network equipment is usually not included as part of configuration management because there is little need to document network hardware.

Answers

Answer 1

Answer:

Network equipment, such as routers, switches, and hubs, is usually considered part of the infrastructure of a network and is typically included in configuration management. Configuration management refers to the process of tracking and controlling changes to the hardware, software, and documentation of a network.

Documenting network hardware is an important aspect of configuration management, as it helps to ensure that the network is configured correctly and is functioning as intended. Network equipment documentation may include details such as the make and model of the device, its serial number, its IP address, and its location within the network.

By documenting network hardware, organizations can more easily identify and resolve issues that may arise, track changes to the network, and maintain a consistent configuration across the entire network. It is therefore important to include network equipment as part of configuration management.


Related Questions

Explain with examples:
What are the reasons of a successful and unsuccessful software project?

Answers

Answer:

A good starting point is by addressing some of the key reasons software projects fail.

Explanation:

Not Enough Time. ...

Insufficient Budget. ...

Poor Communication. ...

Never Reviewing Project Progress. ...

Inadequate Testing. ...

Testing in the Production Environment. ...

Lack of Quality Assurance. ...

Not Conforming to Industry Standards.

User involvement, management support, reasonable requirements, and accurate projections are some of the most frequent aspects that contribute to software project success.

What is a software project?

A software project is the entire process of developing software, from gathering requirements to testing and maintenance, carried out in accordance with execution techniques over a predetermined amount of time to produce the desired software output.

Some of the most frequent factors that influence the success of software projects are user interaction, management support, fair needs, and realistic estimates.

Application bug or error, environmental conditions, infrastructure or software failure, virus, hacker, network/hardware failure, and operator error are the main causes of software project failure.

According to the study, project success and failure are most heavily influenced by the degree of customer/user interaction, software process management, and estimation and timeline.

Thus, these are the reasons of a successful and unsuccessful software project.

For more details regarding software project, visit:

https://brainly.com/question/3818302

#SPJ2

SOMEONE PLS HELP?!?!!

Answers

Answer:

B. To continuously check the state of a condition.

Explanation:

The purpose of an infinite loop with an "if" statement is to constantly check if that condition is true or false. Once it meets the conditions of the "if" statement, the "if" statement will execute whatever code is inside of it.

Example:

//This pseudocode will print "i is even!" every time i is an even number

int i = 0;

while (1 != 0)       //always evaluates to true, meaning it loops forever

  i = i + 1;               // i gets incrementally bigger with each loop

     if ( i % 2 == 0)     //if i is even....

               say ("i is even!"); //print this statement

4.5.2 For loop: printing a dictionary python

Answers

Answer:

for x, y in thisdict.items():

 print(x, y)

Explanation:

A ___________ is a variable used to pass information to a method.

Answers

Answer:

A parameter is a variable used to pass information to a method.

Explanation:

A parameter is a variable used to pass information to a method.

What are the features of parameter?

In general, a parameter "beside, subsidiary" is any quality that aids in describing or categorizing a certain system. In other words, a parameter is a component of a system that is crucial or useful for identifying the system or assessing its functionality, status, or other characteristics.

In some fields, such as mathematics, computer programming, engineering, statistics, logic, linguistics, and electronic music production, the term "parameter" has more precise definitions.

In addition to its technical applications, it also has broader meanings, particularly in non-scientific situations. For example, the terms "test parameters" and "game play parameters" refer to defining qualities or boundaries.

A novel method of characterizing surface texture, in particular surfaces having deterministic patterns and features, is the use of feature parameters.

Traditional methods for characterizing surface texture, such profile and areal field parameters, are considered as supplementary to the feature parameter approach.

Learn more about parameter, here

https://brainly.com/question/29911057

#SPJ6

Write the following generic method that sorts an ArrayList of Comparable items. The sort method must use the compareTo method.
public static > void sort(ArrayList list)
Write a test program that:
1. prompts the user to enter 10 integers, invokes this method to sort the numbers, and displays the numbers in ascending order
2. prompts the user to enter 5 strings, invokes this method to sort the strings, and displays the strings in ascending (alphabetical) order

Answers

Answer:

Explanation:

The following code is written in Java, it prompts the user to enter 10 integers and saves them to an ArrayList. Then it prompts for 5 strings and saves them to another ArrayList. Then, it calls the sort method and adds the lists as parameters. Finally, it prints out both lists completely sorted in ascending order.

import java.util.ArrayList;

import java.util.Scanner;

class Division{

   public static double division(double a, double b) throws Exception {

       if(b == 0)

           //throw new Exception("Invalid number.");

           return (a / b);

       return a / b;

   }

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       ArrayList<Integer> mylist2 = new ArrayList<>();

       for (int x = 0; x < 10; x++) {

           System.out.println("Please Enter a Number: ");

           int number = in.nextInt();

           mylist2.add(number);

       }

       ArrayList<String> mylist = new ArrayList<>();

       for (int x = 0; x < 5; x++) {

           System.out.println("Please Enter a Word: ");

           String word = in.nextLine();

           mylist.add(word);

       }

       sort(mylist);

       sort(mylist2);

       for (String x: mylist) {

           System.out.print(x + ", ");

       }

       System.out.println("");

       for (int x: mylist2) {

           System.out.print(x + ", ");

       }

   }

   public static <E extends Comparable<E>> ArrayList<E> sort(ArrayList<E> list) {

       E temp;

       if (list.size()>1) // check if the number of orders is larger than 1

       {

           for (int x=0; x<list.size(); x++) // bubble sort outer loop

           {

               for (int i=0; i < list.size() - x - 1; i++) {

                   if (list.get(i).compareTo(list.get(i+1)) > 0)

                   {

                       temp = list.get(i);

                       list.set(i,list.get(i+1) );

                       list.set(i+1, temp);

                   }

               }

           }

       }

       return list;

}}

To use cache memory main memory are divided into cache lines typically 32 or 64 bytes long.an entire cache line is cached at once what is the advantage of caching an entire line instead of single byte or word at a time?

Answers

Answer:

The advantage of caching an entire line in the main memory instead of a single byte or word at a time is to avoid cache pollution from used data

Explanation:

The major advantage of caching an entire line instead of single byte is to reduce the excess cache from used data and also to take advantage of the principle of spatial locality.

what materials can I find at home and make a cell phone tower​

Answers

Answer:

you cant

Explanation:

You simply cant make a tower from materials found in a household

What is output?
public class Division{
public static double division(double a, double b) throws Exception {
if(b == 0)
throw new Exception("Invalid number.");
return a / b;
}
public static void main(String[] args) {
try {
System.out.println("Result: " + division(5, 0));
}
catch (ArithmeticException e) {
System.out.println("Arithmetic Exception Error");
}
catch (Exception except) {
System.out.println("Division by Zero");
}
catch(Throwable thrwObj) {
System.out.println("Error");
}
}
}
A. Error.
B. Arithmetic Exception Error.
C. Arithmetic Exception Error Division by Zero Error.
D. Division by zero.

Answers

Answer:

D. Division by zero.

Explanation:

This Java code that is being provided in the question will output the following error.

Division by zero

This is because the main method is calling the division method and passing 0 for the variable b. The method detects this with the if statement and creates a new Exception. This exception is grabbed by the catch(Exception exception) line and prints out the error Division by zero.

What is the difference between an information system and a computer application?

Answers

Answer:

An information system is a set of interrelated computer components that collects, processes, stores and provides output of the information for business purposes

A computer application is a computer software program that executes on a computer device to carry out a specific function or set of related functions.

A
is the movement you see when one slide changes to another in slide show
view.
O style
O
dissolve
O transition effect
O
bevel effect​

Answers

Answer:

Transition effect

Explanation:

Transition effects are slide changing with animations.

Which of the follwing are examples of meta-reasoning?
A. She has been gone long so she must have gone far.
B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.
C. I am getting tired so I am probably not thinking clearly.
D. I am getting tired so I will probably take a nap.

Answers

Answer: B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.

C. I am getting tired so I am probably not thinking clearly

Explanation:

Meta-Reasoning simply refers to the processes which monitor how our reasoning progresses and our problem-solving activities and the time and the effort dedicated to such activities are regulated.

From the options given, the examples of meta reasoning are:

B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.

C. I am getting tired so I am probably not thinking clearly

Consider the following two relations for Millennium College

STUDENT(StudentID, StudentName,CampusAddress, GPA)
REGISTRATION(StudentID, CourseID, Grade)

Following is a typical query against these Relation:

SELECT Student_T.StudentID,StudentName,
CourseID, Grade
FROM Sudent_T, Registration_T
WHERE Student_T.StudentID =
Registration_T.StudentID
AND GPA> 3.0
ORDER BY StudentName;

Required:
On what attributes should indexes be defined to speed up this Query? PLease give reasons for each selected

Answers

Thryyrryyfyfuguhoojihugtdtddt

Discuss similarities and differences between the software development and video game development processes.

Answers

Answer:

Game design is actually making the graphics of the game and how it works, software design is when the make all the equipment for the console and how it looks like.

Briefly stated, game design is an art, whereas software design is about the technicalities involved in creating any form of software, which include software architecture development, UX/UI, etc. Software design will eventually be a part of the game design, prototyping, and development process, among other things. Designing a game means having a creative idea, prototyping the gameplay, conceptualizing art, and then moving on to actual development process which will have programming, detailed artwork, audio production, game play development, etc.

Explanation:

Game design is an art, whereas software development is all about the technicalities which are involved in creating any form of software.

What is game design and software development?

Game design is the making of the graphics of a game and how it actually works, software design is the making of all the equipment for the console and how it actually looks like.

Game design is an art, whereas software design is about the technicalities which are involved in creating any form of software, which include the software architecture development, UX/UI development, etc. Software design will eventually be a part of the whole game design, prototyping, and developmental processes, among other things. Designing a game means having a creative idea or thought, prototyping the gameplay, conceptualizing of the art, and then moving on to actual development process which will have all the programming, detailed artwork, audio production, game play development, etc.

Learn more about Software development here:

https://brainly.com/question/3188992


#SPJ2

Discuss the relationship of culture and trends?

Answers

A good thesis would be something like “Modern culture is heavily influenced by mainstream trends” and just building on it.

Create the following: (1) a CREATE VIEW statement that defines a view named FacultyCampus that returns three columns: FirstName, LastName, and Term for faculty that are teaching during the semester, along with the terms they teach, and (b) a SELECT statement that returns all of the columns in the view, sorted by Term, of faculty members who are teaching during the semester.

Answers

Answer:

a-

CREATE VIEW FacultyCampus

AS

SELECT F.FirstName, F.LastName, C.Term

FROM Faculty F, Course C

WHERE C.Faculty_ID=F.Faculty_ID

b-

SELECT *

FROM FacultyCampus

ORDER BY Term DESC

Explanation:

As the database table creation is not given, the question is searched and the remaining portion of the question is found which indicates the table created. This is attached:

From the created database, the view is created as follows:

a-

CREATE VIEW FacultyCampus

AS

SELECT F.FirstName, F.LastName, C.Term

FROM Faculty F, Course C

WHERE C.Faculty_ID=F.Faculty_ID

Here first the view is created in which the selection of the first name from faculty table, last name from faculty table, and term from the Course table is made where the values of Faculty ID in course table and Faculty ID of Faculty table are equal.

The select query is as follows:

b-

SELECT *

FROM FacultyCampus

ORDER BY Term DESC

Here the selection of all the columns from the view is made and are ordered by the term in the descending form.

Write the Java classes for the following classes. Make sure each includes 1. instance variables 2. constructor 3. copy constructor Submit a PDF with the code The classes are as follows: Character has-a name : String has-a health : integer has-a (Many) weapons : ArrayList has-a parent : Character has-a level : Level (this should not be a deep copy) Level has-a name : String has-a levelNumber : int has-a previousLevel : Level has-a nextLevel : Level Weapon has-a name : String has-a strength : double Monster is-a Character has-a angryness : double has-a weakness : Weakness Weakness has-a name : String has-a description: String has-a amount : int

Answers

Answer:

Explanation:

The following code is written in Java. It is attached as a PDF as requested and contains all of the classes, with the instance variables as described. Each variable has a setter/getter method and each class has a constructor. The image attached is a glimpse of the code.

Joseph learned in his physics class that centimeter is a smaller unit of length and a hundred centimeters group to form a larger unit of length called a meter. Joseph recollected that in computer science, a bit is the smallest unit of data storage and a group of eight bits forms a larger unit. Which term refers to a group of eight binary digits? A. bit B. byte O C. kilobyte D. megabyte​

Answers

Answer:

byte

Explanation:

A byte is made up of eight binary digits

PLEASE HELP!!!
Question 6:
A retailer of computers maintains a record containing the following information for every individual
computer sold
• Manufacturer name
• Model number
• Physical memory size
• Processor name
• Date of sale
• Price sold for
Using only the database, which of the following CANNOT be determined?
The average price of a computer was sold by the retailer
In which months less than 100 computers were sold
o Which models of computer stocked by the retailer have not had a single sale
The most popular model of computer sold by the retailer

Answers

I think A since I don’t think it would matter who sells to the consumer but the amount sorry if I’m wrong
price sold i know it because i did it

A non-profit organization decides to use an accounting software solution designed for non-profits. The solution is hosted on a commercial provider's site but the accounting information suchas the general ledger is stored at the non-profit organization's network. Access to the software application is done through an interface that uses a coneventional web browser. The solution is being used by many other non-profit. Which security structure is likely to be in place:

Answers

Answer:

A firewall protecting the  software at the provider

Explanation:

The security structure that is likely to be in place is :A firewall protecting the  software at the provider

Since the access to the software application is via a conventional web browser, firewalls will be used in order to protect against unauthorized Internet users gaining access into the private networks connected to the Internet,

Time-management techniques work most effectively when performed in which order?

prioritize tasks, reward system, study-time survey, project schedule
project schedule, study-time survey, reward system, prioritize tasks
reward system, prioritize tasks, project schedule, study-time survey
study-time survey, project schedule, prioritize tasks, reward system

Answers

Answer:

study-time survey, project schedule, prioritize tasks, reward system.

Explanation:

Time management can be defined as a strategic process which typically involves organizing, planning and controlling the time spent on an activity, so as to effectively and efficiently enhance productivity. Thus, when time is properly managed, it avails us the opportunity to work smartly rather than tediously (hardly) and as such making it possible to achieve quite a lot within a short timeframe. Also, a good time management helps us to deal with work-related pressures and tight schedules through the process of properly allocating the right time to the right activity.

Hence, time-management techniques work most effectively when performed in the following sequential order; study-time survey, project schedule, prioritize tasks, and designing (creating) a reward system.

Answer:

The Answer is:
D. study-time survey, project schedule, prioritize tasks, reward system

Explanation:

got it right on edge

Complete the problem about Olivia, the social worker, in this problem set. Then determine the telecommunications tool that would best meet Olivia's needs.


PDA

VoIP

facsimile

Internet

Answers

Answer:

PDA is the correct answer to the following answer.

Explanation:

PDA refers for Programmable Digital Assistant, which is a portable organizer that stores contact data, manages calendars, communicates via e-mail, and manages documents and spreadsheets, typically in conjunction with the user's personal computer. Olivia needs a PDA in order to communicate more effectively.

Specialized high-capacity second storage devices designed to meet organizational demands
1 CD DEVICES
2. FLASH DRIVES
3. PLATTERS
4. MASS STORAGE DEVICES

Answers

Answer:

CD devices

Explanation:

Answer:

Mass storage devices

Explanation:

I don't think I can really explain it, that is just the definition of it.

Elimination:

CD and flash drives aren't high-capacity

Platters aren't really storage devices, they are a part of hard drives

Suppose you are choosing between the following three algorithms:
• Algorithm A solves problems by dividing them into five subproblems of half the size, recursively solving each subproblem, and then combining the solutions in linear time.
• Algorithm B solves problems of size n by recursively solving two subproblems of size n − 1 and then combining the solutions in constant time.
• Algorithm C solves problems of size n by dividing them into nine sub-problems of size n=3, recursively solving each sub-problem, and then combining the solutions in O(n2) time.
What are the running times of each of these algorithms (in big-O notation), and which would you choose?

Answers

Answer:

Algorithm C is chosen

Explanation:

For Algorithm A

T(n) = 5 * T ( n/2 ) + 0(n)

where : a = 5 , b = 2 , ∝ = 1

attached below is the remaining part of the solution

For this question we won't be directly working within LinkedList however. Instead, we'll be working with a Runner class:
public class Runner {
private LinkedList firstItemList;
private LinkedList listRemainder;
public Runner() {
firstItemList = null;
listRemainder = null;
}
}
For this question, write a method for the Runner class that will take in a LinkedList, split into two linked lists, and assign their values to firstItemList and listRemainder. Assign firstItemList to be a new LinkedList that just contains the first value. Assign listRemainder to be a new linkedList that contains everything EXCEPT the remainder.
More clearly, if you are given a linked list that looks like: 1 --> 2 --> 3 --> 4 Then assign firstItemList to 1 --> null and listRemainder to `2 --> 3 --> 4``
Please note this will be the only question that deals with a Runner Class instead of the LinkedList class directly.
public void split(LinkedList wholeList) {
}// end split
Solve in JAVA please using LinkedList methods and Node methods only if necessary

Answers

Answer:

Explanation:

The following method will take in a LinkedList as an argument and split it, adding only the first element to the firstItemList and the rest of the elements to listRemainder. The firstItemList and ListRemainder may have to be changed to static in order for the method to be able to access them, or add a setter/getter method for them.

public static void split(LinkedList list) {

       firstItemList = new LinkedList();

       listRemainder = new LinkedList();

       firstItemList.add(list.peek());

       list.pop();

       listRemainder = list;

       }

The complete java code for the Runner class can be defined as follows:

Java Code:

public class Runner<T>//defining a class Runner

{

   private LinkedList<T> firstItemList;//defining LinkedList type array variable that is firstItemList

   private LinkedList<T> ListRemainder;//defining LinkedList type array variable that is ListRemainder

   public Runner()//defining default constructor

   {

       firstItemList=null;//holding null value in list type variable

       ListRemainder=null;//holding null value in list type variable

   }

   public void split(LinkedList<T> WholeLinkedList)//defining a method split that takes a list in parameter

   {

       if(WholeLinkedList==null)//defining if block that checks parameter variable value equal to null

           return;//using return keyword

       firstItemList=WholeLinkedList;//holding parameter variable value in firstItemList

       ListRemainder=WholeLinkedList.next;//holding parameter variable next value in ListRemainder

       firstItemList.next=null;//holding null value in firstItemList.next element

   }

}

Code Explanation:

Defining a class Runner.Inside the class two LinkedList type array variable that is "firstItemList, ListRemainder" is declared.In the next step, a default constructor is defined, in which the above variable is used that holds null value in list type variable.In the next line, a method "split" is declared in which it accepts "WholeLinkedList"  as a parameter.Inside this, if a conditional block is defined that checks parameter variable value equal to null if it's true it returns nothing.outside the conditional block, it checks the parameter value and holds value in it.

Find out more about the linked list here:

brainly.com/question/23731177

Write a recursive method called permut that accepts two integers n and r as parameters and returns the number of unique permutations of r items from a group of n items. For given values of n and r, this value P(n, r) can be computed as follows:
n!/(n - r)!
For example , permut (7, 4) should return 840.

Answers

Answer:

Following are the code to the given question:

public class Main//defining a class Main

{

static int permut(int n, int r)//defining a method permut that holds two variable

{

return fact(n)/fact(n-r);//use return keyword to return calcuate value

}

static int fact(int n)//defining a fact method as recursive to calculate factorials

{

return n==0?1:n*fact(n-1);//calling the method recursively

}

public static void main(String[] abs)//main function

{

//int n=7,r=4;//defining integer variable

System.out.println(permut(7,4));//use print method to call permut method and print its values

}

}

Output:

840

Explanation:

Following is the explanation for the above code.

Defining a class Main.Inside the class two methods, "permut and fact" were defined, in which the "permut" accepts two values for calculating its permutated value, and the fact is used for calculates factorial values recursively. At the last, the main method is declared, which uses the print method to call "permut" and prints its return values.

This lab was designed to teach you more about using Scanner to chop up Strings. Lab Description : Take a group of numbers all on the same line and average the numbers. First, total up all of the numbers. Then, take the total and divide that by the number of numbers. Format the average to three decimal places Sample Data : 9 10 5 20 11 22 33 44 55 66 77 4B 52 29 10D 50 29 D 100 90 95 98 100 97 Files Needed :: Average.java AverageRunner.java Sample Output: 9 10 5 20 average = 11.000 11 22 33 44 55 66 77 average = 44.000 48 52 29 100 50 29 average - 51.333 0 average - 0.000 100 90 95 98 100 97 average - 96.667

Answers

Answer:

The program is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

 String score;

 System.out.print("Scores: ");

 score = input.nextLine();

 String[] scores_string = score.split(" ");

 double total = 0;

 for(int i = 0; i<scores_string.length;i++){

     total+= Double.parseDouble(scores_string[i]);  }

 double average = total/scores_string.length;

 System.out.format("Average: %.3f", average); }

}

Explanation:

This declares score as string

 String score;

This prompts the user for scores

 System.out.print("Scores: ");

This gets the input from the user

 score = input.nextLine();

This splits the scores into an array

 String[] scores_string = score.split(" ");

This initializes total to 0

 double total = 0;

This iterates through the scores

 for(int i = 0; i<scores_string.length;i++){

This calculates the sum by first converting each entry to double

     total+= Double.parseDouble(scores_string[i]);  }

The average is calculated here

 double average = total/scores_string.length;

This prints the average

 System.out.format("Average: %.3f", average); }

}

Which of the following transfer rates is the FASTEST?
1,282 Kbps
O 1,480 Mbps
1.24 Gbps
181 Mbps

Answers

Answer:

The correct answer is 1,480 Mbps.

Explanation:

For this you have to know how to convert bytes to different units.

1,000 Bytes (b)  = 1 Kilobyte (Kb)

1,000 Kilobyte (Kb) = 1 Megabyte (Mb)

1,000 Megabytes (Mb) = 1 Gigabyte (Gb)

and Finally, 1,000 Gigabytes (Gb) = 1 Terrabyte (Tb)

Answer:

1,480 Mbps

Explanation:

1,480 Mbps is equal to 1.48 Gbps, and so it is the fastest transfer rate listed because it is greater than 1.24 Gbps. In summary, 1,480 Mbps > 1.24 Gbps > 181 Mbps > 1,282 Kbps.

Create a recursive procedure named (accumulator oddsum next). The procedure will return the sum of the odd numbers entered from the keyboard. The procedure will read a sequence of numbers from the keyboard, where parameter oddsum will keep track of the sum from the odd numbers entered so far and parameter next will (read) the next number from the keyboard.

Answers

Answer:

Explanation:

The following procedure is written in Python. It takes the next argument, checks if it is an odd number and if so it adds it to oddsum. Then it asks the user for a new number from the keyboard and calls the accumulator procedure/function again using that number. If any even number is passed the function terminates and returns the value of oddsum.

def accumulator(next, oddsum = 0):

   if (next % 2) != 0:

       oddsum += next

       newNext = int(input("Enter new number: "))

       return accumulator(newNext, oddsum)

   else:

       return oddsum

Create a list of 30 words, phrases and company names commonly found in phishing messages. Assign a point value to each based on your estimate of its likeliness to be in a phishing message (e.g., one point if it’s somewhat likely, two points if moderately likely, or three points if highly likely). Write a program that scans a file of text for these terms and phrases. For each occurrence of a keyword or phrase within the text file, add the assigned point value to the total points for that word or phrase. For each keyword or phrase found, output one line with the word or phrase, the number of occurrences and the point total. Then show the point total for the entire message. Does your program assign a high point total to some actual phishing e-mails you’ve received? Does it assign a high point total to some legitimate e-mails you’ve received?

Answers

Answer:

Words found in phishing messages are:

Free gift

Promotion

Urgent

Congratulations

Check

Money order

Social security number

Passwords

Investment portfolio

Giveaway

Get out of debt

Ect. this should be a good starting point to figuring out a full list

Which of the following describe ALAC audio files? Choose all that apply.
uses a codec that is open source
uses a codec that lives in iPods and other Apple hardware
was developed by Apple
is exclusively supported by Apple iTunes
may have .mp3 and .mp4 file extensions

Answers

Answer:

B,C,D

Explanation:

Answer:

B C D

Explanation:

Other Questions
What mindset are you? Do you think this is accurate? Why or why not?Where in your life can you recognize fixed mindsets?Where are you growth-minded? In sentence 15 (reproduced below), the writer wants to maintain credibility with the audience by using unbiased language.Children are incredibly gullible when it comes to robots, as a recent study demonstrates.Which of the following versions of the underlined text best accomplishes this goal?A. (as it is now)B. often the victims of robotic deceptionC. particularly susceptible to robotic influenceD. so naive that they believe whatever robots tell themE. not clever enough to outsmart robots Choose the grammatically correct sentence. Aqui tango las cosa blanco Find the slope and the y intercept Find the missing measure in each triangle. Then classify the triangleas acute, right, or obtuse. Which of the following is the same formula as A = 6s2 ? How have the rights of citizens in Indiana changed throughout the 20th century? HHHHHHHEEEEEEEEEEEEEEEEEEELLLLLLLLLLLLLLLLLLLLLPPPPPPPPcan someone please help answer this questionn draw to show 5- 2 on the number line What information provided evidence for the location of the sun in the galaxy? The above image shows the descendants of one type of finch and the variation in the finchspecies that occurred over many generations. Which of the descendant species above developedan adaptation for getting insects from narrow cracks in the bark of trees? Read the passage.(1) Ask young people today if they know of anyone who has had smallpox, and they might ask, "Whats smallpox? (2) That is because this disease was eradicated from the planet decades ago, thanks to vaccinations. (3) Despite the obvious effectiveness of vaccination, opponents of this procedure argue that humans are better off fighting diseases on their own without adding anything potentially harmful to their bodies. (4) Still, the American Academy of Pediatrics says that vaccines can be 99 percent effective, and the Centers for Disease Control claims that, over a 10-year period, vaccines allowed 322 million children to avoid illnesses. (5) So the next time someone tells you that vaccines are poisoned apples that will lead to a fate like Snow Whites, counter their argument with the facts. (6) The bottom line is that vaccines are safe to use and save lives.How can the writer add parallelism in this passage?by changing the phrase young people to most people in sentence 1by deleting the words obvious and potentially from sentence 3by deleting save lives and adding the phrase easy to administer to the end of sentence 4by shortening the passage to only five sentences by removing sentence 5 amenazas de los crustceos Who u think is better ???? Kageyama orrr katsuki bakugou Find 24% of 165. Need explanation Which expression is equivalent to (3^2)^4(3^4)? greatest common factor of -12x^2 and -16x^3 How does industrialization lead to colonialism? The ratio of goats to sheep at a university research farm is 4:7. The number of sheep at the farm is 28. What is the number of goats? help plz i need hel-p im so stuck man im lost