How would an administrator configure a static route for use if a primary route failed?
configure the route with a metric greater than the default value
configure the route and the router will activate it as needed
configure the route to activate by using the redistribute static command
configure the route with an administrative distance greater than the default value

Answers

Answer 1

To ensure network connectivity in case of a primary route failure, an administrator would need to configure a static route as a backup.

This can be achieved by configuring the static route with an administrative distance greater than the default value. Additionally, the administrator can also configure the route with a metric greater than the default value, which will make the route less preferred than the primary route.

To configure a static route for use if a primary route failed, an administrator would configure the route with an administrative distance greater than the default value. This ensures that the backup route will only be used when the primary route is unavailable, providing network redundancy and maintaining connectivity.

To know more about connectivity visit:

https://brainly.com/question/29977388

#SPJ11


Related Questions

Which of these are true?
int main()
{
vector v{1, 2, 3};
for (auto i = v.size() - 1; i >= 0; i--)
cout << v[i] << " ";
cout << endl;
}

Answers

The code creates a vector of integers with values 1, 2, and 3 and then prints out the elements in reverse order.

The code declares a vector of integers with values 1, 2, and 3 using the uniform initialization syntax. Then, a for loop is used to iterate through the vector elements in reverse order, starting from the last index (v.size() - 1) and going backwards until the first index (0).

The loop prints out each element using the subscript operator ([]) with the current index (i) and a space character. Finally, the code outputs a newline character using the endl manipulator. As a result, the output of this program would be "3 2 1" followed by a newline.

For more questions like Code click the link below:

https://brainly.com/question/30753423

#SPJ11

which kind of system software tells the computer how to communicate with peripherals, such as a printer or scanner?

Answers

The kind of system software that tells the computer how to communicate with peripherals, such as a printer or scanner, is known as "device driver."

A device driver is a set of computer programs or software files that run specific devices or gadgets to perform their designed functions while connected to the computer system.

A device driver is a form of software file that ensures hardware device functions as designed.

Several types of device drivers include:

BIOS;Motherboard Drivers;Hardware Drivers;Virtual Device Drivers.

Hence, in this case, it is concluded that the correct answer is Device Driver.

Learn more here: https://brainly.com/question/19473613

how can online presence help others?

Answers

Answer:

Online Presence helps others who might be naturally introverted, stuck in a precarious situation, or even by allowing someone company who desperately needs it.

Explanation:

PLEASEEEE THIS IS NEXT PERIOD ,,,,Software providers release software updates on a regular basis. However, most people feel that they are unnecessary. Discuss why it is necessary to apply software updates regularly and how these updates affect the performance of the software programs.

Answers

if you do not update a software the system will not work properly

Answer: all it wants is to you to do is write about why software updates are important. example, because the software has a glitch they need to patch. In the update they patched it.

Explanation: May i plz have brainliest?

what is Information communication technology?

Answers

Information communication is the use of devices to communicate with others such as family and friends.

Print even numbers till 50 in python coding.

Answers

In python, you can use a simple list comprehension to solve this problem.

print([x for x in range(51) if x % 2 == 0])

This code prints all the even numbers from 0 to 50 including 0 and 50.

In what way is the traffic of an early business computer network different from that of an early scientific - academic network? is there such a distinction between these two types of systems today

Answers

Early business networks focused on transactional data, while early scientific-academic networks prioritized research collaboration. Today, the boundaries have blurred.

In the early days of computer networks, there were indeed notable differences between business networks and scientific-academic networks. However, it's important to note that these distinctions have evolved over time, and today the boundaries between these types of networks are often blurred.

In the early business computer networks, such as those used in corporate environments, the primary focus was on supporting business operations. The traffic on these networks was predominantly centered around transactional data, financial information, inventory management, and other business-related activities. These networks were primarily designed to facilitate internal communication and information sharing within an organization.

On the other hand, early scientific and academic networks were often more focused on research and collaboration among academic institutions and scientific communities. These networks aimed to connect researchers, share scientific data, and facilitate communication among academic institutions. The traffic on these networks was often related to research projects, academic papers, data analysis, and collaboration tools.

Today, the distinction between business and scientific-academic networks has become less pronounced. Many organizations, including businesses, educational institutions, and research facilities, have interconnected networks that serve a variety of purposes. For example, businesses often collaborate with academic institutions on research projects, and academic institutions have their own business-related operations.

Moreover, the internet has become a ubiquitous platform that connects diverse users and purposes. As a result, the traffic on modern computer networks encompasses a wide range of activities, including business transactions, scientific research, academic collaboration, social media, entertainment, and more. The distinction between business and scientific-academic networks has blurred, as many organizations and individuals now engage in multiple types of activities using the same network infrastructure.

In summary, while there were once distinct differences in the traffic between early business computer networks and early scientific-academic networks, those distinctions have become less prominent in modern times due to the interconnected nature of networks and the diverse activities conducted across them.

Learn more about computer networks,

brainly.com/question/14276789

#SPJ11

_____ occurs when a social network user clicks a link and enables malware to post unwanted links on their page. A) Adware B) Phishing C) Clickjacking D) Malicious script scams

Answers

Answer:

I believe the answer is Malicious script scam

Explanation:

Attackers send the program to victims after attaching it. JavaScript and HTML Applications (HTA) are two additional ways to run malware using a script. Thus, option D is correct.

What Malicious script scams enables malware?

Malicious scripts are computer programs that are used on websites to upload malware such as viruses, adware, worms, backdoor assaults, Trojan horses, bots, logic bombs, and spyware by taking advantage of system weaknesses and vulnerabilities.

Attackers send the program to victims after attaching it. JavaScript and HTML Applications (HTA) are two additional ways to run malware using a script.

One of the most prevalent and hazardous forms of malware that takes private information is called a keylogger, which is a type of spyware.

Therefore, Keylogger software is employed by software businesses for legal development improvement purposes, but it is also maliciously employed by hackers to steal data.

Learn more about malware here:

https://brainly.com/question/14276107

#SPJ5

When you add a zero to the right of a decimal number, it multiplies its value by 10 (For example, "15" becomes "150"). What similar result happens to the value of a binary number when you add a zero on the right? (For example, "11" would become "110").

Answers

Putting a 0 on the right side of a binary number it multiplies it by 2.

Hope this helps ʕ•ᴥ•ʔ

When you you add zero to the right hand side of a binary number such as 11, This binary number is going to become twice its value.

All the number that were 1 are now two times of what they were. We would have a solution like this:

(11)₂ = (1x2)¹ + (1x2)⁰

= 2 + 1

= 3

(110)₂ = (1x2)² + (1x2)¹ + (0x2)⁰

= 1x4 + 1x2 + 0x1

= 4+2+0

= 6

In conclusion, adding 0 to the right hand side of a binary number increases the number by 2. From  the solution above, we can see 11 = 3, but after 0 was added, 110 = 6

Read more at https://brainly.com/question/14789125?referrer=searchResults

which functions are performed by server-side code??​

Answers

Answer:

The answer is explained below

Explanation:

Server side code is a code built using the .NET framework so as to communicate with databases which are permanent. Server side code is used to store and retrieve data on databases, processing data and sending requested data to clients.

This type of code is used mostly for web applications inn which the code is being run on the server providing a customized interface for users.

HELP PLEASE!!!! Which type of prototyping is most often associated with the rapid prototyping development method?

Incremental
Throwaway
Evolutionary
Rapid

Answers

Answer:

That will be Throwaway

Answer:

1. In the context of systems development, which of the following most closely matches the definition of a requirement?

(A)the guidelines to be met in the design of a system

2. Which of the following situations demonstrates a weakness of the systems development life cycle (SDLC)?

(D)The client decides he or she wants to change the purpose of the project.

3. Which of the following is the worst reason to upgrade the operating system on your company’s computers?

(D)The new operating system is able to play modern games, so employees will have some leisure time.

4. Your team has almost completed work on developing a system designed to track inventory at grocery store. The client then sends an e-mail asking if the system can also track employee work hours. This challenge is an example of

(C)requirements creep

5. Which of the following is a disadvantage of outsourcing?

(C)The contracting company may not be able to perform the task.

6. Which of the following accurately portrays the correct sequence for the five phases in the Systems Development Life Cycle (SDLC)?

(B)planning; analysis; design; implementation; maintenance

7. Which of the following situations demonstrates a strength of the Systems Development Life Cycle (SDLC)?

(D)The process set up by the team allows for lots of flexibility.

8. During which phase of the Systems Development Life Cycle is the feasibility study conducted?

(D)planning

9. Which of the following happens during the implementation phase of the Systems Development Life Cycle (SDLC)?

(B)Convert data to be compatible with the new system.

10. After defining the scope of the system, the next step is to...

(C)determine requirements

Explanation:

Selective colleges choose to have in-person meetings to learn more about the applicants. These meetings are called:

A. college recruiting meetings.
B. personal meetings.
C. student orientations.
D. college interviews

Answers

The meeting is called collage interviews

Selective colleges choose to have in-person meetings to learn more about the applicants. These meetings are called college interviews. Thus, option D is correct.

What is a College?

A college has been either an educational institution or itself or one of its component parts. A college would be the secondary school, a part of the a collegiate or the federal university, a postsecondary institution offering the degrees, or the facility providing the vocational training.

A college could be the high school or the secondary school, a college of the further education, a training facility that would grants trade qualifications,as well as a higher-education provider without university status, or the component part of a university.

In the United States, a college may provide undergraduate programs as an independent institution, as the undergraduate division of a university, as a residential college of a university, as a community college, or as the undergraduate division of a non-profit organization.

To learn more about College, visit:

brainly.com/question/4217955

#SPJ2

In the following citation for a website, which detail is optional, according to
MLA style?
Manufacturers Association for Plastics Processors. Home page. Web. 6 Mar.
2014 .
A. Web.
B. 6 Mar. 2014.
C.
D. Home page

Answers

According to MLA style, the detail which is optional in the given citation for a website is: C. mapping link.

What is an information source?

An information source can be defined as a system or medium through which information, knowledge and ideas may be gotten (generated) and used by an individual.

What are citations?

Citations can be defined as references or links to all of the sources from which an author, writer, or researcher got his or her information from.

The characteristics of a MLA citation.

Generally, MLA citation often comprises the following information:

Author's last name and first name.Title of source.Title of container.Other contributors.VersionThe name of the publisher.Publication date.Location.

According to MLA style, the detail which is optional in the given citation for a website is mapping link.

Read more on citations here: https://brainly.com/question/8789070

#SPJ1

Complete Question:

In the following citation for a website, which detail is optional, according to

MLA style?

Manufacturers Association for Plastics Processors. Home page. Web. 6 Mar.

2014 .

A. Web.

B. 6 Mar. 2014.

C. Mapping link

D. Home page

Select the correct answer.
Which key is used to indent the first line of a paragraph to the right?
A.
Ctrl
B.
Shift
C.
Tab
D.
Enter
E.
Alt

Answers

Answer:

Which key is used to indent the first line of a paragraph to the right?

C. Tab

Explanation:

You're welcome.

Answer: I think E. Alt….

Explanation: why not pick E…..

I hope this helps^^

Assume a file containing a series of integers is named numbers.txt and exists on the computers disk. Write a program that calculates the average of all the numbers stored on the file. Write this in Python

Answers

Answer:Here is one way to calculate the average of all the numbers stored in a file named "numbers.txt" in Python:

Explanation:

# Open the file for reading

with open("numbers.txt", "r") as file:

   # Read all the lines in the file

   lines = file.readlines()

   

   # Convert each line to an integer

   numbers = [int(line.strip()) for line in lines]

   

   # Calculate the sum of the numbers

   total = sum(numbers)

   

   # Calculate the average by dividing the total by the number of numbers

   average = total / len(numbers)

   

   # Print the result

   print("The average of the numbers is", average)

Which of the following is an accurate definition of a computer system? A computer system consists of the operating system that tells the computer how to execute commands. A computer system is a network that allows computers, tablets, smartphones, etc. to connect to the Internet. A computer system is a collection of hardware and software components that work together to meet the needs of the user. A computer system is a group of hardware devices that work together.

Answers

Answer:

I believe it's  A computer system consists of the operating system that tells the computer how to execute commands.

Explanation:

Which is the best method for sending a word-processor document to another
person via e-mail?

Answers

Answer:

Attach the document to the e-mail message as a file attachment.

Hope this helps :)

which is the correct syntax for mapping drive letter w to a shared folder named accounting on the finance server

Answers

Answer:

net use W: \\Finance\Accounting

Explanation:

a host in your network has been assigned an ip address of 192.168.181.182 /25. what is the subnet to which the host belongs?

Answers

Answer:

the subnet is 192.168.181.128

Explanation:

The subnet to which the host belongs can be determined by examining the subnet mask associated with the given IP address. In this case, the IP address 192.168.181.182 is associated with a subnet mask of /25, which corresponds to the decimal value 255.255.255.128.

To determine the subnet to which the host belongs, we need to perform a bitwise AND operation between the IP address and the subnet mask. This will give us the network address, which identifies the subnet. The calculation is as follows:

IP address:    11000000.10101000.10110101.10110110 (192.168.181.182)

Subnet mask:   11111111.11111111.11111111.10000000 (255.255.255.128)

------------------------------------------------------------------------------------------------

Network address: 11000000.10101000.10110101.10000000 (192.168.181.128)

A predefined formula that performs calculations by using specific values in a particular order or structure.

Answers

Using specified values in a predetermined order or structure, a function is a formula that already exists and executes calculations.

A function is a predefined formula in mathematics, engineering, computer science, and other fields that performs a specific task by using a set of inputs, known as arguments or parameters, and returns a result. Functions are used to simplify complex calculations or operations, and they typically follow a specific syntax or structure that determines how the inputs and outputs are processed.

Functions can perform a wide range of tasks, from basic arithmetic operations like addition and subtraction to complex statistical analysis, data processing, and machine learning algorithms. They can take any number of inputs and return any type of output, depending on their specific purpose and implementation.

Functions are widely used in programming languages like Python, Java, and C++, as well as in spreadsheet applications like Ms Excel and Sheets, where they provide a powerful tool for performing calculations and automating tasks.

Learn more about  function here:

https://brainly.com/question/29796477

#SPJ4

Find an inverse of a modulo m for each of these pairs of relatively prime integers using the method followed in Example 2. a) a = 4, m = 9 b) a = 19, m = 141 c) a = 55, m = 89 d) a = 89, m = 232 12. Solve each of these congruences using the modular in- verses found in parts (b), (c), and (d) of Exercise 6. a) 34x = 77 (mod 89) b) 144x = 4 (mod 233) c) 200x = 13 (mod 1001)

Answers

(a) Inverse of 4 modulo 9 is 7. (b) Inverse of 19 modulo 141 is 59.                  (c) Inverse of 55 modulo 89 is 11.  (d) Inverse of 89 modulo 232 is 17.

To find the inverse of a modulo m, we follow the method of Example 2. We use the extended Euclidean algorithm to find integers x and y such that ax + my = 1, where a and m are the given integers. The inverse of a modulo m is the x value.

(a) In the case of a = 4 and m = 9, we find that 4 * 7 + 9 * (-3) = 1. Therefore, the inverse of 4 modulo 9 is 7.

(b) For a = 19 and m = 141, we have 19 * 59 + 141 * (-8) = 1. Hence, the inverse of 19 modulo 141 is 59.

(c) In the case of a = 55 and m = 89, we obtain 55 * 11 + 89 * (-7) = 1. Thus, the inverse of 55 modulo 89 is 11.

(d) Lastly, for a = 89 and m = 232, we find 89 * 17 + 232 * (-6) = 1. Therefore, the inverse of 89 modulo 232 is 17.

For solving congruences using the modular inverses found, we substitute the given equation into the form ax ≡ b (mod m) and multiply both sides by the modular inverse of a modulo m.

learn more about Euclidean algorithm here:

https://brainly.com/question/29760476

#SPJ11

please convert this for loop into while loop

please convert this for loop into while loop

Answers

Answer:

The code segment was written in Python Programming Language;

The while loop equivalent is as follows:

i = 1

j = 1

while i < 6:

     while j < i + 1:

           print('*',end='')

           j = j + 1

     i = i + 1

     print()

Explanation:

(See attachment for proper format of the program)

In the given lines of code to while loop, the iterating variables i and j were initialised to i;

So, the equivalent program segment (in while loop) must also start by initialising both variables to 1;

i = 1

j = 1

The range of the outer iteration is, i = 1 to 6

The equivalent of this (using while loop) is

while ( i < 6)

Not to forget that variable i has been initialized to 1.

The range of the inner iteration is, j = 1 to i + 1;

The equivalent of this (using while loop) is

while ( j < i + 1)

Also, not to forget that variable j has been initialized to 1.

The two iteration is then followed by a print statement; print('*',end='')

After the print statement has been executed, the inner loop must be close (thus was done by the statement on line 6, j = j + 1)

As seen in the for loop statements, the outer loop was closed immediately after the inner loop;

The same is done in the while loop statement (on line 7)

The closure of the inner loop is followed by another print statement on line 7 (i = i + 1)

Both loops were followed by a print statement on line 8.

The output of both program is

*

*

*

*

*

please convert this for loop into while loop

6.3.6: Create your own Encoding on codehs be confusing.

6.3.6: Create your own Encoding on codehs be confusing.
6.3.6: Create your own Encoding on codehs be confusing.

Answers

A general example of an encoding scheme that contains A-Z and space is given below.

How to illustrate the information

In this example, we can assign the following binary codes to each character:

A: 00

B: 01

C: 10

...

Z: 10101

Space: 10110

Using this encoding scheme, the phrase "HELLO WORLD" would be represented as:

00010101100101100110000010101011001010000001101

As you can see, this encoding scheme requires a varying number of bits to represent each character, with shorter codes assigned to more commonly used letters and longer codes assigned to less commonly used letters. This can help to minimize the total number of bits required to encode a message.

Learn more about encoding on

https://brainly.com/question/3926211

#SPJ1

What is the function of a slide transition in a presentation program?

Answers

Answer:

Just Aesthetics.

Explanation:

The slide transition can smooth out a transition between slides. The transition is purely aesthetic, so it has no actual purpose, other than looking cool.

Answer:

It adds visual effects when you move from one slide to another

Explanation:

the company currently has many of their services in the cloud, such as email, word processors, spreadsheet applications, etc. they also use the application, slack, for instant communication.

Answers

The company currently uses several services in the cloud, including email, word processors, spreadsheet applications, and more. These cloud services offer various benefits, such as easy accessibility, scalability, and reduced infrastructure costs.

One of the advantages of having email services in the cloud is that employees can access their emails from anywhere with an internet connection. This allows for greater flexibility and productivity. Additionally, cloud-based word processors and spreadsheet applications enable real-time collaboration among team members, enhancing efficiency and teamwork.

The company also utilizes the application Slack for instant communication. Slack provides a platform for team members to chat, share files, and collaborate in real-time. This fosters effective and efficient communication within the organization, regardless of location.

Overall, leveraging cloud services like email, word processors, spreadsheet applications, and tools like Slack can greatly benefit the company. These services provide easy access, enhance collaboration, and improve communication among employees.

To know more about services visit:

https://brainly.com/question/30418810

#SPJ11

define a function findlot() that takes two integer parameters as the hourly parking price and the parking duration, and returns the parking lot allocation as an integer. the lot is returned as follows:

Answers

a function findlot() that takes two integer parameters as the hourly parking price and the parking duration, and returns the parking lot allocation as an integer.

The lot is returned as follows:

int ComputeValue(int value1, int value2)

{

  return (value1 * value2) - 8;

}

//We assume that this function returns an int, but the product of the two values can get quite big.

The result may not fit into an int variable. If the values can exceed the limits of int, it might be better to change the return value to a 64 bit value.

//

long long ComputeValue(int value1, int value2)

{

   return ((long long)value1 * value2) - 8;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

2.Explain how attackers can access to a target computer on the Internet even though the computer is using private addressing.

Answers

Attackers can access a target computer on the Internet even though the computer is using private addressing by using a technique called IP spoofing.

IP spoofing is a technique that allows attackers to send packets to a target computer with a fake IP address. The target computer will believe that the packets are coming from the IP address that is assigned to the target computer, even though the packets are actually coming from the attacker.

This allows the attacker to bypass security measures that are in place to protect the target computer. So attackers can access a target computer on the Internet by using a technique called IP spoofing.

For more questions like IP spoofing click the link below:

https://brainly.com/question/28364108

#SPJ4

Three symptoms of spyware

Answers

Answer:

Random advertisements that pop up on your computer. Unusual slowness of your system. Unusual instability in your system, computer crashes more than usual

Explanation:

People are trying to hack into your computer

which statement is true of domain-specific self-esteem in adolescents? group of answer choices the best domain-specific predictor of global self-esteem in adolescents is their athleticism. the best domain-specific predictor of global self-esteem in adolescents is their ability to be outgoing. the best domain-specific predictor of global self-esteem in adolescents is their perception of their physical attractiveness. the best domain-specific predictor of global self-esteem in adolescents is their perception of their agreeableness.

Answers

The best domain-specific predictor of global self-esteem in adolescents is their perception of their physical attractiveness.

What is global self-esteem?

Global self-esteem is the individual’s overall evaluation of their own worth and capabilities. It is the ability to recognize one’s own value and accept that value as a positive attribute. Self-esteem is connected to how one views themselves and their place in the world.

Research has shown that physical appearance is a major factor in adolescents' global self-esteem, with a greater emphasis on physical attractiveness leading to higher self-esteem. Other factors such as athleticism, agreeableness, and being outgoing may influence self-esteem, but physical attractiveness is the strongest predictor of global self-esteem in adolescents.

To learn more about physical appearance
https://brainly.com/question/30473252
#SPJ1

Create a new table called db_Supplier with the following information : Id int
CompanyName nvarchar(40)
ContactName nvarchar(50)
ContactTitle nvarchar(40)
City nvarchar(40)
Country nvarchar(40)
Phone nvarchar(30)
Fax nvarchar(30)
Primary Key : Id Constraints: CompanyName - NOT NULL, Rest of them are NULL

Answers

The "db_Supplier" table has columns for Id, CompanyName, ContactName, ContactTitle, City, Country, Phone, and Fax.

What is the structure and constraints of the "db_Supplier" table?

The table "db_Supplier" is created with the specified columns and constraints.

The "Id" column is of type integer and serves as the primary key for the table. The "CompanyName" column is of type nvarchar(40) and is set to NOT NULL, meaning it must have a value for each row.

The remaining columns, "ContactName," "ContactTitle," "City," "Country," "Phone," and "Fax," are of type nvarchar and allow NULL values, indicating they are optional.

This table allows storing information about suppliers, including their company details, contact information, location, and communication details. The primary key ensures each supplier has a unique identifier.

Learn more about "db_Supplier"

brainly.com/question/5020975

#SPJ11

Other Questions
9-26 one hazard of space travel is debris left by previous missions. there are several thousand objects orbiting earth that are large enough to be detected by radar, but there are far greater numbers of very small objects, such as flakes of paint. calculate the force exerted by a 0.100-mg chip of paint that strikes a spacecraft window at a relative speed of 4.20e3 m/s, given the collision lasts 63.5 ns. The perimeter of a square is 64 cm.Calculate the area of the square. Write a paragraph in which you compare and contrast the strengths of fiction and nonfiction. Find the area of the figure in yards squared. 8.11 LAB: Count characters - functions Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. Ex: If the input is: n Monday, the output is: 1 Ex: If the input is: z Today is Monday, the output is: 0 Ex: If the input is: n It's a sunny day, the output is: 2 Case matters. n is different than N. Ex: If the input is: n Nobody, the output is: 0 Your program must define and call the following function that returns the number of times the input character appears in the input string. int CountCharacters(char userChar, const string Can I get help solving? does the earth need the sun to rotate on its axis ?? Practice 2-7 Try, Test, ReviseUse the try, test, revise strategy to solve each problem.1. The length of a rectangle is 9 in. greater than the width. The area is36 in. Find the dimensions. Which of the following statements is the least effective claim?A.Nineteenth-century authors may or may not have produced some of the most influential works in literature.B.Walt Whitman was one of the best 19th-century American writers.C.Nineteenth-century novels are absolutely relevant to readers today. D.Crime and Punishment is the greatest example of a 19th-century Russian novel. explain how the percent equation relates proportional quantities 6 Write a story in which running plays an important part. 300 words What is the purpose of the dna ladder in gel electrophoresis. Stress, distress, and strain You are in Ireland with a group of your friends on a hike. Suddenly, you come upon the Carrick-a-Rede Rope Bridge, a footbridge built over a 30-meter-deep chasm between two mountain tops. You are scared of heights. As your friends tell you how safe the footbridge is, you know that you must decide whether to cross the bridge or turn around to take the long route back to your hotel. Your decision is: a. A stress response b. A stressor c. Distress d. An environmental factor 3. A local charity wants to purchase a classic 1975 Chevy Monte Carlo for use as a prize in a fundraiser.They find the following eight prices in the paper$18,000$16,0003090$18,888b. What is the range?a. What is the best measure of central tendency to use to get a reasonable estimate forthe cost of the car? Explain. Which sign makes this number sentence true?QUESTION NO.2 PLEASE HELP!|78| __ |-222| A. > B. Please answer this question for me I need help!! Select all that apply The data for evaluating the proposed improvements (A to D) of interest are as in the table. - For every \( 1 \% \) of productivity increment, more product value added is \( 200 \mathrm{THB} \) - The c After reading through these pages and completing some of the activities, do you believe the decision to start a new business is a good one or would you advise that person to continue looking for employment? What are your reasons for coming to this conclusion? what are the disadvantages of using models such as diagrams study the rock cycle?