disscussion reply to students, minimum 50 words in own words

1: Can a linear equation and a linear inequality be solved in the same way?Explain why. What makes them different?  2:What steps do you use to solve a linear inequality? Give an example, and explain your answer. 3: A linear equation and a linear inequality can be solved in the same way, but there are two things that you have to remember. if you multiply or divide both sides by a negative number, the inequality sign is reversed. For example, > will become < or < will become >. Adding and subtracting will have no effect on the direction of the inequality. If you have a “not equals” sign, then it will be unaffected by the multiplication. Here is an example to better explain how it works. If we have an equation such as 1/X=2, take the reciprocal and X=1/2. With the inequality 1/X < 2, this becomes X > 1/2. This can also be solved by multiplying both sides by X, and then you would divide both sides by 2. The results for this would be 2 < X, which is the same as X > 2. IT 242        4:CLASS – Conduct an Internet search to locate an example of a private network and a public network. How is each network use? What are the pros and cons of each? 5:What is the most commonly used cable in networking? What are the latest advancements in cabling?                                 6:Hello instructor and class, I believe that an example of a public network would be anytime you pull up at a Starbucks, or a McDonald’s and connect to their free Wi-Fi. I believe that is considered a public network access. Another example of a public network would be having access through a cable provider that offers internet service. Although your network can be secure it is still considered a public network. On the other hand an example of a private network would be a company that only has a network that is designed for the access of their employees. In many cases this is known as a virtual private network or VPN. An advantage of having a private network is that information tends to be better protected and encrypted because of the importance of having company security. A disadvantage would be the cost and maintenance it takes to maintain that security from intruders.