when switches receive a frame, and don't know where to send it (there is no entry in its switching table), use a process called?

Answers

Answer 1

Flooding.  

Flooding is a process used by switches to send a frame to every port on the switch when there is no entry for the destination address in its switching table. In other words, when a switch receives a frame and does not recognize the destination address, it will send that frame out to all the switch's ports. The purpose of flooding is to ensure that frames reach their intended destination, even if the switch doesn't have the necessary information to forward the frame. This allows the switch to request a response from the intended recipient and learn the sender's address, so it can add this information to its switching table and use it to forward future frames more efficiently. Flooding is a useful process but can also be a security concern. Unauthorized users can use flooding to send malicious frames to multiple hosts at once, which could potentially cause a denial of service attack. To minimize the threat of flooding, switches can be configured to limit the number of ports a frame is sent to or the number of times a frame can be sent.

read more about this at https://brainly.com/question/14774964

#SPJ4


Related Questions

what are the difference between of panchayat and multi party system​

Answers

Answer:

The parties in a multi-party system can control government separately or as a coalition; in a two-party system, however, coalition governments rarely form.

Traditionally Panchayats consisted of elderly and wise people chosen by the local community, who used to settle disputes between individuals and villages. The leader of the panchayat used to be called as Mukhiyas or Sarpanch.

Explanation:

Richard wants to share his handwritten class notes with Nick via email. In this scenario, which of the following can help Richard convert the notes into digital images so that he can share them via email? a. Bar coding device b. Digital printing software c. Document scanner d. Radio frequency identification tag

Answers

Answer: Document Scanner

Explanation: Cos then he can easily add the paper notes to his computer and email the client.

which of the following statements are true for an image formed by a plane mirror when the object is placed in front of the mirror? check all that apply. which of the following statements are true for an image formed by a plane mirror when the object is placed in front of the mirror?check all that apply. the image always appears to be located the same distance behind the mirror as the object is located in front of the mirror. the image formed by a plane mirror is always a real image. the image formed by a plane mirror is always an upright image. the image formed by a plane mirror is always a virtual image. the image is always larger than the object. the image formed by a plane mirror is always an inverted image.

Answers

The correct answer is the options:

a. the image always appears to be located the same distance behind the mirror as the object is located in front of the mirror.c. the image formed by a plane mirror is always a virtual image.

Images Formed by Plane Mirrors

The image always appears to be located the same distance behind the mirror as the object is located in front of the mirror because the light rays reflected by the mirror appear to originate from behind the mirror. This is because the angle between the incident light ray and the reflected light ray is the same as the angle between the reflected light ray and the mirror.

The image formed by a plane mirror is always a virtual image because the light rays reflected by the mirror do not actually converge. Instead, they appear to originate from behind the mirror.

Learn more about Mirrors at: https://brainly.com/question/2027981

#SPJ4

What will be displayed in the console when this program runs?

var numList = [10,20,30];
console.log(numList[numlist.length-2]);

Answers

Answer:

20 will be displayed on the console.

Explanation:

Given code is:

var numList = [10,20,30];

console.log(numList[numlist.length-2]);

The first line of code declares an array named numList and assigns it values given in the square brackets.

The second line of code is written to display the element on the index obtained by [numlist.length-2]

[numlist.length-2] means the second index.

Hence,

after running the code on JavaScript editor and dry running the code

20 will be displayed on the console.

Answer:

20

Explanation:

the loop body never executes. it is an infinite loop. it is syntactically invalid. it doesn't accomplish anythin

Answers

This loop is endless and prints 0, 1, 2, 3, 4,... and so on forever. It is an unending cycle, is the answer. -) We can cycle over a file line by line by using a for loop: f = open('file') for line in f: print(line) f.close ()

For loops are often more popular than while loops because they are seen to be safer. False, the body of a for loop only has one common statement for all of the iteration list's components. Reply: False

A loop is a set of instructions that are repeatedly carried out in computer programming until a specific condition is met. Typically, a given procedure, like receiving and altering a piece of data, is carried out, and then a condition, like whether a counter has reached a specific number, is verified. If not, the subsequent command in the sequence directs the computer to go back to the first and repeat the process. Upon fulfilment of the requirement,

Learn more about Loop here:

https://brainly.com/question/14390367

#SPJ4

at what layer of the osi model does a network switch normally operate? a. layer 5 b. layer 3 c. layer 4 d. layer 2

Answers

Answer:

D. Layer 2

Explanation:

It is layer 2.

To learn more:

https://brainly.com/question/26299918?referrer=searchResults

Hope this helps!

In the binary number system, numbers are referred to as bits. What happens every time you add a bit

Answers

Answer:

Adding another bit to a binary number will expand the maximum value that can be represented by that number by a power of 2.  Examples: 1111 can store 15 in decimal, while 11111 can store 31 in decimal.

Adding a bit to a binary number is exactly the same as adding a "place" to a binary number and will expand the range of values that can be represented by an order of magnitude.

Explanation:

A single bit can only be used to represent 1 or 0.  But if you add a second bit, you can now represent numbers up to 3.  Each new binary digit added to a binary number adds another power of 2 (binary is based on 2 states, on/off or 1 and 0) at that position.  Look at this comparison of digits and their associated maximum number between a binary (base 2 number) vs. a decimal  number (base 10 numbers that you use every day).

Digits        Max Binary        Max Decimal

1                1                         1

2               11 (3)                  99

3               111 (7)                 999

4               1111 (15)              9,999

5               11111 (31)             99,999

6               111111 (63)           999,999

7               1111111 (127)         9,999,999

8               11111111 (255)      99,999,999

As you can see, each time we add a new digit in binary we expand the maximum number by 2x (actually 2x-1).  When we add another digit to a decimal number we expand the maximum number by 10x (actually 10x-1).

Which description of the plain text file format is most accurate? uses binary code to store data can only be opened with special software supports text formatting like bold or italics used by programmers for source code

Answers

The phrase "uses binary code to store data" is the best way to describe the plain text file format.

A binary code uses a two-symbol system to represent text, computer processor instructions, or any other data. The binary number system's "0" and "1" are frequently used as the two symbols in this system. Each character, instruction, etc. is given a set of binary digits, also referred to as bits, by the binary code.

An eight-bit binary string, for instance, has 256 possible values and can thus represent a wide range of different things. Binary codes are used in computing and telecommunications for a number of different ways to encode data, like character strings, into bit strings. These techniques could make use of fixed-width or flexible strings.

Learn more about binary code https://brainly.com/question/28222245

#SPJ4

In 5-10 sentences, describe the procedure for responding to an e-mail message.

Answers

Answer: See explanation

Explanation:

The procedure fur responding to an email message goes thus:

The first thing to do is to open the website of the email. Then, you would click on "compose".

When you click on compose, you'll see some space where you'll fill some information such as the email of the person that you're sending to, that is, the receiver. You'll also feel the subject of the email.

Then you type the content of your message. When you're done with this, then you click on send.

The statistical software R can be freely downloaded and used by anyone to analyze large datasets. This is an example of Select an answer and submit. For keyboard navigation, use the up/down arrow keys to select an answer. a A club good b A public good C A common resource d A private good Unanswered Submit FE Q20 Homework Unanswered The Affordable care act passed by the Obama Administration initially required all US taxpayers to have health insurance. What market failure is being addressed here? Select an answer and submit. For keyboard navigation, use the up/down arrow keys to select an answer. a Negative Externality b Moral Hazard с Adverse selection d Monopoly Power

Answers

A public good The statistical software R can be downloaded and used by anyone, without excluding anyone else from using it, and its use by one person does not reduce its availability to others. This is the characteristic of a public good.

For the second question, the market failure being addressed by the Affordable Care Act is:  Adverse selection
Adverse selection occurs when individuals with a higher risk of needing healthcare are more likely to purchase insurance, leaving insurers with a riskier pool of customers. The requirement for all taxpayers to have health insurance aims to address adverse selection by spreading the risk among a larger pool of individuals.: For your first question, the statistical software R being freely available for download and use to analyze large datasets is an example of a public good.Public goods are non-excludable and non-rivalrous, meaning they can be used by everyone without any limitations, and one person's use of the good does not reduce its availability to others

.For your second question, the market failure being addressed by the Affordable Care Act initially requiring all US taxpayers to have health insurance is adverse selection.Adverse selection occurs when there is an asymmetry of information in the market, causing one party to have more information than the other. In the context of health insurance, individuals with higher risks or pre-existing conditions are more likely to purchase insurance, leading to higher premiums and potentially causing healthier individuals to opt-out of the insurance market. By mandating health insurance, the Affordable Care Act aimed to balance the risk pool and reduce the impact of adverse selection.

To know more about software visit:

https://brainly.com/question/32393976

#SPJ11

why might a page-level lock be preferred over a field-level lock?

Answers

In database management systems, locking mechanisms are used to ensure data integrity and prevent conflicts that may arise from concurrent access to the same data by multiple users or transactions. There are two main types of locks that can be implemented in a database system: page-level locks and field-level locks.

A page-level lock is a type of lock that is applied to an entire page or block of data, rather than individual fields within that page. This means that any transaction or user that needs to access any part of the page must acquire the lock first, regardless of whether they need to modify or read a specific field. One reason why a page-level lock might be preferred over a field-level lock is because it can reduce the number of lock conflicts and improve concurrency. This is because a page-level lock allows multiple transactions or users to read different fields within the same page simultaneously, as long as they don't need to modify any of the fields. With a field-level lock, any transaction that needs to read or modify a specific field must acquire the lock for that field, potentially blocking other transactions that need to access other fields within the same page.

Another reason why a page-level lock might be preferred is because it can simplify the locking mechanism and reduce the overhead associated with acquiring and releasing locks. Since a page-level lock only needs to be acquired once for the entire page, rather than for each individual field, it can be more efficient in terms of both time and resources. In summary, a page-level lock may be preferred over a field-level lock because it can improve concurrency, simplify the locking mechanism, and reduce overhead. However, the choice of lock type will depend on the specific requirements and characteristics of the database system and the applications that use it.

Learn more about database management systems here-

https://brainly.com/question/1578835

#SPJ11

one of the advantages of a distributed database management system (ddbms) is security. a. true b. false

Answers

A distributed database management system (DDBMS) does provide security.

Is it true that a distributed database management system offers security benefits?

The advantages of a distributed database management system in terms of security. DDBMS enhances security by implementing various mechanisms such as access controls, encryption, and distributed data replication. With a distributed architecture, data is spread across multiple nodes, making it harder for unauthorized access or data breaches to occur. Additionally, DDBMS allows for granular control over access permissions, ensuring that only authorized users can access specific data elements. Encryption techniques can be employed to protect data while it is in transit or at rest. Furthermore, by replicating data across multiple nodes, DDBMS can provide fault tolerance and data availability in the event of system failures or disasters.

Learn more about database management

brainly.com/question/13266483

#SPJ11

A(n) _____ is a formal meeting between an employer and a job applicant
a.
background check
b.
gatekeeper
c.
interview
d.
personality test


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

C. Interview

Explanation:

Interview

Answer:

C. interview

Explanation:

edge 2022

Jason is the motion picture projectionist at the local IMAX theater. This means that he runs the huge movie projector so that customers can see the feature on the big screen. What pathway in the Arts, AV Technology, and Communication cluster does he work in? Question 1 options: AV Technology and Film Printing Technology Journalism and Broadcasting Telecommunications

Answers

Answer:

AV technology  i think hopefully im right

Explanation:

K12

Write a Java program which declares and populates an array with some values (at least 5 values). Then it should call a method passing it the array. The method should modify the array values using a loop. Lastly, after the program calls the method, it should display the modified array contents to the console.

Answers

Answer:

CODE IN JAVA :

import java.util.*;

public class Main

{

public static void modifyArray(int[] arr, int n){

for(int i = 0; i < n; i++){

arr[i] = -1; // each value is modified to -1

}

}

public static void main(String[] args) {

int n;

System.out.print("Enter size of array(atleast 5): ");

Scanner sc = new Scanner(System.in);

n = sc.nextInt();

int array[] = new int[n]; // array with size n declared

// populating the array

System.out.print("Enter array elements: ");

for(int i = 0; i < n; i++){

array[i] = sc.nextInt();

}

// modifying array via a function

modifyArray(array, n);

// printing array values after modifiction

System.out.print("Array after modification: ");

for(int i = 0; i < n; i++){

System.out.print(array[i] + " "); // space separated

}

}

}

Explanation:

What is an example of using quantum computing for sustainable practices?
a) improving the efficiency of batteries on electric cars
b) installing edge computing devices in common public places
c) mining cryptocurrency using multiple connected computers
d) storing large computing servers in high-altitude conditions

Answers

Quantum computing can be used in a number of ways to promote sustainable practices, such as improving the efficiency of batteries on electric cars, installing edge computing devices in common public places, mining cryptocurrency using multiple connected computers. Therefore the correct option is option A, B and C.

Quantum computing can be used to improve the efficiency of batteries in electric cars. By using algorithms to analyze data from sensors within the battery, quantum computing can be used to optimize charging cycles, leading to better battery performance and improved efficiency.

Finally, quantum computing can be used to store large computing servers in high-altitude conditions. By taking advantage of the colder temperatures in high altitudes, quantum computing can be used to cool down large computing servers, allowing them to run more efficiently while reducing their energy consumption.

For such more question on Quantum computing:

https://brainly.com/question/15188300

#SPJ11

Using more than one array to store related data is called _____________ arrays.

Answers

Answer:

Using more than one array to store related data is called parallel arrays.

Explanation:

I just did it and got 100% on the quiz

Using more than one array to store related data is called parallel arrays.

What is array?

An array is a type of data structure used in computer science that holds a set of elements that are all uniquely recognised by at least one array index or key.

An array is stored in a way that allows a mathematical formula to determine each element's position given its index tuple.

In parallel arrays, a collection of data is represented by two or more arrays, where each corresponding array index represents a field that matches a particular record.

For instance, the array items at names and ages would explain the name and age of the third person if there were two arrays, one for names and one for ages.

Thus, the answer is parallel array.

For more details regarding parallel array, visit:

https://brainly.com/question/27041014

#SPJ6

PLEASE HELP!!! You saved the definition of the vehicle class in a file called vehicleClass.py.


Which line of code will allow you to use the class in another program?


A. from * import vehicleClass

B. from vehicle import

C. from * import vehicle

D. from vehicleClass import*

Answers

Answer:

D. from vehicleClass import*

Explanation:

Answer:

from vehicleClass import*

Explanation:

What makes this information systems environment unique? (3 points)

Answers

Information technologies are unique not just because of their growing use in decision-making and knowledge management systems, important as that is. Their use has also yielded significant improvements in the efficiency of energy and materials use.

explain the verbal method of communication​

Answers

Answer:

verbal method of communication means using kaomji, emojis gifs and stickers although you know how to use the keyboard.

Answer:

The Verbal Communication is a type of oral communication wherein the message is transmitted through the spoken words. Explanation: Here the sender gives words to his feelings, thoughts, ideas and opinions and expresses them in the form of speeches, discussions, presentations, and conversations.

Robin has four copies of her midterm paper saved to a single folder on her
Windows computer. She wants to move each of these four files into a
separate folder within the existing one. How can Robin perform this task for
each file?
A. Open the folder containing all four files, right-click in the folder
window, select "New enter the new folder's title, click on one file.
drag it into the new folder.
B. Open the folder containing all four files, right-click in the folder
window, select "New Folder, enter the new folder's title, click on
one file, drag it into the new folder.
C. Open the folder containing all four files, right-click on one file.
select "New Folder, enter the new folder's title, click on the same
file, drag it into the new folder.
D. Right click on the folder containing all four files, select "Copy."
Open the same folder, select "Paste." Enter the new folder's title

Answers

Answer:

i think its b

Explanation:

im not sure but b seems reasonable. sorry if you get it incorrect :(

Answer: B. Open the folder containing all four files, right-click in the folder

window, select "New Folder", enter the new folder's title, click on

one file, drag it into the new folder.

Explanation: took the quiz

characteristics and purpose of a motherboard ​

Answers

A motherboard is the central board of a computer or server, to which most components of a computer are connected to each other. It essentially has the task of ensuring that the individual components work properly together.

More Complex Answer:

A motherboard can also be understood as a motorway junction of data. All data streams of a computer or data centre server must go through here, if only because servers are computers that act as a central unit of a network and are thus connected and communicate with other computers. In order for a server to fulfil its tasks such as managing domains, names and files, there are special server motherboards in server systems.

Characteristics:

Different system components can be found on a motherboard depending on the design, equipment and integration density.

Slot for the processor

Power supply for the processor

Clock generator

Real-time metre and battery

BIOS

Chipset

System bus

Memory module slots

Slots for the bus systems

Input/output interfaces

Onboard sound

Storage controllers

DMA controller

Interrupt controllers

Floppy controller

Keyboard processor

Connecters for the PC power supply

Fan connecters

behave online in the same way as you wish to be treated true false​

Answers

True; you have treat others the way you want to be treated. It is the golden rule for meeting anyone, whether it's online or in real life. If you were being mean to someone online, would you want someone to be mean to you the same way you were mean to that person? So, the answer is true.

By default, tables are sorted in ascending order by this.


What’s the answer?

By default, tables are sorted in ascending order by this.Whats the answer?

Answers

Answer:

Record number

Explanation:

It simply can't be "data type" as there cant be more than one data type in a field. It won't be "primary key field" either as primary keys only set the field as unique. You can test this by changing the primary key to a different field. But for simplicity's sake, I did this experiment for you.

As you can see in the first and second attachments, ID is the primary key, set default by the program.

But when I set Field 8 as the primary key, shown in the third attachment, field 8 doesn't sort, shown in the fourth attachment.

By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?

Answer:

By default, tables are sorted in ascending order by record number.

What is the difference between HIPS and anti virus?

Answers

HIPS (Host-based Intrusion Prevention System) and antivirus (AV) are both cybersecurity technologies that are designed to protect against various types of malware and cyber attacks.

Approach: HIPS works by monitoring and analyzing system behavior, looking for suspicious or unauthorized activities that may indicate a cyber attack. It can prevent attacks by blocking or alerting the system administrator to suspicious behavior. Antivirus, on the other hand, uses a signature-based approach to detect known malware and viruses based on their unique code patterns.Coverage: HIPS is designed to protect against a broader range of threats, including zero-day attacks and unknown threats that do not yet have a signature. Antivirus is more effective at detecting known threats but may not be as effective against new or unknown threats.Impact: HIPS can have a higher impact on system performance and may require more configuration and management than antivirus, which typically runs in the background with minimal user intervention.

To learn more about antivirus (AV) click the link below:

brainly.com/question/31785361

#SPJ11

you are a systems administrator for westsim corporation. as part of a new security initiative, the it department has developed a custom application that reports the host name of all clients that try to access three sensitive servers in the accounting department. the application has been working for the last three months. the company expands and adds a new building with a lan connection to the rest of the network. this building has its own subnet, 192.168.5.0. you create a scope on an existing dhcp server for this subnet. during a random check of the reporting software, you discover that the application reports the ip address but not the host name for clients on the new subnet. everything works as designed for hosts on other subnets. you check the dns database and find that none of the hosts on that subnet have an associated ptr record. what should you do? answer manually create ptr records for each host on the subnet. create a primary reverse lookup zone for subnet 192.168.5.0. manually create cname records for each host on the subnet. create a secondary reverse lookup zone for subnet 192.168.5.0. add a hosts file to the server running the reporting software.

Answers

The best solution would be to manually create PTR records for each host on the new subnet in the DNS database. This will allow the reporting application to report the host name for clients on the new subnet, as well as for hosts on other subnets.

To resolve the issue of the reporting application not reporting the host name for clients on the new subnet, the appropriate action would be to manually create PTR records for each host on the subnet.

PTR records are used for reverse DNS lookup and allow a server to determine the hostname associated with an IP address. Without PTR records, the reporting application will not be able to report the hostname for clients on the new subnet.

Creating a primary or secondary reverse lookup zone for the subnet is also a viable solution, but it would require more configuration and may not be necessary if only one subnet is involved.

Manually creating CNAME records for each host on the subnet is not the correct solution, as CNAME records are used for aliasing and not for resolving hostnames from IP addresses.

Adding a hosts file to the server running the reporting software is also not the correct solution, as this would require manually adding entries for each host on the subnet and would not be scalable or efficient in a larger environment.

For more question on DNS database click on

https://brainly.com/question/27960126

#SPJ11

In an online shopping application, the primary case type PurchaseOrder has two child case types: Payment and Packaging. In processing PurchaseOrder case PO-11, Payment case Pay-37 and Packaging case Pac-56 are created. Which statement about the processing of PO-11, Pay-37, and Pac-56 is correct?
A. PO-11 has to be resolved before either Pay-37 and Pac-56 is resolved.
B. Pac-56 has to be resolved before Pay-37 is resolved.
C. Both Pay-37 and Pac-56 have to be resolved before PO-11 can be resolved.
D. PO-11 can be resolved when either Pay-37 or Pac-56 is resolved.

Answers

Answer:

The answer is "Option C".

Explanation:

The principal instance type PurchaseOrder has two types of instance children in an online purchasing application: Pay and Packing. Pay case Pay-37 and packing instance Pac-56 are designed to Sales Orders case PO-11 execution. All statements regarding PO-11, Pay-37, and Pac-56 should be settled before PO-11 may be addressed. Both Pay-37 and Pac-56.

What is the correct format of timestamping (Change of a Speaker)?

Answers

Answer:

Timestamps are in the format [HH:MM:SS] where HH, MM, and SS are hours, minutes, and seconds from the beginning of the audio or video file.

a hard disk is a _ storage device

Answers

electro-mechanical data storage device

Electro-mechanical data storage device

When you perform a search, a general search engine searches the entire Internet.
A. True
B. False

Answers

Answer:

a

Explanation:

general search is a

advanced search is b

Other Questions
what is rapid population growth What is the sum of the series (image below)a. 1,830b. 2,010c. 5,400d. 5,490 density-independent factors that regulate population include all of the following except Write a main code that repeatedly enters a temperature from the user. It also asks the user if the temperature is in Fahrenheit or in Celsius (for example, entering 1 if it is in Fahrenheit and 2 if otherwise). Then, based on the user's inputs, it will call a function named temp_conv() that (you will create as well and it) does the temperature conversion and returns the result. The main code then reports the result to the user. The formulas you need for the function: F = C*1.8 +32 and C = (F-32)/1.8, where F, C are the temperature in Fahrenheit and Celsius, respectively. Show the results for the cases. a. F = 50 and b. C = 35 Use Ctrl+c to stop the program if needed. Katherine was given a tiny lamb by her uncle. The lamb was a runt and had to be fed by hand. Every 3 hoursKatherine had to give it 290 milliliters of milk. How much milk, in LITERS, will the lamb get in 24 hours? after point c, friction acts on the roller coaster and slows it to a stop. what is the work done by friction? Julia withdrew a total of $24.40 from her bank account over 5 days. She withdrew the same amount each day. By how much did the amount in her bank account change each day? In what year and at what number is China population excepted to peak??? Choose the word or phrase that best answers each question. What quality makes The Pillow Book a credible source for examining life within the imperial court during the Heian period? How might The Pillow Book contain bias? Read the following plot synopsis:Callie wanted nothing more than to be on TV. She went toHollywood to try to get a part. At first things were tough,but eventually she landed a role on a popular show.Which ending would be most obvious?A. An old friend of Callie's is cast on the show with her.B. The director asks Callie to try screenwriting too.C. The show turns out to be different from what Callie thought.OD. Callie's dream comes true and she becomes famous.SUBMIT Solve each absolute value inequality. Graph the solutions on a number line. |x-7|>1 Samuel is shooting a series of photos that require his models to dress as octogenarians or very elderly people. However, the models are actually only intheir 20s. In order to get the models to express accurate body language and facial expressions, what kind of direction should Samuel give them?O A.OB.OC.He should ask them to imagine they just won a high-speed car race.O D. He should ask them to imagine they are very sore and stiff after a tough workout.He should ask them to imagine that they are the captain of a ship or leading an army.He should ask them to imagine themselves in a new and unusual setting. Is the non-refundable tuition payment you made to your university this semester a sunk cost? what if tuition was refundable on a prorated basis for the entire semester? Answer in Slope form Explain how enzymes work. Include the term activation energy and compare the two curves, explaining which is with the enzyme. In the xy-plane, the graph of y = 3x^2 -14x intersects the graph of y = 2 at the points (0,0) and (a, a). What is the value of a? Ron has a co-op in Henderson Cooperative. The total shares in the cooperativeare 50,000 shares. If Ron, owns 600 shares, what percentage of the cooperativecorporation does he own? What was the main reason for the Proclamation of 1763? Two charges one positive and one negative both with a charge of 1.1X10-10 C. They are 10-6 m apart. A third charge which is positive is located half between the first 2 charges, and the third charge is 10-17 C. What is the magnitude of force on the third charge segment CD has endpoints at C(0, 3) and D(0, 7). If the segment is dilated by a factor of 3 about point C, what is the length of the image of segment CD question markGroup of answer choices1621412