you need to separate a lan segment into two collision domains. the structure should not affect the broadcast domain. which of the following devices will you choose?

Answers

Answer 1

You use switches to separate a LAN segment into two collision domains without the structure affecting the broadcast domain.

What is a LAN segment?

A LAN segment is a physical section that connects to other sections of the network via bridges or routers.

In order to enhance network performance, LANs are frequently "segmented" using bridges. In order to forward network traffic based on the destination MAC address of each frame, bridges are intelligent devices that create MAC-level routing tables.

The number of stations in each segment of the LAN that must compete with one another for access to the network is decreased by segmentation, which boosts the performance of Ethernet networks.

To learn more about a LAN segment, use the link given
https://brainly.com/question/29646212
#SPJ4


Related Questions

Why is online help important? Select all that apply.
Online help is available 24/7 with your Internet connection
Online help often includes FAQs that cover a wide range of topics.
Some sites also provide reports that include detailed analysis of and solutions to issues that concern
users.
You might meet someone who will become a friend.
DONE

Answers

Answer:

def the first one but id say the second is pretty important too

Explanation:

Answer:

A B C

Explanation:

applications of computer​

Answers

Explanation:

a.Home

b.entertainment

c.industry

d.education

e.banking

f.business

g.medical field

h.science and engineering

Home. Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. ...

Medical Field. ...

Entertainment. ...

Industry. ...

Education. ...

Government. ...

Banking. ...

Business.

Or ⬇️

Banking and Financial company: Computers are used in bank for electronic money transfer, voucher, ledger, bank sheet, etc. ...

Education: ...

Industries: ...

Entertainments: ...

Hospital: ...

Data processing: ...

Science and Engineering: ...

Offices:

hakim is a network engineer. he is configuring a virtual private network (vpn) technology that is available only for computers running the windows operating system. which technology is it?

Answers

The technology is secure socket tunneling protocol (sstp). A virtual private network (VPN) tunnel called Secure Socket Tunneling Protocol (SSTP) offers a way to send PPP data over an SSL/TLS channel.

A virtual private network (VPN) tunnel called Secure Socket Tunneling Protocol (SSTP) offers a way to send PPP data over an SSL/TLS channel. By combining key negotiation, encryption, and traffic integrity checking, SSL/TLS offers transport-level security. Except for authorized web proxies, almost all firewalls and proxy servers can be bypassed by using SSL/TLS across TCP port 443 (by default; port can be altered).

Authentication for SSTP servers is required during the SSL/TLS stage. Authentication for SSTP clients is required during the PPP phase but is optional during the SSL/TLS phase. Common authentication techniques like EAP-TLS and MS-CHAP are supported by PPP. For Linux, BSD, and Windows, there is SSTP.

To know more about SSTP click here:

https://brainly.com/question/4674025

#SPJ4

what is the correct sequence of events that occurs during the router startup process? 1. operating system is found and loaded 2. power-on self-test is

Answers

The correct sequence of events that occurs during the router startup process is:

1.Power-on self-test (POST) is performed, which checks the router hardware for any errors or issues.

2.Bootstrap program is loaded from ROM (Read-Only Memory) into RAM (Random Access Memory), which initializes the router hardware and determines the location of the operating system.

3.Operating system is located and loaded from flash memory or a TFTP (Trivial File Transfer Protocol) server into RAM, which provides the router with the necessary software to function.

4.The configuration file is located and loaded from NVRAM (Non-Volatile Random Access Memory) into RAM, which provides the router with its specific configuration settings.

5.Once the router has loaded the operating system and configuration file, it enters the normal operating mode and is ready to route packets.

During the startup process, the router performs several checks and loads various components in a specific order to ensure that it is functioning properly. Any errors or issues encountered during the startup process can prevent the router from functioning correctly and require troubleshooting and repair.

To know more about router startup click this link -

brainly.com/question/31563009

#SPJ11

lol WAKE UP!!! and get ready to answer my questions.

lol WAKE UP!!! and get ready to answer my questions.

Answers

Answer:

1. Variable Creation Statement2. Fav_Num=7

Explanation:

Hope This Helps :)Im not sure if the 2nd one is correct but i think that it is.

How do you activate the Slicer Tools contextual tab?
Select a PivotTable and it will appear.
Select a slicer and it will appear.
Click Slicer and then Options.
It is found under the PivotTable commands.

Answers

Answer:

Select a slicer and it will appear.

Explanation:

i did it

You can activate the Slicer Tools contextual tab by selecting a slicer and it will appear. Thus, the correct option for this question is B.

What do you mean by the Slicer tool?

The Slicer tool may be characterized as a type of tool that significantly provides buttons that you can click to filter tables or PivotTables. In addition to quick filtering, slicers also indicate the current filtering state, which makes it easy to understand what exactly is currently displayed.

According to the context of this question, if you want to use the slicer tool in excel, select Insert > Slicer. After selecting a slicer it will automatically appear on the computer screen followed by selecting the fields you'd like to filter.

Therefore, you can activate the Slicer Tools contextual tab by selecting a slicer and it will appear. Thus, the correct option for this question is B.

To learn more about Slicer tools, refer to the link:

https://brainly.com/question/19717692

#SPJ5

case conversion functions can only be used in the select clause of a select statement.

Answers

Case conversion functions, such as UPPER(), LOWER(), and INITCAP(), are primarily utilized in the SELECT clause of a SELECT statement to modify the appearance of the retrieved data.

These functions allow you to transform the case of character data to uppercase, lowercase, or capitalize the first letter of each word, respectively. In conclusion, while case conversion functions are most commonly used in the SELECT clause to present data consistently, they can also be applied in other SQL clauses, such as WHERE and ORDER BY, for filtering and sorting purposes. The primary goal of these functions is to facilitate data readability and ensure uniformity in its presentation.

To know more about Case conversion functions visit:

brainly.com/question/30474652

#SPJ11

how many bits and bytes are occupied by six long variables​

Answers

Answer:

24 bytes = 192 bits

Explanation:

A long is typically 4 bytes or 4*8 = 32 bits

However, on some 64 bit systems, a long is defined as 64 bits so the answer is not universal.

Programmers use the phrase ____ to describe what happens when worthless or invalid input causes inaccurate or unrealistic results.
A. GIGO
B. GOGI
C. WIGO
D. LIFO

Answers

The programmers use the phrase "GIGO" to describe what happens when worthless or invalid input causes inaccurate or unrealistic results. GIGO stands for "Garbage In, Garbage Out."

The poor quality of a digitized audio or video file can be explained using this phrase. Even though digitizing a signal can be the first step in cleaning it up, it doesn't make the quality better on its own. Deserts in the first simple sign will be reliably recorded, yet may be distinguished and eliminated by a resulting step by computerized signal handling.

GIGO is likewise used to depict disappointments in human decision-production due to defective, deficient, or uncertain information.

The process that takes place at the dorsal cochlear nucleus (DCN) when auditory neuropathy spectrum disorder is present is referred to as GIGO in audiology. Dan Schwartz coined the term at the 2012 Worldwide ANSD Conference ; this occurs when the cochlea's neural firing is out of sync, sending a static-filled sound into the DCN and up the chain to the auditory cortex and adopted as industry jargon to describe the electrical signal that was received by the dorsal cochlear nucleus and carried up the auditory chain to the superior olivary complex before reaching its destination in the auditory cortex.

Know more about GIGO here:

https://brainly.com/question/24344578

#SPJ11

An array named Ages holds 10 different ages. Write pseudo-code to increase each age in the array by one. The Ages array should be initialised as follows:

Answers

Answer:

Ages = [12, 15, 20, 18, 25, 30, 40, 32, 28, 50]

for i = 0 to 9 do

Ages[i] = Ages[i] + 1

end for

Explanation:

The above code initializes the Ages array with 10 different ages. The for loop iterates through the array, and for each element, it increases its value by 1. The loop starts at index 0 and goes up to index 9, which are the indices of the 10 elements in the array. After the loop completes, the Ages array will contain the original ages increased by 1.

Which of the following are true about NTFS permissions? (Choose all that apply)
a. inherited permissions override explicit permissions
b. when a subfolder is created, it is assigned the permissions of its parent folder
c. it is not possible to change the owner of a file
d. if NTFS permissions conflict locally, the more liberal permission applies

Answers

Inherited permissions override explicit permissions, and when a subfolder is created, it is assigned the permissions of its parent folder. It is possible to change the owner of a file, and if NTFS permissions conflict locally, the more restrictive permission applies.

Explanation:

NTFS permissions are a type of security mechanism that is used to control access to files and folders on a Windows operating system. These permissions can be set to allow or deny access to specific users or groups, and they can be inherited from parent folders.

When a subfolder is created, it is assigned the permissions of its parent folder by default. This means that any users or groups that have access to the parent folder will also have access to the subfolder, unless the permissions are explicitly changed.

It is possible to change the owner of a file, which can be useful in situations where a file needs to be transferred to a new user or group. The owner of a file is the user or group that is assigned full control over the file, and changing the owner can be done through the Security tab in the file or folder properties.

If NTFS permissions conflict locally, the more restrictive permission applies. For example, if a user is a member of two groups with different permissions to access a file, but one group has deny permissions while the other has allow permissions, the user will be denied access to the file. This is because the deny permission is more restrictive than the allow permission.

To learn more about folder click here, brainly.com/question/24760879

#SPJ11

Using logic gates, design an active low chip select for the memory a 256
k memory device starting at address 48000016 in a 16 megabyte memory space

Answers

Answer:

Using logic gates, design an active low chip select for the memory a 256 K memory device starting at address 48000016 in a 16 Megabyte memory space AN 8 b) Develop the truth table for the combinational logic circuit shown below. х Y Z. Å Å Do AN 7 c) A cache memory stores frequently/recently used data and instructions during instruction execution.

Explanation:

Using logic gates, design an active low chip select for the memory a 256 K memory device starting at address 48000016 in a 16 Megabyte memory space AN 8 b) Develop the truth table for the combinational logic circuit shown below. х Y Z. Å Å Do AN 7 c) A cache memory stores frequently/recently used data and instructions during instruction execution.

It is important to analyze the sources and uses of cash because:___.

Answers

It is important to analyze the sources and uses of cash because creditors use this information to assist them in deciding whether to loan funds to them. Investors use this information to decide if they will purchase their stock.

Managing your revenue is an important step to starting or investing in something.

Creditors always check and properly analyze the sources of cash before providing a loan to a lender. They do not invest in companies or people who are least likely to source and make cash in the coming time. Hence, your sources and uses shall be properly analyzed when presenting to creditors.

Investors, whenever investing in something will look at the benefits of the source they want to invest into. If a source is not likely to produce beneficiary revenue in the upcoming time, then investors will never invest in such a kind of source.

To learn more about investors, click here:

https://brainly.com/question/25311149

#SPJ4

This question involves the creation and use of a spinner to generate random numbers in a game. a gamespinner object represents a spinner with a given number of sectors, all equal in size. the gamespinner class supports the following behaviors.

creating a new spinner with a specified number of sectors
spinning a spinner and reporting the result
reporting the length of the current run, the number of consecutive spins that are the same as the most recent spin

write the complete gamespinner class. your implementation must meet all specifications and conform to the example.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that  generate random numbers in a game

Writting the code in JAVA:

public class GameSpinner {

int spinner;

int num;

int current;

public GameSpinner(int spinner) {

super();

this.spinner = spinner;

this.current = 0;

this.num = 0;

}

public int spin() {

int curr = 1 + (int) (Math.random() * spinner);

if (this.current == 0 || this.num == 0) {

this.current = 1;

this.num = curr;

return curr;

}

if (this.num == curr) {

this.current = this.current + 1;

return curr;

} else {

this.num = curr;

this.current = 1;

return curr;

}

}

public int currentRun() {

return this.current;

}

}

GameSpinnerTest.java

public class GameSpinnerTest {

public static void main(String[] args) {

// TODO Auto-generated method stub

GameSpinner g = new GameSpinner(4);

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.spin() : "+g.spin());

System.out.println("g.currentRun() : "+g.currentRun());

}

}

Output

g.currentRun() : 0

g.spin() : 1

g.currentRun() : 1

g.spin() : 4

g.currentRun() : 1

g.spin() : 4

g.currentRun() : 2

g.spin() : 3

g.currentRun() : 1

g.spin() : 3

g.spin() : 2

g.spin() : 2

g.currentRun() : 2

See more about JAVA at brainly.com/question/12975450

#SPJ1

This question involves the creation and use of a spinner to generate random numbers in a game. a gamespinner
This question involves the creation and use of a spinner to generate random numbers in a game. a gamespinner

Which utilities could you typically use to lock a user account?

Answers

The utilities typically used to lock a user account include command-line tools such as "passwd" or "usermod" in Unix-based systems, and "net user" or "wmic useraccount" in Windows-based systems.

To lock a user account, you can use the "passwd" or "usermod" command-line utilities in Unix-based systems. The "passwd" command allows you to modify the password and account properties of a user. By using the appropriate options, such as "-l" or "--lock", you can lock a user account. This prevents the user from logging in until the account is unlocked.

Similarly, in Windows-based systems, you can use the "net user" or "wmic useraccount" command-line utilities. The "net user" command allows you to manage user accounts, including locking and unlocking them. By running the command with the "/ACTIVE:NO" option, you can lock a user account and prevent the user from logging in.

Locking a user account is often done for security reasons. It can be useful in situations where a user account needs to be temporarily disabled or when there are concerns about unauthorized access. By using these utilities, system administrators can easily manage user accounts and enforce access controls in their respective operating systems.

To learn more about utilities

brainly.com/question/31683947

#SPJ11

how can online presence help others?

Answers

Answer:

Online Presence helps others who might be naturally introverted, stuck in a precarious situation, or even by allowing someone company who desperately needs it.

Explanation:

When forming multiple Scrum teams, which two of the following are the most important considerations?

Answers

When forming multiple Scrum teams, the most important considerations are ensuring effective communication between the teams and maintaining alignment with the overall project goals.

It is crucial to establish clear channels of communication and collaboration between teams to avoid duplication of effort or conflicting priorities. Additionally, each team must be aware of the larger project objectives and work towards achieving them in their own sprints. This requires ongoing coordination and monitoring to ensure all teams are on track and making progress towards the common goals. Ultimately, success in forming multiple Scrum teams relies on strong leadership, clear communication, and a shared commitment to achieving the project objectives.

learn more about Scrum teams here:

https://brainly.com/question/30156505

#SPJ11

The purpose of project management is _____. executing a requirement improvement working toward a common goal completing a project

Answers

Answer:

working toward a common goal.

Explanation:

Project management can be defined as the process of designing, planning, developing, leading and execution of a project plan or activities using a set of skills, tools, knowledge, techniques and experience to achieve the set goals and objectives of creating a unique product or service.

Generally, projects are considered to be temporary because they usually have a start-time and an end-time to complete, execute or implement a project plan.

Furthermore, the main purpose of project management is working toward a common goal.

This ultimately implies that, project managers should ensure adequate attention and time is taken to identify, analyze and manage capital, raw materials, people, system of tasks and other resources, so as to effectively and efficiently achieve a common goal with all project stakeholders.

The fundamentals of Project Management which are universal across all fields and businesses includes;

1. Project initiation.

2. Project planning.

3. Project execution.

4. Monitoring and controlling of the project.

5. Adapting and closure of project.

In conclusion, it is very important and essential that project managers in various organizations, businesses and professions adopt the aforementioned fundamentals in order to successfully achieve their aim, objectives and goals set for a project.

What members of a base class can be redefined in the derived classes? o public members o private members O final members o virtual members

Answers

In derived classes, the public members of a base class can be redefined.

What are the public members of a base class?

The public members of the base class are the members that can be accessed and modified directly from the derived class. The derived class can override these members' functionality by redefining them with the same name and signature but with different implementation logic.

The private members of a base class cannot be redefined in the derived class. Private members are only available within the base class. In C++, access to these members is denied in the derived class, so they cannot be overridden

A similar idea applies to final members, which cannot be overridden by definition.Virtual members of a base class can be overridden in the derived classes.

The virtual keyword is added before the member function's signature in the base class to specify that it is virtual. A virtual member function's definition can be changed in the derived class to provide different functionality while preserving the same signature.

Learn more about derived class at

https://brainly.com/question/31964070

#SPJ11

For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

For all hypertext links in the document, set the font-color to ivory and set the text-decoration to none.
(CSS)

Answers

Using the knowledge in computational language in html it is possible to write a code that For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

Writting the code:

<!doctype html>

<html lang="en">

<head>

  <!--

  <meta charset="utf-8">

  <title>Coding Challenge 2-2</title>

</head>

<body>

  <header>

     <h1>Sports Talk</h1>

  </header>

  <nav>

     <h1>Top Ten Sports Websites</h1>

     <ul>

   

     </ul>

  </nav>

  <article>

     <h1>Jenkins on Ice</h1>

     <p>Retired NBA star Dennis Jenkins announced today that he has signed

        a contract with Long Sleep to have his body frozen before death, to

        be revived only when medical science has discovered a cure to the

        aging process.</p>

        always-entertaining Jenkins, 'I just want to return once they can give

        me back my eternal youth.' [sic] Perhaps Jenkins is also hoping medical

        science can cure his free-throw shooting - 47% and falling during his

        last year in the league.</p>

     <p>A reader tells us that Jenkins may not be aware that part of the

        least-valuable asset.</p>

  </article>

</body>

</html>

See more about html at brainly.com/question/15093505

#SPJ1

For ul elements nested within the nav element, set the list-style-type to none and set the line-height
For ul elements nested within the nav element, set the list-style-type to none and set the line-height

(mrh ch03-b 6019) you are looking at web logs of users who click on your website. you see these coming in with an average rate of 30 unique users per hour. each user clicks once then goes away. you just had a user click. you want to model the time until the next user arrives to click. this can best be modeled by

Answers

The easiest way to predict when the following user will click is to utilise an exponential distribution with a rate parameter of =30 users per hour.

Which pattern is most useful for estimating how long users spend on various web pages on average?

One of the most popular tools for determining average time on page and other performance indicators is Analytics. It is crucial to clarify how  Analytics determines this indicator.

Why do page views and time spent on your website by users matter as metrics?

Monitoring time on page will help you determine whether you're drawing in genuine visitors or luring in erroneous leads that visit your site only to find it unrelated to what they were looking for.

To know more about Analytics visit:-

https://brainly.com/question/14281452

#SPJ4

True or false
A compiler translates a source program one line of code at a time.

Answers

Answer:

True

Explanation:

yes It translates one line at a time to be able to confirm all information.

Answer:

True

Explanation:

I hope this helps you

Do you know how to change your grades on a printer???????????

Answers

Answer:

To change ur grade make sure to do it on the website first by right clicking your mouse and clicking inspect element and once done changing x out and it will save

Explanation:

Lost passwords set for documents in Microsoft® Word® documents can be retrieved in the backstage view. True False

Answers

Answer:

I may be wrong but im pretty sure its true

Explanation:

True <3

Complete the sentence.
A ___ number is composed of only zeros and ones.

Answers

Answer:

Binary

Explanation:

Answer:

Binary

Explanation:

I just did it

Choose the term that best fits each definition.
interpret(s) where a user wants to move the mouse through motions or eye movements.
allow(s) users to enter text and control the computer with their voice.
use(s) a synthesized voice to read text on the screen.
Text-to-speech
tracking devices
Speech input software

Choose the term that best fits each definition.interpret(s) where a user wants to move the mouse through

Answers

Answer: See explanation

Explanation:

The term that fits each definition include:

The mouse through motions or eye movements = tracking devices

Allow(s) users to enter text and control the computer with their voice = Speech input software

Use(s) a synthesized voice to read text on the screen = Text to speech

2.3 pseudocode exercise on edhesive

Answers

Answer:

a=int(input("Enter a numerator: "))

b=int(input("Enter a divisor: "))

quotient=a/b

remainder=a%b

print("Quotient is: " + str(int(quotient)))

print("Remainder is: " + str(int(remainder)))

That's 2.3 question 1

a_ft = int(input("Enter the Feet: "))

a_inc = int(input("Enter the Inches: "))

b_ft = int(input("Enter the Feet: "))

b_inc = int(input("Enter the Inches: "))

sum_inc = a_inc + b_inc

# select the whole and the fractional part

inc_to_ft = sum_inc // 12

rem_from_div = sum_inc % 12

sum_ft = a_ft + b_ft + inc_to_ft

print("Feet: {} Inches: {}".format(sum_ft, rem_from_div))

That's 2.3 question 2

Explanation:

I wasn't sure which one you needed so I added both.

I
need help solving this.
Problem 10-11 (Static) The lower and upper specifications a the software upgrades are 78 minutes and 81 minutes. Estimate the percentage of process output that can be expected to fall within the speci

Answers

To estimate the percentage of process output within given specifications, calculate the z-scores for the lower and upper specifications and use a standard normal distribution table to find the corresponding area under the curve.

To estimate the percentage of process output that falls within the specifications, we need to determine the area under the normal distribution curve that corresponds to the range between the lower and upper specifications.

First, we calculate the z-scores corresponding to the lower and upper specifications using the formula:

z = (X - μ) / σ

Assuming a normal distribution, we need to know the mean (μ) and standard deviation (σ) of the process output. If these values are not provided, we cannot proceed with the calculation.

Once we have the z-scores, we can use a standard normal distribution table or a statistical software to find the area under the curve between the z-scores. This area represents the percentage of process output within the specifications.

Without the mean and standard deviation values, it is not possible to provide an exact estimation of the percentage. Make sure you have the necessary statistical information to calculate the percentage accurately.

learn more about z-scores here: brainly.com/question/31871890

#SPJ11

differenticate between half and full deplex modes of transmission in three points

Answers

Answer:

In simplex mode, the signal is sent in one direction. In half duplex mode, the signal is sent in both directions, but one at a time.  In full duplex mode, the signal is sent in both directions at the same time.In simplex mode, only one device can transmit the signal. In half duplex mode, both devices can transmit the signal, but one at a time.  In full duplex mode, both devices can transmit the signal at the same time.Full duplex performs better than half duplex, and half duplex in turn performs better than simplex.

Hope it helps!

When an object is acted on by unbalanced forces, the object will always

Answers

Answer:

If an object has a net force acting on it, it will accelerate. The object will speed up, slow down or change direction. An unbalanced force (net force) acting on an object changes its speed and/or direction of motion. An unbalanced force is an unopposed force that causes a change in motion.

Explanation:

Other Questions
3.The Notch receptor also contains a series of EGF-like repeats. I have been doing my homework and reading about EGF repeats. Integrins and laminins also contain EGF like repeats. Integrins and laminins are static structural proteins and not enzymes. Integrins are transmembrane proteins on animal cells that interact/bind laminins. Laminins make up the mortar between cells along with collagen. So integrins and lamins with collagen hold cells in their place like glue. Repeats are often found in very different protein families that are often unrelated in biological function and in the remainder of the protein fold. This can be because the repeating fold forms a biochemically functional unit with a similar molecular role although the proteins are involved in separate processes and not closely related by molecular evolution. What might be true based upon this knowledge? Pick ALL that apply. there is more than one answer pleaseA.EGF-like repeats are involved in protein-protein interactions.B.EGF-like repeats are involved in quarternary complexesC.Notch and Delta are involved in holding cells to the extracellular matrix, i.e. a part of the mortar.D.EGF repeats have no role in protein interactionsE.EGF repeats are frequently the position of an enzyme's active site.F.EGF-like repeats on separate proteins may interact together. Arrange the steps that occur during the first elongation cycle of fatty acid synthesis in chronological order. 1. Reaction of malonyl CoA and acetyl CoA with ACP 2. Reduction to form butyryl ACP a. reduction of a ketone on acetoacetyl ACP b. dehydration to form crotonyl ACP c. condensation of acetyl ACP and malonyl ACP Accrued interest is: Group of answer choices [A] the difference between full and dirty prices [B] the difference between quoted and clean prices [C] the difference between quoted and dirty prices [D] the sum of accumulated value and clean prices How to do this PLEAE HELPPPPPPP suppose a firm generates a lot of cash but has limited investment opportunities. is this stock more likely to be a utility stock or a technology stock? in addition, is the stock more likely to provide a high or low dividend yield? Anglo-Saxon life was LEAST dominated by:A. Druid priestsB. Devotion to leadersC. Emphasis on monastic principles and beliefsD. Industry and dedication to a strong work ethic Rowe, Inc. has a contract to construct a building for a price of $100. So far it has incurred $60 of costs and it estimates anadditional $20 will be needed to finish the building. How much profit can be recognized using the completed contract method?a. 0b. $15c. $20d. 540 Please Answer me now please which farm animal has the largest eyes of any land mammal? The effective surface area of a refrigerator is 3.23 m2. The 2.82 cm thick, refrigerator walls are filled fiberglass (k = 0.04 W/(m*K)).Answer tolerance 5 on the third significant digit.a) At what rate must heat be removed from the interior to maintain a temperature of -1.16 oC, when the room is 21.4 oC? oml brainly deleted my question for no reason >=( please help me Calculate the distance between Point A (-8,-2) and Point B(6,-1) Leave the answer in radical form. Which of the following is an end that macro economists do not agree on achieving?a.Maximization of economic freedomb.Keeping low unemploymentC.Maintaining stable pricesd.Rapid economic growth what is the answer for 3/4 + 1/2 = Meadow is growing her hair out. The graph below shows how much her hair has grown over the last 8 months.Which of the following shows the rate at which Meadow's hair is growing?A.) 4 inches per monthB.) 0.50 inch per monthC.) 0.25 inch per monthD.) 2 inches per month Does the pH increase, decrease, or remain the same when each of the following is added? (a) sodium hydrogen carbonate (NaHCO3) to a solution of carbonic acid (H2CO3) increases decreases remains the same (b) NaHC2O4 to a solution of H2C2O4 increases decreases remains the same (c) HNO3 to a solution of NaNO3 increases decreases remains the same (d) hydrofluoric acid to a solution of sodium fluoride increases decreases remains the same (e) NaClO4 to a solution of NaOH increases decreases remains the same I need help with a word problem a company purchased equipment valued at $261,000. it traded in old equipment for a $145,000 trade-in allowance and the company paid $116,000 cash with the trade-in. the old equipment cost $240,000 and had accumulated depreciation of $96,000. this transaction has commercial substance. what is the recorded value of the new equipment? Help me and answer correctly please and I will mark you brainliest!!! Lumpkin Company sells lamps and other lighting fixtures. The purchasing department manager prepared the following inventory purchases budget. Lumpkins policy is to maintain an ending inventory balance equal to 10 percent of the following months cost of goods sold. Aprils budgeted cost of goods sold is $40,000. Required Complete the inventory purchases budget by filling in the missing amounts.