The arp protocol is used to determine what address of a node when what address is known?

Answers

Answer 1

The arp protocol is used to determine address of a node when what address is known ARP cache

Address resolution protocol is used to mapping the system address to the internet protocol address. The address resolution protocol is used to translate a system address into an IP address.

In a local area network, the Address Resolution Protocol (ARP) converts a dynamic IP address to a fixed physical machine address (LAN). A media access control (MAC) address is another name for the actual machine address.

The Domain Name System (DNS), an Internet directory service created to both allow local administrators to create and manage the records that resolve server names to IP addresses and to make those records accessible, is the method most frequently used in the TCP/IP protocol to resolve server names to network addresses.

Learn more about ARP:

https://brainly.com/question/12976506

#SPJ4


Related Questions

Write a function that takes a number k as input, and then reads in k names (one at a time), storeing them in a list, and then print them in reverse (do not to use the reverse method)

Answers

A function that takes a number k as input, and then reads in k names (one at a time), storing them in a list, and then prints them in reverse is given below.

The Function

#include <bits/stdc++.h>

using namespace std;

// Function for checking if digit k

// is in n or not

int checkdigit(int n, int k)

{

   while (n)

   {

       // finding remainder

       int rem = n % 10;

       // if digit found

       if (rem == k)

           return 1;

       n = n / 10;

   }

   return 0;

}

// Function for finding nth number

int findNthNumber(int n, int k)

{

   // since k is the first which satisfy the

   // criteria, so consider it in count making count = 1

   //  and starting from i = k + 1

   for (int i = k + 1, count = 1; count < n; i++)

   {

       // checking that the number contain

       // k digit or divisible by k

       if (checkdigit(i, k) || (i % k == 0))

           count++;

       if (count == n)

       return i;

   }

   return -1;

}

// Driver code

int main()

{

   int n = 10, k = 2;

   cout << findNthNumber(n, k) << endl;

   return 0;

}

Read more about programming here:

https://brainly.com/question/23275071
#SPJ1

mary is creating a website to document her adoption of a 1-year old little girl from kazakhstan. her friend shauna makes the following recommendations and suggests that mary follow them.

Answers

Shauna tells Mary that she should consider using a code editor to enter her code.

What is a code editor?

Code editors are known to be tools that are said to be used by a lot of  programmers as well as web developers to write and also to be able to edit code.

Note that they are people who are known to be used for making  software, applications and also other forms of web development purposes.

Before the introduction of code editors, developers as well as programmers are known to make use of text editors such as Notepad on Windows and ithers.

Therefore, Shauna tells Mary that she should consider using a code editor to enter her code.

Learn more about code from

https://brainly.com/question/6418860
#SPJ1

.

Mary is creating a website to document her adoption of a 1-year old little girl from Kazakhstan. Her friend Shauna makes the following recommendations and suggests that Mary follow them.

Shauna tells Mary that she should consider using ____ to enter her code.

answer choices

a code editor

hand coding

her favorite browser

wireframe

you have a cable internet connection at home. the installer had connected the router near the outside wall of your house with rg6 cable. you move the cable router a distance of 50 meters using rg8 cables and special connector adapters. which condition are you most likely to experience?

Answers

The condition that a person is most likely to experience is known to be called an Echo

What is an Echo?

An Echo in regards to audio signal processing as well as acoustics, is known to be a term that connote a kind of reflection of sound that get in to  the listener with a little form of delay after the said sound.

Note that the delay is one that is known to be directly proportional to the distance that is said to be of the reflecting surface from the source as well as  the listener.

Therefore, The condition that a person is most likely to experience is known to be called an Echo

Learn more about Echo from

https://brainly.com/question/20371571

#SPJ1

a system always needs the 4-pin auxiliary power connector, and sometimes needs the p1 connector as well.

Answers

The given statement that a system always needs the 4-pin auxiliary power connector, and sometimes needs the p1 connector as well is false.

At the station's main bus or designated sub-bus, auxiliary power is electrical energy that is supplied by a different source and acts as a backup for the main power source. In contrast to an online unit, an offline unit offers electrical isolation between the main power supply and the vital technical load.

The static inverter in the auxiliary power supply converts the electricity used for interior lighting, displays, air conditioning, etc. The static inverter is installed to provide power that has low voltage and consistent frequency even when there is a propulsive inverter.

Auxiliary power units, sometimes known as APUs, enable aircraft to function independently of ground support machinery such ground power units, external air conditioning units, or high pressure air systems.

Learn more about auxiliary:

https://brainly.com/question/26960026

#SPJ4

in packet switching, the voice signal is first digitized and then chopped up into a series of packets.

Answers

In packet switching, the voice signal is first digitized and then chopped up into a series of packets: True.

What is packet switching?

Packet switching can be defined as a data transmission mode in which an information or message (voice signal) is chopped into different packet parts that are independently sent, over the optimum route for each packet, and then, reassembled at the destination.

In packet switching, the information or message (voice signal) would first be digitized and then, chopped up into a series of packets comprising the voice information alongside the source and destination.

In conclusion, packet switching is a technology which enhanced and facilitated long-distance digital data communication.

Read more on packet switching here: https://brainly.com/question/28090820

#SPJ1

Complete Question:

In packet switching, the voice signal is first digitized and then chopped up into a series of packets. True or False?

passwords can be used to restrict access to all or parts of the cisco ios. select the modes and interfaces that can be protected with passwords.

Answers

The three modes and interfaces that can be protected with passwords are:

VTY interfaceconsole interfaceprivileged EXEC mode

What is information security?

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

What is a password?

A password can be defined as a string of characters, phrase or word that is designed and developed to distinguish an unauthorized user from an authorized user, especially through an identification and authentication process.

In conclusion,  the access of an end user to the VTY interface and console interface of Cisco IOS can be restricted by using passwords.

Read more on password here: brainly.com/question/19116554

#SPJ1

Complete Question:

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

VTY interface

console interface

Ethernet interface

boot IOS mode

privileged EXEC mode

router configuration mode

A(n) ___ on android provides automatically-updating information without the need to open an app. gui icon widget live tile

Answers

A widget on android provides automatically-updating information without the need to open an app.

What are Software widget?

A software widget is known to be a kind of an application that is said to be relatively easy as well as simple to use form of software application or parts that are made for one or a lot of software platforms.

Note that a desk accessory or what we call applet is said to be a good example of a simple widget.

Therefore,  A widget on android provides automatically-updating information without the need to open an app.

Learn more about widget from

https://brainly.com/question/4448210

#SPJ1

You would apply a ________, which is a collection of design choices that includes colors, fonts, and special effects used to give a consistent look to your work.

Answers

You would apply a Theme, which is a collection of design choices that includes colors, fonts, and special effects used to give a consistent look to your work.

What is said to be Theme?

A theme is known to be a kind of a mix up or the combination of some set of colors, fonts, as well as visual effects.

It is one that a person can be able to use to tell about their slides as a kind of consistent, professional appearance.

Therefore, You would apply a Theme, which is a collection of design choices that includes colors, fonts, and special effects used to give a consistent look to your work.

Learn more about special effects  from

https://brainly.com/question/1262098
#SPJ1

in dante av, with the jpeg2000 codec and a 1 gbps connection, what resolution and frame rates are currently supported?

Answers

in Dante AV, with the jpeg2000 codec and a 1 gbps connection, the resolution and frame rates are currently supported is option D. Up to 4K (4096 x 2160) at 60fps.

What is resolution of a image?

Image resolution is known to be a term that connote the image's level of the detail of higher resolution connote more image detail.

Note that In digital imaging, the resolution is known to be one that can be measured as a pixel count.

Therefore, in Dante AV, with the jpeg2000 codec and a 1 gbps connection, the resolution and frame rates are currently supported is option D. Up to 4K (4096 x 2160) at 60fps.

Learn more about resolution from

https://brainly.com/question/28298423

#SPJ1

A. to 1920x1080i or 720p (HD) at 23.97fps

B. Up to 1920x1080p (Full HD) at 30fps

C. Up to 3840 x 2160 at 30fps or 1080p (HD) at 60fps

D. Up to 4K (4096 x 2160) at 60fps

Use the drop-down menus to select the answer that best completes each statement.
A person who finds a way to watch a recent movie online without paying for it is violating
A student who posts an inappropriate comment about a person via social media is violating
A student who visits a school-banned website that contains offensive content is violating school rules on

Answers

A person who finds a way to watch a recent movie online without paying for it is violating movie copyright.

A student who posts an inappropriate comment about a person via social media is violating their rights to privacy.

A student who visits a school-banned website that contains offensive content is violating school rules on censorship.

What is Movie Piracy?

This refers to the illegal copying and selling of DVDs and CDs without the permission of the owner.

Hence, we can see that a person who finds a way to watch a recent movie online without paying for it is violating movie copyright.

A student who posts an inappropriate comment about a person via social media is violating their rights to privacy.

A student who visits a school-banned website that contains offensive content is violating school rules on censorship.

Read more about movie piracy here:

https://brainly.com/question/8042416

#SPJ1

Answer: all the answers are here

Explanation:

when an unlisted procedure or service code is reported, a special report must accompany the claim to describe of the procedure or service.

Answers

When an unlisted procedure or service code is reported, a special report must accompany the claim to describe the nature, extent, and need of the procedure or service. This question is part of unlisted code.

Due to the fact that unlisted codes do not specify standard procedural elements or the level of effort or expertise necessary for the service, relative value units (RVUs) are not assigned to them. It is required to give detailed information about the procedure(s) the code refers to when utilizing an unlisted code (i.e., operative note, office notes). A sufficient definition or explanation of the nature, scope, and necessity for the procedure or service, as well as the amount of time, effort, and equipment required to deliver the service, should be included in the supporting documentation.

Learn more about unlisted code https://brainly.com/question/4734557

#SPJ4

The actual implementation of relational databases was delayed for many years after the theory was developed. what caused this delay?

Answers

The actual implementation of relational databases was delayed for many years after the theory was developed because the generation of computers didn't have the processing power and capability to make relational database software systems practical.

What is a relational database?

A relational database can be defined as a type of database that is designed and developed to store, structure and recognize relation that are existing between data points and items of information.

Based on historical records and information, we can logically deduce that the actual implementation of relational databases was delayed for several years after the theory was developed by engineers and scientist because the generation of computers at that time didn't have the processing power and capability to make relational database software systems practical.

Read more on relational database here: https://brainly.com/question/28119648

#SPJ1

john needs to identify public key systems that generate different, random public keys for each session and, even if a key gets stolen, should not reveal more than one message. which public key system should john suggest?

Answers

A public key system which John should suggest is perfect forward secrecy.

What is an encryption?

An encryption can be defined as a form of cryptography and it typically involves the process of converting or encoding information in plain text into a code, known as a ciphertext. Generally speaking, an information or data that has been encrypted it can only be accessed and deciphered by an authorized user.

In Computer programming, some examples of encryption algorithms include the following:

3DESAESRC4RC5RSA

What is perfect forward secrecy?

Perfect forward secrecy (PFS) is also referred to as forward secrecy (FS) and it can be defined as an encryption system that is designed and developed to frequently and automatically change the public keys which were used to encrypt and decrypt information.

In this context, we can reasonably infer and logically deduce that a public key system which John should suggest is perfect forward secrecy.

Read more on encryption here: https://brainly.com/question/9979590

#SPJ1

Megabytes and Kilobytes are used to gauge what two measurements?
O file size and memory capability
O memory capability and file type
O picture quality and file size
O file type and picture quality

Answers

file size and memory capability

Answer:

option A

Explanation:

when a malicious attacker coordinates a denial of service (dos) attack against your organization, which security objective is most impacted in a negative way?

Answers

Answer:

Availability.

Explanation:

write sql queries to answer the following questions: a. which students have an id number that is less than 50000? b. what is the name of the faculty member whose id is 4756? c. what is the smallest section number used in the first semester of 2008?

Answers

Looking at how to write SQL queries to answer the following questions:

- Which students have an ID number that is less than 50000?

the first question, we can use the following SQL query:

SELECT * FROM students WHERE id < 50000;

This will return all students who have an ID number that is less than 50000.

- What is the name of the faculty member whose ID is 4756?

the second question, we can use the following SQL query:

SELECT name FROM faculty WHERE id = 4756;

This will return the name of the faculty member whose ID is 4756.

- What is the smallest section number used in the first semester of 2008?

the third question, we can use the following SQL query:

SELECT MIN(section) FROM classes WHERE semester = '200801';

This will return the smallest section number used in the first semester of 2008.

SQL is a powerful tool for querying data in databases.

Learn more on sql queries here:

https://brainly.com/question/27851066

#SPJ4

Write a program whose inputs are three integers, and whose output is the smallest of the three values.

Ex: If the input is:
7 15 3
the output is:
3

Can someone please help I'm stuck on what to do....

Answers

Answer:

#include <stdio.h>

#define MIN(i, j) (((i) < (j)) ? (i) : (j))

int main(void) {

 int a,b,c, smallest;

 printf("Enter 3 numbers (separated by spaces): ");

 scanf("%d %d %d", &a, &b, &c);

 smallest = MIN(MIN(a,b), c);

 printf("Smallest number is %d.\n", smallest);

 return 0;

}

Explanation:

This is one way to do it. The MIN macro is a common way to implement an easy to read mechanism to pick the smallest of two values.

__________ is/are dynamic websites and applications that enable individual users to create and share content or to participate in social networking.

Answers

Answer:

Social Media includes dynamic websites and applications that enable individual users to create and share content or to participate in social networking.

When modeling a system, i need to model that my system will use 1 representative and 3 customers. this is an example of ______. (choose one)

Answers

That exemplifies association. The interdisciplinary study of the use of models to envision and build systems in business and IT development is known as systems modeling.

Function modeling, which uses specialized methods like the Functional Flow Block Diagram and IDEF0, is a typical sort of systems modeling. Functional decomposition can be used to extend these models, and they can be connected to requirements models for further system division.

As opposed to functional modeling, architectural modeling makes use of the systems architecture to conceptually represent the structure, behavior, and other aspects of a system.

Learn more about system modeling https://brainly.com/question/5017673?

#SPJ4

Describe some of the most rewarding aspects this career offered the interviewee.
Explain other rewarding aspects of this career.

Answers

As an Agricultural Engineer, the  most rewarding aspects this career offered is that:

It gave the  Interviewee an opportunity to be  able to be involved in a lot of work as well as revaluations and it is very fun to work in.

What is the role of an Agricultural Engineer?

The role of an Agricultural engineers is known to be any person that tries to solve agricultural problems such as power supplies, the efficiency of machinery, and others.

Based on the above, As an Agricultural Engineer, the  most rewarding aspects this career offered is that:

It gave the  Interviewee an opportunity to be  able to be involved in a lot of work as well as revaluations and it is very fun to work in.

Learn more about Agricultural Engineer from

https://brainly.com/question/27903996

#SPJ1

See question below

Career Interview

Interviewee: ___Brian Woodbury____

Career: ____Agricultural Engineer_________

Describe some of the most rewarding aspects this career offered the interviewee.

Explain other rewarding aspects of this career.

An opening bid or a target point are what a negotiator wants, but ________ are why the negotiator wants them. group of answer choices
a. issues
b. batnas
c. goals
d. interests

Answers

An opening bid or a target point is what a negotiator wants, but interests are why the negotiator wants them. Thus, the correct option for this question is D.

What do you mean by Negotiator?

A Negotiator may be defined as a type of person who has formal coversation with someone else in order to outstetch an agreement.

An opening bid is also known as the target point that a negotiator initially wants it. But the influence of interests makes the possible outcome that leads to the negotiator accurately wants in any circumstances.

Therefore, an opening bid or a target point is what a negotiator wants, but interests are why the negotiator wants them. Thus, the correct option for this question is D.

To learn more about Negotiator, refer to the link:

https://brainly.com/question/16553795

#SPJ1

public class DebugTwo1
{
public static void main(String[] args)
{
integer oneInt = 315;
double oneDouble = 12.4;
character oneChar = 'A';
System.out.print("The int is ");
System.out.println(oneint);
System.out.print("The double is ");
System.out.println(onDouble);
System.out.print("The char is ");
System.out.println(oneChar);
}
}

de-bug the code

Answers

Using the knowledge in computational language in python  it is possible to write a code that write a program which takes user input of a number of feet, and then prints the number of whole yards in that many feet

Writting the code

public class DebugTwo1

{

 public static void main(String[] args)

 {

   int oneInt = 315;

   double oneDouble = 12.4;

   char oneChar = 'A';

   System.out.print("The int is ");

   System.out.println(oneInt);

   System.out.print("The double is ");

   System.out.println(oneDouble);

   System.out.print("The char is ");

   System.out.println(oneChar);

 }

}

See more about python at brainly.com/question/12975450

#SPJ1

A wbs component is a work element that is part of the wbs at any level.
a. true
b. false

Answers

It is true that a WBS component is a work element that is part of the WBS at any level.

The instrument that makes use of this method is the Work Breakdown Structure (WBS), which is a crucial project management document. To ensure that project plans are in sync, it does it on its own by integrating scope, cost, and schedule baselines.

According to the PMI Project Management Book of Knowledge, the Work Breakdown Structure is a "deliverable-oriented hierarchical decomposition of the work to be accomplished by the project team" (PMBOK). There are two types of WBS: phase-based and deliverable-based. The deliverable-based strategy is the most popular and preferred method.

Learn more about WBS https://brainly.com/question/14262396

#SPJ4

The viewer of an olap report can change its format. which term implies this capability?

Answers

The viewer of an olap report can change its format. The term implies this capability is online. The correct option is D).

What is an OLAP report?

OLAP is Online analytical processing. It is used for analytical multidimensional queries of computers.

It is a technology used by many businessmen, and It is a powerful technology that is used for discoveries of data and limitless viewing reports and analytical calculations.

It is also used in report timing and for data viewing, and it has broader categories for databases.

Therefore, the correct option is D) online.

To learn more about the OLAP report, refer to the link:

https://brainly.com/question/26691784

#SPJ1

The question is incomplete. Your most probably complete question is given below:

A) processing. B) analytical. C) dimension. D) online.

Which of the following operating systems would allow a user to add functionality and sell or give away their versions?

Answers

Linux is the operating systems would allow a user to add functionality and sell or give away their versions.

What is Linux Operating system?

Linux is known to be a kind of an an Operating system which is known to be an open-source.  It is one that is compared to Unix-like form of operating system but it is one that is often based on the the use of Linux kernel.

Note that this is said to be an operating system kernel that was said to be released in 1991, by Linus Torvalds. Linux is said to be one that is often packaged as a service of a Linux distribution.

Linux is used in a lot of ways such as the Server OS that is made for web servers, database servers, as well as file servers.

They are known to be set up to aid high-volume as well as multithreading applications and also used for a lot of server types.

Therefore, Linux is the operating systems would allow a user to add functionality and sell or give away their versions.

Hence, option A is correct.

Learn more about Linux from

https://brainly.com/question/12853667
#SPJ1

Which of the following operating systems would allow a user to add functionality and sell or give away their versions?

-Linux

-macOS

-Windows

-UNIX

What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?

Answers

The factor that can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password is option b: ​Enable a lock screen.

What are lock screen widgets?

The lock screen is known to be a tool that helps a person to be able to keep their phones and others from been access by any other person.

Note that a person can personalize their home screen or lock screen with the use of little squares or any kind of rectangles of information.

Therefore, The factor that can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password is option b: ​Enable a lock screen.

Learn more about lock screen from

https://brainly.com/question/25737640

#SPJ1

​What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password?

​Enable a smart card

​Enable a lock screen

​Enable a sleep time setting

​Enable a challenge-response screen

what do i do for this not to stop me from trying to ask a question. / What phrases are / could be hurtful to brainly? - Don't use such phrases here, not cool! It hurts our feelings :(

Answers

I’m mad confused like the person on top

Help me please!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!????????????????
Briefly explain to me how and why teams are important. Has there ever been a successful person who had no help at all? A person who has ever taught themselves everything without the help of others. If not, explain why it is impossible but if so, explain why it is impossible (10-14 complete sentences)

Answers

Answer:

teams are important because, you can get other people ideas to improve yours. There have been people who have been successful but, could have done better. No one has ever taught themselves because if you do something wrong then you wont know. Teams can help you fix things you have done wrong. They also can help with big projects taking up less time for you and other people. With the help of a team you can accomplish big feats in a short time frame.

Explanation:

Help

Briefly explain to me how and why teams are important. Has there ever been a successful person who had no help at all? A person who has ever taught themselves everything without the help of others. If not, explain why it is impossible but if so, explain why it is impossible (10-14 complete sentences)

Answers

The reason why teams are important is because teams are created when people who has a common taste, preference or others comes to work together so that they can achieve a common goal.

Why are they important?

Studies has shown that the issue of collaborative problem solving is one that tends to leads to great and good outcomes.

Note that  People are known to be very likely to take a lot of calculated risks that can bring about innovation if they are said to have the aid or the support of a team that is standing behind them. Working in a team brings about personal growth, boast job satisfaction, and lower  stress.

Therefore, The reason why teams are important is because teams are created when people who has a common taste, preference or others comes to work together so that they can achieve a common goal.

Learn more about teamwork from

https://brainly.com/question/10061787
#SPJ1

you are a network technician for a small corporate network. your manager has decided to switch to a new isp. the network needs to be moved to the new isp so that the old one can be cancelled. the new isp has run a fiber optic line directly to the back of the fiber patch panel in the basement networking closet, but the nsa device doesn't have any fiber ports. because the nsa doesn't have any fiber ports, you need to use a media converter to convert from a fiber optic cable to an ethernet cable. most media converters use sfp ports so they can convert multiple form factors. the media converter in this lab already has a fiber sfp module installed. use the following information to make the proper connections: the isp is connected to ports 23 and 24 of the fiber patch panel. port 23 is tx. port 24 is rx. use the color coding on the end of the fiber optic cables to identify which end is tx and which is rx. connector a (white or red) is tx. connector b (black) is rx.

Answers

The steps to take are:

You need to add the Media Converter to that of the Basement  that is in the WorkspaceThen shift  the Ethernet cable from the wall socket to that of the Media Converter's Ethernet port.The one can link (Connect) to the SC to LC fiber cable to that of the Media -Converter's LC port.One also need to link up the SC to LC cable to ports 23 as well as port 24 on the fiber patch panel that tends to show detailsThen do plug in the said Media ConverterLastly do look to see if the office has an Internet connection.

What is the technician job about in the above case?

Due to the fact that the NSA is one that does not have any kind of fiber ports, the user is one that  need to make use of a media converter to be able to convert from a fiber optic cable down to an Ethernet cable.

A lot of media converters are known to make use SFP ports so they can convert multiple form factors.

Therefore, The steps to take are:

You need to add the Media Converter to that of the Basement  that is in the WorkspaceThen shift  the Ethernet cable from the wall socket to that of the Media Converter's Ethernet port.The one can link (Connect) to the SC to LC fiber cable to that of the Media -Converter's LC port.One also need to link up the SC to LC cable to ports 23 as well as port 24 on the fiber patch panel that tends to show detailsThen do plug in the said Media ConverterLastly do look to see if the office has an Internet connection.

Learn more about network technician from

https://brainly.com/question/28064117

#SPJ1

Other Questions
Which two phase transitions can liquid undergo? (2 answers)A. meltingB. depostionC. vaporizationD. freezingE. sublimation Since municipal bonds are tax-exempt, they typically earn a lower rate of return than taxable bonds. the lower rate of return relative to taxable bonds is often referred to as a(n)? What is the relationship between the running time of insertion sort and the number of inversions in the input array? justify your answer. When should an instance variable in a class definition be private, and when should it be public? Which step of the cell cycles shown in the image is Vindlastine MOST likely to interrupt when given to patients with lung cancer, and why ? 2x. 10xHelp please The highlighting of athleticism in this spartan figurine was meant to remind spartan girls of the need to be fit in order to? y = 3x - 20 In the xy-plane, a point with coordinates (h, k) lies in the solution set of the system of inequalities above. What is the maximum possible value of h? on your first day of class, professor red-elk claims that for too long we have focused on the development of only young children. she argues that the development of adults and elderly people is just as important. this professor is articulating a view. In the circle below, AB is parallel to CD, AD is a diameter of the circle, and AD = 36.What is the length of AB? Express your answer in terms of pi. what was the result of the emperors expensive wars? Morally, as well as materially, there was a coarser fibre in those wives and maidens of old English birth and breeding, than in their fair descendants, separated from them by a series of six or seven generations; for, throughout that chain of ancestry, every successive mother has transmitted to her child a fainter bloom, a more delicate and briefer beauty, and a slighter physical frame, if not a character of lessforce and solidity, than her own. The women who were now standing about the prison-door stood within less than half a century of the period when the man-like Elizabeth had been the not altogether unsuitable representative of the sex. They were her countrywomen; and the beef and ale of their native land, with a moral diet not a whit more refined, entered largely into their composition. rewrite into a simple/clear sentence can yall give me the answers for all 3 slides fat is found in the abdomen and surrounds organs and fat is found directly under the skin. adipose, lipid android, gynoid visceral, subcutaneous essential, nonessential order the categories of voices from highest to lowest. - bass - baritone - soprano - mezzo soprano - contralto - tenor let tj denote the time that it took tejay van garteren to ride the jth stage of the tour de france in 2014. if there were a total of 21 stages, interpret j -6(5y+7)-14y pls dont have much time 6. Makes sure that oxygen is absorbed intothe blood.a. Circulatory Systemb. Digestive Systemc. Respiratory Systemd. Excretory System the head of the quality control department at a printing company would like to carry out an experiment to determine which of three different glues results in the greatest binding strength. although they are not of interest in the current study, other factors thought to affect binding strength are the number of pages in the book and whether the book is being bound as a paperback or a hardback. Please help only 14 mins left , I'll give you brainliest . I need at least two participants to give an answer