6) 6. in computer network nodes are a) the computer that originates the data b) the computer that routes the data c) the computer that terminates the data d) all of the mentioned

Answers

Answer 1

In computer network nodes, all of the mentioned alternatives are considered as computer nodes. (Option d) The computer that originates the data, the computer that routes the data, and the computer that terminates the data are all referred to as nodes in a computer network.

Nodes in a computer network are the fundamental building blocks. They communicate with one another, often utilizing various protocols.

The term node refers to any device connected to a network that is capable of communicating with other devices. A node might be a computer, printer, or other electronic gadget. Each node on a network is assigned a specific address so that it can be located and communicate with other nodes.

The nodes that participate in the transfer of data are referred to as intermediate nodes. They act as relay points for data and do not have their data to transfer. The nodes that initiate data transmission are referred to as source nodes. When it comes to terminating data, the nodes that do so are known as destination nodes. The answers are (d) All of the mentioned.

Learn more about computer network: https://brainly.com/question/8118353

#SPJ11


Related Questions

A customer was promised that he will get a free month of service but it was not applied on the account making his service inactive

Answers

It sounds like there may have been an issue with the customer's account, and the promised free month of service was not properly applied.

This could be due to a system error, a miscommunication, or a mistake on the part of the company or the customer. In order to resolve this issue, the customer should contact the company's customer service department and explain the situation.

They should provide any relevant information, such as the date of the promise and any documentation or correspondence related to the free month of service.

The company should then investigate the issue and take the necessary steps to apply the free month of service to the customer's account and reactivate the service.

Learn more about internet services:

brainly.com/question/23902843

#SPJ11

A
loop has a built in count variable.
for
while
range
function

Answers

Answer:

For

Explanation:

If what I am thinking is right, it would be for because a for loop counts how many times it needs to be ran

You frequently want to take some sort of action on each value in an array when you have values in an array. To access each element individually while iterating through the entire array, use a for loop. Thus, option C is correct.

What for is included in built in count variable?

A variable is often used in a counting loop to count from an initial value to an end value. The index variable is another name for this variable.

The index variable used in this illustration is i. A counting loop typically consists of the following six parts: Setup clauses.

A counter variable must be given a starting value. Test: It must perform a test on the counter variable by contrasting it with a result.

Therefore, The function accepts an iterable and returns an object with tuples, the first member of which is the item's index.

Learn more about count variable here:

https://brainly.com/question/13218753

#SPJ2

Networks have changed drastically over the last 30 years. With the first introduction of the 56k modem, which was about 3 typewriter pages per second, to speeds well over 1Gbps these days, the ability to use networks globally, has changed the way we do business. Using research, determine where networks will go in the next 5-10 years and how that might impact the global economy.
At least one scholarly source or reference should be given

Answers

The introduction of 5G technology, for example, is expected to increase speeds to up to 20Gbps and will greatly expand the reach of global networks. Reference: McKinsey & Company. (2020). Capturing the potential of the Internet of Things.


It is predicted that the Internet of Things (IoT) will also continue to grow in the next 5-10 years. According to a recent report from McKinsey & Company, IoT-enabled technology could add up to $11 trillion to the global economy by 2025.

Additionally, advancements in artificial intelligence (AI) are expected to further revolutionize networking. AI can also be used to improve customer service and user experience, as well as offer more personalized and efficient services.

Overall, the growth of global networks in the next 5-10 years is expected to have a significant impact on the global economy. It will improve communication, increase access to resources, enhance user experience, and create greater efficiencies in production.

For such more question on networks:

https://brainly.com/question/1074921

#SPJ11

A sensible strategy for reducing your risk for cybercrime would be to a. log onto public wifi in cafes, libraries, etc. b. throw email attachments in the trash after you have opened them and determined that they're spam. c. turn off your computer when you're not using it. d. keep the same password for all of your transactions.

Answers

A sensible strategy for reducing your risk for cybercrime would be to: c. turn off your computer when you're not using it.

Turning off your computer when you're not using it is a crucial step in reducing your risk for cybercrime. When your computer is turned off, it is disconnected from the internet and prevents any potential unauthorized access or remote attacks. This simple action can significantly minimize the chances of falling victim to cybercriminals.

Leaving your computer connected to the internet while you're not using it increases the risk of being targeted by various forms of cyberattacks. Hackers can exploit vulnerabilities in your operating system or software, launch malware attacks, or attempt to gain unauthorized access to your personal information. By turning off your computer, you create a physical barrier that effectively cuts off any potential entry points for cybercriminals.

Additionally, regularly shutting down your computer provides an opportunity for software updates and security patches to be installed. These updates often address known vulnerabilities and security flaws, making your system less susceptible to cyber threats. By keeping your computer up to date with the latest security measures, you enhance your overall protection against cybercrime.

Learn more about cybercrime

brainly.com/question/32375073

#SPJ11

Write a Python program to convert the characters to lowercase in a string

Answers

Answer:

Following is the program in the python language

st = 'sAN RaN'  #String

print(st.lower()) #display into the lowercase

Output:

san ran

Explanation:

Following are the description of program

Declared and initialized the string in the "st" variable .The lower function in python is used for converting the uppercase string into the lower case string .Finally in the print function we used lower function and display the  string into the lower case

Some countries are considering putting something in explosive materials to help track where they came from. What tool would be used to collect the evidence

Answers

Some countries are considering putting Color coded chips in explosive materials to help track them.

What is the tracker?

Trace evidence refers to the limited particles, fibers, or residues that maybe transferred all the while the production or handling of explosive matters.

The trace evidence collection kit usually includes parts such as unproductive swabs, tweezers, evidence bags, and vials for continuing and storing the samples. These finishes are used to collect and preserve trace evidence establish surfaces, clothing, and different materials that grant permission have come in trade the explosive material.

Learn more about tracker from

https://brainly.com/question/7791539

#SPJ1

Some countries are considering putting what in explosive materials to help track them? -GPS devices-Computer chips-Color coded chips-Location devices.

What would this be?

What would this be?

Answers

Looking into this, the ones that I found that are EC-Council Certified are:

Ethical Hacker (CEH)
Goals:
- Master an ethical hacking methodology
- Grasp complex security concepts
- Learn how to scan, hack, test and secure an organizations information systems


EC-Council Licensed Penetration Tester (LPT) Master

you are concerned that wireless access points may have been deployed within your organization without authorization. what should you do? (select two. each response is a complete solution.) answer implement an intrusion prevention system (ips). check the mac addresses of devices connected to your wired switch. implement an intrusion detection system (ids). conduct a site survey. implement a network access control (nac) solution.

Answers

Since you are concerned that wireless access points may have been deployed within your organization without authorization, the thing that you should do are option B and D:

Check the MAC addresses of devices connected to your wired switch.Conduct a site survey.

Why would a wireless access point be used?

An access point is a component that establishes a WLAN, or wireless local area network, typically in a workplace or sizable structure. An access point transmits a WiFi signal to a predetermined region after being connected to a wired router, switch, or hub through an Ethernet cable.

An individual identification code known as a media access control address (MAC address) is given to a network interface controller (NIC) to be used as a network address in communications within a network segment. The majority of IEEE 802 networking technologies, such as Ethernet, Wi-Fi, and Bluetooth, frequently make use of this.

Note that a Media Access Control (MAC) address is a number that uniquely identifies each connected device on a network. A site survey is conducted with a Wi-Fi analyzer.

Learn more about wireless access points  from

https://brainly.com/question/27334545
#SPJ1

imagine that your project coordinator is using a word processor to review an electronic file of a document you have prepared. the coordinator does not understand the meanings of certain terms you have used in the document. what should the project coordinator do as a reviewer?

Answers

Project coordinator should do as a reviewer, Use the comment feature to ask "Will the reader understand this term?".

How do you use comment feature?The benefit of using the comments feature in word processing programmes is that it offers a simple and efficient way for users to collaborate and make comments on draught documents.An explanation or comment in a computer program's source code that may be viewed by programmers is known as a remark. Compilers and interpreters often disregard them since they were introduced to make the source code simpler for humans to comprehend.A document can have comments added to it without changing the content itself. In the balloons that will show up in the document's margins, you may enter a comment. Additionally, they can be concealed until you wish to modify your article.You may frequently come across the comment symbol (') as you read the code samples. This symbol instructs the Visual Basic compiler to disregard the text or comment that comes after it. Brief explanations are supplied to code as comments for the benefit of readers.

Learn more about comment feature refer to :

https://brainly.com/question/28525289

#SPJ4

Animals living in burrows under the ground is an interaction between the biosphere and the

Answers

Answer:

Geosphere

Explanation:

The geosphere is made up of the rocks and minerals of the earth found in the ground.

Which of the following can data mining NOT do?

Question 1 options:

Help spot sales trends


Save a business from bankruptcy


Develop better marketing campaigns


Predict customer loyalty

Answers

Cannot save a business from bankruptcy. Because data mining can analyze trends and make predictions based on this analysis. But data mining isn’t implementation, that is the job of developers or management team

Data mining will not be able to save a company from going bankrupt.

Data mining and bankruptcy:

The technique of collecting and attempting to discover trends in time series is known as trend analysis. Clustering, classification, regression, and other data mining techniques can be utilized to uncover certain patterns.

Data mining may be used to evaluate patterns and generate predictions based on that information. Data mining, on the other hand, is not implementation; it is the responsibility of the developers or leadership team.

Find out more information about 'Data mining'.

https://brainly.com/question/13954585?referrer=searchResults

Are there any incremented values from one loop to the next?

What variables may be used to track each loop in the program?

Answers

Answer:

You can place any expression you'd like in the final expression of the for loop, but it is typically used to update the counter variable.

counter variable is used throughout those parts. That variable keeps track of the current repetition, and is typically named i . The initialization part initializes the counter variable to a starting value.

Explanation:

Question # 1 Multiple Select Which of the following shows the assignment of a string to a variable? Select 3 options. answer = "23" answer = (23) answer = '23' answer 23 answer = input("How old are you?") ​

Answers

Answer:

answer = input("How old are you?")

Explanation:

Answer is a variable The Input function takes a string

Answer:

answer = input("How old are you? ")answer = '23'answer = "23"

Explanation: Correct on Edg 2020/2021.

Alicia is a dietitian. She gives other people suggestions for nutrition. She wants to organize a large amount of data concerning food, calories, fat grams, protein, cholesterol, and sodium. Alicia should use a _____. word processor smart card digital ink pen database

Answers

Answer:

database

Explanation:

As a dietitian, Alicia must be well-grounded with the way diet and nutrition work in relation to health and disease. So, provided she wants to organize a huge amount of data on this particular field, she should consider the use of a database. This is because the information in the database is well organized and regularly structured. It can also serve as a means of storing, retrieving, and manipulating data sets.

What term is used to describe how mobile computing allows individuals to initiate real-time contact with other systems anywhere, any time since they carry their mobile device everywhere?.

Answers

Broad reach  term is used to describe how mobile computing allows individuals to initiate real-time contact with other systems anywhere, any time since they carry their mobile device everywhere.

What exactly does mobile computing communication entail?

A form of communication known as mobile communications does not require a direct physical link between the sender and the recipient. During conversation, it makes it easier for users to travel from one physical location to another.

Most popular forms of technology for communication-

GSM stands for Global Systems for Mobile Communications.Orthogonal Frequency Division Multiplexing (OFDM) is a technique used in the Long Term Evolution (LTE), Code Division Multiple Access (CDMA), and Universal Mobile Telecommunication System (UMTS) systems.

Learn more about mobile communications

brainly.com/question/14781388

#SPJ4

what is information that can be proven with evidence A opinion B copy C fact D paste

Answers

Answer:

C

Explanation:

A fact is a true statement with evidence

Answer: C. Fact

Explanation: if it was already proven with evidence then we can confirm it was a fact

The database cannot be migrated to a different engine because sql server features are used in the application’s net code. The company wants to a?

Answers

Answer:

Explanation:

B is correct

Computer Vision and Industrial Robots
Consider an industrial robot performing several tasks in an assembly line. Such machines perform a single task with great speed and efficiency. Conduct research on the Internet and list what you feel would be its main components if computer vision was implemented. Ask yourself what are the advantages of adding a computer vision system to this robot. Which robot do you expect better performance from, a robot with computer vision or robot without computer vision.

Answers

Answer:

View Computer Vision Unit Activity.docx from COMPUTER SCIENCE 101 at Edoptions High School. Consider an industrial robot performing several tasks in an assembly line.Machine Vision in industrial applications. Robots working in industrial applications need visual feedback. This is used to navigate, identify parts, collaborate with humans and fuse visua

Explanation:

Many industries are feeling the effects of skilled labor shortages. At the same time, companies are reluctant to invest heavily in training and developing unskilled employees, for fear of losing them afterward through defection to competitors. With no end in sight to the workforce shortfall, the appeal of robots as an efficient supplement, and even replacement, for human labor is continuing to grow.

The cost of robotics is generally falling, and alternative business models like robotics-as-a-service (RaaS) make industrial robots accessible even to companies that don’t have substantial capital budgets to exploit. The affordability of the units themselves, along with the fact that programming is becoming more straightforward and hence less costly, is also boosting the appeal of industrial robotics adoption.

Answer:if u still need help i can help you

Explanation:

what is the main digestive function of the pancreas?

Answers

The main digestive function of the pancreas is the production and secretion of digestive enzymes. These enzymes play a crucial role in breaking down various components of food, such as carbohydrates, proteins, and fats, to facilitate their absorption and utilization by the body.

The pancreas produces and releases digestive enzymes into the small intestine, where the majority of the digestive process takes place. The two main types of digestive enzymes produced by the pancreas are:

1. Pancreatic amylase: This enzyme helps in the digestion of carbohydrates. It breaks down complex carbohydrates, such as starch and glycogen, into simpler sugars like glucose, which can be readily absorbed by the body.

2. Pancreatic proteases: These enzymes assist in the breakdown of proteins. The pancreas produces several proteases, including trypsinogen, chymotrypsinogen, and procarboxypeptidase. These enzymes are initially secreted in their inactive forms and are activated within the small intestine. Once activated, they break down proteins into smaller peptides and amino acids, which can be absorbed and utilized by the body.

In addition to these primary enzymes, the pancreas also produces lipases, which are responsible for the digestion of fats. Lipases break down dietary fats into fatty acids and glycerol, which can be absorbed by the intestinal lining and transported throughout the body for energy production and other functions.

Overall, the pancreas plays a vital role in the digestion and absorption of nutrients by producing and releasing digestive enzymes that help break down carbohydrates, proteins, and fats in the small intestine, enabling their utilization by the body.

Learn more about the pancreas and digestive enzymes: https://brainly.com/question/29735070

#SPJ11

what are worms ? this question is from computer from chapter virus;​

Answers

a computer worm is a stand-alone malicious program which can spread itself to other parts of any device. However, one similarity is that both virus and worms are a subcategory of malware.

Answer:

A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.

Explanation:

Which visual novels do you recommend and why?

Answers

Answer:

I rec recommend Fate/Stay Night. It's honestly so good!

Explanation:

giúp tớ với ạ :( tớ cảm ơn

gip t vi :( t cm n

Answers

\( \huge\green{here \: is \: your \: answer}\)

\( \huge\green{here \: is \: your \: answer}\)

\( \huge\green{here \: is \: your \: answer}\)

Which graph or chart shows changes in the value of data?

a
Bar graph

b
Column chart

c
Line graph

d
Pie chart

Answers

Answer:

Bar graph and Pie chart

Answer:

C And D

Explanation:

edge2020 users

why was the tesla model s help change the was we see EV

Answers

Answer:

It showed people that electric cars are advancing, and soon will be the norm.

Lots of people thought that EV cars would never be able to last as long as gas powered cars. However, with technology importing, Tesla cars are getting closer and closer to being able to provide the same amount of millage as the gas powered cars.

The following piece of code has an error. Select the best category for the error.
score = 75
percent = score / (100-100)
Group of answer choices
a. Syntax
b. Run time
c. Logic or semantic

Answers

The best category for the error is score = 75  c. Logic or semantic.

The error in the code is a logical or semantic error. The variable "percent" is being assigned a value based on a formula that divides "score" by the difference between 100 and 100 (which is 0). This results in a division by zero error and an incorrect value being assigned to "percent". The syntax of the code is correct, and there are no issues that would cause a run time error.

Text that is grammatically correct but makes no sense is a semantic mistake. In the case of the C# programming language, an illustration would be "int x = 12.3;" - This sentence is illogical since 12.3 is not an integer literal and there is no implicit conversion from 12.3 to int.

Semantic errors are issues with a software that runs properly but accomplishes the wrong thing despite not generating error messages. As an illustration, an expression might not be assessed in the sequence you anticipate, leading to an inaccurate outcome.

Semantic mistake definitions. a mathematical or logical error that needs to be found at run time.

To know more about semantic error, click here:

https://brainly.com/question/873851

#SPJ11

The error in the given code is a logic or semantic error due to the incorrect calculation of the denominator value.

It is important to identify and rectify such errors to ensure the correct functioning of the code.

The error in the given code falls under the category of logic or semantic errors.

This is because the code is trying to divide the score by (100-100), which is equal to zero.

Any number divided by zero is undefined, and hence the calculation is not logically correct.
The code is trying to calculate the percentage of the score, but due to the logical error, it is not achieving the desired result.

This error could lead to incorrect results and affect the performance of the code.
To rectify this error, we need to change the denominator value to a non-zero value.

In this case, we need to subtract 100 from 100, which will result in zero.

Instead, we should subtract 100 from 100 percent, which is equal to one.

The corrected code should be:
score = 75
\(percent = score / (100-100)\)
\(percent = score / (100-100)\)
\(percent = score / (1-1)\)
\(percent = score / 0.01\)
\(percent = score \times 100\)
In this corrected code, we first subtract 100 from 100 percent to get the correct denominator value.

Then we divide the score by the corrected denominator value to get the percentage.

Finally, we multiply the result by 100 to get the percentage value in the desired format.

For similar questions on Error

https://brainly.com/question/30062195

#SPJ11

data is moved from one pc to another in discrete chunks called

Answers

data is moved from one PC to another in discrete chunks called packets. A packet is a unit of data that is transmitted from one device to another over a network. It contains a payload of data, as well as information about the destination address, source address, and other information needed to route the packet through the network. Packets are used to ensure that data is transmitted efficiently and reliably over a network. They are typically small in size, ranging from a few bytes to a few kilobytes, and are transmitted over the network one at a time. The process of breaking up data into packets is called packetization, and it is an important part of network communication. When a device sends data over a network, it breaks the data up into packets and sends them to the destination device, where they are reassembled into the original data.

data is moved from one PC to another in discrete chunks called packets, which are units of data that contain information about the destination address, source address, and other routing information needed to transmit the data over a network. Data is moved from one PC to another in discrete chunks called "packets." When data is transferred between computers, it is broken down into smaller pieces known as packets. These packets are then sent individually through the network, and upon reaching the destination, they are reassembled to form the original data. This method of transferring data in packets allows for more efficient and reliable communication between devices.

In computer networking, data transfer involves breaking down large pieces of information into smaller, manageable chunks called packets. This process is known as packetization. Each packet contains a portion of the data along with header information that helps in proper routing and reassembly at the destination. The packets are sent independently over the network, taking different paths if necessary. Once they arrive at the destination, they are reassembled into the original data, allowing for efficient and reliable data transfer between PCs.

To know more about discrete chunks visit:

https://brainly.com/question/31678443

#SPJ11

question 3 in user-centered design, during which step do designers come up with ideas for what the product might look like?

Answers

Ideation, or the act of producing ideas, is the third step in the Design Thinking process. By this time, you are aware of your target market's needs and desires. Additionally, you have a precise problem statement that you hope to answer. It's time to brainstorm potential solutions at this point.

What are designers  ?

A designer is someone who creates blueprints or sketches to plan out an object's shape or structure before it is created.In actuality, the term "designer" can be used to describe anyone who produces real or intangible objects, goods, procedures, laws, games, visuals, services, or experiences.Architectural design was formerly the sole discipline that was considered to be the primary form of design. Clothing, furniture, and other everyday items were designed primarily by hand by artisans or by following tradition.Due to the demands of mass production, where greater time is typically accompanied by more expense, industrial design in today's society has become increasingly sophisticated. As a result, production processes have also become more complex, and with them, the relationship between designs and their production.

To know more about designers  , visit

https://brainly.com/question/25941596

#SPJ4

Write down the difference between Sub... end sub and function... end function statement.
any 3 points, please ​

Answers

A sub does something but doesn't give something back. A function provides a value representing the tasks completed. Subs come in many different types and can be recalled from anywhere in the program.

What is sub and end sub in VBA?

A Sub procedure is a collection of Visual Basic statements that are delimited by the Sub and End Sub statements and that carry out tasks without producing a result. A calling procedure may give constants, variables, or expressions as inputs to a sub process.

Various processes are used in Visual Basic, including: Sub Procedures carry out tasks but do not provide the calling code with a value in return. Sub procedures known as "event-handling procedures" run in response to an event triggered by a user action or by a program occurrence.

Thus, A sub does something but doesn't give something back.

For more information about sub and end sub in VBA, click here:

https://brainly.com/question/26960891

#SPJ1

In Python, a function is _____.

a group of instructions that can be used to organize a program or perform a repeated task

a value that can be passed back to the calling part of a program

a formula that pairs each x-value with a unique y-value

a value that can be passed

Answers

Answer:

a group of instructions that can be used to organize a program or perform a repeated task

Explanation:

A function is a group of commands that can be called upon with extra parameters if needed.

Example:

def foo():                          #defining this function and naming it foo

    return True                 #what is performed when foo is called on

if foo() == True:               #foo() is calling on a function named foo

   print('yes')

True or false, USBs are slower than RAM.

Answers

Answer:

False

Explanation:

Other Questions
Find the sum of the first 7 terms of the following sequence. Round to the nearesthundredth if necessary. Find the missing value what is 8.05 x 10 to the 5th power in standard notation Distillation is a technique in which substances are separated based on their what The novice director begins the videotaping of a simple interview show with the following cues: Ready C.G. Take C.G. Take slate. Ready black. Fade to black. Ready to come up on 1. Ready to cue Paula. Open mic Cue Paula Fade in 1 What is the major mistake in this opening sequence? The coperican model of the solar system was a ____ model in which Earth_____ . Planets _____ and the stars____. to be sure your investment earnings benefit from compounding, what should you do first? Thunderhorse Oil is a U.S. oil company. Its current cost of debt is 7.30%, and the 10-year U.S. Treasury yield, the proxy for the risk-free rate of interest, is 3.00%. The expected return on the market portfolio is 8.20%. The company's effective tax rate is 40%. Its optimal capital structure is 75% debt and 25% equity.a. If Thunderhorse's beta is estimated at 1.30, what is Thunderhorse's weighted average cost of capital?b. If Thunderhorse's beta is estimated at 0.90, significantly lower because of the continuing profit prospects in the global energy sector, what is Thunderhorse's weighted average cost of capital? Why are short-range earthquake predictions often unsuccessful? choose all that apply. how many permutations of three different digits(3-digit numbers)are there, chosen from the ten digits 0 to 9 inclusive The concept that human and animal diseases are caused by microorganisms is called the:________ In China, who is the head of government and how do they get power?A. Emperor; they get power by being chosen by the Chinese Communist Party. B. Premier; they get power by being chosen by the Chinese Communist Party. C. President; they get power by being chosen by the Chinese Communist Party. D. Prime Minister; they get power by being chosen by the Chinese Communist Party. simplify 9 1/2 x 9 1/2 using radical formanswers to choose from are 3, 9, 81 or 6561 Please help Im so bad at this :/ 29. A computer club secretary records attendance every week for 34 weeks.The dot plot shown displays the data.Computer Club Weekly AttendanceMean: 9Median: 90 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16Number of StudentsIn the thirty-fifth and the thirty-sixth weeks, the numbers of studentsattending the club meeting are 8 and 15.Select a word or phrase for each box to complete the statementsshowing the effect of the thirty-fifth and the thirty-sixth weeks on themeasures of center and variability. For each box, fill in the bubble beforethe word or phrase that is correct.increasesThe value of the mean decreasesstays the sameThe value of the medianincreasesdecreasesstays the sameincreasesThe value of the range o decreasesstays the same express the relation between m2 , cm2 , mm2 and km2 How many dimensions does a plane have?OA. ThreeB. ZeroO C. TwoD. One DEATH RACE FOR LOVE 999In 1941, the ________ was signed by Great Britain and the United States, stating that neither country wanted to acquire territory nor would attempt to govern other nations.Marshall PlanUnited Nations CharterTruman DoctrineAtlantic Charter suppose your firm adopts a technology that allows you to increase your output by 15%. if the elasticity of demand is 3.0, how should you adjust price if you want to sell all of your output? 2) Put the following numbers in order fromgreatest to least.6.05, 6.007, 6.5, 6.25