what is the value of the last octet of the default-gateway for a workstation with the ip address 172.16.77.21 /28

Answers

Answer 1

The  value of last octet of the default-gateway for a workstation with the IP address 172.16.77.21 /28 is 17

The subnet mask for the IP address 172.16.77.21 /28 is 255.255.255.240. This means that the network portion of the address is 172.16.77.16 and the host portion is 5 bits long.
The default gateway for a device on this network would typically be the first usable address in the subnet, which is 172.16.77.17.
The last octet of the default gateway is therefore 17.
Hi! To determine the value of the last octet of the default gateway for a workstation with the IP address 172.16.77.21/28, follow these steps:
Identify the subnet mask: A /28 prefix length corresponds to a subnet mask of 255.255.255.240.
Calculate the network address: Perform a bitwise AND operation between the IP address and the subnet mask. This results in 172.16.77.16.
Determine the default gateway: Typically, the default gateway is the first or the second usable IP address in the subnet. In this case, the first usable IP address is 172.16.77.17, and the second is 172.16.77.18.
Assuming the default gateway is the first usable IP address, the value of the last octet is 17. If the default gateway is the second usable IP address, the value of the last octet is 18.

For more such questions on IP address

https://brainly.com/question/14219853

#SPJ11


Related Questions

how to move toolbar in outlook from side to bottom

Answers

To move toolbar in outlook from side to bottom, simply right click on any of the icons and use the Move Up, Move Down, Unpin or Pin commands from the context menu.

The toolbar, also known as a bar or standard toolbar, can be described as a row of buttons, often near the top of an application window, that controls software functions. The boxes are below the menu bar and often contain images corresponding with the function they control. A toolbar mostly provides quick access to functions that are commonly performed in the program. For instance, a formatting toolbar in Mc Excel gives you access to things like making text bold or changing text alignment with other common buttons. In an Inter net browser, toolbars add functionality that may not come pre-installed. For instance, with the G toolbar, you can access exclusive G features.

Here you can learn more about toolbar in the link brainly.com/question/11496721

#SPJ4

what is a major difference between cyber vandalism and online priacy

Answers

Answer:

There really isn't a significant difference; two terms for the same things. B. Vandals want to disrupt and show off a viewpoint; the goal of online piracy is to steal money.

Answer:

Vandals want to disrupt and show off a viewpoint; the goal of online piracy is to steal money.

Explanation:

a p e x

A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryptio

Answers

Answer:

A) virus signature

Explanation:

Antivirus databases contain what are called signatures, a virus signature is a continuous sequence of bytes that is common for a certain malware sample.

--

Encryption is a way of scrambling data so that only authorized parties can understand the information.

Jack decides to apply a style to the vocabulary terms in his report. In the first section, he includes the vocabulary word "telescope.” The James Webb Telescope The James Webb Telescope, called Webb or JWST, is more powerful than the Hubble Space Telescope. A telescope is a tool used to view faraway objects. The Webb will have the ability to look at the first galaxies that formed the universe. It will also be able to look into dust clouds and observe how stars and planetary systems form. Which style did Jack use on the vocabulary words in his report?
strong
intense strong
emphasis
intense emphasis

Answers

Answer:

intense emphasis

Explanation:

I got it right

Answer:

D. intense emphasis

Explanation:

I just answered the question

edge 2021

The ____ command is used to restore the table's contents to their previous values.
a. COMMIT; RESTORE;
b. COMMIT; BACKUP;
c. COMMIT; ROLLBACK;
d. ROLLBACK;

Answers

To return the table's contents to their previous values, use the ROLLBACK command.

How can I get data out of a table in SQL?

To get data out of our tables, utilize the SELECT command in SQL. The output of this command is always a table, which we can use to develop dynamic web pages or desktop apps or to browse with our database client software.

How would the table row "WHERE" be deleted? Which command would be used?

The DELETE command can be used to remove rows from a table. To delete individual rows or all rows from a table, use the DELETE command. Provide the table and an optional search condition (WHERE) that specifies which rows to delete in order to delete rows.

To know more about ROLLBACK command visit:-

https://brainly.com/question/29853510

#SPJ4

What is Zero day attack?
Explain the characteristics of zero day attack.
Explain the Zero day infection prevention.
Explain vulnerability Assessment services.
Explain the three major factors of software design flaws.

Answers

Zero-day attack refers to a cyber attack that exploits a previously unknown vulnerability in software or systems. It takes advantage of the fact that developers have had zero days to address and patch the vulnerability.

Characteristics of a zero-day attack include the following:

1. Novelty: The vulnerability is unknown to the software vendor and the public, providing attackers an advantage.

2. Limited defense: Since the vulnerability is unknown, there are no patches or fixes available to protect against the attack.

3. Stealth: Attackers can execute the attack without detection since security solutions are not prepared for the specific exploit.

4. High impact: Zero-day attacks can cause significant damage as they target vulnerabilities that are not yet mitigated.

Zero-day infection prevention involves proactive measures to mitigate the risk of zero-day attacks. This includes:

1. Security patches and updates: Regularly updating software and systems with the latest patches helps close known vulnerabilities.

2. Intrusion detection systems: Employing advanced intrusion detection systems can help detect and block unknown attacks.

3. Threat intelligence: Staying informed about emerging threats and vulnerabilities can aid in the early detection and prevention of zero-day attacks.

Vulnerability assessment services involve assessing and identifying vulnerabilities in a system or network. These services aim to uncover potential security weaknesses that could be exploited by attackers. The assessment typically includes:

1. Scanning for vulnerabilities: Using automated tools to scan the network or system for known vulnerabilities.

2. Penetration testing: Conducting controlled attacks to identify potential security flaws and assess the system's ability to withstand attacks.

3. Reporting and remediation: Providing a comprehensive report with identified vulnerabilities and recommendations for remediation.

The three major factors of software design flaws are:

1. Incorrect implementation: Mistakes made during the coding phase can introduce vulnerabilities and weaknesses.

2. Insufficient input validation: Failure to properly validate and sanitize user input can lead to security vulnerabilities like injection attacks.

3. Inadequate security controls: Lack of proper security controls, such as authentication, authorization, and encryption, can leave software exposed to attacks.

Zero-day attacks exploit unknown vulnerabilities, making them particularly dangerous. Preventing such attacks requires a combination of proactive measures, including regular updates, intrusion detection systems, and threat intelligence. Vulnerability assessment services help identify weaknesses in systems and networks, enabling organizations to address them proactively. The three major factors contributing to software design flaws are incorrect implementation, insufficient input validation, and inadequate security controls. By understanding these factors, developers can take steps to minimize vulnerabilities and enhance software security.

To know more about Implementation visit-

brainly.com/question/13194949

#SPJ11

An example of documentary evidence that might be presented at trial for a cyber crime is:


A. None of these choices.

B. data retrieved from slack space on a hard drive.

C. a cellular telephone.

D. a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses.

Answers

It’s d cause it has valuable info that the person was using to commit the crime

An example of documentary evidence that might be presented at trial for cybercrime is a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses. Thus, option D is correct.

 

What is the evidence?

Evidence is really the data used to attempt to support anything in a court of justice. Evidence is gathered from people, artifacts, and records. The only means through which the court may draw conclusions and reach a ruling is via the use of evidence.

According to the definition of information, it is the demonstration of any claim to be true. A hard copy of a hacker's worksheet with contact information and e-mail accounts is an illustration of documented evidence that might be used in court to prove a cybercrime. Therefore, option D is the correct option.

Learn more about evidence, here:

https://brainly.com/question/14370298

#SPJ2

2 points
1. Which characters are normally used to represent the root of the Floppy
disk drive? *
a) C1
b) A:
c) B:
d) D:
points

Answers

Answer:

B) A:

Explanation:

define the computer with its workintg principple

Answers

Explanation:

Computer is an electronic device that is designed to work with information.

WORKING PRINCIPLE OF COMPUTER

a.It accepts data and instructions by way of input,

b.It stores data,

c.It can process data as required by the user,

d.It gives result in the form of output,

e.It controls all operations inside a computer.

I hope it will help you

According to the narrator of "EPIC 2015, in 2015, "news" is:
A. fed to a monitor in all homes and is required to be on at all times.
B. provided by hard-working journalists who are committed to truth.
C. reorganized and combined with other information for individuals.
D. created by apathetic journalists who care little how true a story is.

Answers

Answer:

D created by apathetic journalists who care little how true a story is.

Explanation:

D

Based on the narrator of "EPIC 2015, in 2015, "news" is reorganized and combined with other information for individuals.

What is a reorganization?

The term  reorganization connote a vital and disruptive way that is used to restore a troubled business or any other thing to ensure its usefulness. It can be through the act of shutting or through the act of replacement, etc.

Conclusively, using the narrator point of view as written in "EPIC 2015, in 2015, "news" as said to have been reorganized and there was a combination of news with other information for people.

Learn more about narrator from

https://brainly.com/question/1934766

Which of the following is not described in Chapter 6 as a strategy to maintain network security?
Select one:
a. firewall
b. bring your own device (BYOD) policy
c. computer-user policies
d. virtual private network (VPN)

Answers

In Chapter 6, Bring your own device (BYOD) policy is not described as a strategy to maintain network security. Option B.

Network security involves protecting the network and the devices connected to it from unauthorized access, misuse, modification, destruction, or improper disclosure. It includes various strategies, such as authentication, authorization, encryption, firewalls, antivirus software, intrusion detection and prevention systems, virtual private networks (VPNs), computer-user policies, and so on.

In Chapter 6, computer security strategies are described to maintain network security, including firewalls, virtual private networks (VPN), and computer-user policies. But Bring your own device (BYOD) policy is not described as a strategy to maintain network security.

Hence, the right answer is option B. Bring your own device (BYOD) policy

Read more about BYOD at https://brainly.com/question/32968386

#SPJ11

why do we need normalization? a. improve the productivity b. to store the data accurately c. implement the data model d. to remove redundant data

Answers

Normalization is necessary to ensure that data is stored accurately and efficiently in a database. Normalization helps to reduce data redundancy and improve data integrity. It also helps to simplify the data model, making it easier to implement and maintain.

What is Database?
A database is a collection of information that is organized in a manner that allows for easy retrieval, manipulation, and updates. It is a structured set of data that is stored in a computer system, and is accessible in various ways and for various purposes. A database is typically composed of tables, fields, and records, which are all connected in some way. The tables and fields are organized into a relational model, which provides the ability to connect and link information from different sources.

To know more about Database
https://brainly.com/question/518894
#SPJ4

what is the syntax and function of the HTML tags
<BODY>​

Answers

Answer:

Definition and Usage The <body> tag defines the document's body. The <body> element contains all the contents of an HTML document, such as headings, paragraphs, images, hyperlinks, tables, lists, etc. Note: There can only be one <body> element in an HTML document.

You were conducting a forensic analysis of an iPad backup and discovered that only some of the information is within the backup file. Which of the following best explains why some of the data is missing

Answers

The backup being examined in this case is probably a differential backup that contains the data that has changed since the last complete backup.

How does forensic analysis work?

A thorough study to determine the cause, origin, perpetrators, and outcomes of a security event or a breach of company policy or federal law is known as forensic analysis. Particularly in criminal cases, forensic analysis is frequently associated with evidence presented to the court.

What is the work of a forensic analyst?

Forensic science technicians often perform the following tasks in labs: Analyze the forensic evidence you have collected from crime scenes using chemical, biological, and microscopic methods. Investigate potential connections between suspects and criminal conduct using DNA or other scientific analysis findings.

To know more about forensic analysis visit:

https://brainly.com/question/4327079

#SPJ4

What are the steps for consolidating data from multiple worksheets? 1. Select the range of data on the first worksheet you wish to consolidate. 2. Go to the Data tab on the ribbon and select Data Tools. 3. Then, select and the dialog box will appear. 4. Choose the in the drop-down. Then, select the first group of data and press Enter. 5. To add from more worksheets, select from the View tab. 6. To include more references, click .

Answers

Answer:

2. Go to the Data tab on the ribbon and select Data Tools.

3. Then, select and the dialog box will appear.

4. Choose the in the drop-down. Then, select the first group of data and press Enter.

1. Select the range of data on the first worksheet you wish to consolidate.

5. To add from more worksheets, select from the View tab.

Explanation:

Consolidation in Microsoft Excel is used to gather information from several worksheets. To consolidate data in a new worksheet, select the new worksheet and click on the upper left side where the data should be.

Click on Data > Consolidate, then a dialog box would appear. From the dialog box click on the function to consolidate with, then click on the reference area and select the first data range by clicking on the first worksheet and drag the data range to the box and click Add.

To add more data range, click on the reference area and do the same as the first data.

Answer:

consolidate, function, switch windows, add

Explanation:

I just took the test on

The Java library’s ........ interface defines functionality related to determining whether one object is greater than, less than, or equal to another object.
Any class that implements the Comparable interface must provide a ........ method
What does it mean for a class’s equals and compareTo methods to be "consistent"?
The size of a list is a fixed value, i.e., it does not change over time.
An ....... mechanism allows us to move through the elements of a data structure one at a time in a given sequence
The binary search algorithm can be implemented recursively. true or false
The binary search algorithm is O(log 2N), where N is the size of the list. true or false

Answers

The Java library’s Comparable interface defines functionality related to determining whether one object is greater than, less than, or equal to another object.

What is the role of a java library?

Any class that implements the Comparable interface must provide a compareTo method.

For a class's equals and compareTo methods to be "consistent", they must return the same results when comparing objects. That is, if two objects are considered equal according to the equals method, they must also be considered equal according to the compareTo method.

The size of a list is not necessarily a fixed value, as it can change over time with the addition or removal of elements.

An iterator mechanism allows us to move through the elements of a data structure one at a time in a given sequence.

The binary search algorithm can be implemented recursively. (True)

The binary search algorithm is O(log 2N), where N is the size of the list. (True)

Find out more on Java library here: https://brainly.com/question/25653505

#SPJ1

When they are retrieved, memories are often altered before they are stored again. This process is called _____.Please type the correct answer in the following input field, and then select the submit answer button or press the enter key when finished.

Answers

When they are retrieved, memories are often altered before they are stored again this process is called the retrieval practice effect.

What is Retrieval Practice Effect?

The technique of retrieving information from memory in order to improve learning is known as retrieval practice. When you retrieve anything from your memory, the connections that hold it there are strengthened, increasing the likelihood that you'll be able to recall it in the future.

Thus, the process is called a Retrieval Practice effect When they are retrieved, memories are often altered before they are stored again. The technique of retrieving information from memory in order to improve learning is known as retrieval practice.

Learn more about Retrieval Practice here:

https://brainly.com/question/15010721

#SPJ1

thor is working as a contractor for the department of defense (dod). to better secure their systems, each laptop is equipped with a device that requires all employees to insert their employee identification badges into the computer to log in. each identification badge has an electronic chip embedded into the badge. the employee must enter a pin to unlock the digital certificate stored in this badge to authenticate to the login server. which of the following technologies is used to read the employee's badge? smart card reader barcode scanner adf magnetic reader see all questions back skip question

Answers

The technology that is used to read the employee's badge is the smart card reader.

What is a Smart Card Reader?

A smart card reader is a device that communicates with smart cards to read the contents of the card and access its contents. Smart cards are physical cards that are embedded with a microchip and can be used as a security device to authenticate access to systems and facilities.

Therefore, in the given scenario, to secure the systems of the Department of Defense (DoD), each laptop is equipped with a device that requires all employees to insert their employee identification badges into the computer to log in.

Each identification badge has an electronic chip embedded into the badge, and to authenticate the login server, the employee must enter a PIN to unlock the digital certificate stored in this badge. The technology that is used to read the employee's badge is the smart card reader.

Learn more about card reader at

https://brainly.com/question/31012792

#SPJ11

write a program in Python and explain how we do the program

Answers

please send what program, I will help you.

Answer:

num1 = 1.5

num2 = 6.3

sum = num1 + num2

print('The sum of {0} and {1} is {2}'.format(num1, num2, sum))

Explanation:

This program adds up two numbers.

num1 = 1.5 means that a variable called num1 has been assigned to the number 1.5num2 = 6.3 means that a variable called num2 has been assigned to the value 6.3sum = num1 + num2 means that the variables num1 and num2 have been added together and their total has been assigned to the new variable sumprint('The sum of {0} and {1} is {2}'.format(num1, num2, sum)) means that the text that will be printed shall read out the sum of their answers formatted with brackets that are kept in place of their respective variables.

True or False: in excel, text that begins with a number is still considered text.

Answers

False. In Excel, a value that starts with a number is often interpreted as a numeric value rather than as text. But, you may format the cell as text before entering the value .

If you want to have Excel treat a value that starts with a number as text. To accomplish this, pick the desired cell or cells, do a right-click, select "Format Cells," and then select the "Text" format. You are true that Excel frequently interprets values that begin with numbers as numeric values. When working with data that includes both text and numbers, this behavior may provide unexpected outcomes. Excel tries to interpret cells that begin with numbers as numbers when it encounters them. Excel will read a cell as a number if it solely includes numeric characters (0–9, decimal point, negative sign). Excel will regard a cell as text if it contains any non-numeric characters. You can format the cell as text before entering the value if you want Excel to consider a value that begins with a number as text.

learn more about Excel  here:

https://brainly.com/question/30324226

#SPJ4

how to get seconds from datetime.datetime.now in python

Answers

Answer:

Python provides an operation on datetime to compute the difference between two dates. It finds the difference between the initial datetime object and the datetime object created from the time string. The value returned is a timedelta object from which we can use the function total_seconds() to get the value in seconds.

Explanation:

Which component of a DC motor ensures electrical connectivity to the rotor?



What is the value of the current in x?

Answers

Answer:

ketchup?

Explanation:

The technology that makes up an organization’s digital ecosystem is its:A. digital platformB. Internet of ThingsC. technology sponsorD. IT consumerizationE. IT monarchy

Answers

The technology that makes up an organization's digital ecosystem is its A. digital platform.

This platform includes all the hardware, software, and infrastructure that support the organization's digital activities and enable it to interact with customers, partners, and other stakeholders. The digital platform is essential for digital transformation and innovation, and it must be designed, managed, and optimized to meet the organization's needs and goals.

The other options listed - Internet of Things, technology sponsor, IT consumerization, and IT monarchy - are all related to digital technology, but they do not specifically refer to an organization's digital platform. So the correct answer is A. digital platform.

Learn more about digital platform: https://brainly.com/question/29782066

#SPJ11

How do I unpack a non iterable NoneType object?

Answers

How to Fix “TypeError: Cannot Unpack Non-iterable NoneType Object” Error in Python. This error was raised because we tried to unpack a None object. The simplest way around this is to not assign names. sort() as the new value of your list.

determine the total packet rate (g) for which the pure aloha and the slotted aloha achieve the maximum throughput each.

Answers

Answer: The total packet rate (G) for which the Pure ALOHA and Slotted ALOHA achieve the maximum throughput each can be determined using the following formulas:

For Pure ALOHA:

S = G * T

Gmax = 1 / (2 * T)

where:

S = channel utilization

T = packet transmission time (including propagation delay)

To find the value of G that maximizes S, we can take the derivative of S with respect to G and set it equal to zero:

dS/dG = 1 - 2G * T = 0

Gmax = 1 / (2 * T)

For Slotted ALOHA:

S = G * T * e^(-G*T)

Gmax = 1 / T

To find the value of G that maximizes S, we can take the derivative of S with respect to G and set it equal to zero:

dS/dG = T * e^(-GT) - G * T^2 * e^(-GT) = 0

Gmax = 1 / T

Therefore, the total packet rate (G) for which Pure ALOHA achieves the maximum throughput is Gmax = 1 / (2 * T), and the total packet rate for which Slotted ALOHA achieves the maximum throughput is Gmax = 1 / T.

Note that Slotted ALOHA has a higher maximum throughput than Pure ALOHA, as Slotted ALOHA reduces the probability of collisions by dividing the time into discrete slots.

To determine the total packet rate (g) for which pure aloha and slotted aloha achieve maximum throughput, we need to consider the formulas for throughput in each protocol.

For pure aloha, the throughput (S) is given by:

S = G * e^-2G, where G is the total packet rate.

To find the maximum throughput, we take the derivative of this equation with respect to G and set it equal to zero:

dS/dG = e^-2G - 2G*e^-2G = 0

Solving for G, we get G = 1/2, which means the maximum throughput for pure aloha occurs when the total packet rate is half the transmission rate.

For slotted aloha, the throughput (S) is given by:

S = G * e^-G, where G is the total packet rate.

Again, we take the derivative of this equation with respect to G and set it equal to zero:

dS/dG = e^-G - Ge^-G = 0

Solving for G, we get :

G = 1, which means the maximum throughput for slotted aloha occurs when the total packet rate is equal to the transmission rate.

Therefore, the total packet rate for maximum throughput in pure aloha is half the transmission rate, while the total packet rate for maximum throughput in slotted aloha is equal to the transmission rate.

To learn more about aloha visit : https://brainly.com/question/29222035

#SPJ11

checking to determine whether the proper screener questions were invoked would be part of which step in the data analysis procedure? validation coding machine cleaning data checks and balances

Answers

Which step in the data analysis process-Validation-invokes a check to see if the appropriate screener questions were used.

What is data analysis process?

Although numerous groups, organizations, and specialists approach data analysis in various ways, most of them may be boiled down into a general description.

Data analysis is the process of modifying, processing, and cleaning raw data in order to obtain useful, pertinent information that supports commercial decision-making.

The process offers helpful insights and statistics, frequently presented in charts, graphics, tables, and graphs, which lessen the risks associated with decision-making.

Every time we make a decision in our daily lives, we may observe a basic example of data analysis by assessing what has happened in the past or what will happen if we take that action.

In its simplest form, this process involves looking at the past or future and making a choice based on that analysis.

Hence, Which step in the data analysis process-Validation-invokes a check to see if the appropriate screener questions were used.

Learn more about  data analysis process click here:

https://brainly.com/question/29376166

#SPJ4

what is the name of a language that computer programmers use?

Answers

C and C++

Both are frequently utilized in programming and computer science. Programming in C and C++ is particularly portable since programmers have access to compilers for a wide range of systems.

Which Programming Languages Should You Learn in 2023?

The oldest and most used computer language is C, which serves as the basis for other programming languages including C#, Java, and JavaScript. A more complex version of C is C++. Currently, many developers completely ignore C, while others think that learning C provides a great foundation for C++ development. Both are frequently utilized in programming and computer science.

Programming in C and C++ is particularly portable since programmers have access to compilers for a wide range of systems. High-performance programming languages include C and C++. The result is they are commonly utilized in the development of applications where performance is crucial, such as client/server applications, commercial products such as Firefox and Adobe, and video games. C and C++ programmers Earn an annual salary of $118,366.

To know more about JavaScript visit:

brainly.com/question/28448181

#SPJ4

highlight the possible risks and problems that should be address during the implementation of information system process

Answers

Answer:

The answer is below

Explanation:

The possible risks and problems that should be addressed during the implementation of the information system process are:

1. power loss or data corruption

2. System design faults

3. Cultural barriers

4. Integration of Software Development device

5. Using the same processes in the company

6. Security breaches

7. Hardware and Software failure

8. Work environment

true or false? according to the case of diamond v. diehr, computer programs can in principle be patented.

Answers

Answer: true

Explanation:

girls question
who wants to go out ;p

Answers

MEEEEE PICK ME CHOOSE ME IM LONELY

Answer: I do

Explanation: *P.S.* I'm a Boy

Other Questions
Secondary consumers are: (a) Herbivores; (b) Producers; (c) Carnivores; (d) None of these Find the next two numbers in the following sequence. List the very next missingnumber in Blank 1, and then list the second missing number in Blank 2. I could see a cat _____from the fence its was trying to climb. determine the impulse needed to increase the cars speed from 30 m/s to 35 m/sa. -75,000 kgm/sb. 75,000 kgm/sc. 10,000 kgm/sd. 5,000 kgm/se. none of the above find the surface area of this solid.rectangular pyramid 12 to the third power? Show that if the two lines given by ax+by=c and ax+by=c are the same when b=0 (vertical lines), then there exists a nonzero number s so that a=sa, b=sb, and c=sc Wendell is looking over some data regarding the strength, measured in Pascals (Pa), of some building materials and how the strength relates to the length.The data are represented by the exponential function f(x) = 2*, where x is the length. Explain how he can convert this equation to a logarithmic function whenstrength is 8 Pascals. A helicopter is flying from Hong Kong to Jakarta. The latitude of Jakarta is -6.20, and its longitude is 106.80. The latitude of Hong Kong is 22.27, and its longitude is 114.15. What is the helicopters net change in latitude and longitude as it travels from Hong Kong to Jakarta? 7. A mix of two gases is in a balloon at room temperature. One gas becomes a liquid when placed in a household freezer, while the second one stays as a gas. How would you expect the volumechange when the balloon is placed in the freezer?A. It shrinks graduallyB. It shrinks gradually, then suddenly gets a lot biggerC. It shrinks gradually, then suddenly gets a lot smallerD. It grows graduallyE. It grows rapidlyPlease help :((( Cullumber Companys break-even point in sales dollars is$650,000. Assuming fixed costs are $195,000, what sales revenue isneeded to achieve a target net income of $90,000?Sales revenue needed: Answer to all these questions... HELP ME OUTThis is a picture of a square pyramid and the net for the square pyramid What is the surface area of the square pyramid? A) 108 ft2 B) 152 ft2 C) 192 ft2 D) 240 ft2 Vhat is the correct meaning of the word negligence? What was the boys' father's nickname for Sodapop? What percentage of the population of Luxembourg are city dweller?10%50%90%100%Mark this and return Save and Exit A machine seals 55 envelopes per minute how many envelopes can the machine seal in 35 minutes. Generally, a captive finance company is wholly owned by major manufacturing companies with the purpose of providing financing to customers purchasing the parent company's product.True Read the excerpt from My Story.More of us rode the buses than Caucasians did, because more whites could afford cars. It was very humiliating having to suffer the indignity of riding segregated buses twice a day, five days a week, to go downtown and work for white people.How is this excerpt structured?cause and effectchronologyproblem and solutionanswer The Finishing Department hod 6,500 incomplete units in its beginning Work-in-process inventory which were 100% complete as to materials and 40% complete as to conversion costs. 18.000 unts were received from the previous department. The ending Work-in-Process inventory consisted of 3.500 units which were 50% complete as to materials and 40% complete as to conversion costs. The Finishing Department uses first.in, first-out (FIFO process costing How many units were started and completed during the period? Multiple Choice a. 24,500 b. 14,500 c. 15,000 d. 21,000