the purpose of using them? Check all of
the boxes that apply.
They protect hardware from damage caused by electrical storms.
They keep your computer and peripherals safe from power surges.
They need only be used when you are at home or in school.
They are built in to all computers to protect from external harm.

Which of the following statements describe surge protectors and the purpose of using them? Check all

Answers

-They protect hardware from damage caused by electrical storms.
-They keep your computer and peripherals safe from power surges.



The dude above isn’t funny nor smart...

Answer: A B

Explanation:

Are you familiar with measuring using a ruler? When have you ever used a ruler to measure, and who taught you how to use the ruler? How confident are you in your ability to measure things using a ruler? Please help me answer this question

Answers

Answer:

I have used a ruler many times to meausre various things such as paper, my height, etc. I was taught how to use a ruler in elementary school. I am pretty confident in using a ruler because I have used one for a majority of my life.

Explanation:

list the different generation of computers with its main component​

Answers

Answer:

1940 – 1956:  First Generation

1956 – 1963: Second Generation

1964 – 1971: Third Generation

1972 – 2010: Fourth Generation

2010-  : (Present )Fifth Generation

Explanation:

First Generation Computers (1940-1956):In this Generation the main component of computers were Vacuum Tubes.Second Generation Computers (1956-1963):In this generation the main component of computers were Transistors.Third Generation Computers (1964-1971):In this generation the main component of computers were Integrated Circuits.Fourth Generation Computers (1972-2010):In this generation the main component of computers were MicroprocessorFifth Generation (2010-Present):In this generation the main component of computers is Artificial Intelligence

BIOS has two Jobs. One is to boot up, or start, the computer. What is the other?
Pl I need help

Answers

Answer:

Determining what peripheral dives are being used

Explanation:

BIOS, in full Basic Input/Output System, a Computer program that is typically stored in EPROM and used by the CPU to perform start-up procedures when the computer is turned on. Its two major procedures are determining what peripheral devices (keyboard, mouse, disk drives, printers, video cards, etc.) are available and loading the operating system (OS) into main memory.

P.S. I would include a link to the website I copied this answer from but it's not letting me.

Which sentence uses a pair of synonyms? Because there was so much shouting, many of the protestors began screaming in order to be heard. Although we were tired after the long hike into the woods, we were still energetic enough to make camp. Despite all the exercise and the healthy eating habits, she still felt sick when she woke up in the morning. The children were too excited about the next day to settle down in their peaceful surroundings.

Answers

Answer:

Synonyms:

Synonyms are words that are similar, or have a related meaning, to another word.

Antonyms:

Antonyms are words that have an opposite meaning to an another word.

The sentence which uses a pair of synonyms are:

Because there was so much shouting, many of the protestors began screaming in order to be heard.

Shouting and Screaming are synonyms.

In the other sentences, pairs of antonyms were used.

Second sentence: Tired × Energetic

Third sentence: Healthy × Sick

Fourth: Excited × Peaceful

Hope this helps you...

Hope you have a nice day ahead...

Answer:

The Answer Is A

Explanation:

what option should be used in conjunction with the lp command in order to specify the destination printer name?

Answers

To specify the destination printer name when using the lp command, you can use the -d option followed by the name of the printer.

For example:

lp -d printer_name file.txt

This will print the file file.txt to the printer with the name printer_name.

Explanation in detail:

If you have multiple printers installed on your system and you want to specify which one to use, you can use the -d option to select the desired printer.

You can also use the lpstat -p command to list all available printers on the system, which can be useful if you are unsure of the exact name of the printer you want to use.

For example:

lpstat -p

This will display a list of all available printers on the system, along with their names and status. You can then use the -d option to specify the desired printer when printing a file.

Note that the lp command and the lpstat command are part of the CUPS (Common Unix Printing System) and are available on most Unix-like operating systems, including Linux and macOS. The exact syntax and options may vary depending on your system and the version of CUPS you are using.

To know more about lp command, visit: https://brainly.com/question/25808182

#SPJ4

Where can you find the sizing handles for a graphic, shape, or text box? Check all that apply.
at the top left corner of the document
at the top right corner of the document
in the center of the graphic, shape, or text box
on the edges of the graphic, shape, or text box
on the corners of the graphic, shape, or text box
inside the borders of the graphic, shape, or text box

Answers

Answer:

D and E

Explanation:

Just took it

Answer: the answer are  d:on the edges of the graphic, shape, or text box and e:on the corners of the graphic, shape, or text box

Explanation:

Where can you find the sizing handles for a graphic, shape, or text box? Check all that apply. at the

2. Which is not a utility software
a) Editor
b)Antivirus
c) Disk defragmenter
d) Snipping tool​

Answers

The best choice is option (b). Antivirus software, disc defragmenters, and text editors are examples of utility software.

What is utility software ?

The software package is software system that aids in maintaining a computer system's correct and efficient operation. It supports the Operating System in managing, organising, maintaining, and maximising the computer system's performance. Utility software completes activities such as virus detection, installation and uninstall, data backup, and the eradication of unnecessary files, among others. Antivirus, file management tools, disc management tools, etc. are a few examples. An antiviral is a piece of useful software that aids in preventing computer viruses.

Additionally, it alerts users when malicious files are found and deletes them. Additionally, it examines any new hardware that is connected to the computer and removes any viruses that are found. Additionally, it periodically monitors the system for dangers and eliminates them.

Therfore the correct option is  b)Antivirus

To know more about utility software visit:

brainly.com/question/2909686

#SPJ1

Which connection type is a wireless method of sending information using radio waves?
O Cable
O Wi-Fi Fiber
Otic cable
O Broadband
please i need help but dont put up a wed site​

Answers

Hoped that helped lol, but yeah, the rest of them need wires

Edit: CAN I HAVE BRAINLIEST.

TRUE / FALSE. lock granularity refers to whether a lock is placed by the dbms automatically or is placed by a command from the application program.

Answers

False. Lock granularity does not refer to whether a lock is placed by the DBMS automatically or by a command from the application program.

Lock granularity refers to the level at which locks are acquired and managed within a database system. It determines the size and scope of the resources that are protected by a lock. Locks can be acquired at different levels, such as the entire database, a table, a page, a row, or even a specific field within a row. The granularity of locks affects concurrency and performance in a database system. Coarser-grained locks (e.g., at the database or table level) provide higher concurrency but may lead to more contention and potential blocking. Finer-grained locks (e.g., at the row or field level) reduce contention but may result in more overhead and decreased concurrency. The placement of locks, whether automatically by the DBMS or through commands from the application program, is determined by the concurrency control mechanisms and the isolation level defined in the database system. It is not directly related to lock granularity. In summary, lock granularity determines the size and scope of the resources protected by a lock, while the placement of locks is controlled by the DBMS based on the concurrency control mechanisms and isolation level.

learn more about application program here:

https://brainly.com/question/30213983

#SPJ11

is a solar energy technology that uses unique properties of semiconductors to directly convert solar radiation into electricity.

Answers

The given statement is the definition of a solar energy technology that uses unique properties of semiconductors to directly convert solar radiation into electricity. The technology referred to in the statement is solar cell technology or photovoltaic technology.

The conversion of solar radiation into electrical energy takes place in a solar cell or photovoltaic cell, which is a device that generates electrical energy directly from sunlight. Solar cells use a photovoltaic effect to convert light energy into electrical energy. Photovoltaic cells consist of semiconductor materials that absorb light energy and create a current of electrons that can be used as electricity.

The solar cell consists of a thin layer of silicon, which is a semiconductor material, and when sunlight falls on it, the energy from the photons is absorbed and the energy from these photons releases electrons, which then create an electric current. This current is then used to power electronic devices or store it in batteries. It is a long answer because it explains the entire process of the conversion of solar radiation into electricity using solar cell technology.

To know more about technology visit:

brainly.com/question/29512024

#SPJ11

what is the definition of computer science procedural abstraction

Answers

Computer Science Procedural Abstraction is a process of simplifying a complex system or problem by breaking it down into smaller parts that can be understood and solved more easily.

What is Computer Science ?

Computer Science is the study of the theory, experimentation and engineering that form the basis for the design and use of computers. It is a field of study that encompasses the development of computer hardware, software and networks. It also includes the design and implementation of algorithms and systems for processing, storing, exchanging and manipulating information.

This abstraction process is used to reduce a problem to its essential elements, allowing it to be solved faster and more efficiently. It is also used to make programming easier, by breaking down complex tasks into simpler, more manageable components. This abstraction process allows programmers to focus on the problem at hand, rather than having to worry about the details of how to implement it.

To learn more about Computer Science
https://brainly.com/question/20837448
#SPJ4

what does reporter failure mean on adt alarm system

Answers

On ADT alarm system, Failure trouble basically means that the monitoring service isn't working properly because of a communication issue with the system. As a result, the home or business is vulnerable.

How does the ADT alarm system function?

ADT will strategically place sensors throughout the home to ensure that each zone is covered. The motion then activates a reaction, such as a security light or a camera that begins recording, all through the wireless connection. The movement can also be reported to the ADT monitoring team.

ADT indoor security cameras come with phone security alerts, infrared night vision, a slim design, and secure WiFi. They provide a variety of views for live and recorded feeds and include professional installation.

Failure trouble on an ADT alarm system basically means that the monitoring service isn't working properly due to a communication issue with the system.

Learn more about the ADT alarm system, refer to:

https://brainly.com/question/28199257

#SPJ5

In the context of an ADT alarm system, "reporter failure" typically refers to a communication issue between the alarm panel and the monitoring center.

ADT alarm systems are designed to send signals or reports to a central monitoring station when an alarm event occurs, such as a break-in or a fire. The monitoring center then takes appropriate actions, such as contacting the homeowner or dispatching emergency services.

When the alarm system displays a "reporter failure" message, it indicates that the panel is unable to establish communication with the monitoring center. This can happen due to various reasons, including but not limited to:

Network or internet connectivity issues: If the alarm system relies on an internet or cellular connection to communicate with the monitoring center, any disruptions in the connection can result in a reporter failure.

Learn more about network on:

https://brainly.com/question/29350844

#SPJ6

suppose that we have used the hexl-mode of emacs to read the first eighteen bytes of an elf binary file as hex: 7f45 4c46 0201 0100 0000 0000 0000 0000 0200 ... what kind of file are we reading?

Answers

An executable file can be identified by using emacs' hexl-mode to read the first 18 bytes of an elf binary file as hex 7f45 4c46 0201 0100 0000 0000 0000 0000 0200. Here,  "0200" identifies that we are reading the executable file as e_type is 2.

Executable and Linking Format (ELF) files are formatted in elf. The format of ELF executable binary files is specified in the header file "elf.h". These files include common executable files, shared objects, core files, and relocatable object files.

A program header table, a section header table, or both come first in an executable file that uses the ELF file format. The ELF header is always located at file offset zero. The offset in the file for the section header table and program header table is specified in the ELF header. The remaining file specifics are described in the two tables.

Whether to use 32-bit or 64-bit addresses is specified in the ELF header. Three fields in the header are offset by this setting and affect fields that come after them. For 32-bit and 64-bit binaries, the ELF header is 52 or 64 bytes long, accordingly.

To learn more about binary file click here:

brainly.com/question/27319612

#SPJ4

Which methods can you use to move text from one part of the document to another?.

Answers

Answer:

-Cut using Ctrl+X, move your cursor to the new location of the text, then paste to the new location with Ctrl+V.

-Copy using Ctrl+C, move your cursor to the new location of the text, then paste to the new location with Ctrl+V.

Explanation:

Two adjacent vertices can be part of the same MIS. True or False

Answers

The statement "Two adjacent vertices can be part of the same MIS" is false. A maximum independent set (MIS) is defined as a set of vertices in a graph such that no two vertices in the set are adjacent. In other words, each vertex in the MIS has no direct connections to any other vertex in the set. This is why it is called an independent set.



If two adjacent vertices were to be part of the same MIS, it would contradict the definition of an MIS because adjacent vertices have an edge connecting them. Therefore, if one vertex is in the MIS, its adjacent vertex cannot be included in the same MIS.

To illustrate this concept, let's consider a simple example of a graph with four vertices, A, B, C, and D. If A and B are adjacent vertices and part of the same MIS, then C and D cannot be in the MIS because they are adjacent to A and B. Therefore, an MIS in this graph could be either {A, C} or {B, D}.

In conclusion, two adjacent vertices cannot be part of the same MIS as an MIS is defined as a set of vertices with no direct connections to each other.

To learn more about, adjacent

https://brainly.com/question/31458050

#SPJ11

MIS:

False.  Two adjacent vertices can be part of the same MIS.

Other Questions
a solution that is now widely used to allow two parties to secretly exchange keys is (fill the blank) protocol If f(x) and its inverse function, f1(x), are both plotted on the same coordinate plane, what is their point of intersection? The root test is conclusive for the following series:1 / 1 n n 1Select one:TrueO False Someone pls answe this will give a lot of points a client has sustained a head injury to the parietal lobe and cannot identify a familiar object by touch. the nurse knows that this deficit is After WWI African Americans how did they get treated Can someone please help me? :( What are the following public functions in the listed car class definition known as?A. A public interfaceB. a private interfaceC. A class implementationD. An object definition The presence of heterogeneous catalyst will not affect the:Select the correct answer below:A. molecularity of the overall chemical equationB. molecularity of the rate-determining stepC. both of the aboveD. none of the above The expansion of a liquid is _____ than a solidA. lessB. greater if Anna can run 2km in 8 min, how long will it take her to run 5 km if she maintains her What iS one example of an effective way to display images within a technicaldocument? Which of the following would be included in the gross national product of Canada?Select one:A. The profits earned by a Canadian-owned automobile plant in BrazilB. The profits earned by a Brazilian coffee company operating in CanadaC. The wages paid to Brazilian workers producing coffee for sale in Canada Suppose a multiple linear model Y=X+,N(0, 2I nn), where X nphas rank p. The OLS estimator of is =(X TX) 1X TY, which has the variance-covariance matrix Vcv( )= 2(X TX) 1When p=2 and the entries of the first column of X n2are all 1, it becomes the simple linear regression model. (Hint: use the inverse formula for 22 matrix) (a) Use the matrix formula of , calculate the estimator for the slope 1, ^1, in terms of x iand Y i. Is it the same as the formula we learned in Lecture2? (b) Use the matrix formula of Vcv( ), calculate the variance of ^1. Is it the same as the formula we learned in Lecture2? 34 + 35!! Write how you got it lol Use an associative property to write an equivalent expression Help me with the following problem Which of the following are examples of a goodverbal report? Check all that apply.It is patient-centered.It includes a specific plan for treatment.It is very thorough, taking about fifteenminutes to talk through.It is casual and only includes the patient'sobjective data. QUESTION 3a) There are people who have the opinion that marketing has a psychological perspective? Explain your agreement or disagreement with this.b) Different marketing techniques will be used for different products depending on what comes with it. This is important because the marketing technique will influence the perception about the product quality. Why is marketing a university more difficult than marketing a shoe?c) A critical debate about the differences between goods and services have always been discussed. Why is determining the difference between goods and services important in marketing?d) A graduate was asked to choose between being a marketing officer and an accounting officer, he chose to be an accounting officer. What makes marketing difficult in organizations? Carlos recorded the weight of several bags of potatoes. He then counted the number of potatoes in each bag. The scatterplot below represents the relationship between the number of potatoes in a bag and the weight of the bag.A.10 poundsB.8 poundsC.55 poundsD.50 pounds