a) An organization, is using the X.509 certificate scheme. Each public-key certificate is associated with each user. Jack is a Group Manager who reports to Cathy, the Department Manager. Cathy reports to Bob, the Division Manager of the organization, and Eve is the CEO of the organization. Describe how Jack's certificate is created. You can assume that Eve is the person who selects a public key pair. The public part is posted such that anyone in the company can have access to it. Eve keeps the private part. The rule of certificate signature in the organization is that one’s certificate can only be signed by someone at the upper adjacent level of hierarchy. Use a diagram to show Jack's full certificate. The certificate must include the individual's ID, Title and Public key at a minimum. b) John is a Project Manager who is way down in the company hierarchy and he needs Jack's public key. Describe the process by which John can obtain an authentic copy of Jack's public key.

Answers

Answer 1

The certificate creation process involves hierarchical signing by individuals in higher positions within the organization. In this scenario, Jack is a Group Manager.

Who reports to Cathy, the Department Manager. Cathy, in turn, reports to Bob, the Division Manager, and Eve is the CEO of the organization.
To create Jack's certificate, the following steps are followed:
1. Jack generates a public-private key pair.
2. Jack creates a certificate signing request (CSR) that includes his ID, title, and public key.
3. Jack sends the CSR to Cathy, as she is in the upper adjacent level of hierarchy.
4. Cathy verifies Jack's information and signs the CSR using her private key, creating Jack's signed certificate.
Diagram for Jack's certificate:
[ID: Jack's ID, Title: Group Manager, Public Key: Jack's Public Key, Signature: Cathy's Signature]
For John, a Project Manager, to obtain an authentic copy of Jack's public key, he can follow these steps:
1. John accesses the company's public directory and locates Jack's signed certificate.
2. John verifies the authenticity of Jack's certificate by checking Cathy's signature using her public key (available in the public directory).
3. If the verification is successful, John can trust that the public key in Jack's certificate is genuine and use it for secure communication with Jack.

Organisational structure is the arrangement of a company's staff, processes, and resources to help it achieve its goals. This includes the established internal organisational power, coordination, roles, and accountability framework that specifies how work is done and how decisions are made.

Learn more about hierarchical here

https://brainly.com/question/30782169

#SPJ11


Related Questions

How does the payload free worm method differ from the payload method?

Answers

A worm is a type of computer virus that is self-replicating and can spread throughout a network or the internet. It is a self-contained program that can replicate and spread without the need for a host file. Payload is a program or code that is hidden within the worm and executed on an infected computer.

These payloads can cause damage to the infected system, steal data, or launch additional attacks on other systems or networks. The payload-free worm is a worm that replicates and spreads like a traditional worm but does not contain any payload or malicious code.

It does not cause any damage to the infected system or network. This type of worm is often used for research purposes to study the spread of worms without causing harm to any system. The payload method is a worm that has a hidden code that is designed to cause damage to the infected system or network.

The payload can be programmed to perform various functions, including deleting files, stealing data, launching attacks on other systems, or installing additional malware. This type of worm is often used by cybercriminals to launch attacks on specific targets or to spread malware for financial gain.

For more such questions Payload,Click on

https://brainly.com/question/30144748

#SPJ8

Write EBNF descriptions (i. E. Rules) for the a Java class definition header statement. Begin with the start symbol. Use the non-terminal for the user-defined name of the class You do not have to include a LHS rule which defines valid naming conventions to expand the non-terminal

Answers

The EBNF description for a Java class definition header statement includes a start symbol <Java Class>, the <Class Name> non-terminal, and rules for <Identifier>.

The EBNF (Extended Backus-Naur Form) is a metasyntax notation used to describe the grammar of programming languages. For a Java class definition header statement, the EBNF rules would describe the syntax of the statement using non-terminal symbols and terminals.

The start symbol for the EBNF description of a Java class definition header statement would be a non-terminal symbol, which represents the header statement itself. This non-terminal symbol would then be expanded into other non-terminal symbols and terminals that describe the various components of the header statement, such as the class name, access modifiers, and the keyword "class".

The non-terminal for the user-defined name of the class would be defined using a separate EBNF rule, which would specify the valid naming conventions for Java classes, such as starting with an uppercase letter and using camel case for multi-word names.

Overall, the EBNF rules for a Java class definition header statement would provide a formal description of the syntax that a Java compiler would use to parse and interpret the statement. This can be useful for programmers who need to understand the grammar of the language in order to write correct and efficient code.

Learn more about Java Class here:

https://brainly.com/question/14615266

#SPJ4

what is the result of the function that follows? regexp_substr('tr1-268-468r', '[1-9]-[1-9]*[a-z]')

Answers

The function regexp_substr('tr1-268-468r', '[1-9]-[1-9]*[a-z]') will return the substring that matches the regular expression pattern [1-9]-[1-9]*[a-z] within the input string 'tr1-268-468r'.

In the given regular expression pattern, [1-9] matches a digit from 1 to 9, - matches a hyphen, [1-9]* matches zero or more digits from 1 to 9, and [a-z] matches any lowercase letter. Therefore, the pattern seeks to match a digit from 1 to 9, followed by a hyphen, followed by zero or more digits from 1 to 9, and finally ending with a lowercase letter.In the provided input string, the matching substring that fulfills the pattern is '1-268'. Hence, '1-268' will be the result returned by the regexp_substr function.

To learn more about function    click on the link below:

brainly.com/question/20361395

#SPJ11

web design, pls help me i need this in 40 minutes ​

web design, pls help me i need this in 40 minutes

Answers

<input type="color">: This input type allows the user to select a colour using a colour picker. , This input type, "date," enables users to choose a date from a calendar.

Which seven different text structures are there?

A few examples of text structures are sequence/process, description, time order/chronology, proposition/support, compare/contrast, problem/solution, cause/effect, inductive/deductive, and research.

How should a date be formatted?

Here is a general rule to remember when writing dates with commas: in the month-day-year format (used in the United States), use commas after the day and year. Do not use any commas when using the day-month-year format, which is used in the UK and other nations. In 2007, on May 13, Daniel was born.

To know more about input type visit:-

https://brainly.com/question/14543408

#SPJ1

A student has a ten-year-old desktop computer that she only uses for word processing, but she would like to start using it to play new computer games. She has been working and has money saved up, and she can either upgrade the computer or purchase a new one to replace the old one.________
The school’s theater department uses a desktop computer for accounting purposes only — to keep track of costume purchases, fund-raising dollars, and the number of hours volunteers, students, and teachers participate in the production. The computer is only three years old, but it is running slow. It appears as though there are just too many pictures from past productions on the hard drive.___________

replace
upgrade

Answers

Answer:

She should buy a new one or buy a Gaming PC to upgrade the setup.

Explanation:

Answer:

replace

upgrade

Explanation:

im doing edge too it might not be right tho

what is i.a folder ii.file​

Answers

Answer

Folder A digital folder has the same purpose as a physical folder – to store documents.

50 points The system administrator role began in the late 1970s and involved physically managing _____ and _____.

A.
hardware; databases

B.
software; databases

C.
hardware; networks

D.
software; networks

Answers

The system administrator role began in the late 1970s and it involved physically managing: C. hardware; networks.

Who is a system administrator?

A system administrator can be defined as an individual who is saddled with the responsibility of configuring and managing an informations system (IS), which typically involves the physical management of hardware and networks.

Historically, the role of a system administrator began in the late 1970s and it involved physically managing the components of an informations system (IS) such as:

HardwareNetworks

Read more on hardware here: brainly.com/question/959479

why is preserving the integrity of data, information, and systems an important cybersecurity goal?

Answers

Why is it crucial to maintain the accuracy and reliability of data, information, and systems? If these assets' reliability, consistency, or correctness are jeopardised, they become less valuable and useful.

Why is maintaining the integrity of data, information, and systems important?

It's crucial to maintain data integrity for a number of reasons. Data integrity guarantees connectivity, traceability (to origin), recoverability, and searchability, among other things. Data validity and accuracy protection boosts performance and stability while enhancing reusability and maintainability.

The importance of honesty in cybersecurity

Integrity is the capacity to verify that no unauthorised alterations have been made to a system or its data. Integrity protection guards against illegal changes to hardware, operating systems, and applications in addition to data.

To know more about data visit:-

https://brainly.com/question/13650923

#SPJ4

Which method will return an empty string when it has attempted to read beyond the end of a file? a. read b. getline c. input d. readline d . readline

Answers

It is to be noted that the method will return an empty string when it has attempted to read beyond the end of a file is: "readline" (Option D).

What is an empty string?

An empty string is a zero-length string instance, but a null string has no value at all. The character "" represents an empty string. It consists of a zero-character sequence. Null represents a null string.

The empty string is a specific instance in which the sequence has length zero and so contains no symbols. There is only one empty string since two strings are only distinct if their lengths or symbol sequences differ.

Learn more about files:
https://brainly.com/question/14338673
#SPJ1

an early type of GUI is created, which includes windows, pop-ups, icons, and menus. What year did this happen? Please help!!! quick.

Answers

Answer:

1979

Sources:

Wired

InventHelp

hope i helped :D

Full Answer to this question.

Full Answer to this question.

Answers

Answer:

see picture

Explanation:

I'm not exactly sure if you're supposed to write a trace snapshot at the beginning or at the end of a loop iteration. I did it at the end.

Full Answer to this question.

how energy gets into the air and what happens to the air temperature.

Answers

The Earth's atmosphere is energized in a multitude of manners, such as the absorption of solar radiation by its surface; a central capacity which pervades this occurrence.

As air that encircles the land nears the floor and is heated through direct contact with the warm surface, it noticeably diminishes in density, henceforth rising and conveying thermal energy, as a result.

How is energy transferred

The transfer of energy from the area below to the air above sensibly assumes an affective outcome on the environmental temperature levels. It is, indeed, an elaborate mechanism, wherein countless elements have the potential to shake up the way energy is shifted through the atmosphere; including, but not limited to, the magnitude of solar radiation procured, the presence of greenhouse gases, as well as atmospheric cycling designs.

Learn more about air temperature at

https://brainly.com/question/31149654

#SPJ1

//g 5. [reliability] [stop-and-wait] [pipelining/sliding window] consider a link with speed 100mbps, one way propagation delay 10 msec, and packet size 1,000 bits. a. what is the goodput achieved if the alternating bit (also known as stop and wait) protocol is used over this link? you can count the packet header as part of the goodput. b. how large does the window size need to be for a pipelining reliability protocol to make maximum use of the link?

Answers

a. The goodput achieved if the alternating bit (stop-and-wait) protocol is used over the link is 95.24 Mbps. This protocol requires the sender to wait for an acknowledgment before sending the next packet, which introduces a delay equal to twice the propagation delay for each packet.

b. To make maximum use of the link with a pipelining reliability protocol, the window size needs to be **20 packets**. This can be calculated by dividing the link's bandwidth-delay product by the packet size. The bandwidth-delay product is equal to the product of the link speed and the round trip time (2 times the one-way propagation delay), which gives us 200,000 bits. Dividing this by the packet size of 1,000 bits gives us a window size of 20 packets. With this window size, the sender can continuously send packets without waiting for acknowledgments, utilizing the link's full capacity.

The flight time of a packet over a transmission link is known as propagation delay and is limited by the speed of light. The propagation delay, for instance, will be less than one second if the source and destination are in the same building at a distance of 200 meters.

Know more about propagation delay, here:

https://brainly.com/question/30643647

#SPJ11

In this experiment, you need to quickly decide whether your target, a(n) _________, is present in each array of objects.

Answers

In the given experiment, the target we are checking to be present in each array of objects is called; Blue Circle

Array of Objects

The experiment being talked about here is one that was carried out by a Psychologist named Donald Broadbent which was the filter theory used to explain the selective nature of human beings attention span or conscious awareness.

In the experiment the conclusion was to decide as fast as possible, whether a particular target object (a blue circle) was present in an array of other shapes.

Now, If the blue circle was present, then they were going to click “yes.” However, if the blue circle wasn't present, they were going to click “no.”

Read more about Array of Objects at; https://brainly.com/question/15684709

Assignment Topic: "Analyze how the educators integrates the creative arts throughout the curriculum in a childcare sector"
Format guidelines:
Specific formatting expectations:
- Times New Roman 12
-point font, double- spaced, and 2.5 to 3 cm margins is considered a standard.
- Page limit 4−5 pages, no less than 1500 words, APA format
- Cover Page: Tittle of assignment, student name, course name and code, due date, instructor name, etc.

Answers

The assignment requires an analysis of how educators integrate the creative arts throughout the curriculum in the childcare sector. The analysis should follow specific formatting guidelines, including Times New Roman 12-point font, double spacing, 2.5 to 3 cm margins, and adhere to APA format. The assignment should consist of a cover page with the necessary details, followed by a 4-5 page essay containing no less than 1500 words.

The assignment focuses on examining how educators incorporate the creative arts into the curriculum within the childcare sector. The analysis should explore various aspects such as the methods used by educators to integrate creative arts, the benefits of incorporating creative arts in early childhood education, and examples of activities or lessons that promote creative expression and exploration.

The essay should begin with a cover page that includes the assignment's title, the student's name, course name and code, due date, instructor name, and any other required details. The main body of the essay should consist of 4-5 pages, with a word count of at least 1500 words, discussing the topic in depth. It is important to use Times New Roman 12-point font, maintain double spacing, and set margins between 2.5 to 3 cm. Additionally, the essay should follow the APA format for citations, references, and overall structure.

By adhering to the specified formatting guidelines and providing a comprehensive analysis of how educators integrate the creative arts throughout the childcare curriculum, the assignment will meet the requirements and provide valuable insights into the topic.

Learn more about analysis here:

https://brainly.com/question/17248028

#SPJ11

the memory location where the computer stores the list of locations to which the system must return is known by what term?

Answers

The term used to describe the memory location where a computer stores the list of locations to which the system must return is the "stack."

Here are some additional points to consider regarding the stack:

The stack is a region of memory that is reserved for program use.The stack is typically managed by the operating system, which allocates memory as needed and keeps track of stack usage.The stack is used to store variables, function parameters, and other data that is needed by the program during execution.

When a computer program is executed, the system uses a stack to keep track of the order in which instructions are executed and to manage the storage of data. The stack is a critical component of the computer's memory system, and it is used extensively by the operating system and application software to manage program execution.

Learn More About Computer stores

https://brainly.com/question/31209059

#SPJ11

Jonah has finished his assignment and now wants to save his work with the title "Renaissance."
Which steps should Jonah follow to accomplish this?
navigate to the Quick Access bar, click the Save icon
navigate to the backstage view, click the Save As icon
click the File tab, click Save, type in the title, click Save
click the File tab, click Save As, type in the title, click Save

Answers

Answer:

Your answer is D.click the File tab, click Save As, type in the title, click Save

Explanation:

Jonah has finished his assignment and now wants to save his work with the title "Renaissance."Which steps

Answer:

C

Explanation:

took the quiz

Adnan also wants to add a photograph of a bridge. It is on another PowerPoint presentation that is open in a different window on his computer. Which feature should he use to complete the task?

Pictures folder
Bing search engine
screen clipping feature
Photo Album dialog box

Answers

Answer:

C

Explanation:

On edg

Answer:

screen clipping feature

Explanation:

a what is an application used to access websites on the internet

Answers

Answer: browser

Explanation:

A software application used to locate and display Web pages. The two most popular browsers are Microsoft Internet Explorer and Netscape Navigator.

a dependency is a logical relationship that exists between the project tasks, or between a project task and a milestone. group of answer choices false true

Answers

The statement " a dependency is a logical relationship that exists between the project tasks, or between a project task and a milestone" is True.

What is dependency?

A dependency in programming is a feature, library, or section of code that is necessary for another section of code to function. For instance, a particular library that a certain line of code depends on.

A task that depends on another task's successful completion is referred to as a dependency in project management. Project management is an example of a dependency; The CEO must provide his or her consent before a corporation can release a PR statement. The submission of an expenditure report is necessary for reimbursement.

To learn more about a dependency, use the link given
https://brainly.com/question/29564140
#SPJ4

Drag the tiles to the correct boxes to complete the pairs.
Match the testing tools to their use.
Selenium
JMeter
load testing tool
functional testing tool
test management tool
defect-tracking tool
QTP
web browser automation tool
Quality Center
Bugzilla

Answers

Answer:

JMeter is a functional testing tool

use the symbolic toolbox to find symbolic expressions for the three roots. warning: the results are not pretty. convert the expressions to numerical values.

Answers

The given question states to use the symbolic toolbox to find symbolic expressions for the three roots. Warning: the results are not pretty. Convert the expressions to numerical values. We are given the equation below:3x^3 + 2x^2 − 5x + 1 = 0

The solution to the equation will involve finding the roots of the cubic polynomial. Hence, we can use the symbolic toolbox of MATLAB to find the roots of the given polynomial.The code for the same is shown below:>> syms x>> eqn = 3*x^3 + 2*x^2 - 5*x + 1 == 0;>> solx = solve(eqn, x);>> disp('The symbolic expressions for the three roots of the equation 3x^3 + 2x^2 - 5x + 1 = 0 are:');>> disp(solx);The output obtained is shown below: The symbolic expressions for the three roots of the equation 3x^3 + 2x^2 - 5x + 1 = 0 are: [1/3*(20 + (728 - 27*sqrt(393))^1/3 + 2*(4 + 3*sqrt(3))*(728 - 27*sqrt(393))^(-1/3)), 1/3*(20 - (1 + 3*sqrt(3))*(728 - 27*sqrt(393))^(-1/3)*(4 + 3*sqrt(3))*(34 + 3*sqrt(393))^(1/3) - (1 - 3*sqrt(3))*(728 - 27*sqrt(393))^(-1/3)*(34 + 3*sqrt(393))^(-1/3)*(230 + 9*sqrt(393))), 1/3*(20 - (1 - 3*sqrt(3))*(728 - 27*sqrt(393))^(-1/3)*(4 - 3*sqrt(3))*(34 + 3*sqrt(393))^(1/3) - (1 + 3*sqrt(3))*(728 - 27*sqrt(393))^(-1/3)*(34 + 3*sqrt(393))^(-1/3)*(230 + 9*sqrt(393)))]As we can see from the output, the symbolic expressions for the three roots of the equation are quite complicated. In the given equation, there are two complex roots and one real root.

Now, we have to convert these expressions to numerical values. The code for the same is shown below:>> roots = double([solx(1), solx(2), solx(3)]);>> disp('The numerical values of the roots are:');>> disp(roots);The output obtained is shown below: The numerical values of the roots are: 0.2265 1.0018 -1.2283Therefore, the numerical values of the roots are 0.2265, 1.0018, and -1.2283. Hence, the answer to the given question is: ANSWER: The numerical values of the three roots are 0.2265, 1.0018, and -1.2283. LONG ANSWER: To solve the given question, we used the symbolic toolbox of MATLAB to find the roots of the given polynomial. After finding the roots, we converted the expressions to numerical values.The MATLAB code used to solve this question is shown below:>> syms x>> eqn = 3*x^3 + 2*x^2 - 5*x + 1 == 0;>> solx = solve(eqn, x);>> disp('The symbolic expressions for the three roots of the equation 3x^3 + 2x^2 - 5x + 1 = 0 are:');>> disp(solx);>> roots = double([solx(1), solx(2), solx(3)]);>> disp('The numerical values of the roots are:');>> disp(roots);

To know more about symbolic toolbox visit:

https://brainly.com/question/26532566

#SPJ11

i am making a project i have to advertise a product i picked a futureistic car
can any one halp me with a unknown name that is cool plss

Answers

Answer:

The Futuristic Car. That name is bussin

How should an artist use the principles of design when creating artistic work?


follow them to the letter

let them come naturally

don’t think about them

experiment with them

Answers

Answer:

Let them come naturally

Explanation:

I think

Many surveys are conducted over the phone. Which of the following would be most likely to cast doubt on the external validity of these studies? a. All of the people participating in the survey own telephones, b. The phone calls were not all placed at the same time of day. c. Some of the calls were dropped and the person had to be called back. d. The person conducting the survey was not good at operating a telephone Oe. The phone surveys were conducted by 12 surveyors instead of one

Answers

The option that would be most likely to cast doubt on the external validity of phone surveys is "a. All of the people participating in the survey own telephones".

What does External validity refers to?

External validity refers to the extent to which the findings of a study can be generalized to the larger population from which the study sample was drawn. If a survey is conducted only among people who own telephones, then the findings may not be representative of the entire population, as some segments of the population may not own telephones.

Therefore, option "a. All of the people participating in the survey own telephones" would cast doubt on the external validity of the survey. The other options may affect the internal validity of the study, but they would not necessarily impact its external validity.

Learn more about  phone surveys

brainly.com/question/29187620

#SPJ11

n processes are time-sharing the cpu, each requiring t ms of cpu time to complete. the context switching overhead is s ms. (a) what should be the quantum size q such that the gap between the end of one quantum and the start of the next quantum of any process does not exceed m ms? (b) for n

Answers

When M = 450, Q = 82 CPU use was wasted by 8.889%. When M = 90, Q = 10 Total CPU time lost was 44.44%. When M = 50,Q = 2 CPU time wastage was 80%.

The percentage of the CPU utilised during the designated time period is summarized in the CPU Utilization report. Normally, the Core uses between 30 and 40 percent of the entire CPU during off-peak hours and between 60 and 70 percent during peak hours. About 75% of opportunities to complete tasks are lost. The main memory delay, which can take up to 100 cycles, is the most frequent cause of this.

Data Provided:

Process = n

T = ms time

Context switch overhead is equal to S.

where M denotes overall overhead.

Learn more about wastage here-

https://brainly.com/question/2062616

#SPJ4

cuales son los signos de exel

Answers

Answer

explanation

Operador de comparaciónSignificadoEjemplo< (signo menor que)Menor que=A1<B1>= (signo mayor o igual que)Mayor o igual que=A1>=B1<= (signo menor o igual que)Menor o igual que=A1<=B1<> (signo distinto de)No es igual a=A1<>B1

Answer:

¿Qué quieres decir?

Explanation:

you are asked to install a new high-end graphics card. in which motherboard slot should you install it?

Answers

The optimal PCI Express slot on your motherboard to insert your graphics card into is typically the first one. Typically, the first slot will be a fully-decked PCIe x16 slot, allowing your graphics card to operate at peak efficiency.

What slot should you place your GPU in?

Any of the major slots on a motherboard with four slots will function without requiring any configuration changes. Because the graphics card can be big and interfere with another component if it's installed in the first slot, you might wish to utilize another slot.

Which slot ought to I insert my SSD in?

Use a corresponding NVMe-compatible M. 2 slot for your M. 2 NVMe SSD before doing anything else.

To know more about motherboard visit:-

https://brainly.com/question/29834097

#SPJ4

the full meaning of UNIVAC and ENIAC​

Answers

Explanation:

ENIAC - Electronic Numerical Integrator and Calculator. UNIVAC - Universal Automatic Computer (First Digital Computer)

hope it's help you cutty

UNIVAC

UNIVAC, which stood for Universal Automatic Computer, was developed by J. Presper Eckert and John Mauchly, makers of ENIAC, the first general-purpose electronic digital computer.

ENIAC

ENIAC filled an entire room.ENIAC stands for Electronic Numerical Integrator and Computer. John Mauchly and J. Presper Eckert built the machine at the University of Pennsylvania at the behest of the U.S. military.

Hope it helps

Thank You !!!

which of the information security roles is usually tasked with configuring firewalls, deploying idss, implementing security software, diagnosing and troubleshooting problems, and coordinating with systems and network administrators to ensure that security technology is operating to protect the organization? group of answer choices security analyst

Answers

The information security role that is usually tasked with configuring firewalls, deploying IDSs, implementing security software, diagnosing and troubleshooting problems, and coordinating with systems and network administrators to ensure that security technology is operating to protect the organization is the a. security analyst.

Security analysts are responsible for maintaining the security posture of the organization by analyzing and evaluating the security risks and vulnerabilities. They are also responsible for implementing and managing the security solutions such as firewalls, IDSs, and other security software.

Additionally, they diagnose and troubleshoot security problems and coordinate with other IT professionals to ensure that the security technology is operating effectively.

Security analysts play a critical role in protecting the organization's information and assets from cyber threats. They must possess a deep understanding of the organization's technology infrastructure, security policies, and regulatory compliance requirements.

They must also stay up-to-date with the latest security threats and technologies to ensure that the organization is protected from the constantly evolving threat landscape.

In summary, security analysts are an essential part of an organization's information security team. They are responsible for deploying, managing, and maintaining security technology to protect the organization's assets from cyber threats.

Learn more about security analysts : https://brainly.com/question/31161941

#SPJ11

Your question is incomplete but probably the complete question is :

Which of the information security roles is usually tasked with configuring firewalls, deploying IDSs, implementing security software, diagnosing and troubleshooting problems, and coordinating with systems and network administrators to ensure that security technology is operating to protect the organization?

a. security analyst

b. CIO

c. Security manager

d. physical security manager

Other Questions
9.In a missense mutation, ________ A.all the amino acids beyond the mutation point are changed B.a single amino acid is altered C.a piece of a chromosome is lost D.a nucleotide is inserted E.a nucleotide is deleted when something is used only once and then thrown away it is said to be Design a mechanism 1. Its degree of freedom is one. 2. The number of links should be larger than 6. . 3. Identify the input and output link. 4. Determine the limiting positions and transmission angles for the output link. 5. Show the displacement/velocity/acceleration of the output link as a function of the input link for at least 6 phases. | help please urgenttttIn which two sports are the players height distributions most alike? Explain your reasoning. Now its time to consider which virtues will best fit within the scope of your project.Explain which virtues you think you already most embody (personify) as a citizen.Some civic virtues I already embody areI embody these virtues becauseList 3-5 civic virtues that are important to addressing the community problem you want to solve.Why do you think that each of these virtues is important to solving this problem?This virtue is important to solving my project problem because... List 5 Must have, can't have, might/could haveMatch the captions and the pictures. Then complete the rules with must have can't have, or might/could have.1. Where is everyone?''I don't know. They might have forgotten our presentation.2. I think Eric must have resigned3. She can't have got the promotion. why did the british decide to tax the colonists? a to discourage colonists from fighting for independence b to punish colonists for fighting against them in the french and indian war c to ease tensions between the european settlers and native americans d to help pay for the french and indian war Which two discoveries were the first pieces of irrefutable proof that Alfred Wegner was correct and the continents are moving , inc. produced 1,000 units of the company's product in 2018. the standard quantity of direct materials was three yards of cloth per unit at a standard cost of $1.20 per yard. the accounting records showed that 2,700 yards of cloth were used and the company paid $1.25 per yard. standard time was two direct labor hours per unit at a standard rate of $9.75 per direct labor hour. employees worked 1,500 hours and were paid $9.25 per hour. for those who are very wealthy the textbook chapter provides and example of an inferior good. the example given is: How has government subsidies influenced agricultural policies in Malawi? Choose the BEST paraphrase of this text:Black holes are extremely compact space objects that were once massive stars. A) Black holes are super tiny space things that used to be big old stars. B) Black holes are extremely compact space objects that were once massive stars. C) Massive stars are extremely compact spaces objects that were once black holes. D) The extremely small objects in space that at one time were enormous stars are called black holes. Hint Communication (2.3) Quote Or Paraphrase ID: 55394 find the square simplify the answer: (2g-9h) 3a-28-7a+10a Someone PLEASE HELP Construct a list of steps for making a cash withdrawal from an automated teller machine (ATM). Assume that the process begins at the ATM with your bank card in hand. Assume that the ATM asks for PIN number after selecting the transaction option. 1. Find the sum of the first 46 terms of the following series, to the nearest integer 12, 15, 18 According to a recent study, the carapace length for adult males of a certain species of tarantula are normally distributed with a mean of p=1777 mm and a standard deviation of a = 171 mm Complete parts (a) through (4) bow Click here to view page 1 of the standard normal distribution table Click here to view.page 2 of the standard normal distribution table CE b. Find the percentage of the taranules that have a carapace length exceeding 19 mm The percentage of the tarantulas that have a carapace longth exceeding 19 s 2358% (Type an integer or decimal rounded to two decimal places as needed c. Determine and interpret the quarties for the carapace length of these tarantulas The first quattles 1662 (Type an integer or decimal rounded to two decimal places as needed Interpret the first quartile Select the correct choice below and fill in the answer box(es) to complete your choice (Type integers or decimals rounded to two decimal places as needed)A This first quartile means that of the carapace lengths are equal to B. The best quartie means that % of the carapace longths are less than C. This test quarties Isless than the average carapace length D. This tirst quarto is greater than the smallest carapace length In 9) Find X and Y ****Chose 2 Answers****X = 40X = 80 X = 100Y = 40Y = 70Y = 140 discuss the major paradigms of public administration. how have they changed over time? what impact did the different eras of american history have on public administration? Which statement do you find most compelling for Americans today: the Preamble to the Constitution or the first sentence of paragraph three of the Declaration of Independence?A full four paragraphs (6-8 sentences per paragraph), must contain evidence from whole group texts including the Preamble and Declaration, and must follow all standard formal grammar and spelling conventions.