Which layer of the OSI model should you check first if a computer can't connect to the company network

Answers

Answer 1

Answer:

In any network, most of the problems occur at the physical, data-link, and network layers. Therefore, it is always advisable to start troubleshooting from the physical layer and gradually proceed to the application layer.

Explanation:


Related Questions

A computer program outputs whether a capital city in Europe is north or south of another capital city in Europe. It only needs to know the latitude of the two cities – the other detail is unnecessary. This is an example of abstraction; including the necessary detail and not including the unnecessary detail.

Answers

Answer:

Yes, that is correct.

Explanation:

Abstraction is the process of focusing on the essential features of something and ignoring non-essential details. In this case, the program is only concerned with the latitude of the two cities, so it ignores all other details about the cities and only outputs whether one city is north or south of the other. This helps to simplify the program and make it more efficient by only dealing with the necessary information.

epeat the previous process using recursion. Your method should not contain any loops. How much space does your method use in addition to the space used for L?

Answers

To repeat the previous process using recursion, we can create a recursive function that calls itself with a modified version of the input until the base case is reached. In this specific case, the base case would be when the input list (L) is empty.

Here is an example of a recursive function that performs the process:

def recursive_process(L):

   if not L: # base case: if the list is empty, return

       return

   # perform the process on the first element of the list

   process(L[0])

   # call the function again with the rest of the list (excluding the first element)

   recursive_process(L[1:])

In terms of space usage, the function uses O(n) space in addition to the space used for the input list L. This is because for each recursive call, a new stack frame is created, and these stack frames take up memory. Since the function is called once for each element in the input list, the total space usage is proportional to the size of the input list.

Learn more about recursive function, here https://brainly.com/question/30027987

#SPJ4

Which of the following increases or decreases how crisp the objects in a photo appear?
a. brightness
b. sharpness
c. crispness
d. contrast

Answers

the answer is b. sharpness

Which BEST describes a third-generation computer? A. the CPU was used for the first time, computers could be owned by the general public, and a GUI was used B. used operating systems, keyboards, and monitors for the first time, and integrated circuits were used to supply electricity C. used artificial intelligence so that the computers become reasonably intelligent all on their own D. high-level programming languages, magnetic tape and disks for storage, and used small transistors to supply electricity

Answers

THIRD - GENERATION COMPUTER

C. used artificial intelligence so that the computers become reasonably intelligent all on their own

Third-generation computers were developed in the 1960s and marked a significant advancement in the development of computers. They were the first computers to use integrated circuits, which allowed for smaller and more powerful computers. Third-generation computers also featured the development of high-level programming languages, such as COBOL and FORTRAN, which made it easier for programmers to write and understand code. These computers also used magnetic tape and disks for storage, which were much more efficient than the punched cards used in earlier computers. Third-generation computers made use of artificial intelligence, which allowed them to perform tasks that required some level of independent thought and decision-making.

Hope This Helps You!

a firewall cannot be deployed as a separate network containing a number of supporting devices. true or false

Answers

This claim is untrue; a firewall cannot be installed as a standalone network with a variety of auxiliary hardware.

What kind of proxy access should be used to prevent HTTP traffic from internal networks when web services are provided outside the firewall?

When Web services are provided outside the firewall, HTTP traffic from inside networks should be restricted using a proxy access method or DMZ architecture. All data that cannot be verified as authentic should be denied according to good firewall rules. By protocol name, certain firewalls can filter packets.

Which of the subsequent best sums up a firewall?

Incoming and outgoing network traffic is managed by a combination of hardware and software.

To know more about standalone network  visit :-

https://brainly.com/question/29809789

#SPJ4

The local amusement park has decided to stop printing paper copies of the park map. It will now only be available as a digital file. Why do some visitors think this is a bad idea

Answers

For the fact that not every visitor will have a mobile device on which he or she can read the map, some visitors believe that this is a bad idea.

What sort of paper is ideal for printing maps on?

A synthetic paper is the finest medium to print maps on if you want results that are waterproof, durable, and tear resistant. SYNPLAS SPA possesses all of these qualities. For printing maps and charts, synthetic papers are available.

Are paper maps distributed at Disneyland?

There are various places to get a map while in the Disneyland Resort. At the main entrance turnstiles of the theme park, there is a paper park brochure with a map. The majority of Guest Relations sites also have these.

To know more about mobile device visit :-

https://brainly.com/question/30011881

#SPJ4

Fill in the blank: A keyword set to _____ match type will display your ad if the search term includes that keyword, or a very close variation.

Answers

A keyword set to exact match type will display your ad if the search term includes that keyword, or a very close variation.

Broad match keyword: what is it?

All of your keywords are automatically allocated the broad match match type. Without having to create a lengthy keyword list, this lets your adverts reach a larger audience. Let's use the broad match term "vehicle window repair" as an example.

Which type of keyword matching can match to queries that don't contain the term itself and is the most adaptable?

Phase Match, In terms of attracting visitors to your website, this does give you more freedom. Additional words can be added to phrase match keywords either before or after, but not in the midst of the key phrase.

To know more about keyword match visit

brainly.com/question/10672444

#SPJ4

Benchmark tests on competing products can be used to select ____. a. primarily hardware products b. primarily software products

Answers

It is possible to utilize benchmark testing to assess both software and hardware items. The greatest product reviews in technology journals assess multiple goods against predetermined criteria and list the benefits and drawbacks of each product.

What is benchmarking?

Comparing company operations and performance metrics to industry benchmarks and other companies' best practices is the process of benchmarking. Quality, time, and money make up the three key measures.

Using a certain indicator (such cost per unit of measure, productivity per unit of measure, or cycle time of x per unit of measure,

Benchmarking is a technique for measuring performance that generates a metric of performance that is then compared to others (such as faults per unit of measure).

This management technique, usually referred to as "process benchmarking" or "best practice benchmarking,"

compares a variety of operational characteristics of an organization to best-practice firms, usually within a peer group created for the purpose of comparison.

Hence , It is possible to utilize benchmark testing to assess both software and hardware items.

learn more about benchmark click here:

https://brainly.com/question/5561623

#SPJ4

CMOS is a special kind of memory that uses a great deal of power. True or False?

Answers

The statement is false

Which operating system is the most popular?

When measured by web usage, Android, an operating system based on the Linux kernel, is the world’s most popular operating system as of November 2022. It has 42% of the worldwide market, followed by Windows (30%), Apple iOS (18%), macOS (6%), and (desktop) Linux (1.0%), all of which use the Linux kernel.

On a computer motherboard, complementary metal-oxide-semiconductor (CMOS) memory holds the Basic Input/Output System (BIOS) settings. The BIOS is the software that is stored on the motherboard’s memory chip. Because of leakage current, CMOS devices have relatively low static power consumption. When all inputs are kept at a correct logic level and the circuit is turned on, this power consumption occurs.

To learn more about CMOS to refer:

https://brainly.com/question/14767803

#SPJ4

Refer to Exhibit: Which access controls list allows only TCP traffic with a destination port range of 22-443, excluding port 80

Answers

Access Control List (ACL) 1 allows only TCP traffic with a destination port range of 22-443, excluding port 80

Which access control list disallows all other communication other than TCP traffic with a destination port range of 80 through 243?The access controls list that allows only TCP traffic with a destination port range of 22-443, excluding port 80, is an access control list (ACL) that uses network layer filtering.This type of ACL is configured to filter traffic based on its source or destination IP address, port numbers, or protocol. In this case, the ACL will be configured to explicitly deny any TCP traffic with a destination port of 80, while allowing only TCP traffic with a destination port range of 22-443.This ACL will be applied to the router or firewall and can be configured using access control entries (ACEs).Each ACE will specify the source and destination IP address, port numbers, and protocol.The ACEs will also specify whether to allow or deny the traffic.This type of ACL will provide a high level of security by limiting the type of traffic that can pass through the network.

To learn more about Access Control List (ACL) 1 refer to:

https://brainly.com/question/29830414

#SPJ4

You have just been hired as a Level 1 PC Support Technician by Acme Products. Part of your job responsibilities include performing limited tasks on company workstations. You need to create a local account for a user on a computer running Windows Vista. You also need to install a printer for that user. What type of account must you have on the Windows Vista computer in order to complete your assigned work with limited access?

Answers

You need a userguest account on a Windows Vista PC in order to finish your given tasks with restricted access.

What kind of account allows for total computer access?

During the Windows installation, the Administrator account is the first to be established. The local device's services, directories, files, and other resources are completely under the authority of the Administrator account.

What are the three different kinds of Windows user accounts?

For ordinary computing, standard user accounts are used. Only utilize administrator accounts when absolutely essential because they provide you the most authority over a machine. Those who only need temporary access to a computer are the main target audience for guest accounts.

To know more about Windows Vista visit :-

https://brainly.com/question/12973188

#SPJ4

Accenture i one of everal hundred companie that ha igned on to the United Nation Global Compact (UNGC) Buine Ambition pledge

Answers

It was for the 1.5° Pledge, which was also supported by a large number of other businesses.

What is UN Global Compact Business Ambition?In response to the global climate catastrophe and in the run-up to the next UN Climate Action Summit, a communications and advocacy campaign called Business Ambition for 1.5 °C: Our Only Future is urging businesses to stand up and play their part in limiting global temperature rise to 1.5 °C. We aspire to create the society we want by organizing a global movement of sustainable businesses and stakeholders through the UN Global Compact. That is our goal.The target temperature increase from pre-industrial levels should not exceed 1. 5 Celsius.The company signed the UN Global Compact Business Ambition to demonstrate its participation.It was for the 1.5° Pledge, which was also supported by a large number of other businesses.The pledge's main goal is to forge a business-to-business alliance to manage the climate.They have taken an oath to preserve the Paris Climate Agreement and contribute to keeping global warming below 1.5° Celsius.They are committed to achieving emission oblivion.They also emphasize neutrality while describing the procedure for balancing their carbon emissions. This might potentially aid in reducing the consequences of climate change.

To learn more about UNGC refer to:

https://brainly.com/question/29237338

#SPJ4

Ann, a user, reports that after setting up a new WAP in her kitchen she is experiencing intermittent connectivity issues. Which of the following should a technician check FIRST ?
A. Channels
B. Frequency
C. Antenna power level
D. SSID

Answers

Channels After installing a new WAP in her kitchen, Ann, a user, claims that she is having sporadic connectivity problems.

Which of the following provides the highest level of wireless security?

There is consensus among experts that WPA3 is the best wireless security protocol when comparing WEP, WPA, WPA2, and WPA3. WPA3, the most recent wireless encryption system, is the safest option.

Is WEP preferable to WPA2?

The WPA standard's second iteration is known as WPA2. Wep is the least secure of these standards, therefore if at all possible, avoid using it. However, using any encryption is always preferable to using none. Of the three, WPA2 is the safest.

To know more about WAP visit :-

https://brainly.com/question/13073625

#SPJ4

Which of the following is NOT among the items of information that a CVE reference reports?
1. Attack Signature
2. Name of the vulnerability
3. description of vulnerability
4. Reference in other databases

Answers

Attack Signature is not among the items of information that a CVE reference reports.

Describe a database.

Any type of data can be stored, maintained, and accessed using databases. They gather data on individuals, locations, or objects. It is collected in one location in order for it to be seen and examined. You might think of database as a well-organized collection of data.

Excel: Is it a database?

Spreadsheet software, not a database, is Excel. Its restrictions in that sense are significant, despite the fact that many users attempt to force it to behave like a database. Let's start with the most obvious: unlike databases, Excel is not constrained to 1M rows of data.

To know more about database visit :

https://brainly.com/question/25198459

#SPJ4

Microsoft Excel Data Model features have several benefits including the ability to _____ and _____ formulas for time efficiency.

Answers

M!crosoft Excel Data Model features have several benefits including the ability to "link" and "consolidate" formulas for time efficiency. Linking refers to the ability to create relationships between tables in the data model, allowing data from multiple tables to be combined and analyzed in a single pivot table or pivot chart.

Consolidating refers to the ability to combine data from multiple ranges into a single range, which can then be used in a pivot table or chart. This allows for more efficient data analysis and eliminates the need to manually combine data from multiple sources, saving time and reducing the potential for errors.

Learn more about the excel here https://brainly.com/question/30087354

#SPJ4

Sending the right email requires tactical aspects. Which of these are tactical aspects of sending the right email : Expectations
Email layout
Personalization
All of the above

Answers

You must be aware of the concerns, issues, behavioral patterns, motivations, and goals of your audience. Create distinct buyer personas for each audience.

What are the two main strategies to consider when tailoring each component of your email?

Observe email performance by tracking open rates, click-through rates, and conversions. The open and click are two crucial activities to consider when improving your email. Your email pushing too hard is one common reason for low click-through rates.

What are the three opt-in levels?

The OPT is separated into five phases and three levels: stabilization, strength, and power (figure 1). Specific protocols, workout recommendations, and acute factors.

To know more about email visit:-

https://brainly.com/question/14666241

#SPJ4

Write a program that reads an integer representing a year input by the user. The purpose of the program is to determine if that leap year is a leap year (and therefore has 29 days in February) in the Gregorian calendar. A year is a leap year if it is divisible by 4, unless it is also divisible by 100 but not 400. For example, the year 2003 is not a leap year, but 2004 is. The year 1900 is not a leap year because even though it is divisible by 100, it is also divisible by 400. python

Answers

A program that reads an integer representing a year input by the user. The purpose of the program is to determine if that leap year is a leap year (and therefore has 29 days in February) in the Gregorian calendar. A year is a leap year if it is divisible by 4, unless it is also divisible by 100 but not 400. For example, the year 2003 is not a leap year, but 2004 is. The year 1900 is not a leap year because even though it is divisible by 100, it is also divisible by 400 can be write as follows:

import java.util.Scanner;

public class Main{

  public static void main(String[] args) {

      int year;

      Scanner scanner = new Scanner(System.in);

      System.out.print("Please enter a year\n\n");

      year = scanner.nextInt();

      while (year < 1582) {

          System.out.print("\nPlease enter a different year above 1582\n");

          year = scanner.nextInt();

      }

      if (year % 4 == 0) {

          if(year % 100 ==0 && year % 400 != 0){

                  System.out.println(year + " is not a leap year\n\n");

          }else {

              System.out.println(year + " is a leap year\n");

          }

      } else {

          System.out.println(year + " is not a leap year\n\n");

      }

  }

}

Learn more about java at https://brainly.com/question/29897053

#SPJ4

What fingers are best to click the shift keys?
1. Ring
2. Middle
3. Pinky
4. Index

Answers

Answer:

i prefer doing it as index but many people have different ways on using keyboard and mouses

Answer:

Pinky. 3. Because on the positioning of the QWERTY (Most used) keyboard, it's much closer

Explanation:

porque es importante la tecnología?​

Answers

Explanation:

La tecnología se refiere a la colección de herramientas que hacen más fácil usar, crear, administrar e intercambiar información. El desarrollo de alta tecnología ha ayudado a conquistar las barreras de comunicación y reducir la brecha entre la gente de todo el mundo.

Which similar computer network components connect multiple devices?
A and are similar computer network components that connect multiple devices in a computer network. Please helppp

Answers

Answer: A network switch and/or a network hub its one of those two im not quite sure though

Explanation:

“Here’s my idea: I want to build a tic-tac-toe game. The user creates an account if they don’t already have one and are taken to the main game board. From there the player will play against the computer in either easy, intermediate, or advanced mode, so I will need to write the code for the computer player. When the game is over their lifetime win total is updated. I will also keep track of how long the game took.”

Answers

Answer:

tic tac

Explanation:

tic tac and hamburger always

Option #1: Compliant/Noncompliant Solutions java
//The following code segment was provided in Chapter 1 of Java Coding Guidelines and it's considered as //NON-compliant:
void readData() throws IOException {
BufferedReader br = new BufferedReader(new InputStreamReader( new FileInputStream("file")));
// Read from the file
String data = br.readLine();
}
The code is presented as a non-compliant code example. For this assignment, identify 2 compliant solutions that can be utilized to ensure the protection of sensitive data.
Provide an explanation of factors that influence non-compliant code and specifically how your solutions are now compliant.

Answers

The usage of try-catch statements in the aforementioned code makes it compliant, as opposed to just throwing exceptions. Since all of the errors are fixed, the program becomes more compliant.

What is the purpose of Java?

The main language for creating Android mobile applications is Java. In actuality, Java is used to create the Android operating system. While Kotlin has lately emerged as a Java-free alternative for Android development, it still makes use of the Java Platform and can communicate with Java code.

Main.java:

import java.io.*;

public class Main {

public static void main(String[] args) {

BufferedReader br = null;

try {

String data;

br = new BufferedReader(new FileReader("file.txt"));

while ((data = br.readLine()) != null) {

System.out.println(data);

}

} catch (IOException e) {

e.printStackTrace();

} finally {

try {

if (br != null)

br.close();

} catch (IOException ex) {

ex.printStackTrace();

}

}

}

}

Output:

Main.java

import java.io.*;

public class Main {

private static final String FNAME = "file.txt";

public static void main(String[] args) {

try (BufferedReader b = new BufferedReader(new FileReader(FNAME))) {

String data;

while ((data = b.readLine()) != null) {

System.out.println(data);

}

} catch (IOException e) {

e.printStackTrace();

}

}

}

The application will determine whether the file is present and whether it contains any data. Never will the application issue any warnings or compile-time problems. Additionally, we used a finally statement to guarantee that the program was running correctly.

Similar to the first option, the second solution uses the try-catch method directly to read the file without any additional components, keeping the program short and organized. I will advise utilizing the first application because it's much more compliant and because all the work put into it has made it more effective and simple to use.

To know more about Java visit :

https://brainly.com/question/29897053

#SPJ4

Which programming problem stems from multiple threads not executing in a predictable, sequential pattern

Answers

Race condition is the programming problem stems from multiple threads not executing in a predictable, sequential pattern.

What does "racial condition" refer to?

When two threads try to access a shared variable at the same time, it is called a race condition. Both the first and second threads read the same value from the variable in the first thread. A light switch is a straightforward example of a race situation. A common ceiling light may be controlled by several light switches in some dwellings. The switch position is no longer relevant when these kinds of circuits are employed. If either switch is moved from its current position while the light is on, the light is turned off.

What makes it a "race condition"?

A race condition is, by definition, a situation in which a program's behaviour depends on the relative timing or interleaving of several threads or processes. A bug could arise if one or more alternative outcomes are unfavourable. This type of behaviour is referred to as nondeterministic.

To know more about Race condition visit

brainly.com/question/28495026

#SPJ4

Leat one entrepreneur in the Philippine. Read their life tory and how they tarted their buine

Answers

Mang Inasal creator Edgar Sia is widely regarded as the country's innovator of unlimited rice lunches. Sia, who is now 19 years old, left college to launch his own laundry and photo-developing company.

What does becoming an entrepreneur entail?

Entrepreneur: "A person who establishes a business and is prepared to take financial risks in order to succeed." The term "entrepreneur" is defined as follows by Merriam-Webster.

characteristics of successful entrepreneurs?

Entrepreneur refers to a person who has the skills, drive, and willingness to take the risks necessary to found, run, and succeed in a starting business. The best example of entrepreneurship is the beginning of a new business venture.

To know more about entrepreneur visit:

https://brainly.com/question/13897585

#SPJ4

A directory includes the files a.py, b.py, and c.txt. Which command will copy the two files ending in .py to the /tmp/ directory?
A. cp !!.py /tmp/
B. cp *.py /tmp/
C. cp. \.py /tmp/
D. cp #.py /tmp/
E. cp $?.py /tmp/

Answers

The command that will copy the two files ending in .py to the /tmp/ directory is B. cp *.py /tmp/. The command cp !!.py /tmp/ uses the !! history substitution, it means that it will copy the last command which is not in this case the files that ends with .py, it could be any command.

The command cp. \.py /tmp/ it's not a valid command because cp. is not a valid option and \.py is not a valid file extension, it will return an error. the command cp #.py /tmp/ doesn't copy the files that ends with .py because # is used to reference the command number in history not the files, it will return an error. The command cp $?.py /tmp/ doesn't copy the files that ends with .py because $? is used to reference the exit status of the last command, it will return an error.

Learn more about code, here https://brainly.com/question/30087302

#SPJ4

Describe the level of technology, equipment, and instructional materials needed to support the proposed program of study or course offering.

Answers

The level of technology, equipment, and instructional materials needed to support the proposed program of study or course offering will depend on the specific course or program.

Technology, Equipment, and Instructional Materials Needed for a Program of Study or Course Offering

Generally speaking, the instructor will need access to a computer and internet connection, as well as software and applications that are required for the course. Additionally, instructional materials such as textbooks, workbooks, and handouts are often needed to support the course.

Depending on the subject matter, the instructor might need to purchase additional equipment such as lab equipment or video equipment. In some cases, specialized software or hardware may be required.

Finally, the instructor may need to provide access to online learning platforms, such as a learning management system, to facilitate engagement and communication between students and instructors.

Learn more about Technology: https://brainly.com/question/25110079

#SPJ4

how to change my age on this app

Answers

You can’t really change your age on this app. Once you submit you can’t really change it. I’m not sure why

Answer:

If you need to change your name on an app, I suggest you head to settings. There, see if you can change anything in regards to your profile. If this does not work, the only way to change your age would be to delete the app and create a new account. These are reccomendations, hopefully they help.

:


1.Explain five measures that protect users in the computer laboratory (10mks)

Answers

This chapter covers safe lab techniques, fundamental workplace safety precautions, proper instrument usage, and computer disposal.

What security precautions are in place in the computer lab?

When you are through using the device, turn it off. Never connect external devices without first checking them for malware. Since there are numerous devices and they might rapidly overheat in a lab, it is important to maintain a cool temperature in the space.

What safety measures in laboratories are most crucial?

Put on safety lab gear: As soon as you enter the lab, make sure you are wearing PPE. Before entering the lab, put on a lab coat with long sleeves, closed-toe shoes, and safety goggles. Keep your hair long if you have long hair.

To know more about computer laboratory visit:-

https://brainly.com/question/14751939

SPJ1

You are creating a DRP for a small, independent car dealership. There are four employees who each use a desktop computer; there are no servers. All company data is stored on the four computers. A single high-speed DSL link is shared by all users. What are the best DRP solutions

Answers

The risks that will have the greatest influence on business operations are identified via a business impact study. In figuring out how to recover from a calamity, this is helpful.

What kind of disaster recovery strategy focuses on minimising the impact of a disaster on IT systems, staff, and customers?

A disaster recovery plan gives companies the ability to react swiftly to a crisis, take immediate action to lessen damage, and restart operations as soon as feasible. Typically found in a disaster recovery strategy are Staff members can use emergency measures in the event of a calamity.

What actions should you take when keeping backup server tapes offsite?

Maintain all of your backup tapes and other media in a safe, comfortable, and, most importantly, fireproof environment. No matter if you backup a single file or a whole system.

To know more about business impact study visit :-

https://brainly.com/question/18645299

#SPJ4

Project stem 2.3 code practice question 2

Answers

Answer:

"Write a program that accepts two decimal numbers as input and outputs their sum."

a = float(input("Enter an integer: "))

b = float(input("Enter an integer: "))

print(a + b)

Explanation:

We are just entering an integer and having the code float the variable down to our print function thats why we have added the "float" variable

Glad to help!
Stay up and Stay Blessed!

Other Questions
A consumer agency wants to determine which of two laundry detergents, A or B, cleans clothes better. Fifty pieces of fabric are subjected to the same kinds of stains (grass, mud, coffee). Then 25 pieces are randomly assigned to be cleaned with detergent A and the remaining 25 pieces are cleaned with detergent B. After being laundered, the pieces of fabric are rated on a scale from 110, with 1 being the least clean to 10 being the most clean. The difference in mean ratings (A B) was determined to be 1.5. Assuming there is no difference in the two detergents, 200 simulated differences in sample mean ratings are displayed in the dotplot.Using the dotplot and the difference in mean ratings from the samples, is there convincing evidence that the one detergent is better than the other?Yes, because a difference in mean rating of 1.5 or more occurred only 23 out of 200 times, meaning the difference is statistically significant and there is convincing evidence that A is more effective than B.Yes, because a difference in mean rating of 1.5 or more occurred only 23 out of 200 times, meaning the difference is statistically significant and there is convincing evidence that B is more effective than A.No, because a difference in mean rating of 1.5 or less occurred 167 out of 200 times, meaning the difference is not statistically significant and there is not convincing evidence that one brand is better than the other.No, because a difference in mean rating of 1.5 or more occurred 23 out of 200 times, meaning the difference is not statistically significant and there is not convincing evidence that one brand is better than the other.answer is D If x = 5, then which inequality is true?F -2x 12G. x 2 < 7H. 2x > 12J. x 7 > 2 A rectangular piece of land is 1/4 miles long and a 1/2 mile wide what is the area of the piece of land in square miles The Americans held a ___________ view towards the war. It about the world war II Equations of Exponential Functions A 30-gram sample of bacteria has some unknown disease that is killing the bacteria. The amount of bacteria is measured each day and the results are shown in the table.What is the amount of bacteria on the 8th day?a. On the eighth day, the bacteria is 1.72 gramsb. On the eighth day, the bacteria is 19.90 gramsc. On the eighth day, the bacteria is 6.23 gramsd. On the eighth day, the bacteria is 6271.89 gramsPlease select the best answer from the choices provided Represent the following sentence as an algebraic expression, where "a number" is theletter x. You do not need to simplify.3 is divided by the difference of 4 and a number.Answer:Submit AnswerIlDELL******attempt 1 out of 2 The Cooper's roof started leaking after a storm. The repair cost $112. How much is left in their monthly emergency fund after they pay for the roof repair? Lynn is a zoo kepper at matlock zoo.her hourly rate is $6.85.she earns $328.80 every week.how many hours does she works in a week? 18,54, 162, ...Find the 8th term. Which example best supports the argument that gravitational forces are a pulling force?an acorn falling from a treewater rising from a pot as steama rocket launching from a launchpada magnet attracting a metal object (I need the answer as FAST as possible so if anybody could help that would be greatly appreciated) Cylinder A has a radius of 7 inches and a height of 5 inches. Cylinder B has a volume of 490TT. What is the percentage change in volume from cylinder A to cylinder B?50% decrease0.75% increase150% decreaseO 100% increase Would u describe ur school as racially and ethnically diverse why or why not? ( NO FILES/LINKS) The coordinates of a triangle are: R(-4,4) S(-2,-2) T(2, 3) Brian determined A RST was a scalene triangle, but he wanted to the find the lengths of the three sides. Complete the table to determine the three side lengths of ARST. 37 38 140 141 length of RS length of ST length of TR the length breadth and height of a cuboid are in the ratio 7:5:2 its volume is 35840cm Who pays the majority of taxes? What are the benefits of financial literacy? Please help me with these questions if can explain i am a bit confused at it What was the impact of Furman v. Georgia 1972 )? Which of the following three equations represent the same line? 12(t) (2,2,4) +t(2,4,6) O A. 1(),12() and Ia(t O B. 11(t) and 12(t) . 12(t) and la(t) D. 1(t) and 1(t) E. none Submit