A device's mean time between failure (MTBF) rating provides an estimate of how long the device should last?
A) True
B) False

Answers

Answer 1

Answer:

True

Explanation:


Related Questions

Describing where this quadratic is negative involves describing a set of numbers that are simultaneously greater than the smaller root (+1) and less than the larger root (+3). Write a C++ Boolean expression that is true when the value of this quadratic is negative.

Answers

Answer:

The Boolean Expression is (x >1)&&(x<3)  

Explanation:

As mentioned in the question that to describe where the given quadratic is negative involves describing:

a set of numbers that are greater than the smaller root which is +1a set of numbers that are less than larger root which is +3

So when the quadratic is negative the following boolean expression is true:

                                               (x >1)&&(x<3)

This expression means that the set of numbers are greater than 1 and less than 3. x represents such number. So this boolean expression returns a boolean value true when the 1 and 2 are true. It can also be returned as 1 (which means true in boolean). In the above expression > and < are relational operators used for comparison and & is called logical operator which depicts that both (x>1) and (x<3) should hold or should be true for the expression to return true.

Example of boolean expression

The logic of Boolean expressions is explained with the following chunk of C++ code. For example x is a number, (x>1)&&(x<3) is an expression whose result is stored in "bool" data type variable result. If this expression holds true(i.e. value of x is greater than 1 and less than 3) then output will be 1 (true) otherwise 0(which means false).

int x;

cout<<"enter value";

cin>>x;

bool result;

result=(x>1)&&(x<3);  

  cout<<result;

how to engage more underrepresented and under resourced students in stem programs?

Answers

Answer:

Through after school programs

Explanation:

Under represented and under resourced students can be better engaged in STEM programs through the establishment of after school state of the arts learning centres that can augment for the vacuum in the regular school system.

In such programs, the use of technological platforms with an integrated electronic learning system is necessary, because it avails the students the opportunity to brace up with the evolving impact of information technology to learning and personal developments.

Secondly, the use of immediate resources within the reach of these under privileged and under resourced students is a necessity. for example, a student in a rural community could start become more engage in engineering designs, building technology, instrumentation and architecture through the use of disposed cartons used to construct buildings, cars etc.

which two functions of a firewalls in an enterprise network are true (choose two)

Answers

Answer:

A. They can use information about previous packets to make decisions about future packets.

E. They are more susceptible to DoS attacks than stateless firewalls

Explanation:

Assuming the following options:

A. They can use information about previous packets to make decisions about future packets.

B.  They are most effective when placed in front of the router connected to the Internet

C. They can track the number of active TCP connections

D. They can fitter HTTP and HTTPS traffic in the inbound direction only

E. They are more susceptible to DoS attacks than stateless firewalls

A firewall by definition is a "software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks and are often employed to prevent unauthorized Web users or illicit software from gaining access to private networks connected to the Internet".

The basic purpose of a firewall is to control the traffic that is allowed to traverse from the internet.  

Option A is correct since they use previous info in prder to make decisions about a site.

Option B is not true since the firewall is a software that not depends of the router connection to the internet, since the web is open for any IP.

Option C is not correct isnce the purpose for the firewalls is not analyze the acitve connections.

Option D is not correct since they can work in both directions and no present limitations in order to filter web pages to classify the info.

Option E is correct since one characteristic of the stateless firewalls compared to the stateful firewalls. Since "Stateless firewalls watch network traffic and restrict or block packets based on source and destination addresses or other static values" and present more security comaprd to the stateless stateful.

Final answer:

The correct options are A. They can use information about previous packets to make decisions about future packets and C. They can track the number of active TCP connections. Firewalls in an enterprise network can use information about previous packets and track the number of active TCP connections to enhance network security.

Explanation:

Two functions of firewalls in an enterprise network:

They can use information about previous packets to make decisions about future packets: Firewalls can track the state of connections and use this information to determine whether incoming packets are part of an established connection or if they are trying to initiate a new, potentially unauthorized connection.

They can track the number of active TCP connections: Firewalls can monitor the number of active Transmission Control Protocol (TCP) connections to ensure network resources are not overwhelmed by excessive connections or potential cyber threats.

Where is most of the information processed in a computer

Answers

Answer:

CPU is the correct suitable one-word answer for the above question.

Explanation:

CPU stands central processing units which are the only responsible device for the processing of the instruction given by the user for the demand of some output. CPU is divided into two parts- Arithmetic logic unit and control unit. On which Arithmetic logic unit is responsible for the processing of Arithmetic and logical operation and the control unit is have to control all the operation.

In a computer system there are five main components --

MonitorCPUkeyboardmouseMemory

On which except CPU and Memory, all are the part of the input and output device. Memory and CPU are wrapped in one box known as the Processor device in which memory has to store the data and CPU has to process the data.

With 2020 Kicks’ Easy-Fill Tire Alert, what happens when the correct pressure is reached during inflation?

Answers

Answer:

THE HORN SOUNDS when the correct pressure is reached during inflation with 2020 kicks' Easy-Fill Tire Alert

Explanation:

Properly inflated tires are able to save up to 11 cents per gallon on gas and extend a tire’s life by over 4,000 miles, but it’s hard to know when the tires are at the proper pressure. Luckily, Nissan’s Easy-Fill Tire Alert system will take away the guesswork and help fill tires to the correct pressure every time—without needing a handheld pressure device!

First, park your vehicle and apply the parking brake.

Leave the ignition on (accessory mode) but keep the engine off

As you start to fill a tire, the exterior lights will flash to indicate that the system is monitoring the change in pressure

Once the tire meets the correct pressure, the horn will go off to tell you it’s done

If the tire is over-inflated, the horn will sound again, and the hazard lights will flash 3 times to tell you that you need to release some air

You are troubleshooting a Windows workstation that is having problems communicating with the host at IP address 1.2.3.4. What utility will you use at the command line to determine where the communication is stopping?

Answers

Answer:

Tracert 1.2.3.4 is the correct answer.

Explanation:

Tracert is the command that is used to trace the track of the packet of the Internet Protocol. That's why when the user troubleshoots their workstation and then the problem will occur at the time of conversation to the host's IP. So, that's why he using the following command of the to track route of the IP packets.

Data ____ travel over the Internet from router to router until reaching their destinations.

Answers

Answer:

Packets.

Explanation:

A data packet is a unit of data carried by a packet-switched network. Data Packets are transmitted along a given network path. Data travels across internet in packets. A packet can carry 1,500 bytes maximum. A packet contains a header and a footer which tells computers what type of data is in the packet, whats the source and destination of the data.

Transmission control protocol and internet protocol is a collection of communication protocols that for sending and receiving date using internet. TCP breaks the data into packets and maintains the network connection and IP deals with the sending and receiving packets from one computer to other using a process called IP Routing which determines the path for the packets to follow from one computer to the other. Once the packets reach their destination, TCP reforms them into their original state.

Some systems provide a small amount of dedicated memory built into the CPU that maintains a record of previous choices for each of several branch instructions that have been used in the program being executed to aid in determining whether a branch is likely to be taken. What are the contents of this memory called.

Answers

Answer:

Option (B) i.e., branch history table is the correct answer to the following question.

Explanation:

In the above question, some part is missing i.e., options which are:

a) look-ahead table

b) branch history table

c) branch prediction table

d) future speculation table

Because the branch history table maintains the records of the previous data or information and instructions also that are used after when it needed in the program or any other fields and it is the table of the shift register. So that's why the following option is correct. it also used design to store the previous data in the shift register.

Pressing ____ in the middle of a numbered list creates a new numbered paragraph and automatically renumbers the remainder of the list.
a.[Enter]
b.[Ctrl]
c.[Esc]
d.[Alt]

Answers

Answer:

Option a is the correct answer.

Explanation:

In an MS-WORD Document, when the user wants to write some line with the help of bullets or numbers then he needs to press enter when he had completed the first line and wants to proceed for the second line.

The question scenario also suggests the same which is described above. Hence Enter will fill the blank of the question statement. Hence Option 'a' is the correct answer while the other is not because--

Option b suggests about 'control' key, which is used to select or copy or cut if any other key is pressed with it.Option c suggests about 'ESC' key, which is an escape key used to escape some process.Option d suggest 'ALT' key, which is not used in MS-WORD Document for any purpose.

he blinking vertical line that indicates where your text will appear when you type is called the ____.

Answers

Answer:

Insertion point

Explanation:

in software applications that require text input, the insertion point shows where the next text will be inserted, it appears as a blinking vertical line and can be moved by the use of arrow keys or mouse click on the desired location you want it to move to, while  cursor on the other hand indicates where on the screen the user can send a command.

Natalie is responsible for the security of web servers and is configuring the WAF to allow only encrypted traffic to and from the web server, including from administrators using the command-line interface.
What should she do?

Answers

Answer:

Configured HTTPs forwarding to and from server and SSH

Explanation:

The HTTPs (secure hyper text transfer procotol) is an encrypted form of communicating packets between clients and servers. It has a port number of 443 with a high encryption policy. They are used to secure sites that request user details to prevent claiming of these information by attackers.

The SSH which is an abbreviation of secure shell is used to remotely connect to intermediate devices like routers and switches in a network. unlike its counterpart telnet, it is configured with an automatic encrypted channel with a private key. It also request for password and username.

Dexter needs to monitor the movement of a rover vehicle on Mars for one year. Which technologies should Dexter use for tracking purposes? Check all that apply.

Answers

Answer:

satellites that collect information about rover vehicle distance

space stations that store real-time data about rover vehicle speed

computer simulations that model how long it takes the rover to get to mars

Explanation:

All of the above answers are correct. Satellites are used, and so are space stations. The computer simulations are also being used in bulk. However, the telescope is not that powerful to be used. And that explains the above choices, as they are the technologies that are being used.

Answer:

hi your question lacks the options here is the complete question

Dexter needs to monitor the movement of a rover vehicle on mars for one year. which technologies should Dexter use for tracking purposes? check all that apply.

telescopes that show where the rover vehicle is located

satellites that collect information about rover vehicle distance

space stations that store real-time data about rover vehicle speed

computer simulations that model how long it takes the rover to get to mars

Doppler radar that records information about weather the rover is exposed to

The answer is

Telescopes that show where the rover vehicle is locatedDoppler radar that records information about weather the rover is exposed tospace station that store real-time data about rover vehicle speed

Explanation:

Rover vehicles have been successfully sent to Mars from four different laboratories which are named Sojourner,spirit, opportunity and curiosity                                 the weather condition in Mars varies from the poles of Mars to the center of the Mars closest to the Equator. the poles are cooler while the center which is closest to the equator is very hot. Rover vehicles are robotic vehicles sent to mars by scientists to understudy the different parts which the Mars is made up of.

The recent Rover vehicle which is of a car size with four wheels is named Curiosity.

The _______________ is a priority-ordered list of the other carrier networks and frequencies it should search for when it cannot locate its home carrier's network.

Answers

Answer:

The correct answer to the following question will be Preferred Roaming List (PRL).

Explanation:

A type of database be placed in any wireless device (used in CDMA mobile phones), that contain some information during the selection process of the system, termed as Preferred Roaming List (PRL).

It is used when your phone is connected to the network tower, provided and built by your carrier networks.

Hence, PRL is the correct answer.

Which of the following statements correctly instantiate the Rectangle object myRectangle? (i) myRectangle Rectangle = new Rectangle(10, 12); (ii) class Rectangle myRectangle = new Rectangle(10, 12); (iii) Rectangle myRectangle = new Rectangle(10, 12);

Answers

Answer:

The answer is "option iii"  .

Explanation:

In the given question it is defined that a class "Rectangle" is defined in the class a parameter constructor is created that accepts two parameters. In this question, we create an instance of the class. In object creation first, we define class name then object name and use new keyword in the Instance of class and pass parameters.

In option i), An object name is used first and then class name. It is not correct. In option ii), In instance creation of the class, we do not use class keyword that's why it is wrong.

A(n) ____ allows others besides the manufacturer to develop software to run on the system or device.

Answers

Answer:

Application Programming Interface.

Explanation:

Application Programming Interface(API) is a collection of function, routines, procedures and the protocol which are used create a software application.The main role of API is that it defined or specified how the components of software will interact.

The objective of the Application Programming Interface that it the manufacturer or develop software that is running on system or device. The advantage of using the Application Programming Interface is that we can develop a better program in a very manner by using the API.

Josh, as an administrator for a health care company, is required to support an older, legacy application. He’s concerned about the application having some vulnerabilities that would affect the remainder of the network. Of the following, which option is the most efficient way to mitigate this?A) Use an application containerB) Implement SDNC) Run the application on a separate VLAND) Insist on an updated version of the application

Answers

Answer:

Use an application container.

Explanation:

Host operating system is software installed in a computer that interacts virtually with a server and also describes the difference between its software and a guest operating system.

It interacts with the hardware and works with atype 2 hypervisor which does not interact with the hardware but create virtual machine interfaces for multiple guest operating system to be installed, which are not necessarily the same as the host os.

Host os can also be used to describe  operating systems that make use of container based virtualization. Containers are storage partitions used to hold applications separately on the same server, instead of replicating the operating system.

So with a container, Josh can separate the legacy application from other applications in the server.

What form of media has both challenged and been successfully co-opted by the traditional media?

A. streaming networks
B. social media
C. citizen journalism
D. cable television

Answers

Answer:

cable television

Explanation:

Cable television has both challenged and been successfully co-opted by the traditional media.

Gary is concerned about unauthorized people entering the company’s building. Of the following, which would be most effective in preventing this?A) Alarm systemsB) FencingC) CamerasD) Security guards

Answers

Answer:

D. Security guards

Explanation:

Physical security means to deny entry into any premises to unauthorized personnel in order to avoid any suspicious and hazardous situation. It is utmost important now a day due to critical law and order situation.  

Options:

A. Alarm systems: Are not so reliable and smart because they can be tampered easily  

B. Fencing: Might be a good option in a remote or rural location but in an urban area it would be very unpleasing sight and also it requires more space which is usually very limited

C. Cameras: It is a good option since it provides evidence in the form of video recording but the above objective will still not be achieved if there is no human intervention available at the premises to stop the intruder. Another problem is of CCTV is blind spots.

D. Security Guards: This option seems to be most reliable to get the job done. Security guard provides multi-sensory response and real time actions with prompt response. There are no blind spots in this case. Can be given tailored instructions unlike alarm systems.

You are replacing several laptop components to upgrade a customer's laptop computer. Which device ALWAYS involves the detaching and re-attaching of antenna connectors?
A. the screenB. Mini-PCIeC. the touchpadD. the wireless card

Answers

Answer:

A. The screen

Explanation:

The laptop is a miniaturized computer system that supports individuals in their daily activities. They are portable and cheaper than the normal computer systems.

Every component of the laptop is smaller in size and sometimes specifications than the desktop.

The screen is mounted on a foldable arm with the antenna of the wireless card fixed at the top of the fold.

So the antenna must be uninstalled for the screen to be uninstalled as well.

A _____ site gathers and organizes Web content, and may automatically downloads updates to subscribers.

Answers

A company website or a .com website could have content that might automatically download. I hope this helped.

Mike hands the hard drive containing suspicious content to the head of IT security at Bayland Widgets Co. The security guy requests a record of everyone who has been in possession of the hard drive. Given such a scenario, what document should Mike give the IT security chief?

Answers

Answer:

Chain of Custody is the correct answer to the following question.

Explanation:

Because chain of custody is that type of document which is gathered as the data from the scene, in other words it is an evidence which is collected/written during the investigation at crime scene and it is also known as the paper trail. And in the above question Mike handed the hard drive to the security chief that containing the important contents.

Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port security for both wired and wireless LANs?

Answers

Answer:

RADIUS  is the correct answer.`

Explanation:

The following answer is correct because radius supports to access the remote dial-in to the network which is corporate and it is also used port 8021x for the wireless and the wired Local Area Network security. It is also supported to access the remote dial-in network that is wireless network. So, that's why the answer is true.

_____________ is an application development methodology with which developers create solutions by integrating one or more web services

Answers

Answer:

SOA (Service-oriented architecture)

Explanation:

SOA (Service-oriented architecture) is used to designing networks so that it works optimally in web services environment.

It allows achieving faster and quality environments with less cost. However they can be more complex than the other architectures.

SOA provides advantages in integrating processes and its usage is platform-independent.

Which layer of the tcp/ip model manages the transmission of binary digits across an ethernet cable?A . data link
B . Physical
C . transport
D . network

Answers

Answer:

The answer is "Option B"

Explanation:

TCP/IP layer also known as Network Access Layer. The physical is used to data transfer between two devices on the same network that will be carried out primarily through this layer. and other options are incorrect that can be described as follows:

In option A, data is information that uses by physical layer protocol that's why it is not correct. In option C, the transport layer aims to enable a conversation between devices in the source and the destination hosts. That's why it is not correct. In option D, In TCP/IP, the Network layer is known as the internet layer that's why it is not correct.

java syntax allows programmers to use any expression of thei nt data type as an array subscript1. True2. Flase

Answers

Answer:

The answer is "Option 1".

Explanation:

In java programming language, Subscript is a numerical value between [ and ] which indicates the index of the object of which you like. The special [ and ] signs indicate the notation of the mathematic abonnement. So, x[1 ] and x[n-1 ] are used by Java rather than x0, x1, and x-1. That's why the answer to this question is "True".

Olivia manages wireless security in her company and wants completely different WiFi access (ie different SSID, different security levels, different authentication methods) in different parts of the company. What’s the best choice for Olivia to select in WAPs?

Answers

Answer:

The right answer is FAT WAP.

Explanation:

There are mostly two types of WAPs.  

Fat WAP: Fat WAPs can be defined as an access point that can not be configured by switches. if the user uses multiple Fat AP then each Fat AP has to configured individually which means that it can give different SSID or passwords.  Thin WAP: Thin WAPs can be defined as an access point which can be configured according to switch. which means Thin AP gives the same configuration while using multiple numbers.

Hence according to the scenario, the most appropriate answer is FAT WAPs because it can be configured as a different WIFI set up in different parts of a company.

A _____ element is an element that contains one or more other elements, which are called child elements.
a. family
b. sibling
c. parent
d. descendant

Answers

Answer:

parent

Explanation:

A parent element is usually the outer element that contains one or more other elements, which are called child elements.

Consider the following HTML code:

<div id="parent">

 <p id="childNumberOne"></p>

 <p id="childNumberTwo"></p>

 <p id="childNumberThree"></p>

</div>

The Three P are children of the parent div, and siblings of each other.

When you send an echo request message with the ping program, a successful attempt will return a(n) ______ message.

Answers

Answer:

echo reply

Explanation:

It is a test that a user performs to confirm that remote system is up and running on the network. This is needed when basic connectivity failure problem appears. Internet Control Message Protocol  renders 2 messages for this service which are Echo Request and Echo Reply. Echo Request is a request sent to a destination device. This system acknowledges with an Echo Reply message. Echo request is generated by destination system with PING program. Ping program is used for testing basic connectivity. An echo reply is sent by target system to the requesting system acknowledging that the echo request has been received.

Which component of service-oriented DSS can be defined as data that describes the meaning and structure of business data, as well as how it is created, accessed, and used?

Answers

Answer:

The correct answer to the following question will be Metadata Management.

Explanation:

The management of data about the other data is known as Metadata Management. When the data is generated, updated, deleted, created, metadata is generated.

Benefits of Metadata management:

To locate data for a person, the metadata management make it easier.Project delivery become faster.Maintain information of organization.

Hence, the Metadata Management will be the best suitable component which defined as the structure and meaning of business data.

Which wildcard character replaces a single character in the command-line interface?

Answers

Answer:

? (the question mark)

Explanation:

The asterisk (*) matches one or more occurrences of any character, but the question mark matches exactly one.

Other Questions
What is the verbal description for y=3x-2 A two week old puppy weighs 11 ounces. Two weeks later, it weighs 15 ounces. Right in equation to represent the weight y of the puppy X weeks after birth. The vehicle behind you has his high beam headlights on, causing a glare in your rear view mirror. what can you do to alleviate this problem? How were the Middle Colonies different from the Southern Colonies?A. They did not let non-Puritans settle there.B. They were settled by high-ranking nobles.C. They produced less food for the colonies.D. They had more social and political equality. When a business wants to change an accounting method for tax reporting, such as the cost-flow method used for inventory, what body must give permission for the change? The drawing shows an edge-on view of two planar surfaces that intersect and are mutually perpendicular. Surface (1) has an area of 1.70 m, while surface (2) has an area of 4.00 m. The electric field in the drawing is uniform and has a magnitude of 210 N/C. Find the magnitude of the electric flux through surface (1) if the angle made between the electric field with surface (2) is 34.0. Miss Isaac took her family out to eat at Jays deli. their mail came to 25. 40. missed Isaac wants to tip the waitress 18% and sales tax is 5.5% final total price of our meal after tax and tip What is the "rule of law"?Alimits on those who govern as well as those who are governedB. people in authority do not have to obey lawsC the legal requirement to attend public meetingsD. the legal prohibition against voter fraud when assisting taxpayers in obtaining an ACA exemption, the tax professional should do which of the following first?a) the tax professionial should first assist the taxpayer in obtaining a Marketplace exemption prior to assisting the taxpayer in claiming a tax return exemption.b) the tax professional should first assist the taxpayer in claiming a tax return exemption prior to assisting the taxpayer in obtaining a Marketplace exemption.c) the tax professional should first assist the taxpayer in obtaining minimum essential coverage prior to assisting the taxpayer in obtaining an ACA exemption.d) none of these answers is correct. the taxpayer is required to obtain ACA exemption on their own. How many 5-member chess teams can be chosen from 15 interested players? Consider only the members selected, not their board positions. 3,003 120 360,360 What is 3 division 68 and show your work plz Les just bought a megaphone of root beer. As he drinks from the giant cup, he eventually becomes full. One of his friend's comments, "If you don't stop drinking that stuff, you will get sick." Les replies, "Hey, I bought it, and I am not going to waste one drop of it." Les's behavior could best be described by which of the following mental biases: Two technicians are discussing oil leaks. Technician A says that an oil leak can be found using a fluorescent dye in the oil with a black light to check for leaks. Technician B says a white spray powder can be used to locate oil leaks. Which technician is correct?a. Technician A onlyb. Technician B onlyc. Both Technicians A and Bd. Neither Technician A nor B 1:Orpheus was the son of Apollo and the muse Calliope. He was presented by his father with a lyre and taught to play upon it, and he played to such perfection that nothing could withstand the charm of his music. Not only his fellow mortals but wild beasts were softened by his strains, and gathering round him laid by their fierceness, and stood entranced with his lay. Nay, the very trees and rocks were sensible to the charm. The former crowded round him and the latter relaxed somewhat of their hardness, softened by his notes. Hymen had been called to bless with his presence the nuptials of Orpheus with Eurydice; but though he attended, he brought no happy omens with him. His very torch smoked and brought tears into their eyes. In coincidence with such prognostics, Eurydice, shortly after her marriage, while wandering with the nymphs, her companions, was seen by the shepherd Aristaeus, who was struck with her beauty and made advances to her. She fled, and in flying trod upon a snake in the grass, was bitten in the foot, and died. Orpheus sang his grief to all who breathed the upper air, both gods and men, and finding it all unavailing resolved to seek his wife in the regions of the dead. He descended by a cave situated on the side of the promontory of Taenarus and arrived at the Stygian realm. He passed through crowds of ghosts, and presented himself before the throne of Pluto and Proserpine. Accompanying the words with the lyre, he sung, O deities of the underworld, to whom all we who live must come, hear my words, for they are true! I come not to spy out the secrets of Tartarus, nor to try my strength against the three-headed dog with snaky hair who guards the entrance. I come to seek my wife, whose opening years the poisonous vipers fang has brought to an untimely end. Love has led me here, Love, a god all powerful with us who dwell on the earth, and, if old traditions say true, not less so here. I implore you by these abodes full of terror, these realms of silence and uncreated things, unite again the thread of Eurydices life. We all are destined to you and sooner or later must pass to your domain. She too, when she shall have filled her term of life, will rightly be yours. But till then grant her to me, I beseech you. If you deny me I cannot return alone; you shall triumph in the death of us both. As he sang these tender strains, the very ghosts shed tears. Tantalus, in spite of his thirst, stopped for a moment his efforts for water, Ixions wheel stood still, the vulture ceased to tear the giants liver, the daughters of Danaus rested from their task of drawing water in a sieve, and Sisyphus sat on his rock to listen. Then for the first time, it is said, the cheeks of the Furies were wet with tears. Proserpine could not resist, and Pluto himself gave way. Eurydice was called. She came from among the new-arrived ghosts, limping with her wounded foot. Orpheus was permitted to take her away with him on one condition, that he should not turn around to look at her till they should have reached the upper air! Under this condition they proceeded on their way, he leading, she following, through passages dark and steep, in total silence, till they had nearly reached the outlet into the cheerful upper world, when Orpheus, in a moment of forgetfulness, to assure himself that she was still following, cast a glance behind him, when instantly she was borne away. Stretching out their arms to embrace each other they grasped only the air. Dying now a second time, she yet cannot reproach her husband, for how can she blame his impatience to behold her? Farewell, she said, a last farewell, and was hurried away, so fast that the sound hardly reached his ears.Passage2:You walked in front of me, pulling me back out to the green light that had once grown fangs and killed me. I was obedient, but numb, like an arm gone to sleep; the return to time was not my choice. By then I was used to silence. Though something stretched between us like a whisper, like a rope: my former name, drawn tight. You had your old leash with you, love you might call it, and your flesh voice. Before your eyes you held steady the image of what you wanted me to become: living again. It was this hope of yours that kept me following. I was your hallucination, listening and floral, and you were singing me: already new skin was forming on me within the luminous misty shroud of my other body; already there was dirt on my hands and I was thirsty. I could see only the outline of your head and shoulders, black against the cave mouth, and so could not see your face at all, when you turned and called to me because you had already lost me. The last I saw of you was a dark oval. Though I knew how this failure would hurt you, I had to fold like a gray moth and let go. Question: Write an essay that analyzes how the poem Orpheus (1) draws on and transforms the original myth presented in Orpheus and Eurydice. Water has a boiling point of 100.0C and a Kb of 0.512C/m. What is the boilingpoint of a 8.5 m solution of Mg3(PO4)2 in water? Men whose research is based on shared paradigms are committed to the same rules and standards for scientific practice.a) trueb) false Besian bought 6 ice cream cakes for $48 dollars. Write an equation that represents the total cost, y, of x ice creams cakes. Write a short description in Spanish to go in a real estate ad for an apartment in Equatorial Guinea. Include the following details in your description: ~Price of the apartment using numbers over 10,000~How many bedrooms and bathrooms~At least 3 other rooms/areas of the apartment~Details that describe the apartment in a way to sell it~Use of the verb 'vender'~State the price using 'cuesta' or 'cuestan'~Any other interesting details about the property Zedz Technicals, a provider of game programming, directed its highly skilled and technically sound salespeople to visit its customers without prior appointment and makes a sales pitch on the spot. Which of the following techniques was used by the sales team?A) Creative sellingB) Inbound telemarketingC) Cold callingD) Missionary selling AAA has a contract to build a building for $100,000 with an estimated time to completion of three years. A reliable cost estimate for the project is $60,000. In the first year of the project, AAA incurred costs totaling $24,000. How much profit should AAA report at the end of the first year under the percentage-of-completion method and the completed-contract method?Percentage-of-completion : Completed-contracta) $16,000 : $0b) $16,000 : $40,000c) $40,000 : $0 Steam Workshop Downloader