Briefly explain how to create a new GNS3 topology, select a group of devices the Routers group was selected.

Answers

Answer 1

Creating a new GNS3 topology is a straightforward process that involves selecting a group of devices and connecting them to form a network. With a little bit of practice, you can quickly create complex topologies for testing and experimentation.

To create a new GNS3 topology, you need to first open the GNS3 application. Once the application is open, you can start by selecting "New Blank Project" from the main menu. This will create a new project where you can add your devices.

To add devices to your topology, select a group of devices from the Device Types panel on the left-hand side of the screen. For example, in this case, you want to select the "Routers" group. Once you have selected the group, you can drag and drop devices from the Devices panel onto the main workspace.

Next, you will need to connect the devices. To do this, you can select the "Add a Link" option from the toolbar, and then click on the devices you want to connect. You can also use the "Auto Net Device" option to automatically connect devices.

Finally, you can configure the devices as needed. To do this, you can right-click on the device and select "Configure." This will bring up a window where you can configure the device's settings, such as the hostname, IP address, and routing protocols.

Overall, creating a new GNS3 topology is a straightforward process that involves selecting a group of devices and connecting them to form a network. With a little bit of practice, you can quickly create complex topologies for testing and experimentation.

Learn more about topology here:

https://brainly.com/question/10536701

#SPJ11


Related Questions

In the lesson, you learned about the various uses of computers in manufacturing, from design to the control of manufacturing processes. Write a short report about the advantages and main features of CAD. Discuss the main applications of CAM as well.

Answers

Some of the main features of Computer Aided Design:
(CAD) are:

Modeling in solids.Engineering drawings are created from solid models.Surface modeling in freeform.Assemblies are collections of pieces and/or other assemblies that are designed automatically.Design components can be reused.

Glassworking, woodturning, metallurgy and spinning, and graphical refinement of the entire production technique are some of the key uses of the Computer Aided Manufacturing (CAM) system. CAM systems are used to create solids of rotation, flat surfaces, and screw threads.

What is CAD?

The use of computers to help in the development, alteration, analysis, or optimization of a design is known as computer-aided design.

This program is used to boost the designer's efficiency, improve design quality, improve communication through documentation, and develop a database for production.

Learn more about Computer Aided Manufacturing:
https://brainly.com/question/14039774
#SPJ1

Do you agree with mr. lee or do you disagree? use the sources linked above to formulate a response backed by evidence.
“ the constitution has very little democracy in it “ - Richard Lee

Answers

In the context of America's democracy,it is important to recognize that the Constitution serves as the cornerstone   of the nation's democratic system.

How is this so  ?

While the Constitution may have certain   provisions that limit direct democracy, such as the electoral college,it is designed to ensure a balance of power, protect individual rights, and promote democratic principles.

Also, the   Constitution has been amended over time to expand democratic participation, such as with the 15th, 19th,and 26th Amendments.

Therefore, while there may be   ongoing debates about the extent of democracy in the Constitution,it remains a vital framework for America's democratic governance.

Learn more about constitution at:

https://brainly.com/question/453546

#SPJ1

what is the size of the smallest rom that is needed to implement a 32-bit full adder

Answers

The size of the smallest ROM that is needed to implement a 32-bit full adder is 8 bytes.

A 32-bit full adder requires 32 inputs and 33 outputs, as well as 96 logic gates. Each input and output requires a flip-flop, resulting in a total of 65 flip-flops. Assuming each flip-flop requires one bit of storage, the total storage needed is 65 bits. Since ROMs are typically measured in bytes, the smallest ROM needed would be 8 bytes, as each byte consists of 8 bits.

Therefore, the size of the smallest ROM needed to implement a 32-bit full adder would be 8 bytes.

You can learn more about full adder at

https://brainly.com/question/29821668

#SPJ11

Jeremy has been asked by his manager to begin drafting a report on last year sales figures when he’s midway through the report a co-worker stops by and asks if Jeremy will help him with a problem she has on her project Jeremy also needs to respond to number of emails before the end of the day he is able to accomplish all these tasks which positive workplace behavior has he demonstrated

Answers

Answer:

Time management.

Explanation:

Answer:

Adaptability.

Explanation:

because he was being ASKED to do it if he wasn't asked and did it, it's initiative.

What is word in computer?

Answers

Answer:

In computing, a word is the natural unit of data used by a particular processor design. A word is a fixed-sized piece of data handled as a unit by the instruction set or the hardware of the processor.

This the answer you wanted? (brainliest?)

A/n _____ information security policy is also known as a general security policy. Group of answer choices system specific enterprise strategic Issue Specific

Answers

Answer:

strategic issue

Explanation:

a technician has to test the network path between their location and the destination. they want to make sure that the results include ip addresses, not hostnames of routers. which command should they use?

Answers

The technician should use the "tracert" command.

What is command?
A command in computing is a request for a computer programme to carry out a certain task. It could be sent using a command-line interface, like a shell, as input to a network service is part of a network protocol, as an event inside a graphical user interface brought on by the user choosing an item from a menu, or as a command sent to a computer over a network. The word "command" is specifically used during imperative computer languages. The name was given to these languages because sentences in them are frequently written in an imperative mood, which is common in many natural languages. A command is typically compared to a verb in a language where an imperative statement is viewed as being similar to a sentence.

To learn more about command
https://brainly.com/question/25808182
#SPJ4

In OOP the focus is given to which of the following entities?

Answers

Answer:

In Object-Oriented Programming (OOP), the focus is given to objects. An object is an instance of a class, and a class is a blueprint or template for creating objects.

In OOP, programs are designed by creating classes that represent real-world entities or concepts, and then creating objects based on those classes. These objects can interact with each other through methods and attributes, which define the behavior and data associated with each object.

OOP also emphasizes encapsulation, which means that data and methods are grouped together in a class, and only the methods that are exposed to the outside world are accessible to other objects. This helps to ensure that data is protected and that the behavior of the object is consistent.

Overall, OOP focuses on creating modular and reusable code that can be easily maintained and extended over time. By focusing on objects, OOP allows programmers to create complex systems that are composed of smaller, more manageable parts.

The PRODUCT table contains these columns PRODUCT_ID NUMBER(9) DESCRIPTION VARCHAR2(20) COST NUMBER(5.2) MANUFACTURER ID VARCHAR2(10) Steve want to display product costs with following desired results: 1. The cost displayed for each product is increased by 20 percent. 2. The product manufacturer id must be 25001, 25020, or 25050. 3. Twenty percent of the original cost is less than $4 Which statement should you use? SELECT description, cast 1.20 FROM product WHERE cost. 204.00 AND manufacturer_id IN (25001: 25020 25050): SELECT description cost 20 FROM product WHERE cost 20 4.00 AND manufacturer_id BETWEEN 25001 AND "25050 SELECT description, cost 1.20 FROM product WHERE cost" 204 AND manufacturer_id (25001:25020. 250507:

Answers

The correct statement to achieve the desired results is: SELECT description, cost * 1.20 FROM product WHERE cost * 0.20 < 4 AND manufacturer_id IN (25001, 25020, 25050).

To display product costs with the desired results, the SELECT statement needs to consider three conditions: increasing the cost by 20 percent, filtering for specific manufacturer IDs, and ensuring that 20 percent of the original cost is less than $4.

The correct statement is:

SELECT description, cost * 1.20 FROM product WHERE cost * 0.20 < 4 AND manufacturer_id IN (25001, 25020, 25050).

In this statement, "cost * 1.20" increases the cost by 20 percent, and "cost * 0.20 < 4" ensures that 20 percent of the original cost is less than $4. The "manufacturer_id IN (25001, 25020, 25050)" filters for the specific manufacturer IDs 25001, 25020, and 25050.

By combining these conditions in the WHERE clause and performing the necessary calculations in the SELECT clause, the statement accurately retrieves the desired results for displaying product costs.

Learn more about manufacturer here:

https://brainly.com/question/29489393

#SPJ11

what jtids/mids protocol dictates that platforms take turns transmitting and receiving data according to time?

Answers

Link 16 JTIDS/MIDS protocol dictates that platforms take turns transmitting and receiving data according to time. Link 16 is a standard military tactical data exchange network that allows military platforms to share data on a common network.

What is Link 16?

Link 16 is a time-division multiplexing (TDM) network that allows many users to share the same radio frequency band. The TDM method permits each user to transmit its data within its own time slot. This guarantees that the radios' messages do not collide with one another. The Link 16 terminals do this using the Time Division Multiple Access (TDMA) method.

This method ensures that platforms transmit their data at precise, prearranged intervals. Link 16 is also a secure radio that prevents eavesdropping by encrypting the information.

To know more about time-division multiplexing (TDM) visit:

https://brainly.com/question/31666197

#SPJ11

the extent to which the data properly conforms to and matches up with the other data in a proper timing describes the timeliness data quality characteristic?

Answers

The characteristic you mentioned aligns more closely with consistency rather than timeliness in the context of data quality.

No, the characteristic you described does not pertain to the timeliness data quality characteristic. The characteristic you mentioned refers to the consistency data quality characteristic, which describes the extent to which data conforms to and matches up with other data in terms of timing, format, and rules.

On the other hand, the timeliness data quality characteristic refers to the aspect of data being available in a timely manner, meaning it is up-to-date and relevant for the intended purpose. Timeliness focuses on the freshness and currency of data, ensuring that it is captured, processed, and made available within the desired timeframe to support decision-making and operational requirements.

Therefore, the characteristic you mentioned aligns more closely with consistency rather than timeliness in the context of data quality.

learn more about "data ":- https://brainly.com/question/26711803

#SPJ11

Which of the following would not be stored in a cell ?

A. Formula
B. Text
C. Number
D. Chart​

Answers

Answer:

D

Explanation:

Because you can put formulas, text and numbers into a salad, but you can not put a chart interrupt because it won't fit in a cell.

Python - Write a program to print the multiplication table as shown in the image by using for loops.

Python - Write a program to print the multiplication table as shown in the image by using for loops.

Answers

Answer:

Explanation:

The following python code creates the multiplication table for 10 rows and 10 columns. This code uses nested for loops to traverse the table and print out the product of each multiplication. The image attached shows the output of the code.

for x in range(1, 11):

       for y in range(1, 11):

           z = x * y

           print(z, end="\t")

       print()

Python - Write a program to print the multiplication table as shown in the image by using for loops.

The program to print the multiplication table as shown in the image by using for loops is in the Source code.

The Python program that uses nested for loops to print the multiplication table:

Source code:

for i in range(1, 11):

   for j in range(1, 11):

       if i == 1 and j == 1:

           print("x", end="  ")

       elif i == 1:

           print(j, end="  ")

       elif j == 1:

           print(i, end="  ")

       else:

           print(i * j, end="  ")

   print()

This program will iterate through the values of `i` from 1 to 10 and `j` from 1 to 10. It checks for special cases when `i` or `j` is equal to 1 to print the headers (x and the numbers 1 to 10).

For other cases, it calculates the multiplication of `i` and `j` and prints the result.

Learn more about Nested loop here:

https://brainly.com/question/33832336

#SPJ6

A homeowner is planning to use carpet tiles to cover the floor of a room measuring 9 feet by 10 feet 8 inches. If the carpet tiles are 8 inches wide and 1 foot long and there are no gaps between the tiles as they are placed on the floor, how many carpet tiles will the homeowner need to cover the floor of the room?​

Answers

If the carpet tiles are 8 inches wide and 1 foot long, and there are no gaps between them as they are placed on the floor, the homeowner will need 144 carpet tiles to cover the floor of the room.

Given room dimensions of 9feet*10feet 8inch

tile dimensions of 8inch*1foot,

we can calculate

the number of tiles required. 1 foot=12 inch

number of tiles=area of room/area of tiles

               =(9*12)inch*(12*10+8)inch/8inch *12 inch

               =144

A homeowner is someone who owns a house or apartment in which they live.

This is the most common written policy for a homeowner, and it is intended to cover all aspects of the home, structure, and contents.

Most homeowner policies include replacement cost coverage for the home and actual cash value coverage for personal property.

A homeowner is someone who owns a house or apartment in which they live.

Learn more about homeowner here:

https://brainly.com/question/15243238

#SPJ4

write a program to output a big A like the one below

write a program to output a big A like the one below

Answers

hope this helps, i'm a beginner so this might not be the most concise method

write a program to output a big A like the one below

a senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production. the email was sent from someone she doesn't know, and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. which type of attack best describes the scenario?

Answers

Whaling attack best describes the scenario where a senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production.

What is whaling attack?

Whaling is a highly focused phishing assault that masquerades as a legitimate email and targets top executives. Whaling is a type of technologically enabled social engineering fraud that encourages victims to execute a secondary action, such as starting a wire transfer of monies. For example, an attacker may send an email seeking cash to a CEO while pretending to be a client of the firm. Whaling assaults usually address targeted persons individually, frequently using their title, position, and phone number gathered from corporate websites, social media, or the press.

Here,

Whaling assault best defines the scenario in which a top executive reports receiving a strange email about a key internal project that is behind schedule.

To know more about whaling attack,

https://brainly.com/question/6585219

#SPJ4

6.1. Careers and Areas in Computer Science

Match the potential work with the area in computer science.

Answers

Potential work in computer science can be matched with various areas of specialization within the field.

Computer science is a vast field that offers numerous career paths and specializations. Some of the areas of specialization in computer science include software development, database management, computer networking, cybersecurity, artificial intelligence, and machine learning.

Software developers design and develop software applications, while database administrators manage and organize data within computer systems. Computer network architects design and build computer networks, while cybersecurity experts protect computer systems and networks from unauthorized access.

Artificial intelligence and machine learning specialists develop algorithms that enable computers to learn and make decisions based on data. They also create intelligent systems that can automate tasks, such as speech recognition and natural language processing.

Overall, the potential work in computer science is vast and diverse, offering numerous career paths for individuals with different skills and interests.

Learn more about Software developers: https://brainly.com/question/3188992

#SPJ11

How Much did a case of soda (any kind your choice ) cost in 2004?
PLS HELP!!!!!!

Answers

Answer:

2004 88 cents for 2 cans

Explanation:

How Much did a case of soda (any kind your choice ) cost in 2004?PLS HELP!!!!!!

hardware device can be either internal hardware devices or external hardware devices.

Answers

Answer:

Yes

Explanation:

Because keyboard and mouse are external hardware and not inside the CPU cabinet but hardwares such as heat sink, sound card and graphic card are external hardware.

this is true because any physical component of a computer is considered hardware ie: hdd, ssd, cpu, gpu, mouse, keyboard, microphone

HOW DO YOU RUN YOUR SCRATCH PROGRAM?

HOW DO YOU RUN YOUR SCRATCH PROGRAM?

Answers

Answer:

By clicking on the green flag, it starts up the program and if you want to stop it use the stop sign.

To run your scratch program you have to click the green flag, and it will run your program.

Hope that helps.

why is the quality of the photo, music, etc better when more samples are taken?

Answers

When more samples are taken, the signal is represented more accurately and with less distortion, resulting in a better quality photo, music, or other digital signal.

What is distortion ?

Distortion is the alteration or misrepresentation of the original shape, appearance, or sound of something. It is a distortion of the truth, in which facts are exaggerated or misstated to support an argument or opinion. It can also refer to the alteration of a signal, such as audio or video, by external means such as a microphone, amplifier, or speaker. In audio, distortion can be used to create interesting effects, or it can be a result of an overdriven signal, caused by too much gain.

The quality of a photo, music, or other digital signal is determined by the number of samples taken. The more samples taken, the more accurately the signal can be represented. This is known as sampling rate or sampling frequency. The higher the sampling rate, the better the quality of the signal.

To learn more about distortion

https://brainly.com/question/28603019

#SPJ4

Which of the following statements about footnotes is true?They use Arabic numerals by default (1,2,3)A table of contents is at or near the beginning of a documentFrom the context menu, From the Review tab

Answers

The statement "They use Arabic numerals by default (1, 2, 3)" is true about footnotes.

Footnotes are a way to provide additional information or clarification in a document. They are typically marked with a superscript number within the main text, and the corresponding footnote text is placed at the bottom of the page. By default, footnotes use Arabic numerals (1, 2, 3) to mark them, but this can be customized in the footnote settings.  A table of contents is typically located at or near the beginning of a document and provides an overview of the structure and contents of the document. It is not directly related to footnotes. To insert or manage footnotes in a document, you can access the footnote options from the References tab in the ribbon menu, or from the context menu by right-clicking on the selected text.

Learn more about Footnotes here:

https://brainly.com/question/11918966

#SPJ11

Which of the following opens when the Labels icon is clicked?

Answers

The option that opens when the labels icon is clicked is: "Envelopes & Labels dialog box & the Labels tab" (Option D)

What is the explanation for the above response?

The function of the Envelopes & Labels dialog box & the Labels tab is to allow the user to create and print labels for various purposes.

The Labels tab provides options for selecting the label manufacturer and product number, as well as specifying the layout and content of the labels. Users can choose from a variety of preset label sizes or create their own custom size.

The dialog box also allows users to add text, images, and barcodes to the labels. Once the labels are created, they can be previewed and printed, making it a useful tool for creating address labels, product labels, and more.

Learn more about labels icon at:

https://brainly.com/question/20713933

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Which of the following opens when the Labels icon is clicked?

Envelopes menu

Labels menu

Envelopes & Labels dialog box 7 the Envelopes tab

Envelopes & Labels dialog box & the Labels tab

Complete the procedure for forwarding a message by selecting the correct term from each drop-down menu.
1. ___ or open a message.
2. Click the Forward button.
3. In the To field, enter the names of intended recipients.
4. Click the ___ button.

Answers

Answer:

Preview; send.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send texts and multimedia messages over the internet.

The procedure for forwarding a message to a recipient include;

1. Preview or open a message. This is to ensure that the appropriate or specific message is selected.

2. Click the Forward button. This button opens the dialog box to allow the sender input various details about the message and the recipient.

3. In the To field, enter the names of intended recipients.

4. Click the send button. This button automatically forwards the message to the intended recipient(s).

In Java I’m having trouble with variables. When I try to call a variable from my while loop it says, “finger cannot be resolved to a variable.” The error is on line 49.

In Java Im having trouble with variables. When I try to call a variable from my while loop it says, finger

Answers

You're declaring variable finger inside your while loop so it only exists inside your while loop. You're then trying to use your finger variable outside your while loop, which is impossible because finger only exists inside your while loop.

Try declaring total at the beginning of your program, adding finger to total before you break from your while loop and then adding randNum to your total at the end.

To better understand why you can't use finger outside your while loop, look up "java scope". This will explain why you can only use variable in the regions they're declared in.

Unit Test
Unit Test Active
11
12
TIME REN
16:
Which formatting elements can be included in a style Terry created?
font size, type and color
paragraph shading
line and paragraph spacing
All of the options listed above can be used to create a new style.

Answers

Answer:

d. all of the options listed above can be used to create a new style .

Explanation:

The formatting elements that can be included in a style Terry created is font size, type and color. The correct option is A.

What is formatting element?

The impression or presentation of the paper is renowned to as formatting. The layout is another word for formatting.

Most papers encompass at least four types of text: headings, regular paragraphs, quotation marks, as well as bibliographic references. Footnotes along with endnotes are also aggregable.

Document formatting is recognized to how a document is laid out on the page, how it looks, and the way it is visually organized.

It addresses issues such as font selection, font size as well as presentation like bold or italics, spacing, margins, alignment, columns, indentation, and lists.

Text formatting is a characteristic in word processors that allows people to change the appearance of a text, such as its size and color.

Most apps display these formatting options in the top toolbar and walk you through the same steps.

Thus, the correct option is A.

For more details regarding formatting element, visit:

https://brainly.com/question/8908228

#SPJ5

The lost boy gave the correct
(A)
adress
(B)
addres
addrest
address
to the policeman.

Answers

Answer:

address to the police man

The lost boy gave the correct ADDRESS to the policeman

how are web design & web development different from each other?

Answers

Answer:

Developers are people who build a website's core structure using coding languages, while designers are more visually creative and user-focused. Developers use their programming knowledge to breathe life into the designer’s creative vision.

You could think of developers as construction workers, and web designers as architects – both necessary, but different, skill sets.

I hope this helped :D

Explanation:

Suppose that there are a group of n people. Some of them meet, some of them don't. Your goal is to select m people such that for each person i; i is either among the ones that are selected, or is known by someone in the selected group

Answers

The problem can be solved using the concept of graph theory. We can represent the group of people as a graph, where each person is a node, and there is an edge between two nodes if they know each other.

If a person is not connected to anyone else, we can consider them as a separate connected component.To select m people such that each person i is either selected or knows someone in the selected group, we can use a modified version of the Breadth-First Search algorithm. We start by selecting the first person arbitrarily and add them to the selected group. We then perform a Breadth-First Search, starting from this person, and adding all the people we encounter to the selected group, up to a total of m people.During the Breadth-First Search, we can maintain a list of people who have already been added to the selected group, and skip them if we encounter them again. This ensures that we only select people who are not already known by someone in the selected group.If we are unable to select m people using this approach, we can increase the number of selected people and repeat the process until we have selected the required number of people. this approach ensures that we select a group of m people such that each person i is either in the selected group or known by someone in the group.

To learn more about nodes click the link below:

brainly.com/question/28269884

#SPJ4

Mitchell wants to create a game that takes place in a forest. What should he add to his game to achieve that effect?

A.
a dog sprite

B.
one tree sprite

C.
a forest backdrop

D.
a purple backdrop

Answers

The Effect that he should add to his game that takes place in a forest is One tree sprite and not by the Forest backdrop.

What is the difference between Backdrop and Background?

While "background" is more broadly defined as "anything that goes behind," including temporally and physically, a backdrop is literally "a painted cloth hung at the back of a theatre stage as part of the scenery."

Why do we play the games?

Gaming is actually a mental exercise that is cloaked as entertainment. Video game play has been linked to increased brain connectivity and grey matter, according to studies.

Mitchell creates a game that places in a forest and can include the one-tree sprite effect in developing the game.

Therefore, One tree Sprite is the effect used.

To learn more about the Backdrop from the given link

https://brainly.com/question/23418833

#SPJ1

Other Questions
the force, F newtons (N) between two particles is inversely proportional to the square of the distance, d m, between them. When the particles are 2m apart,the force between them is 10 N. Find1- the force between the particles when they are 5m apart,2- the distance between the particles when the force between them is 25 N. which view holds that behavior is completely determined by environmental and genetic influences? which statement is true about the evolution of maximum body mass of mammals after the cretaceous-paleogene mass extinction? At the beginning of the day, Hasim counted his money. He gave his brother 1/3 of his money. He spent 12 on a present for his sister. He then counted what he had left, and it was half what he had at the beginning of the day. How much did he give his brother? Show your method. a gender is a belief or expectation that one holds about the typical characteristics, preferences, or behaviors of men or women. list the angles in order from smallest to largest. show your work. Most South American countries got their independence between:A. 1776 and 1851,B. 1800 and 1821.C. 1820 and 1841.D. 1790 and 1801. how many valence electrons are transferred from each potassium atom to nitrogen in the formation of the compound potassium nitride? The career placement office at a large university tracks the number of job applications graduating seniors complete before getting their first job. Data on college graduates suggests that most will send out a large number of applications before getting their first job. Which one of the following histograms best represents the distribution of job applications for graduating seniors?a.Histogram IIIb.Histogram IIc.Histogram IVd.Histogram I side lengths and angle measures in similar figures Anybody know the answer to these questions? solve the following system of equations bryan brought 8/10 gallon of water on a hiking trip.he drank 4/10 gallon of water.how much water is left Radford Products adds materials at the beginning of the process in Department A. The following information on physical units for Department A for the month of January is available. Units started in January 892,000 Units completed in January 916,000 Work in process, January 1 (25% complete with respect to conversion) 97,000 Work in process, January 31 (40% complete with respect to conversion) 73,000. Compute the equivalent units for materials costs and for conversion costs using the FIFO method. I need help pleaseeee How many atoms of carbon present in 3.9g of benzene Explain the benefits of use of Television over radio as teaching resources. The United States was initially helping which European country regain control of Vietnam? help me please 30 points John Quincy Adams became President of the United States in the "Corrupt Bargain after the Election of 1824 becauseA)he was a famous war hero who was able to buy votesB)Henry Clay gave his support in the House of Representatives. If you dont know do not answer if you do Ill mark brainliest several southern states boycotted the Presidential election completelyD)Congress refused to count the electoral votes from three DemocraticStates