Using Wireshark answer the following questions:
1. What is the IP address and TCP port number used by the client computer (source)
that is transferring the file to gaia.cs.umass.edu? To answer this question, it’s
probably easiest to select an HTTP message and explore the details of the TCP
packet used to carry this HTTP message, using the "details of the selected packet
header window"
2. What is the IP address of gaia.cs.umass.edu? On what port number is it sending
and receiving TCP segments for this connection?
If you have been able to create your own trace, answer the following question:
3. What is the IP address and TCP port number used by your client computer
(source) to transfer the file to gaia.cs.umass.edu?

Answers

Answer 1

Wireshark is a software protocol analyzer tool that has been built to capture, analyze and filter packets in a network. It captures packets in real-time and displays them in a readable format for an easier analysis.

The questions based on the following scenario: A client computer is transferring a file to gaia.cs.umass.edu via an HTTP request. The following questions need to be answered using Wireshark:What is the IP address and TCP port number used by the client computer (source) that is transferring the file to gaia.cs.umass.edu?To answer this question, we will need to use the details of the selected packet header window. We can filter the HTTP packets to show only the packets sent by the client to the server. The HTTP GET request is used by the client to request a file from the server. After we have filtered out the packets, we can use the Details of the selected packet header window to see the source IP address and port number.The source IP address is 192.168.1.101, and the source TCP port is 55001.What is the IP address of gaia.cs.umass.edu? On what port number is it sending and receiving TCP segments for this connection?To answer this question, we will need to filter the TCP packets to show only the packets sent by the server to the client. The server sends the HTTP response to the client.

To know more about protocol visit:

https://brainly.com/question/31846837?

#SPJ11


Related Questions

Can anyone give me Nitro type gold please? My NT account is trapkaybee061307

Answers

Answer:

no

Explanation:

Answer:

nah man I'm only fourteen and I don't have money

Explanation:

you can add me on Ro.blox

here is my username

untoten_115

Write a function that receives a StaticArray where the elements are in sorted order, and returns a new StaticArray with squares of the values from the original array, sorted in non-descending order. The original array should not be modified.

Answers

Answer:

def sa_sort(arr):

   for i in range(len(arr)):

       for j in range(0, len(arr) - i-1):

           if arr[j] > arr[j + 1]:

               arr[j], arr[j + 1] = arr[j + 1], arr[j]

test_cases = (

   [1, 10, 2, 20, 3, 30, 4, 40, 5], ['zebra2', 'apple', 'tomato', 'apple', 'zebra1'],

   [(1, 1), (20, 1), (1, 20), (2, 20)])

for case in test_cases:

   print(case)

   sa_sort(case)

   print(case)

Explanation:

Explain why it is important to use the correct spatial
referencing method, map projection and datum in a GIS project

Answers

Answer:

Using the correct spatial referencing method, map projection, and datum in a Geographic Information System (GIS) project is crucial for several reasons:

Explanation:

Accurate Geospatial Analysis: GIS projects involve analyzing and visualizing spatial data. Choosing the appropriate spatial referencing method ensures that the data aligns accurately with the real-world geographic coordinates. It enables accurate geospatial analysis, such as measuring distances, calculating areas, and performing spatial queries.

Data Integration and Interoperability: GIS projects often involve combining datasets from various sources and integrating them into a common spatial framework. Using consistent map projections and datums ensures that different datasets align properly and can be integrated seamlessly. It facilitates data interoperability, allowing different GIS layers to be overlaid and analyzed together accurately.

Avoiding Distortions and Errors: Different map projections introduce distortions in representing the curved Earth surface on a flat map. Each map projection has its own strengths and limitations, and choosing the appropriate one for a specific project minimizes distortions and errors. Using an unsuitable map projection can lead to inaccuracies, such as misshapen features, distorted distances, or incorrect spatial relationships.

Coordinate Transformation and Data Sharing: GIS projects often require sharing data with others or integrating data from different regions or coordinate systems. By using the correct datum and coordinate transformation techniques, data can be accurately converted between different spatial referencing systems, ensuring seamless data sharing and integration. It facilitates collaboration among different stakeholders and allows for the proper analysis of data across different geographic areas.

Standardization and Consistency: Following established spatial referencing methods, map projection standards, and datums ensures consistency across GIS projects and promotes interoperability with existing geospatial datasets and systems. It enables data sharing, comparison, and analysis between different projects and organizations, fostering a standardized and compatible geospatial data environment.

Which of the following is not a good file-management practice?

A. Create descriptive names for folders and files.
B. Store all of the data files at the top level of the drive to make them easier to find.
C. Remove folders and files when they are no longer needed.
D. Make enough subfolders so that the files in any one folder are readably visible.

Answers

Answer:

B, Store all of the data files at the top level of the drive to make them easier to find.

Explanation:

Your files will be unorganized, and it will actually do the opposite of what you want it to.

Hope this helps!

The following is not a good file-management practice Store all of the data files at the top level of the drive to make them easier to find. Thus the correct option is B.

What is file management?

File management is referred to as a systematic technique that allows an individual to store their valuable data and information in the forms of files and documents in an organised manner to retrieve it properly.

File management is crucial since it keeps the files of an individual orderly. It could make it simpler for them to locate files when they need to utilize them. It is crucial for organizations since it makes it simpler for them to share folders with their staff or customers.

File management allows an individual to store their information with descriptive names for easy access and remove files that are not required.

It also enables to make of subfolders so that the files belonging to separate departments or folders are visible to the reader without creating any kiosk.

Therefore, option B is appropriate.

Learn more about File management, here:

https://brainly.com/question/12736385

#SPJ6

Most presentations use text: A. To draw attention to content
B. At a minimum
C. Without restraint
D. To maximize area and style

Answers

i think it’s c hope this helps

Write a python program to print numbers from 100 to 50 using for loop.
I NEED THIS URGENT PLEASE

Answers

Answer:

i = 100

for i in range 50

print(i--)

Explanation:

prints down from 100 to 50, i is printed then decremented.

program that shows if it's an integer or not​

Answers

isInteger() method returns true if a value is an integer of the datatype Number. Otherwise it returns false

which of the following creates a virtual machine within a host os?

Answers

Answer: A hypervisor.

Explanation: Known as a virtual machine monitor or VMM, is software that creates and runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs by virtually sharing its resources, such as memory and processing.

A virtual machine is an independent and complete environment where you can run a guest operating system within a host operating system. The Virtual Machine can run in a window, in full-screen mode, or even remotely.

Several tools create a virtual machine within a host operating system, including the following:VirtualBox: Oracle VirtualBox is a hypervisor that can run on macOS, Windows, and Linux, allowing users to create virtual machines and run them on their operating systems.VMware Workstation: VMware Workstation is a virtualization software that allows you to create virtual machines on your computer and install any operating system as a guest operating system. It's a virtualization software package that can be used to build and manage virtual machines on a single Windows or Linux machine.Microsoft Virtual PC:

Microsoft Virtual PC is a software that allows you to create virtual machines on Windows computers and run a different operating system on top of it. It is a Microsoft product that is widely used by people to create virtual machines.Oracle VM VirtualBox: Oracle VM VirtualBox is a free and open-source hypervisor that can run on a variety of platforms, including Windows, macOS, Linux, and Solaris. It allows users to create virtual machines on their host operating systems and run any operating system as a guest operating system.

To know more about independent visit:

https://brainly.com/question/27765350

#SPJ11

you have a medium-sized business of over 300 windows 10 computers and 15 windows server 2016 and 2019 servers. you have found that the computers are using a lot of bandwidth every night when they check for updates on microsoft's update servers. in addition, you have no easy way of knowing which computers are up to date with the latest security patches. what is the best way to reduce the bandwidth usage and more easily document which computers have the proper updates?

Answers

The best way to reduce the bandwidth usage and more easily document which computers have the proper updates is to install Windows Server Update Services on one of your servers.

What are Windows server update services?

Windows Server Update Services (WSUS) is a window service that can reduce bandwidth usage caused by Windows updates because only the update server has to access the Internet. Plus, WSUS can produce reports on updates.

Here's the complete question:

You have a medium-sized business of over 300 Windows 10 computers and 15 Windows Server 2016 and 2019 servers. You have found that the computers are using a lot of bandwidth every night when they check for updates on Microsoft's update servers. In addition, you have no easy way of knowing which computers are up to date with the latest security patches. What is the best way to reduce the bandwidth usage and more easily document which computers have the proper updates?

a. Download updates and burn them to a DVD, and use the DVD to install the updates on each computer. The DVD will also serve as documentation.

b. Create a script to stagger when computers perform updates and send a list of installed updates to a server.

c. Configure the computers to compress the updates they receive from Microsoft.

d. Install Windows Server Update Services on one of your servers.

Learn more Windows Server Update Services from:

https://brainly.com/question/23943500?referrer=searchResults

#SPJ4

What are some ways you can make a good impression on a client, and how would you respond to a difficult client situation?

Cybersecurity~

Answers

Not that  you can make a good impression and win clients by being knowledgeable, professional, and responsive. Respond to difficult client situations by remaini ng calm, listening actively, and working to find a solution that addresses their concerns.

What is the rationale for the above response?

Making a good impression on a customer is critical in the realm of cybersecurity in order to develop trust and confidence in your skills. One method to do this is to be well-versed on the numerous cybersecurity dangers and solutions applicable to the client's business or company.

Also , being professional and receptive to their wants and concerns might aid in the development of trust. It is critical to remain calm and not become defensive in the face of a challenging client situation.

Instead, actively listen to their problems and collaborate to create a solution that meets their requirements.

Learn more about Winning Clients:
https://brainly.com/question/28769079
#SPJ1

Write a java program that asks the student for his name and Favorite basketball team. The program should then welcome the student, and cheer for his team

Answers

The java program is an illustration of sequential programs

What are sequential programs?

Sequential programs are programs that do not require loops or conditions

The actual program

The program written in Java, where comments are used to explain each line is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

 //This creates a Scanner Object

 Scanner input = new Scanner(System.in);

 //This declares the variables

 String name, team;

 //This prompts the user for name

 System.out.print("Name: ");

 //This gets an input from the user

 name = input.nextLine();

 //This prompts the user for favorite team

 System.out.print("Favorite team: ");

 //This gets an input from the user

 team = input.nextLine();

 //This prints the required output

 System.out.print("Welcome, "+name+". Cheers to "+team+" team");

}

}

Read more about sequential programs at:

https://brainly.com/question/26642771

Answer:

it is coding so make a java code and put it to the data on a file on the computer then.... tada!!!

Explanation:

PLEASE HELP, THIS IS FROM FLVS AND THE SUBJECT IS SOCAL MEADA. YES THAT IS A CORSE.
Josh frequently posts in an online forum to talk about his favorite video game with other players. For the past few weeks, a poster he doesn't know has been harassing Josh in the forums, calling him names and publicly posting hateful messages toward Josh with the intent of starting an argument.

In this situation Josh should consider changing his forum screen name to avoid this cyberbully.

1. True
2. False

Answers

The answer is true (please mark me brainleiest)

Does anyone know what's wrong with this code in Unity? HELP FAST PLEASE! This is for my game design course, I will give brainiest if you can help

Does anyone know what's wrong with this code in Unity? HELP FAST PLEASE! This is for my game design course,

Answers

its expecting a "{} around a certain area.

hope this helps!!!

The impact of the destruction of train station on the budget of the minister of finance

Answers

The impact of the destruction of train station on the budget of the minister of finance is said to be very huge.

How do railways destruction affect the economy?

When there is railroads destruction, a lot of money such as billions of dollars is been spent to repair the damages and this will be of a great concern to the minister of finance.

Most countries is run by Budget and when sudden things like this happen, the Minister have to look for other ways to source for funds and this will affect other parts or items on the budget of the Minister.

Learn more about  minister of finance from

https://brainly.com/question/470781

hakim is a network engineer. he is configuring a virtual private network (vpn) technology that is available only for computers running the windows operating system. which technology is it?

Answers

The technology is secure socket tunneling protocol (sstp). A virtual private network (VPN) tunnel called Secure Socket Tunneling Protocol (SSTP) offers a way to send PPP data over an SSL/TLS channel.

A virtual private network (VPN) tunnel called Secure Socket Tunneling Protocol (SSTP) offers a way to send PPP data over an SSL/TLS channel. By combining key negotiation, encryption, and traffic integrity checking, SSL/TLS offers transport-level security. Except for authorized web proxies, almost all firewalls and proxy servers can be bypassed by using SSL/TLS across TCP port 443 (by default; port can be altered).

Authentication for SSTP servers is required during the SSL/TLS stage. Authentication for SSTP clients is required during the PPP phase but is optional during the SSL/TLS phase. Common authentication techniques like EAP-TLS and MS-CHAP are supported by PPP. For Linux, BSD, and Windows, there is SSTP.

To know more about SSTP click here:

https://brainly.com/question/4674025

#SPJ4

What is the function of the following shape? display result to user get input from user make a decision process information

Answers

Answer:

yep its decision

Explanation:

This is the piece of code that you add to a program to indicate that the program should run the code inside a function at a certain time.

Answers

The piece of code that you add to a program to indicate that the program should run the code inside a function at a certain time is a cell.

What is a program?

A program is a set of instructions that a computer follows to complete a specific task. As a computer program grows in size, the likelihood of an error occurring increases.

A program, or software program, is a set of instructions that directs the hardware of a computer to perform a task.

Cell is a very high-level embeddable language that was created to implement some fairly general classes of software systems that are difficult to implement using traditional languages.

A cell is a piece of code that you add to a program to tell it that the code inside a function should be run at a specific time.

For more details regarding a programming, visit:

https://brainly.com/question/11023419

#SPJ1

vendor builds multiple types of tablet computers. Each has a type identification number and a name. The key specifications for each type include amount of storage and display type. The company uses multiple processor types, exactly one of which is used for a specific tablet type. The same processor can be used in multiple types of tablets. Each processor has a manufacturer and a manufacturer's unique code that identifies it.

Answers

Answer:

ARM processor

Explanation:

The processors can be shared across different tablet types and are characterized by a manufacturer and a unique code.

How does the company assign processors to tablet types?

The company assigns processors to different tablet types based on their specific requirements. Each tablet type is associated with exactly one processor, chosen from the available options.

This ensures that the tablets are equipped with processors that meet their performance and compatibility needs. Multiple tablet types may utilize the same processor if it satisfies their respective specifications. The processors themselves are identified by their manufacturer and a unique code, allowing for easy identification and tracking within the company's inventory and production systems.

Read more about processors

brainly.com/question/614196

#SPJ2

What type of person has the necessary skills to research effectively using online resources?

A.
Someone who is functionally capable.

B.
Someone who is physically able.

C.
Someone who is correctly informed.

D.
Someone who is digitally literate.

Answers

Answer:

D

Explanation:

To be able to use online resources effectively, you have to be digital literate so as to know how to use technology to your benefit. You can have a technological tool in your hand which has the potential to turn your life around for good but if you don't know how to use it, what impact will it be able to make? In this digital day and age, it is only the digitally literate that will be able to move forward in life.

Hope it helped :)

Someone who is digitally literate is a type of person that has the necessary skills to research effectively using online resources. The correct option is D.

What is online resource?

Someone who is digitally literate is more likely to have the skills needed to conduct effective research using online resources.

Being digitally literate means having the skills, knowledge, and experience to effectively and efficiently use digital technologies.

This includes the ability to navigate and search the internet, assess the reliability and credibility of online sources, and use online tools and resources effectively for research and learning.

While functional and physical ability are important for using digital technologies, they do not always imply digital literacy.

Correct information is also important, but without the necessary digital literacy skills, it is insufficient to ensure effective online research.

Thus, the correct option is D.

For more details regarding online resources, visit:

https://brainly.com/question/28964112

#SPJ2

what is a soft ware?

Answers

Software is a collection of instructions and data that tell a computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work. In computer science and software engineering, computer software is all information processed by computer systems, including programs and data. Computer software includes computer programs, libraries and related non-executable data, such as online documentation or digital media. Computer hardware and software require each other and neither can be realistically used on its own.

Answer:

it is like some data

Explanation:

Data is stored in a computer using patterns of __________ defined by standard coding schemes

Answers

Data is stored in a computer using patterns of bits defined by standard coding schemes.

Write a program to calculate the volume of a cube which contains 27 number of small identical cubes on the basis of the length of small cube input by a user.​

Answers

Answer:

This program is written in python programming language.

The program is self explanatory; hence, no comments was used; However, see explanation section for line by line explanation.

Program starts here

length = float(input("Length of small cube: "))

volume = 27 * length**3

print("Volume: "+(str(volume)))

Explanation:

The first line of the program prompts the user for the length of the small cube;

length = float(input("Length of small cube: "))

The volume of the 27 identical cubes is calculated on the next line;

volume = 27 * length**3

Lastly, the calculated volume of the 27 cubes is printed

print("Volume: "+(str(volume)))

write a python program that asks users to input a 6-digit integer. the program will then separate the integer into individual digits. print the digits out and separate them by the hyphen ( - ) character using string slicing

Answers

```python

# Prompt user for a 6-digit integer

num = input("Enter a 6-digit integer: ")

# Check if the input has exactly 6 digits

if len(num) == 6:

   # Separate the digits using string slicing

   digits = num[0] + '-' + num[1] + '-' + num[2] + '-' + num[3] + '-' + num[4] + '-' + num[5]

   # Print the separated digits

   print("Separated digits:", digits)

else:

   print("Invalid input. Please enter a 6-digit integer.")

```

In this program, we use the `input()` function to capture the user's input as a string. We then check if the input has exactly 6 digits using the `len()` function. If it does, we separate the digits by concatenating them with hyphens in between. Finally, we print the separated digits using the `print()` function.

Note that this program assumes the user will provide a valid 6-digit integer as input. If the input may include non-digit characters or be of varying length, additional input validation or error handling should be implemented.

For more such questions on string, click on:

https://brainly.com/question/25324400

#SPJ8

System. Invalidcastexception: unable to cast object of type 'system. Directoryservices. Accountmanagement. Groupprincipal' to type 'system. Directoryservices. Accountmanagement. Userprincipal'

Answers

Answer:

The error message "System.InvalidCastException: Unable to cast object of type 'System.DirectoryServices.AccountManagement.GroupPrincipal' to type 'System.DirectoryServices.AccountManagement.UserPrincipal'" typically occurs when you try to cast an object of the wrong type.

In this case, it seems that you are trying to cast a GroupPrincipal object to a UserPrincipal object, which is not possible because they are different types. Make sure you are working with the correct type of object and use the appropriate casting method.

Alternatively, you can try using a different approach or method that is better suited to the type of object you are working with.

Explanation:

What is a semiconductor

Answers

A semiconductor material has an electrical conductivity value falling between that of a conductor, such as metallic copper, and an insulator, such as glass. Its resistivity falls as its temperature rises; metals behave in the opposite way. I hope this helps and have a great day! (Also brainliest would be appreciated but you don’t have to) :)

Answer:

Explanation:

Semiconductors are materials which have a conductivity between conductors  and nonconductors or insulators.

Semiconductors can be pure elements

How does a file reader know where one data item begins and another starts in a data file?
Python recognizes the end of one data item and the beginning of the next because they are separated by ___.

Answers

The way that a file reader know where one data item begins and another starts in a data file is option A: Every line in a text file has a hidden EOL (end of line) set of characters.

Python recognizes the end of one data item and the beginning of the next because they are separated by a comma-separated sequence.

What is the process of retrieving data from a file called?

When the data held in them cannot be accessed normally, data recovery in computing is the process of restoring deleted, inaccessible, lost, corrupted, damaged, or formatted data from secondary storage, portable media, or files.

One line is read from the file and returned as a string using the readline function. The newline character is present at the end of the string readline returns.

An ordered group of items is known as a list, and each value is given an index. The components of a list are referred to as its elements.

Therefore, the location of the subsequent item to be read from a file is indicated by the read position of that file. The read position is initially set to the file's beginning.

Learn more about Python from

https://brainly.com/question/26497128
#SPJ1

See options below

How does a file reader know where one line starts and another ends?

Every line in a text file has a hidden EOL (end of line) set of characters.

Python knows how many characters to expect in a line.

The last item in a line of data does not have a comma after it.

Every line starts with a BOL (beginning of line) character.

what component at the core of the erp system allows all business functions to access current and consistent data for operational decision making? group of answer choices general ledger database reports pos device

Answers

The component at the core of the ERP system that allows all business functions to access current and consistent data for operational decision making is option B: database.

What is at the core of an ERP system?

ERP, at its heart, is a program that streamlines business operations and offers internal checks and balances. It does this by utilizing a centralized database that compiles data from several departments, including accounting, production, supply chain management, sales, and marketing (HR).

Companies need any ERP software solutions since they assist in the implementation of resource planning by combining all business operations into a single system. A software system for enterprise resource planning (ERP) can also incorporate planning, inventory buying, sales, marketing, finance, and other functions.

Note that a database is a planned grouping of material that has been arranged and is often kept electronically in a computer system. A database management system often oversees a database (DBMS).

Learn more about database from

https://brainly.com/question/518894
#SPJ1

A program that runs on top of an operating system, such as Word or
Excel.
a. Virus
b. Anti-Virus Software
c. Application
d. Computer
e. Server

Answers

Answer:

c. application

Explanation:

An application i belive,

its something that would be put on top of an operating system. like say you made a new game, an application would be something you add to make it better. Im sorry if im wrong. i belive this is the correct answer because a, b, d and e make no sense to me. good luck!!

FREE POINTTTTTTTTTTTTTTTTTTT

Answers

Answer:

THXXXXXXXXXX

Explanation:

Which description of the plain text file format is most accurate? uses binary code to store data can only be opened with special software supports text formatting like bold or italics used by programmers for source code

Answers

The phrase "uses binary code to store data" is the best way to describe the plain text file format.

A binary code uses a two-symbol system to represent text, computer processor instructions, or any other data. The binary number system's "0" and "1" are frequently used as the two symbols in this system. Each character, instruction, etc. is given a set of binary digits, also referred to as bits, by the binary code.

An eight-bit binary string, for instance, has 256 possible values and can thus represent a wide range of different things. Binary codes are used in computing and telecommunications for a number of different ways to encode data, like character strings, into bit strings. These techniques could make use of fixed-width or flexible strings.

Learn more about binary code https://brainly.com/question/28222245

#SPJ4

Other Questions
The length of a cell phone is 1.2 inches and the width is 3.4 inches. The company making the cell phone wants to make a new version whose length will be 1.68 inches. Assuming the side lengths in the new phone are proportional to the old phone, what will be the width of the new phone? question: you look at yourself in a shiny christmas tree ball with a diameter of 9.00 cm when your face is 30.0 cm distant.a) what is the focal length of the mirror?b) where is your image?c) is your image real or virtual?d) is your image upright or inverted? Are the pigs the best option as leaders write a paragraph explaining. WILL GIVE U BRAINLYEST When a human consumes an apple, they are consuming the glucose thatwas created during photosynthesis by the plant. This glucose will give thehuman energy so they can move their muscles. What kind of energytransformation is happening when a human uses glucose to move? A. Chemical to mechanical B. Solar to chemical C. Thermal to mechanical D. Chemical to thermal Find the Fourier transform of the function f(t) = = { e -t/4 t >k 0 otherwise A water chips system in a garden uses 2/3 cup of water every 1/6 of an hour how much water is used one hour State the feature of a database management system that prints data in a specified format with a title. Subject attributes, object attributes and environment attributes are the three types of attributes in the __________ model. How many constitutional courts has Congress set up? don't search In your own mind, what is a revolution?What kind of revolution would you like to see today? Explain. when examining a ___________________, investors obtain relevant information about a firms cash receipts and payments for its operations, investments, and financing during an accounting period. Find the 3rd cumulant of a discrete random variable that hasprobability generating function G(z) = z^3 /z^38(z1) .Find the 3rd cumulant of a discrete random variable that has probability generating function G(2) = 23-8(2-1) z8(z1) PLZ PLZ PLZ HELP I WILL MARK BRAINLIEST - SHARKS' TEETHLangston CarterThe day we found the sharks' teeth was foggy and cool. Moisture hung in the air so thick you could almost see it sparkling in the dim sunlight. There were days, early in the summer like this one, where it seemed there was more water in the air than in the bay. We had beached the boat and stepped out on the recently cleared spit of land. The ground had a light dusting of white sand over an under layer of dried black mud. It looked like a recently frosted chocolate cake, though the frosting was spread a bit thin for my taste. The ground was solid, but we knew from experience that it was full of fiddler crab holes, and would be underwater at the first super-high tide. Mysteriously, to us anyway, someone wanted to build a house there.We often came to these spots to look for artifacts. Our beach, our summer home, had been a fishing camp for as long as anyone living could remember. The oldest stories told of travelers coming down to the edge of the sea, lining up to fill their wagon beds with salted fish to take back home. Old decaying cabins still lined the beach. Rotting nets, hung out to dry in the last century, decorated their weathered walls. Their broken faces spun stories in our minds. The fishermen who, tanned and wrinkled from sun and salt, hauled their nets full of splashing mullet in to cheers from the waiting crowds. The bounty of the sea lightened everyone's hearts, and the smell of roasting fish filled the damp air. Women fanned themselves from wagon seats. Children splashed in the shallow edges of the bay. It was a scene we had acted out as youngsters, building an imaginary bridge to a life we would never fully know.Read this sentence from the text:Their broken faces spun stories in our minds.What is the main effect of the word faces in this sentence?A) It creates a feeling of despair.B) It creates the idea of something watching.C) It suggests the narrator has great fears.D) It implies a sense of history. which of the following characteristics of gene expression is shared by eukaryotic and prokaryotic cells? The longest ladder available at many hardware stores is 40 feet. What is the highest floor you could safely reach with this ladder? Explain and model your answer by drawing. listen to the audio clip. select all the statements that apply to this selection from the seventh movement of cantata no. 140 by j. s. bach. PLS ANSWER QUICK! What are 3 possible misconceptions someone might have about life during the American Civil War? pls help me worth 20 pionts In industry, which type of material cannot be removed by ordinary earth moving equipment? this is the story pls help me