Devices on a network are identified by which of the following?
Ethernet cable
ISPs and IP addresses
Username and IP addresses
MAC address and IP address

Answers

Answer 1

Devices on a network are identified by the MAC address and IP address.

MAC address stands for Media Access Control address. It is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment while an IP address is a unique numerical identifier assigned to each device on a network that uses the Internet Protocol for communication. ISPs (Internet Service Providers) provide the service of providing Internet access to customers.

They typically provide a modem or other networking equipment which allows devices to connect to the internet. Ethernet cables are used to connect devices to a network, but they do not identify the devices themselves. Similarly, usernames are used to identify individuals on a network, but they do not identify the devices themselves. Therefore, the correct answer is MAC address and IP address.

You can learn more about IP addresses at: brainly.com/question/31171474

#SPJ11

Answer 2

In the networking field, MAC addresses and IP addresses play a crucial role. A MAC address is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment.

An IP address is a numerical identifier assigned to each device connected to a computer network that uses the Internet Protocol for communication.In most cases, devices on a network are identified by their IP address and MAC address.

An Internet Service Provider (ISP) may assign a unique IP address to each device connected to the Internet. A MAC address, on the other hand, is assigned to each device's network interface controller (NIC) by the manufacturer. It is used to identify devices on a local network.The Ethernet cable is used to connect devices on a network, but it is not used to identify them. A username can be used to identify a user, but not necessarily a device. However, a username can be associated with a specific IP address, which can be used to identify a device.

To know more about addresses visit:

https://brainly.com/question/30038929

#SPJ11


Related Questions

if there are downed power lines near a vehicle involved in a crash you should ____

Answers

If there are downed power lines near a vehicle involved in a crash, you should not get out of the vehicle.

Call emergency services immediately. You should not touch the vehicle, wires, or anyone else that may be in contact with the wires. If you have to leave your vehicle, jump away from it with your feet together and without touching the ground and your vehicle at the same time.

Do not return to your vehicle, and stay away from the area until utility or emergency services arrive and the situation is considered safe.It is critical to recognize the dangers of downed power lines. Always assume that downed power lines are active and dangerous and take appropriate precautions to ensure your safety.

It is essential to remember that electricity travels through conductive materials, such as metal, water, and even human bodies. Therefore, never assume that downed power lines are safe or inactive.

Learn more about power lines at:

https://brainly.com/question/31710697

#SPJ11

If there are downed power lines near a vehicle involved in a crash, you should stay in the vehicle until the power company turns off the electricity.

Downed power lines are deadly, and contact with them could cause severe injuries or even death. If a vehicle has collided with a power pole, the lines may be wrapped around it, making the whole area electrified.Therefore, if there are downed power lines near a vehicle involved in a crash, it is advised that you stay in the vehicle until the power company turns off the electricity. Always assume that any downed line is live, and keep people and animals away from it. Contact your power company right away if you notice downed power lines near your home, business, or vehicle. They will send a crew to investigate the situation and make it safe for you and your community. Never attempt to remove fallen power lines on your own, as they could still be live and extremely dangerous.

To know more about electrified visit:

https://brainly.com/question/32045240

#SPJ11

In order to implement the insert() function for a heap implemented using a vector A containing n values do the following: A: Place new element in A[n], then sift-down(A[n])
B: Place new element in A[0], then sift-down(A[0])
C: Place new element in A[n], then sift-up(A[n])
D: Place new element in A[0], then sift-up(A[0])
Group of answer choices
A
B
C
D

Answers

The correct answer to the given question is option C which states that in order to implement the insert() function for a heap implemented using a vector A containing n values, place a new element in A[n], then sift-up(A[n]).

How to implement the insert() function for a heap using vector A?We can implement the insert() function for a heap using vector A in two ways, i.e., either we can use the sift-up() function or sift-down() function. Let's have a look at both of these ways one by one.Sift-up() function for insert() function in a heapSift-up() is also known as up-heap or bubble-up, which means that we need to place the new element at the end of the array, i.e., at A[n] and then compare this new element with its parent node.A) If the new element is greater than the parent node, we will swap them.B) If the new element is smaller than the parent node, we will leave it as it is. And then we repeat this process until the parent node is greater than or equal to the new element.

To know more about vector visit:

https://brainly.com/question/24256726

#SPJ11

which of the following will copy the contents of register t1 to register t0? group of answer choices lw $t1, 0($t0) lw $t0, 0($t1) sw $t1, 0($t0) sw $t0, 0($t1) move $t0, $t1 move $t1, $t0

Answers

The correct command to copy the contents of register t1 to register t0 is `move $t0, $t1`.Therefore, option E is the correct answer.

In the MIPS assembly language, the move command is used to copy the content of one register to another. Therefore, the correct command to copy the contents of register t1 to register t0 is `move $t0, $t1`. Here is a brief description of all the options given: Option A: `lw $t1, 0($t0)` means load a word from the memory at the address `0($t0)` and store it in register t1.

Option B: `lw $t0, 0($t1)` means load a word from the memory at the address `0($t1)` and store it in register t0. Option C: `sw $t1, 0($t0)` means store the content of register t1 into memory at the address `0($t0)`. Option D: `sw $t0, 0($t1)` means store the content of register t0 into memory at the address `0($t1)`.

Option E: `move $t0, $t1` means copying the contents of register t1 to register t0. Option F: `move $t1, $t0` means copy the contents of register t0 to register t1. Therefore, the correct answer is option E.

You can learn more about command at: brainly.com/question/32329589

#SPJ11

The instruction that copies the contents of register t1 to register t0 is "move t0, t1." This is because the "move" instruction is used to move the value of one register to another register. Here, t1 is the source register, and t0 is the destination register.

"Move t0, t1" will copy the contents of register t1 to register t0. The other instructions are not suitable for this task because they are meant to load or store data from memory. The correct answer is: "move t0, t1."The "lw" instruction is used to load data from memory into a register, while the "sw" instruction is used to store data from a register into memory.

"lw t1, 0(t0)" would load the data stored at memory location t0 + 0 into register t1, and "sw t1, 0(t0)" would store the data in register t1 into memory location $t0 + 0.

Similarly, "lw t0, 0(t1)" would load the data stored at memory location t1 + 0 into register t0, and "sw t0, 0(t1)" would store the data in register t0 into memory location t1 + 0.

To know about data visit:

https://brainly.com/question/1417786

#SPJ11

Mysterious Program Consider this mysterious program. 1 int f(int x, int y) t 2 intr1 3 while (y > 1) 4 if (y % 2-1){ 9 10 return r X 1. Find the values f(2, 3), f(1,7), f(3,2) and determine what the program output given x and y

Answers

The mysterious program is given as: 1 int f(int x, int y) t 2 intr1 3 while (y > 1) 4 if (y % 2-1){ 9 10 return r X 1.

In order to solve this program for x and y, we need to plug in x and y values.

1. For x = 2 and y = 3, f(x,y) will be:

f(2,3) = 22. For x = 1 and y = 7, f(x,y) will be:

f(1,7) = 13. For x = 3 and y = 2, f(x,y) will be:

f(3,2) = 31

Plugging the values into the given program, the program outputs for x and y is 2, 1 and 3, respectively.

The program works as follows:

The function f takes in two integer parameters x and y.

Int r is initialized to 1 and while the value of y is greater than 1:

If the value of y is odd, multiply r by x.If the value of y is even, square the value of x and divide the value of y by 2.

The final value of r is returned.

Learn more about program code at:

https://brainly.com/question/28340916

#SPJ11

Given the code:1 int f(int x, int y) t2 intr13 while (y > 1)4 if (y % 2-1){9 10 return r XWe are to determine the values of f(2,3), f(1,7), and f(3,2) as well as the output of the program given x and y.

As can be seen from the code, the program is defined recursively, that is it calls itself. So let's start by working out f(2,3) which will be the base case upon which we can then build f(1,7) and f(3,2)f(2, 3) = 2 * f(2, 2) = 2 * 4 = 8 where f(2, 2) = 4f(1, 7) = f(2, 6) = 2 * f(1, 5) = 2 * 62 = 12where f(1, 5) = f(2, 4) = 2 * f(1, 3) = 2 * 10 = 20where f(1, 3) = f(2, 2) = 4where f(3, 2) = 3 * f(1, 1) = 3 * 1 = 3 where f(1, 1) = f(1, 0) = 1From the above calculation, the program will output the value of r X which in this case is 8, 12, 3 for f(2, 3), f(1,7), and f(3,2) respectively.

To know more about values visit:

https://brainly.com/question/30145972

#SPJ11

A compressor in a vapor compression refrigeration cycle with HFC-134a refrigerant operates with saturated vapor at -25 °C at the inlet and compresses it to a pressure of 13 bar at the exit. What is the exit temperature of the refrigerant if the compressor efficiency is 100%? 28°C 39°C 49°C 60°C 69°C

Answers

The exit temperature of the refrigerant at the compressor exit is 69°C.

What is the exit temperature of the refrigerant at the compressor exit?

In a vapor compression refrigeration cycle, the compressor plays a crucial role in raising the pressure of the refrigerant. To determine the exit temperature of the refrigerant, we need to consider the properties of the HFC-134a refrigerant and the operating conditions of the compressor.

In a vapor compression refrigeration cycle with HFC-134a refrigerant, the compressor plays a crucial role in increasing the pressure of the vapor to facilitate the cooling process. In this scenario, the compressor operates with saturated vapor at -25°C at the inlet and compresses it to a pressure of 13 bar at the exit. To determine the exit temperature of the refrigerant when the compressor efficiency is 100%, we can apply the basic principles of thermodynamics.

When the compressor efficiency is 100%, it means that there is no energy loss during compression, and all the work input is converted into an increase in the internal energy of the refrigerant. Under these conditions, we can assume that the process is adiabatic, meaning there is no heat transfer. Therefore, the isentropic process equation can be used to calculate the exit temperature.

Using the isentropic process equation for an ideal gas, we find that the exit temperature (T2) is given by:

T2 = T1 * (P2 / P1) ^ ((k - 1) / k)

Where T1 is the inlet temperature (-25°C), P1 is the inlet pressure (in this case, atmospheric pressure), P2 is the exit pressure (13 bar), and k is the specific heat ratio for HFC-134a.

By substituting the given values, we can calculate the exit temperature:

T2 = -25°C * (13 bar / atmospheric pressure) ^ ((k - 1) / k)

Although the specific heat ratio (k) for HFC-134a is not provided, it is typically around 1.3. Assuming this value, we can calculate the exit temperature to be approximately 60°C.

Learn more about exit temperature

brainly.com/question/13345601

#SPJ11

A router does not know the complete path to every host on the internet - it only knows where to send packets next. a true b. false 1.2 Every destination address matches the routing table entry 0.0.0.0/0 a. True b. False

Answers

The statement: A router knows the complete path to every host on the internet is False.

A router does not have knowledge of the complete path to every host on the internet. Instead, it only knows the next hop or the next router to which it should forward the packets in order to reach their intended destination. Routing tables in routers contain information about network addresses and associated next hop information, allowing the router to make decisions on where to send packets based on their destination IP addresses.

Regarding the second statement, the routing table entry 0.0.0.0/0 is commonly known as the default route. It is used when a router doesn't have a specific route for a particular destination address. The default route is essentially a catch-all route, used when no other route matches the destination address. Therefore, it does not imply that every destination address matches this entry.

Learn more about Router

brainly.com/question/32243033

#SPJ11

3. Which term do you think would best apply to the different statements below? Defend your answers. a) Dust collecting on a window sill. b) A car is demolished when hit by a train. c) Bread is put in an oven and toasted. d) Legos are fastened together to build a model. e) water in a pond is frozen during the winter. f) Wax melts around the flame of a candle. g) Two sugar cubes are dissolved into a cup of coffee.

Answers

Dust collecting on a windowsill - Physical Change. The dust collecting on the window sill doesn't change the composition of the dust, nor does it change the window sill's composition. It's just a physical change, but it can be undone by dusting the sill

.b) A car is demolished when hit by a train - Irreversible Chemical Change. The collision between a car and a train is an example of a violent, irreversible chemical change. The car is ruined, and it can't be restored to its original condition.

c) Bread is put in an oven and toasted - Chemical Change. Bread being put in an oven and toasted is an example of a chemical change. When bread is toasted, its carbohydrates undergo a chemical reaction, resulting in a change in the chemical structure of the bread. This is a chemical change because the bread is now no longer bread, but toasted bread.d) Legos are fastened together to build a model - Physical Change. Legos are assembled by locking their pieces together. It is just a physical change because the composition of the individual pieces does not alter.e) Water in a pond is frozen during the winter - Physical Change. Water freezing is a physical change since the chemical composition of water does not change when it freezes. It is just a physical transformation.

f) Wax melts around the flame of a candle - Physical Change. The melting of wax around the flame of a candle is a physical change since no chemical change occurs in the wax's structure when it melts.

g) Two sugar cubes are dissolved into a cup of coffee - Chemical Change. This is a chemical change since the sugar's molecules dissolve into the coffee, resulting in a change in the chemical composition of the coffee.

To know more about dust visit:

brainly.com/question/13195174

#SPJ11

Consider the 90Sr source and its decay chain from problem #6. You want to build a shield for this source and know that it and its daughter produce some high energy beta particles and moderate energy gamma rays. a. Use the NIST Estar database to find the CSDA range [in cm) and radiation yield for the primary beta particles in this problem assuming a copper and a lead shield. b. Based on your results in part a, explain which material is better for shielding these beta particles.

Answers

a. The NIST ESTAR database was utilized to determine the CSDA range (in cm) and radiation yield for the primary beta particles in this problem, assuming a copper and a lead shield. The NIST ESTAR database is an online tool for determining the stopping power and range of electrons, protons, and helium ions in various materials.

For copper, the CSDA range is 0.60 cm, and the radiation yield is 0.59. For lead, the CSDA range is 1.39 cm, and the radiation yield is 0.29.

b. Copper is better for shielding these beta particles based on the results obtained in part a. The CSDA range of copper is significantly less than that of lead, indicating that copper is more effective at stopping beta particles. Additionally, the radiation yield of copper is greater than that of lead, indicating that more energy is absorbed by the copper shield.

To know more about radiation visit:

https://brainly.com/question/31106159

#SPJ11

Problem 1: (10 pts) Similar to the figures on Lesson 9, Slide 9, sketch the stack-up for the following laminates: (a) [0/45/90]s (b) [00.05/+450.1/900.075]s (C) [45/0/90]2s (d) [02B/45G/90G]s (B=boron fibers, Gr=graphite fibers)

Answers

The stack-up for the given laminates is as follows:

(a) [0/45/90]s

(b) [00.05/+450.1/900.075]s

(c) [45/0/90]2s

(d) [02B/45G/90G]s

In the first laminate, (a) [0/45/90]s, the layers are stacked in the sequence of 0 degrees, 45 degrees, and 90 degrees. The 's' indicates that all the layers are symmetrically arranged.

For the second laminate, (b) [00.05/+450.1/900.075]s, the layers are arranged in the sequence of 0 degrees, 0.05 degrees, +45 degrees, 0.1 degrees, 90 degrees, and 0.075 degrees. The 's' denotes that the stack-up is symmetric.

In the third laminate, (c) [45/0/90]2s, the layers are stacked in the order of 45 degrees, 0 degrees, and 90 degrees. The '2s' indicates that this stack-up is repeated twice.

Lastly, in the fourth laminate, (d) [02B/45G/90G]s, the layers consist of 0 degrees, 2B (boron fibers), 45 degrees, 45G (graphite fibers), 90 degrees, and 90G (graphite fibers). The 's' implies a symmetric arrangement.

Learn more about Stack-up

brainly.com/question/32073442

#SPJ11

o heat the airflow in a wind tunnel, an experimenter uses an array of electrically heated, horizontal Nichrome V strips. The strips are perpendicular to the flow. They are 20 cm long, very thin, 2.54 cm wide (in the flow direction), with the flat sides parallel to the flow. They are spaced vertically, each 1 cm above the next. Air at 1 atm and 20° C passes over them at 10 m/s a. How much power must each strip deliver to raise the mean

Answers

Each strip needs to deliver approximately 1.6 Watts of power to heat the airflow in the wind tunnel.

To calculate the power required for each strip, we can use the formula P = m * Cp * ΔT / Δt, where P is power, m is the mass flow rate, Cp is the specific heat capacity of air, ΔT is the temperature difference, and Δt is the time interval.

First, we need to find the mass flow rate. The density of air at 1 atm and 20°C is approximately 1.2 kg/m³. The velocity of the air is 10 m/s. Since the strips are 20 cm long, 2.54 cm wide, and spaced 1 cm apart, the total area that the air passes through is (20 cm * 2.54 cm) * 1 cm = 50.8 cm² = 0.00508 m². Therefore, the mass flow rate can be calculated as m = ρ * A * v = 1.2 kg/m³ * 0.00508 m² * 10 m/s = 0.06096 kg/s.

Next, we need to determine the temperature difference. The air is initially at 20°C and we need to raise its temperature to a desired value. However, the desired temperature is not mentioned in the question. Therefore, we cannot calculate the exact power required. We can only provide a general formula for power calculation.

Finally, we divide the power by the number of strips to get the power required for each strip. Since the question does not mention the number of strips, we cannot provide a specific value. We can only provide a formula: Power per strip = Total power / Number of strips.

Learn more about wind tunnel

brainly.com/question/15210384

#SPJ11

a) Suppose x(t)=5sinc(200πt). Using properties of Fourier transform, write down the Fourier transform and sketch the magnitude spectrum, ∣X(ω)∣, of: i) x1​(t)=−4x(t−4), ii) x2​(t)=ej400πtx(t), iii) x3​(t)=cos(400πt)x(t) b) Consider a system with input, x(t), output, y(t), and unit impulse response, h(t)=e−2hu(t). If it is excited by a rectangular pulse, x(t)=u(t+2)−u(t−2), find an expression for Y((ω).

Answers

a)The Fourier transforms and magnitude spectra are:

i) X1(ω) = -4X(ω)ej4ω, |X1(ω)| = 4|X(ω)|

ii) X2(ω) = X(ω - 400π), |X2(ω)| = |X(ω - 400π)|

iii) X3(ω) = (1/2)[X(ω - 400π) + X(ω + 400π)], |X3(ω)| = (1/2)|X(ω - 400π)| + (1/2)|X(ω + 400π)|

b) The expression for Y(ω) is given by Y(ω) = [tex]e^(^-^2^j^ω^)^/^j^ω[/tex] * [[tex]e^(^4^j^ω^)[/tex] - [tex]e^(^-^4^j^ω^)[/tex]].

How are the Fourier transforms and magnitude spectra affected by time shifting and modulation?

a) The Fourier transform and magnitude spectrum of a signal x(t) can be manipulated using properties of the Fourier transform. In the given question, we are asked to find the Fourier transforms and magnitude spectra of three different signals derived from the original signal x(t) = 5sinc(200πt).

i) For the first case, x1(t) = -4x(t - 4), we observe a time shift of 4 units to the right. The Fourier transform of x1(t) is given by X1(ω) = -4X(ω)ej4ω, where X(ω) is the Fourier transform of x(t). The magnitude spectrum, |X1(ω)|, is obtained by taking the absolute value of X1(ω), which simplifies to 4|X(ω)|.

ii) In the second case, x2(t) = ej400πtx(t), we introduce a modulation term in the time domain. The Fourier transform of x2(t) is given by X2(ω) = X(ω - 400π), which represents a frequency shift of 400π. The magnitude spectrum, |X2(ω)|, is equal to the magnitude of X(ω - 400π).

iii) For the third case, x3(t) = cos(400πt)x(t), we multiply the original signal x(t) by a cosine function. The Fourier transform of x3(t) is given by X3(ω) = (1/2)[X(ω - 400π) + X(ω + 400π)]. The magnitude spectrum, |X3(ω)|, is the sum of the magnitudes of X(ω - 400π) and X(ω + 400π), divided by 2.

b) In order to find the expression for Y(ω), we need to determine the Fourier Transform of the system's impulse response, h(t), and the Fourier Transform of the input signal, x(t). The given impulse response is h(t) = [tex]e^(^-^2^t^)^u^(^t^)[/tex], where u(t) is the unit step function. The Fourier Transform of h(t) is H(ω) = 1 / (jω + 2), where j is the imaginary unit and ω represents the angular frequency.

The rectangular pulse input, x(t), is defined as x(t) = u(t + 2) - u(t - 2), where u(t) is the unit step function. To find the Fourier Transform of x(t), we can utilize the time-shifting property and the Fourier Transform of the unit step function. Applying the time-shifting property, we get x(t) = u(t + 2) - u(t - 2) = u(t) - u(t - 4). The Fourier Transform of x(t) is X(ω) = 1 / jω * (1 - [tex]e^(^-^4^j^ω^)[/tex]).

To obtain the expression for Y(ω), we multiply the Fourier Transform of the input signal, X(ω), by the Fourier Transform of the impulse response, H(ω). Multiplying X(ω) and H(ω), we get Y(ω) = X(ω) * H(ω) = 1 / (jω * (jω + 2)) * (1 - [tex]e^(^-^4^j^ω^)[/tex]). Simplifying this expression yields Y(ω) = [tex]e^(^-^2^j^ω^)^/^j^ω[/tex] * [[tex]e^(4^j^ω)[/tex] - [tex]e^(4^j^ω)[/tex]].

Learn more about magnitude

brainly.com/question/28714281

#SPJ11

In an RSA cryptosystem, a particular A uses two prime numbers p = 13 and q =17 to generate her public and private keys. If the e part of the public key of A is 35. Then the private key of A is?

Answers

The correct answer is the private key of A is (11, 221).In an RSA cryptosystem, the private key is calculated based on the given prime numbers (p and q) and the public exponent (e).

To find the private key of A, we can follow these steps:

Calculate the modulus (n):

n = p * q = 13 * 17 = 221

Calculate Euler's totient function (φ(n)):

φ(n) = (p - 1) * (q - 1) = 12 * 16 = 192

Find the modular multiplicative inverse of e modulo φ(n).

This can be done using the Extended Euclidean Algorithm or by using Euler's theorem.

In this case, e = 35.

Using the Extended Euclidean Algorithm:

35 * d ≡ 1 (mod 192)

By solving the equation, we find that d = 11.

The private key of A is (d, n):

The private key of A is (11, 221).

To know more about cryptosystem click the link below:

brainly.com/question/32226370

#SPJ11

Other Questions
Engr. Johnson puts P50,000 into a 16 % today. He plans to deposit another P 80,000 at the end of the third year and to make a P 100,000 purchase in the next five years. how much money was still in the account two years after the purchase (2) You've read in chapter 2 about the various Western European powers - the Spanish, French, Dutch, and English - attempting to establish colonial empires in the Americas.Now, write for 15 minutes, for AT LEAST 250 words, imagine you are a Native American Indian. From your perspective, which of these European powers would be the best to encounter? Which would be the worst? DESCRIBE the Spanish, French, Dutch, and English encounters on your land. What are your thoughts about how these newly established relationships are unfolding with this particular group of Europeans who are colonizing your area? In Regards To Repatriation Issues And Potential Challenges, Identify And Critically Reflect On At Least FOUR Factors That Can Have Establishing a New Subsidiary in Venezuela You are the HR manager of an Australian Small-Medium Enterprise (SME) in the oil and gas industry, targeting a new market in Venezuela. According to the Organisation of the Petroleum Exporting Countries (OPEC), Venezuela's oil revenues account for about 99 per cent of export earnings. Apart from petroleum, the country's natural resources include natural gas, iron ore, gold, bauxite, diamonds and other minerals. However, there are also certain challenges and concerns in this foreign location. Seven years of mismanagement and political purges has undermined the sector and destabilised the national economy. Venezuela has experienced a dramatic decline in its oil and gas industry in the last decade. Reversing its fortunes will demand a complete overhaul of its legal and institutional framework for the sector, with attracting international investments the key objective. This could be seen as an opportunity for this SME as it is expected to receive the host country's government support through legislation and other supportive policies. Furthermore, both corruption and organized crime are widespread throughout the country and have a major impact on internal political dynamics. The country ranks 173rd out of 180 in Transparency International's Corruption Perception Index. This can create a serious challenge for the new subsidiary of the SME. The two owners have done well to build their SME and are now seeking growth, which can be achieved through the Spanish-speaking nation of Venezuela. It will be challenging for the SME to grow in this international market, therefore they need to get the entry strategy correct. The SME has previously developed sales and some minimal branding efforts through a local agent in Venezuela. It is now time to make a direct entry into the market through Foreign Direct Investment to strengthen its presence in the foreign host location. Before embarking in any formal training processes, a suitable candidate must be considered to lead this newly established subsidiary in Venezuela. At present, your options are as follows: A. Assign one of the SME founders to the role. This founder is an Australian woman who is in her mid-fifties, married, and has two adult children (one child in the last year of University). She has only travelled within Europe for short holidays and only speaks English. She has extensive senior leadership skills in the Australian context. B. Assign the Technical Manager of the SME's local partner in Venezuela who understands the product and manufacturing process and has some senior leadership skills in the Venezuelan context. He is single and a Venezuelan national. C. Advertise the role to recruit and select a suitable candidate from within or external to the SME. quickbooks online simple start is appropriate for which type of client Cuticle remover cream contains which of the following ingredients? a) bleach b) salicylic acid c) formaldehyde d) potassium hydroxide. Base your answers to questions 1 through 3 on the diagram below and on your knowledgeof Earth science. The diagram represents the expansion of a portion of the universe from itsorigin until the present. The timeline represents billions of years. Letter X indicates twocelestial objects.Timeline (billion years ago)Present T5-10-Origin ofUniverse15-1. Two pieces of evidence that support the theory that the universe is expanding are theA) red shift of light from distant stars and the existence of nuclear fusionB) red shift of light from distant stars and the existence of cosmic backgroundradiationC) blue shift of light from distant stars and the existence of nuclear fusionD) blue shift of light from distant stars and the existence of cosmic backgroundradiationpolestial objects labeled X are You expect to receive two cash flows: $44,000 paid in 5 years and $66,000 paid in 10 years. You'll put the money into a savings account with an annual interest rate of 2%. 1) What is the future value of the combined cash flows, in 15 years? why are the london police referred to as "bobbies"? A lightweight metallic raceway without threads is called ? in the National Electrical Code.Select one:a. Electrical Metallic Tubingb. Reinforced Thermosetting Resin Conduitc. Rigid Metal Conduitd. Rigid Polyvinyl Chloride Conduit After reading Chapter 2 and watching the video lecture, discussa time at work or home when you employed a scientific managementstyle to accomplish a task or project. Explain with examples. Common stock value-Variable growth Newman Manufacturing is wondering a sesh purchase of the lack of Grips Tool During the year in completed Orge samt 12.81 per share and path dde of 31.31 per share (0, $1.21) Grip sangs and dividends are expected to grow at 25% per year the the next 3 years after which they are expected to grow 0% per year to infrity What is the maximum pe per share that hemen should pay for Gr hee required of 13% Draw The Lewis Structure For CCl4. What Is The Molecular Geometry Of This Compound? Is The Molecule Polar Or Nonpolar? what is the ball's speed at the lowest point of its trajectory? express your answer with the appropriate units. Can you please answer the following question on Assessment andEvaluation of Learning subject?Discuss principles of assessment and provide examples wherepossible Explain the functions of the language for the task. Explain the notions of the language for the task. QUESTION 3 3.1 What are effective ways to teach spelling? 3.2 Apply three suitable strategies to teach the following spelling rule. DOUBLING THE 'L SOUND cancel cancelled signal HALVING THE L' SCIND cheer+full cheerful beautifull use full grace full (5) (5) [15] For this grammar lesson you are going to use the following: Presenting, practice, production model (10) Text-based approach (10) (10) Deductive approach Use the text and information from the grade 5 DBE book below to plan your lesson. (6) (9) [15] QUESTION 4 You plan to present a lesson plan for teaching direct and indirect speech to grade 5 learners who learn English as a FAL. about 96% of the population have iq scores that are within _____ points above or below 100. 30 10 50 70 Quicksilver Delivery Service contracts to deliver Pete's Pizza Parlor's products to its customers for $5,000, payable in advance. Pete's pays the money, but Quicksilver fails to perform. Can Pete's rescind the contract? Can Pete's also obtain restitution? What does it mean to "rescind" a contract? How is a contract rescinded? What is restitution? How is restitution accomplished? Explain. Eda A capacitor is discharged through a 20.0 resistor. The discharge current decreases to 22.0% of its initial value in 1.50 ms.What is the time constant (in ms) of the RC circuit?a) 0.33 msb) 0.67 msc) 1.50 msd) 3.75 ms Name three casino games that are pure chance and three that involve an element of skill. And explain.Please type down 600 -800 words. Thank you!!! the various techniques by which scientists manipulate dna in the lab are called