16
.pdf
keyboard_arrow_up
School
Paradise Valley Community College *
*We aren’t endorsed by this school
Course
140AB
Subject
Computer Science
Date
Oct 30, 2023
Type
Pages
6
Uploaded by MinisterWorldHummingbird22
10/28/23, 7:26 PM
16.5.2 Lab - Secure Netw ork Devices
about:blank
1/6
Lab - Secure Network Devices
Topology
Addressing Table
Device
Interface
IP Address
Subnet Mask
Default Gateway
R1
G0/0/1
192.168.1.1
255.255.255.0
N/A
S1
VLAN 1
192.168.1.11
255.255.255.0
192.168.1.1
PC-A
NIC
192.168.1.3
255.255.255.0
192.168.1.1
Objectives
Part 1: Configure Basic Device Settings
Part 2: Configure Basic Security Measures on the Router
Part 3: Configure Basic Security Measures on the Switch
Background / Scenario
It is recommended that all network devices be configured with at least a minimum set of best
practice security commands. This includes end user devices, servers, and network devices, such
as routers and switches.
In this lab, you will configure the network devices in the topology to accept SSH sessions for
remote management. You will also use the IOS CLI to configure common, basic best practice
security measures. You will then test the security measures to verify that they are properly
implemented and working correctly.
Note
: The routers used with CCNA hands-on labs are Cisco 4221 with Cisco IOS XE Release
16.9.4 (universalk9 image). The switches used in the labs are Cisco Catalyst 2960s with Cisco
IOS Release 15.2(2) (lanbasek9 image). Other routers, switches, and Cisco IOS versions can be
used. Depending on the model and Cisco IOS version, the commands available and the output
produced might vary from what is shown in the labs. Refer to the Router Interface Summary
Table at the end of the lab for the correct interface identifiers.
Note
: Make sure that the routers and switches have been erased and have no startup
configurations. If you are unsure, contact your instructor.
Required Resources
1 Router (Cisco 4221 with Cisco IOS XE Release 16.9.4 universal image or comparable)
1 Switch (Cisco 2960 with Cisco IOS Release 15.2(2) lanbasek9 image or comparable)
2013 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Page of
1
6
www.netacad.com
10/28/23, 7:26 PM
16.5.2 Lab - Secure Netw ork Devices
about:blank
2/6
Lab - Secure Network Devices
1 PC (Windows with a terminal emulation program, such as Tera Term)
Console cables to configure the Cisco IOS devices via the console ports
Ethernet cables as shown in the topology
Instructions
Part 1:
Configure Basic Device Settings
In Part 1, you will set up the network topology and configure basic settings, such as the
interface IP addresses, device access, and passwords on the devices.
Step 1:
Cable the network as shown in the topology.
Attach the devices shown in the topology and cable as necessary.
Step 2:
Initialize and reload the router and switch.
Step 3:
Configure the router and switch.
Open configuration window
a.
Console into the device and enable privileged EXEC mode.
b.
Assign the device name according to the Addressing Table.
c.
Disable DNS lookup to prevent the router from attempting to translate incorrectly entered
commands as though they were hostnames.
d.
Assign class as the privileged EXEC encrypted password.
e.
Assign cisco as the console password and enable login.
f.
Assign cisco as the VTY password and enable login.
g.
Create a banner that warns anyone accessing the device that unauthorized access is
prohibited.
h.
Configure and activate the G0/0/1 interface on the router using the information contained in
the Addressing Table.
i.
Configure the default SVI on the switch with the IP address information according to the
Addressing Table.
j.
Save the running configuration to the startup configuration file.
Close configuration window
Step 4:
Configure PC-A.
Open command prompt
a.
Configure PC-A with an IP address and subnet mask.
b.
Configure a default gateway for PC-A.
Close command prompt
Step 5:
Verify network connectivity.
Open configuration window
Ping R1 and S1 from PC-A. If any of the pings fail, troubleshoot the connection.
Close configuration window
Part 2:
Configure Basic Security Measures on the Router
Step 1:
Configure security measures.
Open configuration window
a.
Encrypt all clear-text passwords.
b.
Configure the system to require a minimum 12-character password.
c.
Change the passwords (privileged exec, console, and vty) to meet the new length
requirement.
2013 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Page of
2
6
www.netacad.com
10/28/23, 7:26 PM
16.5.2 Lab - Secure Netw ork Devices
about:blank
3/6
Lab - Secure Network Devices
1)
Set the privileged exec password to
$cisco!PRIV*
2)
Set the console password to
$cisco!!CON*
3)
Set the vty line password to
$cisco!!VTY*
d.
Configure the router to accept only SSH connections from remote locations
1)
Configure the username
SSHadmin
with an encrypted password of
55HAdm!n2020
2)
The router’s domain name should be set to ccna-lab.com
3)
The key modulus should be 1024 bits.
e.
Set security and best-practice configurations on the console and vty lines.
1)
Users should be disconnected after 5 minutes of inactivity.
2)
The router should not allow vty logins for 2 minutes if 3 failed login attempts occur within
1 minute.
Close configuration window
Part 3:
Configure security measures.
Step 1:
Verify that all unused ports are disabled.
Router ports are disabled by default, but it is always prudent to verify that all unused ports are
in an administratively down state. This can be quickly checked by issuing the
show ip
interface brief
command. Any unused ports that are not in an administratively down state
should be disabled using the
command in interface configuration mode.
shutdown
Open configuration window
Close configuration window
Step 2:
Verify that your security measures have been implemented correctly.
Open configuration window
a.
Use Tera Term on PC-A to telnet to R1.
Question:
Does R1 accept the Telnet connection? Explain.
No, the connection is refused. Telnet was disabled with the transport input ssh
command.
Type your answers here.
b.
Use Tera Term on PC-A to SSH to R1.
Question:
Does R1 accept the SSH connection?
Yes
Type your answers here.
c.
Intentionally mistype the user and password information to see if login access is blocked
after two attempts.
Question:
What happened after you failed to login the second time?
The connection to R1 was disconnected. If you attempt to reconnect within 30
seconds, the connection will be refused.
d.
From your console session on the router, issue the
command to view the login
show login
status. In the example below, the
command was issued within the 120 second
show login
login blocking period and shows that the router is in Quiet-Mode. The router will not accept
any login attempts for 111 more seconds.
e.
After the 120 seconds has expired, SSH to R1 again and login using the
SSHadmin
username and
55HAdm!n2020
for the password.
Question:
After you successfully logged in, what was displayed?
2013 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Page of
3
6
www.netacad.com
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Logical Physicalx 8. y: 531
Addressing Table
Device
Interface
IP Address
Subnet Mask
Room-145
VLAN 1
172.16 5.35
255 255.255.0
Room-146
VLAN 1
172.16.5.40
255 255.255.0
Manager
Manager
NIC
172.16.5 50
255.255.255.0
Reception
NIC
172.16.5.60
255 255.255 0
Roor 145
Objectives
• Configure hostnames and IP addresses on two Cisco Internetwork Operating System (IOS)
switches using the command-line interface (CLI).
. Use Cisco lOS commands to specity or limit access to the device configurations.
Use 1OS commands to save the running configuration
Room-146
• Configure two host devices with IP addresses
• Verify connectivity between the two PC end devices.
Scenario
As a recently hired LAN technician, your network manager has asked you to demonstrate your
ability to configure a small LAN. Your tasks include configuring initial settings on two switches using
the Cisco IOS and configuring IP address parameters on host devices to provide end-to-end
connectivity. You are to use two switches and two…
arrow_forward
Packet Tracer - Basic Device Configuration
10.4.3 Packet Tracer - Basic Device Configuration(1).pka
Topology
You will receive one of three possible topologies.
Addressing Table
Device
Interface
IP Address
Default Gateway
Floor14
G0/0
172.14.5.1/24
N/A
Floor14
G0/0
2001:DB8:CAFE:1::1/64
N/A
Floor14
G0/0
FE80::1
N/A
Floor14
G0/1
172.14.10.1/24
N/A
Floor14
G0/1
2001:DB8:CAFE:2::1/64
N/A
Floor14
G0/1
FE80::2
N/A
Room-145
VLAN 1
172.14.5.35/24
blank
Room-146
VLAN 1
172.14.10.35/24
blank
Manager-A
NIC
172.14.5.50/24
blank
Manager-A
NIC
2001:DB8:CAFE:1::50/64
blank
Reception-A
NIC
172.14.5.60/24
blank
Reception-A
NIC
2001:DB8:CAFE:1::60/64
blank
Manager-B
NIC
172.14.10.50/24
blank
Manager-B
NIC
2001:DB8:CAFE:2::50/64
blank
Reception-B
NIC
172.14.10.60/24
blank
Reception-B
NIC
2001:DB8:CAFE:2::60/64
blank
Objectives
· Complete the network documentation.
· Perform basic device configurations on a router and a…
arrow_forward
Description
Subnet A
Subnet B
First IP address
172.16.1.0
172.16.1.63
Last IP address
172.16.1.63
172.16.1.127
Maximum number of hosts
64
64
Record the IP address information for each device:
Device
IP address
Subnet Mask
Gateway
PC-A
R1-G0/0/0
R1-G0/0/1
S1
PC-B
arrow_forward
Block Address: 192.168.16.0/24
Port to Point Link
WANI
Usable Hof Hosts: 2 Users
LAN:
Usable #of Hosts: 25
Network Address:
LANI
Usable #of Hosts: 100 Users
Network Address: 7
Point to Point Link
WAN2
Usable 4of Hosts: 2 Users
LAN2:
Usable #of Hosts: 50
Network Address:
The network given in the above figure consists of three local area networks and
two wide area networks are connected with two serial links. With an ID range
192.168.15.0/24, design an IP plan for this network. Find the network address and
broadcast address, and subnet mask for each network.
arrow_forward
PC-1
Switch-1
Fa0
Fa0/1
Fa0/2
IP Address: 10.0.0.1
Subnetmask: 255.255.255.0
Default gateway: 10.0.0.254
Gig0/0
Router-1
From the above exhibit, the address 10.0.0.254 should be configured on
arrow_forward
LAN 1
192168 10.16/28
2001.0B81.10-/64
GO/0
10.10.100/30
2001.088A1-/64
198.0.0.0/24
2001:DB8FF-/64
ISP1
GO/O
PCA
S1
G01
Corporate Network
R1
G0/1
S0/0/1
$3
G0/2
101010 4/30
2001 DB8A.2 /64
S2
LAN 2
G0/0
192168 11.32/27
2001 DB8 1.11 /64
Custome
198.0.0
2001 088
ISP2
PC-B
1. Write the command to configure an IPV4 directly connected default static route on router R1 to forward the traffic through router ISP1.
RI(config)#
2. Write the command to configure an IPV4 next-hop static route on router ISP1 to forward the traffic to LAN 1 network through router R1.
ISPI(config)#
3. Write the command to configure an IPv6 next-hop flioating static default route on router R1 to forward the traffic through router ISP2
Configure the administrative distance of 5.
R1(config)#
A-
B
arrow_forward
IPV6 TUNNELING AND ENCAPSULATION
Consider the network shown below which contains four IPV6 subnets, connected by a mix of IPV6-only routers(shaded
blue), IPV4-only routers (shaded red) and dual-capable IPV6/IPV4 routers (shaded blue with red interfaces to IPV4 routers).
Suppose that a host of subnet D wants to send an IPV6 datagram to a host on subnet A.
Assume that the forwarding between these two hosts goes along the path:
D --> E -> d--> c --> a --> C -->A
4FB4:297e:962F:179: 46a6:0:ACe:6F28
IPV6
subnet F
31.148.34. 160
67.74. 20.
a
b
F
16.224,99.241
62.15. 168. 10L
A
D
IPV6/v4
IPV4
IPV6/v4
IPV6
subnet D
IPV4
IPV6
subnet A
IPV6
101.20.229.229 E
IPV6
135. 11.212.12
IPV6
IPV6/v4
IPV4
IPV4
IPV6/v4
subnet B
4.42.20T.201
C314:2371ISR31IE4C6:BEBF1351BI 958TIFIED
What is the destination address of the D to E datagram?
4985:E8B9:6716:3F35:BF52:5ADE:113A:F5A3
C314:2371:5A31:E4CE:BEBF:351B:95B7:F4ED
C911:AA28:691D:57DE:4117:3619:5867:8848
O 8AB4:568F:BDF5:3B61:CFD8:AE58:8562:6969
arrow_forward
Set G0/0 as Passive Interface on LIU through the EIGRP process.
arrow_forward
IP = 198.12.56.40
%3D
Host A
MAC = 6611
%3D
Router-1
Port = Ethernet 0=E0-
Е 1
%3D
Wire address
198.12.56.64
MAC = 3456
%3D
Wire address
IP = 198.12.56.33
IP = 198.12.56.65
198.12.56.32
E 2
MAC = 2244
%3D
IP = 198.12.56.97
Wire address
198.12.56.96
Е1
MAC = 7755
P = 198.12.56.98
%3D
Router-2
EO
MAC = 8787
bridge port0 MAC = 8899
IP = 198.12.56.129
%3D
%3D
bridge
bridge port1 MAC = 6789
%3D
Wire address
198.12.56.128
MAC = 1234
%3D
IP = 198.12.56.140
%3D
Host B
arrow_forward
Resolve the sub mask for each IP address (hint dotted decimal) Sample for correct IP addressing for route table) 10. 0. 0. 0 /11
255. 192. 0. 0
192.168.12.0 /29
172.16.0.0 / 22
10.0.0.0 /12
192.168.11.11 /25
200.11.13.0 /18
193.12.12.0 /30
127.0.0.0 / 32
128.17.0.0 /22
11.11.11.0 /44
172.16.0.0 /24
arrow_forward
Configure Static Routing Using Cisco Packet Tracer.
arrow_forward
speed
arrow_forward
Given a subnet mask 255.255.255.240.
What will be the subnet address for a host
with IP 200.10.5.68?
Select one:
O a. None
O b. 200.10.5.64
O c. 200.10.5.56
d. 200.10.5.0
e. 200.10.5.32
arrow_forward
Default Subnet Masks
Write the correct default subnet mask for each of the following addresses:
177.100.18.4
255
255.0.0
255.0.0.0
119.18.45.0
191.249.234.191
223.23.223.109
10.10.250.1
126.123.23.1
223,69 230.250
192.12.35.105
77.251.200.51
189.210.50 1
88.45.65.35
128.212.250.254
193.100.77.83
125.125.250.1
1.1.10.50
220.90.130 45
134 125.34 9
95.250.91.99
arrow_forward
Printer-PT
Printer
192.168.35.0/24
192.168.15.0/24
2811
R1
WRT300N
Wireless Router
10.30.1.0/30
2811
R3
10.10.1.0/30
10.20.1.0/30
PC-PT
A
2811
R2
192.168.25.0/24
192.168.45.0/24
2960-24TT
Switch1
PC-PT
B
Laptop-PT
Laptop2
Laptop-PT
Laptop1
A.how many wired interfaces in the
diagram?
B.how many wireless interfaces in the
diagram?
Server-PT
DNS Server
arrow_forward
Identify and list all the issues in terms of DHCP in the given topology diagram and provide the solutions for each issue
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Related Questions
- Logical Physicalx 8. y: 531 Addressing Table Device Interface IP Address Subnet Mask Room-145 VLAN 1 172.16 5.35 255 255.255.0 Room-146 VLAN 1 172.16.5.40 255 255.255.0 Manager Manager NIC 172.16.5 50 255.255.255.0 Reception NIC 172.16.5.60 255 255.255 0 Roor 145 Objectives • Configure hostnames and IP addresses on two Cisco Internetwork Operating System (IOS) switches using the command-line interface (CLI). . Use Cisco lOS commands to specity or limit access to the device configurations. Use 1OS commands to save the running configuration Room-146 • Configure two host devices with IP addresses • Verify connectivity between the two PC end devices. Scenario As a recently hired LAN technician, your network manager has asked you to demonstrate your ability to configure a small LAN. Your tasks include configuring initial settings on two switches using the Cisco IOS and configuring IP address parameters on host devices to provide end-to-end connectivity. You are to use two switches and two…arrow_forwardPacket Tracer - Basic Device Configuration 10.4.3 Packet Tracer - Basic Device Configuration(1).pka Topology You will receive one of three possible topologies. Addressing Table Device Interface IP Address Default Gateway Floor14 G0/0 172.14.5.1/24 N/A Floor14 G0/0 2001:DB8:CAFE:1::1/64 N/A Floor14 G0/0 FE80::1 N/A Floor14 G0/1 172.14.10.1/24 N/A Floor14 G0/1 2001:DB8:CAFE:2::1/64 N/A Floor14 G0/1 FE80::2 N/A Room-145 VLAN 1 172.14.5.35/24 blank Room-146 VLAN 1 172.14.10.35/24 blank Manager-A NIC 172.14.5.50/24 blank Manager-A NIC 2001:DB8:CAFE:1::50/64 blank Reception-A NIC 172.14.5.60/24 blank Reception-A NIC 2001:DB8:CAFE:1::60/64 blank Manager-B NIC 172.14.10.50/24 blank Manager-B NIC 2001:DB8:CAFE:2::50/64 blank Reception-B NIC 172.14.10.60/24 blank Reception-B NIC 2001:DB8:CAFE:2::60/64 blank Objectives · Complete the network documentation. · Perform basic device configurations on a router and a…arrow_forwardDescription Subnet A Subnet B First IP address 172.16.1.0 172.16.1.63 Last IP address 172.16.1.63 172.16.1.127 Maximum number of hosts 64 64 Record the IP address information for each device: Device IP address Subnet Mask Gateway PC-A R1-G0/0/0 R1-G0/0/1 S1 PC-Barrow_forward
- Block Address: 192.168.16.0/24 Port to Point Link WANI Usable Hof Hosts: 2 Users LAN: Usable #of Hosts: 25 Network Address: LANI Usable #of Hosts: 100 Users Network Address: 7 Point to Point Link WAN2 Usable 4of Hosts: 2 Users LAN2: Usable #of Hosts: 50 Network Address: The network given in the above figure consists of three local area networks and two wide area networks are connected with two serial links. With an ID range 192.168.15.0/24, design an IP plan for this network. Find the network address and broadcast address, and subnet mask for each network.arrow_forwardPC-1 Switch-1 Fa0 Fa0/1 Fa0/2 IP Address: 10.0.0.1 Subnetmask: 255.255.255.0 Default gateway: 10.0.0.254 Gig0/0 Router-1 From the above exhibit, the address 10.0.0.254 should be configured onarrow_forwardLAN 1 192168 10.16/28 2001.0B81.10-/64 GO/0 10.10.100/30 2001.088A1-/64 198.0.0.0/24 2001:DB8FF-/64 ISP1 GO/O PCA S1 G01 Corporate Network R1 G0/1 S0/0/1 $3 G0/2 101010 4/30 2001 DB8A.2 /64 S2 LAN 2 G0/0 192168 11.32/27 2001 DB8 1.11 /64 Custome 198.0.0 2001 088 ISP2 PC-B 1. Write the command to configure an IPV4 directly connected default static route on router R1 to forward the traffic through router ISP1. RI(config)# 2. Write the command to configure an IPV4 next-hop static route on router ISP1 to forward the traffic to LAN 1 network through router R1. ISPI(config)# 3. Write the command to configure an IPv6 next-hop flioating static default route on router R1 to forward the traffic through router ISP2 Configure the administrative distance of 5. R1(config)# A- Barrow_forward
- IPV6 TUNNELING AND ENCAPSULATION Consider the network shown below which contains four IPV6 subnets, connected by a mix of IPV6-only routers(shaded blue), IPV4-only routers (shaded red) and dual-capable IPV6/IPV4 routers (shaded blue with red interfaces to IPV4 routers). Suppose that a host of subnet D wants to send an IPV6 datagram to a host on subnet A. Assume that the forwarding between these two hosts goes along the path: D --> E -> d--> c --> a --> C -->A 4FB4:297e:962F:179: 46a6:0:ACe:6F28 IPV6 subnet F 31.148.34. 160 67.74. 20. a b F 16.224,99.241 62.15. 168. 10L A D IPV6/v4 IPV4 IPV6/v4 IPV6 subnet D IPV4 IPV6 subnet A IPV6 101.20.229.229 E IPV6 135. 11.212.12 IPV6 IPV6/v4 IPV4 IPV4 IPV6/v4 subnet B 4.42.20T.201 C314:2371ISR31IE4C6:BEBF1351BI 958TIFIED What is the destination address of the D to E datagram? 4985:E8B9:6716:3F35:BF52:5ADE:113A:F5A3 C314:2371:5A31:E4CE:BEBF:351B:95B7:F4ED C911:AA28:691D:57DE:4117:3619:5867:8848 O 8AB4:568F:BDF5:3B61:CFD8:AE58:8562:6969arrow_forwardSet G0/0 as Passive Interface on LIU through the EIGRP process.arrow_forwardIP = 198.12.56.40 %3D Host A MAC = 6611 %3D Router-1 Port = Ethernet 0=E0- Е 1 %3D Wire address 198.12.56.64 MAC = 3456 %3D Wire address IP = 198.12.56.33 IP = 198.12.56.65 198.12.56.32 E 2 MAC = 2244 %3D IP = 198.12.56.97 Wire address 198.12.56.96 Е1 MAC = 7755 P = 198.12.56.98 %3D Router-2 EO MAC = 8787 bridge port0 MAC = 8899 IP = 198.12.56.129 %3D %3D bridge bridge port1 MAC = 6789 %3D Wire address 198.12.56.128 MAC = 1234 %3D IP = 198.12.56.140 %3D Host Barrow_forward
- Resolve the sub mask for each IP address (hint dotted decimal) Sample for correct IP addressing for route table) 10. 0. 0. 0 /11 255. 192. 0. 0 192.168.12.0 /29 172.16.0.0 / 22 10.0.0.0 /12 192.168.11.11 /25 200.11.13.0 /18 193.12.12.0 /30 127.0.0.0 / 32 128.17.0.0 /22 11.11.11.0 /44 172.16.0.0 /24arrow_forwardConfigure Static Routing Using Cisco Packet Tracer.arrow_forwardspeedarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.Computer ScienceISBN:9781337569798Author:ECKERTPublisher:CENGAGE L
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L
Browse Popular Homework Q&A
Q: nswers were wrong
Q: Find the fluid force on the vertical side of the tank, where the dimensions are given in feet.…
Q: In Figure 7.16, which of the force is the most effective opening the door (torque is maximum)?
F3
O…
Q: What communicates between the OS and computer devices?
a. device
driver
b. OS
kernel
applications
d.…
Q: Bids were placed in a silent auction for a sword reputed to have been used at the Battle of…
Q: 3. Breakdown of a cartel agreement
Consider a town in which only two residents, Gregor and Haidy,…
Q: The common stock of Leaning Tower of Pita, Inc., a restaurant chain, will generate the following…
Q: he following table shows retail sales in drug stores in billions of dollars in the U.S. for years…
Q: The major structural difference between soluble globular proteins and membrane proteins is:
a.…
Q: Distinguish between the terms tolerable misstatement and preliminary judgment about materiality. How…
Q: 4.) If the Cartesian product of A x B is {(1, 1), (1, 2), (3, 1), (3, 2), (5, 1), (5, 2)), what are…
Q: *
Simplify each expression.
(a) 2-1
(b) (-2)
(c)-2-1
(a) 2-¹ = (Simplify your answer
Q: Determine whether each statement
is
true or false.
a.
ら
> 2
or 5 = 2.
and 7 is a prime number
Q: Only Shot Rising
O One Shot Really
None of the above
QUESTION 8
The over flow bit of an up-counter…
Q: Account
Cash
Accounts Receivable
Supples
Prepaid Rent
Prepaid Insurance
Office Equipment
Accumulated…
Q: simple of size n equals 32 has a simple mean x bar equals 53 in simple standard deviation as equals…
Q: Find f'(x) for the following function. Then find f'(4), f'(0), and f'(-3).
-8
X
f(x) =
Q: The standard normal probability function is used to describe many different populations. Its graph…
Q: K
Use the negative exponent rules to simplify.
1
L
2
2-4
11
4
(Simplify your answer.)
Q: ₁ mm
[₁ mm
A
WCD
D
B
e cylinder A is rotating with an angular velocity of 4 rad.s-1, determine the…
Q: A spring-loaded piston-cylinder device contains 0.21 kg of water initially at 90°C and with an…
Q: The following are the distances (in miles) to the nearest airport for 13 families.
9, 13, 14, 14,…
Q: Briefly explain why temperature gradients are used in Gas Chromatography
Q: like the U.S. Constitution?
system of Fights and freedoms bestowed upon the subjects by a King. Why…
Q: Should corporate lawyers who become aware that someone at the client corporation may have violated…