a company has an application hosted in an amazon ecs cluster behind an application load balancer. the solutions architect is building a sophisticated web filtering solution that allows or blocks web requests based on the country that the requests originate from. however, the solution should still allow specific ip addresses from that country. which combination of steps should the architect implement to satisfy this requirement?

Answers

Answer 1

To satisfy the requirement of allowing or blocking web requests based on the country of origin while still allowing specific IP addresses from that country.

1. Use an Amazon Elastic Container Service (ECS) cluster: Ensure that the company's application is hosted in an Amazon ECS cluster.

2. Set up an Application Load Balancer (ALB): Configure an ALB to distribute incoming web requests across the instances in the ECS cluster.

3. Implement a sophisticated web filtering solution: Develop or use a web filtering solution that can identify the country of origin for incoming web requests.

4. Define country-specific rules: Configure the web filtering solution to allow or block web requests based on the country of origin.

5. Enable IP address whitelisting: Modify the web filtering solution to allow specific IP addresses from the allowed countries. Create a whitelist that includes the desired IP addresses, ensuring that these addresses bypass the country-based blocking rules.

6. Test and refine the solution: Validate the web filtering solution by testing it with different web requests originating from various countries. Refine the rules as necessary to ensure the desired behavior is achieved.

To know more about IP  visit:

https://brainly.com/question/31835174

#SPJ11


Related Questions

you are given a dataframe consisting of three columns and four rows. a ufunc is then applied to that dataframe and another dataframe is outputted. how many columns are present in that final dataframe

Answers

If a person is given a dataframe consisting of three columns and four rows. the columns that are present in that final dataframe is 7.

What is a DataFrame?

A DataFrame is known to be a term that connote a kind of a data structure that put together data into a kind of a 2-dimensional table that is said to be made up of rows and columns, such like a spreadsheet.

Note that DataFrames are said to be one of the most popular data structures that is said to be used in modern data analytics due to the fact that they are a flexible and good way of saving and working with data.

Hence, If a person is given a dataframe consisting of three columns and four rows. the columns that are present in that final dataframe is 7.

Learn more about  data frame from

https://brainly.com/question/24024733

#SPJ1

ons-Office 2019 A-NPS
To be more efficient in formatting tasks, it is important to follow best practices when designing type. Which scenar
show the applications of best practices when designing type? Check all that apply.
Joe uses an 8-point font.
Angelo uses one type of font in his document.
O Jeremiah underlines words for emphasis.
Akilah indents and adds space between her paragraphs.
Amy uses the hyphenation feature in her justified paragraphs.

Answers

The scenario which shows the applications of best practices are:

Angelo uses one type of font in his document.

Amy employs hyphenation in her justified paragraphs.

What do you mean by application?

An application is a computer software package that performs a specified function directly for an end user or, in certain situations, for another application. It is also known as an application programme or application software. An application can be a single programme or a collection of programmes. The programme is a set of procedures that allows the user to operate the application.

Word's hyphenation tool allows the insertion of line breaks and hyphens within words, making her justified paragraphs more clear and organised.

So,B and E are the right answers.

To learn more about application

https://brainly.com/question/17290221

#SPJ13

Anyone knows how to write a code to solve the following problem?
A idea I have is to map the bottom square ontop the top square starting from top left to bottom right, but m unsure if thats achievable
Language preferably in C++, java and python is also accepted

Anyone knows how to write a code to solve the following problem?A idea I have is to map the bottom square
Anyone knows how to write a code to solve the following problem?A idea I have is to map the bottom square

Answers

Answer:

import re

def solve(n, painting, k, stamp):

   # define a function to check if the stamp is inside the painting

   def is_in_painting(i, j):

       return i >= 0 and j >= 0 and i + k <= n and j + k <= n

   

   # define a function to check if the stamp matches the painting

   def matches_painting(i, j):

       for x in range(k):

           for y in range(k):

               if painting[i+x][j+y] != stamp[x][y]:

                   return False

       return True

   

   # try to match the stamp in each position

   for i in range(n):

       for j in range(n):

           if is_in_painting(i, j) and matches_painting(i, j):

               return True

   return False

# read in the input

input_string = """4

2

**

.*

1

*

3

.**

.**

***

2

.*

**

3

...

.*.

..."""

# parse the input string

input_lines = input_string.strip().split('\n')

n = int(input_lines.pop(0))

painting = [list(line) for line in input_lines[:n]]

input_lines = input_lines[n:]

k = int(input_lines.pop(0))

stamp = [list(line) for line in input_lines[:k]]

# solve the problem

if solve(n, painting, k, stamp):

   print("YES")

else:

   print("NO")

Explanation:

i should down-edit my email replies by

Answers

Answer:

Removing everything not necessary to the ongoing conversation.

Explanation:

Down-editing your email by removing everything except the content that is necessary to the ongoing conversation, and then responding point-by-point, helps to maintain clarity in your ongoing conversations.

You're welcome, make sure to follow me! <3

For each scenario, choose ONLY ONE BEST out of confidentiality, integrity, and availability, and describe a defensive measure to either prevent or detect the security violation. - John copies Mary's homework. - Paul crashes Linda's system. - Carol changes the amount of Angelo's check from $100 to $1000. - Gina forges Roger's signature on a deed. - Rhonda deletes all web services from university's web servers. - Henry spoofs Julie's IP address to gain access to her computer

Answers

John copies Mary's homework Best Security Principle: Confidentiality Defensive Measure: Use individualized assignments and implement strict access controls to prevent unauthorized access to homework submissions.

Additionally, employ plagiarism detection tools to identify potential copying instances. Paul crashes Linda's system: Best Security Principle: Availability Defensive Measure: Implement robust intrusion detection and prevention systems (IDPS) to detect and block malicious activities targeting Linda's system. Regularly update and patch the system's software and hardware components to prevent known vulnerabilities that can be exploited to crash the system. Carol changes the amount of Angelo's check from $100 to $1000: Best Security Principle: Integrity Defensive Measure: Implement strong access controls and segregation of duties in financial systems. Require dual authorization for modifying critical financial transactions and implement thorough audit trails to track any changes made to check amounts or financial records. Gina forges Roger's signature on a deed: Best Security Principle: Integrity

learn more about homework here :

https://brainly.com/question/24422678

#SPJ11

Write a letter to your friend explaining about the geographical confitions of Nepal's hilly region​

Answers

I don’t know your friend so you should be able to answer

Answer:

I don't know............

A message is sent over a noisy channel. The message is a sequence x1​,x2​,…,xn​ of n bits (xi​∈(0,1)). Since the channel is noisy, there is a chance that any bit might be corrupted, resulting in an error (a 0 becomes a 1 or vice versa). Assume that the error events are independent. Let p be the probability that an individual bit has an error (0

Answers

The probability of at least one error occurring in the message is 1 minus the probability of no errors, which is given by 1 - (1 - p)^n.

The probability that an individual bit is transmitted without error is (1 - p), where p is the probability of an error occurring for each bit. Since the error events are assumed to be independent, the probability of no errors occurring in all n bits is the product of the probabilities of each bit being transmitted without error:

P(no errors) = (1 - p) * (1 - p) * ... * (1 - p) (n times)

= (1 - p)^n

On the other hand, the probability of at least one error occurring in the n bits is equal to 1 minus the probability of no errors:

P(at least one error) = 1 - P(no errors)

= 1 - (1 - p)^n

To know more about probability

https://brainly.com/question/31828911

#SPJ11

How much would it cost to get the screen replaced on a Moto G7?

Answers

If you know enough about tech you can buy a replacement screen online for like $40.00 and do it yourself or might be around like $100 to get it fixed, depends on the place you go too.

Select the correct answers.
Which are the benefits of leveraging web technologies?
processing of large amounts of data
more manpower
better marketing and customer service
increased production costs
difficulty in handling customer complaints

Select the correct answers.Which are the benefits of leveraging web technologies?processing of large

Answers

Answer:

Explanation:

Select the correct answers.

Which are the benefits of leveraging web technologies?

1) Processing of large amounts of data

2) Better marketing and customer service

The following program generates an error. Why? const int NUM_ELEMENTS 5; vector userVals(NUM_ELEMENTS); unsigned int i; user Vals. At (0) user Vals. At(1) 7; user Vals. At (2) 4; for (i = 0; i < NUM_ELEMENTS; ++i) cout << userVals. At(i) << endl; 3 a) Variable i is declared as an unsigned integer. B) The for loop tries to access an index that is out of the vector's valid range.

c) The vector user Vals has 5 elements, but only 3 have values assigned. D) The integer NUM_ELEMENTS is declared as a constant

Answers

The program generates an error because of option C: The vector userVals has 5 elements, but only 3 have values assigned. This means that when the for loop tries to access the elements at index 3 and 4, it will generate an error because those elements have not been assigned a value.

To fix this error, you can either assign values to all 5 elements of the vector before the for loop, or you can change the NUM_ELEMENTS constant to 3 so that the for loop only iterates over the elements that have been assigned values.

Here is the corrected program:

```

const int NUM_ELEMENTS = 3;

vector userVals(NUM_ELEMENTS);

unsigned int i;

userVals.at(0) = 5;

userVals.at(1) = 7;

userVals.at(2) = 4;

for (i = 0; i < NUM_ELEMENTS; ++i) {

cout << userVals.at(i) << endl;

}

```

This program will now run without errors and will output the values 5, 7, and 4.

Learn more about programming:

brainly.com/question/26134656

#SPJ11

Which of these can expose a computer to a virus? Check all that apply.

downloads
e-mails
social media
video chats
websites

Answers

Answer:

downloads,emails,and websites

Explanation:

All data collected in a study are referred to as the.

Answers

Answer:

Data Collection or Quantitative data

how can you balance multiple content distribution goals?Identify your primary goal against any secondary goals.Assign a DRI for each of your goals.Identify your primary goal and ignore all other goals.Revise your goal because you can’t have multiple initiatives.

Answers

A content distribution strategy is a strategy that assists an organization in disseminating its material, whether it is promoting a new blog post or distributing a new eBook.

What is the function of content distribution?

Publishing content only gets you so far; a content distribution plan ensures that it is viewed by as many people as possible. The three very most common forms of distribution channels are owned, earned, and paid. The intersections of all three categories are there. To maximize their efficacy and achieve your company's objectives, you may employ one or all of the channels.

How can you balance multiple content distribution goals?

• Identify your primary goal against any secondary goals.

• Assign a DRI for each of your goals.

• Identify your primary goal and ignore all other goals.

• Revise your goal because you can’t have multiple initiatives.

To know more about content distribution, Check out:

https://brainly.com/question/29310538

#SPJ4

the main work area of the computer is the

Answers

Answer:

Desktop

Explanation:

The desktop is the main work area of your computer, and will likely be the most visited area of your computer. Your desktop appears every time you log into your account, and contains icons and shortcuts to your most used programs and files.

How do they disguise the cameras placed around the secret cove?

Answers

Answer:

Portions were filmed secretly in 2007 using underwater microphones and high-definition cameras disguised as rocks.

Portions were filmed secretly using underwater microphones and high-definition cameras disguised as rocks.

if we do not reject the null hypothesis when the null hypothesis is in error, then we have made a

Answers

We commit a Type II error when we fail to reject the null hypothesis when it is in error.

When we are testing a hypothesis, we make the initial assumption that there is no population link or mean difference. It is known as the null hypothesis. The alternative hypothesis, which is the assumption that contradicts the null hypothesis, is another hypothesis that is coupled with the null hypothesis. For hypothesis testing, there are two different kinds of errors: Type I error and Type II error. When you reject a null hypothesis that is true, you commit a type I error. You thus receive falsely positive results. When a false null hypothesis is not rejected, type II error occurs. You thus receive falsely negative findings.

Learn more about Null hypothesis here:

brainly.com/question/30161566

#SPJ4

Compter History Large Resume Include: the beginnings of the computer and its development during the years The events of computer development by dates (chronologically)

Answers

Answer:

The development of computers from the beginning to what we see now is called the computer generations. It is gradual advancement in the technology in the making of the computer.

Explanation:

The generation in computer technology can be defined as the development or the change in the technology in the computer as it was used. There were  five generations of computer development. They were :

1. First Generation computers

   In this generation, vacuum tubes was used in the circuits. It dated from 1946 to 1959.

2. Second Generation computers

  These are transistors based computers. This generation ranges from 1959 to 1965.

3. Third Generation computers  

    This generation computers were Integrated circuit based. The generation stared in 1965 and ended in 1971.

4. Fourth Generation computers

   The computers of this generation used VLSI microprocessor in the circuits. The period of the 4th generation computers are from 1971 to 1980.

5. Fifth Generation computers

   The computers of this generation used ULSI microprocessor in the circuits. The 5th generation computers started from 1980s.

6.36. Four kilograms of steam in a piston/cylinder device at 400kPa and 175 ∘
C undergoes a mechanically reversible, isothermal compression to a final pressure such that the steam is just saturated. Determine Q and W for the process.

Answers

To determine Q (heat transfer) and W (work) for the given process, we can use the first law of thermodynamics:

Q = ΔU + W

where ΔU is the change in internal energy of the system.

For an isothermal process, the change in internal energy (ΔU) is zero since the temperature remains constant. Therefore, the equation simplifies to:

Q = W

Now let's calculate the work done:

Work done (W) = P_initial * V_initial * ln(V_final / V_initial)

Given:

P_initial = 400 kPa

V_initial = (mass of steam) / (density of steam at initial conditions)

V_final = (mass of steam) / (density of saturated steam at final pressure)

To calculate the specific volume (V), we can use the steam tables or properties of water and steam at different conditions.

Once we have the specific volumes at initial and final conditions, we can calculate W using the equation mentioned above.

To calculate Q, we can use Q = W since it is an isothermal process.

To know more about temperature visit-

https://brainly.com/question/14532989

#SPJ11

a technology specialist attempts the recovery of a maliciously deleted folder of important data. the specialist uses file carving to try to retrieve the missing data. how does carving handle the data retrieval process?

Answers

Milling manages the data retrieval process by means of By analyzing the disk at sector page/level.

This allows the specialist to recover data even if the original directory structure is no longer available.

File recovery through carving

File recovery is a critical task for a variety of users, from home users to businesses. Many users have experienced the disappointment of losing an important file due to:

Software failureComputer virusAccidental overwritingData corruption

Making file recovery an essential skill for any user. One of the most common techniques for file recovery is carving.

Learn more about File recovery:

https://brainly.com/question/29312407

#SPJ4

define the term cyber space​

Answers

Answer: Cyberspace, is an amorphous, supposedly virtual world created by links between computers, Internet-enabled devices, servers, routers, and other components of the Internet’s infrastructure

Why do IT professionals have strict legal and ethical standards?

A. The credentials they hold to perform their job.
B. The oath they took when they began their career.
C. The pressure put on them to behave a certain way.
D. The strategic role they play in an organization.

Answers

Answer:

The answer is B: The oath they took when they began their career.

Explanation:

What's the technique of drawing a 3D object with one vanishing point?​

Answers

I don’t no it brother n I was searching for this answer can u plz tell me
A one-point perspective drawing means that the drawing has a single vanishing point, usually (though not necessarily) directly opposite the viewer's eye and usually (though not necessarily) on the horizon line. All lines parallel with the viewer's line of sight recede to the horizon towards this vanishing point.

One Point Perspective is a type of linear perspective that uses a single vanishing point to create the illusion of depth in a work of art.
Parallel – Parallel lines are lines that never touch… even if they are extended indefinitely.
Horizontal Lines – Lines drawn from side to side level with the horizon.

Which of the following should you consider when
choosing a file format? Check all of the boxes that
apply.
the need for future access
the need for privacy
the location of the file author
the need for digital preservation

Answers

Answer:

1    ,   4

Explanation:

A file extension is also known as the file format. The correct option are 1 and 4.

What is a file format?

A file extension, often known as a file format, is the structure of a file in terms of how the data within the file is arranged on a computer. A file name extension frequently indicates a certain file format as part of a file's name (suffix).

A file format is chosen on the basis of the following key points,

The need for future accessThe need for digital preservation

Hence, the correct option are 1 and 4.

Learn more about File Format:

https://brainly.com/question/21435636

#SPJ2

What is a mortgage?
O It is an unsecured loan used to purchase a car.
O It is a secured loan used to purchase a car.
O It is an unsecured loan used to purchase a home.
O It is a secured loan used to purchase a home.

Answers

D is the answer. Have a good day!

Answer:  It is a secured loan used to purchase a home.

Explanation: i took the test.......

Hear the sledges with the bellsâ€" silver bells! what a world of merriment their melody foretells! how they tinkle, tinkle, tinkle, in the icy air of night! which device of figurative language does the line in bold use? alliteration hyperbole idiom onomatopoeia

Answers

The figurative language does the line in bold use is metaphor. A metaphor is a figure of speech that uses non-literal language to describe an item or action in order to clarify a point or draw a comparison.

A metaphor is a figure of speech in which a word or phrase designating one type of object or action is used in place of another to imply a likeness or analogy between them. For example, the phrase "you're a peach" compares the person being addressed to a peach and implies that the person is pleasing or delightful in the same way that a peach is pleasing and delightful. A metaphor is an inferred comparison, such as "the silk of the singer's voice," as opposed to an explicit comparison, such as "a voice smooth like silk," which employs like or as.

The voice isn't like silk; it is silk. When we utilize metaphor, we move beyond logical, banal comparison to an identification or fusion of two objects, creating a new entity that possesses traits of both. Many detractors view the creation of metaphors as a way of thinking that predates or eschews logic. Although it is used frequently at all linguistic levels and in all kinds of language, metaphor is the primary language of poetry.

To know more about metaphor click on the link:

https://brainly.com/question/13020675

#SPJ4

Answer:it’s d onomatopoeia

Explanation:

cause it’s like a sound like pow boom but it’s tinkle tinkle

You learned that "The CPU interacts with memory in a process that is known as
the fetch-decode-execute cycle. An instruction gets fetched (brought up) from
memory, decoded (analyzed) in the control unit, and then executed (put into
action) by the ALU." Can you think of a comparison to something that happens in
real life that would make this process easier to understand and remember?

Answers

Answer:

okay this is going to be weird but hopefully it helps you go to a restaurant you use the menu to place an order the waiter analyzes the order and then it brings it to you

Explanation:

so in other words the menu is bringing up what you want

the waiter is the person who analyzes the order

and then to put it to action is when you receive the order and eat it.

I know this is a weird analogy but I hope it helps

Patch application are essential to any network. Select the characteristics(s) of patch applications.

A. identify
B. classifying
C. notifying
D. all the above


HELP I REALLY NEED IT ​

Answers

All the above I believe.

Replace the nulls values of the column salary with the mean salary.

Answers

When data is combined across lengthy time periods from various sources to address real-world issues, missing values are frequently present, and accurate machine learning modeling necessitates careful treatment of missing data.

What is Column salary?

One tactic is to impute the missing data. A wide range of algorithms, including simple interpolation (mean, median, mode), matrix factorization techniques like SVD, statistical models like Kalman filters, and deep learning techniques.

Machine learning models can learn from partial data with the aid of approaches like replacement or imputation for missing values. Mean, median, and mode are the three basic missing value imputation strategies.

The median is the middle number in a set of numbers sorted by size, the mode is the most prevalent numerical value for, and the mean is the average of all the values in a set.

Thus, When data is combined across lengthy time periods from various sources to address real-world issues, missing values are frequently present, and accurate machine learning modeling necessitates careful treatment of missing data.

Learn more about Data, refer to the link:

https://brainly.com/question/10980404

#SPJ4

a piece of malicious code uses dictionary attacks against computers to gain access to administrative accounts. the code then links compromised computers together for the purpose of receiving remote commands. what term best applies to this malicious code?

Answers

The malicious code described in the question can be classified as a botnet. A botnet is a network of computers that have been infected with malware and are controlled by a central server.

The malware used in a botnet typically gains access to the victim computer through various means, such as phishing emails or exploiting vulnerabilities in software. Once the malware gains access, it can then use dictionary attacks or other methods to obtain administrative privileges on the compromised machine. Once a computer is part of a botnet, it can receive remote commands from the botnet controller. These commands can include anything from launching distributed denial of service attacks to stealing sensitive data. The botnet controller can also use the compromised computers to send spam emails, host phishing websites, and engage in other illegal activities.
In summary, the piece of malicious code described in the question is a botnet that uses dictionary attacks to gain access to administrative accounts and then links the compromised computers together for the purpose of receiving remote commands.
The term that best applies to this malicious code is "botnet." A botnet is a network of compromised computers infected with malicious code, which enables the attacker to control them remotely. In this scenario, the code uses dictionary attacks to gain access to administrative accounts, and then links the compromised computers together to receive remote commands. This allows the attacker to control and use the network for various nefarious purposes, such as launching distributed denial-of-service (DDoS) attacks, sending spam, or spreading malware.

To learn nmore about malicious code:

https://brainly.com/question/29757000

#SPJ11

Use the drop-down menus to complete the statements about creating and using signatures in Outlook messages.
The Signature feature is found under Outlook Mail
When creating a new signature, be sure to choose
When you create a signature and click New Email, the
Signatures can only be set up within the Outlook client on the
messages."
V
will appear in the email body.
not on a server.

Answers

The Signature feature is found under "File" > "Options" > "Mail" in Outlook.

When creating a new signature, be sure to choose the appropriate font, formatting, and layout that you want to use.

When you create a signature and click "New Email", the signature will automatically appear in the email body.

Signatures can only be set up within the Outlook client on the computer, not on a server.

What is Outlook Mail?

Note that Microsoft Outlook is the preferred email client used to send and receive emails by accessing Microsoft Exchange Server email. Outlook also provides access contact, email calendar and task management features.

Microsoft Outlook may be used as a standalone application, but it is also part of the Microsoft Office suite and Office 365, which includes Microsoft Excel and PowerPoint.

Learn more about Outlook Mail:
https://brainly.com/question/29576990
#SPJ1

Other Questions
Hope is feeling overwhelmed by work deadlines, cold weather, and a lingering virus. She spends time fantasizing about a cruise to the Caribbean for which she is saving. Looking through the brochures that she keeps in her desk temporarily lifts her spirits. What type of coping is this? Each of the double pulleys shown has a mass moment of inertia of 15 lbfts2 and is initially at rest. The outside radius is 18 in., and the inner radius is 9 in. Consider M1 = 210 lb, M2 = 210 lb, M3 = 510 lb, M4 = 350 lb, and M5 = 130 lb.Determine the angular acceleration of each pulley. (You must provide an answer before moving on to the next part.) 4. You put two yellow cubes, one red cube, one blue cube, and one green cube into a bag. You draw a cube, put it back, and draw another cube. What is the probability of getting one blue cube and one yellow cube? MATH UP 1 pointWhich of the following best explains why a muscle cell is different from anerve cell in the brain?*A. The nerve cell expresses different genes than the muscle cellB. The nerve cell has more genes than the muscle cellC. The muscle cell has more genes than the nerve cellO D. The muscle cell has different genes from the genes found in a nerve cell. What is the summary of the farenheit 451'book? How do you find the height of an isosceles triangle without the base? which option can you add to the install-windowsfeature command that shows you what the results would be but doesn't actually perform the installation task? Why are people not showing interest in reviving the African languages? Shayta determined the slope of the line graphed belowThe slope is _______ when CO2 combines with water it creates a weak acid, carbonic acid: CO2+H2O--> H2CO3describes what would happen to the ph of distilled water if CO2 were bubbled into it? What ph is distilled water? predict the ph of the water woth co2 bubbled in Two tables are considered one Customer table, another Sales order table. There could be zero sales order, one sales order, or many sales orders associated with a certain customer. However, a particular sales order must be associated with only one customer.Which type of table relationship best describes the narrative?A. One-to-one relationshipB. No relationshipC. Many-to-many relationshipD. One-to-many relationship What kind of energy transformations occur when you hit a coconut with a hammer? You and your friend see a ball rolling across the floor to the right. Your friend saysthat because it is moving to the right, it must have a net force on it pushing it tothe right. Do you agree with her? Why or why not?Your answer What kind of a person do you think the narrator, a veterinary surgeon, is? would you say he is tactful as well as full of common sense?. Anyone know the volume of this sphere? Which values of a, b, and c are possible?A=6,b=1,c=pi/3A=6,b=3,c=piA=3,b=1,c=pi/3A=3,b=6,c=pi Jane has 11 bananas. She wants to make bags of 4. How many bags cans she make? How many bananas will be left over? The United States Constitution establishes separate branches of the federal government, each with its own structure and functions. Over time, the judicial branch has had a significant impact on U.S. society through decisions either upholding or striking down controversial legislation.Develop an argument that explains whether the power exercised by the U.S. Supreme Court has hindered or benefited the national policy making process. In your essay, you must:Articulate a defensible claim or thesis that responds to the prompt and establishes a line of reasoningSupport your claim or thesis with at least TWO pieces of accurate and relevant information:At least ONE piece of evidence must be from the U.S. Constitution (including amendments)At least ONE piece of evidence must be from Federalist No. 78Use reasoning to explain why your evidence supports your claim/thesisRespond to an opposing or alternative perspective using refutation, concession, or rebuttal 3. Convert the following measurements:a. 16 mg =g|b. 4.7 kg =gc. 12,345 g =kgd. 2 g =mgPlease explain it ImSlow what is a Mandelbrot set?