For the IPv4 CIDR address 153.10.22.56 /22 What is the... Netmask: [ Select ] Network Address: [ Select ] Host Mask: [ Select ] Broadcast Address: [ Select ] Number of possible hosts: [ Select ] Host Number: [ Select ]

Answers

Answer 1

Netmask:

The netmask is calculated by putting the number of 1’s equal to the given mask value (here 22).

Netmask = 11111111.11111111.11111100.00000000

= 255.255.252.0

Therefore, the netmask is equal to 255.255.252.0

Network Address:

The network address is obtained by performing the AND operation of the bits in the given IP address with the bits of the netmask.

IP address (153.10.22.56) = 10011001.00001010.00010110.00111000

Netmask (255.255.252.0) = 11111111.11111111.11111100.00000000

Network address = 10011001.00001010.00010100.00000000

= 153.10.20.0

Therefore, the network address is equal to 153.10.20.0

Host Mask:

The remaining or the unused bits in the netmask are used as the host mask. In other words, the host mask is obtained by complementing each bit of the netmask.

Netmask = 11111111.11111111.11111100.00000000

Host mask = 00000000.00000000.00000011.11111111

= 0.0.3.255

Therefore, the host mask is equal to 0.0.3.255

Broadcast address:

The broadcast address is used to send the packages to all the hosts in the network. It is obtained by setting all the bits after the network address to 1.

Network address (153.10.20.0) = 10011001.00001010.00010100.00000000

Broad cast address = 10011001.00001010.00010111.11111111

= 153.10.23.255

Therefore, the broadcast address is equal to 153.10.23.255

The number of possible hosts:

The number of possible hosts is computed as follows:

Possible hosts = 2n, where n is the number of host bits.

Out of the above 2n hosts, 2 are reserved and hence the number of usable hosts is equal to 2n – 2.

Number of hosts = 210 – 2 = 1024 – 2 = 1022

Host number:

Host number is the decimal equivalent of the host bits in the IP address.

Ip address (153.10.22.56) = 10011001.00001010.00010110.00111000

Host bits = 10.00111000

Host number = 29 + 0 + 0 + 0 + 25 + 24 + 23 + 0 + 0 + 0

= 512 + 32 +16 + 8

= 568

Hence, the host number is equal to 568.

See more abou computing at: brainly.com/question/14971369

#SPJ1


Related Questions

Assume that $s0 is initialized to 11 and $s1 is initialized to 22. Suppose you executed the code below on a version of the pipeline described in the class that does not handle data hazards. What would the final values of registers $s2 and $s3 be

Answers

The final  values of registers $s2 and $s3 be $s2 = 33 and $s3 = 6.

Given MIPS instructions:

I1: addi $s0, $s1, 5 #$s0 = (22 + 5) = 27

I2: sub $s2, $s0, $s1

value of register $s0 will be updated in clock cycle-5 but this instruction read value of register $s0 in clock cycle-3.

$s2 = (11 + 22) = 33

I3: addi $s3, $s0, -5

value of register $s0 will be updated in clock cycle-5 but this instruction read value of register $s0 in clock cycle-4.

$s3 = (11 - 5) = 6

See more about MIPS at brainly.com/question/26556444

#SPJ1

Which type of loop is specifically designed to initialize, test, and increment or decrement a counter variable

Answers

A type of loop which is specifically designed and written to initialize, test, and increment or decrement a counter variable is referred to as a for loop.

What is a for statement?

A for statement can be defined as a type of statement (loop) that is designed and written by a computer programmer to repeat an action or event in a software program for a specific number of time.

In Computer programming, a for statement is a type of loop which contains three expressions and these include the following:

InitializationTestUpdate (increment or decrement).

In conclusion, we can infer and logically deduce that a for loop is a type of loop which is specifically designed and written to initialize, test, and update (increment or decrement) a counter variable

Read more on statements here: brainly.com/question/18736215

#SPJ1

A touch screen _____.

Answers

A touch screen is known to be a kind of a display device that gives room for its users to be able to interact with a computer through the use of their finger or stylus.

What is a Touch Screen?

Touch screen are regarded as output device as a person can be able to touch and  use screen that displays the content in their mobile.

Hence, A touch screen is known to be a kind of a display device that gives room for its users to be able to interact with a computer through the use of their finger or stylus.

Learn more about touch screen from

https://brainly.com/question/17654061

#SPJ1

which of the following is acomputer program that detects, prevents. and takes action sto deactivate or remove malicious programmsd

Answers

Answer:

antivirus software is the answer to prevent computer from malicious program

Given five positive integers, find the minimum and maximum values that can be calculated by summing exactly four of the five integers. Then print the respective minimum and maximum values as a single line of two space-separated long integers.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that  print the respective minimum and maximum values as a single line

Writting the code in JAVA:

import java.io.*;

import java.util.*;

import java.text.*;

import java.math.*;

import java.util.regex.*;

public class Solution {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       long sum = 0;

       long max = Long.MIN_VALUE;

       long min = Long.MAX_VALUE;

       for (int i = 0; i < 5; i++){

           long n = in.nextLong();

           sum += n;

           max = Math.max(max, n);

           min = Math.min(min, n);

       }

       System.out.println((sum - max) + " " + (sum - min));

   }

}

See more about JAVA at brainly.com/question/12974523

#SPJ1

An instructor has given a student an assignment to assemble a pc. in which situation should the student be aware that esd is an issue?

Answers

When installing RAM situation is one where the student should be aware that esd is an issue.

What is the RAM in a computer?

RAM is a term that connote random-access memory and a computer RAM is known to be a kind of a short term memory and it is a place where data is said to be saved as at the time that the processor needs it.

Hence, When installing RAM scenario is one where the student should be aware that esd is an issue and then one can resolve it.

See full question below

An instructor has given a student an assignment to assemble a PC. In which situation should the student be aware that ESD is an issue?

when installing RAMwhen working in a corporate environment that has carpet installed under tower PCswhen using a grounded mat and working on a computer on an ungrounded workbenchwhen installing a dual-voltage power supply

Learn more about RAM from

https://brainly.com/question/13196228

#SPJ1

In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block bpdus?

Answers

In order to prevent ports that are serving network hosts from being considered as best paths, BPDU guard should be enabled to block bpdus.

What are BPDU used for?

A bridge protocol data unit (BPDU) is known to be a kind of a data message that is known to be often  transmitted in a local area network to be able to know or find loops in that given network topologies.

Hence, in the case above, In order to prevent ports that are serving network hosts from being considered as best paths, BPDU guard should be enabled to block bpdus.

See full question below

. In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?

a. BPDU filter

b. BPDU guard

c. root guard

d. BPDU drop

Learn more about ports from

https://brainly.com/question/10097616

#SPJ1

When making routine transponder code changes, pilots should avoid inadvertent selection of which code?

Answers

When making routine transponder code changes, pilots should avoid inadvertent selection of  code. 7700.

What are the  transponder code that pilot  should  avoid?

Under normal as well as non-emergency operations, it is very essential  for pilot to make sure he  avoid using the transponder codes of 7500,  as well as 7600, and 7700.

Especially  while switching  codes,  It is easy in switching by  pilot to  go to of these 3 codes on accident.

In this case, When making routine transponder code changes, pilots should avoid inadvertent selection of  code. 7700.

Learn more about general emergency on:

https://brainly.com/question/14331925

#SPJ1

Frank's organization is preparing to deploy a data loss prevention (DLP) system. What key process should they undertake before they deploy it

Answers

The key process they should undertake before they deploy it is to Implement and use a data classification Scheme.

What is Data Loss?

This refers to the data breach where sensitive data is compromised and collected by a hac.ker.

Therefore, the use of a data loss prevention (DLP) system is important as it saves the precious data from being lost or tampered with.

With this in mind, the thing that should be done before deploying the DLP system is to Implement and use a data classification Scheme.

Read more about data loss here:

https://brainly.com/question/15027705

#SPJ1

To set up scenarios, you need to first use ______ to set up a list, then ______ to set up the reference cell. Last you need to use ______ to set up the cells that display the output results from the scenario.

Answers

To set up scenarios, you need to first use Goal seek to set up a list, then data table  to set up the reference cell. Last you need to use  VLOOKUP to set up the cells that display the output results from the scenario.

What is a Goal Seek in Excel?

Microsoft Excel is known to have a goal seeking tool that is said to be built-in and it is one that gives room for the user to know the desired input value for any kind of  formula if the output value is said to be already known.

Hence, To set up scenarios, you need to first use Goal seek to set up a list, then data table  to set up the reference cell. Last you need to use  VLOOKUP to set up the cells that display the output results from the scenario.

See full question below

To set up scenarios, you need to first use to set up a list, then to set up the reference cell. Last you need to use to set up the cells that display the output results from the scenario. CHOOSE; VLOOKUP; data table Goal seek; data table; VLOOKUP Data validation; VLOOKUP; CHOOSE Data table; VLOOKUP;

Learn more about  VLOOKUP from

https://brainly.com/question/14042837

#SPJ1

The standard naming convention prefix tag for a query used to identify the object type is?

Answers

Answer: qry

I hope this helps!

A(n) Blank______ database model stores data in the form of logically related two-dimensional tables. Multiple choice question. warehouse relational real-time

Answers

Answer:

relational database model

Explanation:

When patel’s advertising co. decided to upgrade its computer network, many people were involved in the decision. In b2b buying systems, decisions are often made:_____.

Answers

In b2b buying systems, decisions are often made by by a committee after a lot of considerable deliberation.

What is Business-to-Business service?

Business-to-business is known to be a kind of a scenario where one business is said to often makes a commercial transaction with another kind of business.

The B2B decision-making process is known to be made up of some discrete tasks such as:

Knowing that there is an issue or need.Examining  and comparing the available alternative or solutionsDefining the requirements that is needed for the product and others.

Hence, In b2b buying systems, decisions are often made by by a committee after a lot of considerable deliberation.

Learn more about b2b from

https://brainly.com/question/26506080

#SPJ1

Lookups comes before Tags in the search-time operation sequence. True or False: Lookups can reference Tags.

Answers

Lookups comes before Tags in the search-time operation sequence is a false statement.

What is the lookups about?

The Lookups is known to be seventh in regards to the search-time operations sequence and is often seen to be processed only when calculated fields is done and also before event types.

Note that Lookups comes before Tags in the search-time operation sequence is a false statement.

Learn more about Lookups from

https://brainly.com/question/25698028

#SPJ1

Which of the following describes the IP address of a router to which packets destined for a remote network should be sent by default

Answers

The term that describes the IP address of a router to which packets destined for a remote network should be sent by default is the a gateway of last resort.

What is 'Gateway Of Last Resort'?

A Gateway of Last Resort is known to be the Default gateway and this is said to be a route that is known to be often used by the router if no other known route is seen to transmit the IP packet.

Note that Known routes are seen in the routing table. but, any route not known by the routing table is said or known to be forwarded to the default route.

Hence the primary function of a router is so that it can forward packets toward a given destination.

Therefore, The term that describes the IP address of a router to which packets destined for a remote network should be sent by default is the a gateway of last resort.

Learn more about IP address from

https://brainly.com/question/24930846

#SPJ1

With the use of unshielded twisted-pair copper wire in a network. What causes crosstalk within the cable pairs?

Answers

The action that causes crosstalk within the cable pairs is the magnetic field around the adjacent pairs of wire.

What is crosstalk in communication?

Crosstalk is known to be a kind of a scenario or a phenomenon where the signal that are seen to be transferred on one channel of a mobile communication system forms a kind of an undesired effect on another channel.

Note that the poor frequency reuse in regards to the use of cellular networks is one that starts the co-channel interference and also one that leads to causes crosstalk.

Hence, The action that causes crosstalk within the cable pairs is the magnetic field around the adjacent pairs of wire.

Learn more about network from

https://brainly.com/question/1027666

#SPJ1

See full question below

With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?

the magnetic field around the adjacent pairs of wire

the use of braided wire to shield the adjacent wire pairs

the reflection of the electrical wave back from the far end of the cable

the collision caused by two nodes trying to use the media simultaneously

A coworker is exploring virtualization for some development projects, and is trying to decide between a bare metal hypervisor and a hosted one. Which of the following pieces of advice should you give

Answers

The pieces of advice that one should give are:

A hosted hypervisor will be easier to set up and maintain if you're new to virtualization.Bare metal hypervisors can run more VMs on the same hardware

What is virtualization?

Virtualization is one that depends on software so as to be able to simulate hardware functionality and make a kind of a virtual computer system.

Hence, The pieces of advice that one should give are:

A hosted hypervisor will be easier to set up and maintain if you're new to virtualization.Bare metal hypervisors can run more VMs on the same hardware

See full question below

A coworker is exploring virtualization for some development projects and is trying to decide between a bare metal hypervisor and a hosted one. Which of the following pieces of advice should you give? Choose all that apply

answer choices

A hosted hypervisor will be easier to set up and maintain if you're new to virtualization.

Bare metal hypervisors can run more VMs on the same hardware

You can run a bare metal hypervisor within your existing operating system.

Learn more about virtualization from

https://brainly.com/question/13204456

#SPJ1

Jenny wants to create a network that can be accessed from any room in her house without physically connecting. Which type of network medium should she use?

Answers

Well I use AT&T in my house it works in all the rooms I suggest using AT&T

The type of network medium Jenny should use is wireless networks.

Given data:

Jenny should use a wireless network medium to create a network that can be accessed from any room in her house without physically connecting.

Wireless networks use radio waves or infrared signals to transmit data between devices, allowing for flexible connectivity without the need for physical cables.

Devices such as smartphones, laptops, tablets, and smart home devices can connect to the wireless network and access the internet or communicate with each other.

To learn more about wireless networks, refer:

https://brainly.com/question/31630650

#SPJ3

Program ________ graphically present the detailed sequence of steps needed to solve a programming problem.
i. flowcharts
ii.pseudocode
iii. loops
iv. modules

Answers

Software program flowcharts graphically present the detailed sequence of steps needed to solve a programming problem.

What is a flowchart?

A flowchart is also referred to as flow diagram and it can be defined as a graphical representation of an algorithm for a work process or workflow.

This ultimately implies that, a flowchart make use of the following standard symbols to graphically represent the sequential steps that are needed to solve a programming problem and are typically associated with a system, work process or workflow i.e from the beginning (start) to the end (finish):

ArrowsRectangleDiamondOvalParallelogram

Read more on flowchart here: brainly.com/question/6532130

#SPJ1

Program flowchart graphically present the detailed sequence of steps needed to solve a programming problem.

What is Program flowchart?

The program flowchart can be regarded as the  data flow  which help to display the data flow while writing a program or algorithm.

This chart user to explain the process quickly  when dealing or  collaborating  with others, hence, Program flowchart graphically present the detailed sequence of steps needed to solve a programming problem.

Learn more about Program flowchart on:

https://brainly.com/question/24735155

#SPJ1

____ applications require that a record be accessed immediately while a client is waiting.
A. Database.
B. Real-time.
C. Sort.
D. Batch.

Answers

Answer: Real-time

Explanation:

Which principle is in effect when an analyst has a lower level of access than a client account lead (cal) working on the same project?

Answers

The The Principle of Least Privilege is known to be the principle that is in effect when an analyst has a lower level of access than a client account lead (cal) working on the same project.

What is the Principle of Least Privilege?

The Principle of Least Privilege is known to be one that tells that a subject is one that need to be given only those privileges that are said to be required for it to complete its task.

Note that If a subject is not able to or do not need an access right, the subject is one that need not to have that right. hence, the function of the subject should be the one that will control the assignment of rights.

Therefore, in regards to the above, The The Principle of Least Privilege is known to be the principle that is in effect when an analyst has a lower level of access than a client account lead (cal) working on the same project.

Learn more about analyst from

https://brainly.com/question/890849

#SPJ1

Mary and Billy are moving away to college and both know in their hearts that they need to end their relationship. They move away with a mutual agreement to breakup and leave peacefully. What is this called

Answers

In the case of Mary and Billy, the above is called Negotiated farewell.

What is Negotiated farewell?

In the case of  Negotiated Farewell, one can say that couples are knonw to jointly create the story of the end to what we say their marriage.

Note that Negotiated Farewell is one that is made for emotionally immature or any kind of combative people. hence, In the case of Mary and Billy, the above is called Negotiated farewell.

Learn more  about relationship from

https://brainly.com/question/10286547

#SPJ1

Thunder lightning manufacturing, inc. developed its annual manufacturing overhead budget for its master budget for 2021 as follows: expected annual operating capacity 120,000 direct labor hours variable overhead costs indirect labor$600,000 indirect materials120,000 factory supplies 60,000 total variable 780,000 fixed overhead costs depreciation240,000 supervision120,000 property taxes 96,000 total fixed 456,000 total costs$1,236,000 the relevant range for monthly activity is expected to be between 8,000 and 12,000 direct labor hours. prepare a flexible budget for a monthly activity level of 8,000 and 9,000 direct labor hours.

Answers

The flexible budget for a monthly activity level of 8,000 and 9,000 direct labor hours is illustrated below.

How to compute the flexible budget?

Particulars Direct labor hour

Variable Overhead cost

Indirect labor. $4000 $4500

Indirect material. $8000. $9000

Factory supplies. $4000. $4500

Total variable cost $52000. $58500

Fixed overhead cost

Depreciation. $20000. $20000

Supervision. $10000. $10000

Property tax $8000. $8000

Total fixed $38000. $38000

Total cost. $90000. $96500

Learn more about budget on:

brainly.com/question/6663636

#SPJ1

The tcp protocol provides error detection and correction.

a. True
b. False

Answers

B. False

Explanation

TCP provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between applications running on hosts communicating via an IP network.

A web developer requires an environment to perform application testing. Which cloud service type does the developer choose to use

Answers

The cloud service type that the developer choose to use is known to be PaaS.

What is PaaS?

Platform as a service (PaaS) is known to be a full development and deployment environment that is seen in the cloud, and it is made up of resources that helps users to deliver a lot of things from simple cloud-based apps to strong, cloud-enabled firm's applications.

Hence, in the case above, The cloud service type that the developer choose to use is known to be PaaS.

Learn more about PaaS from

https://brainly.com/question/20600180

#SPJ1

The _________ tag allows a web page to include interactive content, which the browser assumes to be javascript unless indicated otherwise.

Answers

The <script> tag allows a web page to include interactive content, which the browser assumes to be javascript unless indicated otherwise.

What is a script tag?

The <script> tag is known to be a tool that is often employed or used in regards of or to embed a client-side script (JavaScript).

Hence, The <script> tag allows a web page to include interactive content, which the browser assumes to be javascript unless indicated otherwise.

Learn more about tags from

https://brainly.com/question/13153211

#SPJ1

Theorem: for any two real numbers, x and y, if x and y are both rational then x y is also rational. Which facts are assumed and which facts are proven in a proof by contrapositive of the theorem?

Answers

The facts that are assumed and the facts  that are proven in a direct proof of the theorem is that option a) Assumed: x is rational and y is rational and Proven: x + y is rational.

What is a theorem?

The term known as theorem is known to be a kind of a formula, or statement that is seen in a lot of mathematics field and it also known top  be the logic deduced.

Note that it is also seen as the result that is said to have been proved to be true (through the use of operations and facts that are said to be already known).

Therefore, The facts that are assumed and the facts  that are proven in a direct proof of the theorem is that option a) Assumed: x is rational and y is rational and Proven: x + y is rational.

Learn more about Theorem from

https://brainly.com/question/343682

#SPJ1

See full question below

Theorem: For any two real numbers, x and y, if x and y are both rational then x + y is also rational. Which facts are assumed and which facts are proven in a direct proof of the theorem?

a) Assumed: x is rational and y is rational

Proven: x + y is rational

b) Assumed: x + y is irrational

Proven: x is irrational and y is irrational

c) Assumed: x + y is rational

Proven: x is rational or y is rational

d) Assumed: x is rational or y is rational

Proven: x + y is rational

What is a "Top-Level Domain Name"?

Answers

A top-level domain is known to be an aspect of a domain that quickly follows the last dot symbol that is seen in a domain name.

What is a "Top-Level Domain Name"?

This is known to be the biggest level in terms of the hierarchical Domain Name System of the Internet.

Note that TLD (top-level domain) is said to be the most generic domain that is seen on the Internet's hierarchical DNS (domain name system) as A top-level domain is known to be an aspect of a domain that quickly follows the last dot symbol that is seen in a domain name.

Learn more about Domain Name from

https://brainly.com/question/13437432

#SPJ1

What is an identifier that an online transaction is safe?

Answers

Answer: Look for third-party verification from TRUSTe or the Better Business Bureau symbol.

Explanation:

Having an SSL certificate is a sign that online transactions are secure. Secure Sockets Layer, or SSL, is a cryptographic technology that enables secure Internet communications.

A website's SSL certificate ensures that any data sent between the user's browser and the website's servers is encrypted and protected from unauthorized access. Look for the secure connection indicator "https://" at the beginning of the website's URL. Additionally, look for the padlock icon in the address bar to verify encryption. Some websites may show a green address bar or organization name if they have Extended Validation SSL certificates.

Learn more about SSL certificate, here:

https://brainly.com/question/32251706

#SPJ6

Question 3 Fill in the blank: Curiosity, understanding context, having a technical mindset, data design, and data strategy are _____. They enable data analysts to solve problems using facts.

Answers

Curiosity, understanding context, having a technical mindset, data design, and data strategy are data driven.

What are data driven skills?

Data-driven decision-making is known to be one that entails the five analytical skills which are:

curiosity, understanding context, having a technical mindset, data design, data strategy.

Hence,  Curiosity, understanding context, having a technical mindset, data design, and data strategy are data driven.

Learn more about Curiosity from

https://brainly.com/question/4975503

#SPJ1

Other Questions
predict the theoretical mass of baco3 that should form Public opinion refers to the attitudes citizens have about issues, events, elected officials, and, of course, politics and policy. Group of answer choices True False CAB SOMEONE HELP ME ASAP PLS The quantities xxx and yyy are proportional. xxx yyy 777 353535 121212 606060 202020 100100100 Find the constant of proportionality (r)(r)left parenthesis, r, right parenthesis in the equation y=rxy=rxy, equals, r, x. r =r=r, equals If 15 actuators have failed today, what is the probability that a) at least 10 are repairable? b) from 3 to 8 are repairable? c) exactly 5 are repairable? A person with a traumatic brain injury now exhibits some symptoms includingerradic, impulsive behavior, worse judgement than usual of risky situations, and oddsocial behaviors and violent mood swings. Based on these symptoms, which area ofthe brain was most likely invovled in the injury?A. Temporal lobeB. CerebellumC. Frontal lobeD. Thalamus The location of an allele on a homologous chromosome is the same, but the allele information may be _______. Which sector of the economy was best represented among the top five spenders in 2016? A 4.40g piece of solid CO2 (dry ice) is allowed to sublime in a balloon. The final volume of the balloon is 1.00 L at 300 K. What is the pressure of the gas Which of the following conclusions does the excerpt from "The Black Laws" most strongly support?A. Booker T. Washington's strategy for achieving racial equality was largely effective in northern states.B. African American civil rights were considered unimportant by nearly all white Americans in the late 19th century.C. The Plessy v. Ferguson Supreme Court decision only had an impact on rural areas in southern states. D. Racially segregated facilities in the late 19th century failed to achieve the equality mandated by law. James has $0.50 more than his brother John. The sum of their money is $2.50. how much money does John have A curve that is derived by summing horizontally individual demand curves is called:________ Where should you be on the focus-chaos scale to benefit from this course? Amazon is the dominant firm in the online shopping service industry, which has a total market demand given by Q = 100 2 P. Amazon has competition from a fringe of four small firms that produce where their individual marginal costs equal the market price. The fringe firms each have total costs given by TCi = 10 Qi + Q 2 i. If Amazons total costs are given by TCA = 10 + 10 QA, what price should Amazon establish for online shopping service? 19. For which of the following values of x is the functionf(x)=4-x2 NOT defined as a real number?[square root]A. -2B. 0C. 2D. 4 Who seek out research and buy rent or lease products or services offered by a business the population of happy land is 15.8 happys per acre exactly 553 happys live in happy land. how many acres is happyland Can someone help me please Below is the market for funnel cakes at a small community fair.a) what is the equilibrium price and quantity of the funnel cakes? b) What is the total consumer spending on funnel cakes at the equilibrium point?c) Calculate the producer surplus and consumer surplus at equilibrium. Show your work. d) What would be the result if the suppliers charged $6? Explain.e) Cheese pretzels are substitute good for funnel cakes at the same fair. Draw a correctly labeled graph of the market for cheese pretzels. Shade the area of consumer surplus.f) A large number of new guests enter the fair. Illustrate the effect of this change on the same graph from part E. g) does the consumer surplus increase, decrease, or stay the same as a result of the change from part F? Explain. h) A new cheese pretzel stand opens at the same fair. On a new graph, illustrate the market for cheese pretzels at this fair before and after the new stand opened.i) if the large number of new guests entering the fair happened at the same time that the new cheese pretzel stand open how would the equilibrium price and quantity for cheese pretzels change? Explain. Help me:-Distribute to create an equivalent expression with the fewest symbols possible.4(5+y) =