Answer:
double price, number, total;
boolean payment;
Scanner input = new Scanner(System.in);
System.out.print("Enter Amount of Gas: ");
price = input.nextDouble();
I've added the full source file as an attachment.
Where I used comments to explain difficult line
Explanation:
You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.
The virtual disk configuration for the VMs on both servers in this environment is shown below.
In the Hyper V Test,
Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,
What is virtual disks?Setting up 5 virtual disks, each 50 GB in size.
2 VMs each have a 50 GB virtual drive assigned to them.
The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.
To learn more about virtual disks refer to:
https://brainly.com/question/28851994
#SPJ1
Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.
What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.Therefore,
Configuration:
Creating 5 Virtual disks of 50 GB each.
1 virtual disk of 50 GB is assigned to 2 VM.
The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.
For Hyper V App,
Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.
Configuration:
Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.
Since only two VMs are run here, the disk space can be separated.
To learn more about Hyper V Test, refer to:
https://brainly.com/question/14005847
#SPJ1
Question 1 of 10
Which step happens first after a switch receives a message that includes a
MAC address?
OA. The switch receives a reply from the message's receiving device.
B. The switch sends the message to a random device on the
network.
OC. The switch looks up the receiving device's MAC address in a
switching table.
OD. The switch forwards the message to the port of the receiving
device.
SUBMIT
The step that happens first after a switch receives a message that includes a MAC address is that "The switch looks up the receiving device's MAC address in a switching table." (Option C)
What is a MAC Address?
A media access control (MAC) address is a one-of-a-kind identifier assigned to a network interface controller for use as a network address in intra-network communications. This is a widespread use in most IEEE 802 networking technologies, such as Ethernet, Wi-Fi, and Bluetooth.
What is a switch?
A network switch is a piece of networking gear that links devices on a computer network by receiving and forwarding data to the target device using packet switching.
Learn more about MAC Addresses:
https://brainly.com/question/24812654
#SPJ1
Which of the following can be assumed as the simplest form a physical network topology? (1 point)
O the tree topology
O the mesh topology
O the star topology
the bus topology
This kind of network structure is the most basic. Here, a common medium is used to connect two nodes directly to one another.
What is Topology?The full bandwidth is set aside between the two nodes because there are only two in this network.
Topology is the study of the characteristics of spaces that are unaffected by continuous deformation. Because the objects may be stretched and contracted like rubber sheets yet cannot be broken, it is frequently referred to as "rubber-sheet geometry."
Analysis and general topology are closely connected fields that often take into account local features of spaces. The definition of topological spaces, in which limits of sequences can be taken into consideration, generalizes the idea of continuity.
Therefore, This kind of network structure is the most basic. Here, a common medium is used to connect two nodes directly to one another.
To learn more about Topology, refer to the link:
https://brainly.com/question/10536701
#SPJ1
which authentication mechanism does 802.1x usually rely upon?
The authentication mechanism that 802.1x usually relies upon is EAP (Extensible Authentication Protocol).
The IEEE 802.1X is a standard protocol of the IEEE 802.11 that allows you to grant access control to network resources, especially those in a wireless network. The standard 802.1X port-based network access control is also called port-level authentication. This standard allows the network to access different resources after authentication.
EAP is an authentication protocol used to secure network connections. It works by transporting various authentication methods to a network connection. EAP is often used with wireless networks since it provides more secure authentication than WEP, which has a relatively low level of encryption.
Local area networks (LANs) and dial-up connections both make use of the authentication framework known as Extensible Authentication Protocol (EAP). Client authentication and a wireless LAN are the primary uses of EAP in wireless communication.
Know more about Extensible Authentication Protocol:
https://brainly.com/question/20813972
#SPJ11
Where can i check on an acer chromebook to see what version of java is installed.
Based on the current situation, to check on an Acer Chromebook to see what version of java is installed, you must "input specific commands on the terminal window and press Enter key."
Java Installation on Chromebook.Currently, Góogle or Chromebook do not allow Java installation on its operating system. This is due to the security threats that are associated with Java.
However, there are ways to bypass this situation and eventually install Java on your Chromebook if you so desire.
Nevertheless, if eventually, you installed Java successfully on your Chromebook, to check the version, you must "input specific commands on the terminal window and press Enter key."
Learn more about Java Program here: https://brainly.com/question/19485769
A company has an automobile sales website that stores its listings in a database on Amazon RDS. When an automobile is sold, the listing needs to be removed from the website and the data must be sent to multiple target systems. Which design should a solutions architect recommend
The solutions architect should recommend using AWS Lambda to remove the listing from the website and trigger multiple AWS Step Functions to send the data to the target systems.
This design allows for serverless execution and easy scalability, ensuring efficient removal of listings and data transfer to multiple systems.
AWS Lambda can be used to remove the listing from the website in a serverless manner. It can also trigger multiple AWS Step Functions, each responsible for sending the data to a specific target system. This design allows for efficient removal of listings and simultaneous data transfer to multiple systems, ensuring scalability and flexibility.
Learn more about execution here:
https://brainly.com/question/29677434
#SPJ11
functional requirements specify the support the system will provide to the user in fulfilling his/her work tasks. question 22 options: true false
True. Functional requirements specify the support the system will provide to the user in fulfilling his/her work tasks as it provides the requirements like activities, processes, or operations that the system should carry out, such as login, search, save, and print.
Functional requirements define what a system should do, in contrast to how it will be built and implemented. They are a set of statements that outline the capabilities, behaviors, or characteristics of a system and are used to identify and describe the functions that a system must perform. They also provide the necessary information needed to design the system and determine if it meets the user's needs.
In short, functional requirements define the actions that must be performed by the system and the expected results of those actions. This enables the system to meet the user's needs in an effective and efficient manner.
You can learn more about Functional requirements at: brainly.com/question/29976404
#SPJ11
With RAID Level 5 the spare drives that replace the failed drives are usually hot swappable,
meaning the can be replaced on the server while the?A. System is up and running.B. System is down and running.C. System is in-between and running.D. System is centre and running.
With RAID Level 5 the spare drives that replace the failed drives are usually hot swappable, meaning these can be replaced on the server while the System is up and running.
What is RAID level?This is correct; because RAID 5 employs parity to offer fault tolerance throughout the array, one of the disks in it can become faulty, and you can typically just pull it out without turning off the system (Hot SWAP) and replace it with a spare disk. The array will then automatically begin reconstructing the information in the new disk using the parity stored in the array's previous disks. Hot Swap is typically seen in business systems that demand high availability. Spare drives that replace failed disks in RAID Level 5 are normally hot swappable, which means they may be changed on the server while the system is still running.
Here,
Spare drives that replace failed disks in RAID Level 5 are normally hot swappable, which means they may be changed on the server while the system is still running.
To know more about RAID level,
https://brainly.com/question/30077583
#SPJ4
30Pivotal Labs, a software company, has never attempted to downsize or eliminate management positions. Instead, CEO Rob Mee, who co-founded Pivotal in 1989, built his company's culture on extreme programming and created the most efficient project team structure for getting things done quickly and effectively. Managers were never included in the equation. And it was successful example of a. virtual teams b. a hierarchy c. self-managed teams
The most effective project team structure for getting things done quickly and efficiently at Pivotal Labs, a software company, was "option C. self-managed teams".
1. By embracing extreme programming and an efficient project team structure, Pivotal Labs empowers its employees to take ownership of their work and make decisions collectively.
2. In this model, there is no hierarchical structure where managers oversee and control the teams. Instead, the teams have the freedom to organize themselves, make decisions collectively, and be accountable for the outcomes.
3. The success of Pivotal Labs can be attributed to the self-managed team structure. By eliminating traditional management positions, the company fosters a culture of collaboration, autonomy, and trust.
4. Self-managed teams are often associated with increased employee engagement, higher job satisfaction, and improved productivity. They enable individuals to leverage their expertise, contribute their unique perspectives, and collaborate more effectively.
Overall, Pivotal Labs' success serves as a testament to the effectiveness of self-managed teams in fostering innovation, productivity, and a positive work culture in the software development industry.
To learn more about team structure visit :
https://brainly.com/question/5890835
#SPJ11
after splunk tokenizes terms at index time, where are the tokens stored?
Tokens are kept in a variety of different data structures within the Splunk index after terms have been tokenized by Splunk at index time. For quick and effective searching and index data retrieval, Splunk stores the tokens it creates at index time in a variety of different data structures.
These structures consist of: Lists of token IDs that point to the locations of the original material in the index are known as posting lists. By associating search terms with the documents they are found in, posting lists facilitate quick index searching.Inverted indexes: An assortment of posting lists that map phrases to the documents they appear in provide for quick index searching. Term dictionaries are lookup tables that associate term IDs with the terms themselves, facilitating quick searches for terms. Data structures known as field-value mappings allow for the filtering and aggregation of search results based on particular fields by associating field names and values with document IDs.
learn more about Data structures here:
brainly.com/question/28333364
#SPJ4
Jennifer works as a programmer. She has fixed certain bits of code in a program while developing it. She has purposely left specific code in the program so she can access the program later and obtain confidential information. Which programming threat has she created?
A. logic bomb
B. trap door
C. Trojan horse
D. virus
Answer:
B. trap doorExplanation:
It's also referred to as the back door
Which layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes?
Answer:
Network.
Explanation:
The Transmission Control Protocol/Internet Protocol (TCP/IP) model is a standard networking protocol which allows network devices such as routers, switches, and host computers to interconnect and communicate with one another over a network. The Transmission Control Protocol/Internet Protocol (TCP/IP) model comprises of four (4) layers and these includes;
I. Application layer.
II. Transport layer.
III. Internet layer.
IV. Network layer.
The network layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes.
Basically, this layer known as network layer is the fourth layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model and it is typically responsible for the transmission of packets from one network device to another.
ethernetsusemanchesterencoding.assumingthathostssharing the ethernet are not perfectly synchronized, why does this allow collisions to be detected soon after they occur, without waiting for the crc at the end of the packet?
Ethernet networks use Manchester encoding to encode the data being transmitted. Manchester encoding is a type of encoding that ensures that each bit is represented by a transition in the signal.
This makes it easier for the receiving device to detect the boundaries between bits. In Ethernet networks, collisions can occur when two or more devices attempt to transmit data on the network at the same time. When a collision occurs, the signals from the colliding devices interfere with each other, resulting in a distorted signal that cannot be interpreted by the receiving device. Since the devices sharing the Ethernet are not perfectly synchronized, their clocks may not be perfectly aligned.
Learn more about Ethernet networks: https://brainly.com/question/28314786
#SPJ11
Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.
Answer:
I am using normally using conditions it will suit for all programming language
Explanation:
if(minimum){
hours=10
}
2. Xamarin.Forms is a UI toolkit to develop the application. A. TRUE B. FALSE C. Can be true or false D. Can not say
The statement "Xamarin.Forms is a UI toolkit to develop the application" is true because Xamarin.Forms is indeed a UI toolkit used for developing applications. Option a is correct.
Xamarin.Forms is a cross-platform UI toolkit provided by Microsoft that allows developers to create user interfaces for mobile, desktop, and web applications using a single codebase. It provides a set of controls and layouts that can be used to create visually appealing and responsive user interfaces across different platforms, including iOS, Android, and Windows.
With Xamarin.Forms, developers can write their UI code once and deploy it to multiple platforms, reducing the effort and time required to develop and maintain applications for different operating systems.
Option a is correct.
Learn more about developers https://brainly.com/question/19837091
#SPJ11
What configuration file contains parameters that set the default location for e-mail, password expiration information, minimum password length, and the range of uids and gids available for use?
One common configuration file that often includes these parameters is
The configuration file that contains parameters for the default location for e-mail, password expiration information, minimum password length, and the range of) available for use varies depending on the operating system or software being used.
However, one common configuration file that often includes these parameters is the
The file is a system configuration file found in Unix-like operating systems, such as Linux. It is used by the login process to set default values and policies for user accounts.
This file allows system administrators to define various parameters related to user authentication and account management.
It's important to note that the specific configuration file and parameter names may vary depending on the operating system or software being used.
Therefore, it is recommended to consult the documentation or specific resources for the particular system you are working with to determine the exact location and names of the configuration file and parameters in question.
For more such questions on configuration,click on
https://brainly.com/question/14114305
#SPJ8
The configuration file that contains the parameters mentioned is typically "/etc/login in Unix-like systems.
What is the configuration file?The file is a arrangement file in the direction of Unix-like wholes, such as Linux. It is secondhand for one login help to outline various scheme-expansive limits had connection with user login and report administration.
Therefore, the "MAILDIR" parameter in the file sets the default point for consumer email depository. It specifies the guide way place consumer-specific mailboxes or mail spools are situated.
Learn more about configuration file from
https://brainly.com/question/30260393
#SPJ1
Which component of the operating system selects the next process to be executed when the cpu becomes idle?
The next process to be executed when the CPU becomes idle is CPU scheduling. The foundation of multi-programmed operating systems is CPU scheduling.
The operating system can increase computer productivity by moving the CPU between processes. Multiprogramming is a rather straightforward concept. The operating system must choose one of the processes in the ready queue to be performed whenever the CPU becomes idle. The short-term scheduler handles the selection procedure.
One of the processes in memory that are ready to run is chosen by the scheduler, and that process is given the CPU. The issue of choosing which task in the ready queue should receive the CPU is dealt with by CPU scheduling.
Learn more about CPU scheduling https://brainly.com/question/13107278
#SPJ4
What does FLUX do when soldering an electrical joint?
Answer:
Flux is an acidic blend that makes a difference evacuate oxides from the range of the joint and so makes a difference the patch stream effectively over the joint and frame a great bond. The flux can be seen as a brown fluid as a patch is warmed, and it in some cases gives off a impactful smoke that can act as a aggravation.
Explanation:
flux prevents oxidation of the base and filler materials. while soldering the metals, flux is used as threefold purpose, as it removes the oxidised metal from this surface to be soldered.
Suppose a reference variable of type Long called myLong is already declared . Create an object of type Long with the initial value of two billion and assign it to the reference variable myLong .myInt = new Integer(1);myLong = new Long(2000000000);JOptionPane
To create an object of type Long with an initial value of two billion and assign it to the reference variable myLong, we can use the following code:
myLong = new Long(2000000000);
This code creates a new Long object with the value of 2000000000 (which is two billion) and then assigns it to the reference variable myLong. This means that myLong now points to the Long object with a value of two billion.
In Java, a reference variable is a variable that stores the memory address of an object rather than the actual value of the object itself. This means that when we declare a reference variable of type Long called myLong, we are essentially creating a variable that can point to an object of type Long.
It is important to note that the use of the "new" keyword in this code is necessary, as it creates a new object of type Long. If we simply assigned the value of two billion to myLong without creating a new object, we would be assigning the value directly to the reference variable, which is not what we want.
Learn more about code here:
https://brainly.com/question/30299772
#SPJ11
give examples of html5 semantic elements that should be used to structure the contents of a web page and can replace generic tags
HTML5 introduced several semantic elements to help structure the contents of a web page.
The following are examples of semantic elements that can replace generic tags:
navheaderarticlesectionasidefootermainThe purpose of semantic elements is to make the HTML code more readable and understandable.
By using these elements, it is easier to distinguish different sections of a webpage. The elements mentioned above are all used to define the structure of a page and provide context for the content.
By using these elements, it is easier for search engines to identify the main content of a page and improve the accessibility of the site.
Learn more about semantic elements at:
https://brainly.com/question/29526490
#SPJ11
what is the assignment grade calculator?
Based on the technological functions, and the context of the question, the assignment grade calculator is an online tool that assists teachers in quickly grading student homework and projects
What is the Assignment Grade CalculatorThe Assignment Grade Calculator is generally known as an online software application that is designed to enable teachers rapidly grade student assignments and projects.
Essentially, the assignment grade calculator allows teachers to input the maximum points possible for each assignment, the student's score, and the grading scale they are using.
Ultimately, the calculator then computes the grade based on the entered information.
The assignment grade calculator can also calculate a weighted average grade. It accepts both numerical as well as letter grades.
Hence, in this case, it is concluded that the Assignment Grade Calculator is very useful for teachers and examiners.
Learn more about the Grade Calculator here: https://brainly.com/question/29586317
#SPJ1
Which guidelines should be used to make formatting tasks more efficient?
Use pasted text only; this does not keep the original formatting.
Keep formatting fancy; this makes Word documents look better.
Save styles in the document; this makes working with multiple documents easier.
Avoid pasting text from other documents; this makes formatting easier.
Answer:
Use pasted text only; this does not keep the original formatting.
Explanation:
bc
Answer:
Use pasted text only; this does not keep the original formatting.
Explanation:
What does music mean to you? Is it a big part of your life, or is it just "there". Answer in at least two complete sentences.
Answer:
Music means a lot to almost everyone and plays a significant role in most people's lives. With all of the different genres, music encompasses a wide range of moods and emotions, and there is something for almost everyone.
Answer:
Music plays a crucial role in several people's lives. There is proof that music has helped benefit people's lives to be more positive, and some studies show that students that listened to music and meditated with music during school, had anxiety levels less than students who didn't get such an opportunity.
Explanation:
(I've read a paper somewhere for school for a health project abt stress and anxiety)
Is it possible to be logged into a wifi network that does not have internet access.
Answer: Im not sure.
Explanation:
If i had to give you a straight answer it would be NO.
Trace a search operation in BST and/or balanced tree
In a Binary Search Tree (BST) or a balanced tree, a search operation involves locating a specific value within the tree.
During a search operation in a BST or balanced tree, the algorithm starts at the root node. It compares the target value with the value at the current node. If the target value matches the current node's value, the search is successful. Otherwise, the algorithm determines whether to continue searching in the left subtree or the right subtree based on the comparison result.
If the target value is less than the current node's value, the algorithm moves to the left child and repeats the process. If the target value is greater than the current node's value, the algorithm moves to the right child and repeats the process. This process continues recursively until the target value is found or a leaf node is reached, indicating that the value is not present in the tree.
Know more about Binary Search Tree here:
https://brainly.com/question/30391092
#SPJ11
Explain why modern computers consist of multiple abstract levels and describe the main functions of each level
Modern computers must be quick, effective, and safe, which is why the system was introduced with several abstract layers. Abstract classes can always be used in multilevel inheritance.
Are two abstract methods allowed in a class?A class can only extend one abstract class in Java, but it can implement numerous interfaces (fully abstract classes). Java has a purpose for having this rule.
Can we use many abstract methods?The abstract keyword is used to make a class abstract. It may have 0 or more non-abstract and abstract methods. We must implement the abstract class's methods and extend it. It is not instantiable.
To know more about Abstract classes visit :-
https://brainly.com/question/13072603
#SPJ4
1. It defines the amount of white space that appears at the top, bottom, left, and right edge of
our document.
d clipboard.
Answer:
Margin is the correct answer to the given question .
Explanation:
The main objective of the margin is to setting the white space that are showing up at the top , bottom, left and the right corners of the file or the document .
Following are steps to setting the white space that are showing up at the top , bottom, left and the right corners of the file or the document
Firstly click on the page layout options .After that click on the margin tab .In this tab you will given the the top, bottom, left, and right margin according to your need Finally click on ok to finish them .In a deed in lieu of foreclosure situation, A) the lender takes the real estate subject to all junior liens. B) the lender is obligated to accept the deed. C) all encumbrances on the property are extinguished. D) a civil action is required.
In a deed in lieu of foreclosure situation, the lender is obligated to accept the deed and takes the real estate subject to all junior liens.
However, all encumbrances on the property are not necessarily extinguished, as there may be senior liens or other claims that still exist. No civil action is required, but it is important to consult with legal counsel to understand all the potential implications of a deed in lieu of foreclosure.
In a deed in lieu of foreclosure situation, option A) is correct. The lender takes the real estate subject to all junior liens. This means that any subordinate liens on the property remain intact and become the responsibility of the lender. Option B) is incorrect, as the lender is not obligated to accept the deed and can choose other remedies. Option C) is also incorrect, as all encumbrances are not extinguished; only the primary mortgage is settled. Finally, option D) is incorrect, as a civil action is not required for a deed in lieu of foreclosure, as it is a voluntary agreement between the borrower and lender to avoid foreclosure proceedings.
To know more about liens visit:
https://brainly.com/question/14392036
#SPJ11
For this question, we'll use the data
useful way
data. Use t
a scatter pl
on the y-ax
er plot is a
rensional
skage to make
∣1
avfert ) on
the x-axis. Lancı un y-anıs 'Crop Yield" and the x-axis "Fertilizer". Do you notice any pattern from the scatter plot?
From the scatter plot, a pattern can be observed between the variables "Crop Yield" and "Fertilizer."
In the scatter plot, the "Crop Yield" is plotted on the y-axis, while the "Fertilizer" is plotted on the x-axis. By examining the distribution of the data points, we can identify any relationship or pattern between the two variables.
The scatter plot allows us to visualize the data points and observe if there is a linear or nonlinear association between the variables. If there is a pattern, it can provide insights into the impact of the fertilizer on crop yield.
By analyzing the scatter plot, we can look for trends such as a positive or negative correlation. If there is a positive correlation, it suggests that an increase in fertilizer usage leads to higher crop yields. Conversely, a negative correlation implies that higher fertilizer usage results in lower crop yields. Additionally, the scatter plot can reveal any outliers or clusters that may affect the relationship between the variables.
By interpreting the scatter plot, we can gain a better understanding of the relationship between crop yield and fertilizer usage, helping us make informed decisions and optimize agricultural practices.
To learn more about variables visit:
brainly.com/question/32410789
#SPJ11
How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas
The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.
How did Native Americans gain from the long cattle drives?When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.
Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.
There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.
Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.
Learn more about cattle drives from
https://brainly.com/question/16118067
#SPJ1