QUESTION 4 A(n) _____________ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand. a) agreement b) specification c) protocol d) regulation policy.

Answers

Answer 1

Answer:

Option c Protocol

Explanation:

A protocol is a set of rules that determine how communication end-points should follows to exchange information. The protocol defines the rules, syntax and semantics for communication. This means the communicated messages are also well-defined. Besides, the protocol can also include possible error recovery methods.

The protocol can be implemented by either software or hardware.

Answer 2

Answer:

(c) Protocol

Explanation:

A protocol specifies a set of rules governing what a layer would do including the set of messages that software at the layer would need to be able to interpret and understand. Protocols also specify how data is packaged and transmitted in a network.

For communication to occur between devices, these devices must conform to a particular language that they both understand. Hence, a protocol.

Examples of protocols are ;

i. Simple Mail Transfer Protocol (SMTP) for mailing services.

ii. HyperText Transfer Protocol (HTTP) for transferring files on the world wide web.

iii. File Transfer Protocol (FTP) for data and file transfer services between a client and a server on a network.


Related Questions

Where does cable termination occur in most buildings?
CSU/DSU
Core switch
Demarcation point
Patch panel

Answers

Answer:

Demarcation point  is known the point of termination of cable between building and utilities.

Explanation:

In most of the building designs a location has been set that is used for the entrance of all types of cables such as, telephone, internet, or other telecommunication services providers. The service provider makes a point that at this place where users from building connect with the cable to the outside service providers. This point is used for the purpose of cable termination. This is known to as Demarcation point .

The users are responsible for the maintenance of cable till this point. After this point utilities provider will responsible for service and maintenance.

BackNextModerateNew websites are being created every day, yet Internet users are still able to navigate the web and access information at the same speed.Which of the following makes this possible

Answers

Answer:

Hierarchical DNS

Explanation:

Based on the information provided within the question it can be said that the system that makes this possible is called, Hierarchical DNS. This is a hierarchical inverted tree structure, like the one below. This allows the database systems' to be correctly and efficiently distributed and managed so that it does not slow down access.

Answer:

Non-linear

Explanation:

__________ is an organized attempt by a country's military to disrupt or destroy the information and communications systems of another country.

Answers

Answer:

Cyberwar

Explanation:

Cyberwar is the damage or disruption of a nation's networking infrastructure such as their information and communications systems by using computer technology which could be done by stealing, altering or infecting confidential or classified data of the nation.

The cyberwar is basically waged through the internet and could be done by using malicious software (worms and viruses) to infect or compromise the regular operations of a country. Any kind of systems could be cyber attacked. It could be financial, military or organizational systems. The end goal is just to cause abnormality in the system.

Which of the following refers to programs that install themselves on computers without the users' knowledge or permission and spread by attaching themselves to other files that are transferred from computer to computer?A. Spyware applicationsB. Computer wormsC. Computer virusesD. Freeware applications

Answers

Answer:

The correct answer is C "Computer Virus"

Explanation:

Computer virus is a piece of code that install itself in a computer without the knowledge and permission of the user and start replicating itself and as it execute it self also start damaging the computer files.

Computer virus have ability to replicate itself and it attached to files and move from one computer to another with these files when files are transferred.

Making a class's instance variables public and its methods private and accessing those instance variables only through the class's methods and properties facilitates debugging, because problems with data manipulations are localized to the methods

A. True
B. False

Answers

Answer:

False

Explanation:

The reason is that it should be the opposite. The class's instance variables should be private, and its methods should be private. In that way, only these methods can access to the private variables. For example, you have a class named Person and a variable called ssn (social security number). It is better to make this ssn variable private (It is actually a private information for a person) so that it cannot be read or modified outside of your class.

Internet sites like eBay (the giant online auction site) and iVillage (an online community for women) can be used by firms to build communities of users—like-minded customers who want to share their experiences. This builds customer loyalty and enjoyment and develops unique ties to customers.
This scenario is an example of how information systems help businesses use __________ to achieve competitive advantage.

Answers

Answer:

technology strategy

Explanation:

technology strategy is a form of strategy information system designed to give competitive advantage to businesses. With the increasing rate in the use of (IT) information technology, the more substitute products and services in your industry, the less you can control pricing.

Answer:

Information systems help businesses use network based strategies

Explanation: The information systems and networks are of great benefits especially as it regards building network of persons and business, through information systems businesses can build brands that can last the test of time,penetrate new markets and gain brand loyalty and competitiveness. International Businesses enjoy the impact of information systems especially through commercial,social media,Television and radio,mobile communication systems etc.

A large institution, such as a bank, may have thousands of transactions to process in which no user interaction is required; which type of computer system are you most likely to use?
A) high-end workstation
B) mainframe
C) Windows PC
D) real-time system

Answers

Answer:

The correct answer to the following question will be Option B (Mainframe).

Explanation:

Mainframe computers are computers that are mainly used by large companies for commercial applications; massive data analysis, including survey, business and client reports, commercial resource preparing, and transaction processing.

And Mainframe machine is so easy for use when a large organization, like a bank, can handle millions of transactions where no user intervention is required.

There's no other way that can make the transaction in millions. So, Option B will be the right answer.

Final answer:

A large institution like a bank would likely use a mainframe computer system to handle thousands of transactions, as mainframes are optimized for large-scale data processing and reliability. The correct  answer is option (B).

Explanation:

A large institution such as a bank, with thousands of transactions requiring no user interaction, would most likely use a mainframe computer system. Mainframes are designed for large-scale computing purposes, and they can handle vast amounts of data and transactions efficiently.

Unlike a high-end workstation or a Windows PC, which are geared towards individual use or smaller workgroup computing tasks, mainframes excel in environments where data processing speed and reliability are paramount. They may not be used in real-time systems that require instant response, but they are perfect for institutions like banks to maintain consistent records and manage large databases.

Computer ________ involves identifying, extracting, preserving, and documenting computer evidence. a. inoculation b. forensics c. hacking d. multi-factor e. authentication

Answers

Answer:

b. forensics

Explanation:

Digital Forensics: It is the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law.

Mary is a marketing manager for a nationwide vegan restaurant chain. She wants to reach potential customers across two media channels focusing on specific audience behaviors. Which two channels could she choose to reach her desired objective?
A) Video.B) Display. ​C) E-mail.D) Radio.E) Search.

Answers

Answer:

A & B.

Explanation:

Digital marketing is a marketing strategy that uses the internet to digitally market goods and services of producer through display advertising and other medium.

It makes use of search engine optimisation (SEO), search engine marketing, content marketing, content automation, data-driven marketing, e-commerce marketing etc.

It takes advantage of all available medium to advertise product. Two efficient way of gain viewer's attention is through online video streaming and image display on the internet and social media platform.

Write a method called fact that recursively calculates the factorial value of its single int parameter. The value returned by fact is a long ..

Answers

Answer:

The program to this question can be given as follows:

Program:

//class

public class factorial //defining class

{

//method fact

public static long fact(int x1) //defining method fact

{

//conditional statement

if (x1 <= 1) //if block checks parameter value less then equal to 1

{

return 1; //return value

}

else //else part

{

return (fact(x1 - 1) * (long) x1); //return factors using recursive function

}

}

//method main

public static void main(String[] args) //defining main method

{

long data=fact(5);//defining variable that holds function value

System.out.println("Factorial is: "+data); //print value

}

}

Output:

Factorial is: 120

Explanation:

In the above java program, a class is "factorial" is defined, inside the class, a static method "fact" is declared, that accepts an integer parameter that is "x1" and returns a long value, inside this method a conditional statement is used.

If the block it checks parameter value is less then equal to 1, if this condition is true, it will return 1 when this condition is not true. It will go in else part.In else part, it uses a recursive function to calculate factorial of a number and return its value.Then the main method is defined, inside this method a long variable "data" is defined, that call and holds fact function return value, and in the next line, the print function is used to print the data variable value.

In an information systems (IS) department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.
A) operations
B) technology
C) development
D) maintenance

Answers

Answer:

Option A is the correct answer for the above question.

Explanation:

An information system is responsible to produce information after processing the data which is the input for its. The organization takes help from the computer system because the computer system is used to process the data and produce the information. The operation team of this organization is used to manage the machine of the system which is the computer system. It is because the computer system is the machine of the information system.

The above-question statement asked about the team or group which is responsible to maintain the machine of the system and the team is known as the operation team which is stated from option A. Hence option A is the correct answer for the above question. while the other is not because--

Option B states about the technology which is not a team in the organization.Option C states about the development team which is used to make the software or information in the organization. Option D states about the maintenance team which is also not any team in the organization of information system.

According to Thomas Friedman, The World is Flat, we have progressed from the globalization of countries to the globalization of multinational corporations to the globalization of ______.

Answers

Answer:

globalization of individual

Explanation:

Thomas Friedman wrote the book " the world is flat". In this book he focuses on globalization, he focuses on how globalization becomes the main economic concept.

Thomas wants to use "the world is flat" as a metaphor and describe how globalization has become a key factor for the economic condition. He describes the change of globalization from countries to the economy then globalization of individuals. According to him, Every globalization is interconnected.

Final answer:

Thomas Friedman's The World is Flat illustrates the progression to the globalization of individuals, emphasizing how technology enables global collaboration and competition among individuals.

Explanation:

According to Thomas Friedman in The World is Flat, we have progressed from the globalization of countries to the globalization of multinational corporations to the globalization of individuals. Friedman highlights that advanced technology, particularly personal computing and high-speed Internet, has significantly contributed to this new phase of globalization by enabling individuals around the world to collaborate and compete globally.

For instance, a woman operating a business from her home in the Midwestern U.S. can employ a call center in Bangalore, India, and software developers in Beijing file more patents than any other Microsoft office, illustrating how individual talent and innovative capabilities are increasingly becoming key drivers of economic activity and competitiveness on a global scale.

The area of a square is stored in a double variable named area. write an expression whose value is length of the diagonal of the square java.

Answers

Answer:

The correct answer to the following question will be "Math.sqrt(area*2)".

Explanation:

The Math.sqrt( ) method in JavaScript is used to find the squares root of the given figure provided to the feature as a variable. Syntax Math.sqrt(value) Variables: this function takes a single variable value that represents the amount whose square root is to be determined.The area of the figure is the number of squares needed to cover it entirely, like the tiles on the ground.

Area of the square = side times of the side.

Because each side of the square will be the same, the width of the square will only be one side.

Therefore, it would be the right answer.

A bug has resulted in your program executing an infinite loop. What key can be pressed in conjunction with the C or Break (Pause) key to escape the loop______________.

Answers

Answer:

The CTRL key is pressed

Answer:

The Ctrl key.

Explanation:

An infinite loop, sometimes called an endless loop, occurs when a program or a portion of a program is running endlessly because no termination condition has been met or set. This may sometimes cause the system to freeze. To manually break out of this loop, a key combination of CTRL and C (CTRL + C) or Break will forcefully end the loop.

Don't forget that a loop is portion of a program that executes repeatedly until a certain condition has been met. So, ordinarily a loop is supposed to end. When it doesn't, then it is infinite.

What is often called a platform, a collection of computer programs that work together to manage hardware and software to ensure that they are working properly?

Answers

Answer:

The correct answer to the following question will be "Operating system".

Explanation:

An operating system is a machine software that handles hardware of a computer, computing assets and delivers basic services to software programs.It is an intermediary between such users and computer hardware.It also helps you to interact with your machine without learning how to use your language of the computer.

Therefore, it will be the right answer.

The component of the information system that is described as raw, un-processed facts, including text, numbers, images, and sounds,is called:_______.
a) data.
b) software.
c) cloud computing.
d) the Internet.

Answers

The component of the information system that is described as raw, un-processed facts, including text, numbers, images, and sounds, is called data. The correct option is a.

What is a data?

Data is essential to understanding into a form that is efficient for movement or processing in computing.

Data is information converted into binary digital form in relation to today's computers and transmission media. It is acceptable to use data as either a singular or plural subject.

Good data enables organizations to set baselines, benchmarks, and goals in order to keep moving forward. You will be able to establish baselines, find benchmarks, and set performance goals because data allows you to measure.

Thus, the correct option is a.

For more details regarding data, visit:

https://brainly.com/question/10980404

#SPJ2

Final answer:

Data is unprocessed facts that when analyzed and put into context become information, which is essential in information systems.

Explanation:

The component of the information system that is described as raw, unprocessed facts, including text, numbers, images, and sounds, is called data. Data are the raw materials that, when put into context and interpreted, become information. Information systems, like database management systems, are used to transform this data into usable information that can inform decisions and answer questions.

The common denominator for decisions on service processes is​ _______, but for manufacturing processes it is​ _______.A. customer​ contact; product varietyB. customer​ variety; output volumeC. customer​ contact; output volumeD. customer​ variety; product variety

Answers

Answer:

Option C i.e., customer​ contact and output volume is the correct answer.

Explanation:

Customer contact is required for processes the decisions on the service through the common denominator because the customer contact is always required for increasing the business services and products by which their business gain high profits. Output volume is required for the process of manufacturing.

The directory partition holds configuration information that can affect the entire forest, such as details on how domain controllers should replicate with one another.
True / False.

Answers

Answer: True

Explanation:

A directory partition is a partition that contains active directory objects, which is part of the forest's Domain Name System (DNS) namespace, and is replicated among domain controllers (DCs).

It is a contiguous portion of the overall directory that has independent replication scope and scheduling data. A directory partition is also known as naming context.

When coded in a WHERE clause, which of the following search conditions will not return a result set that includes all invoices with an InvoiceTotal value of $1000 or less?
a. InvoiceTotal BETWEEN 0 AND 1000
b. InvoiceTotal IN (0,1000)
c. NOT (InvoiceTotal > 1000)
d. InvoiceTotal <= 1000

Answers

Answer:

b. InvoiceTotal IN (0,1000)

Explanation:

It is important to reliaze that the question is asked to check a range between 0 and 1000.

a. InvoiceTotal BETWEEN 0 AND 1000 satisfies the condition

c. NOT (InvoiceTotal > 1000) excludes the values greater than 1000, and satisfies the condition

d. InvoiceTotal <= 1000 satisfies the condition

However, in InvoiceTotal IN (0,1000), the "IN (0,1000)" part checks that if InvoiceTotal is either 0 or 1000.

The purpose of a(n) ____ is to accept data as input and transform the data in some manner to produce a specific result as an output.

Answers

Answer:

CPU.

Explanation:

CPU, short for Central Processing Unit, is part of computer system that processes data gathered from input peripherals, like keyboard, mic, touch etc., or otherwise, and may present output or result in an output peripheral like a Monitor.

CPU is like the brains of a computer system. Which means without the CPU, a computer is just a box and won't do anything.

What do you call a group of pins on a motherboard that are used to connect parts of the computer to the motherboard for power or data transfer.a. Socketb. Headerc. Jumperd. Port

Answers

Answer:

D. Port.

Explanation:

In the computer system motherboard, a socket is a connector used to connect the processor. Headers are connector used to clear the RTC. Jumpers are cable connectors used to connect components on the motherboard. The port is a connection point in the motherboard, that connects external or peripheral devices to the motherboard for power and data transfer.

An insulated anti-short fitting required to be installed in the ends of Type AC cable to protect the wires from abrasion is typically called a(n) __________.

Answers

Answer:

Red head

Explanation:

Type AC or Armoured cable is a cable with very thick insulation and few conductors used in power networks to transfer very high voltage of 11kva to 33kva.

It is installed with several number of conductors in its cable.

Installing the type AC cable requires an insulated anti-short fitting to be installed at the end of the cable, which is called a red head, to protect the cable from abrasion.

You are attempting to install Windows Server 2016 on a SCSI based disk, but the installation program does not find the disk. What is the most likely cause:________.

Answers

Answer:

Windows Server 2016 requires a driver for working with the SCSI controller.

Explanation:

Based on the information provided within the question it can be said that the most likely cause in this scenario is that Windows Server 2016 requires a driver for working with the SCSI controller. Therefore in order to solve this problem you would need to, manually update the driver for the SCSI adapter in the virtual machine that is going to be using the Windows Server 2016 software.

Which of the following statements is incorrect? Group of answer choices
a.Printer resolution is measured in dpi (dots per inch).
b.Printer output is often called hard copy.
c.Memory within a printer is used to store printing instructions and documents waiting to be printed.
d.Printer speed is measured in the number of words printed per minute.

Answers

Answer:

d. printer speed is measured in the number of words printed per minute                                                                                  

Explanation:

a. Printer resolution is measured in dots per inch. So a. is true. Dots per inch means number of ink dots that are printed on the paper by a printer. Higher resolution means better image that is printed.

b. Hard copy also called a print out is the information in the computer which is printed on the paper by a printer. So b. is also true.

c. A printer has memory which is used to store information about the print jobs, print logs, scans. Print jobs are basically the documents which are to be printed these jobs are removed from memory after the printing task is done. So c is also true.

d. Printer speed is measured in pages printer per minute instead of number of words printed per minutes so option d. is incorrect. For example a laser printer can print up to 20 pages of text per minute.

Write a loop that reads positive integers from console input, printing out those values that are even, separating them with spaces, and that terminates when it reads an integer that is not positive.

Answers

To read positive integers from console input and print out the even values, you can use a while loop.

To read positive integers from console input and print out the even values, you can use a while loop.

Here's an example:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       int num;

       while(true) {

           num = input.nextInt();

           if(num <= 0)

               break;

           if(num % 2 == 0)

               System.out.print(num + " ");

       }

   }

}

In this code, we use a Scanner to read the input from the console.

The loop continues until a non-positive integer is entered.

If the entered number is even, it is printed out using System.out.print().

In most modern implementations of the JVM, bytecode is Select one: a. input to the Java compiler b. ready to be executed by a Windows system c. output from the Java interpreter d. input to the JIT (just-in-time) compiler

Answers

Answer:

Option d is the correct answer to the above question.

Explanation:

Java is a programming language that gives the features to write the program in one platform and execute it on multiple platforms. The machine code is not given features like this. So for this, the java derived a class file which is then converted file of the java program which is also called the byte code. This code can be transferred on multiple machines and then excite after get converted into machine code. So to convert the byte code into machine code the java needs a JIT compiler which takes inputs as byte code and gives the output as machine code.

The above question asks that which take input as byte code then the answer is JIT which is defined as above and it is stated from option d. hence option d is the correct answer. while the other is not because--

Option 'a' states about the java compiler which gives the output as byte code.Option b states about the window system which is not the correct option.Option c states that it is the output of the interpreter but the interpreter gives the output as machine code in java language.

What is the biggest danger in continuing to work with legacy systems?
Apps will not run in compatibility mode
Legacy systems do not support 64-bit apps
Lack of updates can cause a security risk
New apps will not work with the system

Answers

The answer is New apps will not work with the system.

Legacy System uses old technology and programs that should be necessary to run old files and software to newer versions of Operating Systems. Basically, Legacy Systems works with compatibility issues and fix it for new system software to still run old types of applications. Sometimes, businesses cannot afford to use new software and hardware in an instance. They would implement a temporary solution like Legacy systems to still use their old systems. Because Legacy system is design for old software, problems may arise and will cause new software not to run at all if you install them in a Legacy system computer or desktop.

Both the Alphabetic Index and the Tabular List must be used to locate and assign a diagnosis code in ICD-10-CM. Group of answer choices True False

Answers

Answer:

The answer is "True".

Explanation:

The Alphabetic Index, as well as the Table List or Tabular List, both codes are important for finding and assigning a code. These codes are not always the complete code, in the Alphabetic List.  

The full code, including laterality and any seven characters appropriate, may only be found on the Tabular List.  Both codes use topography codes which are denoted by the letter C.

Information from the system that is used to make modifications in the input, processing actions, or outputs is referred to as: Group of answer choices A. Reporting B. Feedback C.Acquisitions D.Processing

Answers

Answer:

D

Explanation:

The processing software helps you to run such activities on a computer device. As you key in the essay on the keyboard, it appears on the screen in front of you. After you examine the essay on the screen, make changes, and determine that it suits your desired content, you can save it using a strorage device

Answer:

B. Feedback

Explanation:

Apart from the four basic functions of the Information system - input, process, output, store - the feedback function is also very important.

Feedbacks are ideas, suggestions, impressions, critics and even criticisms that are being got from users of a system. With feedback, information can be got to be used to make modifications in the input, processing actions, or output.

Feedback will also allow to rebuild and/or revisit an existing system and even allow businesses to make tangible, logical and positive business decisions.

When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.

a. True.
b. False.

Answers

Answer:

The correct answer to the following question will be "False".

Explanation:

Data equivalent protection for Wired Equivalent Privacy (WEP) is an older authentication and data encryption mode that was replaced with better authentication methods for WPA-PSK and WPA2-PSK and data encryption.Only when you select Up to 54 Mbps from the Mode menu will the WEP option appear.WEP can easily be decoded that is why it is not good for secure transmissions.

Therefore, it's the right answer

Other Questions
Which is the most effective way to vary thesentence patterns in the passage?A. Lengthen sentence 5.B. Combine sentences 3 and 4.C. Start sentences with different partsof speech.D. Invert most of the sentences.AN Feld, the sole stockholder of Maki Corp., paid $50,000 for Maki's stock in 2010. In 2019, Feld contributed a parcel of land to Maki but was not given any additional stock for this contribution. Feld's basis for the land was $10,000, and its fair market value was $18,000 on the date of the transfer of title.What is Feld's adjusted basis for the Maki stock?A. $50,000B. $52,000C. $60,000D. $68,000 Based on the description of geothermal energy, how does magma convection aid in the production of geothermal energy? Your buddy is an adventurous type who insists you come with her to summit Mt. Everest. You, in turn, insist that, given the plate tectonic settings that generated the world's largest mountain, you both need to be prepared for what types of geologic hazards at base camp?A) strong earthquakes, possible tsunamis, explosive volcanic eruptionsB) mild earthquakes, explosive volcanismC) mild earthquakes, mild volcanismD) Strong earthquakes, landslides, minimal (or no) volcanism Create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not. Antonio has $350 to spend on skis. Sales tax is 6%. Decide if each description of a price and discount, plus sales tax, represents a pair of skis that Antonio can purchase with the money he has .Choose Yes or No for each description a. 25% off $450 Yes or Nob. 20% off $385 Yes or Noc. $20 off $360 Yes or Nod. 15% off $380 Yes or Noe. $10 off $340 Yes or No A college bookstore marks up the price that it pays the publisher for a book by 35 %. If the selling price of a book is $ 87.00 comma how much did the bookstore pay for this book? A single individual who is not an active participant in a qualified retirement plan, earned $28,000. The maximum tax deductible contribution that can be made to an IRA is?[A] $2,000[B] $3,600[C] $5,500[D] $7,000[C] - Two charges Q =2 C and q=1 nC are 1 m apart. If the electric force beween them is 18 N what is the magnitude of the electric field due to Q at q. The format of the answer must be g A 100-gram sample of a radioactive isotope decays at a rate of 6% every week. How much of the sample will be left one year from now? Out of 229 racers who started the Eugene marathon, 208 completed the race, 17 gave up, and 4 were disqualified. What percentage of racers did not complete the marathon? Which of the following is the best way to decrease biological contaminants as a source of indoor air pollution? Increase ventilation. Install a suction system. Limit use of pesticides. Maintain a relative humidity of 30 to 50 percent. Use cleaning products. Jamie bought a load of gravel to cover her driveway. Her brother works for the gravel company and got her a 28% discount. If Jamie paid $357.83 for the gravel (without tax), what would it have cost her without the discount? According to the lab safety sheet, in the Epidemiology & Laboratory Techniques lab all microcentrifuge tubes, pipette tips and cuvettes used during the pipetting exercises and at the practice stations can be disposed of in the regular trash.A. TrueB. False According to Adam Smith, which of the following is necessary for the proper functioning of the market system? a. For markets to work, people should take into account how their decisions affect society as a whole. b. For markets to work, the government should help citizens make the right decisions. c. For markets to work, people must be free to pursue their self-interest. d. For markets to work, people and the government need to coordinate their decisions. 2. T/F. Chromosomes are replicated a second time just prior to the start of Meiosis II. As leaders and advocates, professional school counselors need to re-examine professional roles and think Dave's Duds reported cost of goods sold of $1,300,000 this year. The inventory account increased by $170,000 during the year to an ending balance of $495,000. What was the cost of merchandise that Dave's purchased during the year?A. $3,445,000.B. $2,750,000.C. $2,355,000.D. $3,050,000. Particles in 2.15 moles of gold The handford high school basketball team scored 79, 68, 86, 91 and 72 points in their first five games. What was the average number of points scored in these five games? Steam Workshop Downloader