IPSec or internet Protocol Security is an extension of the Internet Protocol. What does IPSec use to provide network security?

Answers

Answer 1

Answer:

In computing, Internet Protocol Security ( IPSec ) is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over on internet protocol network. It is used in virtual private networks ( VPNs ).


Related Questions

which optical storage media has greatest storage capacity?​

Answers

A Blu-ray Disc has the greatest storage capacity.

The optical storage media has greatest storage capacity is Single-layer, single-sided Blu-ray disc.

What is the  Blu-ray disc.

A Blu-ray disc can store the most information compared to other types of optical discs. A one-sided Blu-ray disc can store around 25 GB of information.

Dual-layer or double-sided discs are discs that have two layers or two sides, which allows them to store more information. New Blu-ray discs with 20 layers can store up to 500 GB of data. Small DVDs can save about 4. 7 GB of data. A DVD that has two layers or can be played on both sides can store up to 8. 5 GB of data. If it is both dual-layer and double-sided, it can hold up to 17 GB of data.

Read more about  Blu-ray disc here:

https://brainly.com/question/31448690

#SPJ6

Which of the following are complete sets of data and are the rows of the table?
Files
Fields
Queries
Records

Answers

Answer:

I think the answer is going to be records

According to O*NET, what is the most common level of education earned by Secondary School Special Education Teachers?

master’s degree
bachelor’s degree <------- THE ANSWER
some college, no degree
associate degree
POSTED TO HELP OTHERS

Answers

Answer:

bachelor’s degree

Explanation:

Answer:

B bachelors degree

Explanation:

Setting Up Cascading Deletes
Use the drop-down menus to complete the steps to set up cascading deletes between two related tables.
1. Click the
tab
2. In the Relationships group, click Relationships
3. Double-click
4. In the Edit Relationship dialog box, add a check mark next to
5. Click OK
Done

Answers

Answer:

Database Tools, The Line Connecting the Tables, Cascade Delete Related Records

Explanation:

To have a reason or purpose to do something

a
Motivate
b
Identity
c
Deceive
d
Anonymous

Answers

The answer is A. Motivate

Answer:

A

Explanation:

You plan to make a delicious meal and want to take the money you need to buy the ingredients. Fortunately you know in advance the price per pound of each ingredient as well as the exact amount you need. The program should read in the number of ingredients (up to a maximum of 10 ingredients), then for each ingredient the price per pound. Finally your program should read the weight necessary for the recipe (for each ingredient in the same order). Your program should calculate the total cost of these purchases, then display it with 6 decimal places.

Example There are 4 ingredients and they all have a different price per pound: 9.90, 5.50, 12.0, and 15.0. You must take 0.25 lbs of the first, 1.5 lbs of the second, 0.3 lbs of the third and 1 lb of the fourth. It will cost exactly $29.325000.

Answers

Answer:

In Python:

prices = []

pounds = []

print("Enter 0 to stop input")

for i in range(10):

   pr = float(input("P rice: "+str(i+1)+": "))

   pd = float(input("Pound: "+str(i+1)+": "))

   if pr != 0 and pd != 0:

       prices.append(pr)

       pounds.append(pd)

   else:

       break

amount = 0

for i in range(len(pounds)):

   amount+= (pounds[i]*prices[i])

print("Amount: $",amount)

Explanation:

These initialize the prices and pounds lists

prices = []

pounds = []

This prompts the user to enter up to 10 items of press 0 to quit

print("Enter 0 to stop input")

This iterates through all inputs

for i in range(10):

This gets the price of each item

   pr = float(input("P rice: "+str(i+1)+": "))

This gets the pound of each item

   pd = float(input("Pound: "+str(i+1)+": "))

If price and pound are not 0

   if pr != 0 and pd != 0:

The inputs are appended to their respective lists

       prices.append(pr)

       pounds.append(pd)

If otherwise, the loop is exited

   else:

       break

This initializes total to 0

amount = 0

This iterates through all inputs

for i in range(len(pounds)):

This multiplies each pound and each price and sum them up

   amount+= (pounds[i]*prices[i])

The total is then printed

print("Amount: $",amount)

How should you present yourself online?

a
Don't think before you share or like something
b
Argue with other people online
c
Think before you post
d
Tag people in photos they may not like

hurry no scammers

Answers

C maybe ......,,,,.....

Answer: C) Think before you post.

Explanation:

There's a very good chance that whatever you post online will remain there indefinitely. So it's best to think about what would happen if you were to post a certain message on a public place. Keep in mind that you should also safeguard against your privacy as well.

The difference between a dot matrix printer and a line printer

Answers

Answer:

please give me brain list and follow

Explanation:

Difference Between Dot Matrix and Line Printer is that Dot-matrix printer produce printed images, they produce image when tine wire pins on a print head mechanism strike an inked ribbon. While Line printer is a type of impact printer which is high-speed and printer an entire line at a time.

Answer:

Difference between Dot Matrix and Line printer is that Dot Matrix printer produce printed images, they produce image when tine wire pins on a print head mechanism strike an inked ribbon. While Line printer ia a type of impact printer which is high speed and printer an entire Line at a time.

Write an application that combines several classes and interfaces.

Answers

Answer:

Explanation:

The following program is written in Java and it combines several classes and an interface in order to save different pet objects and their needed methods and specifications.

import java.util.Scanner;

interface Animal {

   void animalSound(String sound);

   void sleep(int time);

}

public class PetInformation {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       String petName, dogName;

       String dogBreed = "null";

       int petAge, dogAge;

       Pet myPet = new Pet();

       System.out.println("Enter Pet Name:");

       petName = scnr.nextLine();

       System.out.println("Enter Pet Age:");

       petAge = scnr.nextInt();

       Dog myDog = new Dog();

       System.out.println("Enter Dog Name:");

       dogName = scnr.next();

       System.out.println("Enter Dog Age:");

       dogAge = scnr.nextInt();

       scnr.nextLine();

       System.out.println("Enter Dog Breed:");

       dogBreed = scnr.nextLine();

       System.out.println(" ");

       myPet.setName(petName);

       myPet.setAge(petAge);

       myPet.printInfo();

       myDog.setName(dogName);

       myDog.setAge(dogAge);

       myDog.setBreed(dogBreed);

       myDog.printInfo();

       System.out.println(" Breed: " + myDog.getBreed());

   }

}

class Pet implements Animal{

   protected String petName;

   protected int petAge;

   public void setName(String userName) {

       petName = userName;

   }

   public String getName() {

       return petName;

   }

   public void setAge(int userAge) {

       petAge = userAge;

   }

   public int getAge() {

       return petAge;

   }

   public void printInfo() {

       System.out.println("Pet Information: ");

       System.out.println(" Name: " + petName);

       System.out.println(" Age: " + petAge);

   }

   //The at (email symbol) goes before the Override keyword, Brainly detects it as a swearword and wont allow it

   Override

   public void animalSound(String sound) {

       System.out.println(this.petName + " says: " + sound);

   }

//The at (email symbol) goes before the Override keyword, Brainly detects it as a swearword and wont allow it

  Override

   public void sleep(int time) {

       System.out.println(this.petName + " sleeps for " + time + "minutes");

   }

}

class Dog extends Pet {

   private String dogBreed;

   public void setBreed(String userBreed) {

       dogBreed = userBreed;

   }

   public String getBreed() {

       return dogBreed;

   }

}

Declare a 4 x 5 array called N.

Using for loops, build a 2D array that is 4 x 5. The array should have the following values in each row and column as shown in the output below:

1 2 3 4 5
1 2 3 4 5
1 2 3 4 5
1 2 3 4 5

Write a subprogram called printlt to print the values in N. This subprogram should take one parameter, an array, and print the values in the format shown in the output above.

Call the subprogram to print the current values in the array (pass the array N in the function call).

Use another set of for loops to replace the current values in array N so that they reflect the new output below. Call the subprogram again to print the current values in the array, again passing the array in the function call.

1 1 1 1 1
2 2 2 2 2
3 3 3 3 3
4 4 4 4 4

I really need help with this thanks. (In Python)

Answers

Answer:

N = [1,1,1,1,1],

[2,2,2,2,2],

[3,3,3,3,3],

[4,4,4,4,4]

def printIt(ar):

  for row in range(len(ar)):

      for col in range(len(ar[0])):

          print(ar[row][col], end=" ")

      print("")

           

N=[]

for r in range(4):

  N.append([])

   

for r in range(len(N)):

  value=1

  for c in range(5):

      N[r].append(value)

      value=value + 1

           

printIt(N)

print("")

newValue=1

for r in range (len(N)):

  for c in range(len(N[0])):

      N[r][c] = newValue

  newValue = newValue + 1

       

printIt(N)

Explanation:

:D

Below is the required program of Python.

Python

Program:

# Array name will be "N".

# Start program

# Defining a function and taking input array

def printIt(ar):

# Using for loop to scan the rows as well as columns of array

 for row in range(len(ar)):

     for col in range(len(ar[0])):

# Printing the element of array

         print(ar[row][col], end=" ")

     print("")

# Passing the array N

N=[]

# Again using the loop

for r in range(4):

 N.append([])

# Loop to control rows

for r in range(len(N)):

 value=1

# Loop to control columns

 for c in range(5):

     N[r].append(value)

     value=value + 1

# Calling the function

printIt(N)

print("")

newValue=1

# Value in row and column

for r in range (len(N)):

 for c in range(len(N[0])):

# Assigning the values to the array

     N[r][c] = newValue

 newValue = newValue + 1

# Printing the array

# End program

printIt(N)

Program code:

Start a program.Defining a function and taking input arrayUsing for loop to scan the rows as well as columns of arrayPrinting the element of arrayAgain using the loop to control rows and columns.Assigning the values to the arrayEnd program.

Output:

Find below the attachment of the output of the program code.

Find out more information about Python here:

https://brainly.com/question/26497128

Q.No.3 b. (Marks 3)
Explain why change is inevitable in complex systems and give examples (apart from prototyping and incremental delivery) of software process activities that help predict changes and make the software being developed more resilient to change.

Answers

Answer:

The change in complex systems can be explained according to the relationship of the environment where the system is implemented.

The system environment is dynamic, which consequently leads to adaptation to the system, which generates new requirements inherent to changes in business objectives and policies. Therefore, changing systems is necessary for tuning and usefulness so that the system correctly supports business requirements.

An example is the registration of the justification of the requirements, which is a process activity that supports changes in the system so that the reason for including a requirement is understood, which helps in future changes

Explanation:

Which of the following is probably not a place where it is legal to download the music of a popular artist whose CDs are sold in stores?

Answers

Answer:

A. Personal blogs

Explanation:

I did the quick check, and there you go...it's A.

Question 4
What methods do phishing and spoofing scammers use? List and explain methods to protect
against phishing and spoofing scams. (10 marks​

Answers

Answer:

The answer is below

Explanation:

There are various methods of phishing and spoofing scammers use, some of which are:

Phishing:

1. Descriptive phishing: here the scammer use fake email to pretend to be a genuine company and steal people's vital details

2. Spear Phishing: here the scammer creates an email that appears there is a connection on the potential victim

3. CEO Fraud: here the scammer target CEO of a company, thereby if successful can fraudulently attack the company due to his access.

Other phishing attacks are vishing, smishing, and pharming, etc.

Spoofing:

1. Email spoofing: here the attacker sends an email through a fake email address to get personal details of a potential victim

2. Caller ID Spoofing: here the attacker makes it appear that he is one specific person, but he is not in the real sense.

3. GPS Spoofing: here the attacker makes it appear he is in a specific location, whereas, he is not.

Others include website spoofing, text message spoofing, Io spoofing etc.

Why are microcomputers installed with TCP/IP protocols?

Answers

Answer:

microcomputers are installed with TCP/IP protocols because its a set of standardized rule that allows the computer to communicate on a network such as the internet

Explanation:

8.9 Lesson Practice edhesive

Answers

Answer:

1. search

2. False

3. Our algorithm did not find the element we were looking for.

Explanation:

Which of the following is a form of media?Check all that apply.

A. a brochure distributed to many people

B. a diary

C. an email to a friend

D. a blog

Answers

Answer:

A. a brochure distributed to many people.

D. a blog.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

Generally, the linear model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.

Hence, the following are forms of media (communication channel);

I. A brochure distributed to many people. It comprises of printed textual informations used mainly for promotional purposes.

II. A blog. It is an online website that contains both textual and multimedia messages, especially as a news platform.

Write a program that will filter a list of non-negative integers such that all duplicate values are removed. Integer values will come from standard input (the keyboard) and will range in value from 0 up to 2,000,000,000. Input will be terminated by the special value, -1. Once the input is read in you should output (to the screen) the list of numbers as a sorted list (smallest to largest) with one value listed per line where all duplicates have been removed. The primary difficulty with this program is that there are an enormous number of input values and an expected large number of duplicate numbers.

Answers

Answer:

The program in python is as follows:

original = []

inp = int(input(": "))

while inp>=0:

   if inp<=2000000000:

       original.append(inp)

   inp = int(input(": "))

newlist = []

for i in original:

if i not in newlist:

 newlist.append(i)

newlist.sort()

for i in newlist:

   print(i)

Explanation:

This initializes the original list

original = []

This gets input for the list

inp = int(input(": "))

The following loop is repeated while input is not negative

while inp>=0:

This ensures that only inputs from 0 and 2000000000 enters the list

   if inp<=2000000000:

       original.append(inp)

Prompt the user for another input

   inp = int(input(": "))

This initializes a newlist

newlist = []

Iterates through the original list

for i in original:

Check for duplicate

if i not in newlist:

Each number is entered to the new list, without duplicate

 newlist.append(i)

This sorts the new list in ascending order

newlist.sort()

This prints the list item one per line

for i in newlist:

   print(i)

This is gonna be very long but I have no idea what to do, I'm confused.

Course Project Part 4: Conducting the Experiment and Recording Data
After much preparation, you are finally ready to begin conducting your experiment. Due to all the hard work you put into your literature review and planning your procedures, the steps that you need to take to conduct your experiment successfully have already been set. While you conduct your experiment, you will need to keep a daily journal where you record the activities you undertake that are relevant to the experiment and also where you record any data that you collect. This is your experiment log and serves as a record of your work while also allowing you to make a record of any changes or modifications you may need to make during the experiment.

Conducting the Experiment and Keeping an Experiment Journal
Following the procedure that you established in the previous part of this project, set up your experiment and begin running it. Every day while your experiment is running you will make an entry in your journal. Record what activities you completed (refer to your outlined procedure to make sure you are following the procedure that you established), any modifications that had to be made to your set up or procedure, and any observations or data you collect. Even on days when you do not collect data (depending on your experiment, there may not be data collection every day), make an entry in your journal. Each journal entry should be clearly labeled with the date on which it was entered. You do not need to type up all your entries, but make sure that your journal entries are neatly written, as they will be evaluated by your instructor.

Depending on the topic and design of your experiment, the period of time during which you conduct and record your experiment may range from one to several weeks. In consultation with your instructor, you will establish a timeline for the evaluation of your journal. If you are running a shorter experiment, your journal may be evaluated several times over the course of one or two weeks. If your experiment takes longer to complete, you may have a weekly review over the course of a month. Follow the guidelines provided by your instructor.

Collecting Data
All experiments generate data. This data allows the scientist to evaluate the success of the experiment and make interpretations about the results generated by the investigation. When you record your data, you must collect it as consistently as possible. Returning to the plant experiment, it would be best to measure the plants on a set schedule. For example, you might choose to measure the plants every Thursday at 3 pm. It is important to measure the plants at the same time each week so that the difference in growth you might observe is a reflection of the experimental condition, not simply longer growing time. Additionally, it is important to use the same instruments to collect data. The plants should be measured with the same ruler or measuring tape each time. This helps reduce any error or bias that might be introduced by using different instruments to make measurements. Whatever measurements or data you collect, do so in a consistent manner. Use the same instruments, the same scales, and record the data in a standardized manner. It is also a good idea to record your experiment using photographs. This will help you later during analysis and provides information for others who might be interested in recreating your experiment. Record your data in your experiment journal, where it will be reviewed by your teacher on an on-going basis. Submit your journal to your instructor according to the schedule you have established together.

Someone answered before but gave a link and I don't trust it

Answers

for such experiment, you do it with care and to acquire and determine to put experience in it

Explanation:

because without you been or using experience the experiment will not correct

Four reasons why users attach speakers to their computer

Answers

Sound
Quality
Easier
Reliable

which service is a major commercial cloud platform?
a. Microsoft SQL Services
b. SAP Cloud Services
c. Amazon Web Services
d. Oracle Enterprise Services

Answers

Answer: Amazon Web Service

Explanation:

The service that's a major commercial cloud platform is the Amazon Web Service.

Amazon Web Services offers global cloud based products which include databases, storage, networking, IoT, developer tools, analytics, mobile, develo management tools, security applications etc.

The services are of immense benefit to organizations as they help them in achieving their goals as it helps in lowering IT costs, increase speed, enhance efficiency and revenue.

What methods do phishing and spoofing scammers use?

Answers

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information

Which of the following enables robots to do things such as understand itself, walk, talk, and develop skills?
Group of answer choices

self-modeling

gigabit ethernet

political awareness

social distancing

binary verificationism

Answers

Answer:

self-modeling

Explanation:

Robots, which are man-made machines which mimics the actions of man like walking, talking, rendering assistance are part of the future plans to make the society easier. It was mans' attempt to improve the society but still happens to be work in progress.

For the robots to be able to carryout its function, there is need for it to be self modelling in the sense of initiating and executing the commands which was already programmed into it. For example, telling it to walk will be initiated by him as a command, after processing the command, it will execute it without any other information.

What menu and grouping commands is the "SORT" tool? ( please answering meeeee)

A)Home - editing

B) Edit - format

C )Page layout - sheet options

D) File - edit

Answers

C, sorting is meant to arrange therefore layout falls under that


State
any three (3) reasons why users attach speakers to their computer?

Answers

Answer:

To complete the computer setup, to hear audio, to share audio.

Explanation:

A computer is not really complete without speakers.

So that you can actually hear the computer's audio.

So that you can have multiple people hear the same audio. (Headphones do not do this)

function of dobji dzong​

Answers

Answer:

Dobji is consider to be the first model dzong in Bhutan

The order of slides can be changed here.

Answers

ANSWER:

Yes

WHY:

Not enough information is explained


MARK ME BRAINLIEST PLEASE

The phone in your hand is a computer. So too is the machine that occupies a 100,000 square foot data center. Given their vast differences in size, how can they both be computers?

Answers

Answer:

Well when you think about it they both do the same thing but they are diffirent, they have the same perpose but diffirent parts in them so, when you compair them the phone is smaller and slower, the bigger the computer the better it is depending on the amount of money spent on parts.

determine the correct usage for styles and themes by placing each characteristic under the correct category​

Answers

Answer:

Styles create bulletin lists and are found in the format tex tab change indentation

Themes change page colors, create message borders, are found under options tab

The XYZ daycare has installed a new high-tech system for keeping track of which children are under its supervision at any moment in time. Each parent of a child has a card with a unique ID, where the ID is some integer x. Every morning, the parent swipes the card at a card-reader when dropping their child off at the daycare. The system then adds x to an array of integers. In the evening, when the parent comes to pick up the child, the same card is swiped, and a second copy of x is added to the list. Each night at midnight, the array is wiped clean and reset to have zero elements. In this way, the daycare can quickly check every afternoon which children are yet to be picked up by their parents by picking out the array elements that occur precisely once. Unfortunately, at 4:55 pm on Thursday, April 20, 2017, the daycare realizes that somewhere in their daycare is precisely one child who is yet to be picked up. Can you help them determine the integer ID of this child

Answers

Answer:

Use or Add a log of the actions of the system including the integer, the action,  and the time. Scroll through and see which integer was added but was not removed.

Explanation:

I wouldn't be able to program this, but I think a log is the best solution for this.

I want to know the basic of Excel

Answers

Answer:

Use Pivot Tables to recognize and make sense of data.

Add more than one row or column.

Use filters to simplify your data.

Remove duplicate data points or sets.

Transpose rows into columns.

Split up text information between columns.

Use these formulas for simple calculations.

Get the average of numbers in your cells.

Other Questions
A classic demonstration illustrating eddy currents is performed by dropping a permanent magnet inside a conducting cylinder. The magnet does not go into free fall. Instead it reaches terminal velocity and can take a few seconds to drop a length of about a meter. Suppose the mass of the magnet is 70 g and width of 1.0 cm. It falls with a terminal velocity of 10 cm/s and the length of the pipe is 80 cm. The magnitude of the Joule heating from the eddy currents is approximately:________ Transition to adult lifeThe balance between family support and letting the young adult try their own lifefirst paragraph (introduction)second paragraph (first reason)third paragraph (second reason) fourth paragraph (counterclaim) fifth paragraph (end result) Sascha deposited $600 in a simple interest saving account. In one year the value of the account increased to $621 What are the steps for 625 to the power of 3/4 The mountain ash produces a bright red berry fruit. How has the mountain ash tree evolved in order to allow its seeds to be spread far from their source?A. The leaves are brightly colored and attract animals to the plant,B. The seeds are in berries that are eaten by birds and dropped as waste away fromthe plantC. The seeds are lightweight so animals can pick them up and carry them back totheir nestsD. The seeds have light stems that allow them to be carried by the wind, please help i am giving away brainiliest1. Which body system is primarily responsible for protecting you against pathogens?A. Digestive systemB. Nervous systemC. Endocrine systemD. Immune systemNo dam links Read this passage from "The American Dream."One of the first things we notice in this dream is an amazing universalism. It does not say some men, but it says all men. It does not say all white men, but it says all men, which includes black men. It does not say all Gentiles, but it says all men, which includes Jews. It does not say all Protestants, but it says all men, which includes Catholics.Which phrase from the passage most strongly reflects an appeal to logos?an amazing universalismIt does not say all Protestantsbut it says all menIt does not say all Gentilespls help me Which of the following sentences, if added to The Bully, would prevent it from being realistic fiction?A.After school, Ramon showed Michael a device that could make you live forever. B.J.T. stopped picking on the other students.C.Ramon moved to a new school.D.The three boys eventually became friends and stayed friends through high school. 40 pts please help!Find the circumference and area of a circle with a diameter of 7cm. Round your answers to the hundredth. a. C = 21.98cm and A = 38.47cm squared b. C = 21.98cm and A = 153.86cm squared c. C = 43.96cm and A = 38.47cm squared d. C = 43.96cm and A = 153.86cm squared French Question for expertsGo on next picsplease quick its for final exam!will give brainly What is the mathematical term for "the same"? how did a third party impact the presidential election of 2000? Which arrows indicate weathering and erosion?sedimentary rocks According to the reaction, below, how many grams of aluminum are needed to react fully with 100 grams of sulfur? 2AL + 3s - Al2S3 What is 2x - 4x = 1 as a fraction During World War II, FDR eventually decided to aid the British in the fight against Germany by loaning and selling weapons to the British military, much to the chagrin of many Americans. Which of these was NOT an argument that FDR used to justify his actions?A. If your neighbors house was on fire, you wouldnt argue about cost; you would immediately let them borrow your hose.B. England was broke and coming close to losing its part of the war.C. If England fell, America would be sitting with a direct threat of danger and war.D. England would undoubtedly find success, and the United States was just helping it along in small ways without getting fully involved. A. Preguntas y respuestasComplete the questions with the correct form of the verbs.1. A qu hora ______ (volver) t a casa los sbados por la noche?2. A qu hora _______ (empezar ) tus clases? 3. Dnde ______ (almorzar) t los martes? 4. T _____ (decir) mentiras?B. Preguntas y respuestas. Answer those questions in sentences. 1.2.3.4. Give five examples of physical networking. The ABC Corporation is considering opening an office in a new market area that would allow it to increase its annual sales by $2.5 million. Cost of goods sold is estimated to be 40 percent of sales, and corporate overhead would increase by $300,000, not including the cost of either acquiring or leasing office space. The corporation will have to invest $2.5 million in office furniture, office equipment, and other up-front costs associated with opening the new office before considering the costs of owning or leasing the office space. A small office building could be purchased for sole use by the corporation at a total price of $3.9 million, of which $600,000 of the purchase price would represent land value, and $3.3 million would represent building value. The cost of the building would be depreciated over 39 years. The corporation is in a 30 percent tax bracket. An investor is willing to purchase the same building and lease it to the corporation for $450,000 per year for a term of 15 years, with the corporation paying all real estate operating expenses (absolute net lease). Real estate operating expenses are estimated to be 50 percent of the lease payments. Estimates are that the property value will increase over the 15-year lease term for a sale price of $4.9 million at the end of the 15 years. If the property is purchased, it would be financed with an interest-only mortgage for $2,730,000 at an interest rate of 10 percent with a balloon payment due after 15 years.a. What is the return from opening the office building under the assumption that it is leased?b. What is the return from opening the office building under the assumption that it is owned?c. What is the return on the incremental cash flow from owning versus leasing?d. In general, what other factors might the firm consider before deciding whether to lease or own? What cell organelle stores water for plant cells is it a Large Vacuole or small