You are the administrator for the CorpNet domain. The CorpDC and CorpDC3 servers are the DNS servers for the domain. You are responsible for CorpDC, which resides in Building A. Users report that they are unable to contact the CorpWeb server.
Complete the following:

1. Ping the CorpWeb server using its full name (CorpWeb.CorpNet.local). What happens?
2. Ping the CorpWeb server using its IP address (192.168.0.15). What happens?
3. Create any DNS records needed to fix the problem.
4. Use the Ping command to verify that the problem has been fixed.

Answers

Answer 1

Final answer:

To troubleshoot the DNS issue, first ping the CorpWeb server by name and then by IP. If only the name fails, create the correct DNS A record. Verify the solution with a final ping.

Explanation:

The inability to contact the CorpWeb server possibly indicates a DNS resolution issue. Here's how to troubleshoot and fix the problem:

Ping the CorpWeb server by its full name. If there is no response, this suggests a DNS resolution problem.

Ping the CorpWeb server by its IP address (192.168.0.15). If this is successful, it confirms that the issue lies with DNS rather than connectivity.

Create or correct the A record for CorpWeb in the DNS server. The A record should point the server's fully qualified domain name (FQDN) to its IP address.

Use the ping command again to verify that the DNS problem has been resolved and that CorpWeb.CorpNet.local now responds.

Answer 2

Final answer:

The issue with contacting the CorpWeb server can be addressed by checking DNS resolution through pinging the server by name and by IP address. A corrective action is to verify and create the necessary A record in DNS. Once the record is set, a successful ping by server name confirms resolution of the issue.

Explanation:

To address the issue where users are unable to contact the CorpWeb server, follow these troubleshooting steps:

Ping the CorpWeb server using its full name (CorpWeb.CorpNet.local). If the ping fails, it indicates that there may be a DNS resolution issue.

Ping the CorpWeb server using its IP address (192.168.0.15). If this ping is successful, it further confirms that there is a DNS problem, since the server is reachable by its IP address but not by its full name.

To fix the issue, log into the DNS management console on CorpDC and create or correct the A record for CorpWeb.CorpNet.local to point to the correct IP address, which is 192.168.0.15.

Finally, use the Ping command again to verify that the problem has been fixed. If the ping to CorpWeb.CorpNet.local is successful, then users should now be able to contact the CorpWeb server by its full name.


Related Questions

In the context of Web server performance evaluation, _____ is testing that is used to compare the performance of hardware and software.

Answers

Answer:

Benchmarking.

Explanation:

Web servers are platforms used in networking to provide resources for websites and software applications. Every end devices in a network request for website resources and applications from Web servers.

To maintain these resources, web server performance must be evaluated to prevent unexpected downtime of the server. One way of evaluating web server performance is the benchmarking test.

The benchmarking test is used to compare the performance of the hardware and software of the server system.

What computer is designed to meet the computing needs of several people simultaneously in a small to medium-size business environment?

Answers

Answer: Mini computer or mid-range computer

Explanation:

Mini-computer are the computers that is used for purpose of serving engineering,business and scientific processing.It provides storage, processing,DBMS(database management system), handling and management of files and data etc.

Mini-computers are also known as mid-range computer.Example-IBM Power System.These computers are usually used for server processing from small to medium sized fields.This range of computer is between mainframe and microcomputer.

In the Linux Bash shell, the ____ key combination deletes the content of the command line from the current cursor position to the end of the command line.A. Ctrl+bB. Alt+dC. Ctrl+kD. Ctrl+a

Answers

Answer:

C. Ctrl+k.

Explanation:

The bash shell is a command processor interface in Linux operating system as a default login shell. There are other versions for operating systems like Windows and Mac OS. A user can input a plain text command to the command line interface and use different key combinations to initiate different action.

The key combination used to delete the content of the command line from the position of the cursor is the Ctrl+k combination.

A user is claiming a host can be reached via the IP address but not through the name. What should a technician do first to resolve the problem?
Add an entry to the HOSTS file
Restart the client device
Restart the DNS server
Restart the DNS service

Answers

Answer:

Add an entry to the HOSTS file

Explanation:

A file that is used to add the host name along with their IP addresses is called Host file. In this file all the IP addresses are mapped with their respective host names. Whenever some user tries to access some website, he may use the name of website to access it. The website have both name and IP address of the server, both of these information stored in host file. On GUI the user only see the information of Host name.

If some user only access the IP address of the website instead of the host name. The technician should add the name and IP address of the host in Host file. He should follow the following steps to resolve the problem.

Access the host file by following the given path of file in Windows operating system.open the host file edit the file with new host name and relevant IP address save the changes

Congress is debating a proposed law to reduce tax rates. If the current tax rate is r%, then the proposed rate after x years is given by this formula: r 1 1 1 1 x . Rewrite this formula as a simple fraction.

Answers

Answer:

[tex]\frac{x+1}{2x+1}r%[/tex]

Explanation:

Congress is debating a proposed law to reduce tax rates. If the current tax rate is r%, then the proposed rate after x years is given by this formula: r 1 1 1 1 x . Rewrite this formula as a simple fraction

The formula can be rewritten as thus [tex]\frac{r}{1+\frac{1}{1+\frac{1}{x} } } \\\\\ 1+\frac{1}{x} \\\frac{x+1}{x} we have \\\frac{1}{x+1/(x)} \\\frac{x}{x+1} \\1+\frac{x}{x+1} \\\frac{2x+1}{x+1}[/tex]

r%*x+1/(2x+1)

[tex]\frac{x+1}{2x+1}r%[/tex]

What have simply done is to find the LCM of the lowest fraction at the bottom of the relation , then solve upward

compress into proper fraction. I then normalized by brionging the numerator downward and the denominator upward

The IMA standard that includes disclosing all relevant information that could reasonably be expected to influence an intended user’s understanding of the reports, analyses, or recommendations is ________.

Answers

Answer:

Credibility.

Explanation:

The IMA or institute of management and accounting is one of the largest and most respected group or association of accountants and other financial professionals in the business industry, with the collaborative intent to advance and promote the management and accounting profession.

All members of the association obligatorily adhere to four principles. They are, honesty, fairness, objectivity and responsibility. And they also follow four IMA standards, which are credibility, competence, integrity and confidentiality.

The credibility standard includes disclosing all relevant information that could reasonably be expected to influence an intended user's understanding of the reports, analyses or recommendation.

Final answer:

The IMA standard requiring disclosure of all relevant information for understanding reports, analyses, or recommendations is grounded in the principle of transparency. This encompasses the clear presentation of data and an easily understandable format, adhering to the ISO 9000 Management Categories for quality and continuous improvement.

Explanation:

The IMA standard that includes disclosing all relevant information that could reasonably be expected to influence an intended user’s understanding of the reports, analyses, or recommendations is transparency. Ensuring transparency involves the presentation of monitoring results and data in such a manner that stakeholders can fully comprehend the scope, methodology, biases, and limitations of the research. It is important to consider not only the content but also the format to make sure that the information is accessible and easily understandable.

According to the ISO 9000 Management Categories, part of this transparency involves clear communication and documentation that reveal what the organization planned to do, what it actually did, and the continuous improvement practices that are in place. This principle of transparency is vital to ensure that data, conclusions, and recommendations are fully understood by all stakeholders.

Assume the market for DVD movies is initially at equilibrium. A decrease in the price of streamed movies, a substitute for DVD movies, will __________ the equilibrium price and ___________ the equilibrium quantity of DVD movies.

Answers

Answer:

The answer is "decrease; decrease".

Explanation:

DVD movies are used to short and a digital portable digital video, It uses a disc that stores much more data as compared to CD.

It is widely used for films and other data storage and display. It decreases the streaming video costs, as substitution for DVD videos, would increase the average demand and high the surplus in DVD films.

Match each type of software license with the appropriate definition.
Each answer choice is used only once.
Part A
1. Software distributed for a multitude of users
2. Software you must purchase before using
3. Software distributed with a limited license
4. Software distributed free of charge
Part B
a. Freeware
b. Shareware
c. Network
d. Buyware

Answers

Answer:

1- Software distributed for a multitude of user: network

2- Software you must purchase before using:  buyware

3- Software distributed over a limited license: shareware

4- Software distributed free of charge: freeware

Explanation:

The software which we have to buy before using it is called buyware. The software which is only provided to the people who have lisence to use it, is called shareware. The software which can be used by many users is called the network. software which can be used without purchasing is called freeware.    

Final answer:

Software licenses can be categorized based on how the software is distributed and used. Freeware refers to software that is distributed free of charge, while shareware is distributed with a limited license. Network software is distributed to a multitude of users, and buyware requires a purchase before use.

Explanation:

Part A:

Software distributed for a multitude of users - NetworkSoftware you must purchase before using - BuywareSoftware distributed with a limited license - SharewareSoftware distributed free of charge - Freeware

Part B:

a. Freeware - Software distributed free of chargeb. Shareware - Software distributed with a limited licensec. Network - Software distributed for a multitude of usersd. Buyware - Software you must purchase before using

This is a control structure that causes a statement or group of statements to repeat.

a. decision statement
b. constant loop
c. cout object
d0 None of these

Answers

Answer:

B. Constant Loop

Explanation:

Looping involves going over a block of code or statement infinitely or over a particular number of times. There are a number of loops, such as the infinite loop, while loop, do-while loop among others.

Infinite loop: All loops are expected to terminate after a few iterations, however, if that block of code is not available, the loop is said to be an infinite loop. This is because it will iterate continuously and indefinitely.

While loop: Also referred to as a Pretest loop, because before the statements are executed in its body, it verifies the boolean expression.

Do-while loop: Also referred to as a Posttest loop, because it tests the boolean expression after the block or statement is executed.

Answer:

D. None of these

Explanation:

The control structure that causes a statement or a group of statements to repeat is called a control loop, or simply, a loop.

In many programming languages, a loop contains a group of statements that are executed repeatedly based on a certain criterion (or condition). As long as this condition is true, the statements within the loop are executed.

Three types of control loop structure are the for, while and do...while loops.

Incident damage ____ is the rapid determination of the scope of the breach of the confidentiality, integrity, and availability of information and information assets during or just following an incident.

Answers

Answer:

The answer is "assessment"

Explanation:

In the given question some information is missing, that is options that can be described as follows:

a) containment strategy.

b) assessment.

c) incident response.

d) disaster assessment.

Assessment also known as community risk, which is used for evaluations. It played a crucial role in the reaction and recovery after a dangerous incident in any organization.

In this process, the Information of the degree and the position, which is lost are included in the collected information by the Accident investigation Taskforce. This data is analyzed to evaluate the needs of members and the entire community, and other choices are wrong that can be described as follows:In option a, It is a part of world war II, that's why it is wrong.In option c, It is a method that is sort major incident, that's why it is wrong.In option d, It uses cost control and risk avoidance, that's why it is wrong.

Assume that inputFile references a Scanner object that was used to open a file. Which of the following while loops is the correct way to read data from the file until the end of the file is reached?

Answers

Answer:

while(inputFile.hasNext()) { //some code here  }

Explanation:

Even though you did not provide the options, here is how it should look like.

It is known in the question that there is an object called inputFile. To be able to read all the data from a file in Java, you need to use hasNext() function with the object. inputFile.hasNext() enables you to read the data in a file.

while(inputFile.hasNext()) {   } enables you to loop through the file while it has something to read in a file.

Jason is using TCPdump to capture traffic on his network. He would like to review a capture log gathered previously. What command can Jason use?

Answers

Answer:

tcpdump -r capture.log

Explanation:

Based on the information provided within the question it can be said that the command that will allow Jason to do this would be the following : tcpdump -r capture.log . This command (like mentioned in the question) will allow provide Jason with previously captured network traffic logs in order for him to be able to thoroughly review those logs.

Clicking a _____ name opens a drop-down list of commands and options. Select one: a. menu b. status bar c. ribbon d. toolbar

Answers

Answer:

menu

Explanation:

https://quizlet.com/231958668/windows-chapter-1-concepts-exam-flash-cards/

Final answer:

Clicking a menu name opens a drop-down list of commands and options in many software applications, where users can choose from various actions.

Explanation:

Clicking a menu name opens a drop-down list of commands and options. This characteristic is common in many software applications where a menu is a graphical control element that bears a list of options that a user can choose from to perform certain actions.

Menus are typically found across the top of the screen or window and contain items such as File, Edit, View, and Help. Different types of menus, such as context menus, appear upon interacting with elements within the software, displaying relevant options for that context.

The examples provided such as 'Menu: Actions... Colors... green' indicates a hierarchical menu structure where 'Actions' is a menu, and 'Colors' is a sub-menu with 'green' as one of the selectable options.

Which key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration?

Answers

Answer:

F8

Explanation:

In Windows PC (e.g Windows 7), Last Known Good Configuration, is an option that helps users to start up their PC if it doesn't start normally. This option is only accessible at boot process by using the keyboard (mouse will not work at this point). So to access this option, the F8 key is pressed repeatedly or held down. This will display some start up menus where the user can use the arrow keys to access the option.

You are capturing packets with a network sniffer and notice a number of packets that are flagged by the sniffer and described as TCP retries. Which layer of the OSI model should you investigate?

Answers

Answer:

Transport Layer                                    

Explanation:

Transport layer is responsible for correcting data transmission errors which is done by requesting retries also called re-transmission of packets in case of data loss or corrupted data.Transport layer ensures end to end delivery of data making sure that the data is received correctly and in same order in which it was sent.Transmission Control Protocol (TCP) is a protocol in this layer that continues to transmit data packets securely from sender to receiver, identifying packet losses. Transport layer works on packet loss issues and corrects data transmission errors.It has flow control and error control services manage data transmission rate and ensures data is received without error. So in case of transmission errors and re-transmission requests transport layer should be investigated.

The design strategy that starts with a global view of the entire problem and breaks the problem down into smaller, more manageable subproblems is known as what type of design?

Answers

Answer:

Top down design

Explanation:

Top-down design is an approach that is used to break down the problem into the smaller subpart so that it can be manageable into more clear form.

C programming is the example of a top-down approach while C++ is the example of the bottom-up approach.

The advantages of the top-down design approach are:

1) easy to manage

2) easy to find the error

3) easy to debug

Based on the current economic situation do you expect the employment demand for graduating engineers to increase or decrease? Explain the basis for your answer.


With a significant economic recovery, what do you think will happen to future enrollments in graduating engineering programs?

Answers

Answer: the employment demand would increase.

Explanation:

Several factors affect the employment demand especially in a field as peculiar as engineering, the cumulative build up of unemployed graduates and the skill set required to fit into the present working structure is also of Paramount importance. The evaluation method for recruitment seeks to function based on this rationale by selecting a few amongst many.

Final answer:

The economic situation points to an increase in employment demand for graduating engineers, tied to economic recovery and the trend of higher job growth for those with more education. Future enrollments in engineering programs are expected to increase with economic recovery. Countries like China and India have a high number of engineering graduates, reflecting their focus on technology and industry.

Explanation:

Based on the current economic situation, the employment demand for graduating engineers is likely to increase as economies recover from downturns and companies start to expand and invest in new technologies and infrastructure. This is supported by the trend that higher levels of education, including engineering degrees, are associated with higher job growth rates. For instance, those with a bachelor's degree have job growth expectations of 17 percent.

With a significant economic recovery, enrollments in graduating engineering programs are also expected to rise. This is because students may perceive engineering as a field with strong job prospects, which can lead to more secure and well-paying positions. Therefore, during economic recoveries, the allure of a promising career in engineering could attract more students to these programs.

In the context of global engineering graduates, countries with the most graduates can be indicative of their prioritization of technical education and their industrial and technological sectors' requirements. For example, countries like China and India have high numbers of engineering graduates due partly to their large populations and emphasis on engineering as a driver of economic growth.

An engineer plans to connect three switches (SW1, SW2, and SW3) in a lab. Before connecting the switches, he starts by configuring all three switches as VTP servers, with matching CTP domain name and password. He then configures some VLANs on each switch so that switch SW3 has a revision number of 10, switch SW2 has a revision number of 6, and switch SW1 has a revision number of 8. Only then does he engineer connect the switches with trunks: first SW1 to SW2, then SW2 to SW3, and then SW3 to SW1. Switch SW1 is elected the STP root switch in VLAN 1. Which answer most accurately states which VLAN configuration database is used, and why?

Answers

Answer:

c. All use SW3's database because SW3 has the highest revision number.

Explanation:

In this particular configuration, the three switches will definitely be connected to one another by the presence of some path with the specific trunks. As a result, the database with the most revision number will ultimately win. The process of the STP election does not have any influence on the selection of the VTP.

Which feature of SQL Server 2012 provides a failover environment consisting of a group of primary user databases with up to four replicas?

Answers

Answer:

(always on) availability group

Explanation:

Availability group of SQL server 2012 provides replicated alternatives for multiple databases.

In case of a disaster situation, this feature recovers the system by using replicated environments.

This feature is an alternative solution to database mirroring

You are a domain administrator for a large, multi-domain network. There are approximately 2500 computers in your domain. Organizational Units (OUs) have been created for each department. Group Policy objects (GPOs) are linked to each OU to configure department-wide user and computer settings.While you were on vacation, another 20 computers were added to the network. The computers appear to be functioning correctly with one exception: the computers do not seem to have the necessary GPO settings applied.What should you do?

Answers

Answer:

move the computer accounts from their current location to the correct Organizational Units (OU's)

Explanation:

Based on the information provided within the question it can be said that in this scenario the best thing to do would be to move the computer accounts from their current location to the correct Organizational Units (OU's). This would keep things organized and have each computer account in the unit that they belong with the correct access and privileges that they need.

How can the security information and event management system in a SOC be be used to help personnel fight against security threats?

Answers

Answer:

i think its A.

Explanation:

:)

Given a string variable named "myString" of length 5, how could you access the first character and last character using a numeric index?

Answers

Answer:

The first index myString[0]

The last index myString[4]

Explanation:

Indexing starts at "0". so the first character in a string will be at index "0" and the last character will be at index "-1". But since we were given the length of this string to be 5, we know that the index of the last character will be "4".

The python code bellow will print character at the first and last index:

myString = "hello"

print("The First Index is "+myString[0])

print("The Last Index is "+myString[-1])

Disk Defragmenter eliminates unnecessary file fragments and rearranges files and unused disk space to optimize computer operations. This is an example of which type of program?

Answers

Answer:

Windows utility program.

Explanation:

The operating system is a software used to manage the activities of various parts of the computer system. It acts as a link between the hardware, application software and the user. An example of OS is the Windows OS.

It has the kernel program that directly connects the hardware to the operating system. It provides utility programs to analyse, optimise, control and maintain devices running in the system.

Window utility program is an example of utilities in OS, used to analyse, control, optimise and maintain device and software activities for good system performance.

An example of the windows utility program is the disk defragmenter used to eliminate fragments and rearrange files and unused disk space.

You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should​ take?

Answers

Answer:

Option E i.e., Select the functions of the system you wish to use is the correct answer.

Explanation:

In the above statement, some part of the question is missing that is options.

The first step is taken by the user is that they have been select those methods of the computer system which he wants to use firstly if he has to implement the software or an application for that manufacturers who sales the appliances of the kitchen. Then, it is necessary to take the following steps by the user according to its needs.

When people use Web browser software to become part of the Web, their computers become Web client computers on a worldwide client/server network.

A. True
B. False

Answers

Answer:

A. True.

Explanation:

The internet or the world wide web (www) is a global network of interconnected networks. It has a wide range of dedicated servers, intermediate network devices like routers and switches, and end devices to access data.

The website is a collection of web pages hosted on web servers on the internet. Web browsers are application softwares used by end devices to request for web pages. There are two types of network connection, peer to peer and client/server connection.

The peer to peer network involves computers serving as client ( requesting for data) and server (transmit data) at the same time. The client/server network one has a dedicated server that transmits data and a client that request for data.

This makes computer running web browsers, clients to web servers on the internet.

When working with arrays, most programming languages perform ________, which means they do not allow programs to use invalid subscripts. Group of answer choices

1. buffer overrun protection
2. None of these
3. bitwise data execution
4. array bounds checking subscript binding

Answers

Final answer:

In array operations, most programming languages use array bounds checking to prevent the use of invalid subscripts, ensuring memory safety.

Explanation:

When working with arrays, most programming languages perform array bounds checking, which means they do not allow programs to use invalid subscripts. The correct answer is option 4. Array bounds checking is a safety feature in many programming languages that prevents programs from accessing memory locations outside of the allocated array space.

This is important to prevent errors and potential vulnerabilities like buffer overruns, where an attacker could manipulate the program to execute arbitrary code by overwriting parts of the memory.

The __________ supports the primary system components (such as the CPU and RAM) necessary for all digital electronics devices such as 1. desktop PCs2. notebook PCs3. mobile phones4. iPads4. servers

Answers

Answer:

Computer System unit.

Explanation:

The computer system unit holds all the other components together and protect them outside elements. The components include motherboard, CPU, hard drive, RAM, video card and power supply.

If our list called List is populated as [0, 1, 2, 3, 4], what happens if our code tries to access List [5] per the rules of the AP Computer Science Principles Reference Guide?

Answers

Answer:

The number 4 will be returned.

Explanation:

Given;

List = [0, 1, 2, 3, 4]

Using the AP Reference Guide;

The first element has an index of 1 and can be accessed using the same. i.e

=> List[1] = 0

The second element has an index of 2 and can be accessed using the same. i.e

=> List[2] = 1

Therefore, if our code tries to access List[5], then the number at index 5 will be returned. i.e

=> List[5] = 4

This implies that the last number 4 will be returned.

Note: Many programming languages (such as Java) actually start their collection (array, list) index from 0 rather than 1. But since we are using the AP Computer Science Principles Reference Guide, the index has to start from 1.

Suppose your cell phone carrier charges you a monthly fee of $30.00 for up to 300 minutes and $0.45 for each additional minute after the first 300. Assuming you used your phone for x minutes with x > 300, the total monthly fee would be?

If you used your phone for <= 300 minutes then the charge is $30.00 Assume the user enters a positive value for the number of minutes

30 + (x -300) * .45ç correct answer

Use the following template

A = 300 #CONSTANT fee for <= 300 minutes

m = int(input("Enter the number of minutes "))

c = 0 # initialize cost variable

if (m>300): # minutes>300

# calculations here to compute the solution above

# use the correct answer provided

print(" the cost for ", m, " minutes is ", c )

else: # here m is <= 300# s <= 0

print(" the cost for ", m, " minutes is ", A )

Answers

Answer:

# 30 + (x -300) * .45ç correct answer

A = 30 #CONSTANT fee for <= 300 minutes

m = int(input("Enter the number of minutes "))

c = 0 # initialize cost variable

if (m>300):

   c = 30 + ((m - 300) * 0.45) #Cost when the minute is greater 300

   print("The cost for ", m, " minutes is $",c )

else:

   print("The cost for ", m, " minutes is $",A )

Explanation:

   c = 30 + ((m - 300) * 0.45) #Cost when the minute is greater 300

First 300 is subracted from the given minute to get the extra minute, and then the extra minute is multiplied by $0.45 after which it is added to the constant of $30 for the 300 minutes

With more and more users using mobile to look at websites, it is key that you optimise your site so users can find it when searching online. Which two elements should you look to optimise for improved SEO performance?

Answers

Answer:

Site speed and usability.

Explanation:

Web pages are developed using web development tools like HTML, CSS, JavaScript etc. A collection of these web pages are called a website. The web is a hosted for internet use in a web server.

All requests for a website in a web server is done in a web browser in a client device. For a website to be easy searched for , the search engine optimisation technique is used.

A hosted website on a server must have a unique and usable domain name and the page loading on a browser should be made faster by optimising the size of the scripting language.

Other Questions
Unlike artistic drawings, which communicate self-expression andemotional content,communicate how to manufacture or construct a product, system, ordevice(14th ed.) OR communicate size, shape and feature information(15th ed.). Based on the standard free energies of formation, which of the following reactions represent a feasible way to synthesize the product?A. 2C(s)+H2(g)C2H2(g); Gf=209.2 kJ/molB. N2(g)+3H2(g)2NH3(g); Gf=33.30 kJ/molC. 2C(s)+2H2(g)C2H4(g); Gf=68.20 kJ/molD. 2SO(g)+O2(g)2SO2(g); Gf=600.4 kJ/mol A balloon rises at the rate of 8 feet per second from a point on the ground 12 feet from an observer. To 2 decimal places in radians per second, find the rate of change of the angle of elevation when the balloon is 9 feet above the ground. What symbiotic partnerships form between plant roots and fungi, and increase water and mineral absorption by the plant? What is the area of the model in the problem? According to Aaron Beck's cognitive theory, one illogical thought process regularly found in depression is _____, the drawing of broad negative conclusions on the basis of a single insignificant event. How much is the product of thirty-two and five? Write the answer in numeric form. A ball is throw into the air from the top of a building. The height h(t) of the ball above the ground t seconds after it is thrown can be modeled by h (t) =-16t +64t+80 how many seconds after being thrown will the ball hit the ground Give an example of an isometric contraction? ) A 0.907 M lead II nitrate solution has a density of 1.252 g/cm3. Find the molality of the solution. Xytex Products just paid a dividend of $2.62 per share, and the stock currently sells for $36. If the discount rate is 15 percent, what is the dividend growth rate?Growth rate___%. A builder of tract homes reduced the price of a model by 15%. If the new price is $425,000, what was it's original price? How much can be saved by purchasing thr model? find (gf)(x) when f(x)=sqrt x+3 and g(x)=x^2+2/x What benefits did the Manhattan Project provide for civilians in the United States?The technology developed by the project's scientists was integrated into most civilian automobiles.The research into nuclear technologies led to advancements in medicine and power generation.The United States rose to prominence as the sole superpower during the twentieth century.The threat of nuclear weapons led to a long period of international peace and stability. If ABCD is a parallelogram, mZA = x and mZD = (2x - 3), find thevalue of 'x'. Write an informative research-based essay to compare the culture and power of Athens and Sparta. Use evidence from your research to support your essay.The ancient Greek city-states of Athens and Sparta are two of the most famous societies of the ancient world. They have inspired numerous stories, myths, and even modern books and movies. Although they were both Greek, their cultures were very different, and the two were rivals in their dominance over the Greek world. In an essay of four paragraphs, answer: How was society in Athens similar to and different from society in Sparta?For your comparison, be sure to include three of the following: Education Government Beliefs/values Economy The roles of women and childrenYour essay should be a total of four paragraphs including: an introduction, a paragraph about the similarities between ancient Athens and Sparta, a paragraph about the differences between ancient Athens and Sparta, and a conclusion. Professor Little studies the aftereffects of being confined in submarines for a prolonged period. After collecting data, she writes a report that describes her observations. This description can help her to: Older railroad tracks in the U.S. are made of 12-m-long pieces of steel. When the tracks are laid, gaps are left between sections to prevent buckling when the steel termally expands. If a track is laid at 16*C, how large should the gaps be if the track is not to buckle when the temperature is as high as 50*C? It takes 20 people 24 days to build a barn. In how many days will the barn be build if they had 32 people working? Which of the following will most likely happen if the pancreas does not produce sufficient glucagon?1. Blood sugar will decrease because glucagon increases blood sugar when it falls too low.2. Blood sugar will increase because glucagon increases blood sugar when it falls too low.3. Blood sugar will decrease because glucagon lowers blood sugar when it rises too high.4. Blood sugar will increase because glucagon lowers blood sugar when it rises too high. Steam Workshop Downloader