a. host a is sending host b a large file over a tcp connection. assume host b has no data to send host a. host b will not send acknowledgments to host a because host b cannot piggyback the acknowledgments on data. b. the size of the tcp rwnd never changes throughout the duration of the connection. networks, homework 3. instructor: rajendra v. boppana 220918 2 c. suppose host a sends host b a large file over a tcp connection. the number of unacknowledged bytes that a sends cannot exceed the receive buffer size. d. suppose host a sends a large file to host b over a tcp connection. if the sequence number for a segment of this connection is m, then the sequence number for the subsequent segment will necessarily be mm 1. e. the tcp segment has a field in its header for rwnd. f. suppose that the last samplertt in a tcp connection is 1 sec. the current value of timeoutinterval for the connection will be ≥ 1 sec. g. suppose host a sends one segment with sequence number 38 and 4 bytes of payload over a tcp connection to host b. in this same segment, the acknowledgment number is necessarily 42.

Answers

Answer 1

A)False Host b can send acknowledgment.

B)False rwnd can change during TCP connection.

C)True rwnd is less than rcvr buffer.

D)False It is not required.

E) True size of file is 16 bite.

G)False acknowledgment number will not be 42.

The Transmission Control Protocol (TCP), a communications standard that enables computer hardware and software to exchange messages over a network, is referred to by the abbreviation "TCP." It is made to transmit packets across the internet and guarantee the successful transmission of data and messages through networks. Numerous internet applications, including as the World Wide Web (WWW), email, File Transfer Protocol, Secure Shell, peer-to-peer file sharing, and streaming video, heavily rely on TCP. To provide dependable packet transfer over IP, a transport protocol called TCP is used. Many of the issues associated with packet-based messaging, including lost, out-of-order, duplicate, and corrupted packets, are addressed by the mechanisms built into TCP.

Learn more about TCP here:

https://brainly.com/question/23854731

#SPJ4


Related Questions

Sharon works in the entertainment industry and is a game creator. Which of the following types of specialized software would she MOST LIKELY use?

A.
computer-aided manufacturing

B.
3D printing

C.
computer-aided design

D.
3D animation

Answers

The type of specialized software that she would probably use is 3D animation. The correct option is D.

What is 3D animation?

Computer animation is the process of creating animations digitally. Computer-generated imagery is a broader term that includes both static and dynamic images, whereas computer animation only refers to moving images.

As previously stated, animation is not something that can be learned overnight. It's one of the most difficult aspects of a 3D pipeline. It will take a lot of trial and error, as well as some frustration.

Though 3D animation has primarily been used in the production of video games, films, and television shows, its applications have expanded in tandem with its popularity.

Thus, the correct option is D.

For more details regarding 3D animation, visit:

https://brainly.com/question/12037761

#SPJ1

What is the electronic defacing of an existing website? multiple choice byod cybervandalism cyberbulling cookie

Answers

The electronic defacing of an existing website page is referred to as cyber vandalism. Cyber Vandalism is the act of stealing data from another person's computer or corrupting all previously saved data on that person's machines via delivering viruses.

On your computer or mobile device, adware is software that shows unsolicited (and occasionally obtrusive) pop-up advertisements. A pharming attack seeks to divert traffic from a legitimate website to a false website that is controlled by the attacker, usually with the intention of gathering sensitive data from victims or placing malware on their computers. People can simply employ cyber vandalism tactics to damage your computer from afar and change or utilize a crucial database for their own purposes. This is an unethical tactic that mostly targets businesses and government institutions.

Learn more about Cyber vandalism here-

https://brainly.com/question/8969166

#SPJ4

you work as the it administrator for a small startup company. lily's computer has two internal hard drives and runs windows 11. she is concerned that she may accidently delete a personal file or that her primary hard disk may fail at some future time, causing her to lose her personal files.

Answers

Answer: People makes mistakes, but there is a chance if she is deleting something she might delete a personal file on accident

Internet banking allows you to still go to a physical bank location to do transactions. true or false

Answers

Internet banking allows you to still go to a physical bank location to do transactions: False.

What is Internet banking?

Internet banking is also referred to as online banking and it can be defined as a type of technology that is used by financial institutions (banks) to offer their customers an opportunity to receive and send money through the Internet.

This ultimately implies that, Internet banking helps to prevent the need of a customer to physically go to bank location in order to perform various financial transactions.

Additionally, some examples of Internet banking (online banking) institutions include the following:

Western UnionPay-PalMoneygramPayment processor

Read more on online banking here: https://brainly.com/question/2772610

#SPJ1

The CPU executes instructions in response to commands. true or false

Answers

Answer:

true

Explanation:

Answer:   True

Explanation:   I took the test and passed :)

A​ ________ is software that enables an organization to centralize​ data, manage them​ efficiently, and provide access to the stored data by application programs.

Answers

Answer:

Database

Explanation:

-

Hope that helps

arry wants to upgrade to windows 10. he will use his computer both at home and at work and will need to connect to his company's wi-fi peer-to-peer network to share files over the network. which version of windows 10 would you recommend to larry? a. windows 10 home b. windows 10 pro c. windows 10 education d. windows 10 enterprise

Answers

Since Larry wants to upgrade to windows 10. the version of windows 10 would you recommend to Larry is option  a. windows 10 home

Is Windows 10 Home good software?

The Home edition of Windows 10 will be adequate for the vast majority of consumers. There is no advantage to upgrading to Pro if you only use your PC for gaming. Even for power users, the Pro version's added features mainly emphasize business and security.

Note that Windows 10's Home edition is $120, while the Pro edition is $200. It will immediately activate your current Windows installation because this is a digital purchase. There is no requirement that you buy a physical license.

Therefore, the security of Windows 10 is the primary distinction between Windows 10 Home and Windows 10 Pro. When it comes to wi-fi peer-to-peer network and securing your information, Windows 10 home is a safer option.

Learn more about windows 10 from

https://brainly.com/question/27960518
#SPJ1

write a driver program (lists.cpp) that defines an integer list and a string list. after creating the two lists, use the input from intdata.dat and strdata.dat files to insert data into the linked lists. these files have one data item per line. insert the data items to their respective list objects. display the lists.

Answers

linked_list.h

#include<stdlib.h>

using namespace std;

class IntNode

{

  public:

      int data;

      IntNode *next;

  public:

      IntNode(int d)

      {

          data=d;

          next=NULL;

      }

}

class StrNode

{

  public:

      string data;

      StrNode *next;

  public:

      StrNode(string str)

      {

          data=str;

          next=NULL;

      }

};

class IntLL

{

  public:

      IntNode *head;

  public:

      IntLL()

      {

          head=NULL;

      }

      void insert(int data)

      {

          IntNode *node=new IntNode(data);

          node->next=head;

          head=node;

      }

      int getTotal()

      {

          int count=0;

          for(IntNode *node=head;node;node=node->next)

          {

              count++;

          }

          return count;

      }

      void search(int data)

      {

          for(IntNode *node=head;node;node=node->next)

          {

              if(node->data==data)

              {

                  cout << data << " was found in the list" << endl;

                  return;

              }

          }

          cout << data << " was NOT found in the list" << endl;

      }

};

class StrLL

{

  public:

      StrNode *head;

  public:

      StrLL()

      {

          head=NULL;

      }

      void insert(string data)

      {

          StrNode *node=new StrNode(data);

          node->next=head;

          head=node;

      }

      int getTotal()

      {

          int count=0;

          for(StrNode *node=head;node;node=node->next)

          {

              count++;

          }

          return count;

      }

      void search(string data)

      {

          for(StrNode *node=head;node;node=node->next)

          {

              if(node->data==data)

              {

                  cout << data << " was found in the list" << endl;

                  return;

              }

          }

          cout << data << " was NOT found in the list" << endl;

      }

};

mainList.cpp

#include<iostream>

#include<fstream>

#include"linked_list.h"

using namespace std;

void add_int_items(IntLL &intLL)

{

   ifstream myfile("intData.dat");

   if(myfile.is_open())

   {

      string line;

      while(getline(myfile,line))

      {

          intLL.insert(stoi(line));

      }

   }

   else

   {

      cout << "Something went wrong" << endl;

   }

}

void add_str_items(StrLL &strLL)

{

   ifstream myfile("strData.dat");

   if(myfile.is_open())

   {

      string line;

      while(getline(myfile,line))

      {

          strLL.insert(line);

      }

   }

   else

   {

      cout << "Something went wrong" << endl;

   }

}

void intSearch(IntLL &intLL)

{

  ifstream myfile("intSearch.dat");

   if(myfile.is_open())

   {

      string line;

      while(getline(myfile,line))

      {

          intLL.search(stoi(line));

      }

   }

   else

   {

      cout << "Something went wrong" << endl;

   }

}

void strSearch(StrLL &strLL)

{

  ifstream myfile("strSearch.dat");

   if(myfile.is_open())

   {

      string line;

      while(getline(myfile,line))

      {

          strLL.search(line);

      }

   }

   else

   {

      cout << "Something went wrong" << endl;

   }

}

int main()

{

  IntLL intLL;

  add_int_items(intLL);

  cout << "Total integer items in list: " << intLL.getTotal() << endl;

  intSearch(intLL);

  cout << endl;

  StrLL strLL;

  add_str_items(strLL);

  cout << "Total string items in list: " << strLL.getTotal() << endl;

  strSearch(strLL);  

  return 0;

}

I written in c language

C is a procedural programming language with a static framework that supports lexical variable scoping, recursion, and structured programming. Constructs in the C programming language translate nicely to common hardware instructions. Programs that were formerly written in assembly language have long used it. C is a machine-independent programming language that is primarily used to build various applications and operating systems like Windows, as well as more complex programs like the Oracle database, Git, Python interpreter, and games. It is regarded as a programming foundation when learning any other programming language. Examples of such applications include operating systems and other application software for computer architectures, including supercomputers, PLCs, and embedded systems.

Learn more about c language here:

https://brainly.com/question/7344518

#SPJ4

What is the favorite Food?
(15 points)

Answers

my favorite food is soup because i like the flavors and its very soothing

Answer:French fries

Explanation:bc they are awesome

you are running macos mojave and you want to begin working with various other oss such as windows server and linux. you only have one computer and you need to keep using macos while working with the other oss. what can you install on macos that will help achieve this goal? a. esxi server b. vmware fusion c. vmware workstation d. hyper-v for macos

Answers

You wish to start collaborating with various other operating systems, such as linux and windows server, while using macOS Mojave. You only have one computer, thus you have to continue using Mac OS X while utilizing the other OS. VMware Fusion must be set up.

A macOS update installation issue could happen for a variety of different causes. Ideally, the error message was clear in describing the issue. You'll be able to focus your troubleshooting efforts accordingly.

You can get caught in a loop where the installer keeps opening every time you restart your computer if your macOS installation couldn't be finished. Before attempting to fix the issue, use these fast steps to get out of the loop and safeguard your data.

learn more about VMware Fusion

https://brainly.com/question/4682288

#SPJ4

uppose you are writing an anonymous javascript function that will run when your web page loads, and you want to include a statement that will cause a selection list in a web form to become active and ready for data entry. which method should you apply in this statement?

Answers

If you wish to include a statement that makes a selection list in a web form active and ready for data entry, you should use the element.select() method when developing an anonymous javascript function that runs when your web page starts.

A section of code called a JavaScript function is created to carry out a certain task.

When "something" invokes a JavaScript function, it begins to run (calls it).

A JavaScript function is created by using the function keyword, a name, and then parenthesis ().

Letters, numbers, underscores, and dollar signs can all be used in function names (same rules as variables).

Comma-separated parameter names may be included in parentheses: (parameter1, parameter2, ...)

Curly brackets are used to surround the code that the function will run: {}

In the function definition, the parameters are specified between parentheses ().

The values passed to the function as arguments are known as function arguments.

The parameters (the arguments) behave like local variables inside the function.

Learn more about javascript here

https://brainly.com/question/28448181

#SPJ4

the internet is a network of interconnected computers. each computer interface on the internet is identified by an internet address. in ipv4 (internet protocol, version 4), the addresses are divided into five classes -- classes a through classes e. only classes a, b, and c are used to identify computers on the internet. a class a address is a bit string of length 32. a bit string consists of $0$'s and $1$'s. the first bit is 0 (to identify it as a class a address). the next 7 bits, called the \textit{netid}, identify the network. the remaining 24 bits, called the \textit{hostid}, identify the computer interface. the netid must not consist of all 1's. the hostid must not consist of all 0's or all 1's. how many class a internet addresses are there?

Answers

An IP address (internet protocol address) is a numerical identifier used to specifically identify a particular network interface.

In IPv4, addresses are 32 bits long. This permits up to 4,294,967,296 (232) different addresses. Since IPv6 addresses are 128 bits long, there can be 3.4 x 1038 (2128) different addresses. Both versions' entire pool of available addresses is decreased due to a number of reserved addresses as well as other factors. Although IP addresses are binary numbers, they are frequently written in decimal (IPv4) or hexadecimal (IPv6) form to make them easier for humans to understand and use. At the internet layer of the Internet Protocol Suite, the Internet Protocol is the protocol that specifies and permits internetworking. It essentially creates the Internet.

Learn more about Address here-

https://brainly.com/question/20012945

#SPJ4

3. in a class, a. in a class, why do you include the function that overloads the stream insertion operator, <<, as a friend function? b. in a class, why do you include the function that overloads the stream extraction operator, >>, as a friend function?

Answers

I neeed point 10 thanks

what security does a user id provide? a. none b. it determines the privileges accorded to the user. c. it authenticates the user in case the user forgets her password. d. it prevents an attacker from finding a user’s password entry by her name.

Answers

The security a user id provides is that it determine the privileges accorded to the user.

What are user privileges?

The set of actions a user can perform in a given system is known as user privileges. it determines the level of access they have to their own submission.

A user id which is a unique identity given to a user or a username by which a person can be identified on a system or network is used to assign privileges to a user. There are two common level of user namely:

AdminBasic user

Learn more on user privileges from:

https://brainly.com/question/7496800?referrer=searchResults

#SPJ4

Which of the following is an example of machine learning?

a
Encrypting

b
Block-based code

c
Autocorrect

d
Programming

Answers

The option that is an example of machine learning is option A: Encrypting.

What is encryption in machine learning?

This is seen as a class of techniques known as privacy-preserving machine learning (PPML) enables machine learning models to compute directly on encrypted input and as well as provide conclusions that are also known to be encrypted. The result is one that can only be decrypted by the person who encrypted the input data.

Note that in data encryption, Sensitive information should always be encrypted to prevent hackers from been able to access it.

Learn more about machine learning from

https://brainly.com/question/25523571
#SPJ1

Answer:  programming

Explanation:

changes in processing requirements for future is systems have led to new categories of dbms. all of the following are new dbms categories except . answer unselected nosql dbms unselected in-memory dbms unselected newsql dbms unselected output-memory dbms

Answers

Output-memory DBMS is the new categories of dbms that leads to changes in processing requirements for future is systems.

Software programs called database management systems (DBMS) are used to store, retrieve, and query data. Users can add, read, edit, and delete data from databases using a database management system (DBMS), which acts as an interface between an end-user and the database. DBMSs control the data, the database engine, and the database structure, enabling users and other applications to extract or modify the data. It also contributes to concurrency, uniform data management practices, and data security. The normalization technique, used in database schema design, allows DBMS to optimize the arrangement of data by dividing large tables into smaller ones when any of their properties have redundant values. In comparison to conventional file systems, DBMS are more flexible and have a more sophisticated backup system.

Learn more about DBMS here:

https://brainly.com/question/14004953

#SPJ4

According to the internet is watching you video case, what approach could be used with big data to give teachers an early warning that a student needs help with their studies?.

Answers

According to big data teachers should utilize Data to Identify Students at Risk, close the learning gap by using data, utilize data to forecast student performance on year-end objectives, utilize data to encourage success in later grade levels.

Data analytics is the process of gathering and analyzing data in order to discover insights that can be put to use to improve organizational effectiveness and business results. In the field of education, this might include everything from streamlining the enrollment procedure to enhancing academic results and the entire student experience. Effective educators who work with at-risk pupils use quiet, calm management techniques, quietly urge students to behave appropriately, and model self-control in front of the class.

Learn more about Analytics here-

https://brainly.com/question/28191959

#SPJ4

The it network that allows for the movement of organizational information within that company is known as the organizational structure. True or false?.

Answers

The IT network that allows for the movement of organizational information within that company is known as the organizational structure: False.

What is an organizational structure?

An organizational structure simply refers to a strategic process that is typically used for the division of a business organization (company or firm) into multiple functional units, in order to successfully achieve its short-term and long-term goals.

The dimensions of an organizational structure.

Generally speaking, an organizational structure comprises three (3) main dimensions and these include the following;

The vertical dimensionThe horizontal dimensionIntegrating mechanisms

In Computer technology, an intranet simply refers to an information technology (IT) network that enables the effective and efficient movement of organizational information within a business organization (company or firm).

Read more on organizational structure here: brainly.com/question/7437866

#SPJ1

All IT systems enable a network administrator to set access levels, or permissions, for
just one user. true or false? question

Answers

Answer:

Explanation:

Comment

That shouldn't be true at all.

Let us suppose that the network contains something like a Microsoft program and different people on the network are working on different things.

The administrator as in a school situation might not students to be looking at an answer that was derived a different way. The administrator would want to block that possibility.

. The lightness or brightness of a color is the _______.

Answers

Answer: Value

Explanation:

Value is your answer

What is a piracy????????????????????????????????

Answers

Answer:

down below

Explanation:

Piracy is when you use or reproduce someone's work without their consent. Ex: downloading a movie without paying for it.

It can also refer to attacking and robbing ships at sea.

Hope this helps! :)

a rule of thumb in printing says that the area of the typed page should be half the area of the paper page. if the paper page is in by ​in, what should the length of the typed page be if the width is ​in?

Answers

The typed page is 2.5 by 2.5 inches. For objects with two or more dimensions, area is calculated. The area of one-dimensional objects is not calculable.

Any non-negative real integer can represent an area. Integrals are frequently applied while assessing area. It is well known that the product of a rectangle's dimensions determines its area. Let the paper page's area and the typed page's area be AT and AP, respectively. If the typed page is x characters long, we get AT=x5 and AP=46.

The answer to the query is AT=1/2AP.

So, ascertain x's value.

AT=12AP\s

x⋅5=12⋅4⋅6 \s

x=12/5 \

s=2*2/5

The typed page is therefore 2*2/5 inches by 5 inches.

Learn more about Area here-

https://brainly.com/question/27683633

#SPJ4

What is the function of WebGL

Answers

Answer:

WebGL enables web content to use an API based on OpenGL ES 2.0 to perform 2D and 3D rendering in an HTML canvas in browsers that support it without the use of plug-ins. 

___________________________

WD9102 Apply a shape style.

Answers

If you want to apply a shape style, you must require to tap on the Format tab followed by clicking the More drop-down arrow in the Shape Styles group.

How to know the actual or real style of shape?

To know the actual or real style of shape, go to the Drawing Tools menu in the ribbon. Then, Click on the Format tab. Observe the Shape Styles grouping of commands. Here, you will see three icons on the right side, they are Shape Fill, Shape Outline, and Shape Effects.

After clicking the More drop-down arrow in the Shape Styles group, a complete menu of styles will appear in front of you on the screen. Choose the style you want to use. The shape will appear in the selected style.

Therefore, the process of applying shape style is well described above.

To learn more about Word Shape styles, refer to the link:

https://brainly.com/question/938171

#SPJ1

for this assignment, we'll be using this data to study bike usage in washington d.c. based on the granularity and the variables present in the data, what might some limitations of using this data be? what are two additional data categories/variables that you can collect to address some of these limitations?

Answers

For managing transportation infrastructure, particularly during disruptions or around new developments, short-term demand forecasting is crucial.

Due to "tidal flows" of travel and use, many bike-sharing programs struggle to manage service provision and bike fleet rebalancing. Although short-term traffic demand estimates and machine learning techniques like deep neural networks have recently advanced, relatively few studies have looked into this issue utilizing a feature engineering approach to guide model selection. From real-world bike usage records, this study extracts unique time-lagged variables, such as network node Out-strength, In-strength, Out-degree, In-degree, and PageRank, that describe graph topologies and flow interactions. According to the experiment's findings, graph-based features are more crucial for demand forecasting than more widely used meteorological data.

Learn more about demand here-

https://brainly.com/question/14456267

#SPJ4

calories burned running on a particular treadmill, you burn 4 calories per minute. write a program that uses a loop to display the number of calories burned after 5, 10, 15, 20, 25, and 30 minutes.

Answers

def calorie_burned(time):

   cal_burn=time*4

   return cal_burn

run_time=[10, 15, 20, 25, 30]

for rt in run_time:

   print(calorie_burned(rt))

One execution of the initialization statement.

Evaluation of the test expression follows. The for loop is stopped if the test expression returns false.

The update expression is updated, though, if the test expression is assessed as true. If so, the for loop's body statements are then carried out.

Iteratively evaluating the test statement

The test expression remains true throughout this process. The loop is broken when the test expression returns false.

Look up relational and logical operators to find out more about test expression (when the test expression is evaluated to true and false).

Learn more about  test expression here:

https://brainly.com/question/14390367

#SPJ4

part b: enhancing the chatbot in the part we want to make alterations to the getresponse method of the magpie class to be able to respond to some other words if they happen to appear in what the user inputs.

Answers

The Web Response instance is returned by the Get Response method, which sends a request to a web site.

Get Response completes the request and returns any responses if the request was already started by a call to Get Request Stream. The Web Response is accessible synchronously through the Get Response function.

import java.util.Random;

import java.util.Scanner;

public class ChatBot

{

private int responseCount = 0;

public String getResponse(String value)

{

   String X = longestWord(value);

   this.responseCount++;

   if (responseCount == 10)

   {

       return "Sorry, but our time is up. I can't talk with you any longer.";

   }

   if (value.contains("you"))

   {

       return "I'm not important. Let's talk about you instead.";

   }

else if (X.length() <= 3)

   {

       return "Maybe we should move on. Is there anything else you would like to talk about?";

   }

   else if (X.length() == 4)

   {

       return "Tell me more about " + X;

   }

else if (X.length() == 5)

   {

       return "Why do you think " + X + " is important?";

   }

   else if (X.length() <=9)

   {

   return "Now we are getting somewhere. How does " + X + " affect you the most?";

   }

   return getRandomResponse();

}

public String longestWord(String value){

   Scanner input = new Scanner (value);

   String longest = new String();

   longest = "";

   while (input.hasNext())

   {

       String temp = input.next();

       if(temp.length() > longest.length())

       {

           longest = temp;

       }

   }

   return longest;

}

private String get Random Response()

{

String [] responses = {"OMG", "LOL", "You don't say", "Really?", "I See"};

return responses [(int)(Math.random() * responses.length)];

}

Learn more about response here-

https://brainly.com/question/14967011

#SPJ4

given the schema item(itemid, name, category, price) itemsale(transid, itemid, qty) transaction(transid, custid, date) customer(custid, name, street-addr, city) where primary keys are underlined, write the following queries in sql: a. find the name and price of the most expensive item (if more than one item is the most expensive, print them all).

Answers

Given the schema item(itemid, name, category, price) itemsale(transid, itemid, qty) transaction(tran_sid, custid, date) customer(custid, name, street-addr, city), to find the name and price of the most expensive item (if more than one item is the most expensive, print them all) is given below:

The SQL Code

SET  p 1 : = ( SELECT MAX ( price ) FROM items);

SELECT * FROM items WHERE price =  p 1 ;

Using variables, p1 stores the maximum price from the table items and then uses the variable p1 in the following query to return all records which have that maximum price without limiting the number of records as you desired.

Other ways of getting the same result are given below:

2. SELECT * FROM items

WHERE itemID IN (

  SELECT itemID FROM items

  WHERE price IN (

     SELECT MAX(price) FROM  items

  )

);  

3. SELECT * FROM items

WHERE price IN (

  SELECT MAX ( price ) FROM items

) ;

Read more about SQL here:

https://brainly.com/question/27851066

#SPJ1

smart detection can detect the gradual degradation of a web app’s response time caused by a memory leak. select yes if the statement is true. otherwise, select no.

Answers

Yes, smart detection can detect the gradual degradation of a web app's response time caused by a memory leak.

The given statement is very true . Smart Detection can detect a performance issue that affects the time. One instant can be seen where pages are loading more slowly on one type of browser than others.

Learn more about smart detection here:

https://brainly.com/question/26199042

#SPJ4

a global communications system created by connecting many different computer networks
A. browser
B. packets
C. IP addresses
D. internet
E. World Wide Web

Answers

Answer:

internet

The Internet is a large IP network of networks.

Answer:

c

Explanation:

Other Questions
any number raised to the 2nd power is said to be 7Select ALL the correct answers.For what two reasons has Afghanistan earned the nickname "Graveyard of Empires"?mountainous terrainstrong distrust of outsidersstable established governmentalliances with neighborsadvanced weaponry A rocket travels 220 meters directly upward with an average acceleration of 14.7 meters per second squared.How has the velocity of the rocket changed after 220 meters? Assume that z-scores are normally distributed with a mean of 0 and a standard deviation of 1. If P(aza)0.4314, find a. Round to two decimal places. What is the radius of a planet that has the same mass as earth but on which the free-fall acceleration is 4.90 m/s2 ? Jamie Lee Jackson, age 26, is in her last semester of college and is waiting for graduation day, just around the corner! It is the time of year again when Jamie Lee must file her annual income taxes. Last year, she received an increase in salary from the bakery, which brought her gross monthly earnings to $2,550 and also opened up a TFSA, to which she contributed $300. Her savings accounts earn 2 percent interest per year, and she also had received an unexpected $1,500 gift from her great aunt. Jamie was also lucky enough last year to win a scholarship of $2,000, most of which was deposited into her regular savings account after paying off her credit card balance.Current Financial SituationAssets:Chequing account: $2,250Savings account: $6,900 (interest earned last year: $125)Emergency fund savings account: $3,900 (interest earned last year: $75)TFSA balance: $350 ($300 contribution made last year)Car: $3,000Liabilities:Student loan: $10,800Credit card balance: $0Income:Gross monthly salary: $2,550Monthly Expenses:Rent obligation: $275Utilities obligation: $135Food: $130Gas/maintenance: $110Credit card payment: $0Savings:Regular savings monthly deposit: $175Rainy-day savings monthly deposit: $25Entertainment:Cake decorating class: $40Movies with friends: $60QuestionsQuestion:In Jamie Lees situation, what is her marginal tax rate? How would a marginal tax rate compare to an average tax rate? innovative ways of sharing information that could be advantageous of no marks. to determine what portion of the question you have correct, check question score at the top of the assignment. indicate which molecule (a or b) in each pair has the higher boiling point. also indicate which force, hydrogen bonding (h), dipolar (p), or dispersion (d) is responsible for the difference. A polar organic solvent that is capable of forming intermolecular hydrogen bonds is called a polar _____ solvent. This type of solvent forms ion-dipole interactions with _____. Read the paragraph again.The schoolwide food drive is an important program that helps the community and instills a sense of responsibility in students. Last year, students collected over 600 canned goods and gave them to the Neighborhood House food pantry, which serves some of the neediest families in our community. Furthermore, many students said that helping with the drive was the first volunteer program they had ever participated in. Finally, without the student councils support, the food drive will not be officially promoted within school and will likely languish. Therefore, it is imperative that the student council continue to encourage students to volunteer for this important program.What part of a good written argument is missing from the paragraph?evidencereasoncounterclaimargument graph the linear equation 2x-4y=0 Why does the water move into the egg Use the Polygon tool to draw an image of the given polygon under a dilation with a scale factor of and center of dilation (0,0) a borrower defaulted on a mortgage loan, leaving an unpaid balance of $95,000. after receiving only $85,000 from the sale of the property, the lender filed for The First Continental Congress signified..O The colonies couldn't get along and were not interested in fighting for independence.Each colony could fight the British if they wanted to.The colonies were united.The representatives from each colony were more interested in remaining independent from one another What is the role of the Loyalist in the American Revolutionary War? I need help on all of these questions for Spanish The mass, m kilograms, of a horse is 429 kg, correct to the nearest kilogram.Complete this statement about the value of m. Need help with the bottom ones.. which is part b please. Find the perimeter of hexagon ABCDEF plotted below.