question 3 which layer in the transmission control protocol/internet protocol (tcp/ip) model does ip use?

Answers

Answer 1

Network Layer. For the network, this layer, also referred to as the network layer, accepts and sends packets. These protocols include the robust Internet protocol (IP), the Address Resolution Protocol (ARP), and the Internet Control Message Protocol (ICMP).

What layer of the TCP/IP paradigm does the transport layer belong to?

Layer 4: The Transport Layer, which TCP/IP depends on to efficiently manage communications between two hosts. The transport layer creates this connection whenever an IP communication session has to start or stop.

In the TCP/IP model, what is Layer 3?

Data segments are transmitted between networks using packets at Layer 3 (Network). This layer gives the data segments source and destination IP addresses when you message a friend.

To know more about Network Layer visit :-

https://brainly.com/question/14715896

#SPJ4


Related Questions

Which of the following viruses is designed to infect multiple file types in an effort to fool the antivirus software that is looking for itstealth virusCovidHIV

Answers

Answer:

Functions are "self-contained" modules of code that accomplish a specific task. Functions usually "take in" data, process it, and "return" a result. Once a function is written, it can be used over and over and over again. Functions can be "called" from the inside of other functions.

Explanation:

which among the following is not an evaluation criteria for raid technology? select one: a. capacity b. n disks c. performance d. reliability

Answers

A technique for mirroring or striping data across numerous low-end disk drives; this improves mean time between failures, throughput, and error correction by copying data across multiple drives.

RAID (redundant array of independent disks) is a technique for protecting data in the event of a drive failure by storing the same data in several locations on numerous hard disks or solid-state drives (SSDs). However, there are several RAID levels, and not all of them aim to provide redundancy. Redundant Array of Inexpensive Disks, or RAID, is an acronym. If used literally, it refers to storing data on a number of relatively inexpensive hard disk drives (HDDs). Most people refer to it as "Technology that merges a number of such cheap HDDs.

Learn more about array here-

https://brainly.com/question/19570024

#SPJ4

what can you do with the data that you import from an excel workbook into access? select all the options that apply. a. import the data into a new table. b. link to the workbook by creating a linked table. c. import the data into a new report. d. append the data to an existing table.

Answers

Click Open after selecting that OlympicMedals.accdb file you downloaded. All tables discovered in the database are displayed in the Select Table window that follows.

What distinguishes a workbook from a worksheet?

Created in Excel, a workbooks is a spreadsheets program file. Two or more worksheets can be found in a workbook. Cells in a worksheet (sometimes referred to as a spreadsheet) can be used to enter and compute data. Columns and rows have been used to arrange the cells.

The Excel workbook is where?

You can open a workbooks within the Excel program, or you can select a workbooks on your computer and then double it to open it. On the File tab, click. Click Open. To rapidly see the Open tab in the Backstage view, press Ctrl + O.

To know more about workbook visit:

https://brainly.com/question/16845506

#SPJ4

Analyze the similarities and differences between preventing phishing and preventing spyware attacks.

Answers

Both phishing and pharming have something to do with the domain name system (DNS), or the system that connects web browsers to websites

What is phishing and spyware?Phishing is an information-gathering technique rather than software. Malware may be used in this procedure, of course, but the term "phishing" refers to the real attempt to obtain information from a person. Emails providing links to malicious websites are frequently used in phishing scams.An email phishing scam is used to deceive the user. The email either contains a Trojan seed or a link to download spyware or a Trojan. As soon as it notices a user accessing the target page, the Trojan/spyware watches, records, and reports the user's activities and sends login information or other sensitive information to the malicious user.

To learn more about  phishing and spyware refers to:

brainly.com/question/2415654

#SPJ4

Structured databases work well, but why is it sometimes a better choice to store data in unstructured and semi-structured databases?

Answers

Powerpoint presentations, text files, Word documents, and other types of data can sometimes be kept more flexibly without having to adhere to the strict formatting requirements of a structured database.

What exactly is structured data?

Machine learning algorithms can quickly understand structured data since it is well-organized and often falls under the category of quantitative data. Structured query language (SQL), created by IBM in 1974, is the programming language used to manage structured data. Machine language can quickly comprehend and is well-organized in structured data.

What are databases that are structured and unstructured?

Unstructured data is an amalgam of many different forms of data that are stored in their native formats, whereas structured data is very specialized and is saved in a preset format. So, structured data benefits from schema-on-write, whereas unstructured data benefits from schema-on-read.

Learn more about Structured databases

brainly.com/question/1160209

#SPJ4

chloe notices that when she inserts a tab character, her insertion point moves to the right side of the page and the text she enters is right-justified. she does not want tab characters to behave this way. she should do which of the following? a. change the paragraph spacing. b. change the paragraph justification. c. remove the paragraph. d. remove the tab stop.

Answers

Option d: When Chloe adds a tab character, the insertion point shifts to the right side of the page. She doesn't want the tab characters acting in this manner. She needs to take the tab stop off.

To align text in a word processor by dragging the cursor to a predetermined point, use the tab key. The tab key or options in the word processor are typically used to complete it. It is a function of the paragraph formatting capability. Tabs are used for indenting text and for distributing it between the margins uniformly.

Typically, five normal spaces are equivalent to one tab. The tab can also refer to a horizontal tab. The word processor's tab key, the tab dialogue box, or the word processor's markup tools can all be used to access the tab capability. The tab key is used to activate the tab functionality, which causes the pointer to shift to the right.

Learn more about tab here:

https://brainly.com/question/29480805

#SPJ4

change photoshop to automatically save recovery information every 15 minutes.

Answers

Step 1: Launch Photoshop and navigate to the Edit menu on the toolbar. Step 2: Select Preferences and then General from the Edit menu. Step 3: Select Autosave recovery time from the File management tab. You may change the Autosave time to 5 minutes, 10 minutes, or anything you like.

What is photoshop?

Photoshop is the industry standard picture editing program, and it is used for anything from minor retouching to mind-bending photo art. Editors use Photoshop to crop images, improve photo composition, fix lighting, and make every subject appear its best. Photoshop has several functions, the most important of which are picture editing, graphic design, website creation, and image compositing. Photoshop is also used to create presentations, logos, and digital art.

Here,

Step 1: Open Photoshop and select the Edit menu from the toolbar. Step 2: From the Edit menu, select Preferences and then General. Step 3: Navigate to the File handling tab and choose Autosave recovery time. You may set the Autosave time to 5 minutes, 10 minutes, or anything you like.

To know more about photoshop,

https://brainly.com/question/14843543

#SPJ4

what is the best way to include questions for your instructor in your emails?multiple choice question.write them out in the subject line.put them in a numbered list.add them as an attachment.write them each in a separate paragraph.

Answers

What qualities make a subject line for an email to a teacher effective. Be straightforward, concise, and specific. Just use one or two sentences in the subject line.

What information should your include in your email to your professor?

The course number and section number should both be included. closing and salutation.

How do you format a professor's email subject?

Insert the course number or description of the class you are completing with the instructor in the opening sentence of the email. information in the email's subject line (or one of the opening lines). They won't have to waste years searching for it that way.

To know more about emails visit:

https://brainly.com/question/14380317

#SPJ4

A cybersecurity analyst has access to several threat feeds and wants to organize them while simultaneously comparing intelligence against network traffic.
Which of the following would BEST accomplish this goal?
A. Continuous integration and deployment
B. Automation and orchestration
C. Static and dynamic analysis
D. Information sharing and analysis

Answers

Automation and orchestration would be to BEST accomplish this goal for  cybersecurity analyst. Thus, option B is correct.

What are cybersecurity analyst?

Computer networks are shielded from hacker attacks and unauthorised access by cybersecurity analysts. They achieve this by attempting to foresee and defend against cyber threats and by responding to security breaches when they do occur. You are responsible for protecting the crucial data of your company in this position.

Protecting the hardware, software, and networks of your business from loss, theft, or unauthorised access is one of your responsibilities as a cybersecurity analyst. You might anticipate performing a variety of cybersecurity tasks at a small business or organisation.

You might specialise as a member of a bigger security team at larger organisations. Cybersecurity analysts need to be familiar with both their company's IT infrastructure and the most recent cyber threat landscape.

Learn more about cybersecurity analyst

https://brainly.com/question/28463999

#SPJ4

how do the difference in polyatomin ios so4 and so3 help to determine whether each ends in the -ite or -ate

Answers

When an element splits into two polyatomin  oxyanions, the one with less oxygen is called oxyite and the one with more oxygen is called oxyate.

What does a polyatomic ion or an ITE mean?

Only polyatomic anions containing oxygen are allowed to have an ending (suffix), and only when the polyatomic ion is present in the following.... Remember that -ate polyatomic ions contain one more oxygen than -ite polyatomic ions, which only have the polyatomic anion, in order to tell them apart from one another.

What distinguishes acids ending in ous from acids ending in IC?

B. Identify the polyatomic anion's name if the acid contains an oxygen atom. If the anion's last component is "-ite," the suffix "-ous" is utilized.

To know more about polyatomin  visit:-

https://brainly.com/question/25055220

#SPJ4

define a setter function named wonaward() that takes a parameter for the name of an award and pushes the award name onto the end of the awards array.

Answers

A a setter function named wonaward() that takes a parameter onto the end of the awards array will be:

function wonAward(awardName){

 awards.push(awardName);

}

What is array?
An array is a data structure that stores a collection of items in a specific order. It is one of the most fundamental data structures in the programming field and is widely used to organize and store data. Arrays can store any type of data such as numbers, strings, objects, or even other arrays. The data elements in an array are accessed by a numerical index which starts from 0 and moves up sequentially. To create an array, you need to specify the data type and a size of the array. The size of an array is fixed and it cannot be changed. Arrays are useful for many types of data manipulation and are often used to store large groups of data in an organized and efficient manner.

To learn more about array
https://brainly.com/question/30019790

#SPJ4

The form and keying style that a typist uses while operating the keyboard is called?

Answers

move forward as well as back as each key is struck. b. move from side - to - side because each code is struck

What is a keying style?

the manner in which a typist uses the keyboard when using it. Touch technique. To the right of a monitor and keyboard, to key using touch rather than the hunt-and-peck approach. Use short, sharp strokes for the right typing technique. In order to type correctly, one must stand somewhat straight ahead of the keyboard.

Your fingertips rest on the keys in the middle row, often known as the home row, of the computer keyboard when you aren't typing. For instance, the first row keys for your left hand on the common QWERTY American keyboard are A,S,D &F

To learn more about keying style refers to:

brainly.com/question/23245311

#SPJ4

What is the binary code for line 6? *
1 point
A
O 0111111111110
O 100000000001
O 0101000101010

helppp

Answers

Answer:

1st answer

Explanation:

black 1

white 0

redistribution programs are means-tested. to qualify for such a program, a person must demonstrate that:

Answers

A means-tested program is one for which the recipient qualifies based on income, so option C is right.

The process of determining who qualifies for financial assistance to get a good or service, such as welfare payments, is known as a means test. The ability to pay for a particular service or item is the first factor taken into account when determining a person's eligibility for financial assistance. Means-tested programs only enable individuals and families with incomes and/or assets below a certain cutoff to participate. When you require care services, the government will determine your subsidies based on your financial situation. Patients from lower-income families are guaranteed to receive more financial assistance than those from higher-income families.

Learn more about Means-tested program here:

https://brainly.com/question/29990876

#SPJ4

magine a customer has downloaded an app made by their local hardware store. how could that business connect with their audience through the app?

Answers

The business could connect with their audience through the app by providing helpful tips and advice on DIY projects, notifications about store sales and promotions, and notifications about new products and services.

What is business?

Business is an activity or organization that is involved in the production, distribution, and exchange of goods and services for profit. Business is essentially a commercial organization that provides goods or services to consumers in exchange for money. Businesses can range from small sole-proprietorships to large corporations. Businesses are typically established to provide goods or services to a broad customer base, and they can be either publicly traded or privately owned.

They could also provide links to their website, blog, or social media pages to deepen the connection with their customers. Additionally, they could create a rewards system within the app that rewards customers for their loyalty.

To learn more about business
https://brainly.com/question/14688347
#SPJ4

you have an azure virtual machine named vm1 that automatically registers in an azure private dns zone named contoso. vm1 hosts a website named site1. you need to ensure that site1 can be resolved by using a url of http://www.contoso. the solution must ensure that if the ip address of vm1 changes, www.contoso will resolve to the changed ip address. which dns record type should you add to contoso?

Answers

Note that you should add an A record type to the Contoso Azure Private DNS zone to guarantee that site1 may be reached using a URL of http://www.contoso and that www.contoso will resolve to the modified IP address of vm1 if it changes.

The A record type converts a hostname (for example, "www") to an IP address. If vm1's IP address changes, the A record will be updated with the new IP address, allowing users to visit the website using the same URL (http://www.contoso).

What is Azure Private DNS Zone?

Azure Private DNS offers a dependable and secure DNS service for managing and resolving domain names in a virtual network without the requirement for a proprietary DNS solution. You may utilize your own unique domain names instead of the Azure-provided domains available today by employing private DNS zones.

You may use your own custom domain name instead of the Azure-provided names during deployment by using private DNS zones. Using a custom domain name allows you to design your virtual network architecture to best meet the demands of your company.

Learn more about Azure:
https://brainly.com/question/29428049
#SPJ1

an explicit call to the superclass constructor using super() must be provided as the first statement in the subclass constructor. group of answer choices true false

Answers

True an explicit call to the superclass constructor using super() must be provided as the first statement in the subclass constructor.

A subclass may have its own constructors in addition to its own private data members.Only the instance variables of the subclass can be initialized by the constructors. As a result, whenever an object of a subclass is created, an object of the superclass' constructor must likewise be called automatically.The super keyword is used to call a constructor for a superclass.to invoke a superclass function that the subclass has overridden.If both the superclass and the subclass have attributes with the same name, to access the superclass's attributes (fields).to specifically invoke the parameterized or no-arg constructor of the superclass from the subclass constructor.

Learn more about  subclass constructor here:

https://brainly.com/question/12997980

#SPJ4

given list: ( 7, 11, 21, 23, 31, 55, 64, 70 )which list elements will be compared to key 11 using binary search? enter elements in the order checked.

Answers

The elements that will be compared to the key 11 using binary search are 7, 21, 23, and 31.

What is binary search?

Binary search is a search algorithm that is used to locate an item in a sorted array. It works by repeatedly dividing the search interval in half until the value is found. The algorithm begins by comparing the middle element of the array with the target value. If the target value matches the middle element, its position in the array is returned.

This is because binary search works by first finding the middle element (in this case, 31) and then comparing the key to the middle element. If the key is greater than the middle element, then the search continues on the right side of the list, which contains 21, 23, and 31. If the key is less than the middle element, then the search continues on the left side of the list, which contains 7.

To learn more about binary search
https://brainly.com/question/20411780
#SPJ4

true or false the dyn attack would have been prevented if the company patched their apache web-servers properly to avoid the sql injection attack.

Answers

True. The DYN attack likely would have been prevented if the company had properly patched their Apache web servers to avoid SQL injection attacks.

What is the DYN attack?

The DYN attack is a distributed denial-of-service (DDoS) attack that occurred in October 2016 against DNS provider Dyn. The attack resulted in major websites such as Twi_tter, Spo_tify, and Red_dit becoming unavailable for several hours.

The attack was launched using a botnet of Internet of Things (IoT) devices, such as routers and security cameras, which were infected with malware and controlled remotely to flood the Dyn servers with traffic, causing them to become overwhelmed and unable to process legitimate traffic.

The DYN attack is considered one of the largest and most significant DDoS attacks to date, highlighting the vulnerability of IoT devices and the importance of securing them properly.

To learn more about denial-of-service (DDoS), visit: https://brainly.com/question/18687584

#SPJ4

in excel desktop, what is one of the function categories on the formulas tab, in the function library group? 1 point medical lookup

Answers

One of the function categories on the formulas tab, in the function library group, is Lookup & Reference. The correct option is B.

What is an Excel desktop?

The greatest option for using sophisticated graphs and charts is the Excel Desktop App. Because of the many varied functions, this group is one of the most used.

The Insert Function, Autosum, Recently Used, and other buttons are included in the Function Library group, to start. The Date & Time, Financial, Logical, Text, and other buttons are also included.

Therefore, the correct option is B. Lookup & Reference.

To learn more about excel desktop, refer to the link:

https://brainly.com/question/30052750

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Analytical

Lookup & Reference

Medical

Functional

Which of the following Windows components are important to keep updated in regards to system security: Which of the following Windows components are important to keep updated in regards to system security

Answers

Internet Explorer (IE) .NET framework-Microsoft Data Access Components (MDAC)-Internet Information Server (IIS) are the important component.

What is Internet Explorer?

Internet Explorer is a discontinued series of graphical web browsers created by Microsoft that were used in the Windows line of operating systems. It was formerly known as Microsoft Internet Explorer and Window Internet Explorer.

It was first made available in 1995 as a component of the Plus! add-on package for Windows 95. The original equipment manufacturer (OEM) maintenance releases of Windows 95 & later versions of Windows provided later versions as free downloads or in-service packs.

In the late 1990s, Microsoft invested about US$100 million per year into Internet Explorer[5], with over 1,000 employees working on the project.

To learn more about Internet Explorer refers to:

brainly.com/question/29307545

#SPJ4

How did writing evolve

Answers

Answer: Writing Evolved By:

Explanation:    Scholars generally agree that the earliest form of writing appeared almost 5,500 years ago in Mesopotamia (present-day Iraq). Early pictorial signs were gradually substituted by a complex system of characters representing the sounds of Sumerian (the language of Sumer in Southern Mesopotamia) and other languages

Which photoreceptor is responsible for peripheral vision?

Answers

Rods are the variety of photoreceptor that, in accordance with the above statement, are crucial for peripheral vision.

What does "peripheral" mean in medicine?

"Aside again from center" denotes being peripheral. It can be used to describe areas of the body that are not in the center or a specific body part. The hands, for instance, are independent of the shoulder. The toes and ankles are radially aligned. You may locate a certain body area by using the head, back, and front views of the body.

What's happening in The Peripheral?

Its plot involves time travel, avatars and simulations, faceless robots, covert operations, and apocalyptic themes. But there are also modern-day Boss Hoggs, invisible automobiles, and American soldiers defending their own in rural shootouts.

To know more about Peripheral visit:

https://brainly.com/question/155095

#SPJ4

digital devices may be collected in a broken state with files already deleted. what methods can digital forensic practitioners employ to extract or recover these lost files?

Answers

If it appears likely that the evidence on the website might be lost by a delay in carrying out the above procedures then the person reporting may be asked to make a copy of the evidence by whatever means they are capable of (either printing, screenshot or saving pages).

What are digital forensic practitioners?

The Digital Forensic Practitioner uses a wide range of digital forensics methods to support the investigative strategy while supporting and advising on the delivery of digital offerings for major crimes, incidents, operations, or any investigation that needs specialized digital forensic investigative assistance. A subfield of forensic science called "digital forensics" is dedicated to finding, obtaining, processing, analyzing, and documenting electronically stored material. Nearly all illegal acts involve the use of electronic evidence, making digital forensics support essential for police investigations. Disk/data capture programs, file viewing tools, networks and database forensic tools, and specialized analysis tools for file, registry, web, email, and mobile device research are among the primary categories of digital forensics tools.

To know more about digital forensic practitioners, visit:

https://brainly.com/question/26694391

#SPJ4

Rohan wants to write the description for the fields of the table, which he is about to create. In which view he should work
1. DESIGN VIEW
2. Datasheet view

Answers

Answer:

Design View

Explanation:

Datasheet view is for viewing and editing actual data

Adding a description of a field involves changing the structure of the table so it can be done only in design view or via code

Write a function min that has three C string parameters and returns the smallest. Instructor Notes: Hint: Use char* as the type for the c-strings here.

Answers

min char (char string1, char string2, char string3) If strcmp (string1, string2) > 0 is true, then Return string3 if (strcmp (string2, string3) > 0; otherwise, return string2; else Return string3 if strcmp(string1, string3) > 0;

What are syntax and a string?

A random-length string of characters contained in double quotations is the reader syntax for strings ( " ). The following special symbols can be inserted using the backslash escape character.

Why is it called a string?

One of his Phoenix Jazzmen colleagues gave him the moniker "Sting" due to the black-and-yellow striped jumper he frequently wore onstage. Sting spent two years as a teacher at St. Paul's Primary School in Cramlington after earning his degree in 1974.

To know more about string visit:

https://brainly.com/question/27832355

#SPJ4

Question 2 of 20
The first paragraph or part of a business letter is the

Answers

Answer:

Sorry but please I dont understand the question

information stored in long-term memory is blank and blank . (more than one option may be correct.) multiple select question. unreliable sensory retrievable permanent

Answers

Information associated with skills learned through practice and repetition, like driving a car, is stored in procedural long-term memories. Declarative long-term memories are knowledge that a person can recall at a later time about facts, laws, events, definitions, and experiences. See here for more information on memory types.

What two categories of information are kept in memory?

Long-term memory consists of two parts: explicit and implicit. Semantic and episodic memory are both included in explicit memory. Procedural memory and things picked up through conditioning are examples of implicit memory.

Which four types of long-term memory are there?

Explicit memory (declarative), episodic memory, semantic memory, autobiographical memory, and implicit memory are all terms used to describe long-term memory (procedural memory).

To know more about memory visit:-

brainly.com/question/11103360

#SPJ4

what type of processor memory is located on the processor chip (processor die)?

Answers

Term in this set (100) Level [a] cache is the name of the memory on the CPU die. The memory referred to as Level [b] cache is located in the processor package but not on the processor die.

The processor's internal memory type?

PIM stands for processing in memory, also known as processor in memory, which is the combination of a processor and Random Access Memory (RAM) on a single chip. A PIM chip is another name for the outcome.

How do processor dies work?

The square of silicon that was cut out of the wafer and contains an integrated circuit is referred to in formal language as a "die." Both dice and die are singular nouns. check out MCM, wafer, and chip. Wafer with dice on it.

To know more about processor die visit :-

https://brainly.com/question/30192733

#SPJ4

A user, Ann, has reported that she lost a laptop. The laptop had sensitive corporate information on it that has been published on the Internet. Which of the following is the FIRST step in implementing a best practice security policy?
A. Require biometric identification to log into the laptop.
B. Require multifactor authentication to log into laptop.
C. Require laptop hard drives to be encrypted.
D. Require users to change their password at frequent intervals.
E. Require users to have strong passwords.

Answers

The first step in implementing a best practice security policy in this situation would be to require users to have strong passwords. Then the answer is option E.

Strong passwords are essential to protecting sensitive corporate information, and should be enforced as a part of any security policy. Additionally, requiring users to change their passwords at frequent intervals and requiring multifactor authentication can help ensure that user accounts remain secure.

Passwords are important for protecting sensitive information and preventing unauthorized access. Strong passwords are essential for keeping accounts secure, as weak passwords can easily be guessed or cracked with special software.

Learn more about security policy :

https://brainly.com/question/13169523

#SPJ4

Other Questions
A solution of enzyme A has a pH of 8. Based on the graph, which pH change would result in higher enzyme activity I need help bru im from Chicago need help A bank has launched a three-year structured deposit that offers an effective annual interest of 8% for the first 18 months, quarterly interest of 1.5% for the next 6 months and semi-annual interest of 2% for the last 12 months. If I wish to receive $100, 000 on the maturity date (that is, on the last day of the third year), how much, to the nearest dollar, should I invest? (Assume that interest rates and principal are guaranteed) Merchandise inventory includes: (You may select more than one answer. Single click the box with the question mark to produce a check mark for a correct answer and double click the box with the question mark to empty the box for a wrong answer. Any boxes left with a question mark will be automatically graded as incorrect.)\ dwight eisenhower is known for planning which part of world war ii? Which titles fits this Venn diagram best? What did Milan, Venice, andFlorence have in common in theirdevelopment as powerful states? during the current year, a voluntary health and welfare organization receives $300,000 in unconditional pledges. of this amount, $100,000 has been designated by donors for use next year to support operations. if 15% of the unconditional pledges are expected to be uncollectible, what amount of unrestricted support should the organization recognize in its current-year financial statements? The word cognitive is an adjective that is defined as involving intellectual activities such as reasoning and thinking. Below are example sentences that will help you learn how to use cognitive in a sentence. an object is thrown upward with a speed of 14 m/s on the surface of planet x where the acceleration due to gravity is 3.5 m/s2. what is the speed of the object after 8.0 s? a new project has been assigned to you to revolutionize education through technology. the project team consists of several very creative and talented individuals. you plan to deliver the project in iterations, prioritizing based on business value. you have assembled your team and brainstormed a few items for the product backlog. during the assessment process a rather heated debate has begun about a user story. some feel it will be very difficult to implement, while others feel it will be easy. what should you do? Explain how the Flood changed the locations of the tectonic plates, using 5 to 6 sentences. Make sure to use your best grammar.(its talking about the flood in genesis) a ship leaves port at noon and has a bearing of the ship sails at 20 knots. how many nautical miles south and how many nautical miles west will the ship have traveled by 6:00 p.m.? how did the progressive movement change the relationship between government officials and their consultants Juan received a class assignment to write about organisms that live in extreme environments. While doing research online, he found an image that showed microbial bodies thriving in hot springs. The organisms lacked a nucleus or defined organelles. Which organisms can he possibly find in such conditions? j'ai une dissertation et j'ai besoin d'ides svp, sujet: Est-il utile d'tudier l'oeuvre La Machine infernale? merciii the nielsen television index is a set of information of known commercial value that is provided to multiple clients on a subscription basis. the nielsen index is an example of . entry-level audit professionals in today's environment need to first learn how to make the best use of blank . multiple choice question. internal data and information produced by the entity big data sources that are external to the entity which describes ocean rocks that are found near mid-ocean ridges?(1 point) responses they are older and form through the cementation of sediments. they are older and form through the cementation of sediments. they are younger and form through the cementation of sediments. they are younger and form through the cementation of sediments. they are older and form through the cooling of magma. they are older and form through the cooling of magma. they are younger and form through the cooling of magma. Please help, i know you have to use pythagoras and the hypotenuse is 8.44 but i dont know how to get one of the sides