Answer is Bit defender Internet security
B
Answer:
- The graph of the function is attached below.
- The x-intercepts will be: (2, 0), (-2, 0)
- The y-intercept will be: (-20, 0)
Explanation:
Given the function

As we know that the x-intercept(s) can be obtained by setting the value y=0
so

switching sides

Add 20 to both sides


Dividing both sides by 5





so the x-intercepts will be: (2, 0), (-2, 0)
we also know that the y-intercept(s) can obtained by setting the value x=0
so



so the y-intercept will be: (-20, 0)
From the attached figure, all the intercepts are labeled.
The text that is heavier or darker than other text in a document is considered Bold.
Hope this helped!~
Yes. Yes I would classify myself as the nugget of the chicken thank you for asking me.
Answer:
a. 1 is a packet, 2 is data, 3 is a frame.
Explanation:
And what is not mentioned is segment which used TCP/UDP and is part of Transport layer. The packet carries the destination and sender IP address, and is part of the Network Layer. The frame has the Mac address of destination device and senders device and is part of data link layer.
Hence segment has no IP address, hence b. is not correct. Also, data cannot have the IP Address, and Frame has the MAC address, Hence, the above answer. And this arrangement is part of Data Encapsulation.
Also keep in mind data can be anything like a series of bits, or any and it can or not have a header.