Calculate internal fragmentation if, Page size = 2,048 bytes, and Process size = 72,766 bytes. What is the worst-case fragmentation, and average case fragmentation?

Answers

Answer 1

The worst-case fragmentation is 2,047 bytes, and the average case fragmentation is 58.0%.

Internal fragmentation occurs when the allocated memory space is not fully utilized, resulting in wasted space. To calculate internal fragmentation, we first need to determine the number of pages required to accommodate the process size.

Number of pages required = Process size / Page size
                     = 72,766 / 2,048
                     = 35.5 (rounded up to 36 pages)

The worst-case fragmentation occurs when the process size is just one byte more than the available space in a page. In this case, the last page allocated to the process will have 2,047 bytes unused.

Worst-case fragmentation = 2,047 bytes

The average case fragmentation occurs when the process size is not evenly divisible by the page size. In this case, the last page allocated to the process will have some unused space.

Average case fragmentation = (Page size - Process size % Page size) / Page size * 100
                          = (2,048 - 862) / 2,048 * 100
                          = 58.0%

Therefore, the worst-case fragmentation is 2,047 bytes, and the average case fragmentation is 58.0%.

Know more about the Internal fragmentation click here:

https://brainly.com/question/31416904

#SPJ11


Related Questions

Miguel has a problem with the output on his laptop. Which of the following could be the source of the problem?
O the memory chip
O the speaker
O the microphone
O the keyboard

Answers

Answer:

the speaker

Explanation:

all if the rest are input devices so it must be the speaker I guess

1. In a packet-switched network, messages will be split into smaller packets, and these packets will be transmitted into the network. Consider the source sends a message 5 Mbits long to a destination. Suppose each link in the figure is 10 Mbps. Ignore propagation, queuing, and processing delays. (a) Consider sending the message from source to destination without message segmentation. Find the duration to move the message from the source host to the first packet switch? Keeping in mind that each switch uses store-and-forward packet switching, execute the total time to move the message from source host to destination host? (6 marks) (b) Now, suppose that the message is segmented into 400 packets, each 20 kilobits long. Execute how long it takes to move the first packet from the source host to the first switch. When the first packet is sent from the first switch to the second switch, the second packet is sent from the source host to the first switch. Discover when the second packet will be fully received at the first switch. (6 marks)

Answers

In a packet-switched network, without message segmentation, the time to move the entire 5 Mbit message from the source host to the first packet switch is determined by the link capacity of 10 Mbps. It takes 5 milliseconds to transmit the message.

When the message is segmented into 400 packets, each 20 kilobits long, the time to move the first packet from the source host to the first switch is still 5 milliseconds. The second packet will be fully received at the first switch when the first packet is being sent from the first switch to the second switch, resulting in no additional delay.

(a) Without message segmentation, the time to move the entire 5 Mbit message from the source host to the first packet switch can be calculated using the formula: Time = Message Size / Link Capacity. Here, the message size is 5 Mbits and the link capacity is 10 Mbps. Thus, the time to move the message is 5 milliseconds.

Since each switch in store-and-forward packet switching requires the complete packet to be received before forwarding, the total time to move the message from the source host to the destination host would also be 5 milliseconds, assuming there are no propagation, queuing, and processing delays.

(b) When the message is segmented into 400 packets, each 20 kilobits long, the time to move the first packet from the source host to the first switch remains the same as before, 5 milliseconds. This is because the link capacity and the packet size remain unchanged.

As for the second packet, it will be fully received at the first switch when the first packet is being sent from the first switch to the second switch. Since the link capacity is greater than the packet size, there is no additional delay for the second packet. This is because the transmission of the first packet does not affect the reception of subsequent packets as long as the link capacity is sufficient to handle the packet size.

Learn more about  packet-switched network here :

https://brainly.com/question/30756385

#SPJ11

An operating system is an interface between human operators and application software

Answers

It is true that an operating system is an interface between human operators and application software.

What is a software?

Software is a collection of instructions, data, or computer programmes that are used to run machines and carry out particular activities.

Hardware, on the other hand, refers to a computer's external components. Applications, scripts, and programmes that operate on a device are collectively referred to as "software."

An operating system is a piece of software that serves as a conduit between the user and the hardware of a computer and manages the execution of all different kinds of programmes.

An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs.

Thus, the given statement is true.

For more details regarding software, visit:

https://brainly.com/question/985406

#SPJ9

while t >= 1 for i 2:length(t) =
T_ppc (i) (T water T cork (i- = - 1)) (exp (cst_1*t)) + T cork (i-1);
T cork (i) (T_ppc (i) - T pet (i- = 1)) (exp (cst_2*t)) + T_pet (i-1);
T_pet (i) (T cork (i)
=
T_air) (exp (cst_3*t)) + T_air;
end
T final ppc = T_ppc (t);
disp (newline + "The temperature of the water at + num2str(t) + "seconds is:" + newline + T_final_ppc + " Kelvin" + newline + "or" + newline +num2str(T_final_ppc-273) + degrees Celsius" + newline newline);
ansl = input (prompt, 's');
switch ansl case 'Yes', 'yes'} Z = input (IntroText); continue case {'No', 'no'} break otherwise error ('Please type "Yes" or "No"')
end
end

Answers

The given code describes a temperature change model that predicts the final temperature of water based on various input parameters such as the temperatures of cork, pet, and air.

It appears that you are providing a code snippet written in MATLAB or a similar programming language. The code seems to involve a temperature calculation involving variables such as T_ppc, T_water, T_cork, T_pet, and T_air. The calculations involve exponential functions and iterative updates based on previous values.

The model uses a set of equations to calculate the temperature changes for each component.

The equations used in the model are as follows:

T_ppc(i) = (T_water – T_cork(i-1)) * (exp(cst_1 * t)) + T_cork(i-1)T_cork(i) = (T_ppc(i) – T_pet(i-1)) * (exp(cst_2 * t)) + T_pet(i-1)T_pet(i) = (T_cork(i) – T_air) * (exp(cst_3 * t)) + T_air

These equations are implemented within a for loop, where the input variables t, T_water, T_cork, T_pet, cst_1, cst_2, cst_3 are provided, and the output variable T_final_ppc represents the final temperature of the water after the temperature change.

Additionally, the code includes a prompt that allows the user to enter "Yes" or "No." Choosing "Yes" continues the execution of the code, while selecting "No" stops the code.

Overall, the code simulates and predicts the temperature changes of water based on the given inputs and equations, and offers the option to continue or terminate the execution based on user input.

Learn more about MATLAB: https://brainly.com/question/13715760

#SPJ11

The rolling movement of the mouse causes a corresponding movement of the ___________ or ______________ on the screen​

Answers

Answer:

cursor or pointer

Explanation:

beacause the main js crom the algorithm

What is BASIC programming language?​

Answers

BASIC (Beginner’s All-purpose Symbolic Instruction Code) is a programming language designed by John Kemeny and Thomas Kurtz in 1964 and popularized by Microsoft in the 1970.

BASIC,

in full (Beginner's All-purpose Symbolic Instruction Code,) computer programming language developed by John G. Kemeny and Thomas E. Kurtz at Dartmouth College in the mid 1960s.

FORTRAN

FORTRANComputer Programming History: FORTRAN was the first computer programming language that was widely used. A Brief History of Computer Programming Languages: Computer code is the foundation of computers, enabling them to do the tasks humans need them to do

FORTRANComputer Programming History: FORTRAN was the first computer programming language that was widely used. A Brief History of Computer Programming Languages: Computer code is the foundation of computers, enabling them to do the tasks humans need them to doplease make me brainalist and keep smiling dude I hope you will be satisfied with my answer

Edhesive intro to CompSci Test 7 answers pls

Answers

Answer:

nothing

Explanation:

nothing

How can get a cup stain off my Chromebook top? Like I tried everything. And I start school on the 1st of September. Plz help me

How can get a cup stain off my Chromebook top? Like I tried everything. And I start school on the 1st

Answers

Answer:

Try using vinegar or baking soda and water. There's also products for your problem.

if the decoder has active low outputs (74155) instead of active high outputs as the case for our 3-to-8 decoder, why can a nand gate be used to logically or its outputs?

Answers

Due to the fact that there are a total of four possible logic combinations that may be created using just two variables, the initial stage of the 2-to-4 decoder requires four 2-input NAND gates.

A NAND gate (NOT-AND) is a logic gate used in digital electronics that creates an output that is false only if all of its inputs are true; as a result, it is the complement to an AND gate. Only when all of the gate's inputs are HIGH (1) does the output become LOW (0); otherwise, the output becomes HIGH (1) if any input is LOW (0). Transistors and junction diodes are used to create NAND gates. According to De Morgan's rules, the logic of a two-input NAND gate may be written as A • B=A+B, making it the same as inverters followed by an OR gate.

Because any boolean function may be implemented using a combination of NAND gates, the NAND gate is important. The term functional completeness refers to this quality.

To know more about NAND gate click here:

https://brainly.com/question/12969448

#SPJ4

A constant electric current flows for 3.75 hr through two electrolytic cells connected in series. One contains a solution of AgNO3 and the second a solution of CuCl2. During this time 3.00 g of silver are deposited in the first cell. (a) How many grams of copper are deposited in the second cell

Answers

In two electrolytic cells connected in series, a constant electric current flows for 3.75 hours. During this time, 3.00 grams of silver are deposited in the first cell.

To determine the amount of copper deposited in the second cell, we need to calculate the ratio of the molar masses of copper and silver and use the given information to find the mass of copper deposited.

To find the grams of copper deposited in the second cell, we can use the concept of Faraday's laws of electrolysis. According to Faraday's laws, the amount of substance deposited or liberated at an electrode is directly proportional to the quantity of electricity passed through the electrolyte.

First, we calculate the quantity of electricity passed through the first cell using the equation:

Quantity of electricity (Coulombs) = current (Amperes) × time (seconds)

Next, we convert the quantity of electricity to moles of silver using Faraday's constant, which is the charge carried by one mole of electrons.

Moles of silver = Quantity of electricity (Coulombs) / Faraday's constant

Then, we can use the stoichiometry of the balanced equation between the electrolyte and the metal to determine the moles of copper deposited. The ratio of the moles of copper to silver is based on the balanced equation for the reaction occurring in the second cell.

Finally, we convert the moles of copper to grams using the molar mass of copper.

By following these steps and utilizing the given information, we can calculate the mass of copper deposited in the second cell.

Learn more about electrolysis here:

https://brainly.com/question/12994141

#SPJ11

in a network database, nodes may have a many-to-many relationship. group of answer choices true false

Answers

The statement "in a network database, nodes may have a many-to-many relationship" is false.

What is a network database?

A database that is organized based on record ownership, allowing records to have numerous owners and thus offering multiple access paths to the data.

A hierarchical database is a type of data architecture in which data is kept in records and structured into a tree-like parent-child structure, with one parent node having several child nodes linked together. File systems and geographic data are the two principal applications of hierarchical structure in modern computing.

Therefore, the statement is false.

To learn more about network databases, refer to the link:

https://brainly.com/question/28313857

#SPJ1

When first designing an app, all of the folldwing are important EXCEPT
A. debugging
B. determining how a user would interact with the app.
C. determining the purpose of the app
D. identifying the target audience

Answers

Answer:

B

Explanation:

Determining how the user could interact with the app varies person to person, the others are essential to creating apps though.

hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me ​

Answers

Answer:

a pseu code is a is an artificial and informal language that helps programmers develop algorithms.

Explanation:

if you had a chance to see what your life would be like in 20 years

Answers

I meaaaannnn in my opinion to me there just no future for me anymore ٩( ᐛ )و

But I mean if I was to be alive somehow, I would say, coronavirus is gone perhaps, but now there some bigger issue going on?

That’s my opinion ︎

PLEASE HELP DUE IN 30 MINUTES NO LINKS PLEASE ​

PLEASE HELP DUE IN 30 MINUTES NO LINKS PLEASE

Answers

Answer:

3

Explanation:

Answer:

Correct answer is C: Format Check

how are words and numbers encoded as ones and zeros?

Answers

Answer:Multiple true and false variables

Explanation:

0 is the equivalent to flase variable ande 1 is a true variable

The words and numbers are encoded as ones and zeros by converting the data into assigned ASCII then this data is converted into binary code that is the form of zero and one.

What are binary codes?

Binary codes are those codes that are used by digital computers to understand the data that we enter, The computer does not understand the language we speak. It converts the data into American Standard Code for Information Interexchange first, then it is concerted into binary codes.

The binary codes are in the format of 010010. Each letter has a specific code and these codes are arranged according to the words.

Thus, by first converting the data into assigned ASCII, which is the form of a one and a zero, the words and numbers are then encoded as ones and zeros.

To learn more about binary codes, refer to the link:

https://brainly.com/question/9421694

#SPJ2

Write a C program to read temperature and display adequate information: Temperature <0-Freezing, Temperature 0-15 Very Cold weather, Temperature 15-25 Cold weather, Temperature 25-35 Normal in Temp, Temperature 35-45 Hot, Temperature >=45 Very Hot. Q2. WAP to find the factors of an input number. Q3. a. WAP to find the perimeter of a rectangle b. WAP to find the volume of a box (Ask dimensions from the user) Q4. WAP to print the number of digits in a number entered by the user.

Answers

1. To display the temperature in terms of adequate information, you can use the following C program. #include int main() { float temperature; printf("Enter the temperature: "); scanf("%f", &temperature); if(temperature < 0) printf("Freezing"); else if(temperature >= 0 && temperature < 15) printf("Very Cold Weather"); else if(temperature >= 15 && temperature < 25) printf("Cold Weather"); else if(temperature >= 25 && temperature < 35) printf("Normal in Temp"); else if(temperature >= 35 && temperature < 45) printf("Hot"); else printf("Very Hot"); return 0; }

2. To find the factors of an input number, you can use the following C program. #include int main() { int i, number; printf("Enter the number: "); scanf("%d", &number); printf("Factors of %d are: ", number); for(i=1; i<=number; ++i) { if(number%i == 0) printf("%d ", i); } return 0; }

3a. To find the perimeter of a rectangle, you can use the following C program. #include int main() { float length, width, perimeter; printf("Enter the length and width of rectangle: "); scanf("%f %f", &length, &width); perimeter = 2 * (length + width); printf("Perimeter of rectangle = %f units", perimeter); return 0; }

3b. To find the volume of a box, you can use the following C program. #include int main() { float length, width, height, volume; printf("Enter the length, width and height of the box: "); scanf("%f %f %f", &length, &width, &height); volume = length * width * height; printf("Volume of box = %f cubic units", volume); return 0; }

4. To print the number of digits in a number entered by the user, you can use the following C program. #include int main() { int number, count = 0; printf("Enter the number: "); scanf("%d", &number); while(number != 0) { number /= 10; ++count; } printf("Number of digits: %d", count); return 0; }

Learn more about program code at

https://brainly.com/question/33355523

#SPJ11

Pls answer this
The figure above is a type of thread known as
A. Acme thread B. Buttress thread
C. Square thread D. Vee thread

Pls answer thisThe figure above is a type of thread known asA. Acme thread B. Buttress threadC. Square

Answers

Answer:

It looks like an Acme thread.

Explanation:

what does the U in fun stand for?​

Answers

Answer:

You and me

Explanation:

F is for friend and N is for anytime and anywhere

Define a function checkvalues() with no parameters that reads integers from input until integer 0 is read. The function returns true if none of the integers read before 0 are in the range 1000 to 2000 inclusive, otherwise, returns false

Answers

Boolean logic can be used to explain memory locations or circuit states function in computer operations with binary values that are either charged (1 or true) or not charged (0 or false).

#include <iostream>

using namespace std;

int main()

{

 bool allNegative;

 allNegative=CheckVals();

 if(allNegative==true)

     cout<<"All match";

 else

     cout<<"All not match";

 return 0;

}

To provide a result that can be used for additional processing, the computer can perform an AND gate or an OR gate operation. The outcomes of applying AND and OR operations to two contrasted states are displayed in the following table.

Learn more about function here:

brainly.com/question/15051950

#SPJ4

For telephone lines to carry data, a communications device called a(n) __________ is used to convert digital signals to analog signals.

Answers

To enable data transmission over telephone lines, a communications device known as a modem is utilized to convert digital signals into analog signals.

For data to be transmitted over traditional telephone lines, which primarily support analog signals, it must be converted from digital form to analog form. This is accomplished using a device called a modem, short for modulator-demodulator. A modem is responsible for modulating digital signals into analog signals that can be transmitted over the telephone lines. It achieves this by translating the binary code of digital data into varying frequencies or amplitudes that can be represented as analog signals. At the receiving end, another modem is employed to demodulate the analog signals back into their original digital form, enabling the data to be processed by computers or other digital devices. Modems play a crucial role in facilitating data communication over telephone lines by bridging the gap between digital and analog signals.

For more information on Modem visit: brainly.com/question/14352682

#SPJ11

write an algorithm to calculate the area of four walls​

Answers

The area A of four walls of a room of length l, breadth b and height h is given by the formula A=2(l+b)h.

the lymph node excision category codes are based on what two things

Answers

Lymph node excision category codes are based on what two things?The lymph node excision category codes are based on two things: the area in which the lymph node is located and the reason for the excision.The American College of Surgeons (ACS) and the Commission on Cancer.

Developed the Current Procedural Terminology (CPT) code system, which is used to record procedures performed in hospitals and outpatient facilities in the United States. CPT code is a five-digit numerical code assigned to each procedure, which is used to standardize reporting and billing for medical procedures.

In medical coding, there are two types of lymph node excision codes: axillary and inguinal lymph node excision codes. These codes are used to identify the location of the excision. Lymph nodes in the axillary area are identified with code range 38500-38542, while lymph nodes in the inguinal area are identified with code range 38562-38564.Coding for lymph node excision is essential for proper patient management and insurance billing.

To know more about excision visit:

https://brainly.com/question/30551460

#SPJ11

Help PLEASE ILL MARK as brainlest

Help PLEASE ILL MARK as brainlest

Answers

Answer:

computer animation (3d)

. Prove that every polynomial of degree k, p(n) = aknk + ak-1nk-1 + ... +a0 with ak> 0, belongs to \Theta (nk)

Answers

Answer:

The answer is explained below

Explanation:

i) \(p(n) \ is\ an\ element\ of\ O(n^k)\)

Therefore \(p(n)\leq c.n^k,therefore\ p(n) \ is\ an\ element\ of\ O(n^k)\)

ii) \(p(n) \ is\ an\ element\ of\ \Omega(n^k)\)

\(p(n)=a_kn^k+a_{k-1}n^{k-1}+.\ .\ .+a_o\\p(n)=a_kn^k(1+\frac{a_{k-1}}{a_k}\frac{1}{n} +.\ .\ .+\frac{a_o}{a_k}\frac{1}{n_k} )\\p(n)=1, as\ n\ tends\ to\ \infty, the \ limit\ in\ the \ parenthesis=1. For\ c=\frac{1}{2}a_k,n\geq n_o \\Therefore:\\p(n)\ge \frac{1}{2}a_kn^k=c.n^k\)

\(p(n) \ is\ an\ element\ of\ \Omega(n^k)\)

From i and ii, \(p(n) \ is\ an\ element\ of\ \Theta(n^k)\)

Write a program that will add up the series of numbers: 99,98, 97...3.2.1. The program should print the running total as well as the total at the end.
The program should use one for loop, the range() function and one print() command.
Sample Run
99
197
294
390
-
4940
4944
4947
4949
4950

Answers

Answer:

result = 0

for i in range(99, 0, -1):

   result += i

   print(result)

Explanation:

It gives back a series of numbers that begin at zero, increase by one by default, and end just before the specified number. There are three criteria total, and two of them are optional.

What range() function and one print() command?

For the range() method to produce the integers in reverse order, use a negative step value. For instance, the expression range(5, -,1, -1) will result in the integers 5, 4, 3, 2, and 1.

By setting the step argument of a range() function to -1, you may effectively reverse a loop. Reverse iteration of the for loop's iterations will result.

The range() function returns a series of numbers that, by default, starts at 0 and increments by 1 before stopping in a given number.

Therefore, Instead of being a physical hardware device, a software calculator is one that has been implemented as a computer program.

Learn more about function here:

https://brainly.com/question/18065955

#SPJ5

Calculate the mass (in mg) if a sample of your unknown liquid from part C has a volume of 0.0825 fl. oz. Use the density you calculated, and use dimensional analysis for all steps (not algebra).

Answers

To calculate the mass of the sample in milligrams (mg), we need to convert the volume from fluid ounces (fl. oz) to milliliters (ml) and then use the density.

1 fl. oz is approximately 29.57 ml. Therefore, the volume of the sample is 0.0825 fl. oz * 29.57 ml/fl. oz = 2.438 ml.

Using dimensional analysis, we can multiply the volume (2.438 ml) by the density (in mg/ml) to obtain the mass in milligrams:

2.438 ml * density (mg/ml) = mass (mg)  Since the density value was not provided, it cannot be used in the calculation without additional information.

Learn more about dimensional analysis here:

https://brainly.com/question/30303546

#SPJ11

which of the following does not relate to system design

Answers

Among the options provided, "User interface design" does not directly relate to system design.

While user interface design is an essential aspect of software development, it is more closely associated with the user experience (UX) and user interface (UI) design disciplines, which focus on creating interfaces that are intuitive, visually appealing, and user-friendly.

System design, on the other hand, involves the process of defining and specifying the architecture, components, and functionality of a system. It encompasses various aspects such as system requirements, data design, network design, software design, and hardware design. System design is concerned with creating a robust and efficient system that meets the desired objectives and addresses user requirements.

While user interface design may influence certain aspects of system design, such as the usability and accessibility of the system, it is a distinct discipline that primarily focuses on the visual and interactive aspects of the user interface.

Learn more about user interface design here:

https://brainly.com/question/30869318

#SPJ11

A user tells a help desk technician that their browser is displaying a message that a site can't be
reached. When asked, the user tells the technician that other users in the same office can browse to the site. The technician suspects that the web server's name is not being translated to the correct IP address. The technician asks the user to open a command prompt window.
Which of the following commands would confirm the technician's assumption? (Select TWO).
A. netdom
B. ipconfig
C. nslookup
D. ifconfig
E. ping

Answers

Answer:

C. nslookup

E. ping

Explanation:

The two commands that would confirm this assumption would be nslookup and ping. The command nslookup will show you a mapping of the DNS and the IP address, this includes the name server and how it is being translated to the correct IP address. The ping command will send a small piece of data to the IP address of the website that you are trying to access and listen back for a response. If a response is received it means that the website was reached correctly and is fully operational. Both of these commands combined will allow you to determine whether the technician's assumption was correct.

Asking for certain data twice is

Answers

Answer:

repetitive..

what are the options

Explanation:

Other Questions
A point is moving on the graph of xy = 3. When the point is at (1, 3), its x-coordinate is increasing at a rate of 4 units per second. What is the speed of the y-coordinate at that moment and in which direction is it moving? The equation x squared space equals space 25 has two solutions. This is because both 5 space cross times space 5 space equals space 25 , and also short dash 5 space cross times space short dash 5 space equals space 25. So, 5 is a solution, and also -5 is a solution.Select all the equations that have a solution of -4. List each of the 50 states and their state capitals. What is the overall direction of global air currents at the equator?. I don't know what to do The slope of a line is 3 and it passes through point (-1,4). What is the equation of thelines How did the British Parliament react to the Boston Tea Party? a cube length has a side length of 7 meters. A smaller cube with side length 3.5 has been cut out of the larger cube Laser vision correction often uses an excimer laser that produces 193-nm electromagnetic radiation. This wavelength is extremely strongly absorbed by the cornea and ablates it in a manner that reshapes the cornea to correct vision defects. Explain how the strong absorption helps concentrate the energy in a thin layer and thus give greater accuracy in shaping the cornea. Also explain how this strong absorption limits damage to the lens and retina of the eye. area of a parallelogram find the areas of the parallelograms whose vertices are given in exercises 3540. Which of the following is a characteristic of Expressionist Wassily Kandinsky's Improvisation 31? Improvisation Thirty-one, painting by Wassily Kandinsky, colorful abstract subtitled Sea Battle It uses a neutral color palette and subtle contrasts in value.The absence of pure black makes the colors stand out.It uses distortion and exaggeration for emotional impact.The geometric composition provides order and structure. President theodore roosevelt speak softly and carry a big stick'' foreign policy was based on brainly. FILL THE BLANK. ______ and ______ are categorized as childhood trauma- and stressor-related disorders in the dsm-5. In cells, long pieces of DNA are organized with the help of. How might the principles of coding and the structure of programming languages be useful in other fields of study, like physics, chemistry, the arts, the social sciences, etc.? lily wants to find out how many students in her school enjoy pizza. describe a method she could use to get a representative sample without asking every single student in her school whats the answer to this journalist thomas friedman's description of the world as "flat" refers to: ASAP!!What does Paine say the colonists have a right to do?Take time to think about what to do nextOpen a door to eternal tyrannyForm a new governmentA government of our own is our natural right: And when a man seriously reflects on the precariousness of human affairs, he will become convinced, that it is infinitely wiser and safer, to form a constitution of our own in a cool deliberate manner, while we have it in our power, than to trust such an interesting event to time and chance . . . Ye that oppose independence now, ye know not what ye do; ye are opening a door to eternal tyranny, by keeping vacant the seat of government. There are thousands, and tens of thousands, who would think it glorious to expel from the continent, that barbarous and hellish power. What kind of society was in utopia?