Paragraph Styles 29. What is the best media choice for a secure network facility? 30. is the most widely used network media today due to low cost, manageability and high performance over short distances. 31. An Ethernet 100BASE-T topology is a logical and a physical 32. How many bits are in a MAC Address and how is a MAC address commonly represented? 33. The Ethernet specification is defined as IEEE 34. 121.234.52.65 is a class IP address 35. is the host portion of the address 121.234.52.65, 36.220.85.67.23 is a class IP address

Answers

Answer 1

29. The best media choice for a secure network facility is fiber optics. This is because fiber optics offers the highest data transmission rates, is more secure from outside interference, and can transmit data over longer distances.

30. Ethernet is the most widely used network media today due to its low cost, manageability and high performance over short distances.

31. An Ethernet 100BASE-T topology is a logical and physical network that consists of a twisted-pair cable and an Ethernet hub or switch.

32. A MAC Address is composed of 48 bits and is commonly represented in a hexadecimal format.

33. The Ethernet specification is defined as IEEE 802.3.

34. 121.234.52.65 is a class A IP address.

35. 65 is the host portion of the address 121.234.52.65.

36. 220.85.67.23 is a class C IP address.

Learn more about Ethernet: https://brainly.com/question/24920464

#SPJ11


Related Questions

2.7 Code Practice: Question 1

Write a program that takes three numbers as input from the user and prints the largest

Can someone please help me with this because I’ve been struggling all day

Answers

Answer:

You didn't specify the programming language

I'll answer using Python

nums = []

for i in range(1,4):

     inp = int(input("User Input: "))

     nums.append(inp)

nums.sort()

print(nums[-1])

Explanation:

I made use of list in answering this question.

Start by declaring an empty list

nums = []

Use iteration to enter the list elements

for i in range(1,4):

     inp = int(input("User Input: "))

     nums.append(inp)

Sort the list

nums.sort()

Then print the element on the last index

print(nums[-1])

The code below is in Java

It uses if-else structure to find out the largest number among three numbers given by the user.

Comments are used to explain each line of the code

//Main.java

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

    //Create a Scanner object to be able to get input

    Scanner input = new Scanner(System.in);

   

    //Declare the variables

    int number1, number2, number3, largest;

   

    //Ask the user to enter three numbers

 System.out.print("Enter the first number: ");

 number1 = input.nextInt();

 System.out.print("Enter the second number: ");

 number2 = input.nextInt();

 System.out.print("Enter the third number: ");

 number3 = input.nextInt();

 

 /*

     Check if the first number is greater than or equal to the second and third number.

     If it is, the largest is the first one.

     Otherwise, check if the second number is greater than or equal to the first and third number.

     If it is, the largest is the second one.

     If the previous conditions are not satisfied that means third is the largest one

 */

 if(number1 >= number2 && number1 >= number3)

     largest = number1;

 else if(number2 >= number1 && number2 >= number3)

     largest = number2;

 else

     largest = number3;

 

 //Print the largest number  

 System.out.println("The largest number is " + largest);

}

}

You may see a similar question in the following link:

brainly.com/question/17132559

about "How can computer help us in our life?​

Answers

Answer:

Explanation:

Computer also facilitate comfort to our life and provides convenience. For transportation, it facilitate the way people travel. Airways, Roadways and waterways uses computers to control their operation. It saves time and relieve severity of traveling difficulties.

where is the read mode button located on the word 2016 screen?

Answers

The Read Mode button in Word 2016 is typically found in the upper-right corner of the screen, near the other buttons and controls.

By clicking on the Read Mode button, the user can switch to Read Mode, which provides a more optimized reading experience by hiding various editing and formatting tools. This mode is particularly useful when reviewing and reading documents, as it minimizes distractions and allows for easier focus on the content. It is important to note that the specific location of the Read Mode button may vary slightly depending on the version and configuration of Word 2016.

You can learn more about Word 2016  at

https://brainly.com/question/23096403

#SPJ11

In order to be used as a primary key, which of these characteristics must an attribute possess with respect to a single instance of the entity? a. There must be a maximum of one attribute instance. b. There must be many instances of the attribute. c. There must be at most one entity instance that each attribute instance describes.d. There must be at least one instance of the attribute. e. There must be zero or more instances of the attribute.

Answers

A: The correct answer is option C: There must be at most one entity instance that each attribute instance describes.

What is attribute?

An attribute is a characteristic or quality that describes an object, person, or concept. It can refer to physical or psychological characteristics, such as color, size, shape, texture, behavior, personality, or mood. Attributes can also describe intangible qualities, such as intelligence, creativity, or morality. Attributes can be used to describe and differentiate between different objects, people, or ideas. In programming, an attribute is a property or value associated with a particular object or element. Attributes are used to store data and provide information about an object. For example, in HTML, attributes are used to define the structure and content of a webpage.

This means that each attribute must uniquely identify a single instance of the entity, and no two instances of the entity can have the same value for the attribute. This ensures that the attribute can be used as a primary key, as it can be used to uniquely identify each instance of the entity.

To learn more about attribute
https://brainly.com/question/30487692
#SPJ4

write a single expression that will return true if the lower four bits of x are the same as the lower four bits of y

Answers

A single expression that will return true if the lower four bits of x are the same as the lower four bits of y is; (x & 0x0F) == (y & 0x0F)

How do you write single expression programs?

There are different methods of writing programs such as python and others. However, in this case, it is pertinent to know that this compiler that will return true if the lower four bits of x are the same as the lower four bits of y doesn't accept binary constants and as such we will use hexidecimal instead. For example; for 0b00111111, we will use 0x3F.]

Thus, using that same concept above, the single expression that will return true if the lower four bits of x are the same as the lower four bits of y is; (x & 0x0F) == (y & 0x0F)

Read more about writing computer programs at: https://brainly.com/question/16397886

excel functions are prebuilt formulas within excel.

Answers

Formulas are mathematical equations that integrate cell references, excel  values, and operators to compute results. It is not necessary to write the underlying formula when using functions because they are prebuilt formulas that can be rapidly fed values.

What do Excel's functions and formulas mean?

Functions are pre-written formulas that perform calculations using specific variables, also known as inputs, in a predetermined order or structure. Functions can be used to do calculations of any complexity. The Formulas tab on the Ribbon contains the syntax for all of Excel's functions.

What is the name of the pre-written formulas in Excel?

An already written formula is a function. A function performs an operation on a value (or values), then returns a new value (or values.)

To know more about excel  visit:-

https://brainly.com/question/3441128

#SPJ4

PLEASE HELP QUICK!!

Question: 15

True or False? You can strengthen the encryption of a Caesar cipher by shifting the letters twice (using

two keys).

Answers

The encryption of a caesar cipher cannot be strengthened by shifting the letters twice( using two keys). Thus, the given statement is false.

The caesar cipher is a simple technique for encrypting messages. The caesar cipher uses a substitution scheme, shifting the letters of the alphabet by a fixed number of spaces to get the encoded alphabet. A caesar cipher with shift 1 encodes A to B, M to N, Z to A, and so on. It is possible to make a caesar cipher more secure, but shifting the letters twice (using two keys) does not provide such strong encryption in caesar cipher.

That is why the given statement is false.

You can learn more about caesar cipher at

https://brainly.com/question/14754515

#SPJ4

1. Run the following regression log(wage) = β0+β1female+β2married+u Please interpret βˆ 1 and βˆ 2.

Make a code for Stata.

2. Run a new regression log(wage) = c0 + c1female + c2married + c3married*female + u.

Make a code for Stata.

Answers

The first regression helps determine the relationship between gender and wages while controlling for marital status.

1. Regression: log(wage) = β0 + β1female + β2married + u

```

regress log(wage) female married

```

2. Regression: log(wage) = c0 + c1female + c2married + c3married*female + u

```

regress log(wage) female married married#female

```

1. In the first regression, βˆ1 represents the estimated coefficient for the variable "female." It indicates the average difference in the natural logarithm of wage between females and males, holding all other variables constant. A positive βˆ1 suggests that, on average, females earn higher wages than males when other factors are controlled for. A negative βˆ1 indicates the opposite.

2. In the second regression, c3 represents the estimated coefficient for the interaction term "married*female." It captures the additional effect on the natural logarithm of wage when a person is both married and female. If c3 is positive and statistically significant, it suggests that being both married and female has a positive impact on wages beyond what can be explained by the main effects of being married or female individually.

The first regression helps determine the relationship between gender and wages while controlling for marital status. The second regression further investigates the combined effect of being married and female on wages. By estimating these coefficients, we can better understand the impact of gender and marital status on log(wage) and gain insights into potential wage disparities based on these factors.

To know more about regression follow the link:

https://brainly.com/question/13266116

#SPJ11

Company B is setting up commercial printing services on their network. Which of these are advantages of centrally managed commercial printers? Check all that apply.

Answers

Answer:

Centralized management of printing activities, allowing administrators to manage all print devices using a network.

Explanation:

The advantages of centrally managed commercial printers are:

Printers can be easily created and deployed in virtual sessions such as Citrix or VMwareCentralized management of printing activities, allowing administrators to manage all print devices using a network.Reduces the number of printer related issues thereby increasing productivity.It provides a way of keeping record those who are printing and what have been printerAll print related jobs can be easily managed from a central controlled network.Increased security as a print server allows you to total control over who can print what and where High availability and redundancy due to pooling of printers Easily customize printer profile

What does the term catfish mean when dealing with the internet.

Answers

Answer:

i would say someone pretending to be someone they are not

Explanation:

Is there such thing as free will

Answers

Answer:

Yes there is but it's rare cause everywhere we go we're tied down from some rules cause they help society function better

Answer:

there is but only to a certain extent

Explanation:

for example you are free to garden and take care of your home or not, until it eventually becomes a problem for other people and you are required to do so, at that point it is no longer free will but you free to do something before then

Which laptop has the larger non volatile storage capacity

Answers

There are many laptops available with different specifications and storage options. However, some of the laptops with larger non-volatile storage capacity include:

1. MacBook Pro (16-inch): This laptop offers storage options ranging from 512GB to 8TB.

2. Dell XPS 15: This laptop offers storage options ranging from 256GB to 2TB.

3. HP Spectre x360: This laptop offers storage options ranging from 256GB to 2TB.

4. ASUS ROG Zephyrus G14: This laptop offers storage options ranging from 512GB to 1TB.

5. Acer Aspire 5: This laptop offers storage options ranging from 256GB to 1TB.

It is important to note that the storage capacity of a laptop depends on the model and can vary.

What is the differences between Google Slides and MS Powerpoint?

Answers

\(\huge\underline\mathbb\pink{ANSWER↑}\\\\\)

HOPE IT HELPS

PLEASE MARK ME BRAINLIEST ☺️

What is the differences between Google Slides and MS Powerpoint?
What is the differences between Google Slides and MS Powerpoint?
What is the differences between Google Slides and MS Powerpoint?
What is the differences between Google Slides and MS Powerpoint?
What is the differences between Google Slides and MS Powerpoint?

Three popular types of ____ are handheld computers, PDAs, smart phones.

Answers

Answer:

portable media players, and digital cameras

Explanation:

Three popular types of mobile devices are handheld computers, PDAs, and smart phones.

What are smart phones?

Smart phones can be defined as hybrid versions of mobile devices that are designed and developed to have more features, so as to enable them run different applications, functions and tasks with the aid of software applications such as web browsers, multimedia player, etc.

In Computer technology, three popular types of mobile devices are handheld computers, PDAs, and smart phones.

Read more on smart phones here: https://brainly.com/question/15867542

#SPJ2

what piece of software contains precise instructions on how to make the hardware perform a function as requested by the operating system?

Answers

The software known as device drivers provides detailed instructions on how to get devices to carry out tasks as specified by the operating system.

What is software and examples?

Software concept or even applications In this application, "code" refers to the programs, tools, and scripts that are now directing on a system. This can be compared here to modifiable part of a laptop, whereas the hardware is always present. The two main classifications of software are application software and system software.

Why do we use software?

We use software because Software may make your organization run more effectively in addition to enabling your computer hardware to execute crucial functions. With the appropriate methods, even novel working techniques may be created.

To know more about Software visit :

https://brainly.com/question/1022352

#SPJ4

Sean is a lineman who is always on call to travel whenever there is a natural disaster. He has recently been called to help repair downed power lines for those who have been affected by a hurricane. What Energy cluster pathway does Sean work in? Environmental Resources Energy and Power Technology Telecommunications Plant Systems

Answers

Answer:

Energy and Power Technology

Explanation:

Energy and Power Technology is a field in engineering that typically deals with generation, transmission and distribution of electric energy to the end users. This energy are usually transmitted and distributed through the use of overhead cables running from the point of generation to the location of the end users.

Natural disasters such as hurricane, tornadoes, earthquake, etc., are capable of destroying the power lines (cables) as they are usually hung on poles.

In this scenario, Sean is a lineman who is always on call to travel whenever there is a natural disaster. He has recently been called to help repair downed power lines for those who have been affected by a hurricane. Therefore, the Energy cluster pathway that Sean works in is Energy and Power Technology.

Your neighbor tells you that they don't have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?

Answers

What is the output of the following line of code? print (“I\tLove Python”)

Answers

Answer: it will print:

I (4 spaces) Love Python

Explanation: the \t adds in a tab (4spaces) in a print statement

What is the output of the following line of code? print (I\tLove Python)
What is the output of the following line of code? print (I\tLove Python)

This question has two parts : 1. List two conditions required for price discrimination to take place. No need to explain, just list two conditions separtely. 2. How do income effect influence work hours when wage increases? Be specific and write your answer in one line or maximum two lines.

Answers

Keep in mind that rapid prototyping is a process that uses the original design to create a model of a part or a product. 3D printing is the common name for rapid prototyping.

Accounting's Business Entity Assumption is a business entity assumption. It is a term used to allude to proclaiming the detachment of each and every monetary record of the business from any of the monetary records of its proprietors or that of different organizations.

At the end of the day, we accept that the business has its own character which is unique in relation to that of the proprietor or different organizations.

Learn more about Accounting Principle on:

brainly.com/question/17095465

#SPJ4

Question #5
Multiple Choice
What is used within an HTML tag for additional information?
O attribute
O anchor
O hyperlink
metadata

Answers

Answer: Attribute

Explanation: Attribute is used in HTML tags for additional information. Correct on Edg 2021.

Answer: attribute

Edge '23

How do display a shortcut menu for the main document area

Answers

A shortcut menu for the main document area can be displayed by right-clicking on the main document area. Right-clicking will open a context menu that contains a list of options that are relevant to the current context.

These options can include commands such as cut, copy, paste, and select all, as well as other options that are specific to the application or document you are working with.

Alternatively, some applications or operating systems allow you to display a shortcut menu by using keyboard shortcuts, such as the "Shift + F10" key combination, which can trigger the same context menu as right-clicking.

It is worth noting that the options available on the shortcut menu will vary depending on the application or document you are working with, and the specific context of the document area you right-click on.

Learn more about shortcut, here https://brainly.com/question/11484367

#SPJ4

Software is glving Instructions so that text is displayed on the monitor. This software is an example of
application software
programming software
system software
programming language

Answers

Answer:

System software

Explanation:

Because it shows what you have typed into the computer

Answer:

programming software

Explanation:

because programming software well show in text what you need to do

What action(s) from the CRUD method should be used to describe the required data usage in the case of the function name is "Take delivery of a new goods" for the entity types: GOODS and DELIVERY?

Answers

The CREATE and UPDATE actions from the CRUD method should be used to describe the required data usage in the case of the function name "Take delivery of new goods" for the entity types GOODS and DELIVERY.

This is because CREATE is the action used for generating and inserting data into the database, whereas UPDATE is used for changing the existing data. A CRUD (Create, Read, Update, and Delete) is an acronym for database operations to enable the storage and management of data.

It is a standard and widely recognized method of performing database operations. The CREATE action involves adding a new item to the database, which is what happens when a new delivery of goods arrives. This operation stores new data in the database to allow the records to be retrieved when required. Similarly, the UPDATE operation allows the records in the database to be updated if new information becomes available or data errors occur. Therefore, the CREATE and UPDATE actions from the CRUD method should be used to describe the required data usage in the case of the function name "Take delivery of new goods" for the entity types GOODS and DELIVERY.

To know more about data visit:

https://brainly.com/question/28285882

#SPJ11

______ cards contain a chip that can store a large amount of information as well as on a magnetic. ______ cards contain a chip that can store a large amount of information as well as on a magnetic stripe for backward compatibility


A. smart


B. purchasing


C. store- value money


D. electronic credit

Answers

Answer:

A. Smart card

Explanation:

Smart cards contain a chip that can store a large amount of information as well as on a magnetic stripe for backward compatibility.

Smart card are cards made of plastic or metal material that has an embedded integrated chip that acts as a security token. Smart cards are the same size as a debit or credit card.

They connect to a reader either by a chip (microcontroller or an embedded memory chip) or through a short-range wireless connectivity standard such as radio-frequency identification or near-field communication.

It can be used to perform various functions though most commonly are used for credit cards and other payment cards.

Design an experimental method of your choice. 1. Choose a research question 2. Turn it into a hypothesis 3. Identify your dependent and independent variables 4. Name your population 5. Explain how you would choose your sample 6. Describe how you would use an experimental and a control group

Answers

The designed experiment is given below:

Research question: Does drinking green tea improve memory?Hypothesis: Drinking green tea improves memory performance.Independent variable: Drinking green teaDependent variable: Memory performancePopulation: Adults aged 18-65Sample: A random sample of 100 adults aged 18-65 would be selected from the population.What is the rationale for the above response?

Experimental and control groups: Participants would be randomly assigned to either the experimental group or the control group. The experimental group would drink three cups of green tea daily for 4 weeks, while the control group would drink a placebo tea with no active ingredients.

Both groups would take a memory test before and after the 4-week period. The memory test would consist of recalling a list of 20 words after 10 minutes. The mean number of words recalled by each group would be compared using a t-test to determine if there is a significant difference in memory performance between the two groups.

Learn more about experiments at:

https://brainly.com/question/30055326

#SPJ1

I need helppp :((((((((

I need helppp :((((((((

Answers

We have to paint n boards of length {A1, A2…An}.There are k painters available and each takes 1 unit of time to paint 1 unit of the board.

How to solve the problem?

The problem is to find the minimum time to get

this job was done under the constraints that any painter will only paint continuous sections of boards, say board {2, 3, 4} or only board {1} or nothing but not board {2, 4, 5}.

Examples:

Input : k = 2, A = {10, 10, 10, 10}

Output : 20

Explanation: Here we can divide the boards into 2 equal sized partitions, so each painter gets 20 units of board and the total time taken is 20.

Input : k = 2, A = {10, 20, 30, 40}

Output : 60

Following is the implementation of the above recursive equation:

// CPP program for The painter's partition problem

#include <climates>

#include <iostream>

using namespace std;

// function to calculate sum between two indices

// in array

int sum(int err[], int from, int to)

{

  int total = 0;

  for (int i = from; I <= to; i++)

      total += err[i];

  return total;

}

// for n boards and k partitions

int partition(int err[], int n, int k)

{

// base cases  

  if (k == 1) // one partition

      return sum(err, 0, n - 1);  

  if (n == 1)  // one board

      return err[0];

   int best = INT_MAX;

   // find minimum of all possible maximum

  // k-1 partitions to the left of err[i],

  // with I elements, put k-1 the divider

  // between err[i-1] & arr[i] to get k-th

  // partition

  for (int i = 1; I <= n; i++)

      best = min(best, max(partition(err, I, k - 1),

                              sum(err, i, n - 1)));

return best;

}

int main()

{

  int err[] = { 10, 20, 60, 50, 30, 40 };

  int n = size(err) / sizeof(arr[0]);

  int k = 3;

  coot << partition(err, n, k) << enol;

  return 0;

}

Output

90

To learn more about paint refers to;

https://brainly.com/question/28177824

#SPJ1

what is the process where a computer starts up and automatically loads the operating system​

Answers

Answer:

What is Booting

Explanation:

The process of bringing up the operating system is called booting (originally this was bootstrapping and alluded to the process of pulling yourself up "by your bootstraps"). Your computer knows how to boot because instructions for booting are built into one of its chips, the BIOS (or Basic Input/Output System) chip.

Did this help?

Brainly, thank you, rating are all very much appreciated!

Smile ; ) - Miss Hawaii

Explanation:

The process of loading the operating system into memory is called bootstrapping, or booting the system.

Richard has recently updated the antivirus software on his tablet. While browsing through some music websites, he receives a pop-up mentioning that his tablet is under threat and many viruses are present on the system. The pop-up urges Richard to download freeware to protect his tablet from damage. What problem is Richard facing in this scenario? A. Richard is being asked to download the optimal configuration for his system. B. Richard is being asked to download updates for his system. C. Richard is being asked to download fake antivirus software. D. Richard is being asked to download a free music application.

Answers

Answer:

The Answer is C  

Explanation:

Will MARK BRAINLIEST TO WHOEVER GETS THIS CORRECT, PLS HELP!! PLS WRITE CODE IN PYTHON. CHECK THE IMAGE I PUT THERE.

Will MARK BRAINLIEST TO WHOEVER GETS THIS CORRECT, PLS HELP!! PLS WRITE CODE IN PYTHON. CHECK THE IMAGE

Answers

Answer:

def findLastBinary(s):

 binaryString = ""

 for c in s:

   binaryString += bin(ord(c))[2:].zfill(8)

 n = 0

 while(bin(n)[2:] in binaryString):

     n = n + 1

 return n-1

s = input("Enter a string: ")

n = findLastBinary(s)

print("The highest binary string found is", bin(n)[2:])

Explanation:

bin(n) converts an integer to binary

the [2:] index is to skip the "0b" prefix that is otherwise prepended.

zfill(8) left fills the ASCII number with zeros

a security incident is currently occurring on the company network. you discover that the attack involves a computer system that is attached to the network. you're unsure what kind of damage is being done to the network systems or data. which of the following actions should you take first?

Answers

The action you should take first is, stop the attack and contain the damage by disconnecting the system from the network. Correct answer: letter A.

This will prevent the attack from spreading and will limit the damage to the affected system. After that, you should assess the situation to determine the extent of the damage and the threat posed by the attack.

Preventing and Containing Cyber Attacks

In recent years, cyber attacks have become increasingly common. As technology advances, more and more malicious actors are finding ways to exploit vulnerabilities in computer systems, resulting in data breaches, financial losses, and other serious consequences. As such, it is essential to understand how to prevent and contain cyber attacks in order to protect your data and systems.

The first step in preventing and containing cyber attacks is to be aware of the potential threats. Companies should have a clear understanding of what kind of threats they may face, and they should have a plan in place to respond to these threats. This plan should include:

Regular system updates.Patching any vulnerabilities.Training staff to recognize and respond to potential threats.

Learn more about the Cyber Attacks:

https://brainly.com/question/7065536

#SPJ4

Other Questions
The period of a wave is directly proportional to the wavelength of the wave. True or False A pyramid is being built with cubes, as shown. On the top layer is one cube. Under that is a layer of 4 cubes arranged in a square. The third layer has 9 cubes arranged in a square. If this pattern continues indefinitely, What gauge pressure must a pump produce to pump water from the bottom of Grand Canyon (elevation 730 m) to Indian Gardens (elevation 1370 m)? Express your results in pascals and in atmospheres. Assignment 1: Investment OptionsIn this assignment, you will be assessed based on the following Course Outcome:MT480-4: Assess investment options based upon cost of capital and expected returns.Introduction: The assignment requires the application of the net present value (NPV) model to assess investment options given cost of capital, commonly referred to as discount rates, and required rates of returns. You will explain the role of a discount rate in evaluating the NPV model and compare investment options as cost of capital increases or decreases. The use of a financial calculator and/or Excel will be required in this assignment.Read the scenario and address all of the checklist items below.Scenario: A new product manager presents to you, the chief financial officer, a proposal to expand operations that includes the purchase of a new machine. The product manager is certain that the positive cash flows, which exceed the initial outlay by $20,000 by the end of Year 4, will bring both praise and approval. You explain the company uses a 12% discount rate for cash flows and project-related budgeting. You take the time to present the details of the net present value (NPV) model used to assess product proposals. The data is below.Project Outflows to Buy MachineDay 1 Cash Out -$70,000 12% discount rate applied.End Year 1 Cash Repayment $10,000End Year 2 Cash Repayment $20,000End Year 3 Cash Repayment $30,000End Year 4 Cash Repayment $30,000To educate the new manager, and as CFO, you take the time to evaluate the following:Checklist:Evaluate how the time value of money concept results in a discounted cash flow in Year 4 (an amount less than $30,000).Assess the investment option using a 12% cost of capital discount rate by applying the NPV model. Provide the NPV at a 12% cost of capital discount rate. Include values in your assessment.Assess the investment option when a 7% cost of capital discount rate, versus a 12% cost of capital discount rate, is applied. Provide the NPV at a 7% cost of capital discount rate. Include values in your assessment.Directions for Submitting Your AssignmentSubmit a 2- to 3-page paper with an additional title page in APA format. Please label your assignment as "Unit 9 Assignment 1 - your name" and submit it to the Unit 9 Assignment 1 Dropbox. Can you please help me figure out this question Which of the following in an accurate comparison of the two court cases? (4 points)Engel v. Vitale (1962)Wisconsin v. Yoder (1972)(A)Ruled school-sponsored prayer did not violate establishment clauseRuled parents' religious freedom to remove children from school violated establishment clause(B)Ruled school-sponsored prayer in schools is unconstitutionalRuled parents can remove children from school for religious reason(C)Ruled school-sponsored prayer violates free exercise clauseRuled parents' religious freedom to keep their children out of school violates the free exercise clause(D)Ruled in favor of school-sponsored prayerRuled against parents' religious freedom 1. Create a blank form in Design View, and then make the following updates:a. Add the Location ID, LocationName, Address, City, State, ZipCode, and Phone fields (in that order) from the tblLocation table to Detail section of the form.b. Reposition the controls to the approximate location shown in Figure (Hint: The left edge of the text box controls should be at the 2" mark on the horizontal ruler.)c. Select the LocationName and Address text box controls (but not the labels) and resize them to match Figure 2. (Hint: The right edge of the controls should be at approximately the 4" mark on the horizontal ruler.)d. In the form header, add the title Locations and Trainers, and then change the font to Arial.Save the form with the name frmLocationsAndTrainers, but do not close the form. Identify and provide the name of the computer-assisted respiration system: 1 CO2 pom Temperature One of the most extreme democratic reforms in the Progressive Era was the popular election of U.S. _______________, which was established by a constitutional amendment ratified in 1913.Senators Use a graphing calculator to find the least squares regression equation. Authorities have the choice of using fiscal or monetary policy to stimulate the economy during recessions. Show, using the IS-LM-BP model, how the exchange rate regime can be animportant factor in the effectiveness of these policies. Which of the following relationship factors is most important in predicting marital success?A. problem-solving skillsB. the absence of conflictC. assertivenessD. emotional environment Algebraic Models 1. Simplify the following as a single power, and evaluate. Show your work for full marks. (3 marks) 1 643 X 4 The Agricultural Revolution helped spark the Industrial Revolution by:A -restoring common property and eliminating tenant farming.B- eliminating private property and forcing every family to produce its own food.C-decreasing the amount of food produced and increasing the number of workers.D-increasing the amount of food produced and decreasing the number of farmworkers. SADC and WTO are key players in the global environmentTrueFalse Limited and general are the two traditional subcategories of which of the following business entities?a. Partnershipb. Limited liability companyc. Corporationd. Sole proprietorship A ski jumper starts from rest 45.0 m above the ground on a frictionless track and flies off the track at an angle of 45.0 above the horizontal and at a height of 15.0 m above the ground. Neglect air resistance.(a) What is her speed when she leaves the track? m/s(b) What is the maximum altitude she attains after leaving the track? m(c) Where does she land relative to the end of the track? m Which statement is supported by the MacArthur-Wilson model simulation?a. Only large islands or islands close to the mainland reach equilibrium between colonization and extinction rates.b. With time, colonization rates go up and extinction rates go down, leading to an equilibrium characterized by no net change in species richness.c. Eventually, no matter the size of an island or its distance from the mainland, the rates of colonization and extinction of species reach zero.e. Species diversity depends on the rates of colonization and extinction, which depend on the size and location of an island. january5,000$ 2,900 february4,0002,500 march7,0003,200 april8,0003,400 may3,0002,100 june9,0004,000 july6,0003,100 august2,0001,900 knowledge check 01 using the high-low method, what is the variable cost? multiple choice $2 per direct-labor hour. $2.31 per direct-labor hour. $0.30 per direct-labor hour. $3.33 per direct-labor hour. which of the following statements about government bureaus are true? check all that apply. many government bureaus provide services for which there is no competition. a government bureau does not maximize profit. there are stockholders in a government bureau.