Alice prepares a message for Bob and wants Bob to be assured that the message really is from Alice. Briefly explain how an X.509 certificate will enable this process.

Answers

Answer 1

An X.509 certificate enables the process of assuring Bob that a message is truly from Alice. It does so by providing a digital signature that verifies the authenticity of the message sender.

An X.509 certificate is a digital document that binds a public key to an identity, such as Alice's. It is issued by a trusted third-party called a certificate authority (CA). To assure Bob that a message is from Alice, Alice would include her X.509 certificate with the message.

When Bob receives the message and the X.509 certificate, he can use the public key within the certificate to verify the digital signature on the message. The digital signature is created using Alice's private key, which is known only to her. By verifying the signature using the public key from the X.509 certificate, Bob can confirm that the message was indeed signed by Alice and has not been tampered with during transmission.

The X.509 certificate plays a crucial role in this process as it provides a trusted link between Alice's identity and her public key. It allows Bob to rely on the certificate authority's reputation for validating the identity of Alice when he trusts the CA. This ensures that Bob can be reasonably assured of the message's authenticity and integrity, as long as the private key used for signing the message remains secure.

LEARN MORE ABOUT X.509 certificate here: brainly.com/question/13842698

#SPJ11


Related Questions

which is not a i/o control method? programmed i/o interrupt-driven i/o explicit memory access channel attached i/o

Answers

C. Explicit memory access is not an i/o control method.

Out of the four given options, "explicit memory access" is not an input/output (I/O) control method. Programmed I/O is a simple and direct method where the CPU issues read/write instructions to the I/O device. Interrupt-driven I/O, on the other hand, allows the CPU to perform other tasks while waiting for the I/O device to signal that it has finished its operation. Channel attached I/O uses a dedicated processor called a channel to manage the data transfer between the CPU and the I/O device.

Explicit memory access, on the other hand, is a term used to refer to the process of accessing specific memory locations directly, bypassing the normal I/O channels. This method is typically used in low-level programming tasks, where direct memory access is required to optimize performance. However, it is not a standard I/O control method used in typical computer systems.

In conclusion, programmed I/O, interrupt-driven I/O, and channel-attached I/O are all standard I/O control methods used in modern computer systems. Explicit memory access, while a valid method in certain cases, is not typically considered an I/O control method. Therefore, the correct answer is option C.

The Question was Incomplete, Find the full content below :

which is not an i/o control method?

A. programmed i/o

B. interrupt-driven i/o

C. explicit memory access

D. channel attached i/o

know more about explicit memory access here:

https://brainly.com/question/31023298

#SPJ11

which are examples of email client programs?

this apparently has forbidden language so give me the right answer to the question and maybe tell me what the forbidden language Is??​

which are examples of email client programs?this apparently has forbidden language so give me the right

Answers

Answer: Also known as an "email client," "mail client," "mail program," and "mail reader," it provides the ability to send and receive email messages and file attachments. Examples of email programs for personal computers are Outlook, Mail (Mac), Eudora and Thunderbird.

Explanation:

Which of the following provides research abilities in Excel 2019?
O Thesaurus
O Smart Lookup
O Dictionary
O Spell check

Answers

The option that provides research abilities in Excel 2019 is option B: Smart Lookup.

What does Excel's clever lookup function do?

Smart Lookup is a function that has the potential to be quite helpful. Simply right click on the cell in question and choose Smart Lookup to do a search. After that, Excel will start a Bing-powered search engine within the software, enabling you to look up what's in the cell online.

Note that You can easily access the features or actions you want to utilize by using the text field "Tell me" to input the words and phrases that describe what you want to do next.

Learn more about Thesaurus from

https://brainly.com/question/722610
#SPJ1

which of the following are the three mobile devices management policies a company can choose(check all that apply) Bring Your Own Device
Choose Your Own Device
Company-Issued, Personally Enabled

Answers

A portable computing device that meets the following requirements: I is small enough to be carried by one person.

What are mobile devices?

It can function wirelessly to send or receive information; has local, non-removable data storage; and can be powered on for long periods of time using a self-contained power source.

Additionally, mobile devices may have built-in tools for synchronizing local data with distant places, on-board sensors that enable the device to gather information (such as photos, videos, recordings, or location information), and voice communication capabilities.

Smart phones, tablets, and e-readers are among examples. It should be noted that a device is classified as a portable storage device if it can just store data and cannot process, transfer, or receive data.

Therefore, A portable computing device that meets the following requirements: I is small enough to be carried by one person.

To learn more about mobile devices, refer to the link:

https://brainly.com/question/7642965

#SPJ1

critical operations may fail if a user or computer has which of the following permissions to certain objects in the directory?

Answers

If a user or computer has inappropriate permissions to certain objects in the directory, critical operations may fail. This is because these permissions can result in unauthorized access to sensitive data or resources, which can cause security breaches, data loss, or system downtime.

For instance, if a user has excessive privileges, they can make changes to critical files, install malicious software, or delete important data, which can have severe consequences for the organization.

To mitigate the risk of such failures, it is crucial to enforce a least privilege access control model, which restricts users and computers to only the permissions necessary to perform their tasks. This means that users should not have unnecessary administrative privileges or access to files and folders that they do not need to do their job. Similarly, computers should be configured with the appropriate security settings and patches to prevent unauthorized access or attacks.

In conclusion, granting inappropriate permissions to users or computers can have severe consequences, including critical operations failures. Therefore, organizations should implement strong access control measures and regularly review their security policies to ensure they are effective and up to date.

Learn more about permissions here:

https://brainly.com/question/30550631

#SPJ11

Im boing exam help please In a category-based course grading system, teachers weigh a student's performance in all courses. all categories equally. some categories more heavily than others. extra credit as a bonus.

Answers

Answer:

some categories more heavily than others.

Explanation:

A category-based course grading system is a form of a grading system that involves an examiner to set up different categories of the overall assessment and at the same time placed different weight or marks over each category.

Therefore, the examiners weigh a student's performance in " some categories more heavily than others." For example, an examiner placed different weight over different categories in the overall assessment

1. Homework category: 30%

2. Classwork category: 20%

3. Quiz category: 20%

4. Final exam category: 30%

Answer:

B

Explanation:

what tells the hardware what to do and how to do it?

Answers

Answer:

Software is used to to tell hardware what to do and how to do.

Explanation:

Software is a program that helps to perform various tasks from hardware.

which of the following is considered an output device

printer

scanner

memory

keyboard

Answers

Hey!

I’m pretty sure it’s a printer

Hope this helps :)

Answer:

A printer.

Explanation:

I was looking for a question similar to this and noticed you needed some help. Here you go! :)

Consider the following class declarations
public class Student
{
public void printSchool()
{
System.out.println("City Schools");
}
}
public class HSStudent extends Student
{
public void schoolName()
{
System.out.println("City High");
}
}
public class MSStudent extends Student
{
public void printSchool()
{
System.out.println("City Middle");
}
}
Which of the following will print City Schools?
I.
Student jackson = new Student();
jackson.printSchool();
II.
HSStudent jackson = new HSStudent();
jackson.printSchool();
III.
MSStudent jackson = new MSStudent();
jackson.printSchool();
I only
I, II only
II, III only
I, II, III

Answers

Your answer: I, II only. Explanation: The given code declares three classes: Student, HSStudent, and MSStudent.

The Student class has a method called printSchool() which prints "City Schools". The HSStudent class extends Student and has a separate method called schoolName(), while the MSStudent class extends Student and overrides the printSchool() method to print "City Middle" instead.
I. Student jackson = new Student(); jackson.printSchool(); will print "City Schools" because it is calling the printSchool() method from the Student class.
II. HSStudent jackson = new HSStudent(); jackson.printSchool(); will also print "City Schools" because the HSStudent class inherits the printSchool() method from the Student class, and it does not override the method.
III. MSStudent jackson = new MSStudent(); jackson.printSchool(); will print "City Middle" instead of "City Schools" because the MSStudent class overrides the printSchool() method from the Student class.

Learn more about code :

https://brainly.com/question/14368396

#SPJ11


Isabela wants to add an image to her presentation. Which tab should she use?

Answers

The “add image” tab ??

Answer:Insert

Explanation:

Edg. 2021

How do I stop Windows Defender SmartScreen prevented an unrecognized app from starting?

Answers

An unknown app problem was avoided by Windows Defender SmartScreen. This can occur when a programme installer is fresh and your system has not yet verified its safety.

How is the defence SmartScreen bypassed?

To find the Security section, scroll below. Enabling Windows Defender SmartScreen is not selected. To save the changes, click OK and then Apply.

Is turning off Microsoft Defender SmartScreen safe?

SmartScreen is a highly helpful security feature that can help shield your PC from malware, hence it is not advised to disable it. Also, it barely requires any system resources. Thus, it is unnecessary to turn off the SmartScreen.

To know more about Windows visit:-

https://brainly.com/question/13502522

#SPJ4

What are this Chinese logo map

Answers

Answer:

hope it's helpful to you

What are this Chinese logo map

what is the best definition of inflation?

Answers

I mean there’s 2 definitions for it

Inflation is a situation of rising prices in the economy. A more exact definition of inflation is a sustained increase in the general price level in an economy. Inflation means an increase in the cost of living as the price of goods and services rise.


Or inflation can be growing the size (blowing up a balloon)

1) Using the topics below, in 150 words or more for each item, describes how Threat Modeling fits into each:
a) System development life cycle.
b) Software development life cycle (address software development and not system items).
c) Security maturity.
d) Security plan and policies.

Answers

Threat modeling can be described as the method of analyzing a software system or application in order to identify and address any potential security threats and vulnerabilities. This analysis takes into account the components and structure of the system, as well as the external environment in which it will operate. Threat modeling is a crucial aspect of secure software development and can be integrated into various stages of the system development life cycle (SDLC), software development life cycle (SDLC), security maturity, and security plan and policies.

a) System development life cycle: Threat modeling can be integrated into the system development life cycle in several stages, including the design and implementation phase. At this stage, the threat model will help developers identify potential threats and vulnerabilities and ensure that they are addressed early on in the development process. This will help to prevent security issues from being introduced into the system later on and ultimately save time and resources in the long run.

b) Software development life cycle: Threat modeling can be integrated into the software development life cycle by addressing software development and not system items. At the coding stage, developers can use the threat model to help identify potential security vulnerabilities and ensure that they are addressed before the code is deployed. This can help prevent common security issues like SQL injection, cross-site scripting, and other types of attacks.

c) Security maturity: Threat modeling is a critical aspect of security maturity. By using threat modeling, organizations can develop a more comprehensive security strategy that takes into account potential threats and vulnerabilities and addresses them before they can be exploited by attackers. A mature security posture includes a proactive approach to identifying and addressing potential security risks and the use of tools like threat modeling can help organizations achieve this.

d) Security plan and policies: Threat modeling can be used to inform security plans and policies by identifying potential threats and vulnerabilities that need to be addressed. This information can then be used to develop policies and procedures that will help to mitigate these risks and ensure that the system is secure. Threat modeling can also be used to ensure that policies and procedures are effective by identifying potential gaps or areas for improvement. Overall, threat modeling is an essential component of developing effective security plans and policies.

Learn more about System development life cycle here:

https://brainly.com/question/19977141

#SPJ11

Julie scrolls through her social media feed and it seems like everyone's life
is so exciting when hers is so ... boring! She starts to feel bad about herself.
What should Julie be paying attention to right now?
A- Oversharing
B- Red flag feeling
C- Miscalculation

Answers

Answer:

b

Explanation:

and julie needs to geta life

Question 5 of 10
When gathering information, which of the following tasks might you need to
perform?
O A. Apply standards, such as measures of quality, beauty, usefulness,
or ethics
B. Fill out forms, follow procedures, and apply math and science
C. Study objects, conduct tests, research written materials, and ask
questions
D. Seek out ideas from others and share your own ideas

Answers

Answer:

The answer is ( D ) I hope this answers your question

the borderpane container always displays its content in five regions which are top, bottom, left, right, and center and each region must be used. true or false

Answers

The BorderPane container is a layout manager in JavaFX that allows you to divide the available space into five regions, which are top, bottom, left, right, and center.

Each region is designed to hold a specific type of content, such as a menu bar in the top region, a status bar in the bottom region, and so on. It is a requirement that you must use all five regions when working with a BorderPane. If you do not specify a region for your content, it will be placed in the center region by default.

You can choose to leave some regions empty if you do not have content to put in them.  The BorderPane is a useful layout manager for creating simple and clean UI designs that follow a standard layout convention.

To know more about BorderPane visit:

https://brainly.com/question/31765994

#SPJ11

Once you fix the problem and put the computer back together again, how will software help the computer turn on?

Answers

Answer:

no bugs

Explanation:

The specification (including data types, instruction types, registers) of the interface between programs and the underlying hardware is called the

Answers

Answer:

instruction set architecture

are any of the design patterns in elements of reusable object-oriented using event based programming

Answers

Yes, some design patterns in Elements of Reusable Object-Oriented Software can be applied to event-based programming. One such design pattern is the Observer pattern. This pattern establishes a one-to-many dependency between objects, where when one object (known as the subject) changes its state, all its dependents (known as observers) are notified and updated automatically.
In event-based programming, events are used to trigger actions or notify other objects about specific occurrences. The Observer pattern can be used to implement event listeners, where the observers are notified whenever a specific event occurs.

Another design pattern that can be applied to event-based programming is the Mediator pattern. This pattern promotes loose coupling by defining an object (the mediator) that encapsulates the communication between other objects (known as colleagues). In event-based programming, the mediator can be used to facilitate communication and coordination between multiple objects that are involved in handling different events.

Furthermore, the Command pattern can be utilized in event-based programming. This pattern encapsulates a request as an object, allowing clients to parameterize clients with different requests and support undoable operations. In an event-driven system, commands can be used to encapsulate the logic associated with handling specific events, enabling easy customization and extensibility.

These are just a few examples of how design patterns from Elements of Reusable Object-Oriented Software can be applied in event-based programming. Each pattern has its own purpose and can be adapted to suit the specific requirements and structure of an event-driven system.

To know more about Object-Oriented Software visit:

https://brainly.com/question/13440851

#SPJ11

Plz answer all the questions :)
1. Your company plans to host large data on the AWS cloud. This data is not required until the client request it. Which AWS storage allows for policies to delete the files after 2 years?
2. Which policy do you utilize for infrequent access to files at the lowest cost?
3. Which policy do you utilize for frequently accessed files with no regard to price?
4. What type of files are you able to store in S3 buckets vs. Elastic Block Storage?
5. S3 buckets only store static content. Is it possible to create a dynamic website using S3 buckets? If so, how?

Answers

Answer:

is there multiple choice or do i have to answer from my own words??

7.

"You win!" never displays. What line is responsible for this error?

1

var score

0

2

onEvent

"button2"

"click"

function

3

var score

score + 1

if

score

5

setText ("display", "You win!");

A. 1

B. 3

ОООО

C. 4

D. 5

Answers

Answer:

The answer is "4".

Explanation:

In this code, on line number 4, it will give the error message, and its correct solution can be defined as follows:

In this code, a variable "score" is declared, that holds a value that is 0, and in the next step, a method "onEvent" is declared that uses a method, and in the if block, it checks the "score" value that is less than 5 and it will print the message.

Create a flowchart that will accept 10 whole numbers one at a time and print the highest and the lowest. Use Switch.

Answers

I will create a sequence of steps that would accept 10 whole numbers one at a time and print the highest and the lowest in Java:

Import javax.swing.JOptionPane;

public class loop_exer2 {

public static void main(String agrs[])

{ String input; int trial=10, sc=0, h=0, l=0, test=0;

System.out.print("Scores: ");

for (int ctr=1;ctr<=10;ctr ) {

input=JOptionPane.showInputDialog("Enter the Scores [" trial "] trials "); sc=Integer.valueOf(input); System.out.print(sc ", ");

if(test==0){h=sc;l=sc;test=1;}

if(sc>h){h=sc;}

else if(sc>h){

h=sc; {

else if(sc<1) {

l=sc;

}

JOptionPane.showMessageDialog (null, "Highest score is:" h "Lowest score is:" l);
System.out.println();

System.out.println ("Highest score is: " h);

System.out.println ( "Lowest score is: "l);

}

}

What is a Flowchart?

This refers to a diagram which is used to represent the various steps which a system uses to create a step by step solution.

From the above code, there is the command to accept whole numbers in String and then request for them one at a time and after the computation, display the highest and lowest numbers.

Read more about flowcharts here:
https://brainly.com/question/6532130

Read about the following four phishing malwares: Morris, Stuxnet, CryptoLocker and ILOVEYOU. Give a summary about each of these malwares

2- The SQL command word UNION is used to combine the result sets of 2 or more SQL SELECT statements. For the login code of the figure in the previous question, suppose a user enters the following into the login field:

’UNION SELECT cardNo from CreditCards where acctNo = 10032 - -

What is the effect?

Answers

1. Summarize the malwares Morris, Stuxnet, CryptoLocker, and ILOVEYOU.

2. Explain the effect of the SQL command 'UNION SELECT cardNo from CreditCards where acctNo = 10032 - -'.

Can you provide a summary of the malwares Morris, Stuxnet, CryptoLocker, and ILOVEYOU?

Morris: Morris is a self-replicating malware that gained notoriety in 1988 as one of the first worms to spread across the internet. It exploited vulnerabilities in Unix systems, using a combination of remote login, weak passwords, and a network-based worm to infect machines. The worm caused significant disruptions by overloading networks and compromising thousands of computers.

Stuxnet: Stuxnet is a highly sophisticated malware discovered in 2010 that specifically targeted industrial control systems, particularly those used in Iran's nuclear program. It exploited multiple zero-day vulnerabilities to spread and infected computers through USB drives. Stuxnet was designed to sabotage specific industrial processes by modifying the code in programmable logic controllers, causing physical damage to centrifuges.

CryptoLocker: CryptoLocker is a type of ransomware that emerged in 2013. It spread through malicious email attachments and encrypted files on infected systems, rendering them inaccessible to users. The malware demanded ransom payments in exchange for the decryption key. CryptoLocker was known for its strong encryption methods and had a significant impact on individuals and organizations, leading to substantial financial losses.

ILOVEYOU: ILOVEYOU, also known as the Love Bug, was a worm that emerged in 2000. It spread through email attachments disguised as a love confession. Once opened, it infected Windows systems and proceeded to overwrite files, including media files and documents. ILOVEYOU caused widespread damage by overwriting critical system files and spreading rapidly through email networks, causing billions of dollars in damages worldwide. Malware refers to malicious software designed to harm computer systems, steal data, or disrupt normal

operations. These four malwares, Morris, Stuxnet, CryptoLocker, and ILOVEYOU, have left a significant mark on the history of cybersecurity due to their unique characteristics and impacts. Understanding their behavior and propagation methods is crucial for developing effective security measures to protect against future threats.

Learn more about malware

brainly.com/question/30586462

#SPJ11

select the correct answer from the drop-down menu.
How does a microphone convert sound for recording?
A microphone captures the sound on the _______ and coverts the sound waves into a(n) ______ signal.

1. cable
2. metal casing
3. diaphragm

1. analog
2. physical
3. static​

Answers

Answer:

1. diagraph

2.analog

maybe

Write a function that takes three positive numbers and returns the sum of the squares of the two largest numbers. Use only a single line for the body of the function.


def two_of_three(a, b, c):

"""Return x*x + y*y, where x and y are the two largest members of the

positive numbers a, b, and c.


>>> two_of_three(1, 2, 3)

13

>>> two_of_three(5, 3, 1)

34

>>> two_of_three(10, 2, 8)

164

>>> two_of_three(5, 5, 5)

50

"""

return _____

Answers

The function "two_of_three(a, b, c)" takes three positive numbers and returns the sum of the squares of the two largest numbers. The body of the function can be written in a single line as follows:

```python

return a*a + b*b + c*c - min(a, b, c)*min(a, b, c)

```

The function calculates the sum of the squares of the two largest numbers by adding the squares of all three numbers (a*a + b*b + c*c) and then subtracting the square of the smallest number (min(a, b, c)*min(a, b, c)). By subtracting the square of the smallest number, we ensure that only the squares of the two largest numbers contribute to the final result.

For example, if we have the numbers 1, 2, and 3, the function will return 1*1 + 2*2 + 3*3 - 1*1 = 13. Similarly, for the numbers 5, 3, and 1, the function will return 5*5 + 3*3 + 1*1 - 1*1 = 34.

Learn more about the Python function here:

https://brainly.com/question/30763392

#SPJ11

I am having horrible trouble with deciding if I should get Audacity or Adobe Spark for recording, if someone could help me choose, TYSM.

Answers

I haven't really used either, but people I know would prefer using Audacity.

i prefer audacity in all honesty

2) What are two reasons we analyze algorithms?
a) make decisions about what algorithms to use
b) ease of coding
c) sorting data
d) predict performance

Answers

It’s a making sections about what algorithms to use

Answer:

Make decisions about what algorithms to use

Explanation:

Write a QBASIC program to generate following series.2,4,6,8............10th term.​

Answers

Here's a QBASIC program to generate the series 2, 4, 6, 8, ..., up to the 10th term:

FOR i = 1 TO 10

   PRINT i * 2;

NEXT i

What is the explanation of the above program?

In this program, the FOR loop iterates from 1 to 10, and for each iteration, it multiplies the loop variable i by 2 and prints the result using the PRINT statement.


The semicolon ; after the PRINT statement prevents the cursor from moving to the next line after printing each number, so the output appears on the same line.

Learn more about Q-Basic:
https://brainly.com/question/24124254
#SPJ1

which cloud model uses some datacenters focused on providing cloud services to anyone that wants them, and some data centers that are focused on a single customer?

Answers

Answer:Hybrid Cloud

Explanation:

The cloud model that uses some data centers focused on providing cloud services to anyone that wants them, and some data centers that are focused on a single customer is the Hybrid Cloud model.

Other Questions
solve the equation for y and then graph it. 9y-x=18 17 Historieta La familia SnchezCompleten con tener. (Complete with tener.)Aqu _1_ (nosotros) una foto de lafamilia Snchez. La familia Snchez _2_ unpiso (apartamento) muy bonito Madrid. El piso _3_ seis cuartos y est en Salamanca, una zona bastante elegante de Madrid. Los Snchez _4_ una casa de campo en Chinchn tambin. La casa de campo enChinchn es un pequeo chal donde los Snchezpasan los fines de semana o los weekend y sus vacaciones. La casa de campo _5_ cinco cuartos.Hay cuatro personas en la familia Snchez. Carolina _6_ nueve aos y su hermano Gerardo _7_once aos. Gerardo y Carolina _8_ un perrito encantador, Chispa. Adoran a su Chispa.T _9_ un perro? T _10_ un gato? Tu familia _11_ un apartamento o una casa?Ustedes tambin _12_ una casa de campo donde pasan los fines de semana como los Snchez? how many microliters are in 5mL ? The project scope statement establishes the project boundaries by stating what features and work elements are included (in scope) and which are excluded (out of scope).a. Trueb. False On November 14, Thorogood Enterprises announced that the public and acrimonious battle with its current CEO had been resolved. Under the terms of the deal, the CEO would step down from his position immediately. In exchange, he was given a generous severance package. Given the information below, calculate the cumulative abnormal return (CAR) around this announcement. Assume the company has an expected return equal to the market return.DateMarket Return %Company Return %11/7.5.411/8.3.411/9-.2-.311/10-.6-.511/111.31.111/14-.11.811/15.1.111/16.9.711/17.2.311/18-.2.011/19.3.0 A recipe for fizzy juice says, Mix 5 cups of cranberry juice with 2 cups of soda water. The ratio of cranberry juice to soda water is 5:2. How many cups of cranberry do we need for 8 cups of soda? Please help 25 points which imperial nation colonized agnola on the west coast? belgiumfranceportugalunited kingdom when food lion, a national supermarket chain, uses a special promotion to price a four-pack of soda at $2.09 (which is below its customary price level of $3.59), it is attempting to 17A student is writing a journal entry for a teacher about moving to a new city. Read the draft of the journal entry and complete the task thatfollows.About six months ago, my mom told me that we are going to move to Arizona to be closer to my grandparents. I do not want to move because I will miss my friends. We have been in school together since first grade. Another thing I wonder about is the weather. Where we live now, we*have four seasons: a cold and snowy winter, a cool and rainy spring, a warm and sunny summer, and a windy and cool fall. What would it be like having summer all year long?I talked to my mother about my worries about moving. She told me that there would be many new people for me to meet at my new school. She explained that the new school has a program just for new kids. It helps them get to know their new classmates and the community. She also said that my new school has yearlong clubs, an outdoor swimming pool, and even a skateboarding team. She also reminded me that my grandparents won't be far away.In one to three paragraphs write an ending to the narrative that follows logically from the events or experiences in the journal entry. A friend asks you for advice on how to end an ongoing argument with her brother. Which story structure would you use to present your advice? Explain your choice. Calculate the standard deviation of 11. 36, 11. 37, 11. 49, 11. 38, 11. 39 using the range of the data and the square root of the number measurement averaged (show all work) The crowd was ______ when the home team defeated its biggest rival. What is the vocabulary for this sentence A1 is dribbling in the frontcourt toward the basket during a transition scoring opportunity. B1 fouls him from the rear and no other defender is ahead of A1 at the time of the foul. What is the ruling? What number is 45% less than 80? the assumption underling the underlying the ____ is that goldm socially resonsible organization maintain compliance system and internal governance contorl that deter midconduct by their employees Can someone please help me asapp Ill mark brainlist!!! If bonds are issued initially at a premium and the effective-interest method of amortization is used, interest expense in the earlier years will be________. Exercise 2 Draw one line under each simple subject and two lines under each compound predicate in the following sentences.Regional theaters either commission new works or read submissions. three-fourths of the sum of six times a number and twelve distribute