. while designing changes to a data center because of a new ioe implementation, a network administrator has the job of diagramming the new physical topology of the area. what should be included in the physical topology diagram?

Answers

Answer 1

One way to avoid the spread of worms over the entire corporate network is to implement network segmentation.

Network segmentation involves dividing a large network into smaller, more manageable subnetworks or segments. Each segment can then be isolated from other segments using firewalls and other security measures.

By limiting the communication between segments, the spread of worms and other malware can be contained, preventing them from infecting the entire network. This also makes it easier to monitor network activity and detect any security breaches.

Network segmentation can be implemented through various methods such as VLANs, subnets, and physical isolation. It is an effective strategy for large corporations to secure their computer networks and protect against cyber threats.

For more questions like Network click the link below:

https://brainly.com/question/15332165

#SPJ11


Related Questions

Defination of computer Software​

Answers

Answer:

Explanation:

Computer software, also called software, is a set of instructions and its documentations that tells a computer what to do or how to perform a task. software includes all different software programs on a computer, such as applications and the operating system

Answer:

information processed in the computer

Explanation:

What is the value of sum after the code segment is executed?

What is the value of sum after the code segment is executed?

Answers

Answer:

16

Explanation:

16  is the value of the sum after the code segment is executed.

What is a code segment?

An encryption method in computation is a chunk of a file or the equal area of the virtual addresses of the program that includes active instructions. It is sometimes referred to as a text or plain text.

An executable section of a memory chip designated to a certain operation is referred to as a function code segment. The implementation of Process Conferred Verification compares.

Let's follow the plan for the segment of the code that is to be executed in this particular if and else execution.

6 < 4 will be termed False

The following will take place

num3=num2=4

So,

num2 >= num 3 will be termed False

There is no other statement available

Currently, the values are

num1=6

num2= 4

num3= 10

Sum=

= 6+2+ 10

= 16

Learn more about  code segment, here:

https://brainly.com/question/30592934

#SPJ3

Binary is the lowest level of abstraction because all data used and stored by computers use tiny transistors (switches) as memory storage. True or false

Answers

Binary is the lowest level of abstraction because all data used and stored by computers use tiny transistors (switches) as memory storage is a false statement.

What is the lowest level of abstraction?

The Physical level is known to be the lowest level of abstraction and it is said to be one that tells the ways that a system do usually use to save any form of data.

Therefore, based on the above, one can say that Binary is the lowest level of abstraction because all data used and stored by computers use tiny transistors (switches) as memory storage is a false statement.

Learn more about abstraction  from

https://brainly.com/question/7994244

#SPJ1

Help! I don’t know what this is.

Help! I dont know what this is.

Answers

Answer:

Best: Option 4

Worst: Option 1

Explanation:

The co-worker might be oblivious to the detrimental effect of his actions on work atmosphere. Talking to him and telling him to stop is the first step to improve this.

Option 2 is not as effective, as the co-worker would not know the reason and might just talk behind people's backs to other people, thus no actual progress would be made, except less communication overall.

Option 3 is likely to antagonize people, with the engineers being unhappy about your co-worker, and the co-worker being mad at you for telling on him. This option is the most likely to end up with someone leaving the job.

Option 1 is just expanding the circle of bad behavior, hence probably the worst possible.

A collection of 10,000 photos on your smartphone is an example of _____ data. a. tightly organized b. unstructured c. structured d. meaningful

Answers

The collection of 10,000 photos on a smartphone is an example of unstructured data.

Unstructured data refers to information that does not have a predefined organization or format. In this case, the photos do not follow a specific structure or schema. They are typically stored as files without a strict organization or standardized metadata. Unstructured data can include various types of content such as text documents, images, videos, audio files, social media posts, and more. Unlike structured data that fits into pre-defined categories and fields, unstructured data requires additional processing and analysis techniques to extract meaningful insights and information.

Learn more about unstructured here;

https://brainly.com/question/32132541

#SPJ11

Which of the following is most likely to have peer-reviewed material written by an expert in the field?

O Newspaper
O Cable news channel
O Academic journal
O Library book

Answers

Answer:

Academic journal

Explanation:

just took the test on testout

biometric security includes the use of passwords. True or False​

Answers

The maximize button changes to the ____ button after you tap or click it. A. Close B. Minimize C. Restore D. Full-screen

Answers

The correct answer is C. Restore. When you tap or click the maximize button, it changes to the restore button.

This button allows you to return the window to its previous size before it was maximized. It's important to note that minimizing a window is different from restoring a window. Minimizing a window means that you are hiding it from view and it will be displayed as a button on the taskbar. To bring the window back, you can click on the button on the taskbar.  It's important to learn how to use these buttons efficiently to navigate through your computer's applications. Maximizing windows can be helpful to focus on one task, but minimizing windows can help to declutter your workspace.

By minimizing windows, you can have multiple windows open at once without them overlapping or taking up too much space on your screen. It's always a good practice to minimize the number of open windows to minimize confusion and increase productivity.

Learn more about taskbar here: https://brainly.com/question/13029467

#SPJ11

I use the wrap text feature in Excel daily. What is the difference in how this behaves or is used in Excel versus Word? Please explain in detail the differences and similarities.

Answers

The wrap text feature is an essential tool used to format text, particularly long texts or data within a cell in Microsoft Excel. In this question, we need to explain the difference between how wrap text behaves in Microsoft Excel versus how it is used in Microsoft Word.

Wrap Text in Microsoft Excel: Wrap text in Excel is a formatting option that is used to adjust text or data within a cell. When the text entered exceeds the size of the cell, it can be hard to read, and this is where wrap text comes in handy. Wrap text in Excel automatically formats the data within the cell and adjusts the text size to fit the cell's width. If a cell contains too much data to fit in the column, the cell's text wraps to the next line within the same cell.

To wrap text in Excel, follow these simple steps:

Select the cell or range of cells containing the text that needs wrapping. Right-click on the selected cell and click Format Cells. In the Format Cells dialog box, click on the Alignment tab. Click the Wrap text option and then click OK.

Wrap Text in Microsoft Word: In Microsoft Word, the Wrap Text feature is used to format text around images and graphics. It is used to change the way the text flows around the image, allowing users to position images and graphics in the document. Wrap Text in Microsoft Word does not adjust the font size of the text to fit the width of the cell like in Excel.

To wrap text in Microsoft Word, follow these simple steps:

Insert the image in the document. Select the image and go to the Picture Format tab. Click on Wrap Text, and you can choose how you want the text to wrap around the image.

The main difference between the use of Wrap Text in Microsoft Excel and Microsoft Word is that Wrap Text in Excel is used to format long data and adjust text size to fit the width of the cell while Wrap Text in Microsoft Word is used to format text around images and graphics.

To learn more about wrap text, visit:

https://brainly.com/question/27962229

#SPJ11

trying to get this part of the code to work: srand(time(NULL)); int rollTwoDice = (rand() % 6) + (rand() % 6); is there an error in it?

Answers

Trying to get this part of the code to work: srand(time(NULL)); int rollTwoDice = (rand() % 6) + (rand() % 6); is there an error in it can be a simple typographical error or a more complex issue like a missing semicolon or a mismatched bracket

The given code, `srand(time(NULL)); int rollTwoDice = (rand() % 6) + (rand() % 6);` has no syntax errors, it is syntactically correct. The code generates random numbers that represent the roll of two dice. So, there is no syntax error in the code. Syntax error: A syntax error is a type of error that occurs when a program is compiled or interpreted. Syntax is the grammar or structure of a programming language. When a program's syntax is incorrect, it results in a syntax error that will prevent the program from running. It can be a simple typographical error or a more complex issue like a missing semicolon or a mismatched bracket. Code:

In the given code, the `srand()` function seeds the random number generator, generating a series of pseudo-random numbers. The `time()` function returns the current time in seconds, and since this value is constantly changing, it provides a new seed for the random number generator every time the program is run. The `rand()` function returns a random integer between 0 and RAND_MAX. The `%` operator is the modulus operator, which returns the remainder of a division operation. Therefore, `(rand() % 6)` returns a random integer between 0 and 5. The `+` operator adds the two values together, which generates a random integer between 2 and 12.

For further information on Syntax errors visit:

https://brainly.com/question/31838082

#SPJ11

How to fix the number you are trying to reach is not reachable?

Answers

Answer:

It means that the person didn't pay their phone bill and their phone got shut off. I know someone who lets this happen often and whenever it does, this is the automated message i hear.

This might not be the only thing it means, but i definitely know that it is at least one.

Explanation:

what is the difference between internal and external network

Answers

An internal network, also known as a private network, is a network that is only accessible by devices within the same physical location, such as a home or office. These networks are typically protected by a firewall and are not directly accessible from the internet.

An external network, also known as a public network, is a network that is accessible by anyone with an internet connection, such as the internet itself.

What is the external network about?

The external network networks are not protected by a firewall and are directly accessible from the internet.

In summary, internal network is a network which is protected and only accessible by devices within the same location, while external network is a network which is open to public and not protected by firewall, which is accessible by anyone with an internet connection.

Learn more about external network from

https://brainly.com/question/13139335
#SPJ1

This Verifies that each packet has been transmitted and received correctly.answer choicesTCPHTTPHTTPSUDP

Answers

Transmission Control Protocol verifies that each packet has been transmitted and received correctly.

What is TCP protocol?

The Internet Protocol and application programs can communicate with one another thanks to TCP (sometimes abbreviated as TCP/IP). For data to be delivered via TCP, an application does not need to require packet fragmentation on the transmission media or other means.

On top of IP, a transport mechanism called the Transfer Control Protocol (TCP) is employed to ensure reliable packet transmission. Many of the issues associated with packet-based messaging, including lost, out-of-order, duplicate, and corrupted packets, are addressed by the mechanisms built into TCP.

Numerous internet applications, including as the World Wide Web (WWW), email, File Transfer Protocol, Secure Shell, peer-to-peer file sharing, and streaming video, heavily rely on TCP.

To learn more about  TCP protocol refer to:

https://brainly.com/question/14397363

#SPJ4

Most Reality TV shows are photographed using the _________system.

A. Multiple Camera System

B. Single Camera System

Answers

An array of cameras, The Multiple Camera System, which involves capturing the scene concurrently from various viewpoints with several cameras, is used to capture the majority of reality TV shows.

How are single camera programmes shot?

A single camera is used to capture the entire scene in a single-camera television programme. They have a more filmic appearance, and their writing and production are handled similarly.

A multi-camera shot is what?

The multiple-camera setup, multiple-camera mode of production, multi-camera or simply multicam is a method of filmmaking and video production. Several cameras either film or professional video cameras are employed on the set and simultaneously record or broadcast a scene.

To know more about production visit:-

https://brainly.com/question/24174385

#SPJ1

You’ve received a tarball called data79.tar from a colleague, but you want to check the names of the files it contains before extracting them. Which of the following commands would you use to do this?
A. tar uvf data79.tar
B. tar cvf data79.tar
C. tar xvf data79.tar
D. tar rvf data79.tar
E. tar tvf data79.tar

Answers

Answer:

D. tar rvf data79.tar

The specification (including data types, instruction types, registers) of the interface between programs and the underlying hardware is called the

Answers

Answer:

instruction set architecture

Which of the following is a network vulnerability scanner? (Choose two.) A) Nessus B) Keylogger C) Nbtstat D) Nmap E) pathping

Answers

The network vulnerability scanners among the given options are Nessus and Nmap.

How are Nessus and Nmap categorized as network vulnerability scanners?

Nessus and Nmap are both widely recognized network vulnerability scanners that help organizations identify and address security vulnerabilities within their computer networks. Nessus is a powerful and comprehensive vulnerability scanning tool that scans networks, systems, and applications for known vulnerabilities. It provides detailed reports and recommendations to help prioritize and mitigate potential risks.

Nmap, on the other hand, is a versatile network exploration and auditing tool that can also be used for vulnerability scanning. It helps discover hosts, services, and open ports, allowing security professionals to identify potential entry points for attacks. Both Nessus and Nmap play crucial roles in ensuring the security of networks by enabling proactive vulnerability management and risk reduction.

Learn more about Nessus and Nmap

brainly.com/question/32150075

#SPJ11

Use the drop-down menus to complete the statements about creating a table of authorities.
Before inserting a table of authorities, you must first create or mark
To insert a table of authorities, look under the command group in the
tab.

Answers

Explanation:

1st drop down: citations

2nd drop down: References

Answer:

Use the drop-down menus to complete the statements about creating a table of authorities.

Before inserting a table of authorities, you must first create or mark  

✔ citations

.

To insert a table of authorities, look under the command group in the  

✔ References

tab.

Explanation:

Which of the following is NOT correct?
A. Computer is capable of processing only
digital signals.
B. Appropriate software is required for
processing the data.
C. Computer is capable of processing digital
as well as analog signals.
D. Computer is capable of analyzing both
quantitative and qualitative data.

Answers

Answer:A

Explanation:

Trace a search operation in BST and/or balanced tree

Answers

In a Binary Search Tree (BST) or a balanced tree, a search operation involves locating a specific value within the tree.

During a search operation in a BST or balanced tree, the algorithm starts at the root node. It compares the target value with the value at the current node. If the target value matches the current node's value, the search is successful. Otherwise, the algorithm determines whether to continue searching in the left subtree or the right subtree based on the comparison result.

If the target value is less than the current node's value, the algorithm moves to the left child and repeats the process. If the target value is greater than the current node's value, the algorithm moves to the right child and repeats the process. This process continues recursively until the target value is found or a leaf node is reached, indicating that the value is not present in the tree.

Know more about Binary Search Tree here:

https://brainly.com/question/30391092

#SPJ11

What is the set of instructions that can be stored and runed by hardware

Answers

Answer:

Hello person....

Explanation:

A computer system has three main components: hardware, software, and The equipment associated with a computer system is called hardware. Softwareis a set of instructions that tells the hardware what to do. the power of the computer for some purpose. In fact, this course will show you that the computer can be a tool for just about anything.

Happy to Help

Software is the set of instructions that can be stored and ran by hardware

similarities between human and computer​

Answers

Answer: Both have a center for knowledge; motherboard and brain. Both have a way of translating messages to an action. Both have a way of creating and sending messages to different parts of the system.

What does the Flippy Do Pro show about representing very small numbers?

Answers

Answer:

it shows number that is near the target figure, but not the actual figure

Explanation:

What Flippy Do Pro reveal about representing a very small number is a number that is near the expected number in value. This is because Flippy Do Pro would not reveal some particular lesser numbers in their precise value.

However, this often results in roundoff blunder, which is mostly caused by the inability of bit compositions to depict the outcome of numbers as it should precisely be.

X466: Sorting - Fix Selection Sort The following method is a Selection Sort method. Within the method, there is an error on one line. You job is to find that line and fix that one error so that the method may work properly. You will need to understand exactly how a selection sort method works. Examples: selectionSort({4,7,1}) -> {1,4,7} selection Sort({80,6,6,8,2}) -> {2,6,6,8,80) Your Answer: Feedback 0.0 / 1.0 public int[] selectionSort(int[] array) { for (int i = 0; i < array.length - 1; i++) { int min = array[i]; int minIndex = i; for (int j = i + 1; j < array.length; j++) { if (min > array[i]) { min = array[i]; minIndex :); Your answer could not be processed because it contains errors: Line 14: error:';' expected 10 11 12 13 14 15 16 17) 18 } if (minIndex == i) { array[minIndex] = array[i]; array[i] = min; } return array:

Answers

The error in the given code is that there is a colon ":" instead of a semicolon ";" at the end of the line "minIndex = i". This is causing a syntax error in the code.


The corrected code is:

public int[] selectionSort(int[] array) {
 for (int i = 0; i < array.length - 1; i++) {
   int min = array[i];
   int minIndex = i;
   for (int j = i + 1; j < array.length; j++) {
     if (min > array[j]) {
       min = array[j];
       minIndex = j;
     }
   }
   if (minIndex != i) {
     array[minIndex] = array[i];
     array[i] = min;
   }
 }
 return array;
}

This code should now properly sort the given array using the Selection Sort method.

To know more about Selection Sort method, click here:

https://brainly.com/question/30358346

#SPJ11

Please help! I will award brainliest! its due today...












Which comment would best describe the code below?


Question 9 options:


// Rotates around the Y axis based on left/right arrow keys



// Rotates around the Z axis based on up/down arrow keys



// Rotates in an upward direction based on left/right arrow keys



// Moves object up/down based on the the left/right arrow keys

Please help! I will award brainliest! its due today...Which comment would best describe the code below?Question

Answers

Answer:

The bottom is right I think

Explanation:

I am not really good at this stuff

The comment that would best describe the code below is // Moves the object up/down based on the left/right arrow keys. The correct option is d.

What is coding?

We connect with computers through coding, often known as computer programming. Coding is similar to writing a set of instructions because it instructs a machine on what to do. You can instruct computers what to do or how to behave much more quickly by learning to write code.

It is well known that one of the hardest subjects to master is programming. It's understandable that some people find it challenging to learn how to code given how different it is from conventional educational methods, such as college degrees in computer science.

Therefore, the correct option is d, // Moves the object up/down based on the left/right arrow keys.

To learn more about coding, refer to the link:

https://brainly.com/question/13486133

#SPJ2

Ho110 Holidays Managenent System Hello Holidays is a travel company based in Selangor. They specialize in organising day trips to various destinations in Selangor, KL, and Melaka. Customers of Hello Holidays include individuals, institutions such as schools, nursing homes, etc. They hire coaches with drivers for trips that are organized and arranged, especially for them. The manager of Hello Holidays is responsible for the allocation of coaches and drivers for trips. Trip records are created when trips are arranged. If a customer (for whom a trip is being anranged) is new then the customer's details are recorded. Otherwise, the customer's record is updated. Customers will typically request that a day trip be organized for them on a specific date. The number of coaches allocated to a trip depends on the number of seats required. In response to this request, the Hello Holidays manager will check to see if the required coaches can be made available on that date if the coaches are available, the manager will allocate one or more drivers and create a trip record for the customer. Customers are allowed to cancel a trip before a deposit is paid. The deposit should be paid within 7 days of the booking for the trip being made. If a trip is canceled after that, the deposit is kept by Hello Holidays. If a trip is canceled the trip record will record this. Hello Holidays will request full payment for a trip in the week before it takes place. The manager should be able to generate exclusive reports about the profits, operations, and expenses statuses at any time. Note: You are not only limited to the above requirements. Any other relevant requirements to ease the process of mandging the Hello Holidays operations can be added if you think they are viable. QuESTION 92 System requirements are the configuration that a system must have in order to satisfy users' expectations. Describe any FouR (4) types of system requirements and provide Two (2) relevant examples for each type of system requirement.

Answers

The four types of system requirements relevant to managing Hello Holidays' operations include functional requirements (e.g., trip booking and coach allocation), non-functional requirements (e.g., security and reliability), performance requirements (e.g., response time and scalability), and usability requirements (e.g., user interface and error handling).

There are four types of system requirements that are important for the efficient management of the Hello Holidays travel company. These include functional requirements, non-functional requirements, performance requirements, and usability requirements. Functional requirements specify the desired functionality or behavior of the system. Two relevant examples for Hello Holidays would be:

1. Trip Booking: The system should allow customers to book day trips to various destinations in Selangor, KL, and Melaka. This includes capturing customer details, trip dates, and the number of seats required.

2. Coach Allocation: The system should allocate coaches and drivers based on the number of seats required for a trip. It should ensure that the requested number of coaches are available on the specified date and assign suitable drivers for each coach.

Non-functional requirements define the quality attributes of the system. Two examples for Hello Holidays are:

1. Security: The system should ensure the confidentiality and integrity of customer data, such as personal information and payment details.

2. Reliability: The system should be available and perform consistently without any major disruptions or downtime, ensuring that trip bookings and record updates can be made reliably.

Performance requirements outline the system's performance expectations. Two examples for Hello Holidays could be:

1. Response Time: The system should have quick response times when handling customer requests, such as checking coach availability and updating trip records.

2. Scalability: The system should be able to handle a growing number of customers and trips without significant degradation in performance.

Usability requirements focus on the user-friendliness of the system. Two examples for Hello Holidays may include:

1. User Interface: The system should have an intuitive and easy-to-use interface, allowing the manager to efficiently allocate coaches, drivers, and generate reports.

2. Error Handling: The system should provide clear and informative error messages to assist users in resolving any issues, such as when a trip cannot be booked due to coach unavailability.

In summary, these requirements ensure that the system meets the needs of the travel company and provides a seamless experience for both the manager and customers.

Learn more about Error Handling here: brainly.com/question/30767808

#SPJ11

PLEASE HELP!!!!


Which of the following statements about content-based filtering is TRUE?

A. With content-based filtering, users receive recommendations for items liked by similar users.

B. With content-based filtering, users receive recommendations for items that are similar in type to ones they already like.

C. Both A and B are true

D.Neither A nor Bare true​

Answers

Answer:

D

Explanation:

It means its based on things similar to what you are reading or looking at.

The statement that is true about content-based filtering is; A. With content-based filtering, users receive recommendations for items liked by similar users.

What is Content based Filtering?

Content-based filtering is defined as a type of recommender system that attempts to guess what a user may like based on that user's activity.

Now, from the given options we can say that option A is correct because it matches the description we have above about Content based filtering.

Read more about Content based filtering at; https://brainly.com/question/10043488

#SPJ9

What are computer skills?​

Answers

Answer:

Explanation:

like programming or hacking ,  or game design,   maybe telecommunication controls ( think cell phone )

Yeah programming and hacking

What is the output by:
print(len(stuff))

Answers

Answer:

The output will print out whatever the length is for stuff.

Explanation:

You use len() to get the length of the given string, array, list, tuple, dictionary, etc. Thus, passing in stuff using len will let the program to get the length of it.

âAn organized, generalized knowledge structure in long-term memory is a(n) ____.a. engramb. tracec. icond. schema

Answers

The answer is D. schema. A schema is an organized, generalized knowledge structure in long-term memory that helps individuals make sense of new information and experiences by relating them to existing knowledge and experiences.

The term "knowledge management infrastructure" refers to the tools and environments that support learning and promote the creation and sharing of information inside an organisation. The knowledge structure includes people, information technology, organisational culture, and organisational structure.

The following three core KM infrastructure components, which include social and technical viewpoints, should be considered by every organisation performing KM research: Information technology, organisational culture, and knowledge processes The knowledge management field is divided into three main subfields: accumulating knowledge. sharing and keeping knowledge.

The organisational structure, which determines how and to what extent roles, power, and obligations are divided, controlled, and coordinated, governs information flow throughout levels of management.

Learn more about  knowledge structure here

https://brainly.com/question/29022277

#SPJ11

Other Questions
Which monomial is a perfect cube?49p9q3r2481p12q15r12121p9q3r6343p6q21r6 the bonds pay interest semiannually. these bonds have a par value of $1,000 and are callable in 5 years at a call price of $1050. what is the yield to call if the current price is equal to $1110.92? Which of the following equations represents a line that passes through the points (6,-16) and (-3,2) According to Table 1, which of the following materials is the best electrical conductor? Brass Copper Aluminum Nichrome You have $39,819.67 in a brokerage account, and you plan to deposit an additional $4,000 at the end of every future year until your account totals $240,000. You expect to earn 13% annually on the account. How many years will it take to reach your goal7 Round your answer to the nearest whole number. ___ years Why are so many people using this on thing like a freaking dating app??? you have 0.5 l of air at 203 k in an expandable container at constant pressure. you heat the container to 273 k. what is the volume of air? responses 0.25 l 0.25 l 0.37 l 0.37 l 0.67 l 0.67 l 1.5 l I am a member of the phytoplankton community that is abundant in near-shore waters of restricted circulation. I am also sometimes found in oligotrophic areas of the open ocean. I am capable of nitrogen fixation. To which group do I belong? a. coccolithophores b dinoflagellates c. cyanobacteria d. diatoms Can anyone help me on this? I'm so confused! In spanish reflexive verbs are used to indicate that the subject does something to his or her self.True or False please write clearly and showwork. im confuseCalculate the P, and overpressure parameter 1, = P./S, with $ = 0.298. The total depth is 2000 m and the water depth is 500 m. Consider a lithostatic gradient of 22 MPa/km below the seafloor. Based on what would happen if an organism lost its ability to perform cell division? What is the slope of the line that contains the points ( -3 , -7/2) and (2, -4)1/41/10-1/10-1/4 The price of a computer is $520. The price of a tablet is 30% of the price of this computer. What is the price of the tablet? Davien and Jackson are headed to a beach that is 50km from school. At noon, Davien leaves his house that is 10 km closer to the beach than the school is and moves at 40 km/h. Jackson starts from school at 12:30 P.M. And moves at 100 km/h. What time does Davien reach the beach? * Answer Format: Time Barb tests the properties of three minerals and makes a data table to record her results, as shown below.PHYSICAL PROPERTIES OFTHREE MINERALSProperty 1 Property 2Talc white not shinyGraphite black shinyQuartz none not shinyWhich two properties did Barb test?streak and lusterstreak and cleavagemineral size and lusterhardness and mineral type This recipe makes 18 cupcakes. Deepak only wants to make 12 cupcakes. How much of each ingredient does he need? Recipe: Makes 18 cupcakes 12 ounces butter 6 ounces sugar 9 ounces flour 3 eggs Hexagon DEFGHI is translated 8 units down and 3 units to the right. If the coordinates of the pre-image of point F are (-9,2) what are the coordinates of F Dave wants to start a workout routine where he increases his workout time by2 minutes every day. The first day he starts with a 6-minute workout. Whichsequence describes the lengths of Dave's workouts? A parachutist falls at a rate of 18 feet per second. Find therate of fall in miles per hour. 100 POINTS FOR WHOEVER ANSWERS THIS ITS DUE IN 10MINS