what command can you use to create a file use to assign an ethernet interface eth0 the IP address 192.168.1.2

Answers

Answer 1

The command "ifconfig eth0 192.168.1.2" can be used to assign the IP address 192.168.1.2 to the ethernet interface eth0.

What is ifconfig command?

The ifconfig command is used to assign an IP address to a network interface on a Linux operating system. It is used to configure, control, and query TCP/IP network interface parameters. It can be used to set the IP address, netmask, and other network settings for a network interface.

What are the different options available with ifconfig command?

ifconfig command has various options like :

a : Show all interfaces that are currently available, even if they are down.

s : Show statistics for the specified interface.

v : Display the version of the ifconfig command being used.

up : bring up a network interface.

down : take down a network interface.

IP address : assign an IP address to a network interface.

netmask : assign a netmask to a network interface.

broadcast : assign a broadcast address to a network interface.

hw ether : assign a MAC address to a network interface.

These are some of the options available with ifconfig command. It can be used to set the IP address, netmask, and other network settings for a network interface.

To know more about  ethernet interface visit:
brainly.com/question/14398307
#SPJ4


Related Questions

Select the item below that lists the top level domain name for the URL http://www.yahoo.com.
a. http
b. www
c. yahoo
d. com

Answers

The top level domain name for the http://www.yahoo.com URL is com.

How does URL work?

Websites have individual addresses to make it easier for users to find them, just like residences and structures have a street address. These are known as URLs on the Internet (Uniform Resource Locators).

What's URL on a phone?

Locator for Unified Resources. The address or location of a file or service on a computer network is given by a string of text (usually the Internet.) A URL that connects to a particular web page is the most typical sort of URL. Such a URL's full form begins with "http://" or "https://".

To know more about URL visit:

https://brainly.com/question/19463374

#SPJ4

Which of the following are considered types of data? Select three options.
interpretation
numbers
text
Ophotographs
statistics

Answers

It's not only that this particular information might be considered to be more private or sensitive. These particular categories of personal data warrant special protection, according to the UK GDPR's recitals.

What are the four categories of data gathering?

Based on the methods used to acquire them, data can be divided into four basic categories: observational, experimental, simulational, and generated. The nature of the research data you gather could have an impact on how you manage that data.

What are the three categories of data gathering?

Different techniques can be employed to collect data under the main three core groupings of research methods (quantitative, qualitative, and mixed). Interviews can be conducted over the phone or in person.

To know more about data gathering here:

brainly.com/question/17538970

#SPJ1

The "Traveling Salesperson Problem" poses this question: A salesperson is given a list of cities and the distances between them. The salesperson has to visit each city exactly once and then return to the first city. What is the shortest possible route the salesperson could take? Assume an actual salesperson is trying to determine the shortest route she can take to visit 18 cities. She could use a computer program to calculate the distance of every possible route and then select the shortest one. Alternatively, she could use a heuristic to find a route. Which of the following reasons would justify the use of a heuristic? Elimination Tool​

Answers

When using an algorithm to solve a problem is difficult or impractical, a heuristic is employed. We therefore need something that works well enough to find a route. A heuristic excels in this situation.

A heuristic function's definition.

A heuristic function is a function that estimates a problem's approximate cost (or ranks alternatives). Finding the shortest driving distance to a destination is an example of a problem. The distance in a straight line to the spot would be a heuristic cost. Informed Search employs the heuristic function, which identifies the most promising route. It generates an estimate of how far away the agent is from the goal using the agent's current condition as input.

What sort of heuristic algorithm is that?

By providing quick answers, heuristic algorithms are utilized to solve NP-hard problems and reduce the time complexity of issues. It is frequently used to solve artificial intelligence issues. One illustration is informed search, when more data is available to determine the following step in locating the answer.

To learn more about heuristic algorithm visit:

brainly.com/question/3064392

#SPJ1

what features of Windows 10 available in Linux and OS X allow you to organize your open apps with in workspaces

Answers

Virtual Desktop is the features of Windows 10 available in Linux and OS X allow you to organize your open apps with in workspaces.

What exactly is a virtual desktop?

The desktop experience is segregated from the physical device used to access it in virtual desktops, which are preset images of operating systems and software. Remote users can use a network to access their virtual desktops.

What in Windows 10 is a virtual desktop?

A cloud-based desktop and app virtualization service is called Azure Virtual Desktop. What you can do when running Azure Virtual Desktop on Azure is as follows: Create a multi-session deployment of Windows 11 or Windows 10 that offers a complete Windows experience and scalability.

To know more about Linux visit

brainly.com/question/15122141

#SPJ4

For business networks, which of the following is NOT one of the main cable types?
A) Twisted-pair
B) Polyvinyl
C) Coaxial
D) Fiber-optic

Answers

The correct answer is (B), Polyvinyl is NOT one of the primary cable types used for corporate networks.

What is network?

Two or more computers linked together to pool resources (such printer and CDs), exchange information, or enable electronic communications make up a network. A network's connections to its computers can be made by cables, telephone line, radio frequencies, satellite, or infrared laser pulses.

What is the most common network?

Though LAN & WAN networks are the two most common, the following network types may also be mentioned: A LAN that uses Wi-Fi wirelessly network infrastructure is known as a "wireless local area network." Metropolitan Area Networks: A network which covers a geographical area that is wider than that of a LAN but smaller than a WAN, like a city.

To know more about network visit :

https://brainly.com/question/24279473

#SPJ4

- What is the function of these 3 types of application software
Word Processing-
Spreadsheet-
Database-

Answers

Traitement de texte - consiste à mettre en forme un texte d'un point de vue typographique

Tableur - programme informatique capable de manipuler des feuilles de calcul

Base de données - permet de stocker et de retrouver des données structurées, semi-structurées ou des données brutes ou de l' information

You are troubleshooting a stand-alone computer problem. The client states that he was browsing the Internet. After clicking on a link, he found that his browser performance became very slow. Also, a small window opened telling him to click "Yes" for help. The user clicked on the Yes button. Now every time he opens his browser, he is redirected to a web site that sells PC troubleshooting software. What step should you take first to resolve this problem?

Answers

The initial step in resolving this issue should be to identify the type of malware that has infected the machine.

Why is iframe used in HTML?

A HTML element called a "inline frame" (abbreviated "iframe") loads another HTML page inside the current one. It effectively embeds a different website within the parent page. Ads, embedded movies, online analytics, and interactive content frequently use them.

In JavaScript, how should I handle iframes?

getIframeContent(frameId) is a command used to retrieve an iframe's object reference. The attribute known as contentWindow returns the iframe's window object. document: contentWindow.document returns the iframe window's document object.

To know more about malware visit :-

https://brainly.com/question/22185332

#SPJ4

how to make the user input a word and a letter, and display the number of times the letter is in the number

Answers

Using while loops is the purpose of my code. The user-entered words and the number of letters in each word should be printed as the final result.

How are a character and a number entered in Python?

In Python, the input() and print() functions are used to receive input from users and produce output that is displayed on the screen. Users can supply the application with any information in the form of texts or numbers by using the input() function.

How can I count the number of times a word appears in a Python string?

The count() method can count how many times a substring appears in a longer string. The count() function in Python iterates across a string. The result is equal.

To know more about loops visit:-

https://brainly.com/question/14390367

#SPJ4

Which among the following is a way to shut down an ISP or website?
O Denial of service attack
O Viruses
O Trojan horses
O Worms

Answers

Denial of service attack among the following is a way to shut down an ISP or website?

What is Trojan horse example?

As an illustration of how the Trojan horse might be used to attack a computer, consider the following: The victim gets an email with an attachments that appears to be from a business. When the client clicks on the attachment, the malicious code inside is activated and starts to work.

Is A Trojan horse A virus?

Although technically wrong, a Trojan is commonly referred to as a Trojan horse virus or Trojan virus. Trojan malware cannot duplicate itself or self-run, as contrast to a virus or worm. The user must take precise, intentional action.

To know more about trojan horse visit :

https://brainly.com/question/29779945

#SPJ4

An attacker has discovered that they can deduce a sensitive piece of confidential information by analyzing multiple pieces of less sensitive public data. What type of security issue exists

Answers

A data mining approach called an inference attack involves examining data to obtain knowledge about a subject or database for improper purposes.

What kind of application has the ability to intercept sensitive data?

Among the most frequent dangers to internet users is spyware. Once installed, it keeps track of login details, analyzes internet activities, and eavesdrops on confidential data. Typically, the main purpose of spyware is to collect passwords, financial information, and credit card numbers.

What approach may be used to safeguard sensitive data?

Any business that handles highly private information should think about encrypting it to guard against illegal access. To prevent data from being stolen or leaked, cryptographers encode the data using sophisticated algorithms and ciphers.

To know more about data mining visit :-

https://brainly.com/question/28561952

#SPJ4

effective when sending a single message to several recipients and when needing to communicate 24 hours a day, 365 days a year.

Answers

Email, is effective when sending a single message to several recipients and when needing tocommunicate 24 hours a day, 365 days a year. Correct answer: letter C.

This means that recipients can receive emails at any time, which is especially beneficial for people in different time zones.

Email is a great tool for mass communication. It allows for a message to be sent to a large number of people with minimal effort.

Email is also easy to use, and most people are familiar with the basics of creating and sending emails. Additionally, messages that are sent via email can be easily tracked, giving the sender the ability to know when a message is received, opened, and responded to.

_____ is effective when sending a single message to several recipients and when needing tocommunicate 24 hours a day, 365 days a year?

A) A weblog

B) A wiki

C) Email

D) Malware

Learn more about The Email:

https://brainly.com/question/24688558

#SPJ4

Which task would you use the Ctrl plus F command

Answers

Answer:

Bookmark a tab

Hope this helps :)

Answer:

If you're in a document or in a web browser, pressing the Ctrl key + the F key will bring up a search box in the top right corner of the screen. You can then type in a keyword or phrase to find places where that word or phrase is used in the text, often helpful for locating relevant sections.

Explanation:

Raymond is writing an article about a recent track meet for his school's online paper. Which format is the best choice to share the speeds of the five fastest runners

Answers

Article's stoop to recover my breath as Gretchen walks back, panting and puffing with her hands on her hips as she takes it slowly because she, too, overshot the finish line.

How should a piece of writing be formatted?

The article needs a headline or title that clearly explains its subject and a description. Depending on how much content you have to cover the subject you are writing about, the article's body can be divided into three to five paragraphs.

What are an article's five components?

The location, story, conflict, and resolution are the other four of these five elements. These crucial components enable the action to progress in a logical way that the reader can understand and keep the story moving along without any hiccups.

To know more about article visit :-

https://brainly.com/question/14172780

#SPJ4

class HashTable(): def __init__(self,nbuckets): pass def __len__(self): pass def __setitem__(self, key, value): pass

Answers

To determine the length of the instance attributes, utilize the magic method __len__. Now, the len(s) method internally calls the special method __len__() to return an object's length.

What does Excel properly?

Capitalizes the initial letter of a text string and any additional letters that come after any character other than a letter in the text. lowercase letters are used for all other letters.

Is the constructor _ init ?

Python classes have a reserved method called "__init__". In OOP principles, it is referred to as a constructor. When an object derived from the class is created, this method is called, enabling the class to initialize the attributes of the class.

To know more about Python visit:-

https://brainly.com/question/18502436

#SPJ4

TRUE OR FALSE although a database can consist of only a single file, it is usually a group of files.

Answers

Although a database can consist of only a single file, it is usually a group of files. A database is a critical component of information systems because any type of analysis that is done is based on data available in the database. Data redundancy is eliminated or minimized in a flat file system.

to cut off part of the graphic in an illustration, you would _______ the illustration.

Answers

The prototype chosen for comparison won't be the same for every person, claims prototype theory.

A prototype is a pre-production version of a product created to test a concept or method. It is a phrase that is used in a wide range of situations, including semantics, design, electronics, and software development. Machine analysts and users frequently employ a prototype to assess a brand-new design that seeks to enhance precision. In cognitive science, particularly in psychology and cognitive linguistics, the prototype theory is a categorization notion in which certain contributors are more important than others and there is a graded credential of belonging to a conceptual class. According to the prototype theory, other objects fall within a category to the extent that they resemble the ideal instances (prototypes) that make up that category.

Learn more about Prototype here:

https://brainly.com/question/28187820

#SPJ4

12. What is the most suitable MS Azure Information Protection (AIP) label while sharing a

presentation with client names and future project details with your Manager?

Oa. Use AIP ( Azure Information Protection) label 'Confidential' and select appropriate

permissions by opting for a suitable sub level

Ob. Use AIP ( Azure Information Protection) label 'ifternal' and select appropriate permissions by

opting for a suitable sub level

Oc. Use AIP ( Azure Information Protection) label 'Critical and select appropriate permissions by

opting for a suitable sub level

Od. Use AIP (Azure Information Protection) label 'Restricted' and select appropriate permissions

by opting for a suitable sub level

Answers

Option D. Use AIP (Azure Information Protection) label 'Restricted' and select appropriate permissions by opting for a suitable sub level.

The most suitable AIP label for sharing presentation with client names and future project details with the Manager is 'Restricted'. This label ensures the data is protected with appropriate permissions and access control.

Securely Sharing Presentation with Client Names and Future Project Details with the Manager using Azure Information Protection

The 'Restricted' label is the most suitable AIP label for sharing presentation with client names and future project details with the Manager. This label ensures the data is securely protected and access to it is restricted to authorized personnel only. The label also provides an additional layer of security by allowing the user to choose a suitable sublevel of permissions. This ensures that the data is not accessed by anyone who is not supposed to have access to it. This label also allows the user to monitor and audit the access to the data, thereby providing an additional layer of security.

Learn more about Security Management: brainly.com/question/14364696

#SPJ4

By making the PDP 11 minicomputer an integral part of the Therac-25, AECL was able to
A) All of these
B) increase the stock price of its subsidiary Digital Equipment Corporation.
C) shrink the size of the machine considerably.
D) reduce costs by replacing hardware safety features with software safety features.
E) eliminate the need for lead shielding.

Answers

option D is correct By making the PDP 11 minicomputer an integrated aspect of the Therac-25, AECL has been able to cut costs by replacing hardware security features with software safety mechanisms.

What does "minicomputer" mean in computing?

A minicomputer is a kind of computer that really is smaller in size but has a lot of the same features and functionalities as a large computer. The mainframe and microcomputer are separated by a minicomputer, which is smaller than the former but larger than the latter.

What features does a minicomputer have?

Its size is less than that of a mainframe computer. It costs less than mainframe and supercomputers. It is more powerful than microcomputers but just not significantly more than a mainframe or supercomputer. Both multiprocessing and multitasking are supported.

To know more about minicomputer visit:

https://brainly.com/question/13196940

#SPJ4

running apps in which mode ensures that a poorly written app does not affect system stability?

Answers

Running apps in user mode makes guarantee that a bad app won't have an impact on system stability.

What do the terms OS kernel and user mode mean?

The user mode and kernel mode of a CPU on a computer running Windows are two distinct operating systems. Depending on the type of code it is running, the processor alternates between the two modes. User mode is used for applications, and kernel mode is used for the essential parts of the operating system.

What are some user mode examples?

A computer program is in user mode when it is executing. Word processing software, PowerPoint, viewing a PDF file, and internet browsing are a few examples. The computer is operating in user mode because they are application programs.

To learn more about user mode visit:

brainly.com/question/13383370

#SPJ1

Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function ?
A. UpnP
B. Power Spike
C. Power Surge
D. Disk Management

Answers

UpnP option (A) must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function .

How do firewalls work?

In a private network, firewalls act as gated barriers or gateways to regulate the flow of authorized and unauthorized web traffic. The phrase refers to actual structures that serve as barriers to contain fires until rescue services can put them out.

Can a firewall be breached by hackers?

A firewall might be safe, but if it's guarding a vulnerable program or operating system, a hacker will quickly get over it. There are countless instances of software flaws that hackers can reap the benefits of to penetrate the firewall.

To know more about Firewall visit :

https://brainly.com/question/28411552

#SPJ4

Is each of the following an absolute pathname, a relative pathname, or a simple filename? a. milk_co b. correspond/business/milk_co c. /home/max d. /home/max/literature/promo e. ..
f. letter.0210

Answers

easy pathname milk co correspond/business/milk co; relative pathname c. The absolute pathname is /home/max. /home/max/literature/promo d A basic filename with an absolute pathname is etter.0210.

Describe an example of an absolute path.

/home/sally/statusReport is an absolute path; it always includes the root element and the entire directory list needed to find the file. The path string contains each and every piece of data required to find the file.

What distinguishes a pathname that is absolute from one that is relative?

If a file or directory is to be located entirely outside of the root directory (/), it must be specified using an absolute path. In other words, a complete path starting at the root of the actual file system, or the / directory, is what we mean by an absolute path. The definition of a relative path is a direct, connected connection to the present (pwd).

To know more about relative pathname visit :-

https://brainly.com/question/17084451

#SPJ4

Why is it important to create a program for GLCD?




{I NEED THIS FOR MY ROBOTICS IF ANY OF U GUYS HAVE THIS SUBJECT}

Answers

"Writing a program for a GLCD, or graphic liquid crystal display, is essential because it allows you to control what appears on the screen.

Why is a GLCD Important?

Graphic liquid crystal display (GLCD) is crucial because it provides for the small and energy-efficient display of graphical and textual information. Smartphones, digital cameras, and appliances, as well as industrial and medical equipment, instruments, and cars, all employ GLCDs. They are also found in portable devices like watches and calculators, as well as computer peripherals like displays and printers.

A computer program can be used to produce pictures, messages, or animations on a GLCD screen, just as it can be used to build a website or a video game.

Note that GLCDs are well-known for their excellent contrast, broad viewing angles, and low power consumption, making them perfect for a variety of applications.

Learn mroe about program:
https://brainly.com/question/11023419
#SPJ1

You are inspecting a user's system after she has complained about slow Internet speeds. After analyzing the system, you notice that the default gateway in the ARP cache is referencing an unknown MAC address. What type of attack has occurred

Answers

ARP poisoning type of attack has occurred.

What are the effects of ARP poisoning?

The Man in the Middle (MitM) technique known as ARP spoofing, often referred to as ARP poisoning, enables attackers to eavesdrop on network device communication.

Which two ARP attacks fall under each category?

There are two different kinds of ARP attacks.

ARP spoofing: A hacker sends phoney ARP packets that connect the attacker's MAC address to the IP of a computer already connected to the local area network.ARP poisoning: A hacker modifies the company's ARP table so that it contains forged MAC mappings after successfully faking an ARP signal. It spreads like a virus.

To know more about ARP attack visit

brainly.com/question/2864303

#SPJ4

You decide to work late on a Saturday night to replace wiring in your server room. Upon arriving, you realize that a break-in has occurred and server backup tapes appear to be missing. What should you do as law enforcement officials arrive

Answers

As soon as law enforcement personnel show up, you should inform authorities that there is surveillance video on the property.

When handling a situation involving a data breach or data loss Chain of custody is defined.

Definitions: A procedure that keeps track of the transfer of evidence throughout its lifespan of collection, storage, and analysis by recording each individual who handled the evidence, the day and time it was gathered or moved, and the reason for the transfer

Which Soar component automates the reaction to security incidents involving IT?

What SOAR component is used to automate the response to security incidents involving IT? D. Security orchestration, automation, and response (SOAR) is a software program created to improve the effectiveness of incident response by speeding up reaction times.

To know more about law enforcement personnel  visit :-

https://brainly.com/question/12570740

#SPJ4

an arithmetic checksum _______ the individual characters to be transmitted.

Answers

The various characters to be transmitted are added together in an algebraic checksum.

What form of arithmetic is employed in the calculation of checksums?

Binary arithmetic with one's complement One's complement binary arithmetic is probably used to calculate the checksum of a data set in the most used checksum scheme. When adding one's complement, the carry bit is first included back into the result after computing a standard two's complement sum of two values.

Checksum example: What is it?

IT specialists use checksums to identify serious problems in data transmissions. A checksum is a number that indicates the number of bits in a transmission message. After performing a cryptographic hash function, each piece of data or file can be given a checksum value before transmission.

To know more about algebraic checksum visit :-

https://brainly.com/question/28454591

#SPJ4

What measures bandwidth in terms of numbers transferred or received per unit of time?
A. Connection time
B. Broadband
C. Protocol
D. Bit rate

Answers

Your answer is D bit rate I hope this helps

You need a fast, secure, and reliable multihomed network perimeter solution that is designed to prevent specific types of network traffic from entering your corporate network. Which solution should you deploy

Answers

Using a ( VPN) virtual private network is the best approach to grant users access to private resources via the internet since encryption of all data assures a secure connection between the client and server.

What network security protocol enables the use of a single setup to encrypt all network traffic?

Contrary to application security protocols like HTTPS, which are only applicable to web servers and require a PKI certificate for each server, IPSec can be configured to secure some or all network traffic with a single setup.

Which of the following has the greatest chance of preventing buffer overflow attacks?

By making sure you are up to current with system and application fixes, buffer overflow threats can frequently be reduced.

To know more about VPN visit:-

https://brainly.com/question/29733551

#SPJ4

an e-mail virus involves sending an e-mail message with a modified field. true or false

Answers

False. Sending an email message with a changed field is how an email virus works.

What does computer email mean?

A desktop tool called e-mail enables users to exchange messages each other in order to communicate. Email, the equivalent of a letter in electronic form, has advantages over letters in regards to flexibility and speed. Email has several uses, one of which is automated voice respond. auto-forwarding and rerouting of messages

Why do people use email?

Email is used for numerous reasons, including communicating with friends, communicating with professors and superiors, gathering information, and sending applications for jobs, fellowships, and grants. Guess it depends on your objectives, the formality of your communications, the target market, and the desired outcomes will alter.

To know more about email visit:

https://brainly.com/question/15710969

#SPJ4

The only way to access the data in a database is through the DBMS?
True
False

Answers

The claim that a database management system (DBMS) is the sole means to access data in a database is accurate.

How does a DBMS access data?

There are two ways to access stored data: sequential access and random access. The sequential method necessitates the use of a seek operation to transfer data across the disk until the desired data is found. Each segment of data must be read one at a time until the required data is found.

What does DBMS's data database mean?

Software that is used to store and retrieve databases is known as a database management system. Examples of well-known DBMS tools include Oracle, MySQL, etc. The interface for performing different operations, such as creation, deletion, modification, etc., is provided by DBMS.

To know more about DBMS visit:-

https://brainly.com/question/14666683

#SPJ4

Which cloud computing concept allows users to store files on a cloud-based server when necessary, but can also copy that data from the cloud and put it back on the device when space once again becomes available on the device

Answers

Infrastructure as a Service (IaaS) is a cloud computing service that allows a provider to give users access to computer resources such servers, networking, and storage (IaaS). Within the architecture of a service provider, organizations utilize their own platforms and applications.

Which cloud architecture enables customers to utilize both on-premises infrastructure and the advantages of the public cloud?

The hybrid cloud IaaS IBM Cloud Satellite enables businesses to more effectively deploy and run programs across on-premises, edge computing, and public cloud environments from any cloud vendor.

What function does cloud computing have that enables users to proactively request more storage?

Rapid elasticity refers to a service that enables customers to automatically request more cloud storage.

To know more about servers visit:-

https://brainly.com/question/7007432

#SPJ4

Other Questions
2 copies of 1/10 write fraction for each statement 2. Gravetter/Wallnau/Forzano, Essentials - Chapter 4 - End-of-chapter question 2 What is the range for the following set of scores? (You may have more than one answer. ) 6, 12, 9, 17, 11, 4, 14 orScientists theorize that all life started with simple prokaryotic organisms. New species continue to evolvefrom existing species, creating the variety of life we see today. The following diagram shows the basicprocess.fungi(oukaryotic,unicellular,multicellular)protista(eukaryotic,uni-ormulticellular)eubacteria(prokaryotic,unicellular)animalia(eukaryoticmulticellular)universalancestorplantae(eukaryoticmulticellular)archaebacteria(prokaryotic,unicellular)Based on this diagram, do you think that organisms of the same order will share a stronger evolutionaryrelationship than organisms that share only the same phylum? Explain your reasoning using the results ofyour investigation. If the major airline companies colluded to make consumers pay an additional $50 to be able to carry on luggage, this would be an example of ______ What are the main ideas of this poster? Choose three answers. Which of these is NOT considered an "out-of-pocket" expense?O Your monthly premiumO A copay of $15 to fill a prescriptionO A $1000 deductible if you're in an auto accidentO Excess bills from a car accident once you've gone over your maximum coverage limit coordinate plane with line g that passes through the points negative 3 comma 6 and 0 comma 5 What is the equation of the line in slope-intercept form that is perpendicular to line g and passes through the point (1, 2)? Why did the scientists only add earthworms to half of the pipes?... Solve for x : 4x-6=x+9 as an investment, a person decides to buy a small house that has three rental apartments. the profits from this investment may be lower then expected if the Who collects income tax that is payable to the federal government?Income tax that is payable to the federal government is collected by the . Write a 3 paragraphs about tsunamiswith the following instructionsIn your presentation, give a description of the natural disaster. Include what it is, what causes it, where it occurs, how it can be prevented, and other relevant facts.Research the ecological impact of the natural disaster you choose. Be sure to explain how it affects people, wildlife, plants and the environment. Write each percent as a fraction and as a decimal. 7/10%I NEED THIS BY 2:30PM How do you make the balanced equation of making ammonia?__ N + __ H __ NH(with steps to solve) How do you write a good paragraph example? Which of the following determines the size and rate of growth of the money supply?O Open marketsO Monetary policyGrievance procedureO Unionization WILL MARK BRAINLIEST!! PLEASE HELP!!Underline for the following each present participle phrase. Then bold the word it modifies:1) It wasn't his disreputable rags, nor the toes peeping out of one blue and one brown canvas shoe, nor the two stars of his rank that troubled Jonathan.2) Then he made the journey to Enugu and found another miracle waiting for him.3) Soon many people came out of their forest holes looking for the same things.4) He paid the pounds, and moved in with his overjoyed family carrying five heads on their shoulders. If you wanted to hire a chef, what type of intelligence would you be most likely to focus on in assessing job candidates Which detail from the selection shows whyresearchers who filmed a giant squid made nationalnews? Analysis of a 10.150 grams sample of a compound known to contain only phosphorus and oxygen indicates a phosphorus content of 4.433 grams. What is the empirical formula of this compound