during the process of forwarding traffic, what will the router do immediately after matching the destination ip address to a network on a directly connected routing table entry?

Answers

Answer 1

After the router matches the destination IP address to a Network on a directly connected routing table entry during the process of forwarding traffic.

it will perform the following steps:

1. Determine the exit interface: The router identifies the appropriate interface to use for forwarding the traffic to the destination network. This is based on the routing table entry that matches the destination IP address.

2. Update the data link header: The router modifies the data link header of the packet by updating the source and destination MAC addresses. The source MAC address is replaced with the MAC address of the router's exit interface, while the destination MAC address is replaced with the MAC address of the next hop device (if known) or the destination device.

3. Update the Time-to-Live (TTL) field: The router decrements the TTL field in the IP header by one. This prevents packets from looping infinitely in the network.

4. Verify the checksum: The router recalculates the checksum for the IP header to ensure it is correct. If the checksum is invalid, the packet is dropped.

5. Forward the packet: Finally, the router forwards the packet through the exit interface towards the destination network. If the destination MAC address is unknown, the router may perform Address Resolution Protocol (ARP) to obtain the appropriate MAC address before forwarding the packet.

By following these steps, the router ensures that traffic is accurately and efficiently forwarded towards its destination.

To Learn More About Network

https://brainly.com/question/28342757

#SPJ11


Related Questions

For the execution of a successful information strategy, staff synchronization _____. (Select all that apply.) relies on informed commander's guidance begins at the execution phase of operations requires cross-talk and cross-representation breaks down staff planning into clearly defined major subsets integrates products does not impact actions, words, and images

Answers

For the execution of a successful information strategy, staff synchronization relies on informed commander's guidance.

What is the above about?

A successful information strategy, staff synchronization is one that  depends on informed commander's guidance.

And as such, if one say that For the execution of a successful information strategy, staff synchronization relies on informed commander's guidance. it is a true statement.

Learn more about information strategy from

https://brainly.com/question/8368767

#SPJ1

Which type of security uses mac addresses to identity devices that are allowed or denied a connection to a switch?

Answers

The type of security that uses mac addresses to identify devices that are allowed or denied a connection to a switch is Port security.

What is a Network Security?

This refers to the configuration that is made to a network in order to protect and secure it from unauthorized use.

Hence, we can see that The type of security that uses mac addresses to identify devices that are allowed or denied a connection to a switch is Port security.

This network security feature helps to prevent or allow access to a network connection through its mac address filtering.

Read more about network security here:

https://brainly.com/question/28004913

#SPJ1

____ record the keystrokes of a user into a text file that is sent back to the attacker for a specific period of time and frequency.

Answers

logic bombs are dormant and will only be activated by the fulfillment of specific conditions when they will deliver a malicious payload to unsuspecting computer users.

What is a logic bomb?

A logic bomb is a series of codes that have been intentionally introduced into a software system and which will set off a malicious function when some specific conditions are met.

In other words, logic bombs are dormant and will only be activated by the fulfillment of specific conditions, when they will deliver a malicious payload to unsuspecting computer users.

An example is when a programmer in a company hides pieces of code that will start to delete files in the company, in the event of him/her getting fired from the company.

To know more about logic bomb follow

https://brainly.com/question/13993673

#SPJ4

Who, in 1937 tried to build a computer with no gears, cams, belts, or
shafts?

Answers

Answer:

But we're getting ahead of our story. One of the earliest attempts to build an all-electronic (that is, no gears, cams, belts, shafts, etc.) digital computer occurred in 1937 by J. V. Atanasoff, a professor of physics and mathematics at Iowa State University.

Explanation:

hope this will help you

have a great day

please mark me as the brainliest

Answer: Atanasoff

Explanation: he was a doctor whom tried to built a computer to test the capacity of storing data

NEXT
Internet and World Wide Web: Mastery Test
1
Select the correct answer
An instructor receives a text message on her phone. Next, she reads out the text to the whole claws. Which network component plays a similar
role by receiving a message and broadcasting it to all other computers connected to the component?
OA Switch
OB .
hub
OC bridge
OD
router
Reset
Wext

Answers

Answer:

hub is the correct answer

hope it is helpful to you

Write a function which computes the value of an arithmetic expression. The op should be one of ('+', '*', or '/'). The function should throw an invalid_argument exception otherwise. You should also Also throw an invalid_argument if the op is '/' and the second argument is zero.

Answers

To write a function that computes the value of an arithmetic expression, follow these steps:

1. Define the function with three parameters: first number (num1), second number (num2), and the operation (op).
2. Use a conditional statement to check if the operation is one of ('+', '*', or '/').
3. If the operation is valid, perform the corresponding arithmetic operation.
4. If the operation is '/', check if the second argument (num2) is zero. If it is, throw an invalid_argument exception.
5. If the operation is not one of the allowed ones, throw an invalid_argument exception.

Here's the function implementation in C++:

```
#include <stdexcept>

double compute_arithmetic_expression(double num1, double num2, char op)

{
   if (op == '+')

   {
       return num1 + num2;
   }

  else if (op == '*')

   {
       return num1 * num2;
   }

  else if (op == '/')

      {
       if (num2 == 0)

       {
           throw std::invalid_argument("Division by zero is not allowed");
       }
       return num1 / num2;
   }

  else

   {
       throw std::invalid_argument("Invalid operation");
   }
}

int main()

{
   try

   {
       double result = compute_arithmetic_expression(10, 2, '/');
       std::cout << "The result is: " << result << std::endl;
   }

  catch (const std::invalid_argument &e)

   {
       std::cerr << "Error: " << e.what() << std::endl;
   }
   return 0;
}
```

This function will compute the value of an arithmetic expression and throw an invalid_argument exception if the operation is not valid or if division by zero is attempted.

To learn more about exception visit : https://brainly.com/question/30693585

#SPJ11

BRAINLEST PLEASE HELP
Which action is an example of networking?

meeting other business students from other schools at an FBLA conference
helping organize donations at a food pantry
entering your program in a contest
taking the exam for a certification

Answers

meeting other business students because networking is meeting with other and discussing information

Answer:

A (First one)

Explanation:

Meeting other business students from other schools at an FBLA conference.

Which is a legal term which indicates an idea, process, or physical creation that comes from the work of the mind?
0000
Derivative works
Ethical project
Valued work
Intellectual property

Answers

intellectual property

refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.

Which type of system is not proprietary?

Answers

Nonproprietary software is open source and accessible for free download and usage. It also makes its source code completely available. Software that is not proprietary can also be referred to as open-source.

Due to the fact that Linux and Android are not proprietary, there are several variations of both operating systems. A system, tool, or program that is solely owned by an organization is referred to as proprietary technology. In most cases, the proprietor develops and employs them domestically in order to manufacture and offer goods and services to clients. From the foregoing, it can be inferred that Microsoft Windows is an example of proprietary system software. Linux is an open-source, free operating system that was made available under the GNU General Public License (GPL). The source code may be used, examined, altered, and distributed by anybody, and they may even sell copies of the altered code. computer operating system that is specific to a certain class of computers

Learn more about software here:

https://brainly.com/question/1022352

#SPJ4

An office building has two floors. A computer program is used to control an elevator that travels between the two floors. Physical sensors are used to set the following Boolean variables.
The elevator moves when the door is closed and the elevator is called to the floor that it is not currently on.
Which of the following Boolean expressions can be used in a selection statement to cause the elevator to move?

answer choices
(onFloor1 AND callTo2) AND (onFloor2 AND callTo1)
(onFloor1 AND callTo2) OR (onFloor2 AND callTo1)
(onFloor1 OR callTo2) AND (onFloor2 OR callTo1)
(onFloor1 OR callTo2) OR (onFloor2 OR callTo1)

Answers

The following Boolean expressions, "onFloor1 AND callTo2" or "onFloor2 AND callTo1," can be used in a selection statement to move the elevator.

The commands to move the lift may be simply determined based on the other commands designed to be provided and received by the lift, which indicate what operation it is engaged in.

When the elevator is on the first floor and has to be taken to the second floor, the order "onFloor1 AND callTo2" can be used. The order "onFloor2 AND callTo1" would serve as the reverse of the previously given instruction and cause the lift to operate in the exact opposite manner.

To know more about elevator visit:-

https://brainly.com/question/2168570

#SPJ4

(Please hurry will give brainliest and anything else please Due in 5 min)

Dacey wants to calculate and display the result for the quotient of 180 divided by 60.

Which Python statement should Dacey use?

print(60 / 180)
print("60 / 180")
print = (180 / 60)
print(180 / 60)

Answers

Answer:

Number 4

Explanation:

I would say Option 4 as well

do you know zombsroyal.io

Answers

Answer:

nope. i might go look for it tho

Answer:

Yeah I play it

Explanation:

What's your tag? I'm kinda cracked

Please help me solve #3 on Python

Please help me solve #3 on Python

Answers

Answer: Im black i dont have an answer

Explanation:

sorry my friend id BLACK

Use the drop-down menus to complete each statement. Two main versions of Outlook are the desktop app and the app. The has limited features, but is free to download and install, and geared toward tablets and phones. Having a more comprehensive set of features, the app must usually be purchased to install on traditional computers. Office 365 has become more popular recently because it gives access to all Office programs and .

Answers

Answer:

1) Mobile

2) Mobile app

3) Desktop

4) Is on the cloud

Explanation:

Ik its late for you but it'll hopefully help out others in the future

Answer:

Answer shown in image :)

Explanation:

Plz click the Thanks button!

<Jayla>

Use the drop-down menus to complete each statement. Two main versions of Outlook are the desktop app

// Sorts the words in the list myWords in alphabetical // order using insertion sort // Counts the number of swaps in each pass // Prints the values of myWords at the end of the pass // followed by the number of comparisons // It also prints the total number of swaps public void insertionSort() { // to be implemented as part b} // constructors and other methods are not shown If myWords is ["S", "N", "M", "D", "C", "A"], then the output will be:
N S M D C A 1
M N S D C A 2
D M N S C A 3
C D M N S A 4
A C D M N S 5
15​

Answers

Where the implementation of insertion sort is correct, the output of the given algorithm for the input list myWords = ["S", "N", "M", "D", "C", "A"] will be:

N S M D C A 1

M N S D C A 2

D M N S C A 3

C D M N S A 4

A C D M N S 5

15

What is the rationale for the above response?

Note that the given algorithm is an implementation of insertion sort, a sorting algorithm that works by dividing the input list into two parts: a sorted part and an unsorted part.

The sorted part initially contains only the first element of the list, and the unsorted part contains the remaining elements. The algorithm then repeatedly takes the first element from the unsorted part and inserts it into the correct position in the sorted part.

The output shows the state of the list after each pass of the insertion sort algorithm. The number at the end of each line represents the number of swaps that were made during that pass. The total number of swaps made during the entire sorting process is 15.

Learn more about algorithm :

https://brainly.com/question/22984934

#SPJ1

What will happen if both indent marker and tab stop applied in formatting the measurement layout of your document? Can both be applied at the same time?

Answers

Answer:

Explanation:

indent marker:

indent markers are located to the left of the horizontal ruler, and they provide several indenting options like left indent, right indent, first line indent and hanging indent. they allow you to indent paragraphs according to your requirements.

tab stop:

a tab stop is the location where the cursor stops after the tab key is pressed. it allows the users to line up text to the left, right, center or you can insert special characters like a decimal character, full stops, dots or dashed lines or can even create different tab stops for all the text boxes in a publication.

yes both can be applied at the same time. you do the settings according to the formatting of your layout.

To answer the research question "How am I going to find the information I need on the tople?" the best thing Georgia should
do first is
get on her computer to search the topic
make a list of the books she could use.
ask her teacher for specific suggestions.
make a list of relevant sources to check out

Answers

Answer:

The correct option is D)  

Explanation:

To get information about a research topic the first thing to do is make a list of relevant sources.

Georgias sources would depend on the type of research she has been asked to conduct.

If it's primary research, she would collect information from:

Her own experienceHer own observationthe Information she gathers personally from other people

If it is  secondary research, she can look at

books (hard copy, e-copy)journals (online, offline)online (blogs, videos, websites etc)

Whilst looking online, it is important to stick to authoritative sources as it is possible for anyone to publish anything online.

Examples of reliable sources are:

Journals from Industry AssociationsBureaus of StatisticsGlobal Research CompaniesHigher Institutions e.t.c.

Cheers!

Answer:

D

Explanation:

Edge 2021

(refer to code example 8-1) assuming none of the h2 elements include a class attribute when the application starts, what happens the first time the user clicks on an h2 element?

Answers

In code example 8-1, when the application starts, none of the h2 elements have a class attribute. The first time the user clicks on an h2 element, the addEventListeners function is triggered and the event listener is added to the clicked element. This event listener listens for the click event and when triggered, it executes the toggle function.

The toggle function then checks if the clicked element has the "open" class attribute. If it does not, the function adds the "open" class attribute to the clicked element, revealing the hidden content. If the element already has the "open" class attribute, the function removes it, hiding the content. So, when the user clicks on an h2 element for the first time, the toggle function is executed, adding the "open" class attribute to the clicked element and revealing the hidden content. When the user clicks on an h2 element for the first time in the given scenario (code example 8-1), assuming none of the h2 elements include a class attribute when the application starts, an event listener attached to the h2 element is likely triggered. This event listener may perform actions such as toggling the visibility of related content or applying a style change to the clicked h2 element. Since there's no class attribute initially, any class-based styling or behavior would not be applied until the event is triggered by the user's click.

To learn more about toggle function. click on the link below:

brainly.com/question/27176375

#SPJ11

Which method will successfully launch the Spelling and/or Grammar Checker dialog box?

Click the Review tab on the ribbon; in the Proofing group, click on the Spelling & Grammar button.
Press the F7 key on your keyboard.
Right-click a word that is marked with a spelling or grammar error, and select Spelling or Grammar from the menu list.
All the above statements are correct.

Answers

Answer:all of the above

Explanation:

I got it correct

The correct is D. All the above statements are correct which All the above statements are correct.

To check your spelling and grammar, select the Review tab and then Spelling & Grammar.

What program is used in the word to check the spelling?

Spell checking is a unique function in Microsoft Word that lets you check your work for grammatical and spelling errors. A software program that detects misspelled words in a document is what spell check essentially is.

Grammar checkers are a great tool for people who aren't writers or are very technical. These apps help users become more fluent in the English language by pointing out their flaws. Your writing will be reviewed by Grammar Checker Tools to ensure that it is accurate and error-free.

Select Spelling & Grammar from the Review tab. In the event that Word discovers a potential error, the Spelling & Grammar dialog box will launch with red text for spelling mistakes and green text for grammatical mistakes.

Thus, the ideal selection is option D.

Learn more about the Spelling and/or Grammar Checker here:

https://brainly.com/question/16798012

#SPJ2

____ is a term for software that is run directly from the internet.

Answers

Web-based software is a term for software that is run directly from the internet.

The term for software that is run directly from the internet is "web-based software." Web-based software, also known as cloud-based software or software as a service (SaaS), allows users to access and utilize applications or programs through a web browser without the need for installation on local devices.

It operates on remote servers, and users can interact with the software and perform various tasks online. Web-based software offers several advantages, including easy accessibility from any device with internet connectivity, automatic updates without user intervention, centralized data storage and management, and collaboration capabilities. Popular examples of web-based software include email services, project management tools, customer relationship management (CRM) systems, and document editing applications.

The rise of web-based software has contributed to the increasing popularity of cloud computing and the shift towards remote work and online collaboration.

To learn more about “software” refer to the https://brainly.com/question/28224061

#SPJ11

which of the following statements is not a file-naming convention for windows? a. spaces are not allowed. b. maximum length is 255 characters. c. do not use reserved words. d. do not use symbols.

Answers

The statement that is not a file-naming convention for Windows is "do not use symbols." While it is generally recommended to avoid using symbols in file names, it is not a strict naming convention like the other statements listed.

The other statements - "spaces are not allowed," "maximum length is 255 characters," and "do not use reserved words" - are all established file-naming conventions for Windows.

All of the statements listed are actually file-naming conventions for Windows. However, to answer the question as asked, the correct answer would be "e. All of the above statements are file-naming conventions for Windows."

To clarify:a. Spaces are not allowed in Windows file names. If you need to separate words, you can use underscores (_) or hyphens (-) instead.b. The maximum length for a Windows file name is 255 characters.

To learn more about strict click the link below:

brainly.com/question/31340505

#SPJ11

Which actions help to protect a computer and keep it running properly? Check all that apply.
performing regular scans
deleting any unwanted files
backing up files and other data
saving Internet browsing history
saving and storing all junk files

Answers

Answer:

backing up files and other data

[10pt] Consider a router that interconnects three subnets: Subnet 1, Subnet 2, andSubnet 3. Suppose all of the interfaces in each of these three subnets are required tohave the prefix 223.1.17/24. Also suppose that Subnet 1 is required to support at least 40interfaces, Subnet 2 is to support at least 80 interfaces, and Subnet 3 is to support atleast 20 interfaces. Provide three network addresses (of the form a.b.c.d/x) that satisfythese constraints.

Answers

The constraints provided and are part of the 223.1.17/24 prefix.

To address your question, we need to assign network addresses for the three subnets while meeting the interface requirements and using the prefix 223.1.17/24.

1. Subnet 1 needs to support at least 40 interfaces. The smallest subnet that can support 40 interfaces is a /26 subnet, which can accommodate 62 usable hosts. The network address for Subnet 1 is 223.1.17.0/26.

2. Subnet 2 needs to support at least 80 interfaces. The smallest subnet that can support 80 interfaces is a /25 subnet, which can accommodate 126 usable hosts. The network address for Subnet 2 is 223.1.17.128/25.

3. Subnet 3 needs to support at least 20 interfaces. The smallest subnet that can support 20 interfaces is a /27 subnet, which can accommodate 30 usable hosts. The network address for Subnet 3 is 223.1.17.64/27.

These three network addresses meet the constraints provided and are part of the 223.1.17/24 prefix.

Learn more about prefix here:

https://brainly.com/question/14161952

#SPJ11

Does any one know how to code? If you do can you help me with my project?

Answers

Answer:

kinda look it up!!!

Explanation:

go to code.org free coding

i can help you man

-scav aka toby

The best advice for setting a study session is

Answers

to take breaks and not do all the work at once.

Answer: A

Explanation:

Why do most data scientists and companies collect enormous amounts of
data?
A. To reduce the huge amount of data found on the internet
B. To store the data and save it for future generations to examine
C. To compete with other data scientists and companies
O D. To make more accurate predictions about their users and their
behaviors

Answers

I believe it’s B because Scientist collect data for further examination more like theories and unknown things.

Answer: D.

Explanation: got it right

Who wrote Hamlet?

Brainliest for the right answer​

Answers

Answer:

William Shakespeare wrote hamlet

Explanation:

it’s wroten by a William Shekespeare

true or false: to get the average return, the yearly returns are summed and then multiplied by the number of returns.

Answers

Answer: False

Explanation: Hope it Helps

2 The software needed to send an email is:
+
A presentation software
B web authoring software
C communication software
D graphics software​

Answers

Answer:

C communication software

Explanation:

C communication software IS THE ANSWER

a company set up controls to allow only a specific set of software and tools to install on workstations. a user navigates to a software library to make a selection. what type of method prevents installation of software that is not a part of a library

Answers

Allow list is type of method prevents installation of software that is not a part of a library.

What is Allow list?

A list of domains or email addresses that you want to receive emails from is referred to as a whitelist or an allow list. You can instruct the email system not to filter email from a certain address or domain by adding it to your list of allowed addresses or domains.

What does whitelist being enabled mean?

An email address, IP address, domain name, or application can be approved while all others are rejected using a cybersecurity technique known as a whitelist (allowlist).

What is Allowlist in phone?

From a security perspective, allowlisting is a useful tool for preventing PHAs from devices because the allowlist of programs ultimately gets quite small.

Learn more about allow list.

brainly.com/question/13850709

#SPJ4

Other Questions
the nurse is educating a client about the risks of stroke related to the new prescription for a cox-2 inhibitor and what symptoms to report. which cox-2 inhibitor is the nurse educating the client about? How does nicle have 4 baskets Suppose the coefficient matrix of a linear system hos 5 rows and 7 columns. If this coefficient matrix has 3 pivot positions, then the number of free variables of this linear system is (enter number) Answer: The third reason that animals should not be tested is that will scientists ever use human beings to experiment with cures for animal diseases, So why do it to animals if not to humans first? How can I make this sentence good without the question mark One estimate provided in the text shows that the average cost per expatriate failure to the parent firm can be as high as Blank______ times the expatriate's annual domestic salary plus the cost of relocation. Multiple choice question. according to your text, people differ in their unconscious assumptions about personal space. time. interpersonal relations. all answers are correct. HELP! I DONT UNDERSTAND , I NEED TO TURN IT IN BY TOMORROW MORNING What arguments do the families have about food and the war. (this is about anne frank. please answer asap.) c. suppose the company has some preferred stocks that pay $3 per share every quarter forever. the first dividend will be paid one year from today. what is price per share of the preferred stock? suppose apr When two angles and a non-included side of one triangle are congruent to the corresponding pieces of another triangle? Consider the following statements about capital budgeting. a. _____ and _____ incorporate the time value of money. b. _____ focuses on time, not profitability. c. _____ uses accrual accounting income. d. _____finds the discount rate which brings the investment's NPV to zero. e. In capital rationing decisions, the profitability index must be computed to compare investments requiring different initial investments when the _____ method is used. f. _____ ignores salvage value. g. _____ uses discounted cash flows to determine the asset's unique rate of return. h. _____ highlights risky investments. i. _____ measures profitability, but ignores the time value of money. Fill in each statement with the appropriate capital budgeting method: Payback period, ARR, NPV, or IRR. A line that has an arrow at one end and a text note at the other is a need complete solution with illustrationsprovide graphs if possible1.) The velocity of a particle which moves along a linear reference axis is given by v = 2-4t + 5t^3/2, t is in seconds while v is in meters per second. Evaluate the position, velocity and acceleratio Power Industries has acquired a patent for $16,000. Its useful life is expected to be four years. When the company records the annual amortization it willIncrease amortization expense and decrease the specific intangible asset. Using domestic plants as a production base for exporting goods to selected foreign country markets Multiple Choice can be an excellent initial strategy to pursue international sales. can be a successful strategy when a company is focusing on vacant market niches in each market. O works well when exchange rate fluctuations prevent the adoption of a transnational strategy O is usually a weak strategy when competitors are pursuing multi-domestic strategies. can be a powerful strategy because the company is not vulnerable to fluctuating exchange rates. company that ships glass for a glass manufacturer claimed that its shipping boxes are constructed so that no more than 8 percent of the boxes arrive with broken glass. The glass manufacturer believed the actual percent is greater than 8 percent. The manufacturer selected a random sample of boxes and recorded the proportion of boxes that arrived with broken glass. The manufacturer tested the hypotheses H, :p = 0.08 versus H, :p > 0.08 at the significance level of a = 0.01. The test yielded a p-value of 0.001. Assuming all conditions for inference were met, which of the following is the correct conclusion?. The p-value is greater than a, and the null hypothesis is rejected. There is convincing evidence that the proportion of all boxes that contain broken glass is greater than 0.08.B. The p-value is greater than a, and the null hypothesis is rejected. There is not convincing evidence that the proportion of all boxes that contain broken glass is greater than 0.08.C. The p-value is greater than a, and the null hypothesis is not rejected. There is not convincing evidence that the proportion of all boxes that contain broken glass is greater than 0.08.D. The p-value is less than a, and the null hypothesis is rejected. There is convincing evidence that the proportion of all boxes that contain broken glass is greater than 0.08.E The p-value is less than a, and the null hypothesis is not rejected. There is not convincing evidence that the proportion of all boxes that contain broken glass is greater than 0.08. after writing a follow-up message to thank your interviewer, your next step should be . a. waiting at least one month for a call of acceptance or rejection b. sending a small gift to the receptionist to show your appreciation c. alerting your references that they may be contacted d. calling the company's human resources department to learn more about your competitors for the available position On Tuesday Katy ran a mile in 8.34 minutes. She ran another mile in 7.89 minutes on Wednesday. What was the total time for both miles? During 2014, its first year of operations as a delivery service, Persinger Corp entered into the following transactions. 1. Issued shares of common stock to investors in exchange for $100,000 in cash. 2. Borrowed $45,000 by issuing bonds. 3. Purchased delivery trucks for $60,000 cash. 4. Received $16,000 from customers for services performed. 5. Purchased supplies for $4,700 on account. 6. Paid rent of $5,200. 7. Performed services on account for $10,000. 8. Paid salaries of $28,000. 9. Paid a dividend of $11,000 to shareholders.Using the following tabular analysis, show the effect of each transaction on the accounting equation. Put explanations for change decrease in Assets, Liabilities or Stockholders Equity, place a negative sign (or parentheses) in front of the amount Assets =Liabilities Cash+Accounts Receivable+Supplies+Equipment =Accounts Payable +Notes Payable+Common Stock Step by step pls