When you go to Starbucks, you note that your IP address is 192.168.104.2, and that your netmask is 255.255.240.0. . How many bits are in the host portion of this subnet

Answers

Answer 1

Answer:

The correct answer is 4 bits.

Explanation:

First we must identify what class it belongs to and we see the first octet on the left side of the IP address, which is 192 and we can determine that it is a Class C address, therefore its mask is:

Default mask 255.255.255.0 => 24 bits.

IP mask 255.255.255.240 => 28 bits.

We can conclude that I borrow 4 bits to calculate subnets.

We can conclude the following:

[tex]2^{n} --> 2^{4} -->[/tex]16 subnets maximum.


Related Questions

Computer science students typically get hands-on experience in all of the following EXCEPT:

writing code

testing programs

creating a blueprint for a house

fixing program errors

Answers

Answer:

C. Creating a blueprint for a house.

Creating a blueprint for a house is not a typical activity within the curriculum of computer science students.

Hence the correct answer is C.

Computer science students typically get hands-on experience in writing code, testing programs, and fixing program errors.

These activities are fundamental to learning programming and software development.

However, creating a blueprint for a house is not a typical activity within the curriculum of computer science students. This task is more closely related to fields such as architecture or civil engineering, where professionals design physical structures.

Creating a blueprint for a house involves architectural design and planning, which is not typically part of a computer science curriculum. While some computer science concepts can be applied to architectural design software, the two fields have distinct focuses and skill sets.

Hence the correct answer is C.

Learn more about computer science click;

https://brainly.com/question/35123324

#SPJ3

Question # 2
Multiple Select
Which statements are true? Select 4 options.

An instance of a class cannot be changed after it is created.

Variables defined in the constructor of a class can be accessed by the main program that uses instances of the class.

Functions defined in a class are called methods.

A class variable can be a different type of class.

A class variable can be a list of instances of a different class.

Answers

Answer:

An instance of a class cannot be changed after it is created. IS THE WRONG ONE. Everything else is right.

Explanation:

An instance of a class cannot be changed after it is created is false . Hence option 2, 3, 4 and 5 is correct.

What is statement?

Statement is defined as a sentence that expresses to the reader a concept, an assertion, or a fact. An concept, assertion, or fact is communicated to the reader through a statement sentence, sometimes referred to as a declarative phrase. They are one of the four categories of sentence construction and the one that people utilize the most.

Direct access to instance variables and methods is made possible through instance methods. Through instance methods, class variables and class methods are easily available. Class methods provide direct access to class variables and class methods. When an object is generated, instance variables are created that are available to all of the constructors, methods, and blocks in the class. The instance variable can be given access modifiers.

Thus, an instance of a class cannot be changed after it is created is false.  Hence option 2, 3, 4 and 5 is correct.

To learn more about statement, refer to the link below:

https://brainly.com/question/2285414

#SPJ3

Which common online presentation medium do people use to present their own articles?
A. news portal
B. company website
C. photo-sharing website
D. weblog

Answers

A: news portal hope this helps
A. news portal is the answer

What is the scope of each variable?

class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName

def __str__(self):
return self.species + " named " + self.petName

class petCarrier:
size = 'medium'
color = 'red'

The scope of petName is
.

The scope of color is
.

Answers

Answer:

The scope of petName is local to the class pet.

The scope of color is accessible by all parts of the program.

Explanation:

The variable petName is local to the class, because the variable was created in a function whose name begins with two underscores.

The variable color, while created in the petCarrier class, is accessible to the entire function. It was not created in a function whose name begins with an underscore.

Correct answer edge 2020

The scope of petName is local to the class pet. The scope of color is accessible by all parts of the program.

What are variables?

A variable in programming is a value that can change based on external factors or data that has been supplied to the program. A program typically consists of data that it uses while running and instructions that tell the machine what to execute.

Due to the fact that the variable was created in a function with a name that starts with two underscores, petName is local to the class.

Despite being generated in the petCarrier class, the function as a whole can access the variable color. It wasn't produced in a function with an underscore in the name.

Therefore, PetName only affects the class Pet locally. All components of the software have access to the full range of color.

To learn more about variables, refer to the link:

https://brainly.com/question/29988965

#SPJ2

_________________ component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Answers

Answer:

Authorization component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.

Explanation:

Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.

To solve the difficulty of scaling memory organization, memories are physically organized into a ____-dimensional organization.
A) one
B) two
C) three
D) multi

Answers

The answer is D) multi

A personality difference can be caused by a difference in
a. Appearance
b. Attitude
C. Power
d. Wealth
Please select the best answer from the choices provided
A
B
С
D

Answers

Answer:

B. Attitude

Explanation:

Attitude is the one that makes a difference in your personality

A personality difference can be caused by a difference in attitude. The correct option is b.

What are different personalities?

The term "personality" refers to the persistent traits, interests, motivations, values, self-concept, abilities, and emotional patterns that make up a person's particular way of adjusting to life.

Your essential values form the basis of your character, whereas how you behave in every scenario defines your personality. Your experiences in life, as well as your general health, depending on your character and personality.

In fact, according to Soto, genetics account for nearly half of the variances in personality in people. Your environment, including your experiences in life and your birth order, accounts for the remaining personality diversity.

Therefore, the correct option is b. Attitude.

To learn more about personalities, refer to the link:

https://brainly.com/question/14612108

#SPJ6

why is operating system important software for computer?give 3 reasons

Answers

Answer: See explanation

Explanation:

The operating system of a computer is required to manage both the hardware components and the computer's software.

Also, it helps in managing the processes and the memory or the computer.

Lastly, it helps in communication as well as the detection of errors. It should be noted that the operating system of a computer is a very important tool.

Write a grammar for the language consisting of strings that have n copies of the letter a followed by the same number of copies of the letter b and the the same number of copies of the letter c, where n >0. For example, the strings abc, aaaabbbbcccc, and aaaaaaaabbbbbbbbcccccccc are in the language but a, abbc, bac, and aaabbbcc are not

Answers

Answer:

def language(mystring, n):

   if n > 0:

       string_list = [x for x in mystring]

       string_cont = ""

       for character in string_list:

           string_cont += character * n

       print(string_cont)

Explanation:

When n is equal to 0, that is, n=0, The python program multiplies the characters of the string "mystring" by the integer variable "n" to output a string with all characters with the same count.

Discuss TWO changes in ICMP that took place with the development of IPV6 and indicate why those changes were made.

Answers

Answer:

Over and above basic medication signaling, but instead of signaling, ICMPv6 could be used for other objectives. It could be utilized for the below description.

Explanation:

That falls into the same category even though IPv4 does through ARP.  

Neighbor Discovery:

Used mostly for control of hosts but instead multichannel interface setup.  

Router Discovery:

Trying to manage Handheld IPv6 hand-offs.  

Throughout IPv6, within a week of negligible and sometimes more broadcast group, this same ICMPv6 response can begin. The whole last extension connector before another ICMPv6 connector contains a 58-value new Header field.

It is desirable to provide a degree of __________ __________ among classes so that one class is not adversely affected by another class of traffic that misbehaves.

Answers

Answer:

The right approach is "Traffic isolation ".

Explanation:

A significant amount of those same traffic insulation is necessary. Therefore one class isn't influenced by yet another traffic class which makes a mistake. Then maybe the packages throughout the traffic could collapse. This also eliminates uncertainty with people operating the infrastructure. If you don't need the VLANs to speak to one another because you could implement anything about this illustration as well as add it to certain VLANs.

Press the
What are the two main parts to any VR experience?
A prototypes
B
screens
C code
D
hardware
E software

Answers

The two main parts to any VR experience are:

SoftwareHardware

What hardware is used for virtual reality?

There are different kinds of hardware. A common method to make or create any form of a realistic 3D depiction of a virtual world is to use a small computer monitor in front of all of the human eye.

Note that all the monitor shows is the perspective that is said to be matching or corresponding  eye would be able to see in an actual environment.

Note that that kind of system is said to be called a binocular head-mounted display (HMD).

Therefore, based on the above, one can say that the two main parts to any VR experience are:

SoftwareHardware

Learn more about VR experience from

https://brainly.com/question/28224061
#SPJ1

Described how the HCS12 MCU uses a vector to find the correct interrupt service routine after an interrupt occurs.

Answers

Answer:

In the HC12 MCU, the starting address of interrupts is stored in the vector table as a vector. The ISR or interrupt service routine fetches the vector of the interrupt to be executed.

Explanation:

The HC12 or 68HC12 microcontroller was developed by Motorola, its controllers have a clock speed of between 8 to 33MHz.

The MCU stores interrupt events in a vector table where the interrupt service routine fetches enabled interrupt to execute.

When an interrupt is detected, the MCU stores all its registers in a stack to be able to return to the program it was previously running, then it disables the maskability flag register to prevent another maskable interrupt from occurring during the current interrupt execution.

The MCU interrupt service routine fetches the required interrupt from the vector table. After the interrupt is executed, the mask flag is enabled and the MCU retrieves or returns back to the previous program in the stack.

Write an assembly subroutine that check if a number is in the interval of [0, 10] and return 1 if the number is in this interval and 0 otherwise. Call this subroutine to check if each integer in an array in the memory is in this interval and write the results of all numbers into another array in the memory

Answers

Answer:

.data

array: .word 1,3,5,7,9,11,13,15,17,19

result: .word 0,0,0,0,0,0,0,0,0,0

.text

  la $s0, array

  la $s1, result

  addi $t0, $zero, 0

  INTERVAL:  bge $t0, 10, END

     sll $t1, $t0, 2

     add $t2, $s0, $t1

     lw $t2, 0($t2)

     jal LIMIT

     IF:    bne $a0, 1, ELSE

        add $t3, $s1, $t1

        sw $t2, 0($t3)

     ELSE:

     addi $t0, $t0, 1

     j INTERVAL

  END:    

  addi $v0, $zero, 10

  syscall

  LIMIT:  

     addi $a0, $zero, 0

     START: bge $t2, 0, NEXT

        b ENDLIMIT

     NEXT:  ble $t2, 10, SET

        b ENDLIMIT  

     SET:   addi $a0, $zero, 1

     ENDLIMIT:

     jr $ra

Explanation:

The assembly source code is used to create a subroutine called "INTERVAL" that checks if a number from an array is in a range of 1 to 10. The program returns 1 if the condition is met but 0 if otherwise.

.NET
It is considered the College database.
1. Create a console application to display the information
from the Teacher table.
2. Create a Windows Forms application for
entering the information in the Teacher table


3. For the Teacher table:
a) create its XML representation;
b) display the representation in a Windows application
Forms in alphabetical order by teacher name (
without idprof);
c) Display each name and surname of each teacher
together with the department to which he belongs.

Please help, need at least the first 2 exercises.

Answers

Answer:

This is called contradiction cloud responsibility (CCR)

Explanation:

Which of the following are most likely to be members of the technical crew for a production?
A)producers
B)bookkeepers
C)camera operators
D)actors

Answers

C) Camera operators

Answer:

C: camera operators

Explanation:

edg2021

Producers and actors are the only other two in the film industry, and they are separate from the technical crew

java Toll roads have different fees based on the time of day and on weekends. Write a method calcToll() that has three parameters: the current hour of time (int), whether the time is morning (boolean), and whether the day is a weekend (boolean). The method returns the correct toll fee (double), based on the chart below.

Answers

The program for the toll calculation is illustrated below.

How to illustrate the program?

TollCalculation.java :

//class

public class TollCalculation {

//method that calculate tolll

public double calcToll(int hour, boolean isMorning, boolean isWeekend) {

//this variable store toll amount

double tollAmount=0;

//checking isWeekend

if(isWeekend==false)

{

if(hour<7 && isMorning==true)

{

//when weekday in the morning before 7.00 am then

tollAmount=1.15;

}

else if(hour>=7 && hour<=9.59 && isMorning==true)

{

//when weekday in the morning in between 7.00 am and 9.59 am then

tollAmount= 2.95;

}

else if(hour>=10 || hour<=2.59 && (isMorning==true || isMorning==false))

{

//when weekday in between 10.00 am and 2.59 pm then

tollAmount= 1.90;

}

else if(hour>=3 && hour<=7.59 && isMorning==false)

{

//when weekday in evening between 3.00 am and 7.59 pm then

tollAmount= 3.95;

}

else if(hour>=8 && isMorning==false)

{

//when weekday in evening starting 8.00 pm then

tollAmount= 1.40;

}

}

else {

if(hour<7 && isMorning==true)

{

//when weekend in the morning before 7.00 am then

tollAmount=1.05;

}

else if(hour>=7 || hour<=7.59 && (isMorning==true || isMorning==false))

{

//when weekend in the morning in between 7.00 am and 7.59 pm then

tollAmount= 2.15;

}

else if(hour>=8 && isMorning==false)

{

//when weekend in evening starting 8.00 pm then

tollAmount= 1.10;

}

}

//return tollAmount

return tollAmount;

}

//main() method

public static void main(String[] args) {

//This is instance of TollCalculation class

TollCalculation tollObj = new TollCalculation();

// Test the three samples from the specification.

System.out.println(tollObj.calcToll(7, true, false));

System.out.println(tollObj.calcToll(1, false, false));

System.out.println(tollObj.calcToll(5, true, true));

Learn more about programs on:

https://brainly.com/question/26642771

#SPJ1

Toll roads have different fees based on the time of day and on weekends. Write a method calcToll() that has three parameters: the current hour of time (int), whether the time is morning (boolean), and whether the day is a weekend (boolean). The method returns the correct toll fee (double), based on the chart below.

Weekday Tolls

Before 7:00 am ($1.15)

7:00 am to 9:59 am ($2.95)

10:00 am to 2:59 pm ($1.90)

3:00 pm to 7:59 pm ($3.95)

Starting 8:00 pm ($1.40)

Weekend Tolls

Before 7:00 am ($1.05)

7:00 am to 7:59 pm ($2.15)

Starting 8:00 pm ($1.10)

Ex: The method calls below, with the given arguments, will return the following toll fees:

calcToll(7, true, false) returns 2.95

calcToll(1, false, false) returns 1.90

calcToll(3, false, true) returns 2.15

calcToll(5, true, true) returns 1.05

what is the process for creating a new merge document for adress lables ? ​

Answers

Answer:

on Microsoft Word 2013 Mail Merge?

Explanation:

Open on the "Mailings" tab in the menu bar.

Click "Start Mail Merge."

Select "Step-by-Step Mail Merge Wizard."

Choose "Labels" and click "Next: Starting document."

Select the "Start from a template" option and click "Next: Select recipient."

Difference between save,saveas and save all

Answers

Answer:

Save just saves to your computer to what ever is the default format for the program your using.  Save as saves something where you can choose the file name and format. Save all just save all the files you worked on.

Explanation:

Hope this helps :)

Lol I thought that they were all the same and had little differences in it

What are the advantages and disadvantages of providing the MSRN asopposed to the address of the VLR to the HLR?

Answers

Answer:

The answer is below

Explanation:

The advantages of providing the MSRN as opposed to the address of the VLR to the HLR is:

1. It leads to provision of value at a faster rate without querying the VLR.

2. Refreshing of the MSRN in the HLR would not be necessary.

The disadvantages of providing the MSRN asopposed to the address of the VLR to the HLR is

1. It would require value update of MSRN in HLR each time MSRN changes.

Suppose you have n classes that you want to schedule in rooms. Each class has a fixed time interval at which it is offered, and classes whose times overlap cannot be scheduled in the same room. There are enough rooms to schedule all the classes. Design a O(n log n) time algorithm to find an assignment of classes to rooms that minimizes the total number of rooms used.

Answers

Answer:

Function schedule( list of tuple of start and end times, class available)

   class_list = create list of class from class available

   for items in time_list:

       if items is not same range as time_list[-1]:

           newdict[items] = class_list[0]

           print class time: class venue

       elif items is same range as time_list[-1]:

           used_class = newdict.values

           index = class_list.index(used_class[-1])

           new_dict[items] = class_list[index + 1 ]

           print class time: class venue

Explanation:

The algorithm above describe a program with a time complexity of O(n log n). The function defined accepts two parameters, an array of start and end time tuple and the number of class available for use. The algorithm uses a quick sort to compare the time interval of the items in the list and schedule new classes for classes that overlaps with others.

Discuss what is Virtual Reality

Answers

Answer:

Virtual reality is the computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person using special electronic equipment, such as a helmet with a screen inside or gloves fitted with sensors.

Explanation:

Answer: Virtual reality (VR) refers to a computer-generated simulation in which a person can interact within an artificial three-dimensional environment using electronic devices, such as special goggles with a screen or gloves fitted with sensors. Virtual reality (VR), the use of computer modeling and simulation that enables a person to interact with an artificial three-dimensional (3-D) visual or other sensory environment. ... In a typical VR format, a user wearing a helmet with a stereoscopic screen views animated images of a simulated environment. Virtual reality is a way to create a computer-generated environment that immerses the user into a virtual world. When we put on a VR headset it takes us to a simulated set-up making us completely aloof from the actual surroundings.

Hope this helps.... Stay safe and have a great day/night!!! :D

A cloud is an example of

Answers

soft and squishy looking

Answer:

1st one.

Explanation:

what type of file is created when you save your word processing document

Answers

Answer:

When documents are saved in a word processing program they are typically saved in the word processing program's default proprietary file format. For example, Open Office documents are saved in . odf format and WordPerfect documents are saved in the . wpd format.

I hope this helps! :}

Explanation:

What is included in a linked list node?

I a reference to the next node
II an array reference
III a data element

Answers

Explanation:

In its most basic form, each node contains:

data, and a reference (in other words, a

link) to the next node in the sequence. A

linked list whose nodes contain two fields:

an integer value and a link to the next node.

The last node is linked to a terminator used

to signify the end of the list.

What is a common practice that enterprise organizations will implement to ensure the users of a network and a Mobile Device Management solution will comply with?

Answers

Answer:

Acceptable use policy.

Explanation:

An acceptable use policy also known as fair use policy can be defined as a set of rules and guidelines defined by the original owner or administrator in charge of a service, website, web resources or network in order to regulate privileges, control the way the resources are used and to prevent any unauthorized access or usage by others.

Hence, an acceptable use policy is a common practice that enterprise organizations will implement to ensure the users of a network and a Mobile Device Management solution will comply with.

Generally, acceptable use policy are used in various organizations, schools, public spaces to ensure every users comply with it.

How do I play my ps5 on my iMac without remote play, I don’t want remote play because it glitches so much and I don’t know how to fix it and I can’t find any other way to play on my iMac so can someone help me please thanks,

Answers

Maybe restart the iMac

You cant bc well you cant

i any company owner (related to medical) is reading this question plz tell me what should i do to get a job as early as posible in your company , i am 18.5 year old doing B.Sc. biotechnology course and in 1st year .​

Answers

My sister works at Mayo and she says come in any time to any Mayo Clinic and say “ I need a job interview stat!”

Discuss two (2) methods for combining multiple anomaly detection methods to improve the identification of anomalous objects. You must consider both supervised and unsupervised cases in your discussion.

Answers

Answer:

Supervised anomaly detection is a process in data mining that uses a historic dataset of dependent variables and labeled independent variables to detect outliers or anomalies in the data been mined.

Unsupervised anomaly detection method uses unsupervised algorithms of unlabeled clusters to label and predicts and rule-out outliers or anomalies.

Explanation:

Anomaly detection is a method of identifying data or observations with high deviation or spread from other grouped data. Supervised and unsupervised machine learning algorithms are used to predict and detect abnormal datasets or outliers during data mining.

The supervised anomaly detection algorithm trains the model with a dataset, for the algorithm to derive a function it could use to predict outlier or anomalies. The unsupervised detection algorithm is able to cluster and label normal and abnormal data in the dataset, using this function to detect anomalies in future datasets.

True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.​

Answers

True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.

1. This true. phishing is the act of sending multiple emails with the hope that the users of these emails would reveal sensitive information to you.

2. This is false. Hacking is having unauthorized access. Spoofing is obtaining access to a computer network through acts of impersonation.

3. This is the true. Cyber extortation happens when criminals hold sensitive data that belongs to you and they threaten to damage your reputation until you meet their demands.

4. This is true. This is a discontinued peer to peer platform where software used to be shared

5. This is true. Harrassing people through computer systems and social media platforms is cyberbullying.

6. This is true. Non delivery of service  is when a person refuses to deliver a merchandise or product that he put up for sale.

7. This is true. Encryption happens when there is a conversion of data into a code.

8. This is true. Trackers are capable of collecting data from you.

9. This is true. Sports betting is an example. It is betting on an event to win something over a desirable outcome.

10. This is true. Spam folders are used to send suspicions emails.

https://brainly.com/question/13979277?referrer=searchResults

Other Questions
-4 -5c - 6 + 5c - 2c Read this excerpt from Holes.Which event is the first chronological event of thispassage?The shovel felt heavy in Stanley's soft, fleshy hands.He tried to jam it into the earth, but the blade bangedagainst the ground and bounced off without making adent. The vibrations ran up the shaft of the shovel andinto Stanley's wrists, making his bones rattle.It was still dark. The only light came from the moonand the stars, more stars than Stanley had ever seenbefore. It seemed he had only just gotten to sleepwhen Mr. Pendanski came in and woke everyone up.Mr. Pendanski wakes everyone up.Stanley sees the moon and the stars.O Stanley's hands feel the sting of the blow.The shovel feels heavy in Stanley's hands.Using all his might, he brought the shovel back downonto the dry lake bed. The force stung his hands butmade no impression on the earth. He wondered if hehad a defective shovel. He glanced at Zero, aboutfifteen feet away, who scooped out a shovelful of dirtand dumped it on a pile that was already almost a foottall.NextSubmitSave and Exit Select the correct answer.Who is the intended audience for the following text?70 points TanyiaIf the sperm of a boa constrictor has 18 chromosomes, how many chromosomes will each skin cell of the snake have? How did Marcus Garvey's Negro Nationalism differ from the views of W.E.B. Du Bois and Booker T. Washington?Garvey was concerned with protecting and exercising voting rights.O Garvey advocated achieving economic goals before focusing on civil rights.O Garvey advocated separation and independence from whites rather than integration.O Garvey wanted African Americans to legally challenge "separate but equal" in federal courts. from which material was the plaster of paris made from?a) Lime stoneb) Slacked limec) Quick limed) Gypsum Starting at rest, A car accelerated to 20m/s in 4s. How far did the car travel as it sped up. Assume constant acceleration? The most common form of religion in precolonial Africa wasA. animismB. IslamC. paganismD. Christianity What is a benefit of NAFTA? *5 pointsPollutionVotingFree FoodNo Taxes What is the surface area? The average growth for heightof a boy from age 6 to 12 is 2.5inches per year. John is 6 yearsold and is 41 inches tall. ModelJohns height with an equation. The new pump will reduce variable costs by $14,000 per year over its four-year life. The costs not relevant to the decision of whether or not to replace the pump are:________. 1055x Solve for y in the figure above. 1.Protection to all the people without any discrimination a rectangular pool is 3 times as long as it is wide. a redwood walkway 2m wide with an area of 208 m borders the pol. what are the dimensions of the pool when interpreting measures from financial statement analysis, we need (or benchmarks) for comparisons. what the answer giving brainliest !!!!!! can you help me please? ( I didn't mean to pick a answer) 5x+30=45 solve for x can anyone please help me ASAP?I have included a picture.