? Question
How are the Internet and the World Wide Web different from each other?

Answers

Answer 1

Answer:There just different

Explanation:

The world wide web, or web for short, are the pages you see when you're at a device and you're online. But the internet is the network of connected computers that the web works on, as well as what emails and files travel across. ... The world wide web contains the things you see on the roads like houses and shops.

Answer 2

Answer:html makes them different

Explanation:


Related Questions

i finished all my final exams 100 on math 100 on science and 94 on language arts.

Answers

Answer:

GOOOD JOBBB !! congrats :D

Explanation:

Answer:

hmmm

Explanation:

I think 294 cause it makes since

Can someone tell me how to hit on a link on Brainly to see the answer

Answers

no, please do not hit on links. they're viruses i'm pretty sure.
Make sure to report the answer just in case

A personal directory of e-mail addresses stored and maintained with one’s e-mail program

Answers

Answer:

It’s a address book

Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters. Which typeface should he use?
A.
old style
B.
geometric sans-serifs
C.
transitional and modern
D.
humanist sans
E.
slab serifs

Answers

The type of typeface that Derek should use is option D: humanist sans.

What is an typeface?

A typeface is known to be a kind of a design tool that is used for lettering and it is one that is made up of variations in regards to its size, weight (e.g. bold), slope and others.

What defines a humanist font?

The “Humanist” or “Old Style” is known to be a kind of a historical classification that is used for any typefaces that have its inspiration from Roman lettering and also that of the Carolingian minuscule as it often  include forms that looks like the stroke of a pen.

Since Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters, The type of typeface that Derek should use is option D: humanist sans.

Learn more about typeface from

https://brainly.com/question/11216613

#SPJ1

Anyone have any ideas how to work this out x

Anyone have any ideas how to work this out x

Answers

Answer:

1.5 μs

Explanation:

time = distance / speed

if your cabinet is 300 m away, the time it takes is:

300 [m] / 200 000 x 10³ [m/s] = 1.5 x 10⁻⁶ s = 1.5 μs

According to the lecture, the main components of the internet architecture are the ____, ____, and ____ layers, and each of them perform distinct functionalities necessary for online communications.

Answers

A meta-network, or collection of thousands of different networks communicating with a single protocol, is what the internet architecture is. It is known as an internetwork that is connected through protocols, to put it simply. It uses the TCP/IP protocol.

Explain about the internet architecture?

The Internet Architecture Board (IAB) and the Internet Engineering Steering Group are responsible for organizing and managing the Internet Standards process, which is a function of the Internet Society (IESG).

hosts, routers, and networks, which make up the majority of the Internet.

Examples include the File Transfer Protocol for transmitting and receiving files to and from a server, the Ethernet protocol for establishing a connection between computers, and the Transmission Control Protocol/Internet Protocol (TCP/IP) used by networks to connect to the Internet.

Peer-to-peer and client/server network architecture are two of the most popular styles. Because it makes use of numerous tiers, client/server architecture is sometimes known as "tiered." Each of these two types will be covered in further detail in this lecture.

To learn more about internet architecture refer to:

https://brainly.com/question/13429711

#SPJ4

print("Weight on Earth?")
weightEarth = input()
weightMoon = (weightEarth/6)
print("Weight on moon:", weightMoon)

any1 know anything wrong with this code? (python)

Answers

Answer:

weightEarth = float(input("Enter weight on earth: "))

weightMoon = weightEarth/6

print("Weight on moon:", weightMoon)

Explanation:

You have to convert the string input into a float in order to do calculations with it.

Text messaging is a form of messaging frequently used by mobile phone users. If the messages also include photos, audio, or video, ____ is used instead.

Answers

MMS, or Multimedia Messaging Service, as opposed to SMS.

Mike needs to export some animation videos from his smartphone to an online platform. Which common file format can he use for this purpose?

A..swf
B..flv
C..mov
D..3gp

Answers

The answer would be b

Answer:

The correct answer is D.  3gp

Explanation:

Assignment 6: Animation

Assignment 6: Animation

Answers

Here is an example of an animated scene with a school-appropriate theme:

How to show the Program

import turtle

# Global variable to keep track of the score

score = 0

# Draw 5 circles

for i in range(5):

  turtle.penup()

  turtle.goto(i*30, 0)

  turtle.pendown()

  turtle.circle(20)

# Draw 5 polygons

for i in range(5):

  turtle.penup()

  turtle.goto(i*60, 50)

 turtle.pendown()

  for j in range(4):

      turtle.forward(40)

      turtle.right(90)

# Draw 5 lines

for i in range(5):

  turtle.penup()

  turtle.goto(i*90, -50)

  turtle.pendown()

  turtle.forward(100)

# Animate the scene

while True:

 turtle.undo()

  score += 1

  turtle.write("Score: " + str(score), align="center",

               font=("Arial", 14, "normal"))

This code creates an animated scene where five circles, five polygons, and five lines move across the screen, with the score increasing by 1 with each iteration of the while loop.

Read more about programs here:

brainly.com/question/26134656

#SPJ1

how to make a benefit analysis paper

Answers

The ways to make a benefit analysis paper are:

Establish a background for Your Analysis Identify Your Costs as well as the Benefits Assign a given Amount in dollars or Value to all of Cost and BenefitLink all the Total Value of Benefits and Costs and then make comparison.

What is a benefit analysis report?

A cost-benefit analysis is known to be the act of making a comparison of the projected or the  estimated costs as well as the benefits (or a given opportunities) that is known to be linked with a project decision to know or tell if if it makes any sense from a given business perspective.

Note that the  Benefit Analysis report gives a kind of clear and concise form of comparisons of work scenarios to reduce over payment and as such, The ways to make a benefit analysis paper are:

Establish a background for Your Analysis Identify Your Costs as well as the Benefits Assign a given Amount in dollars or Value to all of Cost and BenefitLink all the Total Value of Benefits and Costs and then make comparison.

Learn more about benefit analysis from

https://brainly.com/question/199821
#SPJ1

which type of attack is wep extremely vulnerable to?

Answers

WEP is extremely vulnerable to a variety of attack types, including cracking, brute-force, IV (Initialization Vector) attack, and replay attack.

What is Initialization Vector?

An Initialization Vector (IV) is a random number used in cryptography that helps to ensure the uniqueness and randomness of data used in an encryption process. The IV is typically used as part of an encryption algorithm, where it is combined with a secret key to encrypt a message. The IV is unique for each encryption session, and must be unpredictable and non-repeating. A good IV should not be reused across multiple encryption sessions, and it should be kept secret from anyone who does not have access to the decryption key. Without a good IV, a cryptographic system can be vulnerable to attacks such as replay attacks, where an attacker can gain access to the system by repeating an encrypted message.

To learn more about Initialization Vector
https://brainly.com/question/27737295
#SPJ4

If you witness physical bullying and want to help, what should you consider first?

Answers

Answer:

confront the bully

Explanation:

If you witness physical bullying and want to help, you should consider first whether the person perpetrating bullying is struggling with something.

What is physical bullying?

Physical bullying is the use of physical actions to intimidate and gain direct control. Physical activity is unwanted by the victim and can cause damage to the body or property. Some common types of violence enacted through physical bullying are hitting, Kicking, Pinching the Damage of property.

Ask them to refuse engaging emotionally. Set boundaries, don't engage with the abusive behavior, set consequences, and stick to them. Walk away if a boundary you set is crossed, or if you feel unsafe, leave. the place for some period. Talk to victim privately by setting a time aside, expressing your concern.

Offer any assistance, an ear to listen when they need it. Getting someone else involved might result in victim, be more open, to recognize the abuse, since including more people to express concern or witnessing the abuse, adds more value to the concern.

Thus, If you witness physical bullying and want to help, you should consider first whether the person perpetrating bullying is struggling with something.

Learn more about physical bullying on:

brainly.com/question/17505353

#SPJ3

An android user recently cracked their screen and had it replaced. If they are in a dark room, the phone works fine. If the user enters a room with normal lights on, then the phone's display is dim and hard to read. What is most likely the problem?

Answers

There are two possibilities for the problem in the given scenario. The first and most probable cause of the problem is that the replaced screen was of low quality or did not meet the device's standards.

Therefore, the screen is not transmitting light properly and is producing dim or blurry images.The second possibility for the problem is that the light sensor of the phone might be affected by the screen replacement. The phone might be adjusting the brightness levels based on the low light environment in the dark room and not adjusting correctly in the normal light environment.

This can result in the phone being too bright or too dim, making it difficult to read the display.However, both of these possibilities can be avoided by purchasing a high-quality replacement screen or seeking professional assistance to fix the problem. In such cases, it is recommended to have an expert inspect the device for any faults and repair it accordingly.Moreover, one can also try to adjust the screen brightness levels manually to make the display more readable in the normal light environment.  

To know more about visit:

https://brainly.com/question/32730510

#SPJ11

Question #2
Dropdown
Choose the correct term to complete the sentence.
In the _____ model, each computer in a network can act as a server for all the other computers, sharing files and access to devices.
A.) peer-to-peer
B.) host-server
C.) client-server

Answers

Answer - A: peer-to-peer

Explanation: Correct on my Edg 2020/2021 for my state.

In the client-server model, each computer can act as a server for other computers, facilitating file sharing and device access. Therefore, option C is correct.

The client-server model is a network architecture where computers, referred to as clients, make requests for services or resources from other computers, known as servers.

Clients initiate communication by sending requests, and servers respond by providing the requested services or resources. This model allows for distributed processing, where the workload is divided between clients and servers.

Servers are responsible for managing and providing services, such as file sharing, database access, or web hosting, while clients consume these services. The client-server model facilitates efficient sharing of resources and enables scalable and centralized control in networked environments.

Therefore, option C is correct.

Learn more about client-server model here:

https://brainly.com/question/32440221

#SPJ7

One drawback to using the Internet to search for evidence to guide clinical practice is:

Answers

One of the drawbacks of using the Internet to look for evidence to guide clinical practice is the presence of false information. With a plethora of information available on the Internet, it can be challenging to separate the valid information from the false ones.

Also, while many sources may provide accurate information, some may provide incorrect or biased information, which can be misleading to clinicians. With the absence of regulation of online information, it can be challenging for clinicians to determine the quality of the source and the validity of the information provided. This can result in clinicians basing their decisions on inaccurate data, leading to poor clinical practice. Additionally, some sources may have conflicting information, which can confuse clinicians and make it difficult for them to make informed decisions. Therefore, clinicians should be cautious when using the internet to search for evidence to guide clinical practice and should ensure that they are using reputable sources.

To know more about Internet, visit:

https://brainly.com/question/13308791

#SPJ11

Discuss at least three factors that affect perceptual and motor performance. How do these factors have an influence on the design of user interfaces?

Answers

Perception is the brain's interpretation of a sensory input. Sensory inputs come from various sources, and the interpretation process can be influenced by many factors, including attention, motivation, expectation, and context.


Interface designers must consider these factors to create a user-friendly interface. Designers must keep sensory modality in mind while designing interfaces to ensure that the interface enhances the users' sensory experiences. Interfaces that require the user's attention must be designed to capture attention, and minimize cognitive load. User interface design should be able to handle cognitive load in an efficient and reliable way that does not hamper users' productivity.

The design of user interfaces is influenced by the factors that affect perceptual and motor performance. Sensory modality, attention, and cognitive load are three factors that can affect perceptual and motor performance. User interface designers must be aware of these factors to create user interfaces that are effective and user-friendly. Good user interface design can enhance the user's experience, increase productivity, and reduce errors.

Learn more about Interface designers: https://brainly.com/question/29541505

#SPJ11

the hose is 2 inches in diameter. What circumference does the plug need to be? remember to type just a number

Answers

Answer:

6.28

Explanation:

This problem bothers on the mensuration of flat  shapes, a circle.

Given data

Diameter d= \(2in\)

Radius r =  \(\frac{d}{2} = \frac{2}{2} = 1in\)

We know that the expression for the circumference of a circle is given as

\(C= 2\pi r\)

Substituting our given data and solving for C we have

\(C= 2*3.142*1\\C= 6.28\)

Which of the following IEEE standards has been labeled by the Wi-Fi Alliance as Wi-Fi 6?
A. IEEE 802.11ax
B. IEEE 802.11ay
C. IEEE 802.11ad
D. IEEE 802.11ac
HTML defines the structure of a web page.
True
False

Answers

As per the details given, IEEE 802.11ax has been labeled by the Wi-Fi Alliance as Wi-Fi 6. The correct option is A.

IEEE 802.11ax is the IEEE standard that the Wi-Fi Alliance has designated as Wi-Fi 6. The most recent Wi-Fi technology offers superior performance, faster data speeds, and greater efficiency as compared to earlier standards.

Not the full construction of a web page, but its structure and content are defined by HTML (Hypertext Markup Language).

It is in charge of organising and marking up material on a website, including headings, paragraphs, photos, links, and more.

Rather than being directly specified by HTML, CSS (Cascading Style Sheets) regulates the visual display and styling of a web page.

Thus, the statement "HTML defines the structure of a web page" is false.

For more details regarding HTML, visit:

https://brainly.com/question/15093505

#SPJ4

Create and run a query that displays all employees from the employee table who have the title Senior Sales Associate. This requires that you join related tables and select columns from all them but display only some of the columns. In the dynaset display each qualifying employee's last name, gender, and city, and state where they work (arrancge columns left to right in this way). Sort the dynaset in ascending order by state and then by last name within each state group. Assign aliases to the column as follows: Name, Gender, Work City, and Work State. Optimize the dynaset column widths. Print the resulting dynaset and write your name on the output.

Answers

Sure, I can help you create a query for this. However, to create an accurate SQL query, I need to know the exact table structures. In particular, I need to know:

1. The name of the employee table, and its column names.

2. The name of the related tables, and their column names.

3. The relationship between these tables (foreign keys).

4. Which tables contain the 'title', 'last name', 'gender', 'city', and 'state' data.

For the purpose of this answer, let's assume we have two tables: `employees` and `locations`.

The `employees` table has the following columns: `emp_id`, `first_name`, `last_name`, `gender`, `title`, and `location_id`.

The `locations` table has the following columns: `loc_id`, `city`, and `state`.

Here's an example of how your query might look:

```sql

SELECT

   e.last_name AS 'Name',

   e.gender AS 'Gender',

   l.city AS 'Work City',

   l.state AS 'Work State'

FROM

   employees e

JOIN

   locations l ON e.location_id = l.loc_id

WHERE

   e.title = 'Senior Sales Associate'

ORDER BY

   l.state ASC,

   e.last_name ASC;

```

This query first selects the desired columns from the `employees` and `locations` tables, assigning them the requested aliases. It then joins the two tables on their shared `location_id`/`loc_id` column. The `WHERE` clause filters the results to only include rows where the title is 'Senior Sales Associate'. Finally, the `ORDER BY` clause sorts the results first by state in ascending order, and then by last name in ascending order within each state group.

As for optimizing the column widths, printing the resulting dynaset, and writing your name on the output, these are tasks typically handled by the application or tool you're using to run the SQL query, rather than within the SQL query itself. You'd need to check the documentation or help resources for that tool to see how to do this.

If your table structure is different, please provide the correct structure and I will adjust the query accordingly.

Jason has decided to use his name on all the images to protect them from misuse. He has also decided to use the logo of his company across all
the images to be extra sure about its protection in the digital world. Select the phrases or sentences that describe the two types of watermarking
options has he used to get the results.
Types of Watermarking Options
Jason wants to tag his name or logo somewhere on the image, preferably in the corner of the photo. He uses an online editing tool to add his
name at the corner of the image. He can prevent misuse of his Images online by adding a watermark over the image. Text watermarking
involves adding the imageer's name at the corner of the image. This is usually done with the help of online editing tools or software. In this form
of watermarking, he can use the logo of his company over the image to protect his identity.
Just to be sure, Jason also uses tiled watermarking, which involves placing his company logo in a pattern spread across the image. First, he
creates a copy of the original. This is to make sure that the watermarked version is saved separately. If needed, he can always access the
original image. Then he opens the logo that he wants to use as the watermark, coples It, and pastes it onto a new layer, above the image. He
turns down the opacity of the layered image. Then he merges the layer to join the watermark with the image.
L

Jason has decided to use his name on all the images to protect them from misuse. He has also decided

Answers

Answer:

Text watermarking involves adding the photographer's name at the corner of the image.

Explanation:

This was one of the correct answers when I took the test, I got it wrong because I didn't pick all the correct answers. I hope that this was helpful to you! If you know the other correct answer(s) please comment and let me know and i'll edit this answer! :)

Answer:

Text watermarking involves adding the imageer’s name at the corner of the image

tiled watermarking, which involves placing his company logo in a pattern spread across the image

Explanation:

on edmentum

You want to use the sleep function in your program and only the sleep function. The following line of code will allow you to do so.
time import sleep

Answers

Answer:

from time import sleep

Explanation:

Not sure what the question is, but assuming the question is "How would you import only sleep from time?" and the language is python, this is the answer.

What are some of the greatest technology achievements?​

Answers

Answer:

Electricity

The Laser

Semiconductor Chips

Quantum Computing

The Elevator

The Human Genome Project

The Automobile

The Global Positioning System

Jordan just wrote a secret message program in Python that converts the number 7,095 to 1s and 0s. Which number system is Jordan converting to?

A Binary
B Decimal
C Digital
D Hexadecimal

Answers

Answer:

binary

Explanation:

bi-two numbers doesnt meet reqiurments automatically considered 0

Answer:

Binary

Explanation:

i took the test

An all-in-one printer is also known as a multi-function printer. It includes a printer, scanner, copy machine and / or fax machine.true or false?

Answers

An all-in-one printer is also known as a multi-function printer. It includes a printer, scanner, copy machine and / or fax machine: true.

What is a printer?

In Computer technology, a printer can be defined as an electronic output (peripheral) device that is designed and developed for printing paper documents containing texts or images.

What is an all-in-one printer?

An all-in-one printer is sometimes referred to as multifunction peripheral or multi-function printer and it can be defined as a type of printer that is designed and developed to comprise all or some of the following;

PrinterScannerCopy machineFax machine.

Read more on printer here: brainly.com/question/17100575

#SPJ1

What separator page file is used with PostScript-only printers and prints a separator page at the beginning of each documen

Answers

Answer:

Sysprint.sep

plz help me I have to submit the work before the day ends
13. (a) State one area where computers are used.
(2 marks)
(b) Give any two advantages of using computers in this area
(4 marks)
(c) Explain three effects of computer technology in the following areas:
(i) Job opportunities
(3marks)

Answers

Answer:

13. (a) One area where computers are used is in the creation of a record of auxiliary workers, doctors, nurses, patients, vendors, and payments that can be easily retrieved at an hospital

(b) Two advantages of using computers in an hospital are;

1) The ability to easily access the health record of a patient by a member of staff involved in treating the patient from any location

2) The reduction in the number of physical files and document kept at the counter or record storage which takes up more space as new patients are registered, even when the number of active patients remains the same

(c) Three effects of computer technology in the following area are;

(i) Job opportunities

1) The introduction of the desktop computer, increased the number of job opportunities in desktop publishing, administrative assistance and secretarial role

2) Computer technology has made more people able to work from home

3) Computer applications use with computer technology and developed to work with production machines has created a large number of machine operator job opportunities

Explanation:

What does the get method do if the specified key is not found in the dictionary?

Answers

The default response of Python's get() function is None if the provided key cannot be found in the dictionary. By giving a second parameter to the get() function.

You can additionally specify a default value that will be returned in the event that the key cannot be located. For instance: my dict = "'a': 1, 'b': 2, 'c': 3" sql copy code # Using the default value of the get() function my dict.get('d', 0); value1 As 'd' is not in the dictionary, # returns 0. my dict.get('b', 0); value2 Since 'b' is in the dictionary, # yields 2. print(value1) print(value2) In this illustration, the get() function returns 0 if the key 'd' cannot be located and 2 if the key 'b' can be located in the dictionary.  the get method do if the specified key is not found in the dictionary.

learn more about dictionary   here:

https://brainly.com/question/1199071

#SPJ4

system software assists computer hardware with the work it is designed to do.

Answers

System software is a type of computer software that operates the computer hardware and applications software. It manages and controls computer operations and resources, as well as provides a platform for applications software to run on.System software serves as an intermediary between hardware and applications software.

It provides an interface between the user and the hardware by managing the input and output devices, such as the keyboard, mouse, and printer, and ensuring that the hardware components communicate with each other. Additionally, system software helps to optimize computer performance by managing system resources like memory, disk space, and CPU time.A system software can be divided into two main categories: operating system and utility software.

The operating system is responsible for managing the computer hardware, providing a user interface, and allowing applications software to run. Utility software, on the other hand, is designed to perform specific tasks that help maintain and optimize the computer's performance.

To know more about computer visit:

https://brainly.com/question/32297640

#SPJ11

How does a wireless network key work with an encrypted wireless network?

Answers

A wireless network key work with an encrypted wireless network, providing security and access control.

When a device attempts to connect to an encrypted network, it needs to provide the correct network key to gain access. This key ensures that only authorized users can connect to the network and helps protect the transmitted data from being intercepted or tampered with by unauthorized parties. The wireless network key works in conjunction with encryption algorithms, such as Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), or WPA2.

These algorithms use the network key to generate unique encryption keys for each data packet transmitted over the network. This process, known as key management, ensures that even if an attacker manages to intercept the data packets, they won't be able to decrypt the information without the correct network key. When a device connects to an encrypted network, a process called authentication occurs. The device provides the network key to the access point, which then verifies its validity.


In summary, a wireless network key is an essential component of an encrypted wireless network, providing both access control and data security. It ensures that only authorized users can connect to the network and that the transmitted data remains protected from unauthorized parties. The network key works in conjunction with encryption algorithms to encrypt and decrypt data packets, maintaining a secure communication channel between connected devices.

know more about wireless networks here:

https://brainly.com/question/31472325

#SPJ11

Other Questions
A particale's velocity function is given by V=3t+5t-6 with X in meter/second and t in second Find the velocity at t=2sA particale's velocity function is given by V=3t+5t-6 with X in meter/se Which phrase best describes Earth's biodiversity?a. greater in consistently warm areasb. greater toward Earth's polesc. greater according to energy needsd. greater where temperatures are most variable What text structure does the author use to explain what it is like toun in an OCR?Compare and contrastSequenceChronologicalProblem and solution Decide which of the two points lies on the graph of the line 2x+y=10A.(4,3)B.(-4,18) LAST ATTEMPT IM MARKING AS BRAINLIEST!! (What is the circumference of the circle?) A student adds a 3.0 g antacid tablet to 35.0 g of water in a bottle. After the reaction is complete, 37.3 g of liquid remains in the bottle.How much gas was formed in the reaction?A. 0.7 gB. 2.3 gC. 3.0 gD. 75.3 g PLEASE SOLVE ALL 5 QUESTIONSQuestion 6 (45 seconds) Choose the correct answer regarding the large intestine: A. In the left iliac region it has a dilated part: the caecum. B. Its circular muscle is concentrated into three longit A specialty shop procures several sets of dishes for $36 apiece and offers them to customers for $108 each. What is the mark-up, as a percentage?Write your answer using a percent sign (%). Why is it important that humans (and other animals) maintain a relatively constant body temperature?A. because it is important to keep the water in the body from freezing B. because chemical and physical processes work best at specific temperatures C. because if an animal gets too cold its structures are more likely to break D. because if an animal gets too cold its structures are more likely to meltSCIENCE 20 POINTS When you use the front brakes on your bicycle, why does your body want to rotate over the front wheel A solution has a pH of 2.5. what is the H+ Antes de salir a correr, Lisa me _[blank 1]_ a donde va.Despus de regresar de la feria de gastronoma, no _[blank 2]_ hambre.Si no ahorro el dinero, no _[blank 3]_ comprar mi uniforme.Mis primas _[blank 4]_ a verme antes de ir a la fiesta.Empareja los espacios en blanco con los verbos correctos.vendran dirairetendransaldrapodre PLEASE HELP MEH IM NEED THIS NOW PLEZZWhat is x ? -2x + 3 < 5 Which state is west of the Continental Divide? if you want to prepare 5.00 liters of a 0.350 m solution of nh4cl, how many grams of the salt should you weigh out? In your response be sure to:1 2 3You have just read "Quiet Town" by Jason Gurley. How does the flashback inparagraphs 46-54 create tension?4 5.clarify what is happening at this moment in the story. state who is speaking, narrating, or being quoted for each piece of evidence. include when or where the action took place, if needed for clarification. what challenges did anthony ashley cooper face? Write an equation in slope-intercept form. Determine whether the following compounds have or lack good leaving group for substitution and elimination reactions_ Has good leaving group Lacks good eaving group R-Ohz R-Br R-OH R-NHz R-OMe R-CN R-Ci R-OTs this variable atmospheric component can exist in all three states of matter (solid, liquid, and gas) at the temperatures and pressures that normally exist on earth.