Which of the following describes what the priority value for the cluster role specifies?
A. How critical it is to keep that role operational
B. The order in which roles are shut down
C. The percentage of resources that should be allocated to the role
D. The order in which roles are started up

Answers

Answer 1

The option that describes what the priority value for the cluster role specifies is D. The order in which roles are started up.

Cluster roles are critical services that must be kept operational to guarantee the availability of Kubernetes (K8s) resources for the hosted services. To keep the Kubernetes workloads running and accessible, it is critical to prioritize critical roles by assigning priority levels. The higher the value of the priority, the sooner the roles start up and come online after an outage. In the case of concurrent crashes, high-priority services will be given preference over low-priority services.

ClusterRole is a non-namespaced resource used to specify permissions and access to a single or several Kubernetes resources within a cluster. It is a crucial part of the Kubernetes Authorization API. Every ClusterRole contains a set of rules, and each rule contains an HTTP path and a set of verbs. ClusterRole rules, when used in conjunction with the rolebindings, enable granular permission control to be applied to user, group, or service account. So the answer is D. The order in which roles are started up.

Learn more about cluster role: https://brainly.com/question/31052238

#SPJ11


Related Questions

The Principal of a school requires to store the information about the students of his school.
Which application software should he use to create a database? (Do it as homework)

Answers

Answer:

Microsoft office access would be a good application to create a database......it has various advantages such as storage and retrival of data, etc.

Explanation:

By Ms Excel the school principle write everything and to create students profile principle sir or headmaster use Microsoft so that students id cards will be created.

What type of story attempts to make you feel engaged by scaring you?

A.
love story

B.
horror story

C.
fantasy story

D.
bedtime story

Answers

Answer: B

Explanation: Horror

Ignore this it a temporary note for me: SPSstudents

Answers

Answer:

okk

Explanation:

What is a banner grab?

Answers

Banner Grabbing is a technique used to gain information about a computer system on a network and the services running on its open ports. Administrators can use this to take inventory of the systems and services on their network.

Hope you find this helpful!
Brainliest and a like is much appreciated!

which of the following saas can falcon security use?

Answers

Falcon Security, a cybersecurity firm, can use the following SaaS (Software as a Service):

1. AWS Guard Duty - It is a fully managed threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect AWS accounts, workloads, and data stored in Amazon S

2. Azure Security Center - It is a unified infrastructure security management system that strengthens the security posture of workloads running in Azure, on-premises, and in other clouds.

3. McAfee MVISION Cloud - It is a cloud access security broker that gives visibility and control over sensitive data in SaaS, PaaS, and IaaS environments.

4. Crowd strike Falcon Insight - It is an endpoint detection and response (EDR) platform that uses AI-powered threat hunting and threat intelligence to defend endpoints from advanced threats.

5. Cisco Cloud Lock - It is a cloud access security broker (CASB) that provides visibility, compliance, and threat protection for cloud applications.

Know more about Falcon Security here:

https://brainly.com/question/4991244

#SPJ11

Can someone help me with Unit 7 of cmu cs academy python. PLSS EMERGENCYY

Answers

Carnegie Mellon University's CMU CS Academy is an online, graphics-based computer science curriculum taught in Python.

Why is Phyton important?

Python has become a data science industry standard, allowing data analysts and other professionals to do complicated statistical computations, produce data visualizations, design machine learning algorithms, handle and analyze data, and accomplish other data-related jobs.

Development time is far more essential than computer run time in today's society. Python just cannot be beat in terms of time-to-market. Python is also efficient and dependable, allowing developers to design complex programs with minimal effort.

Learn more about Phyton:
https://brainly.com/question/31768977
#SPJ1

what is a honeypot? how is it different from a honeynet?

Answers

A honeypot is a security mechanism designed to attract and deceive potential attackers, allowing organizations to study their tactics and gather information. A honeynet, on the other hand, is a network of interconnected honeypots that collectively provide a more comprehensive and scalable deception environment.

A honeypot is a computer system or network designed to appear as a vulnerable target to potential attackers. It serves as a trap to lure attackers, allowing organizations to monitor their activities, gather information about their techniques, and learn from their behavior without putting real systems at risk. Honeypots can be valuable tools for studying attacker tactics, developing countermeasures, and enhancing security measures.

In contrast, a honeynet is a network of multiple interconnected honeypots. It consists of several honeypots deployed in different locations or subnets, providing a more extensive and realistic deception environment. A honeynet allows organizations to capture a broader range of attack patterns, understand attacker behavior across multiple systems, and analyze the interactions between attackers and the network.

By monitoring a honeynet, organizations can gain insights into advanced threats, identify attack trends, and improve overall cybersecurity defenses.

Learn more about honeynet  here:

https://brainly.com/question/24182844

#SPJ11

What is the name of the table tools contextual tab that appears once you insert a table? Transform Design Outline Charts.

Answers

Answer: B.) Design

Explanation: just took it

Answer:

b

Explanation:

Which of the following skills do employers in any field expect their employees
to have?

Answers

Any employer is looking for someone who has good common sense skills and is willing to learn
- some examples: Respectful, accountable/consistent, dependable/reliable, good manners/communication, having good body language is very important too
Willing to learn great work ethic flexibility on hours

I need to learn c++ program . can someone please help me With this​

Answers

Answer:

sure i can help

Explanation:

What’s the work???? Or problem ?

Choose the wrong statement. Proper pagination is required for the overall good performance of a domain in search results Pagination is extremely important in e-commerce and editorial websites It is important to have all sub-pages of a category being indexed rel=next and rel=prev attributes explain to Google which page in the chain comes next or appeared before it

Answers

Answer:

The wrong statement in this question is "It's important to have all sub-pages of a category being indexed".

Explanation:

In the given-question, the above choice is incorrect because  all subpages in such a segment are not important to also be indexed, and the other correct choice can be defined as follows:

For both the total good performance of even an area in search engine results, acceptable pagination is required.  rel = next and prev, values are an attribute, that describes its page throughout the chain next to it and originally shown by Google.  Throughout e-commerce as well as publishing internet sites, scrollbars are extremely important.  

Write the steps to open file and folder​

Answers

Answer:

   1. Launch the File Open dialog. In the File menu, select the Open menu item.

   2. Open the folder containing the desired file.

   Select the desired file within the folder.

   3. (Optional) Specify a file format type.

   4. (Optional) Specify the character encoding.

   5. Click on the Open button.

Create a flowchart to find the total of 10 negative numbers start from -1.

Answers

Here is a simple flowchart to find the total of 10 negative numbers starting from -1:

```

Start

Set total = 0

Set counter = 1

While counter <= 10

|

├─ Yes ─┬─→ Add counter to total

│ ↓

│ Increment counter by 1

├─ No ──┬─→ Display total

End

```

In this flowchart, we start by initializing the total to 0 and the counter to 1. Then, we enter a loop that continues as long as the counter is less than or equal to 10. Inside the loop, we add the current value of the counter to the total, and then we increment the counter by 1. Once the loop finishes, we display the total.

\(\huge{\mathfrak{\colorbox{black}{\textcolor{lime}{I\:hope\:this\:helps\:!\:\:}}}}\)

♥️ \(\large{\textcolor{red}{\underline{\mathcal{SUMIT\:\:ROY\:\:(:\:\:}}}}\)

9. (10pt) give a brief description of return-oriented programming? why is it referred to as programming? how are programs written?

Answers

Return-oriented programming is a security exploit that manipulates existing code in a program's memory, constructing a sequence of instructions using existing code, called "gadgets," to execute the attacker's desired behavior.

What is return-oriented programming and why is it referred to as programming?

Return-oriented programming (ROP) is a type of computer security exploit that involves manipulating existing code in a program's memory to execute malicious code.

ROP leverages the concept of "gadgets," small sections of code that can be found within a program's memory and can be combined to create new instructions that the attacker desires.

These gadgets are strung together in a way that bypasses existing security measures and ultimately executes the attacker's code.

ROP is referred to as programming because it involves constructing a series of instructions that are executed by the computer.

However, rather than writing code from scratch, the attacker uses existing code and constructs a sequence of gadgets that execute their desired behavior.

Programs are written in a specific language, such as C or Python, and can be compiled into machine code that can be executed by a computer.

However, in ROP attacks, the attacker does not need to write new code but rather uses existing code to create a malicious sequence of instructions.

Learn more about oriented programming

brainly.com/question/31870386

#SPJ11

Which is self incrementing looping statement​

Answers

The self-incrementing looping statement in programming is usually called a for loop. A for loop allows you to execute a block of code repeatedly for a fixed number of times or until a certain condition is met.

What is the looping statement​?

In most programming languages, the for loop includes an index variable that is incremented or decremented automatically as the loop iterates. This is what makes it a self-incrementing looping statement.

For example, in Python, the following for loop counts from 0 to 4 and prints the value of the index variable at each iteration:

scss

for i in range(5):

   print(i)

Therefore, In this example, i is the index variable, and range(5) specifies the range of values for i to take on. As the loop iterates, i will be automatically incremented by 1 at each iteration until it reaches the maximum value of 4.

Read more about looping statement​ here:

https://brainly.com/question/23419814

#SPJ1

URGENT!!!! What is the concept of using the internet to trade goods and services called?​

Answers

Answer:

barter

Explanation:

is the direct trade of goods, services and resources without the use of money

Answer:

e-commerce

Explanation:

just took the test, see pic below

URGENT!!!! What is the concept of using the internet to trade goods and services called?

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

the ability to remote erase sensitive data stored on a mobile device

Answers

The ability to remote erase sensitive data stored on a mobile device is an important security feature that helps protect sensitive information in the event of loss, theft, or unauthorized access to the device.

Remote erase functionality allows users to remotely wipe or delete all data on their mobile device, ensuring that confidential information does not fall into the wrong hands.Here's how remote erase typically works: Remote Management: The mobile device must be enrolled in a remote management system or mobile device management (MDM) solution that provides the capability to remotely manage and control devices.

Authorization and Authentication: Proper authorization and authentication mechanisms, such as secure login credentials or multi-factor authentication, are required to perform remote erase actions. This ensures that only authorized individuals can trigger the remote erase process.

Data Erasure: Once authorized, a remote command is sent to the device, triggering the data erasure process. The device wipes all data stored on its internal memory, including contacts, messages, photos, apps, and other personal information. Some devices also offer the option to selectively erase specific data or perform a factory reset.

Confirmation and Reporting: After the remote erase is complete, the user or administrator typically receives a confirmation message or report indicating that the data has been successfully erased.

Remote erase provides an additional layer of security by allowing users to protect sensitive data and maintain control over their information, even if the mobile device is lost or stolen. It helps prevent unauthorized access and helps organizations comply with data protection regulations by ensuring that sensitive data is properly managed and disposed of when necessary.

Learn more about remote here

https://brainly.com/question/29831951

#SPJ11

Does somebody know how to this. This is what I got so far
import java.io.*;
import java.util.Scanner;


public class Lab33bst
{

public static void main (String args[]) throws IOException
{



Scanner input = new Scanner(System.in);

System.out.print("Enter the degree of the polynomial --> ");
int degree = input.nextInt();
System.out.println();

PolyNode p = null;
PolyNode temp = null;
PolyNode front = null;

System.out.print("Enter the coefficent x^" + degree + " if no term exist, enter 0 --> ");
int coefficent = input.nextInt();
front = new PolyNode(coefficent,degree,null);
temp = front;
int tempDegree = degree;
//System.out.println(front.getCoeff() + " " + front.getDegree());
for (int k = 1; k <= degree; k++)
{
tempDegree--;
System.out.print("Enter the coefficent x^" + tempDegree + " if no term exist, enter 0 --> ");
coefficent = input.nextInt();
p = new PolyNode(coefficent,tempDegree,null);
temp.setNext(p);
temp = p;
}
System.out.println();

p = front;
while (p != null)
{

System.out.println(p.getCoeff() + "^" + p.getDegree() + "+" );
p = p.getNext();


}
System.out.println();
}


}

class PolyNode
{

private int coeff; // coefficient of each term
private int degree; // degree of each term
private PolyNode next; // link to the next term node

public PolyNode (int c, int d, PolyNode initNext)
{
coeff = c;
degree = d;
next = initNext;
}

public int getCoeff()
{
return coeff;
}

public int getDegree()
{
return degree;
}

public PolyNode getNext()
{
return next;
}

public void setCoeff (int newCoeff)
{
coeff = newCoeff;
}

public void setDegree (int newDegree)
{
degree = newDegree;
}

public void setNext (PolyNode newNext)
{
next = newNext;
}

}



This is the instructions for the lab. Somebody please help. I need to complete this or I'm going fail the class please help me.
Write a program that will evaluate polynomial functions of the following type:

Y = a1Xn + a2Xn-1 + a3Xn-2 + . . . an-1X2 + anX1 + a0X0 where X, the coefficients ai, and n are to be given.

This program has to be written, such that each term of the polynomial is stored in a linked list node.
You are expected to create nodes for each polynomial term and store the term information. These nodes need to be linked to each previously created node. The result is that the linked list will access in a LIFO sequence. When you display the polynomial, it will be displayed in reverse order from the keyboard entry sequence.

Make the display follow mathematical conventions and do not display terms with zero coefficients, nor powers of 1 or 0. For example the polynomial Y = 1X^0 + 0X^1 + 0X^2 + 1X^3 is not concerned with normal mathematical appearance, don’t display it like that. It is shown again as it should appear. Y = 1 + X^3

Normal polynomials should work with real number coefficients. For the sake of this program, assume that you are strictly dealing with integers and that the result of the polynomial is an integer as well. You will be provided with a special PolyNode class. The PolyNode class is very similar to the ListNode class that you learned about in chapter 33 and in class. The ListNode class is more general and works with object data members. Such a class is very practical for many different situations. For this assignment, early in your linked list learning, a class has been created strictly for working with a linked list that will store the coefficient and the degree of each term in the polynomial.

class PolyNode
{
private int coeff; // coefficient of each term
private int degree; // degree of each term
private PolyNode next; // link to the next term node

public PolyNode (int c, int d, PolyNode initNext)
{
coeff = c;
degree = d;
next = initNext;
}

public int getCoeff()
{
return coeff;
}

public int getDegree()
{
return degree;
}

public PolyNode getNext()
{
return next;
}

public void setCoeff (int newCoeff)
{
coeff = newCoeff;
}

public void setDegree (int newDegree)
{
degree = newDegree;
}

public void setNext (PolyNode newNext)
{
next = newNext;
}
}

You are expected to add various methods that are not provided in the student version. The sample execution will indicate which methods you need to write. Everything could be finished in the main method of the program, but hopefully you realize by now that such an approach is rather poor program design.

Answers

I have a solution for you but Brainly doesn't let me paste code in here.

write a statement that reads a word from standard input into firstword. assume that firstword has already been declared as an char array

Answers

To read a word from standard input into the char array "firstword", you can use the scanf function with the "%s" format specifier. The statement would look like this:

scanf("%s", firstword);

This will prompt the user to input a string (ending with a whitespace character) and store it in the "firstword" array. The size of the array should be large enough to accommodate the maximum length of the input word, plus one additional character for the null terminator.

Alternatively, you can use the fgets function to read a line of text from standard input, and then extract the first word using string manipulation functions such as strtok or sscanf. However, the scanf function is more straightforward and efficient for this particular task.

To know more about char array visit:

https://brainly.com/question/31488409

#SPJ11

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

What is a personal data?

Answers

Answer:

What is personal data

Explanation:

Personal data, also known as personal information or personally identifiable information, is any information related to an identifiable person.

Match term to description.


Primary storage for most computers, it often goes by the drive letter C. Today, the typical capacity for this type of storage is 500 gigabytes to 2 terabytes or more.


1 Choose. A type of optical storage generally used for music or data. The capacity for this type of storage is approximately 700 megabytes.


2 Choose. A type of optical storage generally used for movies or data. The capacity for this type of storage is in the range of 4. 7 to 8. 5 gigabytes


3 Choose. A type of solid-state storage, this device connects to the computer through a USB port. Common capacities are 8 GB to 256 GB though two terabyte drives are now available.


4 Choose. A place to plug in a secondary circuit board such as a modem or sound card.


5 Choose. The primary circuit board; everything must eventually connect to this component.


6 Choose. An external connection point where devices may be plugged into the computer.


7 Choose. Pathways on the motherboard over which data can travel from place to place


8 Choose. Contains instructions to get the computer started and the operating system loaded into RAM (non-volatile; read-only)


9 Choose. The primary microchip inside the computer, it oversees the operations of the computer and executes instructions

Answers

Primary storage for most computers, typically referred to as the C drive, has a capacity ranging from 500 gigabytes to 2 terabytes or more.

Optical storage used for music or data has a capacity of approximately 700 megabytes.

Optical storage used for movies or data has a capacity in the range of 4.7 to 8.5 gigabytes.

Solid-state storage that connects to the computer via a USB port has common capacities of 8 GB to 256 GB, with two terabyte drives now available.

A slot or connector on the motherboard where secondary circuit boards, such as modems or sound cards, can be plugged in.

The motherboard is the primary circuit board where all components of the computer connect.

An external connection point on the computer where devices can be plugged in, such as USB ports.

Pathways on the motherboard that allow data to travel between different components of the computer.

Read-only memory (ROM) contains the instructions to start the computer and load the operating system into RAM.

The central processing unit (CPU) is the primary microchip inside the computer that oversees operations and executes instructions.

In summary, the matching terms are as follows:

Primary Storage

Optical Storage for music or data

Optical Storage for movies or data

Solid-State Storage (USB-connected)

Slot for secondary circuit board

Motherboard

External connection point

Pathways on the motherboard

Read-only memory (ROM)

Central Processing Unit (CPU)

learn more about Primary storage here:
https://brainly.com/question/520781

#SPJ11


Write the role of UPS and spike guard in terms of power protection.​

Answers

Answer:

It allows for safe and orderly shutdown of the Computer and Other Connected devices or equipments attached to It.  It can be used as an immediate backup during power cut or failure.

Explanation:

The role of the UPS and spike guard in power protection is absorption of power surges and fluctuations.

The spike guard is a device used to protect electrical equipments from fluctuations and surges.

The UPS is a device used to provide power backup been electrical power drops or fails to a certain unacceptable voltage level.

Role of UPSIt provides steady power to equipment during power failureIt absorbs power surges.

Role of spike guardIt protects electrical equipments from power fluctuationsIt also protects from power surges.

Therefore, the role of the UPS and spike guard in power protection is absorption of power surges and fluctuations.

Learn more about Uninterrupted power supply here:

https://brainly.com/question/7850680

#SPJ2

give some examples where military needs have influenced technological development

Answers

Answer:

Satellite Systems,

Autonomous Vehicles

what is a characteristic of port-based memory buffering

Answers

A characteristic of port-based memory buffering is that it allows for the temporary storage of data packets at the input or output ports of a network device, such as a switch or router. Here are some key features of port-based memory buffering:

The  characteristic of port-based memory buffering

Temporary Storage: Port-based memory buffering provides a storage mechanism at the input or output ports to hold data packets temporarily. This buffering helps manage the flow of data within the network device.

Queuing: Data packets are typically placed in a queue in the buffer according to their arrival time. This allows for the orderly processing and forwarding of packets.

Buffer Sizes: The size of the buffer determines the number of packets that can be stored at a particular port. Larger buffers can accommodate more packets, reducing the likelihood of packet loss or congestion.

Read more on Buffering here https://brainly.com/question/8676275

#SPJ4

A vending machine that serves coffee pours a varying

Answers

is that the whole question? or

What is "fake news"? Why do officials want students to learn to recognize it? How do officials plan to help students do this?

Answers

Fakes news is any type of news that is false or incorrect. Officials are trying to teach students about fake news because fake news is everywhere. It is influencing what students do. When they see something on social media they might share it, and it will spread. It even may show them something violent or inappropriate. Officials are doing multiple things to help students, such as seminars in school, assemblies in school, etc.

A company hires Brandon, a software engineer. Brandon is asked to work on a project with others in order to meet a tight deadline. He finds himself in weekly meetings to discuss the direction and status of the project, but most of his time is spent creating code. What is Brandon's specialization?

system management
system support
system collaboration
system development

Answers

Answer:

System developement

Explanation:

he is creating code, which is devloping the system.

what effect does the standby 2 track serial 0/0 25 interface configuration command have? (select two.)

Answers

The standby 2 track serial 0/0 25 interface configuration command has the effect of making Router A the backup router if the Serial 0/0 interface fails. You have two routers, A and B, and they should be setup for gateway redundancy.

What is an interface configuration command?

Interface configuration instructions change how the interface works. A global configuration command that defines the interface type is always followed by an interface configuration command.

To reach interface configuration mode, use the interface interface-id command. The new popup indicates that you are in interface setup mode.

The show interface command displays the interface state of the router. This output includes, among other things, the following: Status of the interface (up/down) The interface's protocol state.

The interfaces configuration file at /etc/network/interfaces may be used to configure the bulk of the network. Here, you may assign an IP address to your network card (or use DHCP), define routing information, create IP masquerading, establish default routes, and much more.

Learn more about Routers:
https://brainly.com/question/13600794
#SPJ1

Other Questions
puso ya Rona e re diretse Eng? Imagine you could dig a tunnel all the way to the center of the earth. what would happen to the gravitational potential energy of a system formed by the earth and some object, as the object approached the center of the earth? i need help solving this How would many Americans in today'ssociety view the Espionage Act andSedition Act, both of which passedduring World War I? University of Eastern Jamaica is in the process of planning an employee retention management programme. You are required to1. Implement at least FIVE (5) activities for the period July 1, 2022, through to December 31, 2022.2. Prepare and present a budget for this retention strategy. ________ Put address into MAR. ________ Read data from MDR. ________ Send "read" signal to memory. What is the first step to execute a memory STORE operation can be multiple answers)? a. Send "write" signal to Memory.b. Put address into MAR. c. Put data into MDR. A+certain+element+decays+at+a+constant+rate+of+6%+per+year.+if+you+start+with+20+grams+of+the+element,+how+long+will+it+take+before+there+are+only+four+grams+left? FILL IN THE BLANK. As gas reactants are compressed into a smaller volume, increasing the reactants partial pressures, the number of collisions _______ and the rate of reaction ___________. Tell whether the equation 5x + y = 0represents a direct variation. If so, identify theconstant of variation. Which term describes the amount of order in a system Emma is a farmer. She has designed and built four different types of levers. She wants to choose the most efficient lever to use for lifting bales of hay on her farm.She measures the amount of work she needs to perform on her end of each lever to lift the hay. She records this as is her "input work."She also tests each lever to measure the amount of work it does on the bale of hay by lifting it. She records this as is her "output work."The table below shows her findings.Lever Design Input Work (Nm) Output Work (Nm)#1 3,750 3,350#2 3,850 3,350#3 3,900 3,350#4 3,500 3,350Which lever should Emma choose?A. Lever Design #1B. Lever Design #3C. Lever Design #4D. Lever Design #2 The fluid mosaic model of membrane structure was first proposed in 1972 by Singer and Nicolson. The model describes in detail how the components of a membrane are organised.(a) Some of the components of the cell surface membrane are: phospholipid molecules protein molecules cholesterol molecules.(1) In the box below, draw a labelled diagram of a section through a cell surface membrane to show how the above components are organised within the membrane.The diagram should include other named components of the membrane.Label the inner and outer surfaces of the membrane.PLEASE CREATE A DIAGRAM Celery Company has assets of $150,000, liabilities of $90,000, and equity of $60,000. It buys supplies for cash $5,000. What effect would this transaction have on the accounting equation? A sphere has a radius of five units, and intersects the zy plane along the circle whose equation is (x-1) + (y+4)2-9 If the coordinate of the center of the sphere is a positive number, determine the equation of the sphere. (2.) (10 pts) Determine a vector of length four that points in the same direction as u = (1,2,2) You are buying a new computer-aided drafting and design system for your business that costs $100,000 today. To use this system fully, you must invest an additional $25,000 in training costs. You finance $80,000 of the total investment cost at an effective annual interest rate of 8%, payable in five annual payments. The manufacturer has guaranteed you a salvage value of $20,000 for the system at the end of 5 years. The incremental cash flows generated with this system include $800,000 in annual revenues and $200,000 in annual noncapital expenses. Your MARR is 12%. Use the MACRS tax depreciation schedule in Example 3.1 and a marginal tax rate of 34%. The estimated general inflation rate is 4.5%. Develop the income and cash flow statement and the resulting NPV of this investment. Note that MARR is often adjusted for inflation. Typically, i= MARR with inflation i = MARR without inflation, i = inflation rate Thus, MARR considering inflation: i=i +f +i f Given the quadratic function y=(3x2)(x+4), what are the x-intercepts? a) What is the size of Matrix D?2 10 61 3 8 Research short-and long-term risks in the global diamond supply chains and write a summary defining these risks and describing how they can mitigated by major diamond-producing corporations. help whats the answer to this?? Consider the following diagram on the right. WILL GIVE BRAINLEST 658 minus what equals 98?