While troubleshooting an Internet connection problem for your network, you restarted the modem and then the router. The router is now communicating with the Internet, which you can confirm by observing the blinking light on the router's WAN indicator. However, now your laptop is not communicating with the router. Order the commands below to fix the problem and confirm connectivity.
a. ping
b. ipconfig /renew
c. nslookup microsoft.com
d. ipconfig /release

Answers

Answer 1

Answer:

d. ipconfig /release

b. ipconfig /renew

a. ping

c. nslookup microsoft.com

Explanation:

A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

Basically, it is an electrical device or node that is designed to connect two (2) different networks (in different locations) together and allows them to communicate.

Generally, routers are configured using a standard routing protocol with an IP address as the default gateway.

Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.

Basically, a DHCP server is designed to automatically assign internet protocol (IP) address to network devices connected to its network using a preconfigured DHCP pool and port number 67.

On a related note, when a computer that is configured with DHCP cannot communicate or obtain an IP address from the DHCP server, the Windows operating system (OS) of the computer automatically assigns an IP address of 169.254.33.16, which typically limits the computer to only communicate within its network.

I. ipconfig /release

II.. ipconfig /renew

III. ping

IV. nslookup microsoft.com


Related Questions

A red team initiated a DoS attack on the management interface of a switch using a known vulnerability. The monitoring solution then raised an alert, prompting a network engineer to log in to the switch to diagnose the issue. When the engineer logged in, the red team was able to capture the credentials and subsequently log in to the switch. Which of the following actions should the network team take to prevent this type of breach from reoccurring?
A. Encrypt all communications with TLS 13
B. Transition from SNMPv2c to SNMPv3 with AFS-256
C. Enable Secure Shell and disable Telnet
D. Use a password manager with complex passwords

Answers

Answer:

Hence the answer is Option A Encrypt all communication with TLS 1 3.

Explanation:    

Transportation Layer Security (TLS 1 3)---->TLS stands for Transport Layer Security and is the successor to SSL (Secure Sockets Layer). TLS provides secure communication between web browsers and servers. The connection itself is secure because symmetric cryptography is used to encrypt the transmitted data.  

SNMPv3 Security with 256 bit AES encryption is not available for all devices. The net-snmp agent does not support AES256 with SNMPv3.so it is not the correct option.  

The best choice is an option a because TLS 1 3 because,  

TLS version 1 3 helped in removing all the insecure features such as:  

SHA-1

RC4

DES

3DES

AES-CBC

create a function that has an argument is the triple jump distance. It returns the estimate of vertical jump height. The world record for the triple jump distance is 18.29 meters by Johnathan Edwards. What's our prediction for what Edwards' vertical jump would be

Answers

Answer:

function predicting vertical  

def predict_vertical(triple):

       # using least squares model parameters

       ls_vertical = ls_slope*triple + ls_intercept

       return ls_vertical

# Johnathan Edwards prediction  

triple = 18.29 # m

vertical = predict_vertical(triple)

print("Edward's vertical jump prediction would be {:.2f} meters.".format(vertical))

plt.legend(['linear regression','least squares','data'])

plt.grid()

plt.show()

Explanation:

All of the following are true of using the database approach to managing data except Group of answer choices Decentralized management of data Minimal data redundancy Data integration and sharing

Answers

Answer:

Decentralized management of data

Explanation:

The database management approach is one approach based on the improved standard file solution with the use of DBMS and allows for the stimulus access of data with a large number of users.

A desktop computer is a type of mobile device.

a. true
b. false

Answers

Answer:B.false
Answer B

A desktop computer is a type of mobile device: B. False.

What is a desktop computer?

A desktop computer simply refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output that's usable by an end user.

Generally, desktop computers are fitted with a power supply unit (PSU) and designed to be used with an external display screen (monitor) unlike mobile device.

In conclusion, a desktop computer is not a type of mobile device.

Learn more about desktop computer here: brainly.com/question/959479

#SPJ9

Write a C program to input a character, then check if the input
character is digit, letter, or other character.

Answers

Answer:

// CPP program to find type of input character

#include <iostream>

using namespace std;

void charCheck(char input_char)

{

// CHECKING FOR ALPHABET

if ((input_char >= 65 && input_char <= 90)

|| (input_char >= 97 && input_char <= 122))

cout << " Alphabet ";

// CHECKING FOR DIGITS

else if (input_char >= 48 && input_char <= 57)

cout << " Digit ";

// OTHERWISE SPECIAL CHARACTER

else

cout << " Special Character ";

}

// Driver Code

int main()

{

char input_char = '$';

charCheck(input_char);

return 0;

}

Explanation:

// CPP program to find type of input character

#include <iostream>

using namespace std;

void charCheck(char input_char)

{

// CHECKING FOR ALPHABET

if ((input_char >= 65 && input_char <= 90)

|| (input_char >= 97 && input_char <= 122))

cout << " Alphabet ";

// CHECKING FOR DIGITS

else if (input_char >= 48 && input_char <= 57)

cout << " Digit ";

// OTHERWISE SPECIAL CHARACTER

else

cout << " Special Character ";

}

// Driver Code

int main()

{

char input_char = '$';

charCheck(input_char);

return 0;

}

Company A has a project plan for a new product under development. The product will be one of many released in the coming year. The plan, if disclosed, might give Company A's competition a market advantage. Which ISO 27002 classification level is most likely assigned to this document?
a) Public Documents
b) Proprietary
c) Highly Confidential
d) Top Secret

Answers

Answer:

Company A

The ISO 27002 classification level that is most likely assigned to this document is:

b) Proprietary

Explanation:

The ISO 27002 classification levels adopted by commercial organizations are Restricted (top secret is preferred in government circles), Confidential, Internal (or proprietary), and Public. Since the new product is under development, one of many, and most likely known to the project team, the project plan will be classified as Proprietary.  Company A designates this document as Proprietary or Internal to show that disclosure of the information to its competitors is not allowed.  This level of classification shows that Company A can establish intellectual property rights over the document.

The Lisp function LENGTH counts the number of elements in the top level of a list. Write a function ALL-LENGTH of one argument that counts the number of atoms that occur in a list at all levels. Thus, the following lists will have the following ALL-LENGTHs.
(A B C) => 3
((A (B C) D (E F)) => 6
(NIL NIL (NIL NIL) NIL ) => 5

Answers

Answer:

bc

Explanation:

I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right back and does not transfer. What is the likely cause of this issue?

a. hard drive is full

b. photos were taken in a different country

c. USB port is broken

d. the file structure of the 2 hard drives are not compatible

Answers

Your answer is D.

Hope this helps and if you could answer the question I just uploaded titled giving brainliest that would be great. Basically, what you have to do is research why the book titled the list of things that will not change and explain why it’s your favorite book based on the message it tells you! Go to my profile and go to questions.

The answer is D, What is the likely cause of this issue is that the file structure of the two hard drives are not compatible.

The file structure or file system, of a hard drive, tells the disk how to read, write and store information on the drive. Some file systems do not allow the disk to store any files and often do not display error messages. If we try to drag a file onto a hard drive with this kind of file structure, the action would simply not be performed. This can be fixed by formatting the disk partition into a new file system.

Option B states that the issue may be that the photos were taken in a different country. This is not the cause of the problem because regardless of where the pictures are taken, they are all stored in common formats such as:

JPEGPNGJFIF

Any external hard drive capable of storing images will have the ability to receive files in these formats as well as many other image formats. For this reason, option B is False.

The question states that you were able to connect the external Hard drive and drag files onto it, though unsuccessfully. This tells us that the USB port is working as intended, if it were not working, it would not display the Hard drive onto the computer and we would not be able to drag files to it. Therefore, option C is false

Insufficient Hard drive storage space is a common issue in not being able to transfer files between hard drives. However, if this were the case, the user would be shown a message displaying the error. The message may look like:

"Insufficient space on the disk.""The Disk is full.""Not enough memory to complete this action"

The exact wording may vary depending on the operating system in use. Since the question states that the files simply "bounces back" without an error message displaying, we can infer that option A is false.

For more help with Hard drive issues see: https://brainly.com/question/14254444?referrer=searchResults

An administrator needs to protect rive websites with SSL certificates Three of the websites have different domain names, and two of the websites share the domain name but have different subdomain prefixes.
Which of the following SSL certificates should the administrator purchase to protect all the websites and be able to administer them easily at a later time?
A . One SAN certificate
B . One Unified Communications Certificate and one wildcard certificate
C . One wildcard certificate and two standard certificates
D . Five standard certificates

Answers

Answer:

Option A (One SAN certificate) is the right answer.

Explanation:

A vulnerability management certificate that permits many domain identities to be safeguarded by such a singular or unique certification, is considered a SAN certificate.Though on the verge of replacing common as well as accepted security credentials with either of these de-facto certifications.

Other alternatives are not connected to the given scenario. Thus the above option is correct.

Question 3 of 5.
Which of the following option(s) explain the need for ETL?
O ETL provides a method of moving the data from various sources into a data warehouse.
ETL is a predefined process for accessing and manipulating source data into the target database.
Allow verification of data transformation, aggregation and calculations rules.
O All of the above

Answers

The correct option is "All of the above".

ETL simply means “extract, transform, and load.” ETL is a vital process in the strategies of data integration.

ETL also allows for verification of data transformation, aggregation and calculations rules.

Furthermore, ETL enables companies to be able to gather data from different sources and then consolidate the data hats gathered into a single and centralized location.

ETL also allows different types of data to be able to work together.

In conclusion, based on the information given above, the answer will be All of the above.

Read related link on:

https://brainly.com/question/13333461

Which factors are involved in search engine optimization​

Answers

Answer:

A Secure and Accessible Website.

Page Speed (Including Mobile Page Speed)

Explanation:

Fit a boosting model to the training set with Purchase as the response and the other variables as predictors. Use 1,000 trees, and a shrinkage value of 0.01. Which predictors appear to be the most important

Answers

Answer and Explanation:

For the training set consist of 1000 observations, let's have a set consist of the observations such as sets.seed train boost.caravan gbm(Purchase., data = Caravan.train , distribution = "gaussian" , n trees = 1000 summary(boost.caravan) The tree classification such as tree(formula = Purchase data - train where variable are used in tree construction and number of terminal nodes 0 and deviance is 0.7 and error is 0.165

Create a class, CallClass, with two methods to show call by value and call by reference. One method has two parameters that are any primitive types, whereas the other has a parameter that is an object of any class. Create a CallClassTest class that calls the two methods with proper arguments to show call by value and call by reference. You do not need to read the values of parameters from the screen. (5 pts)

Answers

Answer:

The output file is given below.

Explanation:

Please visit gotit-pro.com to get complete working code.

Book information (overriding member functions) Given main() and a base Book class, define a derived class called Encyclopedia. Within the derived Encyclopedia class, define a PrintInfo() function that overrides the Book class' PrintInfo() function by printing not only the title, author, publisher, and publication date, but also the edition and number of volumes. Ex. If the input is: The Hobbit J. R. R. Tolkien George Allen & Unwin 21 September 1937 The Illustrated Encyclopedia of the Universe James W. Guthrie Watson-Guptill 2001 2nd 1 the output is: Book Information: Book Title: The Hobbit Author: J. R. R. Tolkien Publisher: George Allen & Unwin Publication Date: 21 September 1937 Book Information: Book Title: The Illustrated Encyclopedia of the Universe the output is: Book Information: Book Title: The Hobbit Author: J. R. R. Tolkien Publisher: George Allen & Unwin Publication Date: 21 September 1937 Book Information: Book Title: The Illustrated Encyclopedia of the Universe Author: James W. Guthrie Publisher: Watson-Guptill Publication Date: 2001 Edition: 2nd Number of Volumes: 1 Note: Indentations use 3 spaces. LAB ACTIVITY 11.14.1: LAB: Book information (overriding member functions) File is marked as read only Current file: main.cpp cin >> numVolumes; main.cpp Book.h 25 26 27 28 29 30 31 32 33 34 35 36 myBook. SetTitle(title); myBook. SetAuthor(author); myBook. SetPublisher(publisher); myBook.SetPublicationDate(publicationDate); myBook.PrintInfo(); Book.cpp Encyclopedia.h myEncyclopedia. SetTitle(eTitle); myEncyclopedia. SetAuthor(eAuthor); myEncyclopedia. SetPublisher(ePublisher); myEncyclopedia. SetPublicationDate(ePublicationDate); Encyclopedia.cpp

Answers

Answer:

hansnmakqkai8aiaiakqklqlqlqlqlqqqw

Phân tích vai trò của các yếu tố trong biên tập Audio và Video

Answers

Answer:

Answer to the following question is as follows;

Explanation:

A visual language may go a long way without even text or narrative. Introductory angles, action shots, and tracker shots may all be utilised to build a narrative, but you must be mindful of the storey being conveyed at all times. When it comes to video editing, it's often best to be as cautious as possible.

The program is the set of instructions a computer obeys

Answers

Answer:

True

Explanation:

a program is basicly just a list of commands you can run over and over again.

AWS's EC2 is primarily considered which type? OA OB. Maas O Claas O D. None of the above O E. Serverless​

Answers

Answer:

IaaS (Infrastructure as a Service)

"Amazon takes the responsibility of networking, storage, server and virtualization and the user is responsible for managing the Operating System, middleware, runtime, data and application."

A hierarchy chart can be helpful for a. planning the functions of a program b. naming the functions of a program c. showing how the functions of a program relate to each other d. all of the above e. a and c only

Answers

Answer:

Hence the correct options are option B and option C.

Explanation:  

Hierarchy Chart means top to bottom structure 0f a function or a program or an organization.  

Planning the functions of a program means deciding beforehand that what are the functions of a program and what to try to do and when to try to, hierarchy Charts are often helpful In doing/knowing this all.

   Showing how the functions of a program relate to every other means what's the connection between two functions for instance if we have a hierarchical chart of a corporation member then we'll have the connection among the members of the team i.e., first, we'll have CEO, then Manager then team/ project lead then team members and by using hierarchical chart ready to " we will be able to identify the connection among them. during a similar way, we will have a relationship among the functions of a program using the hierarchical chart.

kỹ năng học tập ở bậc đại học là gì

Answers

Answer:

please translate

Thank you ✌️

list two ways to insert a chart in powerpoint

Answers

Answer:

1st way: On the Insert tab, in the Illustrations group, click Chart. In the Insert Chart dialog box, click a chart, and then click OK.

2nd way: Click INSERT > Chart. Click the chart type and then double-click the chart you want.

There must be security policies in place to set core standards and requirements when it comes to encrypted data.

a. True
b. False

Answers

You’re best answer has to be A

Brooke is trying to save enough money in the next year to purchase a plane ticket to Australia. Every month Brooke saves $200. Write a for loop that displays how much money Brooke will save at the end of each month for the next 12 months.

Answers

Answer:

var monthlyDeposit = 200;

var accountBalance = 0;

for(var i = 0;i<12;i++){

   accountBalance += monthlyDeposit;

   console.log(accountBalance);

}

As the first step, load the dataset from airline-safety.csv by defining the load_data function below. Have this function return the following (in order):
1. The entire data frame
2. Total number of rows
3. Total number of columns
def load_data():
# YOUR CODE HERE
df, num_rows, num_cols

Answers

Answer:

import pandas as pd

def load_data():

df = pd.read_csv("airline-safety.csv')

num_rows = df.shape[0]

num_cols = df.shape[1]

return df, num_rows, num_cols

Explanation:

Using the pandas python package.

We import the package using the import keyword as pd and we call the pandas methods using the dot(.) notation

pd.read_csv reads the csv data into df variable.

To access the shape of the data which is returned as an array in the format[number of rows, number of columns]

That is ; a data frame with a shape value of [10, 10] has 10 rows and 10 columns.

To access the value of arrays we use square brackets. With values starting with an index of 0 and so on.

The row value is assigned to the variable num_rows and column value assigned to num_cols

Argue whether we can infer anything about a candidate’s ability to work in a professional environment based on his or her resume’s formatting.
Compare how you would address a resume with wacky fonts to how you would respond to grammatical errors in a resume.

Answers

Answer:

when dressing feaded back is postive and then list areas of inprovmenr to met the job requirements

Explanation:

What does the statement that follows do? double gallons[6] = { 12.75, 14.87 }; a. It assigns the two values in the initialization list to the first two elements but leaves the other elements with the values currently in memory. b. It assigns the two values in the initialization list to the first and second elements, third and fourth elements, and fifth and sixth elements. c. This statement is invalid. d. It assigns the two values in the initialization list to the first two elements and default values to the other elements.

Answers

Answer:

It assigns the two values in the initialization list to the first two elements and default values to the other elements.

Explanation:

Given

The array initialization

Required

Interpret the statement

double gallons[6] implies that the length/size of the array gallons is 6.

In other words, the array will hold 6 elements

{12.75, 14.87} implies that only the first two elements of the array are initialized ; the remain 4 elements will be set to default 0.

. Write programming code in C++ for school-based grading system

Answers

Explanation:

The grade must be calculated based on following pattern:

Average Mark RangeGrade91-100A181-90A271-80B161-70B251-60C141-50C233-40D21-32E10-20E2

Calculate Grade of Student in C++

To calculate grade of a student on the basis of total marks in C++ programming, you have to ask from user to enter marks obtained in 5 subjects. Now add marks of all the 5 subjects and divide it by 5 to get average mark. And based on this average mark, find grade as per the table given above:

// C++ Program to Find Grade of Student // -------codescracker.com------- #include<iostream> using namespace std; int main() { int i; float mark, sum=0, avg; cout<<"Enter Marks obtained in 5 Subjects: "; for(i=0; i<5; i++)

An organization needs to integrate with a third-party cloud application. The organization has 15000 users and does not want to allow the cloud provider to query its LDAP authentication server directly. Which of the following is the BEST way for the organization to integrate with the cloud application?

a. Upload a separate list of users and passwords with a batch import.
b. Distribute hardware tokens to the users for authentication to the cloud
c. Implement SAML with the organization's server acting as the identity provider.
d. Configure a RADIUS federation between the organization and the cloud provider

Answers

Answer:

The BEST way for the organization to integrate with the cloud application is:

c. Implement SAML with the organization's server acting as the identity provider.

Explanation:

Implementing SAML (Security Assertion Markup Language) integrations will provide more security to the organization (identity provider) as users' credentials are exposed to fewer parties.  SAML authenticates the users to the cloud application provider.  SAML enables the organization to pass authorization credentials to the service provider by transferring the users' identities to the service provider.

After reading the background, please work on the following problem: a. The source process reads information from a file (Therefore, you need to prepare a small text file for testing purpose). b. The source process calls fork() to create the filter process. c. The filter process reads information from the source process (passed via an anonymous pipe), converts the uppercase characters to lowercase ones and vice versa, and then prints out the converted characters to the screen.

Answers

Answer:

Explanation:

The following code is written in Java. It has the main method (source process) and a function called fork() which contains the filter process as described in the question. fork() takes in the file information as a parameter and prints out the information to the screen. The test can be seen with the output in the attached image below.

import java.io.File;

import java.io.FileNotFoundException;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       String data = "";

       try {

           File myObj = new File("C:\\Users\\Gabriel2\\AppData\\Roaming\\JetBrains\\IdeaIC2020.2\\scratches\\input.txt"); //USE YOUR FILE LOCATION

           Scanner myReader = new Scanner(myObj);

           while (myReader.hasNextLine()) {

               data += myReader.nextLine();

               data += "\n";

           }

           myReader.close();

       } catch (FileNotFoundException e) {

           System.out.println("An error occurred.");

           e.printStackTrace();

       }

       System.out.println("Original: \n" + data);

       fork(data);

   }

   public static void fork(String data) {

       String output = "";

       for (int i = 0; i < data.length(); i++) {

           if (Character.isUpperCase(data.charAt(i)) == true) {

               output += Character.toLowerCase(data.charAt(i));

           } else if (Character.isLowerCase(data.charAt(i)) == true) {

               output += Character.toUpperCase(data.charAt(i));

           } else {

               output += data.charAt(i);

           }

       }

       System.out.println("Modified: \n" + output );

   }

}

Which of the following views is the best view to use when setting transition effects for all slides in a presentation?

Answers

Answer:

Slide sorter view

Answer:

Slide sorter view !!!!!

Given the following array definition, write a constant declaration named ArraySize that automatically calculates the size in bytes, of the array:
newArray DWORD 10,20,30,40,50
a) arraysize=(S-newArray)
b) arraysize#(S-new,Array)/2
c) arraySize- (S-newArray)/4
d) arraySize- (S-arraySize)

Answers

Answer:

ArraySize = ($ - newArray)

Explanation:

Given

Array name: newArray

Type: DWORD

Required

The size of the array in bytes

The following formula is used to calculate the size of an array in assembly language.

Variable = ($-Array name)

So, we have:

ArraySize = ($ - newArray)

Where ArraySize is the variable that holds the size of newArray (in bytes)

Other Questions
Chocolate beans are packed in 250 g and 750 g packages. The number of 250 g packages and 750 g packages are in the ratio 1 : 2. If two of the 750 g packages are replaced into 250 g packages, then the ratio becomes 5 : 3. Finda) the original number of 250 g packages,b) the total mass of the chocolate beans. Can SOMEONE PLEASE HELP ME? I really need to get this work done by tonight. PLEASE From whom does the Bill of Rights protect Complete the remainder Lewis Structures are used to describe the covalent bonding in molecules and ions. Draw a Lewis structure for NO3- and answer the following questions based on your drawing. 1. For the central nitrogen atom: The number of lone pairs = ________The number of single bonds=_______ The number of double bonds= ______2. The central nitrogen atom : plz help I will give Brianly A pair of linear equations is shown below: y = x + 1 y = 2x + 4 Which of the following statements best explains the steps to solve the pair of equations graphically? (4 points) Select one: a. On a graph, plot the line y = x + 1, which has y-intercept = 1 and slope = 1, and y = 2x + 4, which has y-intercept = 2 and slope = 4, and write the coordinates of the point of intersection of the two lines as the solution. b. On a graph, plot the line y = x + 1, which has y-intercept = 1 and slope = 1, and y = 2x + 4, which has y-intercept = 1 and slope = 4, and write the coordinates of the point of intersection of the two lines as the solution. c. On a graph, plot the line y = x + 1, which has y-intercept = 1 and slope = 1, and y = 2x + 4, which has y-intercept = 2 and slope = 2, and write the coordinates of the point of intersection of the two lines as the solution. d. On a graph, plot the line y = x + 1, which has y-intercept = 1 and slope = 1, and y = 2x + 4, which has y-intercept = 4 and slope = 2, and write the coordinates of the point of intersection of the two lines as the solution. Are the phrases very interestingandconsuming synonomous can someone help me out ideas de como organizar una fiesta de cumpleaos de un padre yo s pero quiero ideas sugerencia me invian con images y acesorio. de introduccin y final. For a certain item, the cost-minimizing order quantity obtained with the basic EOQ model is 350 units, and the total annual inventory (holding and order) cost is $1050. What is the inventory holding cost per unit per year for this item 7 days 8 hours 20 minutes- 4 days 10 hours 30 minutes2 days 21 hours50 minutes3 days 2 hours10 minutes7 days 8 hours20 minutesJ 11 days 8 hours50 minutesK none of these A projectile is launched straight upwards at 75 m/s. Three seconds later, its velocity is...? if tenths of 5 + sqrt 11 is A and 5 - sqrt 11 is B and C is A+B. find c.help me plzz! A machine costing $56,894 with a 6-year life and $51,236 depreciable cost was purchased January 1. Compute the yearly depreciation expense using straight-line depreciation. Round your answer to the nearest whole dollar. 1. Find(x) + g(x)4 options to pick from Yo ____________________ ayer de mi viaje a la playa A poll of 2,060 randomly selected adults showed that 89% of them own cell phones. The technology display below results from a test of the claim that 91% of adults own cell phones. Use the normal distribution as an approximation to the binomial distribution, and assume a 0.01 significance level to complete parts (a) through (e).Test of p=0.91 vs p0.91Sample X N Sample p 95% CI Z-Value p-Value1 18332,060 0.889806 ( 0.872035 , 0.907577 ) ~ 3.20 0.001a. Is the test two-tailed, left-tailed, or right-tailed? Left-tailed test Two-tailed test Right tailed testb. What is the test statistic?The test statistic is _____ (Round to two decimal places as needed.)c. What is the P-value?The P-value is _____ (Round to three decimal places as needed.)d. What is the null hypothesis and what do you conclude about it?Identify the null hypothesis.A. H0:p0.91D. H0:p=0.91. A and B are 0.200m apart in an electric field. If 800J of work are reuqired to move a 2.00 Columb charge from A to B, what is the electric field stregth? An overhead variance report includes which of the followings: _________a. Variable and fixed flexible budget costs b. Variable and fixed actual results c. Variable and fixed sales results d. Variable and fixed variances Identify the X intercept and the yIntercept of the line 4x-2y=-12