at the transport layer in the internet model, tcp is responsible for breaking large files received from the application layer into smaller messages and opening a connection to a server for transferring them.

Answers

Answer 1

In the internet paradigm, it is true that tcp is in charge of splitting huge files received from the application layer into smaller messages and establishes a connection to a server for their transfer.

A communications protocol known as Transmission Control Protocol, or TCP, permits message transmission between computer hardware and software via a network. It is designed to transmit packets across the internet and to guarantee the successful transmission of data and messages over networks.

With end-to-end communications offered by TCP/IP, it is possible to specify how data should be broken up into packets, transported, routed, and received at the destination. This outlines the process for exchanging data online.

Learn more about tcp:

https://brainly.com/question/24967184

#SPJ4

The complete question is ''At the __________ layer of the 5 layer Internet model, the TCP protocol is responsible for breaking large files received from the application layer into smaller packets and opening a connection to a server for transferring the packets. (use the one word​ name, not number)''.


Related Questions

You are trying to sell a new product to a store owner. Which method of presentation is likely the most effective? a chart showing how sales will go up if they use this product a chart showing how sales will go up if they use this product quotes from other store owners on success of this product quotes from other store owners on success of this product a free trial option to use the product for six months, no questions asked a free trial option to use the product for six months, no questions asked all of the above

Answers

A method of presentation which is likely the most effective is: D. all of the above.

What is a product?

A product can be defined as any physical object (tangible item) that is typically produced by a manufacturer so as to satisfy and meet the demands, needs or wants of every customer. Some examples of a product include the following:

Mobile phones or SmartphonesTelevisionMicrowave ovenPencilRefrigeratorComputerShampooDrugs

What is a sales presentation?

A sales presentation can be defined as an act that involves the process of speaking to customers and potential customers, so as to formally share and explain information about a product such as a health care plan, Medicare Advantage plan, etc., especially for the purpose of proffering a solution to a particular problem.

In conclusion, all of the above method of sales presentation would be very effective.

Read more on sales presentation here: https://brainly.com/question/2039116

#SPJ1

Anybody know this answer i need help man asap.

Answers

Answer:

b

Explanation:

I think is b because without human labor how can u create a capital or build anything

Define the following term:
i) Kernel

Answers

Kernel : It is the core that provides basic services for all other parts of the OS. It is the main layer between the OS and underlying computer hardware

Select the correct answer from each drop-down menu.
When you right-click a picture in a word processing program, which actions can you
choose to perform on that image?
You can choose to
v an image when you right-click the picture in the word processing program. You can also choose to
V an image when you right-click the in picture in the word processing program.

Answers

Answer:

1) A

2) B

Try that.

The student printed the information from the American Medical Association because:

Answers

The student printed the information from the American Medical Association due to the fact that It is one that has a lot of authority than the other websites and It is one that is seen to contain more objective than the other  kind of websites.

Why do that from American Medical Association ?

There can be a lot of reasons for the student action. The student may have printed information from AMA (American Medical Association) due to the fact that  the site  is a genuine source and had a lot of information which concludes the reason for it having a lot of  authority over other websites.

Therefore, The student printed the information from the American Medical Association due to the fact that It is one that has a lot of authority than the other websites and It is one that is seen to contain more objective than the other  kind of websites.

Learn more about American Medical Association  from

https://brainly.com/question/1656801

#SPJ1

How are these three attributes conveyed in the music notation above?

Answers

The attributes are conveyed in the music notation since there is a sense of preciseness; there isn't any extraneous info being shown or used. It would have to be testest for effectiveness, but it does have set instructions to follow.

Electronic hacking and illegal trespassing for the purposes of acquiring a competitor’s proprietary information is considered.

Answers

Answer:

economic espionage.

Explanation:

if you are entering a cell address in to excel for cell f26 and you want to copy the formula that contains this address and have the row and the column stay locked, which of the follow is correct?

Answers

if you are entering a cell address in to excel for cell f26 and you want to copy the formula that contains this address and have the row and the column stay locked and it is Option 2.  F26 .

What is the cell address?

A reference is known to be a term that is used for a cell's address. It is known to be that which tends to identifies a cell or scope  of cells trough the use of  the column letter as well as row number of the cell(s).

Note that for a person to enter a cell address into a formula in Excel, one must:

Make use of cell references in a formulaSelect  the cell in for you want to input the formula.In the formula bar. , input = (equal sign).Then select the cell that has the value you want or type its cell reference and click.

Therefore, if you are entering a cell address in to excel for cell f26 and you want to copy the formula that contains this address and have the row and the column stay locked and it is Option 2.  F26 .

learn more about cell address from

https://brainly.com/question/11683350

#SPJ1

See full question below

Listen If you are entering a cell address in to Excel for cell F26 and you want to copy the formula that contains this address and NOT have the row and the column stay locked, Which of the follow is correct? $F$26 F26 OF$26 O$F26

difference between tablet and smart phone

Answers

Answer:

What is the difference between tablets and smartphones? The main difference is the size of the screen. Smartphones usually have screen sizes between 4″/10cm and 7″/17cm, a tablet is anything over this. When it comes to processing power and available apps—they usually share the same capabilities.

Explanation:

Tablets are overwhelmingly used to play games and access entertainment (67 per cent), while smartphones are divided between games, social networking, and utilities (to name a few). Basically, tablets are seen as an entertainment platform, while smartphones are considered mostly a communications device.

a cybersecurity analyst is attempting to classify network traffic within an organization. the analyst runs the tcpdump command and receives the following output:

Answers

The statement that is true based on this output is that: 10.0.19.121 is a client that is said to be logging or accessing an SSH server over port 52497.

What is SSH server used for?

SSH or Secure Shell is known to be a kind of a network communication protocol that helps two computers to  be able to talk or communicate.

It is seen as a  protocol used to move hypertext such as web pages. Therefore, The statement that is true based on this output is that: 10.0.19.121 is a client that is said to be logging or accessing an SSH server over port 52497.

Learn more about SSH server  from

https://brainly.com/question/28269727

#SPJ1

A cybersecurity analyst is attempting to classify network traffic within an organization. The analyst runs the tcpdump command and receives the following output:

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

$ tcpdump -n -i eth0

15:01:35.170763 IP 10.0.19.121.52497 > 11.154.12.121.ssh: P 105:157(52) ack 18060 win 16549

15:01:35.170776 IP 11.154.12.121.ssh > 10.0.19.121.52497: P 23988:24136(148) ack 157 win 113

15:01:35.170894 IP 11.154.12.121.ssh > 10.0.19.121.52497: P 24136:24380(244) ack 157 win 113

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Which of the following statements is true based on this output?

IM in high school (freshmen) and I started using brainly when I was in middle school, haven't made much friends but im ok with who I have! Anyways question is abt career management!
In Stage 2, the Thinking stage, John would probably:

Research ways to quit smoking.
Switch over to nicotine gum or e-cigs.
Blame it on pollution in the air
Admit he has a problem, but put off doing anything.

Answers

Answer:

My Spring 2018 Sabbatical Project was to study techniques and ideas of classroom management. The result was a set of documents and resources that I am placing here in blog format to easily share with my colleagues and any other interested party.

Comments and questions are welcome, and I will respond as time allows. Feel free to share these posts.

Sincerely,

Tracy Johnston

Palomar College Mathematics Department

Answer:

The more sane thing that he should do is to research ways to quit smoking.

Explanation:

Smoking is not good for you, nor are e-cigs

Nicotine gum is just as addictive and is quite expensive

There really isn't much pollution in the air, mostly allergens

You gotta do something, you'll die if you keep smoking/vaping or whatever he is doing

Which of the following is normally included in the criteria of a design?

Answers

The one that is normally included in the criteria of a design is budget. The correct option is 3.

What is budget?

A budget is an estimate of revenue and expenses for a given period of time that is usually compiled and re-evaluated on a regular basis.

Budgets can be created for an individual, a group of people, a company, a government, or almost anything else that makes and spends money.

Criteria are requirements that the design must meet in order to be successful. Constraints are design limitations.

These may include the materials available, the cost of the materials, the amount of time available to develop the solution, and so on.

Thus, the correct option is 3.

For more details regarding budget, visit:

https://brainly.com/question/15683430

#SPJ1

1. Materials

2. Time

3. Budget

4. Efficiency

which tool lets you create system maintenance tasks that are performed on a regular schedule or when system events occur? a. performance monitor b. event viewer c. iscsi initiator d. task scheduler

Answers

Task Scheduler lets you create system maintenance tasks that are performed on a regular schedule or when system events occur

The Task Scheduler is a tool in Windows that allows you to create and manage tasks that are performed on a regular basis or in response to certain events. You can use the Task Scheduler to perform system maintenance tasks, such as backing up files or running disk defragmentation, that are performed on a regular schedule. You can also use it to run tasks in response to events, such as when a user logs on or an application crashes.

The Task Scheduler is a valuable tool that can help you automate routine maintenance tasks and keep your system running smoothly.

Learn more on Task Scheduler here:

https://brainly.com/question/19999569

#SPJ4

question 1 data analysis is the various elements that interact with one another in order to provide, manage, store, organize, analyze, and share data.

Answers

The  data analysis is the various elements that interact with one another in order to provide, manage, store, organize, analyze, and share data is a false statement.

What is Data ecosystem?

The term  data ecosystem is a composition of infrastructure, as well as analytics, and applications that are known to be used to get in and examine data.

Note that the Data ecosystems helps firms with a lot of data that they rely on to known about  their customers.

Thus, The  data analysis is the various elements that interact with one another in order to provide, manage, store, organize, analyze, and share data is a false statement as it is a data ecosystem.

Learn more about Data ecosystem from

https://brainly.com/question/27769819

#SPJ1

Data analysis is the various elements that interact with one another in order to provide, manage, store, organize, analyze, and share data. true/false.

as you read your etext, the menu options at the left of your screen will help you to easily navigate the etext and customize the content and your reading experience to help you succeed in your course. sort each scenario to the etext icon that will help you accomplish that task.

Answers

Answer:

Explanation:

Please find the answer in the image below

Select the correct answer. What does the number 5 denote in the formula for Gross Words per Minute? A. number of characters in a word B. number of errors in a sentence C. number of special characters in a sentence D. number of entries in a sentence E. number of keyboard shortcuts used while typing
PLS ANSWER ASAP

Answers

Answer:

aaa

Explanation:

The correct answer is A. The number 5  represents the number of characters in a word.

What are Gross Words per Minute?

Gross Words per Minute (GWPM) is a measure of typing speed that represents the total number of words typed in a given time period, typically measured in minutes.

here,
In the formula for Gross Words per Minute (GWPM), the number 5 typically denotes the number of characters in a word. The formula for GWPM is:

GWPM = (total number of characters typed / 5) / (time taken to type in minutes)

The total number of characters typed is divided by 5 (number of characters in a word) to get the number of words typed since the average word in English is around 5 characters long. This gives the gross words typed per minute, which is a measure of typing speed.

Learn more about Gross Words per Minute here:
https://brainly.com/question/12608672
#SPJ2

What address should you ping if you want to test local ipv6 operation but don't want to actually send any packets on the network?

Answers

If you want to test local IPv6 operation without actually sending any packets over the network, you can use the ping command with the prefix ::1.

A computer network administration tool called ping is used to check whether a host is reachable on an IP network. Almost all operating systems with networking capabilities, including the majority of embedded network administration software, support it.

Ping calculates the amount of time it takes for messages to travel from the source host to the destination computer and back again. The term is derived from active sonar, which uses sound pulses and echo detection to find objects beneath the surface of the water.

Learn more about ping https://brainly.com/question/4671581

#SPJ4

tim just logged into his cloud management dashboard to check the health monitors of his server fleet. what is the process he completed at login?

Answers

Since Tim logged into his cloud management dashboard to check the health monitors of his server fleet, the process he completed at login is: C. authentication.

What is 2FA?

2FA is an acronym for two-factor authentication and it can be defined as a security system that is designed and developed to require end users or devices to provide two (2) separate but unique forms of identification, so as to enable them access and use a secured resource.

In Cybersecurity, two-factor authentication refers to a security system that uses the combination of something an end user knows with something he or she has such as one-time password, in order to successfully identify and authenticate the request of an authorized end user or device.

In this context, we can infer and logically deduce that the process Tim completed at login is an authentication because he successfully logged into his cloud management dashboard to check the health monitors of his server fleet.

Read more on two-factor authentication here: brainly.com/question/14330595

#SPJ1

Complete Question:

Tim just logged into his cloud management dashboard to check the health monitors of his server fleet. What is the process he completed at login?

A.Authorization

B.Accounting

C.Authentication

D.Federation

E.Identity access

All computers can display any font embedded in a webpage so
designers can use unusual or really fancy fonts as regular text on a
page.

True
False

Answers

Answer:

whatiscardboatdmadeof

False. Not all computers can display all fonts, so web designers could use a standard font (eg. Sans serif) if they want all people to see the same font. Some designers may choose to use a more fancy font and then set a standard font as a “backup” that a computer can revert to if it cannot show the fancy font.

______is the process of identifying domain names as well as other resources on the target network

Answers

Network enumeration is the process of identifying domain names as well as other resources on the target network.

Network enumeration is the process in which hackers try to find out the maximum data possible about the targeted user in order to enter and get a hold of the user's computer to carry out any threatful activity.

Information regarding user names, domain names, and applications can be achieved by the hacker through the process of network enumeration.

The network enumerator works by searching for any unprotected aspect of the network which can be easily attacked and then alerts the hacker about it by which the hacker can gain access to the computer.

On the other hand, network enumerators can also be beneficial in that they can be used to scan for the unsafe and unguarded aspects of the networks which can then be fixed in an appropriate way before the hacker can attack by using this vulnerability.

To learn more about enumeration, click here:

https://brainly.com/question/13068603

#SPJ4

Something that serves as a model for others to copy is a ____
document
template
copy
model

Answers

Answer: template

Explanation: because i know meanings of words

while cleaning the data, you notice there’s missing data in one of the rows. what might you do to fix this problem? select all that apply.

Answers

The thing that a person might do to fix this problem is option a and c in the image attached: Ask a college for guidance or ask a supervisor.

What are the causes of missing data?

Missing data, or missing values is known to be a term that connote when a person do not possess data stored for some variables or participants.

Note that  Data can go missing as a result of an  incomplete data entry, equipment issues, lost files, and others.

Therefore, based on the above, The thing that a person might do to fix this problem is option a and c in the image attached: Ask a college for guidance or ask a supervisor.

Learn more about Missing data from

https://brainly.com/question/22521037
#SPJ1

write a program that prints the sum of two selected numbers from a line –first line of input contains the number of lines to follow –first number of each line, n>

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that prints the sum of two selected numbers from a line.

Writting the code:

import java.util.*;

public class Main

{

public static void main(String[] args)

{

    // create a Scanner Object

    Scanner sc = new Scanner(System.in);

   

    //declare required variables

    int number_of_lines, total_numbers;

 

    //take input of number_of_lines

    number_of_lines = sc.nextInt();

 

     //initialize array to store the sum of values for each line

     int []sum_arr =  new int [number_of_lines];

 

 

       //loop runs to take the numbers as input and calculate their sum

       //and store in the array.

 for(int i=0;i<number_of_lines;i++)

 {

     // first take the count of numbers to be inserted in each

     //row

     total_numbers =  sc.nextInt();

     

     // since last two are the indices,  create an array with size 2

     //less than total_numbers

     int [] numbers =  new int[total_numbers-2];

     

     //loop to take the numbers into array

     for(int j=0;j< total_numbers-2 ;j++){

         numbers[j] = sc.nextInt();

     }

     int sum_of_numbers = 0;

     

     // take the last two indices as input and find

     //the values in the numbers array

     //then calculate their sum

     sum_of_numbers += numbers[sc.nextInt()-1];

     sum_of_numbers += numbers[sc.nextInt()-1];

     

     //finally store the sum on an array.

     sum_arr[i] = sum_of_numbers;

   

     

 }

 

 //loop to print the sums

 for(int i=0;i<number_of_lines;i++){

     System.out.println(sum_arr[i]);

 }

 

}

}

See more about JAVA at brainly.com/question/12978370

#SPJ1

you enable a system-assigned managed identity for vm1. to which identities can you assign the reports reader role?

Answers

The identities a person can you assign the Reports reader role is network option (B) User1 and RG1 only.

What is a system assigned managed identity?

A system-assigned managed identity is known to be a function or tool that helps Azure VMs to be able to authenticate to other  forms of cloud services without having to save credentials in code.

Note that if the tool is enabled, all the needed permissions can be granted in course of the Azure Role-Based Access Control (RBAC) access management system.

Therefore, The identities a person can you assign the Reports reader role is network option (B) User1 and RG1 only.

Learn more about Azure  from

https://brainly.com/question/28168433

#SPJ1

You have an Azure subscription that contains a user named User1, a

resource group named RG1, and a virtual machine named VM1.

You enable a system-assigned managed identity for VM1.

To which identities can you assign the Reports reader role?

(A) User1 only

(B) User1 and RG1 only

(C) User1 and VM1 only

(D) User1, RG1, and VM1

To use analytics to collect website data, what must be added to the website page html?.

Answers

Answer:

Analytics Tracking Code

if marcus is on a 3500-kilocalorie diet, based on the amdr for dietary fat, how many kilocalories should he obtain from dietary fat daily? 400–905 kilocalories 500–1005 kilocalories 600–1115 kilocalories 700–1225 kilocalories 800–1355 kilocalories

Answers

The numbers of kilocalories that Marcus will  obtain from dietary fat is 700-1225 kcal.

What is Calorie?

The calorie is known to be the unit of  energy especially when used for food consumption.

Note that  a large calorie, food calorie, or kilogram calorie are known to be the term that connote a given  amount of heat that is needed to increase the temperature of one kilogram of water by one degree Celsius.

Therefore, based on the question, the numbers of kilocalories that Marcus will  obtain from dietary fat is 700-1225 kcal.

Learn more about kilocalories  from

https://brainly.com/question/15983910

#SPJ1

See full question below

According to the Acceptable Macronutrient Distribution Range, 20% to 35% of the total caloric intake should come from fat. If Marcus is on a 3,500 kilocalorie diet, how many kilocalories should he obtain from dietary fat?

400-905 kcal

500-1005 kcal

600-1115 kcal

700-1225 kcal

800-1355 kcal

Which of the following is another name for the “processor”?

A.
CPU

B.
RAM

C.
DVD

D.
HDD

Answers

Answer:

A - CPU

CPU means "Central Processing Unit"

all of the following are new technology-related trends in mis except: group of answer choices the mobile digital platform. iot. big data. co-creation of business value. cloud computing.

Answers

The option that is note a new technology-related trends in MIS is co-creation of business value.

Technology and Management Information System:

Technology and Management Information System is known to be a term that connote the way a person can know or understand data that is obtained from a lot of units and departments of an organization.

Note that It can be used in the area of integration with other types of technology and as such, The option that is note a new technology-related trends in MIS is co-creation of business value.

Learn more about  business value from

https://brainly.com/question/25528419

#SPJ1

you are working on shortening the time it takes patients with chest pain to get to the cardiac catheterization lab in your hospital. your aim is to have 90 percent of patients brought to the lab within 45 minutes of arrival to the hospital. you decide to try a care protocol that another hospital in the area implemented with great success. the care protocol was successful at the other hospital. why would it be important to test this proven change at your hospital?

Answers

It would be important to test this proven change at your hospital: Because this change may not be as effective in your hospital.

Changes that are successful in one complicated system might not be successful at all—or even at all—in another. Testing the modifications is the only way to be certain.

Testing "proven" improvements is also recommended to assess expenses, reduce opposition, raise buy-in, and boost your own confidence that the change would improve your setting.

-during the "s" phase of your subsequent pdsa cycle:

S is an acronym for "study." In this stage, you review the information amassed during the "Do" phase. The "Plan" step includes planning for implementation, while the "Do" step includes recording results. Thinking about how to disseminate the PDSA cycle does not include.

Learn more about hospital:

https://brainly.com/question/27126420

#SPJ4

which operating system feature is designed to detect malware that is loaded early in the system startup process or before the operating system can load itself? advanced anti-malware measured boot master boot record analytics startup control see all questions back next question

Answers

The operating system feature that is designed to detect malware that is loaded early in the system startup process or before the operating system can load itself is  option d: Measured Boot.

What is Measured Boot?

Measured boot is known to be one of the feature of operating system where there is known to be a log of all boot work that is said to be  taken and saved in a trusted place module for future retrieval as well as analysis by anti-malware software on any kind of remote server.

Note that an operating system (OS) is said to be a kind of a software that is known to helps in  the act of operating both hardware as well as the software of any given computer and it also handles  all other application programs.

Therefore, based on the above, The operating system feature that is designed to detect malware that is loaded early in the system startup process or before the operating system can load itself is  option d: Measured Boot.

Learn more about operating system  from

https://brainly.com/question/22811693
#SPJ1

Which operating system feature is designed to detect malware that is loaded early in the system startup process or before the operating system can load itself?

-Master Boot Record Analytics

-Startup Control

-Advanced anti-malware

-Measured Boot

Other Questions
10 times as much as 72.67 being neutral for body weight for dpp-4 inhibitors and having potential for weight reduction with the glp-1ra. toni can carry up to 15 lbs in her backpack. her lunch weights 1 lb, her gym clothes weight 2 lb, and her books (b) weight 3 lb each. How many books can she carry in her backpack? PLZ HELP QUICKLY WORTH 35 POINTS NOT KIDDING AND WILL MARK BRANLIESTA pair of equations is shown below:y = 3x 5y = 6x 8Part A: Explain how you will solve the pair of equations by substitution or elimination. Show all the steps and write the solution. (5 points)Part B: If the two equations are graphed, at what point will the lines representing the two equations intersect? Explain your answer. (5 points) HELP TIMER WILL GIVE BRAINLY IF CORRECT!!!! What must happen for most areas on Earth to experience all four seasons?a) The Sun must reach its highest point in the sky.b) The Northern Hemisphere must experience winter.c) The axis must be tilted at a certain angle that remains unchanged.d) The north end of Earth's axis must always point away from the Sun. I need help with my work A large bagel spins with angular speed w about its center. A smaller bagel spins with triple the angular speed.How does the period Tlarge of the large bagel compare with the period Tsmall of the small bagel? How many solutions are there to this equation? 5x + 2-2(x - 1) = 3x + 4*Ono solutionO exactly one solutionO at least two solutionsOinfinitely many solutions at the end of may, bergan company had completed jobs 200 and 305. job 200 is for 2,390 units, and job 305 is for 2,053 units. the following data relate to these two jobs: on may 7, bergan company purchased on account 10,000 units of raw materials at $8 per unit. during may, raw materials were requisitioned for production as follows: 7,500 units for job 200 at $8 per unit and 1,480 units for job 305 at $5 per unit. during may, bergan company accumulated 2,500 hours of direct labor costs on job 200 and 3,000 hours on job 305. the total direct labor was incurred at a rate of $28 per direct labor hour for job 200 and $24 per direct labor hour for job 305. bergan company estimates that total factory overhead costs will be $620,000 for the year. direct labor hours are estimated to be 80,000. How did the Columbian Exchange affect global population? Chris types at an average speed of 45 words per minute. He has already typed 1,500 words of his final paper. The paper has to be more than 3,750 words. Which of the following inequalities could be used to solve for x, the number of minutes it will take Chris to finish his paper? ANSWER CHOICES R IN COMMENTS Question 5Read the paragraph. Based on the details, why is an animals habitatso important? A, a habitat can help outsiders survive in a tough place B. A habitat provides everything on animal needs to survive C. Some habitats like a dessert can be a dangerous place to live D.some habitats have water and other habitats don't Which one of these deals is the lowest price per ounce?a) 5 ounces for $2.52b) 7 ounces for $3.48c) 8 ounces for $3.92 Acidic water can react with limestone to break the rock down and form caves in the Earth's surface. This is an example of _______, which happens _______ over time. A. physical weathering, quickly B. physical weathering, slowly C. chemical weathering, quickly D. chemical weathering, slowly if n and p are supplementary angles, mN=(x+3) and mP=(7x-15) ,find mP. MATH AGAIN HELP PLS!!!!!!!!!!!!!!!!!!!!!!!!!! Wax melts when it is heated. Which most likely describes what is true of the result of this reaction? In 1649 Oliver Cromwell abolishes the monarchy and becomes a military dictator in England.true or falseASAP The graph indicates what about the relationship between atmospheric carbon dioxide and time-))A)over time, the amount of atmospheric carbon dioxide increasesB)over time, the amount of atmospheric carbon dioxide decreasesover time, the amount of atmospheric carbon dioxide stays the sameD)over time, the amount of atmospheric carbon dioxide does not change What is sodapop's family/home life like from the outsiders book/movieanswer ASAP if you have the page number that will also help a lot