1. Suppose your ISP gives you the address space 18. 28. 32. 0/25. There is a core router and three subnets under the core router. Each of the three subnets have two hosts each. Each subnet will also need to assign an address to its corresponding router and the hosts. Write down the addresses you will assign to the 6 hosts, to the three subnet routers, and to the core router responsible for the address 18. 28. 32. 0/25. Also specify the address range of each router (10 points)

Answers

Answer 1

The range of IP addresses available within the 18.28.32.0/25 address space totals to 128, which includes IP addresses between 18.28.32.0 and 18.28.32.127. The possible address is given below.

What is the subnets?

In the address, one must allocate addresses to a total of 10 devices, comprising 6 hosts and 4 routers including a central router and 3 subnetwork routers.

To start off, the initial stage is to split the /25 address range into three separate of /27 subnets. A subnet of size /27 has the capacity to host a maximum of 30 devices, accounting for two reserved addresses within the total of 32.

Learn more about  subnets  from

https://brainly.com/question/28256854

#SPJ4

1. Suppose Your ISP Gives You The Address Space 18. 28. 32. 0/25. There Is A Core Router And Three Subnets

Related Questions

Ismael would like to insert a question mark symbol in his document. What steps will he need to follow to do that?

1. Hold down the Ctrl key while pressing the required key.
2. Hold down the Shift key while pressing the required key.
3. Hold down the key containing the character needed.
4. Hold down the Spacebar while pressing the required key

Ismael would like to insert a question mark symbol in his document. What steps will he need to follow

Answers

Answer:

2

Explanation:

which of these describe raw data?check all of the boxes that apply A) what a person buys B) where a person lives C) data that has been analyzed D) data that has not been analyzed

Answers

D) data that has not been analyzed

If technology is a complement to labor, then advances in technology will __________ the number of workers hired.

Answers

If technology is a complement to labor, then advances in technology will likely increase the number of workers hired. This is because improved technology can enhance workers' productivity and efficiency, leading to a higher demand for skilled labor to utilize and maintain the advanced technology effectively.

This is because as technology improves, it can perform tasks that were previously done by human labor, making it more efficient and cost-effective for businesses to rely on machines rather than hiring additional workers. However, it's important to note that while technology can replace certain jobs, it also creates new jobs in industries related to technology development, maintenance, and support.
However, it's important to note that the impact of technological advances on employment can vary depending on the specific industry, job type, and other factors. In some cases, technological advancements may also create new job opportunities in emerging industries, offsetting any potential job losses in other sectors. Additionally, the social and economic impacts of technological advancements are complex and can be influenced by various factors such as government policies, societal norms, and labor market conditions.

To learn more about Technology Here:

https://brainly.com/question/15059972

#SPJ11

HELP NEEDED PLEASE HELP!!! ​

HELP NEEDED PLEASE HELP!!!

Answers

Answer:

Length Check

Explanation:

Length Check seems to be the most logical answer, with the info given.

A mobile phone can be ordered in 2 different sizes (large and small) and 3 different colors (gold, silver and black). Construct a tree diagram to show all possible combinations of mobile phones that can be ordered.

Answers

The tree diagram below illustrates all the possible combinations of mobile phones that can be ordered based on two sizes (large and small) and three colors (gold, silver, and black):

             Mobile Phone

                         |

           -------------------------

          |                         |

      Large                  Small

         |                         |

   ---------------        ---------------

  |       |       |      |       |       |

Gold Silver Black   Gold Silver Black

In the diagram, the first level represents the choice of size, with "Large" and "Small" as the options. The second level represents the choice of color, with "Gold," "Silver," and "Black" as the options for each size.

This tree diagram provides a clear visualization of all the possible combinations of sizes and colors for the mobile phones. It helps in understanding the total number of options available and can be used as a reference when making decisions or analyzing different scenarios.

Learn more about probability analysis here:

https://brainly.com/question/32996461

#SPJ11

Hope wants to add a third use at the end of her nitrogen list.

What should Hope do first?

What is Hope’s next step?

Answers

Answer:the first answer is put it at the end of 2b

the second answer is press enter

Explanation:

Answer:

1,  put it at the end of 2b     2, press enter key

Explanation:

What standard tcp port is reserved by iana for the openvpn service to operate on?

Answers

Answer:

1194 is the OpenVPN port reserved by the IANA

Explanation:

Write a fully documented class named PlaylistOperations that is based on the following specification: public class PlaylistOperations The PlaylistOperations Java application tests the methods of the Playlist class and allows the user to manipulate a single Playlist object by performing operations on it.

Answers

The PlaylistOperations class is a Java class that allows the user to manipulate a single Playlist object by performing operations on it.

To create this class, you need to follow the given specification.

Here is an example implementation of the PlaylistOperations class:

```java
public class PlaylistOperations {
 private Playlist playlist;

 public PlaylistOperations() {
   playlist = new Playlist();
 }

 public void addSong(Song song) {
   playlist.add(song);
 }

 public void removeSong(Song song) {
   playlist.remove(song);
 }

 public void play() {
   playlist.play();
 }

 public void pause() {
   playlist.pause();
 }

 public void stop() {
   playlist.stop();
 }
}
```

In this example, the PlaylistOperations class has a private instance variable called `playlist` of type Playlist. This variable represents the single Playlist object that the user can manipulate.

The class provides several methods to perform operations on the playlist object. The `addSong` method adds a song to the playlist, the `removeSong` method removes a song from the playlist, the `play` method plays the playlist, the `pause` method pauses the playback, and the `stop` method stops the playback.

To use the PlaylistOperations class, you can create an instance of it and then call its methods to manipulate the playlist object.

This example provides a basic implementation of the PlaylistOperations class, but you can extend it and add more functionality according to your specific requirements.

To know more about Java class, visit:

https://brainly.com/question/31502096

#SPJ11

what button do you press on pc when you're in a video game and load the bars at the bottom where it shows

Answers

It depends on the game, but typically the button to bring up the loading bar or progress bar during a video game is the "Tab" key. The "Tab" key is a common button used to access in-game menus, options, and other information while playing.

In video games, the loading bar or progress bar is often used to indicate the amount of progress made in loading new content or data, such as levels, maps, or other assets. The bar is usually displayed as a horizontal or circular progress indicator that fills up as the content is loaded.

The button used to access the loading bar or progress bar can vary depending on the game. Some common buttons used to access this information include the "Tab" key, the "Esc" key, the "Start" button, or a combination of buttons. The game developer usually determines the specific button used and is usually indicated in the game's controls or options menu.

To access the loading bar or progress bar while playing a game, press the designated button. This will usually bring up the bar, indicating the progress made in loading the new content or data. If you are unsure which button to use, you can consult the game's manual, the options menu, or the game's support website for more information.

Learn more about Tab key here:https://brainly.com/question/4658072

#SPJ4

Can Facade pattern be layered (i.e., can you have Facade under another Facade implementation)?

Answers

Yes, the Facade pattern can be layered, meaning you can have a Facade under another Facade implementation.

How to achieve the Facade pattern?


1. Implement the first Facade layer, which encapsulates complex subsystems and provides a simpler interface for the client.
2. Create the second Facade layer, which encapsulates the first Facade layer and potentially other subsystems. This second layer will also provide a simplified interface for the client.
3. Continue this process for any additional Facade layers as needed.

By layering Facade patterns, you can further simplify and streamline interactions between clients and complex subsystems, while keeping the overall system organized and manageable.

To know more about the interface visit:

https://brainly.com/question/28939355

#SPJ11

You have created a Web page in HTML. When it fails W3C validation, you try changing the HTML standard to make your code more compliant. But the page fails W3C validation tests each time, regardless of standard. Which element that you used to structure the page is failing to validate

Answers

Answer:

<table>

Explanation:

W3C validation is a test applied to web pages codes, containing HTML, CSS and other important web frameworks, to make sure that they follow the right syntax and semantics prescribed by the W3C - World Wide Web Consortium.

When a web page, or simple an HTML document, passes this test then it shows that the set rules for creating web pages, that can be easily rendered across many browsers, have been well followed.

There are many reasons why the test may fail. Some of them are highlighted as follows;

i. Not specifying the Doctype at all. For an HTML document to pass the W3C validation test, it is important to specify the Doctype which tells the browser how to treat the document. If HTML is specified as Doctype, then the browser treats the document as HTML. If none is specified, the browser does not know and may have to guess how to treat the document.

ii. Missing closing tags. HTML is a markup language and the use of tags are very important. Many tags have opening and closing parts such as;

<p> </p>.

Some are self closing such as;

<br />

Now, opening a tag and not closing it will make the test fail.

iii. Not completing important child tags. Some tags have child tags that are very important. Child tags are put inside another tag called the parent tag. An example is the <table> tag which has a few child tags such as <tr>, <tbody> e.t.c

Now, when creating a table, according to the W3C specifications, one or more of the <tr> or <tbody> child tag should be inserted.



If I want to make it look like slide number one is turning a page to slide number two, what
effect needs to be applied?

Answers

Answer:

Im not certain but I think thwir is one called flip

Explanation:

Kind of works like a book if thats what your asking for

A pedometer treats walking 1 step as walking 2.5 feet. Define a function named FeetToSteps that takes a double as a parameter, representing the number of feet walked, and returns an integer that represents the number of steps walked. Then, write a main program that reads the number of feet walked as an input, calls function FeetToSteps() with the input as an argument, and outputs the number of steps.

Answers

In computing, it should be noted that a program is a specific set of ordered operations that is given to the computer to perform. The program based on the information given is illustrated below

How to depict the program?

The program will be:

import java.util.Scanner;

public class LabProgram {

   public static int feetToSteps(double userFeet){

       return (int) (userFeet/2.5);

   }

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       double userFeet = in.nextDouble();

       int steps = feetToSteps(userFeet);

       System.out.println(steps);

   }

}

In conclusion, the program is shown above.

Learn more about programs on:

https://brainly.com/question/1786465

#SPJ1

no.120 northern trail outfitters is using one profile for all of its marketing users, providing read- only access to the campaign object. a few marketing users now require comprehensive edit access on campaigns. how should an administrator fulfil this request?

Answers

A id is used arctic path guides for all its promotional users, giving them key sectors to campaign item. Several sales users still need real campaign edit access. A admin used the marketing user check to fulfil this request.

What is it Northern Trail Outfitters?

Claude Cogenerates This same Lightening Components Architecture, underlying Marketing automation Framework, including Marketing automation DX (this redesigned Marketing automation programmer experience) are used to building automation system apps quickly throughout the different sample enterprise Northern Trail Outfitters.

What in Salesforce is Northern Trail Outfitters?

Check out the Transaction processing Sending messages API. For instance, Northern Trail Outfitters, or NTO, asks Marketing Cloud to email a customers a notification of their e - commerce portal.

To know more about Northern Trail Outfitters visit:

https://brainly.com/question/20388719

#SPJ4

Horizontal and vertical flips are often used to create ___.
(Hint: one word, starts with the letter R, 3 syllables) HELP PLEASE !! PHOTOSHOP CLASS !!

Answers

Answer:

Rotation of an image

Explanation:

The correct answer is -  Rotation of an image

Reason -

When you rotate an object, it moves left or right around an axis and keeps the same face toward you.

When you flip an object, the object turns over, either vertically or horizontally, so that the object is now a mirror image.

Suzanne Brett wants to borrow $55,000 from the bank. The interest rate is 6.5% and the term is for 5 years.

What is the yearly payment amount?

Answers

Answer:

$14575

Explanation:

$550006.5%5 years

Total payment amount:

$55000+5*6.5%= $55000 +32.5%= $55000 *1.325= $72875

Yearly payment:

$72875/5= $14575

Answer:

$3,575

Explanation:

Who designed the Analytical Engine in the 1930s?
Charles Babbage
Steve Wozniak
Alan Turing
Bill Gates

Answers

Answer:

Charles Babbage

Explanation:

Charles Babbage designed the Analytical Engine in the 1930s.

Thank you ☺️☺️

Answer:

Charles Babbage

Explanation:

Charles Babbage designed a general-purpose calculating machine, the Analytical Engine, which is considered to be the precursor of the modern-day computer. He was never able to finish it.

- Edge 2022

You already now about some collections. Which of the following is a type of collection in Python? Select 2 options.

list

dataset

deque

ordered set

group

Answers

Answer:

List, Deque

Explanation:

A list is self explanatory. A list can consist on integers, strings, etc.; making it a collection. A deque is also similar. A deque is a type of list.

hope this helped :D

The name “deque” is an abbreviation for a double-ended queue. Double-ended items support the addition and removal of components from both ends. Thus option A, C is correct.

What are the different type of collection in Python?

The Python standard library's collections module is a potent component that enables succinct and effective data manipulation.

This tutorial covered named tuple, default dict, and deque, three of the classes offered by the collection's module.

The information acquired via primary data gathering techniques is highly precise and specific to the goal of the research. Quantitative methods and qualitative methods are the two main types of primary data collection techniques.

Therefore, Unordered groupings of distinct values make up sets. Dictionaries are collections of key-value associations that are not sorted.

Learn more about Python here:

https://brainly.com/question/15872044

#SPJ2

Is OPSEC a dissemination control category within controlled unclassified information program?

Answers

OPSEC is a dissemination manipulate class inside the Controlled Unclassified Information (CUI) program. The adversary is accumulating information concerning your businesses mission, from the trash and recycling.

Is OPSEC section of CUI?

A clear CUI class is OPSEC and many legacy FOUO documents and newly identified CUI at operational agencies are recognized for safeguarding due to the want to defend statistics for OPSEC purposes.

What is a dissemination control?

Dissemination manage markings become aware of the growth of or hindrance on the distribution of talent information. These markings (e.g., ORCON, IMCON, PROPIN, REL TO, RELIDO, NOFORN) are in addition to and separate from the levels of classification identified in Section E.

Learn more about OPSEC a dissemination control here;

https://brainly.com/question/5571877

#SPJ4

What are the minimum number of bits an address bus must have in a byte addressable memory system containing only 4 KiB of memory

Answers

The minimum number of bits the address bus must have in the byte addressable memory system is 12

How to determine the minimum number of bits?

The memory size is given as;

Size = 4 KiB

Convert to bytes

Size = 4 * 2^10 bytes

Express 4 as 2^2

Size = 2^2 * 2^10 bytes

Multiply

Size = 2^12 bytes

The minimum number of bits is then calculated as;

2^n =  Size

This gives

2^n = 2^12

Cancel out the base (2)

n = 12

Hence, the minimum number of bits is 12

Read more about bits and bytes at:

https://brainly.com/question/20594719

Match the index with the value

Match the index with the value

Answers

Answer:

15

32

0

64

Explanation:

The first array location has index 0, and so forth...

Post Test: Software Development Life Cycle and Initial Phases 6 Select the correct answer. Which activity is performed during high-level design in the V-model? A. gathering user requirements B. understanding system design C. understanding component interaction D. evaluate individual components E. design acceptance test cases

Answers

During the high-level design phase in the V-model of the software development life cycle, the activity that is performed is understanding component interaction. So, the correct option is C.

The high-level design focuses on translating the system requirements into an architectural design that outlines the overall structure of the software system. It involves identifying the major components or modules of the system and understanding how they interact with each other to achieve the desired functionality.

Understanding component interaction is crucial during high-level design as it involves determining the interfaces and dependencies between the different components. This includes defining the communication protocols, data flows, and interactions between the components. The goal is to ensure that the components work together seamlessly and efficiently to meet the system requirements.

Option A, gathering user requirements, is typically performed during the requirements gathering phase, which is before the high-level design phase. It involves understanding and documenting the needs and expectations of the system's users.Option B, understanding system design, usually takes place in the detailed design phase, where the specific design of the system is defined, including the internal workings of the components.Option D, evaluating individual components, is more aligned with the testing phase, where the components are assessed individually to ensure their functionality and compliance with the design.Option E, designing acceptance test cases, typically occurs during the testing phase when the acceptance criteria are established and test cases are created to verify that the system meets the specified requirements.

In conclusion, during the high-level design phase in the V-model, the activity of understanding component interaction takes place to ensure that the major components of the system work together effectively to achieve the desired functionality.

For more questions on V-model

https://brainly.com/question/16298186

#SPJ11

Sean Cody is a website most known for what?

Answers

Answer:

Sean Cody is a website most known for to translate English to Portuguese.

is an website from the portugués

which Yandere Simulator update removed the box of matches?

Answers

Answer:

Fixed the glitchy physics of Yandere-chan’s latest hairstyle. Removed exploit that allowed players to keep a character stationary indefinitely by talking to a student about their Task and never dismissing the Task Window. Adjusted the pathfinding grid so that it should be less likely for a student’s path to the male locker room to be blocked.

Explanation:

Answer:

i couldnt find the exact year but heres a list of bug fixes n stuff if this helps

Explanation:

https://yandere-simulator.fandom.com/wiki/Update_History

Where are methods listed in a UML class diagram showing three parts?
in the top third of the diagram
in the middle third of the diagram
in the bottom third of the diagram
anywhere in the diagram a lowercase m is shown

Answers

Answer:

the bottom third

Explanation:

Check out the exampe below.

swim() would be an example of a method.

Where are methods listed in a UML class diagram showing three parts?in the top third of the diagramin

I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding FLVS



Part 1: Plan and Write the Pseudocode
Using pseudocode, write an algorithm that someone else can follow.
Decide on a question to ask the user. Some ideas include:
What grade are you in?
What sport do you play?
Where did you go on vacation?
Use one variable to store the response.
Use one if-else statement to make a decision based on the user's input.
Display two messages; one for each condition (True and False).
Insert your pseudocode here: (you only need to do one)
Flowchart
Write it out

Get input:

If statement:

Print if true:

Print if false:


Part 2: Code the Program
Use the following guidelines to code your program.
Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Write one if-else statement using user input.
Include a print message for both conditions (True and False).
Conclude the program with the main() statement.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.

Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question
Response
What was the purpose of your program?

How could your program be useful in the real world?

What is a problem you ran into, and how did you fix it?

Describe one thing you would do differently the next time you write a program.




Part 4: Save Your Work
Don't forget to save this worksheet. You will submit it for your assessment.

you can also give me a link to your work and ill use it as a guide I will not copy
my g mail is my user name

Answers

Answer:

Pseudocode:

import random

fetch user input on a lucky number

insert input into variable - "response"

new variable, random = randint

condition to check wheather random is our response

display results

Python Code:

import random

def main():

response = int(input("Guess my lucky number, its between 1 and 100: "))

lucky_number = random.randint(1,100)

if response == lucky_number:

print(f"Wow you're right, it is {lucky_number}")

else:

print("Sorry, Try Again")

main()

Reminder:

intended for python3 as i included the format f

also it could be done without the import, just manually insert a number

i'll leave the post mortum to you

Explanation:

How to install specific version of create-react-app so.

Answers

Answer:

First, go to the package.json file and change the version of react, react-dom, and react-scripts to the desired version.

Next, clear the node_modules and the package-lock.json file.

Finally, hit:

npm install

You are working the 8:00 AM shift at the help desk. An irate user who fails to identify himself calls in claiming that his workstation is malfunctioning and that you need to fix it NOW. What is the first action you should take?

Answers

Answer:

Calmly ask him for his name and a more detailed explanation of the problem.

Explanation:

Since in the question,  it is mentioned that the anger use who fails to identify himself and claim that his workstation is malfunctioning and want to fix it now

Now the action which would be taken is to ask his name in a calmy manner and understand what the actually problem he is suffering by understanding it in a detailed way

Therefore according to the given case, the correct option is d.

Question 1 (5 points) When you are at a job interview, you should use effective communication strategies, like formal language. What is formal language and why do we use it? Formal language helps create the impression that the speaker is an expert on the topic. It suggests to audience members that the speaker's points deserve respectful consideration, and it presents the ideas of the speech in the most polished possible way.. Formal language is archaic and derived from Shakespeare to help us sound fancy in order to ensure that an employer can see that we are versatile Formal language is our ability to speak more than just one language. If we are bilingual, we have a better chance at being hired.​

Answers

This prompt is about formal oanguage and styles of communication. See the explanation below.

What is formal language and why do we use it ?

Formal language refers to a style of communication that follows specific grammatical and linguistic conventions, typically associated with academic, professional, or formal settings. It is characterized by the use of proper grammar, syntax, and vocabulary, and avoids slang or colloquial expressions.

We use formal language in job interviews to convey professionalism, competence, and respect for the setting and the interviewer. It also helps to convey our ideas in a clear and concise manner, without the distractions of informal language.

Contrary to the notion that formal language is archaic or derived from Shakespeare, it is a contemporary and widely used mode of communication in formal settings. It is not related to bilingualism, which refers to the ability to speak two languages fluently.

Learn more about formal language:
https://brainly.com/question/24222916
#SPJ1

The following are all covered securities EXCEPT
A Stock in a corporation acquired in 2013
B Debt instruments acquired in 2013
C Stock in a mutuel fund
D Securities future contract acquired in 2016.

Answers

The following are all covered securities EXCEPT securities future contract acquired in 2016.

This is option D.

What are covered securities

Covered securities are a term that refers to financial assets that are subject to Internal Revenue Service reporting requirements. Covered securities include several types of investment assets, such as stocks, bonds, and mutual funds, among others.

Basically, covered securities are assets that are subject to mandatory reporting by brokers and other financial institutions to the IRS. The information recorded includes the cost basis of the asset, the sale price, and any capital gains or losses realized when the asset is sold.

All assets acquired in 2011 or after are considered covered securities, including:

StocksBondsMutual funds

Any other asset that may be covered under IRS rules

An exception is that securities future contract acquired in 2016 is not a covered security.

Hence,the answer is D

Learn more about security system at

https://brainly.com/question/31525307

#SPJ11

Other Questions
HURRYPrivatized prisons may be more likely to experience assaults between prisoners and guards and or jail brakes because Do any of you know the answer to this question HELP ME !!!!?? Brainliest if right when writing for a multicultural audience, you should consider the following cultural variables True or false? SubstanceFormulaMass,(g)Physical ColorStateDensity Boiling, (g/cm) Point,Methane.16.0GasColorless0.423-161.5AmmoniaNH,17.0GasColorless0.70-33Unknown??????????????????PropaneCH44.1GasColorless0.493-12.1BromineBr.159.8LiquidRed4.0458.8LithiumLi6.94Solid0.5341342Silvery,whitemetalMagnesium Mg24.3Solid1.741090Silver,whitemetal write aparagraph of i have learned lessons from the passage about health and fitness ? What is a disadvantage of using multiple narrators to tell a story? Both sides of a story are presented, allowing readers to decide who they trust. It may leave readers confused if they do not pay close attention. The relationship between characters is more defined. The writer can reveal more of the story when telling it from two perspectives. PA LRAS AS Y 400 700 800 Aggregate output (in millions) 14. Refer to the above Figure. Which of the following statements characterizes an output level of $800 billion? a. It is sustainable over the long run without inflation. b. It is achievable only in the long run. c. It is attainable in the short run but it is associated with increases in the price level. d. It can be achieved only if investment is independent of the interest rate. 15. Refer to the above Figure. The output level of $700 billion is called: a. short run equilibrium. b. long run equilibrium. c. recession d. potential output. e. (b) and (d) only. Price level 7. How was the Populist movement a reaction to the Second Industrial Revolution?A. The Populists wanted to limit the growing influence of labor unions.B. The Populists wanted to limit immigration and expand global influence.C. The Populists attempted to address unfair and corrupt practices of big businesses.D. The Populists supported a laissez-faire approach to business by the government.A. Correct/ Incorrect Why?!B. Correct/ Incorrect - Why?C. Correct/ Incorrect - Why?D. Correct/ Incorrect - Why? Ani sells 527 dollars worth of sodas as part of a school club fundraiser. If the sodas cost 310 dollars, what equation can we make to find out how much money ani raised as the variable ? List the benefits the McDonald product provides to the customers what coenzyme is found in pyruvate carboxylase that aids in many carboxylation reactions? 1) What is alternative health service? give example.2) Point out any 5 points to develop adolescence What caused relations between the united states and the soviet union to begin to change in the early 1980s? select two answers. jimmy carter became president. leonid brezhnev died. the soviet union invaded afghanistan. ronald reagan became president. the united states withdrew from vietnam. richard nixon resigned as president. How did the governments total war effort affect Washington?It demoralized people who made sacrifices on the home front. It encouraged people to save food and money for themselves.It shrunk the economy and led to fewer manufacturing jobs.It boosted the economy and led to new manufacturing jobs. 1. The lines y = -x 3 and y = -x - 5 are parallel. What is the value of a? (2 points) (A) a = -2 (B) 1 a = (C) Q= - (D) a=-9 Please help 25 points how can you tell if an earthquake has occurred? Final Prob4.) The manager of a project determined some time ago that the most critical task in the timely completion of a project is the use of a special instrument, a confusitron, that has an uncertain completion time (a ramdom variable in terms of hours). He asks you, a confusitron expert, to use your experience to specify a discrete triangular probability distribution of outcomes--most like time to complete, pessimistic time to complete, and optimistic time to complete. Recently the project manager has learned that there is another equally critical task--framis-validation. This task cccurs immediately after the confusitron. You are also a framis-validation expert. The project manager asks you for a similar discrete triangular distribution of outcomes (see below). He then asks you to create a random sample of 100 observations from this distribution:Confusitron Distribution of Hrs. Framis-Validation Distribution of Hrs.1) Randomly sample 100 observations for both discrete triangular distributions of each task. Create a RV that is the sum of the tasks for each observation. Place the results in the designated area below.2) Create a frequency distribution column graph of the 100 Sum observations below by determining the Sample Space for the RV; so, the bins for the column graph will be the unique sample space values of the graph. Make the first bin 0. (Hint: there should be 9 bin values, including 0)3) What is the expected value of the Sum distribution? There are 2 theoretical ways to calculate it. Does it approximately match the average of your 100 observations (as it should)? During the Blank______ phase, managers must react to changes, such as the emergence of new technologies.