The primary reason for networking standards is to: Group of answer choices simplify cost accounting for networks ensure that hardware and software produced by different vendors can work together make it more difficult to develop hardware and software that link different networks ensure that all network components of a particular network can be provided by only one vendor lock customers into buying network components from one vendor

Answers

Answer 1

Answer:

ensure that hardware and software produced by different vendors can work together.

Explanation:

Networking standards can be defined as a set of rules and requirements for data communication which are necessary for the inter-operation of network devices (hardware) and software application processes.

Hence, the primary reason for networking standards is to ensure that hardware and software produced by different vendors can work together. This ultimately implies that, networking standards makes it possible for various vendors and manufacturers to develop or produce networks that avail users the ability and opportunity to share informations and communicate with one another easily.

Some examples of organizations responsible for creating networking standards are;

1. International Telecommunications Union— Telecommunications (ITU-T).

2. International Organization for Standardization (ISO).

3. American National Standards Institute (ANSI).

Additionally, the generally accepted standards for networking are; HTML, HTTP, IMAP, POP, SNMP, SMTP, TCP etc.


Related Questions

What are three ways that you can protect and care for your camera? Why is taking care of your camera important?



Answer in 1-3 sentences.

Answers

avoid dirt and sand, touching your camera lense, and any type of liquid. be careful when cleaning dirt and sand off of your camera lense, as not doing so could scratch lense.

Does the submission include the file "SuperPower.java"? Does the file include a public class called "SuperPower"? Does the class include a public method called "main"? Is the "main" method static? Does the main method have a String assignment statement that uses "JOptionPane.showInputDialog"? Does the main method have a statement that uses "JOptionPane.showMessageDialog"? Does the program convert the String from "JOptionPane.showInputDialog" using the "toUpperCase" method? Does the submission include a screenshot that shows an Input dialog that asks, "What is your superpower?" Does the submission include a screenshot that shows a Message dialog stating " TO THE RESCUE!", where "" is the input converted to upper case?

Answers

Answer:    

Here is the program fulfilling all the requirements given:

import javax.swing.JOptionPane;      

public class SuperPower{

public static void main(String[] args) {

String power;

power = JOptionPane.showInputDialog("What is your super power?");

power = power.toUpperCase();

JOptionPane.showMessageDialog(null, power);} }

Explanation:

Does the file include a public class called "SuperPower"

See the statement:

public class SuperPower

Does the class include a public method called "main"? Is the "main" method static?

See the statement:

public static void main(String[] args)

Does the main method have a String assignment statement that uses "JOptionPane.showInputDialog"

See the statement:

power = JOptionPane.showInputDialog("What is your super power?");

Does the main method have a statement that uses "JOptionPane.showMessageDialog"?

See the statement:

JOptionPane.showMessageDialog(null, power);

Does the program convert the String from "JOptionPane.showInputDialog" using the "toUpperCase" method?

See the statement:

power = power.toUpperCase();

Does the submission include a screenshot that shows an Input dialog that asks, "What is your superpower?" Does the submission include a screenshot that shows a Message dialog stating " TO THE RESCUE!", where "" is the input converted to upper case?

See the attached screenshots

If the program does not let you enter an exclamation mark after "to the rescue" then you can alter the code as follows:

import javax.swing.JOptionPane;

public class SuperPower{

public static void main(String[] args) {

String power;

power = JOptionPane.showInputDialog("What is your super power?");

power = power.toUpperCase();

JOptionPane.showMessageDialog( null, power+"!");} } // here just add an exclamation mark which will add ! after the string stored in  power

10010010 + 01100010 =

The problem above is called an _________. It means that there are more ________ than can be stored in a byte, or eight bit number.

Answers

Answer:

1. binary number or 8 bit

2. bits

Explanation:

Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a ______ the network software.

Answers

Answer:

Vulnerability of.

Explanation:

In this scenario, your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a vulnerability of the network software.

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

Write a program that prompts the user to input an integer that represents the money in cents. The program will the calculate the smallest combination of coins that the user has. For example, 42 cents is 1 quarter, 1 dime, 1 nickel, and 2 pennies. Similarly, 49 cents is 1 quarter, 2 dimes, and 4 pennies

Answers

Answer:

The program in Python is as follows:

cents = int(input("Cent: "))

quarter = int(cents/25)

if quarter > 1:

     print(str(quarter)+" quarters")

elif quarter == 1:

     print(str(quarter)+" quarter")

cents = cents - quarter * 25

dime = int(cents/10)

if dime>1:

     print(str(dime)+" dimes")

elif dime == 1:

     print(str(dime)+" dime")

cents = cents - dime * 10

nickel = int(cents/5)

if nickel > 1:

     print(str(nickel)+" nickels")

elif nickel == 1:

     print(str(nickel)+" nickel")

penny = cents - nickel * 5

if penny > 1:

     print(str(penny)+" pennies")

elif penny == 1:

     print(str(penny)+" penny")

Explanation:

This line prompts user for input in cents

cents = int(input("Cent: "))

This line calculates the number of quarters in the input amount

quarter = int(cents/25)

This following if statement prints the calculated quarters

if quarter > 1:

     print(str(quarter)+" quarters")

elif quarter == 1:

     print(str(quarter)+" quarter")

cents = cents - quarter * 25

This line calculates the number of dime in the input amount

dime = int(cents/10)

This following if statement prints the calculated dime

if dime>1:

     print(str(dime)+" dimes")

elif dime == 1:

     print(str(dime)+" dime")

cents = cents - dime * 10

This line calculates the number of nickels in the input amount

nickel = int(cents/5)

This following if statement prints the calculated nickels

if nickel > 1:

     print(str(nickel)+" nickels")

elif nickel == 1:

     print(str(nickel)+" nickel")

This line calculates the number of pennies in the input amount

penny = cents - nickel * 5

This following if statement prints the calculated pennies

if penny > 1:

     print(str(penny)+" pennies")

elif penny == 1:

     print(str(penny)+" penny")

Which of these is NOT a desktop computer operating system?

iOS

Linux

macOS

Windows

Answers

Answer:

IOS

Explanation:

IOS is used for mobile devices

IOS is not a desktop computer operating system. The correct option is A.

What is an operating system?

A computer's operating system is a piece of software that enables users to run other programs on the system. Almost all programs are created to operate on an operating system in order to be independent of the hardware design and are not typically intended to communicate directly with the hardware.

The main function of an operating system are:

Control the central processing unit, memory, disk drives, and printers of a computer.Create a user interface to make human-computer interaction easier.Run software programs and offer related services.

Apple Inc. conceived and developed the mobile operating system known as iOS specifically for its hardware. Many of the company's mobile devices, notably the iPhone, run on this operating system.

Therefore, IOS is a mobile operating system.

To know more about an operating system follow

https://brainly.com/question/22811693

#SPJ2

What is the outside of an iPhone called?

Answers

What, what are you talking about

Sam card tray is the answer

Imagine you were using some of our pixelation tools to create an image and you posted it online for your friends to see - but, a week later you find out someone took that image and put it on a T-shirt that they’re selling for $10 each.


Now that we understand Copyright, what would need to change in order for the scenario from the warm-up to be okay?

Answers

Answer:

I will develop a CREATIVE COMMONS LICENSE

Explanation:

Based on the scenario given what i would need to change for the scenario from the warm-up to be okay is for me develop CREATIVE COMMONS LICENSE and the reason why I would develop this type of license is that it will enable people or the public to freely make use of my work or have free licence to the work that I have created by freely using it on their own products which will enables them to sell their work which have my own work on them easily and freely without any form of restrictions.

Copyright allows the creator or owner of a property (usually intellectual property) to have an absolute right over his property.

What needs to be done in this scenario is to create a creative common license.

In copyright, creative common license allows the members of the public to make use of an intellectual property for free, while the owner still retains the ownership and right, over the property.

When the creative common license is done, the seller of the T-shirt can sell the T-shirt without remitting any incentive to you; however, the seller gives you credit and recognition for the image.

Read more about copyrights at:

https://brainly.com/question/17357239

Maia wants to left align her paragraphs. Which button does she press?
o

Answers

the answer is the 2nd one because the 2nd and 4th line is moved over to the left

Answer:

It's B

Explanation:

On edge 2021

Which of the following is NOT an advantage to using inheritance?
a. Code that is shared between classes needs to be written only once.
b. Similar classes can be made to behave consistently.
c. Enhancements to a base class will automatically be applied to derived classes.
d. One big superclass can be used instead of many little classes.

Answers

Answer:

D)One big superclass can be used instead of many little classes.

Explanation:

Inheritance could be described as getting new class on another existing class with almost same execution,

inheritance allows codes to be re-used. It should be noted that inheritance bring about the code sharing among class.

The advantages of using inheritance includes but not limited to

✓ Code that is shared between classes needs to be written only once.

✓Similar classes can be made to behave consistently.

✓ Enhancements to a base class will automatically be applied to derived classes.

A major disadvantage of inheritance is that child/children classes depends on parent class, hence a change in the parent class will affect the child class, therefore option C is the correction option.

Inheritance is a type of programming concept where by a class (Child) can inheritance methods, properties of another class (Parent).

Inheritance allows us to reuse of code, one advantage of Inheritance is that the code that is already present in base class need not be rewritten in the child class.  

The different types of Inheritance are:

Single Inheritance.Multiple Inheritance.Multi-Level Inheritance.Hierarchical Inheritance.Hybrid Inheritance.

Learn more:

https://brainly.com/question/4560494

PowerPoint Presentation on What type of device will she use to display her presentation and explain it to the rest of the children in her class?
Input Device
Output Device
Processing Device
Storage Device

Answers

Answer:

Output device

Explanation:

The screen/projector puts out data (in this case the presentation) for viewers.

The answer us definitely Output Device.
Thank you

19 POINTS! What does the icon for changing the color of a cell or range look like? (Excel)


a pencil


the letter A


a paint bucket


a paintbrush

Answers

Answer:

Paintbucket

Explanation:

I got it right

Answer:

A Paint Bucket

Explanation:

Where is the video card located in a computer?

Answers

Video card??????????
pretty sure it’s in the motherboard?

Why do I have two random warnings?

Answers

Just a guess, maybe you’ve been reported for having an incorrect answer two times? I’m really not sure I’m just trying to give out possibilities. Maybe if your a Brainly Helper you haven’t been active so they are giving you warnings? Does clicking on the warning tell you the reason for them? Maybe the system thinks your a robot? I’m not sure just trying to give possible reasons, but you could try contacting customer support, but they aren’t always the quickest at responding.

Have a good day!

Answer:

bc of katie

Explanation:

identify the benefit of modeling to communicate a solution. ​

Answers

Answer:

provides a graphical design or representation of solution with symbols.

Explanation:

Communication models help identify and understand the components and relationship of the communication process being studied. Models represent new ideas and thought on various aspects of communication which helps us to plan for effective communication system.

Answer: D

Explanation:

What will be the result from running the following program? print grades print 92 print 80print total print 92+80

Answers

Answer:

Grades

92

80

Total

92 + 80

Explanation:

When utilizing quotations, you enable to code to print what wrote, as it is. So, instead of adding the 92 + 80, it's printed out.

I hope this helped!

Good luck <3

Create a datafile called superheroes.dat using any text-based editor, and enter at least three records storing superheroes’ names and main superpower. Make sure that each field in the record is separated by a space.

Answers

Answer:

Open a text-based editor like Microsoft word, notepad, libraoffice, etc, type the name of the super hero on the first field and the main power on the second field. Then click on the file menu or press ctrl-s and save file as superheroes.dat.

Explanation:

The file extension 'dat' is used to hold data for programs, for easy access. The file above holds data in fields separated by a space and has multiple records.

Which device listed below is NOT a storage device?
ROM
RAM
SSD
Removable FLASH drive

Answers

ssd is not a storage device
Answer: RAM

Explanation: RAM is the temporary memory for the motherboard. It is not used to store your favorite games, music, and documents.

Write a program that produces a Caesar cipher of a given message string. A Caesar cipher is formed by rotating each letter of a message by a given amount. For example, if your rotate by 3, every A becomes D; every B becomes E; and so on. Toward the end of the alphabet, you wrap around: X becomes A; Y becomes B; and Z becomes C. Your program should prompt for a message and an amount by which to rotate each letter and should output the encoded message.

Answers

Answer:

Here is the JAVA program that produces Caeser cipher o given message string:

import java.util.Scanner;  //to accept input from user

public class Main {  

   public static void main(String args[]) {  //start of main function

       Scanner input = new Scanner(System.in);  //creates object of Scanner

       System.out.println("Enter the message : ");  //prompts user to enter a plaintext (message)

       String message = input.nextLine();  //reads the input message

       System.out.println("Enter the amount by which by which to rotate each letter : ");  //prompts user to enter value of shift to rotate each character according to shift

       int rotate = input.nextInt();  // reads the amount to rotate from user

       String encoded_m = "";  // to store the cipher text

       char letter;  // to store the character

       for(int i=0; i < message.length();i++)  {  // iterates through the message string until the length of the message string is reached

           letter = message.charAt(i);  // method charAt() returns the character at index i in a message and stores it to letter variable

           if(letter >= 'a' && letter <= 'z')  {  //if letter is between small a and z

            letter = (char) (letter + rotate);  //shift/rotate the letter

            if(letter > 'z') {  //if letter is greater than lower case z

               letter = (char) (letter+'a'-'z'-1); }  // re-rotate to starting position  

            encoded_m = encoded_m + letter;}  //compute the cipher text by adding the letter to the the encoded message

           else if(letter >= 'A' && letter <= 'Z') {  //if letter is between capital A and Z

            letter = (char) (letter + rotate);  //shift letter

            if(letter > 'Z') {  //if letter is greater than upper case Z

                letter = (char) (letter+'A'-'Z'-1);}  // re-rotate to starting position  

            encoded_m = encoded_m + letter;}  //computes encoded message

           else {  

         encoded_m = encoded_m + letter;  } }  //computes encoded message

System.out.println("Encoded message : " + encoded_m.toUpperCase());  }} //displays the cipher text (encoded message) in upper case letters

Explanation:

The program prompts the user to enter a message. This is a plaintext. Next the program prompts the user to enter an amount by which to rotate each letter. This is basically the value of shift. Next the program has a for loop that iterates through each character of the message string. At each iteration it uses charAt() which returns the character of message string at i-th index. This character is checked by if condition which checks if the character/letter is an upper or lowercase letter. Next the statement letter = (char) (letter + rotate);   is used to shift the letter up to the value of rotate and store it in letter variable. This letter is then added to the variable encoded_m. At each iteration the same procedure is repeated. After the loop breaks, the statement     System.out.println("Encoded message : " + encoded_m.toUpperCase()); displays the entire cipher text stored in encoded_m in uppercase letters on the output screen.

The logic of the program is explained here with an example in the attached document.

In this exercise we have to use the computer language knowledge in JAVA to write the code as:

the code is in the attached image.

In a more easy way we have that the code will be:

import java.util.Scanner;

public class Main {  

  public static void main(String args[]) {

      Scanner input = new Scanner(System.in);

      System.out.println("Enter the message : ");

      String message = input.nextLine();  

      System.out.println("Enter the amount by which by which to rotate each letter : ");  

      int rotate = input.nextInt();  

      String encoded_m = "";  

     char letter;  

      for(int i=0; i < message.length();i++)  {

          letter = message.charAt(i);

          if(letter >= 'a' && letter <= 'z')  {  

           letter = (char) (letter + rotate);  

           if(letter > 'z') {  

              letter = (char) (letter+'a'-'z'-1); }

           encoded_m = encoded_m + letter;}  

          else if(letter >= 'A' && letter <= 'Z') {

           letter = (char) (letter + rotate);  

           if(letter > 'Z') {  

               letter = (char) (letter+'A'-'Z'-1);}

           encoded_m = encoded_m + letter;}  

          else {  

        encoded_m = encoded_m + letter;  } }

System.out.println("Encoded message : " + encoded_m.toUpperCase());  }}

See more about JAVA at brainly.com/question/2266606

What is the difference between an IP address and an IP Packet?

Answers

Answer:

The IP address is a numerical number assigned to a device when connected to the internet for better identification. Whereas, the IP packet is the packet which contains the total information of the content that is carried over the network from host to destination and vice versa.

Explanation:

I hope this helped and plz give brainliest!

A milk carton can hold 3.78 liters of milk. Each morning, a dairy farm ships cartons of milk to a local grocery store. The cost of producing one liter of milk and the profit of each carton of milk vary from farm to farm. Write a program that prompts the user to enter: The total amount of milk produced in the morning. The cost of producing one liter of milk. The profit on each carton of milk. The program then outputs: The number of milk cartons needed to hold milk. Round your answer to the nearest integer. The cost of producing milk. The profit for producing milk.

Answers

Answer:

milk_produced = float(input("Enter the total amount of milk produced in the morning: "))

liter_cost = float(input("Enter the cost of producing one liter of milk: "))

carton_profit = float(input("Enter the profit on each carton of milk: "))

carton_needed = round(milk_produced / 3.78)

cost = milk_produced * liter_cost

profit = carton_profit * carton_needed

print("The number of milk cartons needed to hold milk is " + str(carton_needed))

print("The cost of producing milk is " + str(cost))

print("The profit for producing milk is " + str(profit))

Explanation:

*The code is in Python.

Ask the user to enter milk_produced, liter_cost and carton_profit

Calculate the number of milk cartons needed, divide the milk_produced by the capacity (3.78) of a cartoon and round the result

Calculate the cost, multiply the milk_produced by liter_cost

Calculate the profit, multiply the carton_profit by carton_needed

Print the results

For demultiplexing a UDP socket is identified by:_____.

Answers

Answer:

1. Destination IP address

2. Destination Port number

Explanation:

Demultiplexing is a term that describes a procedure of transforming a signal that has multiple analog or digital signal flows into different initial and unconnected signals.

Hence, in this situation, the correct answer is that for the demultiplexing process, a UDP (User Datagram Protocol) socket is identified by both the destination IP address and destination port number

What are the differences between an Api Controller and "regular/view" Controller in .Net?

Answers

Answer:

An API controller in .Net is a code statement or function that returns data and a RESTful API to the application while a regular or view controller is a class that returns a view.

Explanation:

The .Net framework is a platform used for creating user-friendly and user interactive interfaces in desktop and web applications. Like all programming frameworks, it uses API and API controllers to source data and other properties.

Property Tax

Madison County collects property taxes on the assessed value of property, which is 60 percent of its actual value. For example, if a house is valued at $158,000, its assessed value is $94,800. This is the amount the homeowner pays tax on. At last year's tax rate of $2.64 for each $100 of assessedvalue, the annual property tax for this house would be $2502.72.

Write a program that asks the user to input the actual value of a piece of property and the current tax rate for each $100 of assessed value. The program should then calculate and report how much annual property tax the homeowner will be charged for this property.

Answers

Answer:

sorry i really dont know

Explanation:

Answer:

Here is the C++ program

====================================================

#include <iostream>

#include <iomanip>

using namespace std;

int main(){

const double ASSESS_VALUE_WEIGHT = 0.60;

double houseValue, assessedValue, taxRate, tax;

cout<<"Enter the actual value of property: ";

cin >> houseValue;

cout<<"Enter the current tax rate for every $100: ";

cin >> taxRate;

assessedValue = houseValue * ASSESS_VALUE_WEIGHT;

tax = assessedValue * taxRate / 100;

cout<<setprecision(2)<<fixed<<showpoint;

cout<<"Annual property tax: $ " << tax;

return 0;

}

Explanation:

What code would you use to tell if "schwifty" is of type String?
a. "schwifty".getClass().getSimpleName() == "String"
"b. schwifty".getType().equals("String")
c. "schwifty".getType() == String
d. "schwifty" instanceof String

Answers

Answer:

d. "schwifty" instanceof String

Explanation:

Given

List of options

Required

Determine which answers the question.

The syntax to check an object type in Java is:

[variable/value] instanceof [variable-type]

Comparing this syntax to the list of options;

Option d. "schwifty" instanceof String matches the syntax

Hence;

Option d answers the question

Write a Java program that prompts the user for an int n. You can assume that 1 ≤ n ≤ 9. Your program should use embedded for loops that produce the following output: 1 2 1 3 2 1 4 3 2 1 5 4 3 2 1 . . . n . . . 5 4 3 2 1 Your prompt to the user should be: Please enter a number 1...9 : Please note that your class should be named PatternTwo.

Answers

Answer:

Here is the JAVA program:

import java.util.Scanner;  // to take input from user

public class PatternTwo{   //class name

public static void main(String args[]){  //start of main function

Scanner scan = new Scanner(System.in);   // creates Scanner class object

System.out.print("Please enter a number: ");  //prompts user to enter an int n for the number of rows

int n = scan.nextInt();   //reads and scans the value of n from user

int i, j;   //declares two variables to iterate through i  rows and j columns

for (i=1; i<=n; i++){    //outer loop for rows  

for (j=2*(n-i); j>=1; j--){   //inner loop for space between numbers in pattern  

System.out.print(" ");  }   //displays an empty space in the pattern

for (j = i; j >= 1; j--)  { //inner loop for columns  

System.out.print(j+" "); }   //prints the value of j (prints numbers in reverse)

System.out.println();   }   }   }  //prints a new line after printing each row

Explanation:

The program is explained with an example in the attached document.

Which of the following Office Online apps is most effective for creating multimedia presentations?

Answers

Answer:

Powerpoint Online

Explanation:

Powerpoint is used to create presentations.

What is the purpose of application software policies?
a. They define boundaries of what applications are permitted.
b. They use a database of signatures to identify malware.
c. They take log data and convert it into different formats.
d. They serve to help educate users on how to use software more securely

Answers

Answer:

d. They serve to help educate users on how to use software more securely.

Explanation:

A software policy can be defined as a set of formally written statements that defines how a software application or program is to be used.

The purpose of application software policies is that they serve to help educate users on how to use software more securely. It must be easy to read, learn and understand by the end users.

The purpose of application software policies is that they serve to help educate users on how to use software more securely. Thus, option D is correct.

A software policy can be defined as a set of formally written statements that defines how a software application or program is to be used.

The purpose of application software policies is that they serve to help educate users on how to use software more securely. It must be easy to read, learn and understand by the end users.

Therefore, The purpose of application software policies is that they serve to help educate users on how to use software more securely.

Learn more about software on:

https://brainly.com/question/32393976

#SPJ6

What is 10X Profit Sites?

Answers

Answer:

Wow! That's amazing!

Explanation:

Naseer has inserted an image into his document but needs the image to appear on its own line.

Which option should he choose?

•Top and Bottom
•Tight
•Through
•In front of text

Answers

Answer:

Top and Bottom

Explanation:

took the test

Answer: A

Explanation:

Other Questions
Which Angel number supplementary to angel to AED ILL GIVE BRAINLIEST!! PLEASE EXPLAIN!I don't understand how an equation will help me get the slope of f(x).I need an explanation of how an equation(I mean like y = mx + b or something like that) would give me the slope! Please explain how!! Find the distance between a point (6, 9) and a horizontal line at y = 5. A) 4 B) 11 C) 15 D) 14 Cunto es (-12) - 21 = Explicacin del pq da a ese resultado, por favor. Fill in the blank - ____________ is the use of electronic instruments to monitor and physiological changes mostly regulated by the autonomic nervous system. What advantages did Eurasia trading have over the Americas? In other words, why didn'tthe Americas have as sophisticated a trading network as say the Indian Ocean trading? CAN YOU GUYS ALSO LOOK AT MY OTHER QUESTIONS I NEED HELPP\small \overrightarrow{QS} bisects \small \angle PQR. If \small m\angle PQS=5x-11 and \small m\angle RQS=3x+7, than what is \small m\angle PQR? \small m\angle PQR= 8x-4 degrees Which two regions of Georgia could BEST be characterized as "mountainous"? Who first governed the new colony of Georgia?A. King George IIB. James OglethorpeC. trusteesD. counsels Which would NOT be found in the set of rational numbers? A. 5 B. 1/2 C. -12.5 D. 1.61803398874989484820 what can we do if we work together?std 5 poem 2 team work Fill in the blanks in Spanish 10. Catorce y cinco son_____11.un vinculo es un______12.diecisiete menos siete son___14.Ella______una estudiante de Argentina.Another word for internet is ____ Petite the indicated operation 10/14 + 11/14 At what input output level will average variable cost begin to rise? What is the y-intercept of:y = x2 - 6x + 5 Can someone help pls the question in the pic (geometry) which california region does the mississippi river flow through? is your place of work a business or a non profit organization ? Please Help due tonight really need help It's a grade Joey gets an allowance of $17 per week. He wants to buy a new basketball that costs $43.67. When will Jose be able to buy the basketball if he has already saved $22.22, but also has to pay $13.45 each week for snacks and school supplies? make an equation or inequality and solve. Show your work Describe the bad timing of imposing the Stamp Act