the tolerance or resilience of a network in the face of internal failures or external attacks is known as: group of answer choices network resilience network robustness network recovery network regeneration

Answers

Answer 1

The tolerance or resilience of a network in the face of internal failures or external attacks is known as network resilience.

Network resilience is the capacity of a network to withstand, adapt to, and recover from internal failures and external assaults. It encompasses the network's ability to anticipate, withstand, and adapt to disruptive incidents while maintaining business continuity and delivering uninterrupted services. Network resilience refers to a network's capacity to adjust and maintain its basic features and capabilities, such as providing uninterrupted services and continuing business operations, when faced with disruptions such as attacks or network failures. It includes the ability to identify issues before they become serious, respond quickly to network disruptions, and minimize damage by redirecting or isolating compromised areas. Network resilience is a significant factor for network designers and administrators to consider when creating and maintaining a network. It encompasses the network's ability to resist or minimize damage from attacks or failures, recover quickly, and continue providing service. Therefore, the tolerance or resilience of a network in the face of internal failures or external attacks is known as network resilience.

To learn more about network resilience, visit:

https://brainly.com/question/29833302

#SPJ11


Related Questions

Assume that the Measurable interface is defined with a static sum method that computes the sum of the Measurable objects passed in as an array, and that BankAccount implements the Measurableinterface. Also assume that there is a variable branchAccounts that is an object reference to a populated array of BankAccount objects for a bank branch. Which of the following represents a correct invocation of the sum method to find the total balance of all accounts at the branch?
A) Arrays.sum(branchAccounts)
B) Measurable.sum(branchAccounts)
C) BankAccount.sum(branchAccounts)
D) branchAccounts.sum()

Answers

Answer:

B) Measurable.sum (branchAccounts)

Explanation:

The user interface which can be built by adding components to a panel. The sum method that will be used to find total balance of all accounts at branch is measurable.sum, this will layout the sum of specified branch account total. The measurable interface implements public class bank account as measurable sum.

What is the best offline route navigation app for Android?

Answers

Answer:

Google Maps

Explanation:

Answer:

Sygic GPS Navigation & Maps

Explanation:

A relation is in _______________ if every attribute is atomic. That is, no attributes in the relation have a set (list) of items as the value of that attribute.

Answers

A relation is in first normal form (1NF) if every attribute is atomic. That is, no attributes in the relation have a set (list) of items as the value of that attribute.

First normal form (1NF) is the most basic level of database normalization. When designing databases, it is important to ensure that all tables are in 1NF to avoid data redundancy and inconsistency. By eliminating multivalued dependencies and repeating groups in tables, 1NF ensures that each attribute contains only one value. Tables that are not in 1NF should be broken down into smaller tables with atomic values to bring them into 1NF.

For example, a table that stores a list of phone numbers for each person should be normalized into a separate table with one phone number per row and a foreign key linking it to the person table. Overall, maintaining 1NF is crucial for ensuring data integrity and efficient database performance.

To know more about attribute visit:-

https://brainly.com/question/31715041

#SPJ11

your company purchases several windows 10 computers. you plan to deploy the computers using a dynamic deployment method, specifically provision packages. which tool should you use to create provisioning packages?

Answers

To create provisioning packages for deploying Windows 10 computers using a dynamic deployment method, you should use the Windows Configuration Designer tool.

Windows Configuration Designer (formerly known as Windows Imaging and Configuration Designer or Windows ICD) is a powerful graphical tool provided by Microsoft to create provisioning packages. It allows you to customize and configure various settings, policies, and applications to be applied during the deployment process.

Using Windows Configuration Designer, you can create provisioning packages that define the desired configurations for Windows 10 computers. These packages can include settings such as network configurations, security settings, regional preferences, installed applications, and more.

The tool provides an intuitive interface that guides you through the process of creating the provisioning package. You can select the desired configuration options, customize settings, and preview the changes before generating the package.

Once the provisioning package is created using Windows Configuration Designer, it can be applied during the deployment process to configure multiple Windows 10 computers with consistent settings and configurations. The provisioning package can be installed manually or through automated deployment methods like Windows Autopilot or System Center Configuration Manager (SCCM).

In summary, to create provisioning packages for deploying Windows 10 computers using a dynamic deployment method, you should use the Windows Configuration Designer tool. It enables you to customize settings and configurations, which can be applied during the deployment process to ensure consistent and efficient provisioning of Windows 10 computers.

Learn more about Designer here

https://brainly.com/question/32503684

#SPJ11

cisco asa interface access rules are the most commonly used access control mechanisms on the security appliance. interface access rules permit or deny network applications to establish their sessions through the security appliance based on different information. on which three of these options is the access rules filtering based?

Answers

This is Cisco's solution, the Cisco IronPortTM S670 Web Security Appliance (WSA), which combines reputation filtering, inline file scanning, and signature-based malware detection.

Access control lists (ACLs), which restrict access in your network by blocking specific traffic from entering or leaving, are a feature of Cisco ASAs that offer basic traffic filtering capabilities. A STATIC NAT and an ACL authorizing the traffic are typically required to permit traffic from a lower-security interface to a higher-security interface. You can therefore reach any host on the inside if it has a static translation for that host and an ACL that permits the traffic.

Learn more about security here-

https://brainly.com/question/5042768

#SPJ4

which method can a program use to set the selected choice in a jradiobutton? group of answer choices setselected setchoice setselecteditem set

Answers

A program can use the `setSelected()` method to set the selected choice in a JRadioButton.

JRadioButton is a class in Java Swing that is used to make a button that can be selected or deselected. It is part of the `javax.swing` package, and it inherits from the `AbstractButton` class.In Java, the `setSelected()` method can be used to select or deselect a `JRadioButton`. This method accepts a boolean value, `true` or `false`, which represents whether the button should be selected or deselected, respectively. Here is an example code snippet that demonstrates how to use `setSelected()` to select a JRadioButton:JRadioButton jrb = new JRadioButton("Click me"); //create a JRadioButtonjrb.setSelected(true); //select the buttonIf the boolean value passed to `setSelected()` is `true`, the JRadioButton will be selected. If it is `false`, it will be deselected.

Learn more about JRadioButton: https://brainly.com/question/28588361

#SPJ11

Which of these is a way of making applications less vulnerable to hacking?

make Deny the default

make Allow the default

apply the principle of greatest privilege

have a single point of defense

Answers

(First one )
---------------------
With deny as the default, applications are less vulnerable to hacking. (so yeah the first one lol)

The goal of a system is to


be natural or human-made

use energy

perform a task

be social or physical

Answers

Answer:

The answer is option C, which is: perform a task

a jquery selector includes all but one of the following. which one is it?
a. $ sign
b. parentheses
c. quotation marks
d. dot operator

Answers

A jQuery selector includes all but one of the following. The one that it does not include is: dot(.)operator (Option D)

What is a jQuery selector?

You can use jQuery selectors to pick and alter HTML elements (s). jQuery selectors are used to "find" (or select) HTML components based on their name, id, classes, types, attributes, attribute values, and many other criteria. It is built on the current CSS Selections and includes some new selectors of its own.

Selectors are used in CSS to target HTML components on our web pages that we wish to customize. There are several CSS selectors available, enabling for fine-grained accuracy when styling items.

Learn more about jQuery selector:
https://brainly.com/question/13135117

#SPJ1

simplest way to start baking career is to attend_______.



Answers

...attend course
I hope my answer helps.

BIG POINTS! BIG POINTS! BIG POINTS!
Does someone know how to fix a A s u s computer that won't turn on. Computer is all the way charged. Here is some screenshots of how it looks. Can this be an easy way to fix it because I can't really take out a battery or use tools. Thanks!

BIG POINTS! BIG POINTS! BIG POINTS! Does someone know how to fix a A s u s computer that won't turn on.
BIG POINTS! BIG POINTS! BIG POINTS! Does someone know how to fix a A s u s computer that won't turn on.
BIG POINTS! BIG POINTS! BIG POINTS! Does someone know how to fix a A s u s computer that won't turn on.

Answers

Try and hold the power button for a little while, and if it doesn't turn on then you might have to contact customer support.

Answer:

take the bottom of take out the battery and putt it back in

Explanation:

what is the name of the statement used for providing calculations in pseudocode​

Answers

Answer:

processing statement

Explanation:

processing statement is used to perform calculation or assignment.

One of your friends has been spreading nasty rumors about another friend. What can you do?
a.) tell the friend being targeted that you're there to support her
b.)speak up when you near people repeating the rumor.
c.) tell the friend spreading the rumor that's it's not cool
d.)all of the above

Answers

The easier reply is d

Answer:

d

Explanation:

. A stream of binary data is transmitted through an additive white Gaussian noise (AWGN) channel with signal-to-noise ratio (SNR) = 3.5 dB and bandwidth, B. Channel coding is used to ensure reliable communications. a) Calculate the maximum bit rate that can be transmitted. (5 marks) b) If the bit rate is increased to 3B, how much should you increase the SNR to ensure reliable transmission?

Answers

a) Calculate the maximum bit rate that can be transmitted. (5 marks)For reliable communication of the binary stream of data through the additive white Gaussian noise channel (AWGN), channel coding is used.

The maximum bit rate that can be transmitted through the AWGN channel can be determined using the Shannon channel capacity theorem. The channel capacity is given as;C = B log2(1 + SNR)where B is the channel bandwidth, SNR is the signal-to-noise ratio. Substituting the given values of SNR and bandwidth, we have;\(C = B log2(1 + 3.5) = 3B bit/sb)\)If the bit rate is increased to 3B, Assuming the maximum bit rate is 3B bit/s.

Using the Shannon channel capacity theorem;

\(C = B log2(1 + SNR)\)

Rearranging the formula above, we have;SNR = 2^(C/B) - 1Substituting the given values of bandwidth and bit rate;

\(SNR = 2^(3 - 1) - 1 = 2³ - 1 = 7\)

Thus, to ensure reliable transmission, the SNR should be increased by 7 - 3.5 = 3.5 dB.

To know more about reliable transmission visit :

https://brainly.com/question/31802701

#SPJ11

in a transaction-processing system, ________ insures that transactions, once completed, cannot be undone.

Answers

In a transaction-processing system, atomicity insures that transactions, once completed, cannot be undone.Atomicity Atomicity is the first prerequisite of the ACID model.

It refers to transactions as a single, indivisible operation that either completes entirely or does not run at all. The system will maintain an internal table of pending transactions in progress. In case of a system crash or a different error, the transaction will be restored to its original state before it started.A transaction is said to be atomic when it is all or none. When a transaction fails or aborts due to a system malfunction, all modifications made to the database by the transaction must be undone (rolled back) so that the database is returned to its previous state. Furthermore, it's critical that the database management system maintains a log of all transactions, so that in the event of a system malfunction or crash, the transactions can be re-executed from the logs.

for such more question on database

https://brainly.com/question/518894

#SPJ11

Complete the second line of code so that the first occurence of 3 is deleted from the list. myList = [7, 2, 3, 10, 3, 6]

myList. (3) _______

Answers

Answer:

remove

Explanation:

myList. remove(3) will remove the first occurrence of 3 in the list.

The second line of code so that the first occurrence of 3 is deleted from the list. myList = [7, 2, 3, 10, 3, 6] myList. (3) myList. remove(3) will eliminate the list's first instance of the number 3.

What is occurrence?

Occurrence is defined as the existence of an event, fact, or incident. something that takes place; occurrence; incident. The area contained inside the shortest continuous imaginary boundary that can be constructed to include all the known, inferred, or predicted sites of current occurrence of a taxon, excluding cases of vagrancy, is referred to as the extent of occurrence (EOO).

The output is 25,. list = [1,2,3,4,5,6,7,8,9,10] contains a list of numbers from 1 to 10. the clear() method. Python 3's list. clear() function is the suggested method for removing every item from a list. To determine whether an element is present in the passed list or not, use this operator. If the element is in the list, it returns true; otherwise, it returns false.

Thus, the second line of code so that the first occurrence of 3 is deleted from the list. myList = [7, 2, 3, 10, 3, 6] myList. (3) myList. remove(3) will eliminate the list's first instance of the number 3.

To learn more about occurrence, refer the link;

https://brainly.com/question/28953812

#SPJ2

What is used to give credit to the source from which information is obtained?
a citation
linkage
plagiarism
a format

Answers

a citation gives credit to the source

Answer:

a citation

Explanation:

What CSS property do you use to determine whether flex items are displayed horizontally or vertically

Answers

Answer:

Flex direction

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head.

The head (header) contains information such as version of HTML, title of a page, metadata, link to custom favicons and cascaded style sheet (CSS) etc.

On the other hand, the body of a HTML document contains the contents or informations that a web page displays.

Generally, the part of a HTML document where the cascaded style sheet (CSS) file is linked is the header.

A style sheet can be linked to an HTML document by three (3) main methods and these are;

I. External style.

II. Inline style.

III. Embedded (internal) style.

Flex direction is a CSS property that's used to determine whether flex items are displayed horizontally or vertically.

Fill in the blank: A data analyst is creating the title slide in a presentation. The data they are sharing is likely to change over time, so they include the _____ on the title slide. This adds important context.

Answers

The title of a presentation often gives a meaning and closure to what the presentation is all about. The data they are sharing is likely to change over time, so they include the date of the presentation on the title slide.

A title slide in PowerPoint often has a lot of different meaning. The date on a title slide is usually placed in the Header and Footer box, you have to click on the Slide tab, select the Date and time check box.

The Layout option to title a slide is simply the following steps below

The first you click Home and select Layout. Select Title Slide for a standalone title page or select Title and Content for a slide that contains a title and a full slide text box. There are a lot of other layout options include titles, too. Pick the one that's best suited for your presentation.

Learn more from

https://brainly.com/question/11068366

Suppose blocks hold either three records, or ten key-pointer pairs. As a function of n, the number of records, how many blocks do we need to hold a data file and: (a) A dense index (b) A sparse index

Answers

The blocks that are required to hold the three records or ten key pointer pairs are the data file and the dense index.

What is a data file?

The data file is given as the collection of the files in the computer that is used for storing the information.

The blocks for the ten pointer data files will be n in numbers. Thus, the dense index entry is used to search the data file with each key value. Thus, option A is correct.

Learn more about data files, here:

https://brainly.com/question/25704927

#SPJ1

What is the output of this program? Assume the user enters 2, 5, and 10.
numA = 0
for count in range(3):
answer = input ("Enter a number: ")
fltAnswer = float(answer)
numA = numA + fltAnswer
print (numA)
Output:

Answers

Answer: 17.0

Explanation: I did ran it on PyCharm and that was the outcome.

PLEASE MARK BRAINLIEST AND RATE MY ANSWER :)

which new console should i buy Nintendo switch Xbox series x or a ps5

Answers

Answer:

you should buy the xbox series x, it has better quality and xbox is just better in general

Explanation:

Answer:

get the PS5 it showed off the gameplay and unreal engine 5 that I saw has better graphics.

meanwhile the new Xbox has shown one gameplay is halo but the graphics are not good . but I don't know how the new xbox 12tfop can't past the PS5 10.2 t fop

Soo 10.2 t fop is better than 12tfop.

a) Compare the following pairs of vectors. Your answers can be one or more of the
following: """""None of the above"
Please provide all of the true answer(s) to each comparison below. For example, if<<"
is true, then "" and "" must also be true. (2 points for each comparison)
[1.3.5, 7 ________________12.3.5,6)
[1.3,5,7,91_________________(0,2,4,6,8)

Answers

The answer is "None of the above" since none of the components are equal in the given pairs of vectors.

To compare the given pairs of vectors, we need to check if each corresponding component of the vectors is equal. If any component is different, the vectors are not equal. Here are the comparisons:

A) [1, 3, 5, 7] and [12, 3, 5, 6]

- None of the components are equal, so the vectors are not equal.

- Answer: None of the above

B) [1, 3, 5, 7, 9] and [0, 2, 4, 6, 8]

- The vectors have the same number of components, but none of the components are equal.

- Answer: None of the above

Therefore, for both comparisons, the answer is "None of the above" since none of the components are equal in the given pairs of vectors.

Know more about vector:

https://brainly.com/question/29740341

#SPJ4

How are yall today pfft

Answers

Answer:

Good

Explanation:

HEYYYY

im good

anyways ik this was like 2 months ago

methods that retrieve data of fields are called and methods used to modify the data in fields are called

Answers

Field data retrieval methods are referred to as Accessors, and field data modification methods are referred to as Mutators.

A mutators method is a technique used in computer science to manage changes to a variable. As setter techniques, they are likewise well-known. A getter, which returns the value of the private member variable, frequently follows a setter and together they are referred to as accessors.

According to the encapsulation concept, the mutator method is most frequently employed in object-oriented programming. In accordance with this principle, member variables of a class are made private to hide and protect them from other code. A public member function (the mutator method) is the only way to change a private member variable; it receives the desired new value as a parameter, validates it, and then modifies the private member variable. Assignment operator overloading and mutator methods are similar.

Learn more about mutators here:

https://brainly.com/question/15725263

#SPJ4

Write an algorithm to find addition, subtraction, and multiplication of 2 numbers

Answers

Answer:

Addition

Step 1: Input the two numbers, a and b.

Step 2: Output a + b.

Step 3: Output a - b.

Step 4: Output a * b.

Step 5: If b = 0 output “undefined”.

Step 6: Else output a / b.

subtraction

Step 1 If ( a < b ) then there will be no answer .

step 2f ( a = b ) then all the numbers greater than a are the answer so there will be infinite solutions possible.

Step 3 If ( a > b ) Suppose x is an answer to our equation. Then x divides (a – b).

Due TODAY!!! Can someone please help me!!!

Please provide the 5 links for your devices.
a.
b.
c.
d.
e.

How will each of the 5 devices be utilized?
a.
b.
c.
d.
e.

What internet provider will you use for your PAN?
a.

Will your network be wired or wireless? Why?
a.

Due TODAY!!! Can someone please help me!!!Please provide the 5 links for your devices. a. b.c. d. e.

Answers

Answer:

a and d

Explanation:

Hot Dog Cookout Calculator Assume hot dogs come in packages of 10, and hot dog buns come in packages of 8. Write a program that calculates the number of packages of hot dogs and the number of packages of hot dog buns needed for a cookout, with the minimum amount of leftovers. The program should ask the user for the number of people attending the cookout and the number of hot dogs each person will be given. The program should display the following details: 1. The minimum number of packages of hot dogs required 216.2. The minimum number of packages of hot dog buns required.3. The number of hot dogs that will be left over.4. The number of hot dog buns that will be left over.

Answers

Answer:

Following are the code to this question:

person= int(input("Input the value who attend the cookout: "))#defining a variable person for input value

Given_hotdog = int(input("Input the value of hotdog, that each person will take: "))#defining a variable Given_hotdog for input value

hotdogs = person* Given_hotdog #calculating the total value of hotdogs

# calculating the numbers of the package, that holds require hotdog and buns

package_hotdog=int(hotdogs/10)+1# calculating hotdog packages

bun_package=int(hotdogs/8)+1# calculating buns package

left_hotdogs= package_hotdog*10 -hotdogs# calculating left hotdogs

left_buns=bun_package*8-hotdogs# calculating left buns

print("Total Hotdogs",hotdogs)#print total hotdogs value

print("The Minimum number of packages require for hotdogs: ", package_hotdog)#print require hotdogs value

print("The Minimum number of packages require for buns: ", bun_package)#print require buns value

print("Number of left hotdogs: ", left_hotdogs)#print left hotdogs value

print("Number of left buns: ", left_buns)#print left buns value

Output:

please find the attached file.

Explanation:

In the above-given code, the "person and Given_hotdog" variable is declared, which is used to take input from the user end and in the "hotdogs" variable we calculate its total value.

In the next step, "package_hotdog and bun_package" is declared, which uses the "hotdogs" variable to calculate its value.  At the last step, the "left_hotdogs and left_buns" variable is declared, which uses the above variable for calculating the value and use the print method to print its value.
Hot Dog Cookout Calculator Assume hot dogs come in packages of 10, and hot dog buns come in packages

which cellular technology is compromised of hspa and ev-do to provide higher data speeds than previous cellular data protocols?

Answers

The cellular technology that is compromised of HSPA and EV-DO to provide higher data speeds than previous cellular data protocols is called HSPA+ and EV-DO Rev A. Cellular technology refers to the various technologies and standards used for mobile telecommunication.

HSPA, which stands for High-Speed Packet Access, is a 3G (third generation) cellular technology that provides faster data speeds than previous 2G technologies. It uses a combination of Time Division Multiplexing (TDM) and Code Division Multiple Access (CDMA) to increase data transmission rates. HSPA is an evolution of WCDMA (Wideband Code Division Multiple Access), which is the technology used in 3G networks. HSPA+ is an enhanced version of HSPA, which provides even faster data speeds.

Learn more about HSPA, here https://brainly.com/question/14455214

#SPJ4

hy does payments constitute such a large fraction of the FinTech industry? (b) Many FinTech firms have succeeded by providing financial services with superior user interfaces than the software provided by incumbents. Why has this strategy worked so well? (c) What factors would you consider when determining whether an area of FinTech is likely to tend towards uncompetitive market structures, such as monopoly or oligopoly?

Answers

(a) lengthy and complex processes for making payments (b)  legacy systems and complex interfaces (c) regulatory requirements and substantial initial investment, can limit competition

(a) Payments constitute a significant portion of the FinTech industry due to several factors. First, traditional banking systems often involve lengthy and complex processes for making payments, leading to inefficiencies and higher costs. FinTech firms leverage technology and innovative solutions to streamline payment processes, providing faster, more secure, and convenient payment options to individuals and businesses. Additionally, the rise of e-commerce and digital transactions has increased the demand for digital payment solutions, creating a fertile ground for FinTech companies to cater to this growing market. The ability to offer competitive pricing, improved accessibility, and enhanced user experience has further fueled the growth of FinTech payment solutions.

(b) FinTech firms have succeeded by providing financial services with superior user interfaces compared to incumbents for several reasons. Firstly, traditional financial institutions often have legacy systems and complex interfaces that can be challenging for users to navigate. FinTech companies capitalize on this opportunity by designing user-friendly interfaces that are intuitive, visually appealing, and provide a seamless user experience. By prioritizing simplicity, convenience, and accessibility, FinTech firms attract and retain customers who value efficiency and ease of use. Moreover, FinTech companies leverage technological advancements such as mobile applications and digital platforms, allowing users to access financial services anytime, anywhere, further enhancing the user experience.

(c) Several factors contribute to the likelihood of an area of FinTech tending towards uncompetitive market structures such as monopoly or oligopoly. Firstly, high barriers to entry, including regulatory requirements and substantial initial investment, can limit competition, allowing a few dominant players to establish market control. Additionally, network effects play a significant role, where the value of a FinTech service increases as more users adopt it, creating a competitive advantage for early entrants and making it challenging for new players to gain traction. Moreover, data access and control can also contribute to market concentration, as companies with vast amounts of user data can leverage it to improve their services and create barriers for potential competitors. Lastly, the presence of strong brand recognition and customer loyalty towards established FinTech firms can further solidify their market position, making it difficult for new entrants to gain market share.


To learn more about technology click here: brainly.com/question/9171028

#SPJ11

Other Questions
Would Christians believe in the Ten Commandments, like in Judaism? Why or why not? Question 3 (1 point)According to Christian tradition, who crucified Jesus Christ?aThe RomansbC The ByzantinesThe PersiansThe GreeksOd 7. When the mufti came to Malala's home to speak with her father about the girl's high school, what was the compromise they came to? (Ch. 5)Only one girl from each family could attend school.They did not agree or come to a compromise.The girls could only go to school for 1 year.The girls would enter through a different gate than the men. How do you say "job application" in korean? Solve for hh 5 = -30Make sure to show your work for full points!Question 7 options:HELP ME ASAP PLEASE what types of instruments have archaeologists recovered from ancient egyptian burial sites and ruins? select four. most nucleophilic and the least nucleophilic of the following: a) BH3 b) HCCNa c) CH3CH2OH d) NH3 e) CH3CH2ONa Write 14 more then a number (pre algebra) Find the indicated critical z value. Find the value of z a/2 that corresponds to a confidence level of 85%. a/2 Answer: The nurse is caring for a patient who has severe nausea and vomiting caused by food poisoning. The patient is prescribed antiemetic medications as a combination therapy. Of what will the nurse be aware while administering the medications? 6+7x5+7-8x9x-1x10+67-100+1 for For which values of the constants a,b,c,and d is [ ]?[ ], and [ ] , [ ] a linear combination of help help helllllllllp How should you carry the microscope? Julian school is selling tickets for a play the tickets cost $10.50 for adults and $3.75 for students the ticket sales for opening night totaled 2071 and $.50 the equation 10.58+3.75B equals 2071. 50 where is the number of adult tickets sold and visa number of student ticket sold can be used to find the number of adult student tickets and 82 soon as it is and how many adult tickets were sold F (x)=-2x-3 g(x)=3x2-3x Write this number in words: 1.001510512 (with decimals) Select the correct answer. A linear function has a y-intercept of -12 and a slope of 3/2 . What is the equation of the line? A. B. C. D. Using technology, determine the quarterly payment on a 4 year loan of $16,231 at 5. 1% compounded quarterly. Round your answer to the nearest cent. A. $1,125. 69 c. $1,518. 85 b. $1,127. 86 d. $1,508. 31. A reason Spanish conquistadors went to the Americas during the 1500s was toO prevent war with Indigenous people.protect ways of life for Indigenous people.learn about the cultures of Indigenous people.O spread Christianity to Indigenous people.