Recall from class the error-correcting code for erasure errors, which protects against up to k lost packets by sending a total of n k packets (where n is the number of packets in the original message). Often the number of packets lost is not some fixed number k, but rather a fraction of the number of packets sent. Suppose we wish to protect against a fraction a of lost packets (where 0 < α < 1).


Required:

At least how many packets do we need to send (as a function of n and a)?

Answers

Answer 1

To protect against a fraction α of lost packets, we need to send at least n/(1-α) packets, where n is the number of packets in the original message.

In error-correcting codes for erasure errors, the objective is to ensure that even if a fraction α of the packets are lost, the receiver can still reconstruct the original message. To achieve this, we send additional redundant packets along with the original message. These redundant packets contain extra information that allows the receiver to recover the lost packets.

If we want to protect against a fraction α of lost packets, it means we can afford to lose αn packets out of the original n packets. Therefore, the total number of packets we need to send is n/(1-α). This ensures that even if αn packets are lost, the receiver can still reconstruct the original message using the remaining packets.

To learn more about error-correcting codes click here : brainly.com/question/30467810

#SPJ11


Related Questions

TRUE / FALSE. autopsy for windows cannot analyze data from image files from other vendors.

Answers

"Autopsy for Windows can analyze data from image files from other vendors" is True.  Autopsy is a versatile digital forensics platform that supports various file formats, including those from other vendors, making it possible to examine data from multiple sources.

Autopsy is computer software that makes it simpler to deploy many of the open source programs and plugins used in The Sleuth Kit. The graphical user interface displays the results from the forensic search of the underlying volume making it easier for investigators to flag pertinent sections of data. The tool is largely maintained by Basis Technology Corp. with the assistance of programmers from the community. The company sells support services and training for using the product.

To learn more about "Autospy" visit: https://brainly.com/question/29515871

#SPJ11

The different between a compiler and a translaror

Answers

Answer:

Compiler converts the program from one computer language to another computer language that is translating from a higher level language to a lower level language. A translator usually has a fixed body of code that is required to translate the program.

Answer:

Answer: Compiler converts the program from one computer language to another computer language that is translating from a higher level language to a lower level language. ... A translator usually has a fixed body of code that is required to translate the program.

Explanation:

1:A presentation program which is developed by Microsoft
option 1: word
option 2: flash
option 3: PowerPoint ​

Answers

Option 3: PowerPoint.

Answer:

option 3: PowerPoint is developed by Microsoft

I. You can see from the output that the client pc has an ipv6 link-local address with a randomly generated interface id. What does it indicate about the network regarding ipv6 global unicast address, ipv6 uniquelocal address, or ipv6 gateway address?

Answers

The link-local address does not provide any information about the global unicast address. The global unicast address is a globally routable address that can be used for communication outside of the local network. To determine the global unicast address.

you would need to look for other addresses assigned to the client PC, such as a unique local address or a global address obtained through a DHCPv6 server.  IPv6 Unique Local Address: The link-local address does not indicate whether the client PC has a unique local address. Unique local addresses are typically used for communication within a specific organization or site, and they are not globally routable. To determine if the client PC has a unique local address, you would need to check for other addresses assigned to it. IPv6 Gateway Address: The link-local address does not provide any information about the gateway address. The gateway address is the address of the router that connects the local network to other networks.

To determine the gateway address, you would need to check the network configuration of the client PC and look for the default gateway address. In summary, the presence of an IPv6 link-local address with a randomly generated interface ID does not directly indicate anything about the global unicast address, unique local address, or gateway address of the network. Additional information and network configuration are required to determine these addresses.

To know more about network visit;  

https://brainly.com/question/15332165

#SPJ11

What is a special type of variable used in subroutines that refers to a piece of data?

a parameter

a constant

a function

a routine

Answers

Answer:parameter

Explanation:

I got it right

Answer:

answer is A :)

Explanation:

Edge 2021


Choose the sentences that describe techniques of formatting text.
Olivia was sending out Thanksgiving Invitations to her relatives. She thought it would be best to make a card as an invitation. She gathered her
family and asked them to pose in front of the fireplace. She set her new DSLR camera on a timer with the automatic multiple shooting mode
and rushed by her family's side. The camera took multiple shots of the family.
She opened the best photo in her photo editing software. She changed the tone of the image to sepia to give the image a traditional feel. She
brightened the colors in the background. While editing she felt that the window on the side of the fireplace was disturbing the symmetry of the
photo. She cropped the window out of the image.
She opened her type tool and wrote in 'Happy Thanksgiving at the bottom of the image. She smoothed the edges of the text and changed its
color. She then placed the text on a rug and tilted it to create an effect that showed as if the text was written on the rug
She gave the photo some finishing touches and sent the invitations out through email to all her relatives.

Answers

I'm sorry if this answer has come to late.

Answer:

She opened her type tool and wrote in 'Happy Thanksgiving at the bottom of the image. She smoothed the edges of the text and changed its color. She then placed the text on a rug and tilted it to create an effect that showed as if the text was written on the rug.

Hope this helps!

She opened her type tool and typed 'Happy Thanksgiving.' She smoothed the text's edges and changed its color. She then positioned the text on a rug and tilted it to create the illusion that the text was written on the rug.

What is formatting text?

Text formatting is a feature in word processors that allows you to change the appearance of a text, such as its size and color.

Most apps display these formatting options in the top toolbar and walk you through the same steps.

In computer science, formatted text, styled text, or rich text, as opposed to plain text, is digital text that contains styling information in addition to the minimum of semantic elements: colors, styles, sizes, and special HTML features.

The goal of formatting is to change the font style, size, color, and overall appearance of the text.

'Happy Thanksgiving,' she typed into her type tool. She rounded the edges of the text and changed its color. She then placed text on a rug and tilted it to give the impression that the text was written on the rug.

Thus, this shows the techniques of formatting text.

For more details regarding formatting, visit:

https://brainly.com/question/21934838

#SPJ5

windows cannot start this hardware device because its configuration information (in the registry) is incomplete or damaged. (code 19)
T/F

Answers

The statement given "windows cannot start this hardware device because its configuration information (in the registry) is incomplete or damaged . (code 19)" is true because when encountering the error message "Windows cannot start this hardware device because its configuration information (in the registry) is incomplete or damaged" with error code 19, it indicates that there is an issue with the configuration information of a specific hardware device in the Windows registry.

The registry is a database that stores crucial settings and information for the operating system and installed hardware devices. If the configuration information for a hardware device is incomplete or damaged, Windows will be unable to start the device. To resolve this issue, troubleshooting steps such as updating drivers, reinstalling the device, or fixing registry errors may be required.

You can learn more about error message at

https://brainly.com/question/14056040

#SPJ11

If the primary voltage of a transformer is 230V and the primary coil is 80. Calculate the secondary voltage when the secondary turn is 160. *Ans 460 volts*

Answers

Answer:

\(V_{out} = 460\)

Explanation:

From your question, you already posted the answer

However, I'll give the steps to get the answer

Given

\(Primary\ Voltage = 230V\)

\(Primary\ Coil = 80\)

\(Secondary\ Coil = 160\)

Required

Secondary Voltage

The relationship between the primary voltage, secondary voltage, turns of primary coil and secondary coil is as follows;

\(\frac{V_{out}}{V_{in}} = \frac{N_{s}}{N_{p}}\)

Where

\(V_{in} = Primary\ Voltage = 230V\)

\(V_{out} = Secondary\ Voltage = ??\)

\(N_{p} = Primary\ Coil = 80\)

\(N_{s} = Secondary\ Coil = 160\)

Substitute these values in the formula above;

\(\frac{V_{out}}{V_{in}} = \frac{N_{s}}{N_{p}}\)

becomes

\(\frac{V_{out}}{230} = \frac{160}{80}\)

\(\frac{V_{out}}{230} = 2\)

Multiply both sides by 230

\(230 * \frac{V_{out}}{230} = 2 * 230\)

\(V_{out} = 2 * 230\)

\(V_{out} = 460\)

Hence, the secondary voltage is 460 Volts

Answer:

460 volts

Explanation: hope this helps :)

A few months ago, your friend started an online friendship with somebody she met on a forum about her favorite sports team. This person claims to be the same age and lives in a different city. Coincidentally, your friend’s family is going on vacation to the city where her Internet friend lives. Your friend tells you that she plans to meet her Internet friend in person.
What steps should you take to respond to this situation?

Answers

Answer:

she sould not meet up with him

Explanation:

she might get kidnapped because it is very rare that they are the same age and lives in a different city but if she does than do bring a cupel tinges a taser pepper spray or just some ting to defend their self or a adult and its a girl and the kidnapping rate is very high now a days.

Give three examples of the following types of data?
Give three examples for each category in the software domain ?

CCDI :)??

Give three examples of the following types of data?Give three examples for each category in the software
Give three examples of the following types of data?Give three examples for each category in the software

Answers

An example of transactional data are:

Sales ordersPurchase ordersShipping documents

Its software domain are: Personal  meeting, a telephone call, and a Video call

An example of  financial data are: assets, liabilities, and equity. The software are: CORE Banking, Retail Banking, and Private banking

An example of intellectual property data are: books, music, inventions. The software domain are Patents, trademarks, and copyrights

What types of software are used in the financial industry?

Through sales and marketing tools, data-driven contact management, and workflow automation, customer relationship management (CRM) software assists financial services organizations in fostering new relationships and maximizing the value of existing customers.

You can see how your consumers are utilizing your website to complete a transaction by using transaction management software. It may demonstrate both how each website element functions on its own and as a part of the overall technological infrastructure.

Note that Information that is gathered from transactions is referred to as transactional data. It keeps track of the date and location of the transaction, the time it took place, the price ranges of the goods purchased, the mode of payment used, any discounts applied, and other quantities and characteristics related to the transaction.

Learn more about transactional data  from

https://brainly.com/question/28081430
#SPJ1

When do you use a for loop instead of a while loop?

Answers

Answer:

i dont know.prob guess a short loop.

Explanation:

What is meant by technological progress?

Answers

Technological progress refers to the advancement and development of technology over time.

Technological progress has played a significant role in shaping human society and culture, and it continues to have a major impact on the way people live and work. Technological progress can be seen in various areas such as medicine, agriculture, communication, transportation, education, and entertainment.

For instance, the invention of the telephone and the internet has made communication faster and easier, while advancements in medicine have made it possible to cure or manage many diseases. Technological progress is driven by scientific discoveries, research, and development, as well as by competition and market demand.

The pace of technological progress has increased significantly in recent years, leading to rapid changes in many industries and sectors.

To know more about Technological progress:https://brainly.com/question/722255

#SPJ11

What is the name of the narrow strip along the bottom of the windows environment?.

Answers

In the Windows environment, the narrow strip along the bottom is called the taskbar.

The taskbar on a computer screen with the Windows operating system is a narrow strip of icons. The taskbar on the Windows screen is usually located at the bottom. The taskbar provides information about that currently open files/programs/windows as well as allows switching between these programs or windows.

In the latest versions of Windows operating systems, the taskbar has an added feature that enables users to 'pin' files or programs on the taskbar to have quick access to them, just with a single click. Due to the prominence of the taskbar on the computer screen, it ususly provides a notification area too; which uses interactive icons to provide real-time information about the state of the computer systems and some of the programs active on it.

You can leanr more about Taskbar at

https://brainly.com/question/28147966

#SPJ4

how many accesses to memory are made during the processing of a trap instruction?

Answers

The number of memory accesses made during the processing of a trap instruction can vary depending on the specific architecture and implementation.

In general, a trap instruction triggers a software interrupt or exception, causing a transfer of control to a designated exception handler routine.

During the processing of a trap instruction, at least two memory accesses are typically made. The first access is to fetch the interrupt or exception handler routine's address from a predefined location in memory or an interrupt vector table. The second access is to fetch the instructions of the handler routine itself.

However, it's important to note that additional memory accesses may occur depending on the specific requirements of the handler routine, such as accessing data or storing the program state before the trap occurred. The exact number of memory accesses can vary across different systems and implementations.

Learn more about memory accesses here:

https://brainly.com/question/31593879

#SPJ11

Which of the following is a tool HR managers can use to improve commincations between workers of different generations in the same workplace? A)recruitment pools B)l-9 forms C) mentoring programs D)work/life balance

Which of the following is a tool HR managers can use to improve commincations between workers of different

Answers

Answer:

Mentor Programs

Explanation:

This is because it is talking about different ages which is a mentor type thing

Answer: mentoring programs

Explanation:

A p e x

what was the budget for monty python and the holy grail?

Answers

At the time, the "Monty Python and the Holy Grail" budget of roughly £229,575 was regarded as a modest one for a movie.

Who made the Holy Grail's payment?

How much money rock groups and record companies contributed to the 1975 film Monty Python and the Holy Grail has been disclosed by Eric Idle. Led Zeppelin gave £31,500, Pink Floyd Music gave £21,000, and Jethro Tull's Ian Anderson gave £6,300 of his own money, according to a tweet.

What is the typical movie budget?

The average film budget for a Hollywood motion picture, however, is somewhere around $65 million, according to Investopedia. It's significant to remember that excludes marketing expenses.

To know more about Monty Python visit:-

https://brainly.com/question/2484993

#SPJ4

Apex is a new internet streaming service. read their advertisement from the local newspaper. apex is the newest, fastest streaming service in the area! we provide more than one hundred channels, twice as many as some other streaming services. there are no setup costs, and our monthly fee is one-third the price of every other streaming service in the area. what is the best inference readers can make based on the claims in the advertisement? apex is the only reliable internet streaming service in the area. apex has more channels for the money than some other streaming services. all other streaming services charge more per channel than apex does. other streaming services offer less desirable channels than apex.

Answers

Based on the claims in the advertisement, the best inference readers can make is that Apex has more channels for the money than some other streaming services. This is because the advertisement states that Apex provides more than one hundred channels, which is twice as many as some other streaming services.

Additionally, it mentions that the monthly fee for Apex is one-third the price of every other streaming service in the area, indicating that Apex offers a better value in terms of the number of channels provided compared to other streaming services.

The advertisement states that Apex provides more than one hundred channels, which is twice as many as some other streaming services. This suggests that Apex has a wide variety of content available for its customers to enjoy. Additionally, the monthly fee for Apex is mentioned to be one-third the price of every other streaming service in the area, indicating that it is a more affordable option.

While the advertisement highlights Apex's advantages in terms of channel selection and pricing, it does not explicitly claim that Apex is the only reliable streaming service or that other streaming services offer less desirable channels. Therefore, it would be an overreach to assume these statements based solely on the information provided in the advertisement.

For more such questions Apex,Click on

https://brainly.com/question/14489957

#SPJ8

1
2
3
O Color view
5
Slide Sorter view
Normal view
10
If Maya wants to access a view that would control multiple slides within a presentation, which view should she utilize?
Master view
Save and Exit
TIME REMAINING
01:49:58
Next
Submit

Answers

The selected slide opens in Normal View, where you can edit its content, if you double-click a slide thumbnail in PowerPoint's Slide Sorter view or if choose a slide thumbnail and then press the "Enter" key on your keyboard.

What does the slide sorter view look like?

View in Slide Sorter You can view your slides as thumbnails in the Slide Sorter view. You can easily sort and arrange the order of your slides using this view as you develop your presentation and again when you get ready to publish it.

What distinguishes PowerPoint's slide Sorter view from the standard View?

Shows the ribbon, the complete slide, and the thumbnails. View in Outline: Shows a left-side outline of the presentation's content. Without pictures, it is simple to concentrate on your content. Slide Sorter: Provides a quick overview of all of your slides, making it simple to rearrange them.

to know more about Slide Sorter view here:

brainly.com/question/7696377

#SPJ1

If technology is a complement to labor, then advances in technology will __________ the number of workers hired.

Answers

If technology is a complement to labor, then advances in technology will likely increase the number of workers hired. This is because improved technology can enhance workers' productivity and efficiency, leading to a higher demand for skilled labor to utilize and maintain the advanced technology effectively.

This is because as technology improves, it can perform tasks that were previously done by human labor, making it more efficient and cost-effective for businesses to rely on machines rather than hiring additional workers. However, it's important to note that while technology can replace certain jobs, it also creates new jobs in industries related to technology development, maintenance, and support.
However, it's important to note that the impact of technological advances on employment can vary depending on the specific industry, job type, and other factors. In some cases, technological advancements may also create new job opportunities in emerging industries, offsetting any potential job losses in other sectors. Additionally, the social and economic impacts of technological advancements are complex and can be influenced by various factors such as government policies, societal norms, and labor market conditions.

To learn more about Technology Here:

https://brainly.com/question/15059972

#SPJ11

Separate feeders are to be run from the main service equipment to each of the areas of the commercial building. Each feeder will terminate in a ____, which generally will be installed in the area to be served.

Answers

Separate feeders are to be run from the main service equipment to each of the areas of the commercial building. Each feeder will terminate in a subpanel, which generally will be installed in the area to be served.

In electrical distribution systems, feeders are used to distribute power from the main service equipment (such as a main panel or switchboard) to various areas or zones within a building. Each feeder is responsible for supplying electrical power to a specific area.

To terminate the feeder and distribute power within the designated area, a subpanel is typically installed. A subpanel is a smaller distribution panel that receives power from the feeder and contains circuit breakers or fuses to control and distribute power to various branch circuits within the area. It serves as a localized distribution point for the electrical loads within that specific zone.

Subpanels allow for the convenient and efficient distribution of power within different areas of a commercial building. They provide a means for separating electrical circuits, organizing loads, and accommodating the specific power requirements of the area they serve. Subpanels are commonly installed in spaces such as individual rooms, floors, departments, or other defined zones, depending on the building's layout and electrical design.

LAERN MORE ABOUT  subpanel here: brainly.com/question/28260127

#SPJ11

Next
Submit Test
Web Design and Development Tools: Mastery Test
Drag each tile to the correct box
Match the DHTML component to its description

scripting language
markup language
document object model
text stylesheet language

HTML
JavaScript
CSS
DOM

Answers

Answer:

script=java

makeup=Html

css=text

dom=document

Explanation:

Answer:  

greatness0003- is correct

I hope this helps

BTW Plato

(proof)

NextSubmit TestWeb Design and Development Tools: Mastery TestDrag each tile to the correct boxMatch the

6.1. Careers and Areas in Computer Science

Match the potential work with the area in computer science.

Answers

Potential work in computer science can be matched with various areas of specialization within the field.

Computer science is a vast field that offers numerous career paths and specializations. Some of the areas of specialization in computer science include software development, database management, computer networking, cybersecurity, artificial intelligence, and machine learning.

Software developers design and develop software applications, while database administrators manage and organize data within computer systems. Computer network architects design and build computer networks, while cybersecurity experts protect computer systems and networks from unauthorized access.

Artificial intelligence and machine learning specialists develop algorithms that enable computers to learn and make decisions based on data. They also create intelligent systems that can automate tasks, such as speech recognition and natural language processing.

Overall, the potential work in computer science is vast and diverse, offering numerous career paths for individuals with different skills and interests.

Learn more about Software developers: https://brainly.com/question/3188992

#SPJ11

Examine the following declarations:


int area;
Point pt;


Which of the following is true?

a. both are primitive variables

b. area is a primitive variable, and pt is an object reference variable.

c. both are reference variables

d. area is an object reference variable, and pt is a primitive variable.

Answers

C. Both are reference variables

linear programming assumes that the profit from each activity is proportional to the level of that activity. t or f

Answers

The given statement ''linear programming assumes that the profit from each activity is proportional to the level of that activity'' is true.

What is meant by linear programming?Once a linear function is exposed to various restrictions, it is maximized or reduced using the mathematical modelling approach known as linear programming. In commercial planning, industrial engineering, and—to a lesser extent—the social and physical sciences, this method has proven helpful for directing quantitative decisions.The most well-known illustration of a linear programming issue is a business that must divide its resources between producing two distinct items. The items have varying time and money requirements, which are often scarce resources, therefore so are priced differently.Using a mathematical model with linearly correlated variables, linear programming seeks to maximize profits or minimize costs.

Learn more about linear programming refer to :

https://brainly.com/question/25828237

#SPJ4

How to create drop down list in excel with multiple selections.

Answers

Answer:

elect the cell or cells you want the drop-down list to appear in.

Click on the Data tab on Excel's ribbon.

Click on the Data Validation button in the Data Tools group.

In the Data Validation dialog, in the Allow: list select List.

Click in the Source: box.

Explanation:

PLEASE HELP ASAPP!!! WILL MARK BRAINLIEST! IF YOU KNOW PSEUDOCODE HELP PLEASE!!
ACSL WHAT DOES THIS PROGRAM DO (LOOPING)

PLEASE HELP ASAPP!!! WILL MARK BRAINLIEST! IF YOU KNOW PSEUDOCODE HELP PLEASE!! ACSL WHAT DOES THIS PROGRAM

Answers

The program outputs 11 numbers which are the first 11 Fibonacci numbers. The program uses a loop that goes through each number and checks if the sum of two values, "a" and "b", is equal to the loop variable "x".

What does this program do?

In the program, there is a "for" loop that iterates from 1 to 11. For each iteration, it inputs a number "n" and then calculates the value of "b" as the integer division of "n" by 10. If the condition "a + b == x" is satisfied, it outputs the value of "n".

Since the input values are the first 11 Fibonacci numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89), they will all be output because the condition "a + b == x" is always true.

To learn more about Fibonacci numbers, visit: https://brainly.com/question/14771443

#SPJ1

GUIDING QUESTIONS
1. What are two ways to effectively reach customers/clients?

Answers

Answer:

phone calls

Explanation:

when a customer comes and u keep their data and information.incase of anything u can likely reach them on phone

Identify the correct characteristics of Python numbers. Check all that apply.

1. Python numbers can be large integers.

2. Python numbers can be complex values such as 12B16cd.

3. Python numbers can be floating-point numbers.

4. Python numbers have numeric values.

5. Python numbers are created automatically.

Answers

Answer:

The answers are 1, 2, 3, and 4

Explanation:

i just did it on edge

Answer:

The answers are 1, 2, 3, and 4

Explanation:

im simply good

1.Which one of the following buttons returns a window to its original size?

A.
Maximize button

B.
Close button

C.
Minimize button

D.
Restore button
2.What is the name used to identify the pointer that is controlled by the mouse?

A.
Alert

B.
Boot

C.
Cursor

D.
Drag
3.What is the process called when information from your computer is transferred to another computer?

A.
Upload

B.
Copy

C.
Transfer

D.
Download
4.Which one of the following indicates a file's format?

A.
Icon

B.
Extension

C.
Platform

D.
Driver

5.What term refers to a single directory that can hold a collection of files? A. Platform B. Folder C. Extension D. Icon
6.6.
What term refers to a single directory that can hold a collection of files?

A.
Platform

B.
Folder

C.
Extension

D.
Icon
7.What is the common term used to describe a single computer document?

A.
Driver

B.
File

C.
Screenshot

D.
Icon
8.
What is the main piece of computer software on which every other piece of software relies?

A.
Desktop

B.
Operating system

C.
Database

D.
Driver
BUT DOES ANYONE HAVE AL 20 ANSWERSSSSS I'LL MARK YOU THE BRAINLIEST PLEASEEEE HELPPPP

Answers

Answer:

1. D

2.C

3. D

4. A

5. B

6.B

7.B or D

8.C

Explanation:

Not 100% sure about 3,4, 8

Who was the father of computer?????​

Answers

Answer:

Charles Babbage

Explanation:

Answer:

Charles Babbage

Explanation:

He created the computer in the early 19th century

Other Questions
Ano ang tawag sa mga salitang may salungguhit? Paano ito ginagamit? ++ (-6) = 3What number goes before the plus Simplify (x 4)(2x2 + 3x 5) Hank finds a hunk of something. It appears to be an element. When he tried to pull it into a wire, it shattered but it has a shiny luster. What is it likely to be? *MetalNonmetalMetalloid which of the following polynomials are quadratic Choose all answers that apply:4x^2+3x+1 x+y x^2+4x A schedule of reinforcement identical to the chained schedule except, like the mix schedule, the tandem schedule does not use discriminative stimuli with the elements in the chain. A line has a slope of 1 and passes through the point (7,5). What is its equation inslope-intercept form?Write your answer using integers, proper fractions, and improper fractions in simplest form. right please no bot or link all of the following are desirable traits of a hypothesis, except: select one: a. it is falsifiable b. it builds on previous knowledge c. it is complex d. it is predictive e. none of the above for which of the following goals would analkyzing the metadata be more approrpirate than alayzing the data determining the chronological order What sentence contains a dependent clause All changes saved5. While listening to the latest song by her favorite singer, Fatima cannot help but start tapping her foot on the floor.Which musical element is MOST likely Inspiring this foot-tapping behavior? A 81-kg woman walks to the top of the Empire State Building, 380 m above street level.What is the change in the gravitational potential energy of the system comprising the woman and Earth? Help :^ ;^;^;^;^;^;^; Find the coordinates of the centroid of the triangle with the given vertices.D(2,-8), E(2, -2), F(8, -2) Harold Jordan has always dreamed of owning his own split-level home nestled in the mountains. He has saved $50,000 to purchase the building site and is excited to begin looking for an appropriate site. His initial search turned up three properties he thinks would work: A. A 5-acre lot halfway up a mountain in a very rural area with an asking price of $35,000. B. A 3-acre lot on flat land in a small town with a great view of the mountains in the distance, with an asking price of $45,000. C. A 5-acre lot in gently rolling foothills, in a highly developed area, with an asking price of $40,000.Given this information, answer the following questions.1. What other factors should Mr. Jordan consider before he makes his final choice?2. If you were Mr. Jordan, which lot would you choose, and why? Which of the following is not a hybrid orbital? a. spb. sp c. sp d. sp The total length of these planks is 92 metres. Work out the number of planks of length 2 metres in Ben workshop. Which pair of angles are complementary but not adjacent? An asteroid (m = 1016 kg) hits the Earth. It goes from 35 km/s to zero in 0.24 s. What is the force of the asteroid on the Earth? What is the force of the Earth on the asteroid? Draw Diagram