Select any application used in your organization or any application that you are working on to develop, maintain or test (If you are unable to find one such application, you may choose any application in the public domain). Find out the architecture of the application. You may be able to find the architecture in the supporting documents for the application. Study and understand the architecture and then attempt the following.
Create an architecture diagram for the application. You can use a readymade diagram if you are able to find one.
List the architecturally significant requirements that shaped the architecture of the application.
Discuss how the architecture addresses any three quality attributes defined by the architecturally significant requirements identified in step 2.
Identify architectural patterns used in the architecture
Analyse the architecture for any three failure scenarios and suggest improvements in the architecture to prevent these failures. If you are unable to find any failure scenarios, suggest three generic improvements that could make the architecture better in your opinion.

Answers

Answer 1

Analyzing the application's architecture, identifying significant requirements, addressing quality attributes, identifying architectural patterns used, and suggesting improvements for failure scenarios or overall enhancement.

Application: E-commerce Website

1. Architecture Diagram:

  Create a visual representation of the application's architecture, including its major components, modules, and their interactions. This diagram can be created using various tools like Lucidchart, draw.io, or any other diagramming tool.

2. Architecturally Significant Requirements:

  Scalability: The ability of the application to handle increasing user traffic and growing data.   Availability: Ensuring the application remains accessible and operational even during hardware or software failures.   Security: Protecting user data, preventing unauthorized access, and ensuring secure transactions.

3. Addressing Quality Attributes:

  Scalability: The architecture may include horizontal scaling by employing load balancers and distributed caching to handle increased traffic. It can use a distributed database to manage data growth.   Availability: The architecture can incorporate redundancy and fault-tolerant components such as load balancers, multiple web servers, and database replication. It may also use auto-scaling mechanisms to handle traffic spikes.   Security: The architecture may include firewalls, secure communication protocols (e.g., HTTPS), authentication mechanisms, encryption for sensitive data, and regular security audits.

4. Architectural Patterns:

  Model-View-Controller (MVC): Separating the application into three interconnected components to manage user interactions, data, and presentation.   Microservices: Breaking down the application into smaller, loosely coupled services that can be developed, deployed, and scaled independently.   Layered Architecture: Organizing the application into layers (e.g., presentation layer, business logic layer, data access layer) to separate concerns and improve maintainability.

5. Failure Scenarios and Improvements:

  Scenario 1: Database Failure

    Improvement: Implementing database replication or a distributed database solution to ensure data availability and fault tolerance.

  Scenario 2: Network Outage

    Improvement: Introducing a content delivery network (CDN) to cache static assets and reduce dependency on a single network infrastructure.

  Scenario 3: Security Breach

    Improvement: Implementing a robust authentication and authorization mechanism, performing regular security audits, and staying up-to-date with security patches and protocols.

The above example is generalized, and the actual architecture, requirements, and improvements will vary depending on the specific application being analyzed.

For your own application, you will need to study and understand its architecture, document the architecture diagram, identify architecturally significant requirements, discuss how the architecture addresses quality attributes, identify architectural patterns, and analyze failure scenarios to suggest improvements.

Learn more about the application's architecture and architectural patterns: https://brainly.com/question/31061973

#SPJ11


Related Questions


What is the best strategy to avoid paying interest on your credit cards?
A. Pay the minimum balance each month.
B. Have credit cards from two different banks.
C. Pay the full balance each month.
D. Make payments online.

Answers

Pay full balance each month

Suggest 2 reasons why a system might maintenance after a while

Answers

Answer:

Prevention Against Viruses and Malware.

Speed up Your Computer.

Explanation:

Bob The Penguin is a real you-tuber, and he plays Mine-craft. Who is his owner?

Answers

Is this even a real question-?

Each card in TigerGame is represented as an object of class Card. This class has three private member variables: rank (a value between 1-10), color (either purple or orange), and value, which is calculated as explained above. Use in-class initialization to initialize rank to 0, color to purple, and value to 0. Note that color is an enumerated type of type Color, which is added as a public member to Card.
Card has a parameterized constructor, which you will use to create an instance of each card in TigerGame (e.g., an orange card with rank 2). This constructor should initialize rank and color with the arguments provided and set value to its correct value given rank and color.
Card also has a function printCard() which must return a string in the following format:
color:rank. For example, for an orange card of rank 4 , printCard() should return orange:4.
The remaining three functions are getter functions to retrieve the values of the private member variables.
Card
rank: int
color: Color
value: int
+ enum Color {purple, orange}
+ Card()
+ Card(rank: int, color: Color)
+ printCard(): string
+ getRank(): int
+ getColor(): Color
+ getValue(): int

Answers

How to implement the card game in C++?

To implement the Card class in C++, you can use the following code:

#include <iostream>

#include <string>

class Card

{

 public:

   enum Color { purple, orange };

   Card()

   {

       rank = 0;

       color = purple;

       value = 0;

   }

   Card(int rank, Color color)

   {

       this->rank = rank;

       this->color = color;

       this->value = (color == purple ? rank : 10 - rank);

   }

   std::string printCard()

   {

       std::string colorString = (color == purple ? "purple" : "orange");

       return colorString + ":" + std::to_string(rank);

   }

   int getRank() { return rank; }

   Color getColor() { return color; }

   int getValue() { return value; }

 private:

   int rank;

   Color color;

   int value;

};

This code defines a Card class with the three private member variables rank, color, and value, as well as the public Color enumerated type. The class has a default constructor that initializes these member variables to default values, as well as a parameterized constructor that initializes the rank and color member variables with the provided arguments and calculates the correct value for the value member variable based on the rank and color.

The class also defines the printCard(), getRank(), getColor(), and getValue() functions, which provide the specified behavior for printing a card, as well as retrieving its rank, color, and value.

To Know More About C++, Check Out

https://brainly.com/question/23959041

#SPJ1

you need an app for employees to manage their time off requests with human resources. you find an app that fits your needs perfectly from a website called freeapps4u.ru. you know you could download the app and sideload it onto the windows 10 devices. what should you do?

Answers

On a Windows 10 machine, you must enable sideloading. After launching the Settings app, you went to Update & Security.

Which of the following qualifies as one of the requirements for setting up a Microsoft Store for Business?

To join up for Microsoft Store for Business and Education, download apps, distribute apps, and manage app licenses, IT pros require Azure AD or Office 365 accounts.

Which kind of software allows users to try out a program for free before paying a license price to keep using it?

Shareware is software that is offered to users as a free trial with the possibility of a later purchase.

To know more about enable sideloading visit :-

https://brainly.com/question/13018453

#SPJ4

True or False: Nested elements must be indented with respect to parent elements in
order for the code to be properly displayed in a browser

Answers

Answer:

true

Explanation:

¿ Porque la madera presenta mayor resistencia a ser cortada en sentido travesal que en sentido longitudinal

Answers

A medida que crece un árbol, la mayoría de las células de madera se alinean con el eje del tronco, la rama o la raíz. Estas células están compuestas por haces largos y delgados de fibras, aproximadamente 100 veces más largas que anchas. Esto es lo que le da a la madera su dirección de grano.

La madera es más fuerte en la dirección paralela al grano. Debido a esto, las propiedades de resistencia y rigidez de los paneles estructurales de madera son mayores en la dirección paralela al eje de resistencia que perpendicular a él

1. Describe a recent modern "story" you heard, read, or saw. Explain how that story taught you an important idea about life, family, or society. Be sure to talk about where/how you heard/read about the story in your description.

2. Describe a simulation game you've played recently or have heard about (you may even propose a simulation game idea yourself). Explain why that game fits the definition ofba simulation.

3. in an age of books, films, television, why are games important?

4 think of a game you enjoy. For that game, Describe some of its objectives, rules, operstion, obstacles, and outcomes.

5. What is the main difference between a video game and other types of games (board games, card games, tag, etc.)? What are the similarities?​

Answers

due to recent times there has been injustice. the movement im talking about is blm or alm. theese rough times when socitey cant agree with each other. during theese times its taught me alot about both sides arguments. may 25 2020 "i cant breathe i cant breathe i cant breathe" george floyed was killed may 25 2020 this is when this whole mess started. building being burnt down to crips. people raiding the streets. people getting hurt. the pain some people felt was to much to handle that they dealt with it wrong. here is were alm comes in. alm all lifes matter, mexican lifes matter, black lifes matter, muslims lifes matter, chinnese life matetr white lifes matter unborn lifes matter and much more. blm supporters disagree that all lifes dont matetr untill black lifes do and that alm didnt exist until blm did. theese tough times taught me society needs to stick togther now more then ever and that the skin tone your size your religon dosent matter just how you treat other.

a simulation game. a stimulation game i propose is a simulation game were you live normal life. get a job pay rent and ect. which would teach kids how to work and how to earn money how to pay taxes. this game would be perfect to teach kids the importance of money and that money isnt earned easy. how i imagine it is the game is all about investing buying a better house getting a good job and not going bankrupt. you could even start a buisness which other players can shop in. this game would be the perfect fun and educational game.

in an age of books, films, television, why are games important? games can come in diffrent forms some teach you how to stay safe. some teach you how to run a buisness. some can even teach you how to invest. game can be educational and fun at the same time! games are great for whenever its raining outside and you have some spare time to get cozy and enjoy a game. some games can even bost your mental strength with puzzels and maze's which help your brain stay healthy.

my favorite game, is a board game monopoly. its a game were you invest in properties and NOT go bankrupt! its a fun game with lots of obstacles i enjoy that you play it with lots of people because in real life you will have obstacles people will try and get in your way.

a video game and a board game. the diffrence is video games can be good but can take a bad turn wuick to much is bad for you and like drugs can become addictive and somtimes even dangerous with hackers. a board game is safe because you just play it with your faimly and friends and there is no virus no hackers. there can be cheaters but much safer than video games. the simarlity is that they both can bost your mental stregth and keep your brain active with lots of thinking on the best move.

this took so long so i hope you like it!

What is one disadvantage of transmitting personal data using digital signals?
A. The data cannot be accessed by other computers.
B. The data could be accessed or stolen.
C. The data are easily changed into different data.
D. The data can be changed by being transmitted.

What is one disadvantage of transmitting personal data using digital signals?A. The data cannot be accessed

Answers

Answer: The answer to your question is B i hope this helps

the reason for this is because useing digital signals can be hac,ked or accessed by another person so there for you maybe have to use another way.

Explanation:

i hope this helps if it does have a brilliant day and have a smile

B I think I’m not sure but I hope it helps

When working with text boxes and shapes, which tab contains settings for applying shadows and 3-D rotation to objects?

Answers

Answer:

The answer is "Effects".

Explanation:

The effects and 3-D rotary features were included in the Home tab of Microsoft Presentation. It allows some special effects on the slides. In the presentation, it can animate text, images, forms, tables, SmartArt graphic-plural as well as other objects. The object could appear, disappear or travel through effects. You can change the size or color of an item.

- What is the function of these 3 types of application software
Word Processing
Spreadsheet
Database

Answers

A word processor is a computer application used to write and edit documents, arrange the text's layout, and preview the printed version on a computer screen.

What purpose does spreadsheet software serve?

A spreadsheet is a piece of software that you can use to quickly execute mathematical operations on statistical data, add up many columns of numbers, or calculate averages and percentages.

What use does database software serve?

Users of database software can centrally manage, store, access, and save data. Additionally, it makes it simple for users to control who has access to the database and what permissions they have, protecting the data.

To learn more about software visit:

brainly.com/question/985406

#SPJ1

What duration of blank roll should Jon begin with to avoid ripples at the start of the tape?
OA. 5 seconds
OB. 15 seconds
OC. 20 seconds
OD. 30 seconds​

Answers

Answer:

I think 5 seconds because the others just make no since for it lol

Answer:

the answer is C 20 seconds

Explanation:

i researched this question so much that i want to help people get the right answer. hope this helps for everyone else who comes across this Q. stay safe

state one device that may be found on a computer monitor that is used for video conferencing

Answers

Answer: Camera and Microphone

Explanation:

This can be  embedded on to the monitor.m

Camera for Visual

Microphone for radio.

Which option identifies the programming paradigm selected in thr following scenario? A student is writing a science fiction story that deals with artificial intelligence. He wants to be realistic. He decides to add computer terms to the story that pertain to his storyline.

A. Java
B. Python
C. Perl
D. Ruby

Answers

Answer:

java

Explanation:

Java es rápido, seguro y fiable. Desde ordenadores portátiles hasta centros de datos, desde consolas para juegos hasta computadoras avanzadas, desde teléfonos móviles hasta Internet, Java está en todas partes. Si es ejecutado en una plataforma no tiene que ser recompilado para correr en otra. Java es, a partir de 2012, uno de los lenguajes de programación más populares en uso, particularmente para aplicaciones de cliente-servidor de web

"An internal system behind a firewall needs to be configured for remote access. How should Network Address Translation be configured?"

Answers

Answer:

The appropriate answer will be "Port forwarding ".

Explanation:

Port forwarding seems to be a network security strategy whereby a gateway or equivalent system communicates all intercepting communication/traffic from a specific address to some of the same port on just about any interior single node.This allows the connection of an entity in this context device that is connected to an inner reference node/port usually connecting to Internet infrastructure as well as an internal private local area network.

write any two uses of word processing software


Answers

Answer:

Editing , saving and printing document

Word processing software is a multi-purpose tool with several uses. Here are two examples:

Document Creation: Word processing software is largely used for document creation and editing.

It has an easy-to-use interface with features including formatting settings, spell checking, and the ability to integrate photos, tables, and other multimedia components.

Word processing software encourages collaboration by allowing numerous people to work on the same document at the same time.

Thus, it allows for real-time editing, commenting, and monitoring of changes, making team collaboration on projects easier.

For more details regarding software, visit:

https://brainly.com/question/32237513

#SPJ6

which of these describe raw data?check all of the boxes that apply A) what a person buys B) where a person lives C) data that has been analyzed D) data that has not been analyzed

Answers

D) data that has not been analyzed

A company hires Brandon, a software engineer. Brandon is asked to work on a project with others in order to meet a tight deadline. He finds himself in weekly meetings to discuss the direction and status of the project, but most of his time is spent creating code. What is Brandon's specialization?

system management
system support
system collaboration
system development

Answers

Answer:

System developement

Explanation:

he is creating code, which is devloping the system.

What is the difference between PowerPoint and Outlook?

PowerPoint is a presentation program; Outlook is a personal information management application.
Outlook is a presentation program; PowerPoint is a personal information management application.
PowerPoint is a program that lets you create, edit, format, and print written documents; Outlook is a computer application that uses a grid system to organize and manipulate data.
Outlook is a program that lets you create, edit, format, and print written documents; PowerPoint is a computer application that uses a grid system to organize and manipulate data.

Answers

Answer:

PowerPoint is a presentation program; Outlook is a personal information management application.

Explanation:

Powerpoint is the program used in presentations where slides designed and then shown to the audience.

Outlook is used to display various types of personal information like calendar appointments and emails.

What is the 4-bit number for the decimal number ten (10)?A. 0010B. 1010C. 0110D. 0101

Answers

The 4-bit number for the decimal number ten is 1010, hence option B is the correct answer.

What is meant by the term 4-bit number?

4-bit computing refers to computer architectures in which integers and other data units are four bits wide. 4-bit central processing unit (CPU) and arithmetic logic unit (ALU) architectures are those based on 4-bit registers or data buses.

In summary, The term "4-bits" refers to the ability to represent 16 different values. Depending on the architecture of the circuit, these values could be anything.

Learn more about 4-bit numbers here:

https://brainly.com/question/30034402

#SPJ1

A(n) event is an action taken by the user or a process, such as a user clicking a mouse or pressing a key on a keyboard.

Answers

Answer:

The answer is event

Explanation:

Answer:

event

Explanation:

got it right on edge

Write a program that will ask the user to enter the amount of a purchase. The program should then compute the state and county sales tax. Assume the state sales tax is 5 percent and the county sales tax is 2.5 percent. The program should display the amount of the purchase, the state sales tax, the county sales tax, the total sales tax, and the total of the sale (which is the sum of the amount of purchase plus the total sales tax). Hint: Use the value 0.025 to represent 2.5 percent, and 0.05 to represent 5 percent. Miles-per-Gallon

Answers

Answer:

purchase_amount = float(input("Enter the amount of a purchase: "))

state_sales_tax = purchase_amount * 0.05

country_sales_tax = purchase_amount * 0.025

print("The amount of the purchase is " + str(purchase_amount))

print("The state sales tax is " + str(state_sales_tax))

print("The county sales tax is " + str(country_sales_tax))

print("The total sales tax is " + str(state_sales_tax + country_sales_tax))

print("The total of the sale is " + str(purchase_amount + state_sales_tax + country_sales_tax))

Explanation:

*The code is in Python.

Ask the user to enter purchase amount

Calculate the state sales tax, multiply purchase amount by 0.05

Calculate the county sales tax, multiply purchase amount by 0.025

Calculate the total sales tax, sum the state sales tax and county sales tax

Print the amount of the purchase, state sales tax, county sales tax, total sales tax and  total of the sale

The program is a sequential program, and does not require loops or branching.

The program in Python, where comments are used to explain each line is as follows:

#This gets input for the purchase amount

amount = float(input("Amount: "))

#This calculates the state sales tax

stateTax = amount * 0.05

#This calculates the county sales tax

countyTax = amount * 0.025

#This prints the purchase amount

print("Purchase Amount:" ,amount)

#This prints the state sales tax

print("State Sales Tax:",stateTax)

#This prints the county sales tax

print("County Sales Tax:",countyTax)

#This calculates the total tax

totalTax = stateTax + countyTax

#This prints the total sales tax

print("Total sales tax:",totalTax)

#This calculates the total sales

totalSales =amount + totalTax

#This prints the total sales

print("Total sales:",totalSales)

Read more about sequential programs at:

https://brainly.com/question/23275071

Why should we not underestimate the widespread of mass media?
Select one:

a.
While we do not seem to be aware of it, media has always been a useful and influential part of our lives.

b.
Media's span of influence knows no bounds

c.
All of the given choices are correct

d.
The media could reach almost anywhere in the world

Answers

C. A false statement by a good media source can go a long way

We should not underestimate the widespread of mass media because C. All of the given choices are correct.

It should be noted that media has always been a useful and influential part of our lives and its span of influence knows no bounds.

Also, it's important for one not to underestimate mass media because media could reach almost anywhere in the world. Therefore, all the options are correct.

Read related link on:

https://brainly.com/question/23270499

What are Apps?
How do we interact with them?

Answers

Answer:

Sliding elements in list format.

Cards.

Images.

Buttons.

Overflow screens.

Multiple selection app interactions.

Text input fields.Explanation:

Question 3
10 pts
Moving a mouse or touch screen is an example of
Input
A.Processing
B.processing
C.storage
D.output

Answers

Answer:

Output is the answer!

Explanation:

The input is when you move the mouse in real life, while the output is when the mouse moves around on the screen.

Brainliest plz

What is the difference between a synonym and an antonym?

1. synonym is a word that is opposite of a given word and an antonym is the same
as a given word.

2. synonym means the same as a given word and an antonym means the opposite
of a given word.

3. synonym is only found in a thesaurus and an antonym can be found in a dictionary.

4. synonym is the same as the definition of a given word and an antonym is similar
to the definition of a given word.

Help pls

Answers

Answer 2 is the correct one

17 Answer: antonyms

Explanation:


2 A_______
uses graphics or pictures to help the user navigate and
access programs

Answers

Answer:

the interface

Explanation:

True or False. A Windows Server running the iSCSI Target feature requires that the Microsoft iSCSI Initiator Service to be in Running status.

Answers

A Windows Server running the iSCSI Target feature requires that the Microsoft iSCSI Initiator Service to be in Running status: True.

In Cloud computing, a storage area network (SAN) refers to a high-speed computer network that is specially designed and developed to avail end users the ability to have an access to a consolidated, block-level data storage.

Hence, a storage area network (SAN) is typically designed to connect network servers to a data storage.

iSCSI is an acronym for Internet Small Computer System Interface and it is an internet protocol (IP) standard that is used essentially on a storage area network (SAN), for connecting data storage facilities over a transmission control protocol and internet protocol (TCP/IP).

On Windows Server, after an iSCSI Target feature has been installed, you should proceed to create a new iSCSI virtual disk and then configure the access server on your computer system.

By the default, the Microsoft iSCSI Initiator Service is stopped on Windows computer.

In order to use it, you must start the service and make sure its status reads "Running" before any configuration can be done.

Read more: https://brainly.com/question/24228095

can you give me the answers for all of these? if possible, an explanation with the first problem would be helpful as well!

can you give me the answers for all of these? if possible, an explanation with the first problem would

Answers

Bit shifting or Bit string flicking is a process in computer programming where the binary representation of a number is moved a specified number of bits to the left or right.

What is Bit Shifting?

A left shift operation shifts all the bits of a number to the left and fills in the rightmost bits with zeros. A right shift operation shifts all the bits of a number to the right and fills in the leftmost bits with either zeros or the original value of the most significant bit, depending on the type of right shift.

In programming, bit shifting is often used for fast multiplication or division by a power of 2, as well as for manipulating bit masks and flags stored in binary representation.

Here are a few examples of left and right shift operations:

Left Shift:

Suppose we have the number 5 represented in binary as 00000101, and we perform a left shift by 2 bits. The result would be 00010100, which is equal to 20 in decimal.

Right Shift:

Suppose we have the number 20 represented in binary as 00010100, and we perform a right shift by 2 bits. The result would be 00000101, which is equal to 5 in decimal.

In both cases, shifting the bits to the left multiplies the number by a factor of 2^n, where n is the number of positions shifted, while shifting the bits to the right divides the number by a factor of 2^n.

To learn more about Bit Shifting, visit: https://brainly.com/question/29850970

#SPJ1

a workgroup model is recommended for networks of what size?

Answers

A workgroup model is typically recommended for networks of small to medium sizes.

A workgroup model is designed to cater to the needs of small to medium-sized networks. Workgroup models are characterized by their simplicity and ease of setup, making them suitable for environments with limited resources or a smaller number of users.

These networks typically consist of a few dozen to a few hundred devices, such as computers, printers, and shared resources, all interconnected within a localized area.

Workgroup models offer several advantages for smaller networks. They are cost-effective, as they require less infrastructure and hardware compared to larger enterprise-level models. Workgroup networks are relatively easy to manage, with minimal configuration and maintenance requirements.

They also provide a more flexible and decentralized approach, allowing users to share resources and collaborate effectively within the workgroup.

However, as the network size grows beyond a certain threshold, the limitations of a workgroup model become apparent. Workgroup networks may experience performance issues and difficulties in scaling to accommodate a larger number of devices or users.

In such cases, transitioning to a more robust and scalable network model, such as a client-server architecture or an enterprise-level solution, becomes necessary to ensure optimal performance and efficient management.

Learn more about workgroup model here:

https://brainly.com/question/31081324

#SPJ11

Other Questions
if john lies to his mother about his grades, and his father then takes away his allowance money, the form of discipline is called: Which of the following was the first General of the United Nations forces sent to help South Korea?A: Harry TrumanB: Douglas MacArthurC: Matthew RidgwayD: Dwight Eisenhower 50 PONITSIf you travel 82 km in 40 minutes, what is your speed in km/h? whats 3p times 20324 PLEASE SOMEONE HELP!!Read the passage from chapter 7 of Animal Farm.As Clover looked down the hillside her eyes filled with tears. If she could have spoken her thoughts, it would have been to say that this was not what they had aimed at when they had set themselves years ago to work for the overthrow of the human race. These scenes of terror and slaughter were not what they had looked forward to on that night when old Major first stirred them to rebellion. If she herself had had any picture of the future, it had been of a society of animals set free from hunger and the whip, all equal, each working according to his capacity, the strong protecting the weak, as she had protected the lost brood of ducklings with her foreleg on the night of Major's speech. Insteadshe did not know whythey had come to a time when no one dared speak his mind, when fierce, growling dogs roamed everywhere, and when you had to watch your comrades torn to pieces after confessing to shocking crimes. There was no thought of rebellion or disobedience in her mind. She knew that, even as things were, they were far better off than they had been in the days of Jones, and that before all else it was needful to prevent the return of the human beings. Whatever happened she would remain faithful, work hard, carry out the orders that were given to her, and accept the leadership of Napoleon. But still, it was not for this that she and all the other animals had hoped and toiled. It was not for this that they had built the windmill and faced the bullets of Jones's gun. Such were her thoughts, though she lacked the words to express them.Which statement best describes the use of satire in this passage?Parody is used to illustrate the impact of Stalins purge.Ridicule is used to show the gullibility of the Russian citizens.Reversal is used to show how Clover, representing the people, has changed ideals.Personification is used to show the reader Stalins thoughts and feelings. The Quebec Act:made the French settlers very bitterdenied the right of citizenship to the people of New Francerestored rights to the people of New Francecreated tension between Canada and the United States A certain tiger shark is 55 cm long at birth and grows 2.5 cm / year. A certain hammerhead shark is 25 cm long at birth and grows 5 cm/year. When will the sharks be equal in length? Let x = time in years Let y = length of the sea creatures which endoparasite can be contracted by penetration of the skin? Cindy runs 2 kilometers every morning. She takes 2 minutes for the first 250 meters, 4 minutes for the next 1,000 meters, 1 minute for the next 350 meters, and 3 minutes for the rest.Cindys average speed for the entire run is meters per minute. One kilometer is the same as 1,000 meters. Consider a monopolistically competitive firm, called Carter Co., who has high fred costs. Illustrate the short run equilibrium for this firm and explain what it means for the firm's costs, equilibrium price and profits in relation to a monopolist called Dexter Ltd., whose fixed costs are lower, but who has a high reliance on oil to produce. How and why does the transition process to the long run equilibrium and the long run equilibrium itself differ for Carter Co. and Dexter Ltd? Which firm would you expect to experience greater economic vulnerability? You should explain your answers Answer: does anyone know any other apps i can use, i have to watch an add every time otherwise the answer is blurred hosting a tea party and are able to invite six historical figures from list below to join you1. why did you invite the six members you did? why not the other?2. when you sit down at the table, where will you seat everyone and why will you seat them there? what willbe the arragement of the table?3. what type of conversation do you expect the group to have? what topics do you expect them to discuss?the LIST: abraham lincolnandrew johnsonjohn wilkes boothA scalawagA carpetbaggerThaddeus StevensRobert E LeeUlysses S GrantNathaniel Bedford ForrestJefferson DavisMr. Plantation OwnerMr. Freed Slave A broker has calculated the expected values of two different financial instruments X and Y. Suppose that E(x)= $100, E(y)=$90 SD(x)= 90$ and SD(y)=$8. Find each of the following. a. E(X+ 10) and SD(X+ 10) b. E(5Y) and SD(5Y) c) E(X+ Y) and SD(X+ Y)d) What assumption must you make in part c? After everything with slavery, the war, Reconstruction, why would it be nearly 100 more years before African Americans would earn their full freedom? Which one of the following statements is correct? Sensitivity analysis reflects diversification. Only one input variable change in scenario analysis. The higher forecasting risk, the lower possibility that we will make a bad decision. Sensitivity analysis identifies dangerous variables. what is the reciprocal of 5 fourths phase field dislocation dynamics (pfdd) modeling of non-schmid behavior in bcc metals informed by atomistic simulations Open the code8-3_anim.css file. Several keyframe animations have already been created for you. Add a keyframe animation named spinCube that contains the following frames:At 0% apply the transform property with the rotateX() function set to 24deg and the rotateY() function set to 40deg.At 50% change the value of the rotateX() function to 204deg and the rotateY() function to 220degAt 100%, change the value of the rotateX() function to 384 and the rotateY() function to 400deg.Create a style rule that applies the moveFront keyframe animation to the #faceFront object. Set the duration of the animation to 3 seconds and set the animation- fill-mode property to forwards.Repeat the previous step for the #faceBack, #faceBottom, #faceLeft, #faceTop, and #faceRight objects using the moveBack, moveBottom, moveLeft, moveTop, and moveRight animations.After the cube is assembled you want it to rotate. Create a style rule that applies the spinCube animation to the #cube object, running the animation over a 3 second duration after a delay of 3 seconds. Use the linear timing function and have the animation loop without ending. definition of compounds Standard to Graphing Form: y= -4x^2+48x-149 into graphing form. Please give step by step