A substance that can be broken down by microorganisms is called

Answers

Answer 1

Answer:

biodegradable

Explanation:

i do not take this class though, so im unsure


Related Questions

What is meant by Information Retrieval?

Read it carefully.

Hint: Join the white highlighted letters for better understanding.

:D

❌No Spam! Otherwise you will be reported❌

What is meant by Information Retrieval?Read it carefully. Hint: Join the white highlighted letters for

Answers

information retrieval is searching for information of an unstructured nature from a larger number of quantity of information

When you perform a search, a general search engine searches the entire Internet.
A. True
B. False

Answers

Answer:

a

Explanation:

general search is a

advanced search is b

DNS record allows multiple domain names to resolve to the same ip address.

a. true
b. false

Answers

Answer:

False

Because each domain has a separate IP address.

HELP 100 points

DIGITAL INFORMATION TECHNOLOGY : 5 - TOOLS TO TACKLE THE WEB : ROCK YOUR RESEARCH
Apply What You've Learned
Now that you have learned the basics of acquiring relevant information through research, it's time to put your skills to work.


Assignment
Complete the reading in this lesson.
Review the grading rubric to see the criteria your instructor will use to grade your work.
Follow the directions.
In the assessments area, submit your completed 05.05 Rock Your Research assignment.

Answers

Answer:

i do not know what to do there.

Explanation:

there's no pictures

The following class implements a Queue using a linked-list.
class Queue {
private:
struct Node {
int data;
Node *next;
};
Node *front, *rear;
public:
Queue(); ...
void Join(int newthing);
void Leave();
bool isEmpty();
int Front();
}
a) Write the C++ method Join(int newthing).
Write the C++ method Leave().
c) Write the C++ method int Front().
D. The following main() creates a queue and uses some of the methods above.
main() {
Queue Q;
Q = new Queue;
Q.Join(1);
Q.Join(2);
Q.Leave();
Q.Join(3);
Q.Front();
Q.Join(4);
Q.Leave();
Q.Join(5);
Q.Join(6);
Q.Leave();
if(Q.isEmpty()) Q.Join(7);
}
Consider the contents of the nodes after carrying out all the statements above. Draw a Image of the linked-list of the queue.

Answers

The linked-list implementation of the queue will have the following contents after executing the given statements: 2, 3, 4, 5, 6, 7.

In the given code snippet, the Queue class implements a queue using a linked-list. The queue is initialized with an empty front and rear pointer.

In the main() function, a queue object Q is created and initialized. Initially, the queue is empty. The Join() method is called to add elements to the queue. The statement Q.Join(1) adds the element 1 to the queue. Similarly, Q.Join(2) adds 2 to the queue.

The Leave() method is called to remove elements from the queue. The statement Q.Leave() removes the front element from the queue, which is 1.

Afterwards, Q.Join(3) adds 3 to the queue. The Front() method is called to retrieve the front element of the queue. The statement Q.Front() returns 2, as 1 has been removed previously.

Then, Q.Join(4) adds 4 to the queue. Q.Leave() removes the front element, which is 2. Q.Join(5) adds 5, Q.Join(6) adds 6, and Q.Leave() removes 3.

Finally, the if statement checks if the queue is empty using the isEmpty() method. Since the queue is not empty at this point, Q.Join(7) adds 7 to the queue.

Therefore, after executing all the statements, the contents of the nodes in the linked-list representation of the queue will be 2, 3, 4, 5, 6, 7.

Learn more about  linked-list

https://brainly.com/question/33332197

#SPJ11

A data breach is the protection of secure data in an unsecured environment.
True
False

Answers

Answer: i think its true

Explanation: have a good day!

FILL IN THE BLANK. This type of software allows students to record, sort, mathematically analyze and represent numerical data in tabular and/or graphical forms. ___

Answers

Spreadsheets  software is a type of software allows students to record, sort, mathematically analyze and represent numerical data in tabular and/or graphical forms.

Why do people use spreadsheets?

One tool for storing, modifying, and analyzing data is a spreadsheet. A spreadsheet's data is arranged in a series of rows and columns, where it can be searched, sorted, calculated, and used in a number of charts and graphs.

Therefore, A program known as a spreadsheet, also referred to as a tabular form, is used to arrange data into rows and columns. This information can then be arranged, sorted, calculated (using formulas and functions), analyzed, or graphically represented to illustrate.

Learn more about Spreadsheets from

https://brainly.com/question/26919847
#SPJ1

which of these describe raw data?check all of the boxes that apply A) what a person buys B) where a person lives C) data that has been analyzed D) data that has not been analyzed

Answers

D) data that has not been analyzed

A(n) ________ defines the form or protocol of an operation, but not its implementation.

Answers

A(n) interface defines the form or protocol of an operation, but not its implementation. It is a programming concept that allows different classes or components to interact with each other without needing to know the specific details of how each operation is implemented.

An interface provides a contract that specifies the methods and properties that must be implemented by any class that implements the interface. In simpler terms, an interface acts like a blueprint or template for a set of operations. It outlines what methods should be present and what parameters they should accept, but it does not dictate how those methods should be implemented. This separation between the form (interface) and implementation allows for flexibility and modularity in code design.

It also promotes code reusability and simplifies maintenance, as different classes can implement the same interface to provide different behaviors. In conclusion, a(n) interface defines the form or protocol of an operation, but it leaves the implementation details to the classes that implement it. It helps in creating loosely coupled code and allows for better code organization and extensibility.

Learn more about an interface

https://brainly.com/question/28235695

#SPJ11

JAVA
Write a program to find the sum of the given series:
S = 1 + (1*2) + (1*2*3) + --------- to 10 terms.

plz help....​

Answers

public class MyClass {

   public static void main(String args[]) {

     int x = 1;

     int total = 0;

     for (int i = 1; i <= 10; i++){

         x *= i;

         total += x;

     }

     System.out.println(total);

   }

}

This program finds the sum of that series to the tenth term, the sum is: 4037913. I hope this helps.

What three requirements are defined by the protocols used in network communcations to allow message transmission across a network? (choose three.)

Answers

The three requirements  that are defined by the protocols used in network communications to allow message transmission across a network are:

Message encodingMessage  size Message delivery

What is SMS encoding?

Messaging encoding is known to be the way that a given text message is said to be transmitted or sent to the mobile phone carriers.

Note that this type of encoding is one that is often influences how a lot of characters can be used in all of the message segment.

Therefore, The three requirements  that are defined by the protocols used in network communications to allow message transmission across a network are:

Message encodingMessage  size Message delivery

Learn more about Message encoding from

https://brainly.com/question/14718895

#SPJ1

what is the 3rd streak fun fact from brainly

Answers

Answer:

it is something like you life time saliva can fill up two swimming pools i think

Answer:

During your lifetime, you will produce enough saliva

Explain one rule the company must follow when using cookies on its website.

Answers

Explanation:

Work out what cookies your site sets, and what they are used for, with a cookie audit.

Tell your visitors how you use cookies.

Obtain their consent, such as by using Optanon, and give them some control.

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.

Answers

Answer:

(config)# service password-encryption

Explanation:

A system administrator could use service password-encryption command to prohibit any specified credentials from showing in text format in configuration files. This command secures all passwords in the config file that have been specified.

To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command.

An administrator can use the service password-encryption command to stop all configured passwords from being displayed in configuration files as plain text. All configured passwords in the configuration file are encrypted by this command.

A password is a group of letters and numbers that is used to confirm a user's identity throughout the authentication process. Passwords are frequently used in conjunction with usernames; they are created to be known only by the user and grant access to a device, application, or website on their behalf. Letters, numbers, and special characters can all be used in passwords, and their length can vary.

Hence, to prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command.

Learn more about the configuration file here:

https://brainly.com/question/32311956.

#SPJ6

What is the most efficient
form of transportation we
have?

Answers

Answer:

The bicycle is a tremendously efficient means of transportation. In fact cycling is more efficient than any other method of travel--including walking! The one billion bicycles in the world are a testament to its effectiveness

Explanation:

The bicycle is a tremendously efficient means of transportation. In fact cycling is more efficient than any other method of travel--including walking! The one billion bicycles in the world are a testament to its effectiveness.

Write a design brief including a problem statement, criteria, and constraints.

PLease hurry it is due today!!!

Answers

Enjoy, It's one of my old ones!  <3

Write a design brief including a problem statement, criteria, and constraints.PLease hurry it is due

how can you send and share a message information through a phone​

Answers

Answer:

Through text message

Explanation:

Go to messages and select the text you want to share and save it to your clipboard then go to the person you want to send it to then hit the clipboard button and your text will be there.

Through text messages

Go to messages and select the text you want to share and save it to your clipboard then go to the person you want to send it to then hit the clipboard button and your text will be there!

general security access controls refer to objects, rights, and:

Answers

In a broader sense, security access controls encompass various methods and tools used to protect systems and data from unauthorized access, modification, or destruction. These controls are implemented to manage access to specific resources, such as files, databases, networks, and applications. The aim is to ensure that only authorized individuals or processes can access, use, or manipulate these resources in accordance with the organization's security policies and compliance requirements. In more technical terms, access controls are usually based on the principle of least privilege, which means granting users the minimum level of access required to perform their duties. This is achieved through a combination of authentication, authorization, and auditing mechanisms. Authentication verifies the identity of the user or entity requesting access, while authorization determines what actions or operations the user is allowed to perform. Auditing tracks all access attempts and activities to detect any suspicious or unauthorized behavior.

To sum up, the explanation of general security access controls includes the concept of permissions, as well as the broader context of managing access to resources through various mechanisms and principles.
General security access controls refer to objects, rights, and attributes. In the context of information security, access controls are measures used to regulate who can access specific resources and in what manner. These controls can be broadly categorized into three components: objects (the resources being protected, such as files or databases), rights (the permissions granted to users or processes, like read, write, or execute), and attributes (the characteristics of the subjects or objects, such as security labels or user roles).

Access controls are critical for maintaining the confidentiality, integrity, and availability of data and systems. By ensuring that only authorized users have access to specific resources, and by limiting their actions, organizations can protect sensitive information, prevent unauthorized changes, and maintain overall security. General security access controls, which refer to objects, rights, and attributes, help define the rules and guidelines for managing and enforcing these protections.

To know more about security access controls visit:

https://brainly.com/question/14311587

#SPJ11

Ive accidently said yes to a 30 day free trial for amazon music and i have cancelled it but i went on my alexa abd it still plays unlimited music?? Plz someone help!!

Answers

Answer:

It might take some time to cancel

Email Amazon music about it and see what they say or search

ENDS TODAY PLEASE HELP
Part of what makes the digital photography experience so exciting and innovative compared to non-digital cameras of years past is the LCD display that allows you to instantly review your images after taking them.

For this lab, you are going to focus on exploring the camera viewfinder and LCD display a bit more deeply.

You will start by doing a bit of research on viewfinders and LCD displays on digital cameras. After you feel that you have an understanding of the purpose and function of viewfinders and LCD displays on digital cameras, you will write three to five paragraphs comparing and contrasting these two features. You want to not only identify and explain what they do and how they are used but also explore when and why a photographer might use one versus the other or both simultaneously.

Next, you are going to put on your creativity hat and grab some blank paper and colored pencils, pens, or markers. You are going to create a series of drawings that show what a photographer sees when looking through a camera viewfinder versus what they see when looking at the LCD screen.

Answers

Although it employs an electronic sensor rather than film to create images, digital photography mimics the steps involved in conventional film photography.

What Is Film Photography?The number of megapixels used to describe the resolution of these digital photos, which are kept on a memory card, is.Each frame on a roll of film is exposed to light in traditional film photography in order to produce a picture. Silver halide crystals are coated on plastic film to capture negative images, which deteriorate when exposed to light. Photographers take rolls of film to darkrooms where they employ liquid chemicals to develop the pictures after they've used up all the exposures on the roll.12 Benefits of Digital PhotographySatisfaction in a flash.Purchasing and processing film is expensive.Enormous photo storage spaceVarious purposesA video cameraSharing is simple.A smaller and lighter sizeSimple editing.

To Learn more About film photography refer To:

https://brainly.com/question/20629478

#SPJ1

Jose is preparing a digital slide show for his informative speech. According to your textbook, which type of special effect is the best choice?
- images that fade away after being visible for a few moments
- images that shrink or become larger, depending on their importance
- Jose should avoid using special effects
- images that fly in consistently from the right

Answers

According to the textbook, the best choice for special effects in Jose's digital slide show for his informative speech would be images that fade away after being visible for a few moments.

Fading away images are a subtle and non-distracting special effect that can help maintain the focus on the content of the speech. The gradual disappearance of images after a few moments allows the audience to concentrate on the information being presented without being visually overwhelmed.On the other hand, effects such as images shrinking or becoming larger depending on their importance or flying in consistently from the right may be more suitable for presentations with a creative or visual emphasis. For an informative speech, it is generally recommended to prioritize clarity and minimize unnecessary distractions, hence selecting a simple and understated effect like fading away is a suitable choice.

To learn more about  informative click on the link below:

brainly.com/question/17161344

#SPJ11

A progress Bar appears as a Dark blue line in the Gantt chart Bar when
OA. We print the Repda
OB. We enter the actual values
OC. We create Summary Tasks
OD. We Enter Resources

Answers

Answer: The answer is OD

Explanation:

The answer is OD. We Enter Resources. A progress bar in a Gantt Chart Bar will appear when resources are entered, as the progress bar is used to visually show how much of the task has been completed. When resources are entered, the progress bar will be blue to indicate the amount of work done by each resource on the task.

Select all the correct answers.
Hans is works for a software company that is developing a banking service that employs online transaction processing. What are two advantages
of using this technology?
•It is simple to implement due to redundancy.
•It allows customers to access the service from any location.
•It experiences minimal losses during downtime.
•It provides a secure environment for transactions.
•It processes a transaction even if part of the transaction fails.

Answers

Banking services are monetary transaction that includes the deposit and withdrawal of money. The online transaction process allows one to access services in any place and secure transaction environment.

What is an online transaction?

Online transactions are the transfer of money on the cloud platform using internet services. The financial transactions are done on the web banking platform that includes money transfers, bill payments, shopping, etc.

Online transactions do not require physical presence and can be done at any place irrespective of the location the money gets transferred to the person. Also, it provides a secure environment to transact any amount.

Therefore, a secure environment and access to services at any place are the two advantages of online transactions.

Learn more about online transactions here:

https://brainly.com/question/24192124

#SPJ1

Answer:

a

Explanation:

what the first guy said

look at this how does it look

look at this how does it look

Answers

Answer:

Amazing! Beautiful class!

Answer:

looks pretty nice right people

Explanation:

You're going to be mowing lawns as a summer job. How long will it take for your
hearing to be damaged without hearing protection?

1. Less than 15 mins

2. 1 hour

3. 4 hours

4. There is no hearing damage risk

Answers

hshshshhshshs 3. 4 hours

It would take 4 hours for your hearing to be damaged without hearing protection.

Personal protective equipment (PPE) are equipment worn to minimize exposure to hazards that cause serious workplace injuries and illnesses. Personal protective include items such as gloves, safety glasses and shoes, earplugs or muffs.

The sound of a lawn mower has a decibel level of 90dB. Hence, hearing begins to be damaged after 4 hours of exposure to this sound.

Find out more at: https://brainly.com/question/18003651

given the following c program and the mapping of registers to variables, complete the mips implementation of main. do not implement return 0; in main(). int dif(int a, int b){ return a - b; } int sum(int a, int b){ return a b; } int main(){ int x, y; w

Answers

The given C program defines two functions, `dif` and `sum`, and an incomplete `main` function. The task is to complete the MIPS implementation of `main` by considering the provided mapping of registers to variables.

What is the task in completing the MIPS implementation of the given C program's main function?

The given C program defines two functions, `dif` and `sum`, and an incomplete `main` function. The task is to complete the MIPS implementation of `main` by considering the provided mapping of registers to variables.

To complete the MIPS implementation of `main`, you need to determine the values of `x` and `y`, and then call the `sum` and `dif` functions using the appropriate arguments.

Since the variable mappings are not provided in the question, it is not possible to provide an exact MIPS implementation.

The implementation would require assigning specific register numbers to the variables `x` and `y`, loading their values into the respective registers, and then using those registers as arguments in the function calls to `sum` and `dif`.

Without the specific variable mappings, it is not possible to provide a complete MIPS implementation.

Learn more about C program

brainly.com/question/30905580

#SPJ11

Which network protocol allows administrators to access a remote computer in a secure way?

Answers

SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.

What is Secure Shell ?

The Secure Shell Protocol (SSH) is a cryptographic network protocol that allows network services to be operated securely over an unsecured network. Remote login and command-line execution are two of its most notable applications. SSH applications use a client-server architecture to connect an SSH client to an SSH server.

SSH is a layered protocol suite that consists of three major hierarchical components: the transport layer provides server authentication, confidentiality, and integrity; the user authentication protocol validates the user to the server; and the connection protocol multiplexes the encrypted tunnel into multiple logical communication channels.

SSH was created on Unix-like operating systems to replace Telnet and unsecured remote Unix shell protocols like the Berkeley Remote Shell and the related rlogin and rexec protocols, which all use insecure, plaintext authentication token transmission.

To learn more about Secure Shell refer :

https://brainly.com/question/17465910

#SPJ1

linux is increasingly being used with both mainframes and supercomputers

Answers

Yes, it is true that Linux is increasingly being used with both mainframes and supercomputers. In fact, Linux has become the most popular operating system for supercomputers with over 90% of the top 500 supercomputers running on Linux.

The use of Linux in mainframes has also been growing in recent years, as it provides a more cost-effective and flexible solution compared to proprietary operating systems. Furthermore, Linux's open-source nature allows for customization and optimization for specific use cases, making it an ideal choice for high-performance computing. Overall, the trend towards Linux adoption in mainframes and supercomputers is likely to continue as organizations seek to increase performance while reducing costs.

Linux has become an increasingly popular choice for both mainframes and supercomputers due to its flexibility, scalability, and open-source nature. Mainframes are large, powerful computers designed for high-performance computing tasks such as transaction processing, database management, and financial processing. Traditionally, mainframes have used proprietary operating systems such as IBM's z/OS or Unisys's MCP. However, in recent years, there has been a shift towards using Linux on mainframes, driven in part by the rising costs of proprietary software and the need for more flexibility and scalability. Linux provides a more cost-effective and open solution for mainframes, allowing organizations to run multiple workloads on a single machine and optimize resources to meet specific needs. Similarly, supercomputers are high-performance computing systems designed to process vast amounts of data and perform complex calculations. Linux has become the most popular operating system for supercomputers, with over 90% of the top 500 supercomputers running on Linux. This is due to Linux's scalability, flexibility, and ability to be customized for specific workloads. Linux also has a large and active developer community that works on optimizing the operating system for high-performance computing. In addition to its technical advantages, Linux's open-source nature provides organizations with greater control over their computing infrastructure. With proprietary software, organizations are often limited in terms of customization and innovation. However, with Linux, organizations can modify the operating system to meet their specific needs, leading to greater efficiency and cost savings. Overall, the trend towards using Linux in mainframes and supercomputers is likely to continue as organizations seek to increase performance while reducing costs. Linux provides a flexible and customizable solution that is well-suited for high-performance computing tasks. As technology continues to advance, Linux's position as a leading operating system for mainframes and supercomputers is expected to remain. Linux, an open-source operating system, has gained popularity in recent years due to its flexibility, stability, and cost-effectiveness. As a result, it has become the preferred choice for many mainframes and supercomputers. The open-source nature of Linux allows for easy customization, enabling it to efficiently meet the unique requirements of these high-performance computing systems. Additionally, its widespread use has led to a large support community, further enhancing its appeal for use in mainframes and supercomputers.

To know more about supercomputers visit:

https://brainly.com/question/30227199

#SPJ11

name two different colors used in the python program file window.name the type of program content that has each color ......

whoever answer this correct i will rate them 5 stars and a like .....
please urgent ​

Answers

In the Python program window, black is used for code and syntax, while white is used as the background.

How is this so?

1. Black  -  The color black is typically used for the program's code and syntax. It represents the actual Python code and includes keywords, functions, variables, and other programming constructs.

2. White  -  The color white is commonly used as the background color in the program window. It provides a clean and neutral backdrop for the code and makes it easier to read and understand.

Learn more about python program at:

https://brainly.com/question/26497128

#SPJ1

a user is attempting to access a folder on a shared drive. they receive a message saying access denied and inform you that other folders are working fine. what is likely happening?

Answers

A user is attempting to open a folder on a shared disc. They get an access denied notice, but they let you know that other folders are functioning properly. The user is unable to access the folder.

A folder on a computer serves as the virtual home for files, programs, documents, and other subfolders. In the computer, folders assist in storing and organizing files and data. With operating systems that have a graphical user interface, the phrase is most frequently used.

Computer science folders perform similar tasks to actual folders found in everyday life. Different sorts of programs, data, or libraries can be stored and organized in folders. As well as containing other folders, folders can also contain files or other files. Folders are also referred to as file directories or simply directories due to the way in which they arrange and store data within the file system of the storage medium. The number of folders or subfolders that can be made is unlimited.

Learn more about folder here:

https://brainly.com/question/1178560

#SPJ4

Other Questions
A 4-month-old child underwent cataract surgery 3 hours ago. The parents ask why they are only allowed to give the child small amounts of fluid now. How does the nurse respond? A bond premium ______. Multiple choice question. arises when interest payments are less than the cost of borrowing arises when interest payments are higher than the cost of borrowing is essentially free money is reported as a gain on the issuance of a bond What does context clues are you analyzing mean? Worcester Company sold equipment for $25,000 cash. The equipment had cost $40,000 and had accumulated depreciation of $22,000 at the time of the sale. Based on this information alone, select the True statement. 2. Which of the following reaction sequences describes the method of determining the amount of iodate anion (IO3 ) in a saturated solution of calcium iodate (Ca(I03)2)2 1ztoq) IO;? + 6H* (aq ~ 3 1(4 3H,Od) 21 (q) + 8406 (4 1z(0q) Sz0,2 b. IO3 (44) SO,? (4) 104 (4) S0,7(4 SO37(4) = S,03 (MAli ' SO4? (4) Sz02 (4) IO; (aq) + 5 F (aq) = 6 H* (aq) 12(4q) " 3 HzO() Izwp " Sz032 (qxii -+ 2 To S,06 (4q) Kew City received a $15,000,000 federal grant to finance the construction of a center for rehabilitation of drug addicts. The proceeds of this grant should be accounted for in the By what authority was the creation and existence of a u. S. National bank deemed legitimate?. The midpoint of the complex numbers 3 - 12i and 7 + 6i is 5 + bi . What is the value of b? Exercise 1 Circle the conjunctions. In the blank write coord. if the conjunction is coordinating. Write corr. if the conjunction is correlative. Write sub. if the conjunction is subordinate.The deadline for our science project is in two weeks, so you still have time. jesuuuuxjnwj xjmsaxj qsxqs jxqs js x lakxxmkmkwn hi how to write a upside down V on the keyboard How could a rescue worker use squeezing or compressing energy to get their flashlights during rescue missions? Answer all parts (a)-(c) of this question. In the market for widgets, demand D is given by D= 120 3p where p is the price paid by consumers. There is one firm whose supply function is given by S = 20 + p. (a) [10 marks] A market equilibrium implies D = S. Find the equilibrium price and quantity traded. Draw a graph of these supply and demand functions (putting p on the "y-axis") and illustrate this equilibrium outcome on that graph. (b) [8 marks] Suppose now there are 2 firms in the market where each has supply function S = 20 + p. Explain why industry supply is given by SI = 40 + 2p. Solve for the equilibrium price and quantities traded where D = SI . Illustrate on a diagram how the market equilibrium changes compared to your answer in part(a). Why does each firm produce less than the amount supplied in your answer for part (a)? (c) [7 marks] Solve for a market equilibrium when there are n firms in the market and each firm has supply function S = 20+p. By using differentiation, show how the equilibrium price, the quantity sold by each firm and total market output vary with = n. Development of targeted recombinant polymers that can deliver siRNA to the cytoplasm and plasmid DNA to the cell nucleus. How might a cell use a combination of proto-oncogenes and tumor suppressor genes to regulate cell division? Under what conditions might a cell want to divide faster? a block of mass 0.4 kg on a horizontal surface is attached to a horizontal spring of negligible mass. the other end of the spring is attached to a wall, and there is negligible friction between the block and the horizontal surface. the center of mass of the block is stretched a horizontal distance x Jane is a very conservative businesswoman by day. However, when she decides to go out on the town, she likes to party and kick up her heels. This would be an example of consumers having _________. what was the acronym used to describe the nuclear arms treaty between the usa and ussr? Shelley is a 32-year old working mother. She is seeing a therapist to help her achieve personal growth andrecognize her full potential. Which type of therapy is Shelley receiving?A.humanisticB.cognitiveC.behaviorD.psychoanalytic Your company requires computers to authenticate to one another and enforces this requirement with Windows Defender Firewall with advanced security rules. You are asked to customize exceptions based on specific IP ranges. This can be done with a(n) _____ connection security rule.a. server-to-serverb. outboundc. authentication exemptiond. isolatione. inbound