What are the two main factors that determine the choice of a network model

Answers

Answer 1

The two main factors that determine the choice of a network model are the specific needs of the organization and the cost of implementation. These factors influence the selection of an appropriate network architecture to achieve the desired functionality and efficiency.

Explanation:

In the first step, an organization must identify its specific needs. This includes understanding the purpose of the network, the number of users, the type and volume of data being transmitted, and any security or reliability requirements. The needs of the organization will determine which network model best suits its operations, whether it's a centralized, decentralized, or distributed network.

Next, the cost of implementation should be considered. This includes not only the initial setup costs but also the ongoing maintenance, upgrades, and potential expansion of the network. Organizations must weigh the benefits of a particular network model against its costs to ensure that the chosen model provides the best value for their investment.

Furthermore, the scalability of the network model is essential. As the organization grows, its network should be able to expand and accommodate the increasing number of users and data without significant disruptions to existing operations.

Lastly, organizations should also consider the ease of use, management, and integration of the network model with their existing systems and infrastructure. The chosen model should be user-friendly, easy to manage, and compatible with the organization's current technology and software.

In conclusion, the choice of a network model depends on the organization's specific needs and the cost of implementation. By considering these factors, organizations can select the most suitable network model to support their operations and achieve their desired level of functionality and efficiency.

Know more about the distributed network click here:

https://brainly.com/question/27795190

#SPJ11


Related Questions

Who was the father of computer?????​

Answers

Answer:

Charles Babbage

Explanation:

Answer:

Charles Babbage

Explanation:

He created the computer in the early 19th century

predict what the world would be like if no one tried to think critically. explain your predictions

Answers

The world would be in chaos and we would all be dead duh.

Perform the following logical operations. Express your answer in hexadecimal notation. a) x5478 AND XFDEA b) xABCD OR <1234 c) NOT((NOT (XDEFA)) AND (NOT(xFFFF))) d) x00FF XOR X3232

Answers

a) Performing the AND operation between x5478 and XFDEA, we get x4478 as the result in hexadecimal notation. b) Performing the OR operation between xABCD and <1234, we get xABFD as the result in hexadecimal notation. c) To perform NOT((NOT (XDEFA)) AND (NOT(xFFFF))), we first need to find the NOT values of XDEFA and xFFFF.

The NOT value of XDEFA is x2105, and the NOT value of xFFFF is x0000. Performing the AND operation between the NOT values, we get x0000. Taking the NOT of x0000 gives us xFFFF as the final result in hexadecimal notation.

d) Performing the XOR operation between x00FF and X3232, we get x32CD as the result in hexadecimal notation.

Here are the results in hexadecimal notation:

a) 0x5478 AND 0xFDEA = 0x5448
b) 0xABCD OR 0x1234 = 0xBBFD
c) NOT((NOT(0xDEFA)) AND (NOT(0xFFFF))) = NOT(0x2105 AND 0x0000) = NOT(0x0000) = 0xFFFF
d) 0x00FF XOR 0x3232 = 0x32CD

To know about Operators visit:

https://brainly.com/question/29949119

#SPJ11

Write down the functions of network layer in your own words.ASAP

Answers

Hrhnebevevebnenebebenene

An android user recently cracked their screen and had it replaced. If they are in a dark room, the phone works fine. If the user enters a room with normal lights on, then the phone's display is dim and hard to read. What is most likely the problem?

Answers

There are two possibilities for the problem in the given scenario. The first and most probable cause of the problem is that the replaced screen was of low quality or did not meet the device's standards.

Therefore, the screen is not transmitting light properly and is producing dim or blurry images.The second possibility for the problem is that the light sensor of the phone might be affected by the screen replacement. The phone might be adjusting the brightness levels based on the low light environment in the dark room and not adjusting correctly in the normal light environment.

This can result in the phone being too bright or too dim, making it difficult to read the display.However, both of these possibilities can be avoided by purchasing a high-quality replacement screen or seeking professional assistance to fix the problem. In such cases, it is recommended to have an expert inspect the device for any faults and repair it accordingly.Moreover, one can also try to adjust the screen brightness levels manually to make the display more readable in the normal light environment.  

To know more about visit:

https://brainly.com/question/32730510

#SPJ11

use the redo feature to reverse the most recent action you have changed. group of answer choices true false

Answers

The statement "Use the redo feature to reverse the most recent action you have changed" is false.

The redo feature is used to repeat an action that was undone using the undo feature. It allows you to restore a previous action that was undone, not reverse the most recent action you have changed. The undo feature is used to reverse or cancel the most recent action you have performed When you undo an action, it is removed from the current state, and you can then use the redo feature to bring back that action if needed. However, the redo feature cannot reverse the most recent action directly. To reverse the most recent action, you would typically use the undo feature. This allows you to step back to a previous state before the action was performed. The redo feature comes into play if you change your mind and want to reapply the action that was previously undone.

Learn more about  The redo feature  here:

https://brainly.com/question/1569443

#SPJ11

(b) in the idaas model where both the cloud service customer (csc) and idaas provider have directories for storing user information, the contents from csc directory have to be

Answers

In the IDaaS (Identity as a Service) model, both the Cloud Service Customer (CSC) and the IDaaS provider have directories for storing user information. In this model, the contents from the CSC directory have to be synchronized with the IDaaS provider's directory.

To achieve this synchronization, the following steps can be taken:

1. Establish a connection between the CSC and the IDaaS provider's directory.

This connection can be established using protocols such as LDAP (Lightweight Directory Access Protocol) or SCIM (System for Cross-domain Identity Management).

2. Configure the synchronization settings. This includes specifying which attributes or user information should be synchronized between the directories.

Common attributes that are often synchronized include user names, email addresses, and group memberships.

3. Define the synchronization frequency. Decide how often the directories should be synchronized.

This can be set to occur in real-time, periodically (e.g., every hour or every day), or based on specific triggers (e.g., when a user account is created or modified).

4. Enable the synchronization process. Once the connection, settings, and frequency are configured, enable the synchronization process to start transferring the user information from the CSC directory to the IDaaS provider's directory.

5. Monitor the synchronization. Regularly check the synchronization process to ensure that the user information is being successfully transferred and updated in both directories.

If any issues or errors occur during the synchronization, troubleshoot and resolve them promptly.

By synchronizing the contents from the CSC directory with the IDaaS provider's directory, both parties can have up-to-date and consistent user information, ensuring smooth authentication and access management within the IDaaS model.

To know more about Cloud Service visit;

https://brainly.com/question/31442035

#SPJ11

Identify the tool in OpenOffice writer which will help us to obtain special text effects.
Gallery
Clip Art
Fontwork Gallery
None of the above

Answers

Answer:

Fontwork Gallery

Explanation:

The "Fontwork Gallery" helps create special effects for your text, so it can speak volumes. It allows you to select any Fontwork style and become creative with it by filling it with different colors. You may also change the font's line color and width. You may also wrap it to the right, wrap it through and so on. It gives you enough freedom to make your font stand out and add color and style to any document you're working on.

how has the splintering of sport media coverage not effected sport pr professionals?

Answers

Sport media coverage has changed over the years due to advancements in technology and consumer behavior. The increase of media coverage has caused a fragmentation of sports media, which refers to the division of sports coverage across various media channels, including newspapers, television, social media, podcasts, radio, and streaming services.

Sport PR professionals have not been immune to the effects of the fragmentation of sports media, as their job has become more complicated as they now have to navigate through the various media channels to promote their client's message or event. The splintering of sport media coverage has affected sports PR professionals by making their jobs more challenging and complex than before.The splintering of sport media coverage has led to the development of an increasing number of channels for sports fans to receive their sports news.

This has made it difficult for sports PR professionals to get their message across to fans due to the numerous options available to them.The rise of social media, for instance, has provided fans with access to real-time information, news, and commentary on sports. Sports PR professionals have had to create different messages for each media channel as each channel has its format, style, and tone, making it more challenging for them to get their message across to their target audience.Additionally, the fragmentation of sports media has led to a decrease in the ability of sports PR professionals to control the narrative about their clients. They have to work with various reporters, bloggers, and commentators, each with their biases and agendas. This has led to a situation where sports PR professionals have to work much harder to protect their client's image and reputation.Conclusively, the fragmentation of sport media coverage has affected the way sports PR professionals work, requiring them to be more innovative and strategic in their communication efforts to get their message across to their target audience.

To know more about television visit :

https://brainly.com/question/16925988

#SPJ11

Unit Test
Unit Test Active
11
12
TIME REN
16:
Which formatting elements can be included in a style Terry created?
font size, type and color
paragraph shading
line and paragraph spacing
All of the options listed above can be used to create a new style.

Answers

Answer:

d. all of the options listed above can be used to create a new style .

Explanation:

The formatting elements that can be included in a style Terry created is font size, type and color. The correct option is A.

What is formatting element?

The impression or presentation of the paper is renowned to as formatting. The layout is another word for formatting.

Most papers encompass at least four types of text: headings, regular paragraphs, quotation marks, as well as bibliographic references. Footnotes along with endnotes are also aggregable.

Document formatting is recognized to how a document is laid out on the page, how it looks, and the way it is visually organized.

It addresses issues such as font selection, font size as well as presentation like bold or italics, spacing, margins, alignment, columns, indentation, and lists.

Text formatting is a characteristic in word processors that allows people to change the appearance of a text, such as its size and color.

Most apps display these formatting options in the top toolbar and walk you through the same steps.

Thus, the correct option is A.

For more details regarding formatting element, visit:

https://brainly.com/question/8908228

#SPJ5

Add pictures using the_____tab

Answers

insert

in word, click on the insert tab at the navigation pane.

When an application has multiple uses what is it known as?.

Answers

Answer:

an application that had multiple uses is called full featured

Traverse the following tree by the in-order , pre-order nd post-order method :​

Traverse the following tree by the in-order , pre-order nd post-order method :

Answers

To traverse the figure in the form inorder, preorder and postorder we must change the sequence of the numbers depending on the case.

How to traverse the figure in the inorder form?

To traverse the figure in the inorder form we must carry out the following sequence, from the left subtree to the root then to the right subtree. So the numbers would be:

1 ,10 ,15,20, 22, 25, 32, 36, 43, 48, 50, 56, 58, 60, 75

How to traverse the figure in the preorder form?

To traverse the figure in the preorder form we must carry out the following sequence from the root to the left subtree then to the right subtree.

36, 25, 32, 20, 22, 10, 15, 1, 48, 43, 56, 50, 60, 58, 75

How to traverse the figure in postorder form?

To traverse the figure in postorder form we must perform the following sequence from the left subtree to the right subtree then to the root.

1, 10, 15, 20, 22, 25, 32, 75, 60, 58, 56, 50, 48, 43, 36.

Learn more about figures in: https://brainly.com/question/14982752

#SPJ1

what are the advantages of hybrid computer

Answers

The advantages of hybrid computers are:

They have a large amount of computing speed speed that is often helped by the all-parallel configuration made by the analog subsystem. It is very useful in terms of numerical solutions for any work of differential equations and also in flight simulation.

What is an advantage of hybrid computing?

Hybrid cloud computing is known to be one that gives businesses a lot of control over their data and it is one that have a good or better security as it tends to lower the risk of exposure of data.

Note that,The advantages of hybrid computers are:

They have a large amount of computing speed speed that is often helped by the all-parallel configuration made by the analog subsystem. It is very useful in terms of numerical solutions for any work of differential equations and also in flight simulation.

Learn more about hybrid computing from

https://brainly.com/question/21474132

#SPJ1

scraper = cloudscraper.create_scraper( interpreter='nodejs', recaptcha={ 'provider': '2captcha', 'api_key': '1abc234de56fab7c89012d34e56fa7b8' } ) scraper = cloudscraper.create_scraper( interpreter='nodejs', recaptcha={ 'provider': 'anticaptcha', 'api_key': 'P6KLRNy7h3K160ZmYNUOAce7' } ) That won't run in a repl? Yes, I know, I just gave out my API key, I could care less.

Answers

Answer:

I don't think repl supports those things. You probably need to download something and run nodejs on your computer.

___ testing may begin before the program is 100% complete in order to test particular sections of code in a reply to discreet functions or modules

A. Dynamic.

B. Static.

C. Visual.

D. Gray-box.

Answers

Gray-box testing may begin before the program is 100% complete in order to test particular sections of code in a reply to discreet functions or modules. Hence option d is correct.

What is the testing

Gray-box experiment is a type of operating system experiment where the exploratory has prejudiced information of the within operation of the system being proven.

It connects ingredients of two together vital and static experiment approaches. In silver-box experiment, the exploratory has approach to some news about the within form or law of the spreadsheet but does not have full information or perceptibility into the exercise analyses.

Read more about Gray-box. testing here:

https://brainly.com/question/29590079

#SPJ1

HURRY!!!!!!!!!!!!!
Suppose you have a pictorial drawing of a playground design. How would you represent the length of a slide that is 12 feet long?

Answers

Answer:

You make use of a scale (See Explanation)

Explanation:

Given

Length = 12 feet

Required

How would you represent this on drawing.

Knowing that a length of 12 feet can't be drawn on drawing, the best way to do this is to make use of a scale measurement.

The scale to use depends on you and the size of paper at your disposal.

Assume you adopt a scale of 1 inch: 1 feet

This means that a length of 12 feet will be represented by 12 inches in drawings

Complete each statement by choosing the correct answer from the drop-down menu.

The data type can hold whole positive and negative numbers.
The terms TRUE and FALSE are usually associated with data types.
Values such as 9.0, –1245.1, and 0.777 are examples of data types.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct matching answers for this question are given below. In this question, it is asked to identify the data type of the given scenario.

Integer short and integer long data type:

These data types can hold whole positive and negative numbers. however, you can also store positive and negative values in float and double data type also.

Boolean data type:

Boolean data type usually stores true or false values such as yer or no, true or false etc. It stores binary values i.e 1 or 0.

Float and Double data type: float and double data type can store positive and negative numbers with decimals. But, the float data type can store 4 bytes of data and sufficient for storing 7 decimal digits. while double data type has a size of 8 bytes of data and sufficient for storing 15 decimal digits.

However, for the given scenario in the question,  the float data type can accomodate these values easily.

Answer: Integer, Boolean, Floating-Point!

Explanation:

I did it edge 2020

T/F: Displaying data from a Web database by creating Web pages on demand, retrieving the most current data, is called static Web publishing.

Answers

Displaying data from a web database by creating web pages on demand, and retrieving the most current data is called dynamic web publishing, not static web publishing. So, the given statement is false.

Explanation:

Dynamic web publishing involves generating web pages on the fly by retrieving data from a web database and formatting it for display. This allows for the creation of personalized and interactive web pages that respond to user input and provide up-to-date information. Dynamic web publishing is used extensively in modern web applications, allowing for real-time interactions with web databases and enabling complex and dynamic websites to be built. By generating content on the fly, dynamic web publishing allows for greater flexibility and customization of web pages, making them more useful and engaging for users.

In contrast, static web publishing refers to the process of creating and publishing static web pages that are delivered to the user's web browser without any server-side processing. These static pages are pre-created and are the same for all users who visit the page. They do not change until the webmaster manually updates the content. Static Webpages are not generated in response to user input or updated data.

To know more about static web publishing click here:

https://brainly.com/question/29977083

#SPJ11

The image below shows a weather service map
Which detail best describes this map?
O shows isolines and isobars
O shows types of precipitation
O was created for newspapers
O is probably not used to make forecasts
Mark this and return
Save and Exit
Next
Submit

Answers

Answer:I chose A

Explanation:

for an algorithm, define: ሺiሻ the worst case time complexity, ሺiiሻ the average case time complexity, and ሺiiiሻ the best case time complexity. which one is critical?

Answers

In order to create an algorithm that is efficient, it is crucial to consider the algorithm's time complexity while it is being built.

In terms of worst-case time, how complicated is an algorithm?

When it comes to running time, the worst-case time complexity forecasts the longest running time an algorithm would require given any input of size n and ensures that it would finish in that amount of time.

What are the ideal, average, and worst case possibilities for an algorithm's complexity?

The ideal function is one that has the fewest steps to handle input data with n components. The worst case function is the one that requires the most iterations given input data of size n. The "average case" function uses an average number of steps to process input data made up of n items.

Learn more about algorithm's complexity: https://brainly.com/question/30753708

#SPJ4

What is most likely not an ideal scenario for using windows containers rather than a virtual machine?

Answers

One scenario where using Windows containers may not be ideal compared to a virtual machine is when running applications that require a full operating system with complex dependencies.

Windows containers are designed to be lightweight and share the underlying OS kernel with the host, which makes them great for running isolated applications. However, if your application relies on specific configurations, services, or components that are not available in the container's shared OS kernel, using a virtual machine would be a better choice.

Another scenario is when you need strict isolation between applications. Windows containers share the OS kernel with the host, which means that any vulnerability or misconfiguration in one container could potentially affect others. If you require stronger isolation between applications, such as for security or compliance reasons, using a virtual machine would provide a higher level of isolation.

To know more about compared visit:

https://brainly.com/question/31877486

#SPJ11

Which actions are available in the Trust Center? Check all that apply.
Enable macros.
Set privacy options.
Create mail merges.
Set trusted documents.
Approve trusted publishers.
Block users from receiving emails.

Answers

Answer: 1,2,4,5

Explanation:

bc

Question # 2 Long Text (essay) Explain why E-mail B is inappropriate for the workplace and revise it to be appropriate.

Answers

Due to its informal tone and unsuitable language, Email B is inappropriate for usage at work. Communication that is respectful and straightforward is crucial in a work setting.

What constitutes improper email use at work?

Keep it businesslike. Never express rage, use foul language, or make racial or gendered insults. Remember that sending offensive text or images via email could come back to haunt you. Even if they are intended as a joke, avoid sending or forwarding emails that contain libellous, defamatory, insulting, racist, or obscene remarks.

What does improper communication at work mean?

One manifestation of the issue is the practise of communicating with coworkers solely via email and memos and never in person. deliberately ignoring a task or working.

To know more about Email visit:-

https://brainly.com/question/14666241

#SPJ1

which command will help you determine the services that are running on specific ports?

Answers

The command that can help you determine the services that are running on specific ports is the "netstat" command. This command is available on most operating systems, including Windows, Linux, and macOS.

To use the netstat command, you need to open a command prompt or terminal window and type "netstat -a" followed by the specific port number you want to check. This command will display a list of all the connections that are currently active on that port, including the IP addresses and protocol used by each connection. If you want to see only the active connections, you can add the "-n" flag to the command, which will display the connection information in numeric format instead of resolving the IP addresses. You can also use the "-p" flag to display the process or program that is using each port. In summary, the netstat command is a useful tool for identifying the services that are running on specific ports. It provides detailed information about active connections, IP addresses, protocols, and processes, which can be helpful in troubleshooting network issues or identifying potential security threats.

For more such question on protocol

https://brainly.com/question/28811877

#SPJ11

please write the code for this:

Enter a word: Good
Enter a word: morning
Good morning

Answers

w1 = input("Enter a word: ")

w2 = input("Enter a word: ")

print(w1,w2)

I wrote my code in python 3.8. I hope this helps.

Answer:

G_0o*4 Mrn --ing

Explanation:

G = G

_ = space

o = O

* = space

4 = D (the fourth letter in the alphabet)

Mrn = Abbrev. of Morn (ing)

-- = space

ing = ing (last 3 letters of "morning")

Hope this helps <3

How does adding ram to your computer improve the performance?

Answers

Answer: Adding ram to your PC can increase the speed of which memory transfers stuff to other components. Meaning it can run games/apps/the internet faster.

describe the process of stp from implementation to convergence.

Answers

Spanning Tree Protocol (STP) is a networking protocol that was created to prevent network loops in a Layer 2 switched network. STP helps in controlling the flood of traffic in a switched network by organizing the network topology. In this regard, the process of STP from implementation to convergence involves a series of steps as described below:

Step 1: STP Implementation

The first step in the process of STP implementation is to enable STP on all switches in the network. This ensures that all switches can participate in the STP process. After enabling STP on all switches, the switches must then be configured with a unique Bridge ID.

Step 2: Root Bridge Election

The next step is to elect a Root Bridge. The Root Bridge is the most important bridge in the STP topology as it provides the basis for the entire network's logical topology. To elect the Root Bridge, the switches compare their Bridge IDs, with the switch with the lowest Bridge ID being elected as the Root Bridge.

Step 3: Calculating Path Costs

The next step is to calculate the path costs from each switch to the Root Bridge. Path costs are calculated by adding the cost of each link between a switch and the Root Bridge.

Step 4: Determining the STP Topology

Using the Root Bridge and the path costs, STP then determines the topology of the network. STP calculates the shortest path from each switch to the Root Bridge, and blocks any redundant links.

Step 5: STP Convergence

After STP has determined the topology of the network, it then begins to converge. During convergence, switches change their port states until all ports are either in the forwarding or blocking state.

In conclusion, STP is an essential protocol for maintaining a stable and efficient network. By following the above process, STP helps prevent network loops and ensures that traffic flows efficiently throughout the network.

To know more about maintaining  visit:

https://brainly.com/question/28341570

#SPJ11

Which statement describes a firewall?
A. a program designed to detect and block viruses from infecting your computer
B. a suite of security measures designed to prevent unauthorized access to your computer
C. a software program designed to keep you from accessing important documents on your computer

Answers

Answer:

B

Explanation:

firewalls arent really programs but they are set rules designed to ensure security

C doesnt make any sense, why would it keep YOU from accessing YOUR documents?

A is antimalware

so its B

On the Design tab, which group allows you to select a different data set for a chart?
O Data
O Chart Legends
O Type
Chart Styles

Answers

Answer

A.Data

Trust me

Answer:

A. Data

Explanation:

got it right

Other Questions
Express 48 minutes as a fraction of 1 hour in its lowest term. Working on rigs is dangerous due to explosions and weatherTo which energy type does this apply? Which expression is equivalent to (11r 8) + (7 4x)? Marc decided to place $453 in equal deposits every month at the beginning of the month into a savings account earning 7.29 percent per year, compounded monthly for the next 11 years. The first deposit is made today. How much money will be on his account at the end of that time period? If the car speeds up at a steady 1. 7 m/s2 , how long after starting is the magnitude of its centripetal acceleration equal to the tangential acceleration?. List the heterozygous offspring that may be obtained if one parent is homozygous and the other heterozygous for a single trait. Include the trait you are using in the explanation. Lee el prafo y escoge la mejor respuesta. Read the paragraph and select the best answer.Estas obras, que el museo londinense expondr en enero del ao prximo, fueron realizadas en Pars cuando el artista trabaj en estrecha colaboracin con el litgrafo Fernando Mourlot, mientras que las acuatintas corresponden a principios de los aos cincuenta cuando Picasso experimentaba con las tcnicas de la litografa en el estudio de Roger Lacourire, en Pars.Source:http://larepublica.pe/impresa/ocio-y-cultura/806707-museo-britanico-adquiere-litografias-y-aguatintas-del-artista-pablo-picassoLas obras en la lectura son del gnero de ________. las tcnicas secas las tcnicas hmedas las esculturas las impresiones the larger your down payment amount, the ____________ your monthly payments. Rewrite the expression for the total free energy change for nucleation (Equation 10.1) for the case of a cubic nucleus of edge lengt.h (instead of a sphere of radius r). Now dif ferentiate this expression with respect to a (per Equation 10.2) and solve for both the critical cube edge length, a*, and G*. Calculate the difference in binding energy per nucleon for the isobars 23/11 Na (23 being the mass number and 11 being atomic number) and 23/12 Mg. equivalent answers for 64 to the power of 2/3 find the limit. lim t0 e5t i t2 sin2(t) j sin(4t)k Which of the following correctly describes a non-price competitive strategy based on product differentiation? A. Market penetration uses new marketing segments and existing products. B. Price leadership uses existing marketing segments and existing products. C. Product development uses existing marketing segments and existing products. D. Market development uses new marketing segments and new products. E. Product proliferation uses new marketing segments and new products. Dnde ____________ mi mochila? ____________ en la clase de tecnologa.2. En qu clase ____________ Uds. en la segunda hora?Nosotros ____________ en la clase de espaol.3. Hola, Juan! Cmo ____________?____________ bien, Jorge. Y t?Regular.4. Dnde ____________ Luisita y Mara hoy? Ellas no ____________ en la cafetera.Luisita ____________ en la clase de arte y Mara ____________ en la clasede ingls.5. Dnde ____________ la sala de clases de la profesora Williams?____________ al lado de la sala de clases del profesor Charco.6. Cmo ____________ Ud. hoy, Sr. Pascual?____________ muy bien, gracias, Selena. Cmo ____________ t?Regular.7. Cmo ____________ t y Juan?(Yo) ____________ bien. Juan ____________ regular. Nosotros________ 2. What kind of forest grows along the coast of the Gulf of Carpentaria?CypressHardwoodMalleeRainforest When was T.S Eliot born ? Your instructor gives you an unknown organ for you to examine and identify through microscopy. What should you do first with the sample?a) cut it into sectionsb) examine it for artifactsc) fix it with preservatived) stain it to enhance contrast a) find the GCD of 4235 and 9800. b)use the GCD in part a) reduce the fraction 4325 ____ 9800 Jodi hosts her own morning radio show. She works in the ______ pathway of the Arts, AV Technology, and Communication cluster.Question 4 options:AV Technology and FilmPrinting TechnologyJournalism and BroadcastingPerforming Arts John's age is three times that of his sister. When you add John's age to his sister's age, you get 36. How old are John and his sister? show work if you can