Alice wants to send a message to Bob, who is several network hops away from her. What is the BEST approach to protecting the confidentiality of the message

Answers

Answer 1

If Alice wants to send a message to Bob, who is several network hops away from her, the best approach to protecting the confidentiality of the message is to use encryption.

Encryption is the process of encoding a message or information in such a way that only authorized parties can access it. In encryption, an algorithm transforms plain text or unencrypted data (plaintext) into an encrypted format (cipher text) that is unintelligible and can only be decoded or decrypted with a key. Alice can encrypt her message before sending it to Bob. Encryption ensures that even if an attacker intercepts the message, they won't be able to read it since they don't have the decryption key. This ensures that the confidentiality of the message is maintained as it traverses the network that is several network hops away from Alice to Bob.

Hence, the best approach to protecting the confidentiality of the message is to use encryption.

Learn more about encryption:

brainly.com/question/20709892

#SPJ11


Related Questions

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

What are the two most common input and output devices?

Answers

Answer:

Keyboard and mouse are the most common input devices.

Monitor and the printer are the common output devices.

this is pixlr


You have an image of a building, but people are standing on the far left side. You will like to remove those people. Which tool do you need?

Cropping
Clipping
Snipping
Cutting

You want to transform an image with artistic effects. Which menu would you look under?

Filter
Edit
View
File

Sharing an image online generally, requires which of the following?

Low resolution
High resolution
Blurring
Kaleidoscope


You have been asked to design a logo for community organizations. What kind of image would you create?

Raster
Vector
Transparent
Opaque

Answers

1 - Cropping
2 - Filter
3 - High Resolution
4 - Opaque
Thank you!

Which one bc im struggling

Which one bc im struggling

Answers

Answer:

cant really see it

Explanation:

what is one of the first steps needed to establish proper document flow? using a database. diagram a typical paperwork flow

Answers

Using a database is one of the first steps needed to establish proper document flow.

What is one of the first steps needed to establish proper document flow?

This involves determining the tables, fields, and relationships between tables that will be used to store and organize the data. A typical paperwork flow in a database system might look like this:

a. Data collection: Gathering data from various sources such as user input or external systems.

b. Data validation: Ensuring that the collected data meets the required criteria and constraints.

c. Data processing: Manipulating, analyzing, or transforming the data as needed for the specific use case.

d. Data storage: Storing the processed data in the database according to the defined data model.

e. Data retrieval: Querying the database to retrieve the data when needed.

f. Data presentation: Displaying the retrieved data in a user-friendly format, such as a report or a dashboard.

Read more on document flow  https://brainly.com/question/28080649

#SPJ4

question

what is one of the first steps needed to establish proper document flow?

using a database. diagram a typical paperwork flow

discuss how technology has improved efficiency and decision
making for government

Answers

Technology has greatly improved efficiency and decision making for governments. This can be attributed to several advancements that have emerged in the technological space. The main answer to how technology has improved efficiency and decision making for government is explained below.Explanation:1. Improved Communication Communication has become more convenient and efficient, enabling employees to communicate more rapidly and frequently with one another.

Governments may use communication systems that enable them to share information in real-time across all branches. This saves a significant amount of time in decision-making processes.2. Digital StorageDigital storage is critical for governments, as they handle vast amounts of data. With digital storage, information is organized and retrievable from any location, saving time and allowing for faster decision-making.3. Data AnalyticsData analytics has become an essential tool for governments. With analytics, governments can mine and analyze data sets in order to make more informed decisions.

Analytics enables the government to gather and analyze data from various sources, providing an in-depth understanding of the issue at hand.4. Enhanced SecurityTechnology has provided governments with more secure systems for storing and transmitting data. This enhances the decision-making process by ensuring that data is protected from hackers and other cyber threats.5. Increased TransparencyTechnology has made it easier for governments to be transparent in their dealings. They can now share information on policies and procedures with the public through various digital channels. This level of transparency enables the government to make informed decisions based on public input.In conclusion, technology has revolutionized the way governments operate. It has improved efficiency and decision-making by providing better communication systems, digital storage, data analytics, enhanced security, and increased transparency.

To know more about Technology visit:

https://brainly.com/question/9171028

#SPJ11

Which type of design is used when a web site is correctly and effectively displayed on small, mobile devices (as well as desktop devices)

Answers

Answer:

system analysis and design

Explanation:

a broad term for describing methodologies for developing high quality information Sytem which combines Information Technology, people and Data to support business requirement...A methodology is essentially a procedure to get something done.

A typical report in landscape orientation is 11 inches wide and 8.5 inches tall.

a. True
b. False

Answers

False. A typical report in landscape orientation is not 11 inches wide and 8.5 inches tall.

The statement that a typical report in landscape orientation is 11 inches wide and 8.5 inches tall is incorrect. The dimensions mentioned correspond to a standard letter-size paper in portrait orientation, not landscape.

In the United States, a typical letter-size paper is 8.5 inches wide and 11 inches tall when used in portrait orientation, which means the shorter side is the width and the longer side is the height. However, in landscape orientation, the dimensions are reversed.

In landscape orientation, a typical report would be 11 inches wide and 8.5 inches tall. This orientation allows for a wider layout, with the longer side becoming the width and the shorter side becoming the height.

Landscape orientation is often used when the content of the report, such as charts, tables, or images, benefits from a wider display. It provides more horizontal space, accommodating content that is wider and better suited for presenting information in a horizontal format.

Therefore, the correct answer is b. False. A typical report in landscape orientation would have dimensions of 11 inches wide and 8.5 inches tall.

Learn more about  orientation here :

https://brainly.com/question/29977388

#SPJ11

False. A typical report in landscape orientation is not 11 inches wide and 8.5 inches tall.

The statement that a typical report in landscape orientation is 11 inches wide and 8.5 inches tall is incorrect. The dimensions mentioned correspond to a standard letter-size paper in portrait orientation, not landscape.

In the United States, a typical letter-size paper is 8.5 inches wide and 11 inches tall when used in portrait orientation, which means the shorter side is the width and the longer side is the height. However, in landscape orientation, the dimensions are reversed.

In landscape orientation, a typical report would be 11 inches wide and 8.5 inches tall. This orientation allows for a wider layout, with the longer side becoming the width and the shorter side becoming the height.

Landscape orientation is often used when the content of the report, such as charts, tables, or images, benefits from a wider display. It provides more horizontal space, accommodating content that is wider and better suited for presenting information in a horizontal format.

Therefore, the correct answer is b. False. A typical report in landscape orientation would have dimensions of 11 inches wide and 8.5 inches tall.

Learn more about  orientation here :

https://brainly.com/question/29977388

#SPJ11

chapter 2 discussion questions 199199 unread replies.199199 replies. answer the following questions from chapter 2: how does decomposing a user story into scenes and shots help you organize the components of an alice program? what is the difference between a scene method and a class method? what is the value of adding comments to a program? what is meant by the assertion that an alice object has six degrees of freedom?

Answers

Other languages frequently refer to a class method as a static method. one that is callable even in the absence of a class instance.

Explain about the class method?

Rather than being connected to an object, a class method is one that is bound to the class. Unlike staticmethod, it doesn't necessitate the construction of a class instance. A class method differs from a static method in that: The only thing that a static method interacts with is the parameters; it has no knowledge of the class.

Class methods are often helpful when we need to access the class itself, such as when we want to create a factory method, which is a function that makes instances of the class. So class methods can act as substitute constructors. All objects that belong to a class can use the same method. A class method can be called by passing the class as the first argument.

To learn more about the class method refer to:

https://brainly.com/question/20216706

#SPJ4

How do I calculate this square footage?

How do I calculate this square footage?

Answers

Answer:

To calculate it, you have to break it apart. Sorry for the bad writing but after you break it apart, you multiply the smaller squares. Then with all of the smaller areas, add them together for the final answer which in this case is 456.

How do I calculate this square footage?

which of the following are examples of algorithms? a. a dictionary b. a recipe c. a set of instructions for putting together a utility shed d. the spelling checker of a word processor

Answers

The following are examples of algorithms A. dictionary, C. a set of instructions for putting together a utility shed, and D. the spelling checker of a word processor are not examples of algorithms.

An algorithm is a set of steps or rules to be followed in calculations or other problem-solving operations, especially by a computer.

Examples of algorithms include:

Sorting algorithms such as QuickSort or MergeSortSearch algorithms such as Binary Search or Depth-First SearchEncryption algorithms such as RSA or AESMachine learning algorithms such as Linear Regression or Neural Networks.

Here you can learn more about An algorithm

brainly.com/question/1557776

#SPJ4

Sora is preparing a presentation describing policies included in President Lyndon Johnson’s "Great Society” and wants to use a relevant online source.


Which source is the most relevant for the presentation?


a]-an interview with history students about the “Great Society”


b]-a photograph of Johnson making his “Great Society” speech


c]-a chart describing the conditions that led to the “Great Society”


d]-an audio recording of Johnson’s “Great Society” speech

Answers

Answer:

Option d) is correct

Explanation:

To prepare a presentation describing policies included in President Lyndon Johnson’s "Great Society”, the most relevant source that Sora should use is an audio recording of Johnson’s “Great Society” speech.

An audio recording of Johnson’s “Great Society” speech can give a more proper clarification and information regarding policies included in President Lyndon Johnson’s "Great Society”.

So,

Option d) is correct

Answer:

the answer is D

Explanation:

I just took the quiz :)

excel functions are prebuilt formulas within excel.

Answers

Formulas are mathematical equations that integrate cell references, excel  values, and operators to compute results. It is not necessary to write the underlying formula when using functions because they are prebuilt formulas that can be rapidly fed values.

What do Excel's functions and formulas mean?

Functions are pre-written formulas that perform calculations using specific variables, also known as inputs, in a predetermined order or structure. Functions can be used to do calculations of any complexity. The Formulas tab on the Ribbon contains the syntax for all of Excel's functions.

What is the name of the pre-written formulas in Excel?

An already written formula is a function. A function performs an operation on a value (or values), then returns a new value (or values.)

To know more about excel  visit:-

https://brainly.com/question/3441128

#SPJ4

Plz tell the answer I I'll mark u as the brainliest

Plz tell the answer I I'll mark u as the brainliest

Answers

Answer:

oo 89 po yyuyuyoioo9ii5645487)89)89)89)89)80(98(98(98(87)()

Explanation:

okkkkkk

How does computer science play a role in art?

Answers

Answer:

Many artists now learn to code; computer scientists develop algorithms with aesthetics as the goal. Projects such as Deep Dream, a program that uses neural networks to produce new visuals, let anyone use AI approaches to generate, ostensibly, art.

A communications closet has a device that contains 48 ports. The device's sole function is to provide the ports. What type of device is in the closet?

Answers

Answer:

Patch panel.

Explanation:

In this scenario, a communications closet has a device that contains 48 ports. The device's sole function is to provide the ports.

Hence, the type of device that is in the closet is a patch panel.

In Computer Networking, a patch panel can be defined as a passive hardware device in a local area network (LAN) which comprises of ports that are primarily used for the connection and management groups of incoming and outgoing LAN cables for network devices. The main purpose of a patch panel is to neatly connect and organize LAN cables such as RJ-45 cables, fiber-optic cables, cat 5 or 6 cables, telephone lines etc.

Additionally, a patch panel typically helps network engineers or owners to mitigate the problem of cable cluttering, reduced cable costs, easier maintenance of cables.

Do you ever wonder what types of media you will be using five years from now or when you graduate from college or a training program? How do you believe you will use digital media in your life?
You will include: a concept map showing your future uses for digital media (at least five) an explanation of each use a description of the use

Answers

Digital life is here to stay. The internet is use every single second of the day. We need our digital life today because during a pandemic we need online services such as for school and emergency services. We will always use the internet every day for the rest of our life.

1. An auto repair shop charges as follows. Inspecting the vehicle costs $75. If no work needs to be done,
there is no further charge. Otherwise, the charge is $75 per hour for labour plus the cost of parts, with a
minimum charge of S120. If any work is done, there is no charge for inspecting the vehicle. Write a program
to read values for hours worked and cost of parts (cither of which could be 0) and print the charge for the job. ​

Answers

Answer:

charge = 0

hours_worked = int(input("Enter the hours worked: "))

cost_of_parts = float(input("Enter the cost of parts: "))

if hours_worked == 0:

   charge = 75

else:

   charge = 120 + (75 * hours_worked) + cost_of_parts

   

print("The charge is $" + str(charge))

Explanation:

*The code is in Python.

Initialize the charge as 0

Ask the user to enter the hours_worked and cost_of_parts

Check the hours_worked. If it is 0, that means there is no inspecting. Set the charge to 75

Otherwise, (That means there is an inspecting) set the charge to 120, minimum charge, + (hours_worked * 75) + cost_of_parts

Print the charge

if different user groups with different security access levels need to access the same information, which of the following actions should management take?

Answers

When different user groups with different security access levels need to access the same information, management should consider implementing the following actions:

Role-Based Access Control (RBAC): Implement RBAC to assign specific access privileges to different user groups based on their roles and responsibilities within the organization. This ensures that each user group has the appropriate level of access to the information they need to perform their duties.
Access Control Lists (ACLs): Utilize ACLs to define and manage access permissions on specific information resources. ACLs allow management to specify which user groups can access certain information and what actions they can perform on that information.
User Authentication and Authorization: Implement robust user authentication mechanisms to verify the identity of users and ensure they have the necessary authorization to access the information. This can include using strong passwords, two-factor authentication, or other secure authentication methods.
Encryption and Data Protection: Employ encryption techniques to protect the confidentiality of sensitive information. This ensures that even if unauthorized individuals gain access to the information, they will not be able to decipher its contents without the appropriate decryption keys.
Regular Auditing and Monitoring: Conduct regular audits and monitoring of user access and activity to detect any unauthorized access attempts or suspicious behavior. This helps identify potential security breaches and allows for timely intervention.
Training and Awareness: Provide training and awareness programs to educate users about the importance of information security and their roles and responsibilities in safeguarding sensitive data. This helps create a security-conscious culture within the organization.
By implementing these actions, management can ensure that different user groups with varying security access levels can access the same information while maintaining appropriate levels of security and confidentiality.

The formula for the trajectory of a ball is given by f(x)=xtanθ−12v20gx2cos2θ+y0 where x is a coordinate along the ground, g=9.81 is the acceleration due to gravity, v0 is the magnitude of the initial velocity which makes an angle θ with the x-axis, and (0,y0) is the initial position of the ball. Write a program to calculate the trajectory y=f(x) for 0≤x≤16, with y0=10, v0=10, θ=50∘. (Do Python trigonometric functions accept radians or degrees?) Let x vary between 0 and 16 with 101 points. You will need to:

Answers

Answer:

The program in python is as follows:

import math

def traj ect ory(th e ta,x,y,v):

   t = ma th . tan(m ath . radians(theta))

   c = math . cos(math . radians(theta))

   g = 9 . 8

   fx = x * t - (1/(2*v**2)) * ((g*x**2)/(c**2))+y

   return round(fx,3)

   

print("x\t f(x)")

for x in range(0,17):

   theta = 50

   y= 10

   v = 10

   print(str(x)+"\t"+str(tr aje ctory (the ta,x,y,v)))

Explanation:

The question is incomplete. However, I have written the program to calculate the trajectory values f(x).

See attachment for complete program where comments were used as explanation

Write a C language program to perform the following task. 1. Display text "FTKE" on line number 1 LCD starting from column no 5 2. Blink it 3 times with delay of 500ms and then CLEAR the LCD display 3. Display scrolling text "Programming is FUN" on line number 2 with entering from the right until the last character exit on the left (scrolling from right to left) 4. Repeat task 1 to 3 continuously

Answers

Here's a C language program that performs the specified tasks using an LCD display:

#include <stdio.h>

#include <stdlib.h>

#include <string.h>

#include <lcd.h>

#define DELAY_MS 500

void displayFTKE() {

   lcd_cmd(LCD_CLEAR);

   lcd_out(1, 5, "FTKE");

}

void blinkFTKE() {

   int i;

   for (i = 0; i < 3; i++) {

       lcd_cmd(LCD_CLEAR);

       Delay_ms(DELAY_MS);

       displayFTKE();

       Delay_ms(DELAY_MS);

   }

   lcd_cmd(LCD_CLEAR);

}

void scrollText() {

   char text[] = "Programming is FUN";

   int len = strlen(text);

   int i;

   for (i = 0; i < len + 16; i++) {

       lcd_cmd(LCD_CLEAR);

       lcd_out(2, 1 + i, text);

       Delay_ms(DELAY_MS);

   }

   lcd_cmd(LCD_CLEAR);

}

void main() {

   lcd_init();

   while (1) {

       displayFTKE();

       blinkFTKE();

       scrollText();

   }

}

This program uses the LCD library to control the LCD display. The `displayFTKE()` function shows the text "FTKE" on the first line, starting from column 5. The `blinkFTKE()` function blinks the "FTKE" text three times with a delay of 500ms between each blink and then clears the LCD display. The `scrollText()` function displays the scrolling text "Programming is FUN" on the second line, scrolling from right to left.

In the `main()` function, these three tasks are performed continuously in an infinite loop.

Please make sure to include the appropriate LCD library and configure your hardware setup accordingly before running this program.

Learn more about LCD interfacing and programming in C here:

https://brainly.com/question/33281526

#SPJ11

What are three options that can be added to the Excel Ribbon?

tabs, hyperlinks, and groups

users, file names, and tabs

tabs, groups, and symbols for groups

groups, symbols for groups, and users

Answers

Answer:

C. tabs, groups, and symbols for groups

Explanation:

Generally, workbooks are known as Microsoft Excel files. Excel workbook can be defined as a collection of one or more charts and worksheets (spreadsheets) used for data entry and storage in an excel file. In order to create a project on Excel you will have to use a workbook.

A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer software applications such as Microsoft Excel.

An Excel Ribbon refers to the row of tabs, icons and strip of buttons located at the top of the worksheet or work area.

The three options that can be added to the Excel Ribbon are tabs, groups, and symbols for groups.

Describe at least five ways in which information technology can
help students studying subjects other than computing.​

Answers

Answer:

It can help with; learning how to work things out in other subjects, help children gain access to help with subjects. It can help with studying for a test for any subject. Computers can help with maths because you have access to a calculator and finally. Computers can help with geography as you have access to maps.

Explanation:

how can you report potential insider threats to the js in tp

Answers

One channel that enemies utilize to find potential insider threats, either knowingly or unknowingly, is social media.

To whom should an insider threat be reported?

If you are in a situation where you feel you need to disclose an insider threat but are not a government employee, military member, or contractor, you should get in touch with your local law enforcement or the Federal Bureau of Investigation (FBI).

A reportable insider threat is what?

Unauthorized disclosure, data alteration, espionage, terrorism, or kinetic acts that result in the depletion or loss of resources or capabilities are all examples of insider threats that employ authorized access, whether intentionally or unintentionally, to threaten national security.

To know more about  insider threats visit:-

https://brainly.com/question/26191645

#SPJ4

Write a short thesis statement about the IoT (Internent of things) I just need this just for ideas on my thesis statement. :)

Answers

The Internet of Things, or IoT for short, is a relatively new topic in the world of technology. This topic is both engaging and innovative for students pursuing their bachelor's and master's degrees. They can write their M.Tech. or Ph.D. thesis in this field. The internet has become an integral component of our everyday lives. The Internet of Things (IoT) concept is centered on the combination of comfort and the Internet.

Does the directory virus depend upon operating system?​

Answers

A virus is a type of malware that can infect a computer or other device and replicate itself, often causing damage or disruption to the device's normal operation. Some viruses are designed to specifically target certain operating systems, while others are more general and can infect a variety of different types of devices and systems.

It is possible for a virus to specifically target a certain operating system, in which case it would depend on that operating system in order to function. However, many viruses are designed to be more general and can infect multiple types of operating systems.

The best way to protect against viruses is to use antivirus software, keep the operating system and other software up to date with the latest security patches, and practice safe browsing and email habits.

3. Question 10 Which attribute is needed to make video start playing as soon as it's loaded in a desktop browser? O autoplay O controls O desktop Ostart

Answers

The correct answer for the question is 'autoplay'.  

To make video start playing as soon as it's loaded in a desktop browser, the attribute needed is Autoplay. Autoplay can be described as an attribute that is used to automatically play a video file as soon as it loads on a webpage in the desktop browser.

The autoplay attribute is used to play the video automatically when the webpage loads on a browser. This attribute is used in conjunction with the video tag in HTML. Autoplay is used in video streaming websites. This attribute helps to save time as the user will not need to click the play button before the video can start playing. This is particularly helpful when embedding videos in websites as it makes for a better user experience. The syntax for the autoplay attribute is as follows:  Your video URL In the above code, autoplay makes the video file play as soon as it loads.

Learn more about embedded videos:

brainly.com/question/28259521

#SPJ11

Myra uses source code belonging to older malware to develop new malware. She also removes some of the functions of the older malware. Why
would Myra do that?
OA
OB
OC
OD. to keep the new malware undetected through heuristic checks
to recreate the older malware
to launch a blended attack
to reduce the size of the malware

Answers

Myra uses source code belonging to older malware to develop new malware. She also removes some of the functions of the older malware to reduce the size of the malware. The correct option is D.

Myra may remove some functions of the older malware to reduce the size of the new malware. By removing unnecessary or unused code, the overall size of the malware can be minimized. This can have several advantages:

Lower detection rate.Faster propagation.Easier distribution.Enhanced stealthiness.

Thus, the correct option is D.

For more details regarding malware, visit:

https://brainly.com/question/29786858

#SPJ1

A single computer chip in a smartphone today commonly may have _____ of CPUs operating concurrently.

Answers

A single computer chip in a smartphone today commonly may have multiple CPUs operating concurrently.

What is single computer chip?

A single computer chip in a smartphone today commonly may have multiple (often 4, 6, or 8) CPUs operating concurrently. These CPUs are called "Multi-core" processors, as they consist of several cores within one chip, allowing for parallel processing and improved performance.

Therefore, these multiple CPUs, also known as cores, allow for improved performance and multitasking capabilities in modern smartphones.

Moreover, CPU is the brain of a computer system. It has a cache memory to hold data to be processed, bus line to run the data to processing unit and various chips to speedily process the data. It stands for Central processing unit.  

To know more about single computer chip

visit:

https://brainly.com/question/30577334

#SPJ11

Cheri's teacher asked her to write a program using the input() function. What will this allow her program to do?

Answers

Answer:

See explanation

Explanation:

Irrespective of the programming language, the input() function will allow Cheri's program to be able to accept user input.

Take for instance, the programming language is python, an expample of how the input function can be used is:

userinput = input("Enter a word: ")

The above instruction will allow her program to accept a string value.

The input() function can be used alongside different variable types.

Answer:

give the other guy brainliest

Explanation:

Other Questions
The hieght is 5. 2 mm and the area is 39 mm squares what is the length of each side of the earring ( the earring has the shape of a rhombus ) Which statements about mass are true?Select each correct answer. One gram is 1,000 times greater than one kilogram. Grams are greater than kilograms. A gram is smaller than a kilogram. One kilogram is 1,000 times greater than one gram. One gram is 100 times less than one kilogram. One kilogram is 100 times greater than one gram. Acid precipitation lowered the ph of soil in a terrestrial ecosystem that supported a diverse community of plants and animals. The decrease in ph eliminated all nitrogenfixing bacteria populations in the area. Which prediction most accurately reflects the impact this will have on the community?. Rodriguez Company pays $384,345 for real estate with land, land improvements, and a building. Land is appraised at $176,000: land improvements are appraised at $66.000; and the building is appraised at $198,000. 1. Allocate the total cost among the three assets. 2. Prepare the journal entry to record the purchase. Complete this question by entering your answers in the tabs below. the life of a hormone is the amount of time it takes for the blood concentration to reach 50% of what was originally secreted is called the Which substance has the highest density? What system does the ulna belong to? which of the following is strongest type of interaction that occurs between the atom within the circled areas of the two molecules represented above? This journalist and author encouraged all nations to adopt the 'golden straightjacket' of neoliberalism in The Lexus and the Olive Tree? Rewrite 4/6 : 1/3 as a unit rate A. 2:1B. 2:9C. 12:9D. 12:6 For the image above, which action below allows the scale to be balanced? Add 3 blocks to the right side. Add 4 blocks to the right side. Take away 3 blocks from the left side. Take away 5 blocks from the left side. can anyone help me to find a rhetorical question for an article which is asking why there should be more parks in town and cities Nora was out at a restaurant for dinner when the bill came. Her dinner came to $19. After adding in a tip, before tax, she paid $24.70. Find the percent tip. Which of the following personal decisions could have an effect on your job? a. Staying up late at night causing you to be tired and sluggish at work b. Choosing to wear pajama pants in a formal office setting c. Inviting your rowdy and loud friends to hang out at your job d. All of the above Please select the best answer from the choices provided A B C D. Two forces act an angle of 120 . If the greater force is 50 kg and their resultant is perpendicular to the smaller force, the smaller force is 35 kg 20 kg 30 kg 25 kg Write a statement that summarizes the authors point of view. The scale factor of the drawing to the actual flag is represented by the ratio 1:18.A letter "L" with a height of 9 inches is drawn on the actual flag. What should be the height, in inches, of the letter "L" on the scale drawing? The nurse cares for the client diagnosed as being in the manic phase of bipolar disorder. which behavior indicates to the nurse the client condition is improving? Westfalls is 7 miles south of edenville and Concord is 13 mile west of westfalls. What is the distance from edenville to Concord? Round to the nearest tenth of a mile ? Pls help! Solving for dimenions