An attacker installs bot malware on multiple machines and launches a coordinated attack against a web service. What type of availability concern does this describe

Answers

Answer 1

A Denial of Service (DoS) attack is where an attacker targets the availability of a service.

Cybercriminals often utilize Trojan malware or simple social engineering techniques to get unauthorized access to devices, which is how botnet attacks often get started.

DDoS attacks employ the enormous size of the botnet to flood a target network or server with requests, making it unreachable to the users for whom it was designed. DDoS attacks target organizations with the intention of extorting money in exchange for stopping the attack or for personal or political reasons.

Learn more about DDoS attacks, here;

https://brainly.com/question/32769722

#SPJ4


Related Questions

Most personal computers allow users to expand their systems by providing these on the system board.a. Trueb. False

Answers

The correct answer is  False Most computers have expansion slots on the motherboard that allow you to add various types of expansion cards. These are sometimes called PCI peripheral component interconnect cards.

The CPU handles the actual data processing and computing, while the motherboard acts as a base linking all of the computer's components. Both conduct functions essential to running the computer's operating system and programmes. The motherboard is a computer's fundamental structural component. Computer parts deteriorate with time and may need to be replaced. A computer can operate more swiftly, smoothly, and error-free with a new motherboard. In most circumstances, it should still be worthwhile to get a replacement motherboard if your desktop computer is between 3 and 5 years old. Nevertheless, this is not the case with laptops because once the motherboard dies, it is frequently too expensive to fix.

To learn more about motherboard  click on the link below:

brainly.com/question/29834097

#SPJ4

If an employer asks you to email your job application, why would
you create the email and send it to yourself first?

Answers

If an employer asks you to email your job application, creating the email and sending it to yourself first allows you to double-check for errors and ensure that your application looks professional when the employer receives it.

What should be included in the job application email?

If an employer has asked you to email your job application, there are a few things that should be included in the email:

Subject line: Make sure your email has a clear subject line that includes your name and the job title you're applying for.

Attachment: Attach your resume and cover letter in PDF or Word format (unless otherwise specified in the job posting).

Introduction: In the body of your email, introduce yourself and briefly explain why you're interested in the position. Mention any relevant experience or skills you have that make you a good fit for the job. Make sure your tone is professional and enthusiastic, but avoid being overly casual or informal

Learn more about email at

https://brainly.com/question/29870022

#SPJ11

Why should even small-sized companies be vigilant about security?

Answers

Answer:businesses   systems and data are constantly in danger from hackers,malware,rogue employees, system failure and much more

Explanation:

hackers are everywhere

what is cyber safety?

Answers

Answer: Cyber safety is a process that protects computers and networks. The cyber world is a dangerous place without security and protection.

Explanation: Hope this helps!

Opportunity and Spirit, NASA's Mars Exploration Rovers, were the first scientific instruments able to collect samples directly from the surface of Mars. One of the mission's goals was to determine the likelihood that life ever existed on Mars. How were Spirit and Opportunity best able to supply evidence that in the distant past Mars may have had an environment favorable to life?

Answers

Answer:

The rovers sent images of cross beds, centimeter-scale areas in rock layers, that could indicate whether water once flowed on Mars.

Explanation:

How can I make Zoom work on a chromebook?

Answers

Answer:

Many schools rely on Chromebooks as part of regular classroom instruction but especially more so now to continue remote learning. Zoom makes it easy for students to use our video solution on a Chromebook. Open Chrome on the Chromebook and either go to the Chrome Web Store and search for Zoom or go directly to the Zoom entry in the Chrome Web Store.From the Zoom entry, click Add To Chrome and then, when prompted, click Add Extension.

Explanation:

The if statement is used to create a decision structure, which allows a program to have more than one ___________________. The if statement causes one or more statements to execute only when a Boolean expression is true.

Answers

The if statement is used to create a decision structure, which allows a program to have more than one condition

What is the If-Statement?

The if statement is a fundamental programming construct that allows a program to make decisions based on the truth or falsehood of a condition.

It creates a decision structure that enables a program to have more than one possible outcome or path of execution. When the Boolean expression associated with the if statement is true, one or more statements are executed.

If the Boolean expression is false, the statements associated with the if statement are skipped, and program execution continues with the next statement after the if block.

Read more about conditional statements here:

https://brainly.com/question/27839142

#SPJ1

Why is ROM used for in modern computers?

Answers

Answer:

Because ROM saves even after the computer is turned off

Explanation:

RAM doesnt function when the computer is off, ROM does.

ROM saves even when computers off

A user who has special security and access to a system, such as the right to assign passwords, is called a ____.​ a. ​ technical user b. ​ privileged user c. ​ database administrator d. ​ supervisor user

Answers

Answer:

C

Explanation:

This type of user would be called a privileged user.

What is the windows defender used for in windows 10

Answers

Answer:

Windows Defender is a built-in antivirus and anti-malware software in Windows 10 that helps protect your computer from viruses, malware, and other malicious software. It constantly scans your computer for any threats and provides real-time protection by blocking any suspicious activity. It also includes features such as firewall and network protection.

Explanation:

Brainliest Plssss

Use the following terms to complete the following sentences. Not all terms will be used. dpi primary corona toner inkjet IP address transfer corona laser transfer roller primary charge roller USB 1. The part of the laser printer that actually causes the toner image to be created on the paper is the OL 2. A network-enabled printer has its own the network. 3. The resolution of a printer is measured in 4. The printer that spits ink onto the paper is a(n) printer. 5. A laser printer's is responsible for writing the image onto the drum.

Answers

1. The part of the laser printer that actually causes the toner image to be created on the paper is the laser transfer roller. The laser transfer roller is the part of the laser printer that actually causes the toner image to be created on the paper. It is responsible for transferring the toner image from the drum to the paper.

A network-enabled printer has its own IP address on the network. This IP address can be used to connect to the printer from other devices on the same network.3. The resolution of a printer is measured in dpi (dots per inch). The resolution of a printer is measured in dpi (dots per inch). The higher the dpi, the more detail and sharpness there is in the printed image.4. The printer that spits ink onto the paper is an inkjet printer. The printer that spits ink onto the paper is an inkjet printer.

Inkjet printers are the most common type of home printer because they are relatively inexpensive and produce high-quality color prints.5. A laser printer's primary charge roller is responsible for writing the image onto the drum. A laser printer's primary charge roller is responsible for writing the image onto the drum. The primary charge roller is a part of the laser printing process that is responsible for charging the drum with static electricity, which attracts the toner particles to the drum.

To know more about transferring visit:

https://brainly.com/question/31945253

#SPJ11

What element allows text to be displayed in italics, which means the words are slanted to the right?

a
The < crooked > element

b
The < italic > element

c
The < em > element

d
The < slant > element

Answers

Answer:

the answer is the italic element

Not a question, but am I the only one who keeps seeing those people who say "The answer is linked here"? I feel like its some sort of way people are trying to hack you or something, if anyone knows what's up with that please tell me.. Its getting annoying.

Answers

Yes it is a hack and happened to me all the time

Write the steps involving coping and pasting a file in a folder​

Answers

Answer:

You single click on a file to get the file "selected". Then you hit the command sequence "Ctrl + C" on Windows OS or "Command + C" on MacOS.

You can alternatively right click on a file to open up some options which includes Copy.

You then enter the chosen folder and click on the white space.

You can then do "Ctrl + V" on Windows or "Command + V" on MacOS.

Alternatively, you can right click and locate the paste option.

Explanation:

what are the advantages of the variant of linked allocation that uses a fat to chain together the blocks of a file?

Answers

The variant of linked allocation using a FAT (File Allocation Table) enables efficient file access and minimizes fragmentation.

The variant of linked allocation that employs a File Allocation Table (FAT) has several advantages. First, it facilitates efficient file access by providing a centralized table that maps file blocks to their corresponding locations on the storage medium. This allows quick and direct access to any block of a file without traversing the entire linked list. Second, the use of a FAT minimizes external fragmentation since the blocks of a file can be scattered across the storage medium without affecting the file's logical sequence. Third, the FAT can be easily modified to allocate and deallocate blocks, making dynamic file size changes more straightforward. Overall, the FAT-based linked allocation method improves file system performance and flexibility.

Learn more about File Allocation Table  here:

https://brainly.com/question/31822943

#SPJ11

Data mining tools that are used in a data warehouse can be applied to find hidden patterns and relationships in datasets, as well as infer rules to predict future outcomes.

Describe each tool by giving an example of information that is derived from any business or industry out there.

Share your findings in the space provided below.

100 Marks

Answers

Data mining tools used in data warehouses are capable of discovering hidden patterns and relationships in datasets, enabling businesses to make predictions and derive valuable insights.

These tools have applications in various industries, allowing organizations to extract meaningful information for decision-making.

One example of a data mining tool is association rule mining. This technique identifies relationships or associations among items in a dataset. For instance, in the retail industry, association rule mining can reveal that customers who purchase diapers are also likely to buy baby formula. This information can be used to optimize product placement and marketing strategies, such as placing these items in proximity to each other or creating targeted promotions for customers who buy one product but not the other.

Another useful data mining tool is clustering analysis. It groups similar data points together based on their characteristics or attributes. In the healthcare industry, clustering analysis can be employed to identify patient segments with similar health conditions. By analyzing the data, healthcare providers can develop personalized treatment plans and interventions for each cluster, leading to improved patient outcomes.

Classification algorithms are another valuable tool in data mining. They assign data instances to predefined categories or classes based on their features. In the financial sector, classification algorithms can be used to predict creditworthiness. By analyzing historical data of borrowers and their credit performance, a bank can train a classification model to assess the credit risk associated with new applicants. This helps in making informed decisions about granting loans and setting appropriate interest rates.

Regression analysis is a data mining technique used to predict numerical values based on the relationships between variables. In the manufacturing industry, regression analysis can be used to forecast product demand based on factors such as market trends, pricing, and advertising expenditure. By analyzing historical sales data, a manufacturer can develop a regression model to estimate future demand and optimize production and inventory management accordingly.

In conclusion, data mining tools in data warehouses offer powerful capabilities to uncover hidden patterns, relationships, and predictions from diverse industries. Whether it's discovering associations in retail, clustering patient segments in healthcare, classifying creditworthiness in finance, or using regression analysis in manufacturing, these tools enable organizations to gain valuable insights for informed decision-making.

Learn more about Data mining here:

https://brainly.com/question/33467641

#SPJ11

Son aplicaciones desarrolladas específicamente para realizar actividades otareas que se llevan a cabo en oficinas o en educación.

Answers

Las herramientas ofimáticas son aplicaciones desarrolladas específicamente para realizar actividades o tareas que se llevan a cabo en oficinas o en educación.

Estas son las diversas computadoras y software que se utilizan para crear, recopilar, almacenar, manipular y transmitir digitalmente la información necesaria para realizar tareas básicas en los ámbitos educativos o comerciales.  

Al automatizar las operaciones de la oficina, es posible lograr una mayor cantidad de tareas más rápido; además elimina la necesidad de una gran cantidad de empleados; y permite que se requiera menos espacio de almacenamiento de datos.

Aprende más en https://brainly.com/question/21750706

Kieran wants to search a database quickly for information on the last time a patient came to his medical facility. This information is contained in one table. Which feature would make the most sense for him to use?

A. Query

B. Report

C. Filter

D. Sort

Answers

D. Sort

I hope im correct

Sort feature would make the most sense for him to use.

What is Medical facility?

In general, a health facility is any place that offers medical services. Small clinics, doctor's offices, urgent care facilities, big hospitals with sophisticated emergency rooms, and trauma centers are all examples of healthcare facilities.

One typical indicator of a country or region's prosperity and quality of life is the quantity and caliber of its health services. Health care facilities are frequently subject to some legal regulation; frequently, a facility must first get a license from a regulatory body before it can begin operations.

Governments, for-profit companies, non-profit groups, and occasionally even private citizens may own and run healthcare facilities, with the proportions varied by nation.

Therefore, Sort feature would make the most sense for him to use.

To learn more about Sort, refer to the link:

https://brainly.com/question/18568184

#SPJ5

technician a says that each abs has its own diagnostic procedure involving use of the brake and antilock warning lamps, special testers, troubleshooting charts, and wiring diagrams. technician b says that abs codes are lost from memory when the ignition is turned off. who is correct?

Answers

Technician A is correct; ABS has its own diagnostic procedure, but Technician B is incorrect as ABS codes are not lost from memory when the ignition is turned off.

Technician A is correct; ABS has its own diagnostic procedure involving the use of brake and antilock warning lamps, special testers, troubleshooting charts, and wiring diagrams. This procedure is necessary to identify the cause of any ABS-related issues. Technician B is incorrect, as ABS codes are not lost from memory when the ignition is turned off. If a problem is detected, the code is stored in the ABS computer and is not cleared until the issue is fixed. This allows mechanics to diagnose the cause of the issue and make any necessary repairs. In some cases, a scan tool may be used to access and clear any stored codes.

Learn more about code here:

https://brainly.com/question/25774782

#SPJ4

what are the main features cyber law of Nepal​

Answers

Answer:

What are the provisions of cyber law in Nepal?

Provision of cyber law of NEPAL

It provides legal status to digital signatures and electronic records which in turn are used in electronic banking, shopping and commerce. It provides laws for formation of judicial system that operates only for crimes related to computer (internet and cyber space).

Hope this helps Have a good day

MAP At a computer disk drive factory, inspectors randomly pick a product from production lines to detect a failure. If the production lines are normal, this failure rate q0=10 −3. However occasionally some problems occur in the lines, in which case the rate goes up to q1=10−1. Let Hi-denote the hypothesis that the failure rate is qi . Every morning, an inspector chooses drives at random from the previous day's production and tests them. If a failure occurs too soon, the company stops production and checks the critical part of the process. Production line problems occur about once every 4 days, so we will say P(H1 )=0.25=1−P(H0 ) 1. Based on N, the number of drives tested up to and including the first failure, design a MAP test that will use N to determine which hypothesis is true. 2. Calculate the probability of 'false alarm' (i.e. our MAP test computed in previous part concludes that the rate is q1 wrongly) and the probability of 'missed detection' (i.e. our MAP test fails on detect that the rate is q 1). 3. Based on this, calculate the probability of detection error Pe.

Answers

1. Based on N, the number of drives tested up to and including the first failure, design a MAP test that will use N to determine which hypothesis is true.Test 1: H0: q0 and H1: q1Let P(H0) be the prior probability of H0 which can be calculated as follows:P(H0) = 1 − P(H1) = 1 − 0.25 = 0.75Let P(H1) be the prior probability of H1 which can be calculated as follows:P(H1) = 0.25Let the likelihood function be L(N) = (1 − qN) for H0 and L(N) = (1 − q1N) for H1.According to MAP, if L(N)P(H0) > L(N)P(H1), then H0 is true; otherwise H1 is true.

Thus the decision rule is given as follows:If (1 − q0N) 0.75 > (1 − q1N) 0.25, then choose H0.Otherwise, choose H1.2. Calculate the probability of 'false alarm' (i.e. our MAP test computed in the previous part concludes that the rate is q1 wrongly) and the probability of 'missed detection' (i.e. our MAP test fails on detect that the rate is q1).False alarm:Probability of false alarm = P(H1) P(D|H1)/P(D)where P(D|H1) is the probability of getting the test results under H1.The probability of the drive not failing is 1 − q1.The probability of the drive failing on the Nth day is q1(1 − q1)N − 1Hence, P(D|H1) = q1(1 − q1)N − 1And, P(D) = P(D|H0)P(H0) + P(D|H1)P(H1)False alarm = 0.25 * q1(1 − q1)N−1/[(1 − q0N)0.75 + 0.25 * q1(1 − q1)N − 1]Probability of missed detection:Probability of missed detection = P(H1) P(-D|H1)/P(-D)where P(-D|H1) is the probability of getting the test results under H1 when it is not true.
The probability of the drive not failing is 1 − q1.The probability of the drive not failing on the Nth day is (1 − q1)N.The probability of getting missed detection is P(-D|H1) = (1 − q1)NAnd, P(-D) = P(-D|H0)P(H0) + P(-D|H1)P(H1)Probability of missed detection = 0.25 * (1 − q1)N/[(1 − q0N)0.75 + 0.25 * (1 − q1)N]3.
Based on this, calculate the probability of detection error Pe.The probability of detection error is the probability that the test will give an incorrect result when H1 is true and it is given as follows:Pe = P(H1) P(-D|H1) + P(H0) P(D|H0)Detection error = 0.25 * (1 − q1)N + 0.75 * q1(1 − q1)N − 1/[(1 − q0N)0.75 + 0.25 * (1 − q1)N]

Learn more about probability of detection error Pe here,
https://brainly.com/question/31844563

#SPJ11

What internet speeds does CenturyLink offer?

Answers

Century Link offers a range of internet speeds, depending on your location. Generally, speeds range from 10 Mbps to 1 Gbps.

What is Mbps ?

Mbps stands for Megabits Per Second and is a measure of the speed of an Internet connection. It is used to measure the download and upload speeds of a network connection, with higher Mbps ratings meaning a faster connection. Mbps is the most common unit of measurement for Internet connections, and is typically used to measure the speed of residential home Internet connections. Mbps is also used to measure the speed of mobile connections, such as 4G/LTE. The higher the Mbps rating, the faster the connection, allowing users to access content quickly, stream high-definition video, and more.

To learn more about Mbps

https://brainly.com/question/28311614

#SPJ4

The Healthcare Innovation and Technology Lab would most likely be interested in which of the following app types?

an app to use for budgeting
an app to read books
an app to help people decide on a home insurance policy
an app to send data from an insulin pump to a data collection point

Answers

Answer:

No. 4: An app to send data from an insulin pump to a data collection point.

Explanation:

Healthcare Innovation and Technology Lab would not mainly be focused with budgeting, book reading, and home insurance policies. Answer number 4 includes health and technology.

What is the best programing language to use for building video games?

Answers

hey

I'm going to college for game design.

one of the best languages and the one I'm studying in is c# it is used in unity and many other game engines but there are many more. Just to list a few c++, Java, and many more it is up to you. if you would like more info about this just let me know By the way what game are you planning to make that is one of the most important factors

Hope this helps

-scav

outlook web mail deleted almost all my emails and all attchments, deleted items, sent items etc how is my outlook storage still full

Answers

It seems that your Outlook webmail has deleted many of your emails and attachment, including deleted items and sent items, but your storage is still full. This issue could be caused by a few factors:

1. Synchronization delay: Sometimes, it takes time for Outlook to update and synchronize with the server, so it may not immediately reflect the updated storage usage after deleting items. Wait for a while and then check your storage again.

2. Mail retention policies: Some organizations may have mail retention policies in place, which temporarily hold deleted items before they are permanently removed. This could result in your storage remaining full even after deleting emails and attachments. You may need to check with your IT department to see if this is the case.

3. Large emails still present: You may have overlooked some large emails with attachments still present in your account. Double-check all your folders, including the archive folder, to ensure no significant emails are contributing to your storage usage.

4. Recoverable items folder: When items are deleted from your account, they may be moved to a hidden folder called the "Recoverable Items" folder, which also takes up storage space. To clear this folder, you can empty your deleted items folder and then manually delete items from the Recoverable Items folder.

5. Storage quota miscalculation: In rare cases, the storage quota displayed may be miscalculated due to a bug or an issue with the platform. If you have tried all the above steps and still face the issue, you may need to contact Outlook support for further assistance.

In conclusion, try these steps to resolve your storage issue, and don't hesitate to reach out to your IT department or Outlook support if the problem persists.

Learn more about attachment here:

https://brainly.com/question/23315558

#SPJ11

How are comments commonly used in Word?

a.for tracking edits made to a document
b.for listing all of the reviewers of a document
c.for giving opinions about parts of a document
d.for restricting the users who can edit a document

Answers

Answer:

c. for giving opinions about parts of a document.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;

I. View Mode

II. Print Mode

III. Drift Layout

Comments are commonly used in Microsoft Word for giving opinions about parts of a document. To add comments to a Word document, a user should select the portion of the text or content he or she wishes to comment on, then proceed to click on the Review tab and lastly, click New Comment. A dialog box for typing a comment would appear next.

Answer:

C.) for giving opinions about parts of a document

Explanation:

Doing it on EDG right now!

Good luck and have a good day!! :D

Display the desktop without minimizing or closing any windows.

Answers

The desktop can be fully displayed without minimizing or closing any windows by maximizing it.

What is a desktop display?

The desktop display is the computer monitor that shows the graphical interface of the window screen.

In the desktop mode on your window, you can display your entire desktop screen by clicking on the maximize button.

This enables you to see each icon on the screen clearly.

The image attached below shows a clear view of how to display the screen without minimizing or closing any windows.

Learn more about the desktop display here:

https://brainly.com/question/8384714

Display the desktop without minimizing or closing any windows.
Display the desktop without minimizing or closing any windows.

When a style is changed in an embedded stylesheet, it automatically applies the change to every page linked to that style sheet.​

a. True
b. False

Answers

The statement that 'When a style is changed in an embedded stylesheet, it automatically applies the change to every page linked to that style sheet' is true.

This is because the stylesheets are usually used in web designing to control the layout of multiple pages at the same time. Hence, when you modify a stylesheet, the change applies to every page linked to that stylesheet.Embedded stylesheetAn embedded stylesheet is a type of stylesheet that is embedded within an HTML document. It is placed in the head section of the HTML document and contains CSS styles. Embedded stylesheets apply to a single HTML page and control the styling of that page. If there are multiple pages that need to have the same styling, each page would need its embedded stylesheet. However, this may lead to repetitive coding, and that is why an external stylesheet is more suitable.PageA page refers to a single HTML document in a web application. Each page typically has its HTML document file and may also have an embedded or an external stylesheet. The content of a page is displayed in a web browser, and it can be navigated to by clicking on a hyperlink

.In conclusion, changing a style in an embedded stylesheet applies the change to every page linked to that stylesheet, and this is an efficient way to modify styles for multiple pages at the same time.

To learn more about stylesheet:

https://brainly.com/question/32226913

#SPJ11

A top investment bank is in the process of building a new Forex trading platform. To ensure high availability and scalability, you designed the trading platform to use an Elastic Load Balancer in front of an Auto Scaling group of On-Demand EC2 instances across multiple Availability Zones. For its database tier, you chose to use a single Amazon Aurora instance to take advantage of its distributed, fault-tolerant, and self-healing storage system. In the event of system failure on the primary database instance, what happens to Amazon Aurora during the failove

Answers

Answer:

Following are the solution to the given question:

Explanation:

Initially, Aurora will try and establish a new DB instance in the same AZ as the previous example. When Aurora can do it, he will try to create a new DB instance in another AZ.

Aurora will try and construct a new DB instance in the same disponibility zone as the original example if there is not an Amazon Aurora Replica (i.e. single instance) that does not execute Aurora Serverless. The replacement of the original example was better managed and may not work if there is, for example, an issue that impacts broadly the entire Access Service.

!!!!!HELP!!!!! (30PTS)
Suppose you are using a Mac to read your e-mail messages, and your receive an e-mail message with a PowerPoint file attached. PowerPoint is not installed on the Mac you are working with. Which of these could you use to view the file? Choose all answers that are correct.
A. a text editor
B. Keynote
C. PowerPoint Online
D. a photo editor

Answers

Answer:

B. KN

C. PP Online

Explanation:

KN is A's own software for creating slideshow presentations. However, since most people using KN are coming from using MS PP, there is the option to open PPs in KN (albeit with some fonts missing).

You can also view the file from PP Online. Just create a MS account (if you don't already have one), download the email attachment and upload it to your cloud, and you should be able to view it there.

Other Questions
QUESTION IS DOW BELOW 15 POINTS EACH PLEASE HELP PLEASE HELP PLEASE HELP Select the correct answer. Why would someone choose to invest rather than depend only on savings? A. An investment account provides regular income, while money held in a savings account may decrease. B. An investment account has the potential to earn more money than a savings account. C. An investment account has a fixed maturity date, but a savings account doesn't. D. There's less risk of losing money held in an investment account than in a savings account. At the concert, there are 75 more girls than boys. If the ratio of girls to boys is 4:1, how many girls are at the concert? And how many boys are at the concert? Which is the oldest luxury fashion brand still in operation today? Identify the molecular geometry around each carbon atom in CIRCHCIUsing VSEPR theoryA. seesaw and tetrahedralB. square pyramidal and tetrahedralC. tetrahedral and trigonal planarD. linear and trigonal planar the underlying goal of british imperialism in the mid-nineteenth century was to Pretest: Unit 1Question 5 of 30How can a mixture of salt and sand be separated?A. By adding oil and collecting the layers of salt and sandB. By dissolving the salt in water and filtering out the sandC. By using a magnet to attract the sandD. By allowing the salt to evaporateSUBMIT what is source code? group of answer choices any proprietary software licensed under exclusive legal right of the copyright holder. any software whose source code is made available free for any third party to review and modify. contains instructions written by a programmer specifying the actions to be performed by computer software. consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate. 2nd to last question and I'm donee What were the causes & effects of the European invasion of the Americas? a machine in a textile factory has a 1% chance of malfunctioning each time it produces a batch of clothing. what is the probability that the machine will malfunction at least once over the course of 100 batches? 20. 0 g of Potassium reacts with water to produce Potassium hydroxide and hydrogen gas. 2 K + 2 H2O > 2 KOH + H2How many miles of hydrogen are there? QUESTION 2Connor has noticed that when he makes new friends, they tend to share his political views and religious affiliation. He is observing thephenomenon known as 11. You want to save all the money you earn to buy a guitar that costs $400. You earn $9 per hour andplan to work 15 hours each week for the next 3 weeks. Will you earn enough money in that time to buythe guitar? Explain your answer. PLZ HELP I WILL GIVE 100 POINTSComplete the paragraph proof below.1.2.3.4. Define syntax in your own words alpha particle and proton head directly towards each other at an initial speed of 0.003c what is their distance of closest approach substantia nigra gives rise to the dopamine-containing pathway that facilitates readiness for movement. True or False In 1980 the Mt. St. Helens volcano erupted and impacted thousands of square miles of forest.Some areas are still undergoing secondary succession where Policies Current Attempt in Progress A partly full paint can has 0.842 US gallons of paint left in it. (a) What is the volume of the paint, in cubic meters? (b) if all the remaining paint is used to coat a wall evenly (wall area-145 m), how thick is the layer of wet paint? Give your answer in meters (a) Number Units (b) Number Units eTextbook and Media GO Tutorial Attempts: 0 of 3 used S Save for Later Using multiple attempts will impact your score 15% score reduction after attempt 2 Type here to search ii 1842 AM Question 7 of 10 Current Attempt in Progress Two bicyclists, starting at the same place, are riding toward the same campground by different routes. One cyclist rides 1190 o due east and then turres due north and travels another 1410 m before reaching the campground. The second cyclist starts out by heading due north for 1910 m and then turns and heads directly toward the campground. (a) At the turning point, how far is the second cycet from the campground? (b) in what direction (measured relative to due east within the range (-180, 180) must the second cyclist head during the last part of the trip? O hp Type here to search F C 1047 AM Question / of 10 (a) Number (b) Number eTextbook and Media Save for Later Using multiple attempts will impact your score. 15% score reduction after attempt 2- Type here to search O ii Units Units Attempts:0 of 3 used Submit Answer 1042 MANG