Encryption is Group of answer choices A sequence of symbols that controls the operations of encipherment and decipherment Text that is unintelligible to the reader A well-defined sequence of steps used to describe cryptographic processes The transformation of data to produce ciph

Answers

Answer 1

Encryption is the transformation of data to produce cipher text. Option d is correct.

It is a cryptographic technique to protect the confidentiality of digital data. Cipher text is a text that is unintelligible to the reader. It is the output produced by encryption. Encryption involves the use of a well-defined sequence of steps used to describe cryptographic processes.

These steps control the operations of encipherment and decipherment. The sequence of steps is called an encryption algorithm. It is a sequence of symbols used to describe the operations performed by the encryption algorithm. The encryption algorithm is used to convert plain text to cipher text and vice versa.

Therefore, d is correct.

Learn more about Encryption https://brainly.com/question/30225557

#SPJ11


Related Questions

How does computer science play a role in art?

Answers

Answer:

Many artists now learn to code; computer scientists develop algorithms with aesthetics as the goal. Projects such as Deep Dream, a program that uses neural networks to produce new visuals, let anyone use AI approaches to generate, ostensibly, art.

On the AVPU scale, a person can tell you his or her name and where he or she is located but cannot provide other information is:

Answers

On the AVPU scale, a person who can tell you their name and where they are located but cannot provide other information is classified as "Alert and Oriented to Person and Place."

The AVPU scale means that the person is conscious, aware of their surroundings, and able to provide basic information about themselves and their location.
In emergency situations, healthcare professionals and first responders often use the AVPU scale to quickly assess a person's level of consciousness and to determine the appropriate course of action.

The scale includes four categories: Alert, Verbal, Pain, and Unresponsive.
An Alert person is fully conscious, able to respond appropriately to questions and commands, and able to provide accurate information about themselves and their surroundings.

A Verbal person is less responsive, but still able to speak and communicate with others.

A Pain person is only able to respond to painful stimuli, such as a pinch or a sternal rub. An Unresponsive person does not respond to any stimuli and may be unconscious.
In summary, a person who can tell you their name and where they are located but cannot provide other information is considered Alert and Oriented to Person and Place on the AVPU scale.

While this may indicate some level of cognitive impairment or confusion, it is important to continue assessing the person's level of consciousness and to look for other signs of injury or illness.

For similar question on AVPU scale:

https://brainly.com/question/31247538

#SPJ11

1) based on your own personal experiences or those of someone you know (you may have to interview other students or a friend), discuss a computer attack that occurred. when did it happen? what was the attack? what type of damage did it inflict? list the reason or reasons you think that the attack was successful. how was the computer fixed after the attack? what could have prevented it? you may comment on any or all of the above. 2) shat are the layered security model? 3) explain the defense planning phase?

Answers

Nowadays, simply browsing a website might be risky; utilizing antivirus software and not downloading anything won't completely protect you from a computer attack e.g. a typo mistake can lead to URL hijacking.

ExploitKits, which are potentially dangerous websites, are present on malicious or compromised websites.

The EK, ExploitKits, or EK's, are highly automated tools that assess if the user's browser is patched and whether any active exploits are available to deploy against that user's browser when visiting a compromised website. The exploit kit stops working and the user is left in the dark if the browser has been fully patched to the most recent version and no exploits are available. However, when an exploit is found, a payload is transmitted to the host computer, acting as a malware file downloader before infecting the user's computer.

To protect follow the follwing rules:

   • Keep your browser updated at ALL TIMES to stop hackers from utilising exploits against you.

   • Visit only websites you trust.

   • Double check the URL for phoney websites (e.g., spelling mistakes used in URL hijacking).

Layered security is a network security strategy that employs a number of security controls to guard your technology environment's most exposed points where a breach or hack could happen. A multi-layered security strategy is used to make sure that every element of your cybersecurity plan has a backup to cover any vulnerabilities or holes. These layers combine to strengthen your defences and construct.

Security systems that employ numerous components to safeguard operations across a number of levels, or layers, are known as layered security. Defense in depth, which is based on a somewhat different concept and refers to the employment of a variety of tactics and resources to impede, slow down, or postpone a threat until it can be fully eliminated, is also related to this concept.

To learn more about URL hijacking click here:

brainly.com/question/15071308

#SPJ4

Open the lessons.html file and replace all of the div elements with section elements.
1
Use the template.html file to create a new HTML file and name the file instructors.html.
Add the appropriate information to the comment near the top of the page and update the file name.
Update the title by replacing the word Template with Instructors.

Answers

To replace div elements with section elements in lessons.html, open the file, find div elements, replace them with section elements, and save. To create instructors.html from template.html, make a copy, rename it, update information in the comment section, file name, and replace the title.

To replace all of the div elements with section elements in the lessons.html file:

Open the lessons.html file in your text editor.Find all the div elements in the file.Replace each div element with a section element.Save the file.

To create a new HTML file and name it instructors.html using the template.html file:

Create a copy of the template.html file and rename it to instructors.html.

Add the appropriate information to the comment near the top of the page and update the file name. Update the title by replacing the word Template with Instructors.

To create instructors.html using the template.html file, make a copy of template.html and name it instructors.html. Update the comment section with relevant information and adjust the file name accordingly. Replace the title "Template" with "Instructors" in the HTML code.

Learn more about replace div elements: brainly.com/question/30539568

#SPJ11

when was "Rick Astley Never Gonna Give You Up" originally made?

Answers

Answer: See explanation

Explanation:

Rick Astley "Never Gonna Give You Up" was originally recorded in October 1986 and was then released on 27th July, 1987.

The song was recorded in South London at the PWL studios. On the American billboard hot 100, it reached number one in March 1988.

Answer:

1987

Please mark me as brainliest

Explanation:

What are some technical challenges and questions that arise from the need to represent digital information in computers and transfer it between people and computational devices?

Answers

Answer:

security

Explanation:

One technical issue that arises from this is security. Many times the information that is being transferred is private or even valuable, therefore grabbing the attention of hackers/thief's that want this information. This makes security highly important, but making sure that the information is completely secure is impossible. The best that can be done is adding certain safety measures to secure the information as much as possible, which in term is a technical challenge.

how do i delete the phrase would you like to reduce mouse pointer lag on the tv using game low latency

Answers

If you're experiencing mouse pointer lag when gaming on your TV, it can be frustrating.  enabling Game Mode on your TV can help reduce input lag, making the gaming experience smoother.

1. Turn on your TV and navigate to the Game Mode setting. This is typically found in the Settings or Picture menu.

2. Once you've enabled Game Mode, the Would you like to reduce mouse pointer lag message will appear. Press and hold the Mute button on your TV remote for 3-5 seconds.

3. The message should disappear, and Game Mode should be fully activated without any prompts or messages.

4. If you want to confirm that Game Mode is enabled, look for a reduction in input lag.

You may notice a smoother gaming experience with less delay between controller inputs and on-screen actions. Game Mode can help improve your gaming experience on a TV, but it's important to note that it may not completely eliminate input lag.

Some TVs have more input lag than others, so it's a good idea to do some research and find a TV with low input lag if you're a serious gamer. using a wired controller rather than a wireless one can help reduce input lag.

To know more about pointer lag visit:-

https://brainly.com/question/31666990

#SPJ11

Give 2 example of application software and three advantages and disadvantages

Answers

The concurrent model in the software engineering has been defines the series of the events that will trigger the transition from the state to state for each of the software engineering activities.

What is the use of concurrent model?

The concurrent model has been used for the development of the client server applications. The advantages of this model are the following has that it has easy to the implement, the server TCP/IP logic has the simple and one listener has shared by many TPs.

The drawbacks of the model is that it increased the network overhead and delays due to the requirement of the TRM exchange and more CPU and resource intensive than is the Iterative model.

Therefore,The concurrent model in the software engineering has been defines the series of the events that will trigger the transition from the state to state for each of the software engineering activities.

Learn more about concurrent model on:

https://brainly.com/question/4237375

#SPJ1

pictures that you can click on to tell your computer what to do.

Answers

what do you mean ? I’m confused..
You might need to add picture so we can see what you need

What is the characteristic of a good algorithm? A. It should use a programming language. B. It should use natural language. C. It should use complex data types. D. It should use as much code as possible.

Answers

Answer:

A. It should use a programming language.

Explanation:

An algorithm may be defined as the sequence of data and information that are given to the computer for the process which can be executed by the computer. These information given to the computer are implemented using the various programming languages. In a good algorithm, the steps of instructions should be precisely defined.

Answer:

The correct answer is B. It should use a natural language.

Explanation:

I got it right on the Edmentum test.

For this interactive assignment, you will apply all the concepts you learned in previous weeks and apply the use of sequential input and output operations to add two new functionalities to your Employee Management System.
Export employees’ information to text file: This functionality will allow the user to save the employee information saved in the list to the file system. Each list entry should be saved into a new line. You may notice by now that closing the script will cost your Employee Management System to lose all entered employees’ information. Exporting the current system data into a file system will help you to save this information permanently on the hard disk and be able to use it at later time.
Import employees’ information from text file: This functionality will help you to import preexisting employee information from a text file saved on the file system. Each line in the text should be saved as a new list entry. When you run your Employee Management System for the first time you should be able to populate the system with preexisting employee information, if there are any, instead of adding this information manually to the system.
Once you have completed the functionalities, provide the following in your initial post:
One screen shot of each completed functionality.
An explanation of how you applied the use of sequential input and output operations to add the two new functionalities to the Employee Management System.
A brief description the purpose of this functionality.
The script for each functionality.
The attached zip folder that contains the running source code. Your instructor will run your source code to ensure that the functionality runs correctly. # Initiate global variable to store all the employees
employees = []
# Count variables to store the count of variables
count = 0
# Function to add an employee
def add_employee():
# initialize employee list to store the details of each employee
global count
employee = []
# increase the number of employees
count += 1
# taking employee details
print("Enter the name of the employee : ", end=" ")
employee.append(input())
print("Enter the SSN of the employee : ", end=" ")
employee.append(input())
print("Enter the phone of the employee : ", end=" ")
employee.append(input())
print("Enter the email of the employee : ", end=" ") employee.append(input())
print("Enter the salary of the employee : ", end=" ")
employee.append(input())
employees.append(employee)
# function to view the details of the employees
def view_all_employees():
for i in employees:
# to get one of the employees details
print(f"-----------Name : {i[0]}----------")
print("SSN : ", i[1])
print("Phone : ", i[2])
print("Email : ", i[3])
print("Salary : ", i[4])
print("------------------------------------")
# to get the employee count
print(f"Number of employees in the company is {count}")
# function to search employee
def search_employee():
find_emp = input("Please input employee SSN : ") # to select employee
found = False for item in employees:
if item[1] == find_emp: # To input new details
change_name = input('Please enter new name : ')
change_SSN = input('Please enter new SSN : ')
change_phone = input('Please enter new phone number : ')
change_email = input('Please enter new email : ')
change_salary = input('Please enter new salary : ')
item[0] = change_name
item[1] = change_SSN
item[2] = change_phone
item[3] = change_email
item[4] = change_salary
found = True
if found == False:
print("Employee not found")
# user menu for entering the details
while True:
print("Enter -1 to exit")
print("Enter 1 to add employee")
print("Enter 2 to view all employees")
print("Enter 3 to search employee")
print("Enter 4 to update employee details")
selection = int(input("Selection : "))
if selection == -1: # if user inputs -1, loop exits
break
elif selection == 1: # if user inputs 1 to add employee
add_employee() # calls add_employee function
elif selection == 2: # user inputs 2 to view all employees
view_all_employees() # calls the view_all_employees function elif selection == 3: # user inputs 3 to search employee by SSN
search_employee() # calls the search_employee function
elif selection == 4: # user inputs 4 to modify employee details
update_employee_details() # calls teh update_employee_details function
else:
print("Invalid response") # if user inputs any other response

Answers

Here is the completed solution for the Employee Management System. Sequential input and output operations were used to add the two new functionalities: Exporting employees’ information to a text file and importing employees’ information from a text file.

The purpose of these functionalities is to allow the user to save and import employee information from a text file saved on the file system and to export the current system data into a file system so that it can be saved permanently on the hard disk and used later.

A screenshot of each completed functionality will be provided as well as a brief description of how the two new functionalities were applied to the Employee Management System. Additionally, the script for each functionality will be provided, along with an attached zip folder that contains the running source code.

To know more about Employee Management System

https://brainly.com/question/33344148

#SPJ11

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

Please please help I don’t understand this please

Please please help I dont understand this please

Answers

Answer:

Process the data

Explanation:

Step one process the data

Step two:define the problem

Step three:check for accuracy

Step four:gather data from the user

how many different identifiers can the following bnf ruleset generate? ::= a | b | c | ... | x | y | z ::= |

Answers

The given BNF ruleset is: ::= a | b | c | ... | x | y | z The given ruleset has 26 alphabets (a to z) and the empty string. As there are 26 alphabets, the given BNF ruleset can generate 27 different identifiers.

The correct option is 27.

An identifier is a sequence of characters in a program that identifies and names variables, functions, and other entities. Identifiers are user-defined names that represent various elements of a program such as variables, functions, structures, etc.

The given ruleset has 26 alphabets (a to z) and the empty string. the privileged processor mode is called kernel mode and the nonprivileged processor mode is called user mode. Kernel mode is the most privileged mode on a computer. It allows direct access to hardware, memory, and processes. As there are 26 alphabets, the given BNF ruleset can generate 27 different identifiers.

To know more about empty visit;

https://brainly.com/question/16588531

#SPJ11

give an implementation-level description of a turing machine that decides the following language l

Answers

The implementation - level description of a turing machine that decides the languages would involve starting from the initial stage.

How to describe the languages of the Turing machine ?

For {w | w contains an equal number of 0s and 1s}:

Start in the initial state.Read the input string one symbol at a time.For each symbol, increment the count of 0s and 1s.If the counts are equal, accept the input string.If the counts are not equal, reject the input string.

For {w | w contains twice as many 0s as 1s} :

Start in the initial state.Read the input string one symbol at a time.For each symbol, increment the count of 0s.If the count of 0s is twice the count of 1s, accept the input string.If the count of 0s is not twice the count of 1s, reject the input string.

For {w | w does not contain twice as many 0s as 1s}:

Initiate in the initial state.Traverse the input tape from left to right.If a 0 is encountered, shift right and enter state A.If a 1 is encountered, shift right and enter state B.When the tape head comes across a blank symbol, shift right and enter state C.In state A, for every 0 encountered, shift right and remain in state A.In state B, for every 1 encountered, shift right and remain in state B.If a blank symbol is encountered in state A or B, shift left and enter state D.In state D, scan the tape from left to right until a blank symbol is encountered.If the tape head reaches the right end of the input tape and the number of 0s does not amount to twice the number of 1s, cease and accept the input string.If, at any point, the number of 0s reaches twice the number of 1s, cease and reject the input string.

Find out more on the Turing machine at https://brainly.com/question/32234715

#SPJ4

Complete question is:
Give implementation-level descriptions of Turing machines that decide the following languages over the alphabet {0,1}.

a. {w | w contains an equal number of 0s and 1s}

b. {w | w contains twice as many 0s as 1s}

c. {w | w does not contain twice as many 0s as 1s}

is monitor is a television​

Answers

Answer:

No, a monitor only shows what a different device tells them too however, a tv can be connected to nothing and show tv shows

Select the correct answer.
Which letter will be uppercase in the below sentence?

she will have exams next week.

A.
s in she
B.
h in have
C.
e in exams
D.
w in week
E.
n in next

Select the correct answer.Which letter will be uppercase in the below sentence?she will have exams next

Answers

Answer:D

Explanation:

Which type of social engineering attack attempts to discover personal information through the use of email?

Answers

Answer:

A phishing attack

Explanation:

Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization

Career Prep

Which of the following is NOT generally found in a company's
handbook?
Dress code information
Time of policies
Salary information for each employee
Safety regulations

Answers

I feel like salary information for each employee but I’m not sure

Using career prep knowledge, it is found that salary information for each employee is generally not found in a company's handbook.

Explanation:

A company's handbook has information about the company, it's rules and policies, and also about safety regulations, serving as a guide to each employee.Salaries, in industry, are considered to be a very particular information, as divergence in salaries may create trouble in the work-place, so it is not common for it to be public knowledge, thus being unlikely to be in the company's handbook.

A similar problem is given at https://brainly.com/question/5754826

Write a public static method diagSum, which takes a 2d array of int values as a parameter, and returns the sum of the elements in the lead diagonal as an int value. The lead diagonal is defined as the diagonal line of values starting in the top left corner and proceeding one step right and down for each value until either the bottom or right edge of the array is reached. For example, in the array represented below, the numbers in red make up the lead diagonal

Answers

A 2d array (i.e. 2 dimensional array) represents its elements in rows and columns

The program in Java

The method in Java, where comments are used to explain each line is as follows

//This defines the method

public static int diagSum(int[][] myArray) {

    //This initializes sum to 0

    int sum = 0;

    //This iterates through each row of the array

               for (int i = 0; i < myArray.length; i++) {

                   //This calculates the sum of the diagonals

                       sum+=myArray[i][i];

               }

               //This returns the sum

               return sum;

       }

Read more about methods at:

https://brainly.com/question/15969952

database shadowing duplicates data in real-time data storage, but does not backup the databases at the remote site. false true

Answers

Database shadowing does not only duplicate data in real-time data storage but also includes backup of the databases at the remote site. Therefore, the statement that database shadowing duplicates data in real-time data storage but does not backup the databases at the remote site is false.

Does database shadowing duplicate data in real-time data storage but not backup the databases at the remote site?

Database shadowing is a technique used for data replication and high availability. It involves maintaining a real-time copy, or shadow, of a database on a remote site.

However, it is important to note that database shadowing not only duplicates data in real-time data storage but also includes backup of the databases at the remote site.

Therefore, the statement that database shadowing duplicates data in real-time data storage but does not backup the databases at the remote site is false.

Learn more about Database shadowing

brainly.com/question/30846059

#SPJ11

you are an it administrator for a large computer-training company that uses laptops for all of its employees. you have to connect to the wireless network. which windows 10 built-in feature will you use to accomplish this?

Answers

Answer:

The steps i would take to accomplish this

Explanation:

A man receives a fraudulent email from his bank asking him to confirm his user name and password by going to a particular website. What has occurred

Answers

Answer: The man's info has been found and a hacker was trying to make him confirm his passwrd so he can get a hold of it to hack the man further.

Explanation:

Can someone tell me how to hit on a link on Brainly to see the answer

Answers

no, please do not hit on links. they're viruses i'm pretty sure.
Make sure to report the answer just in case

blackbody radiation is the that objects give off when

Answers

Blackbody radiation is the observable glow that heated solid things emit.

What are a computer's three primary parts?

The core components of every computer are the processor (CPU), memory, and input/output devices. Each computer receives data from many sources, uses its CPU and memory to process it, and then outputs the results in one form or another.

What does the term "black body" mean?

A surface that absorbs all radiant energy that strikes it is referred to as a blackbody in physics, also written black body. The phrase is derived from the fact that incident visible light will be absorbed rather than reflected, giving the surface the appearance of being black.

To know more about computer's component visit:-

https://brainly.com/question/28421025

#SPJ4

Question:

Blackbody radiation is the ____ glow that ____ objects give off when ____.

QUESTION 5 (a) A 3-SAT Boolean formula is a conjunction (an "and") of a number of clauses, each of which is a disjunction (an "or") of exactly three literals. An example of a 3-SAT formula, using four

Answers

A 3-SAT Boolean formula consists of multiple clauses, each containing a disjunction of exactly three literals, and the entire formula is a conjunction of these clauses. For example, consider a 3-SAT formula with four clauses:

How can a 3-SAT Boolean formula be defined?

A 3-SAT Boolean formula is a logical expression that represents a problem in boolean satisfiability. It is composed of multiple clauses, where each clause contains three literals combined with an "or" operator. The formula as a whole is formed by joining these clauses with an "and" operator. This type of formula is often used in computer science and mathematics to study the complexity of solving boolean satisfiability problems.

Learn more about 3-SAT

brainly.com/question/15088390

#SPJ11

Describe Barry Boehm's conclusions about Agile and plan-driven methods from the Boehm 2002 reading.
____

Answers

Barry Boehm's 2002 report examines the conflict between plan-driven methods and agile methods in software development. Boehm claims that both approaches have advantages and disadvantages that are dependent on the type of project being undertaken.

Hybrid model: A hybrid model that combines aspects of both agile and plan-driven models, tailored to fit the specific requirements of the project. Boehm acknowledges that this approach is the most flexible and is appropriate for most projects.

Agile methods for early phases: Utilize agile methods in the project's early phases to ensure a shared understanding of stakeholder needs and better alignment with business goals.

Rapid application development: Utilize agile methods to rapidly prototype a software solution in a plan-driven framework. Boehm notes that this approach is suitable for projects with high process uncertainty and tight time constraints.

Boehm concludes that agile methods and plan-driven methods should be used together. The advantages and disadvantages of each approach will be balanced by employing hybrid models that are tailored to fit the specific requirements of the project. This hybrid approach maximizes the benefits of both models and results in a more efficient and effective software development process.

To know more about models visit:

https://brainly.com/question/32196451
#SPJ11

In Python in order for a sort to work, which of the following is required?


The members of the list are all integers.


The members of the list are all strings.


The members of the list are all numeric.


They can be compared using a greater than operation.

Answers

Answer:

They can be compared using a greater than operation.

Explanation:

In Python, in order for a sort to work,They can be compared using a greater than operation. Therefore, option D is correct.

What is a python ?

A high-level, all-purpose programming language is Python. Code readability is prioritized in its design philosophy, which makes heavy use of indentation. Python uses garbage collection and has dynamic typing. It supports a variety of paradigms for programming, including functional, object-oriented, and structured programming.

Python is an object-oriented, interpretive programming language. Classes, dynamic typing, very high level dynamic data types, exceptions, modules, and exception handling are all included. It supports a variety of programming paradigms, including procedural and functional programming in addition to object-oriented programming.

Python is today among the most well-known and frequently used programming languages in the world, despite having its origins as a side project bearing the moniker Monty Python. Python is used for data analytics, machine learning, and even design in addition to web and software development.

Thus, option D is correct.

To learn more about a python, follow the link;

https://brainly.com/question/18502436

#SPJ2

What do you call the main way information enters your brain?

Answers

Answer:

The prefrontal cortex.

Explanation:

we might call the thinking brain, which can consciously process and reflect on information.

Hope this helps..

Python plese help 4.2 projectstem

it keeps saying error


pet=input("What pet do you have? ")

c=1

while(pet!="rock"):

print("You have a " + pet + " with a total of " + str(c) + " pet(s)")

pet = input("What pet do you have?")

c = c + 1

Python plese help 4.2 projectstemit keeps saying errorpet=input("What pet do you have? ")c=1while(pet!="rock"):
Python plese help 4.2 projectstemit keeps saying errorpet=input("What pet do you have? ")c=1while(pet!="rock"):

Answers

Answer: while(pet!="stop"):

Explanation:

here was my code for that lesson

pet = input("What pet do you have? ")

total = 0

while pet!="stop":

   total+=1

   print("You have one " + pet + ". Total # of Pets: " + str(total))

   pet = input("What pet do you have? ")

Other Questions
The shadow of a building is 30m long when the angle of elevation of the sun is 56. Calculate the: (a) height of the building (b) length of shadow when the sun is at an angle of 32. Discovery sampling is equivalent to an attributes sampling plan with a very low deviation rate.true or false During the cretaceous period, reptiles were the dominant species, and dinosaurs ruled earth. Plants developed flowers and fruits. At the end of the cretaceous period, about 65 million years ago, 50% of the plants and animals on earth became extinct and dinosaurs were never to be seen again. What is thought to have caused the mass extinction at the end of the cretaceous period?. choose true or false. in co-ops, stockholders determine who is allowed to live in the building. true false help with physic I need Can I get sum help? 50 pointtssss:Determine the monthly interest rate given the annual interest rate as 3%.(Show your working) the cost of producing one more unit of a good Select all the correct answers.What are two reasons why the author decided to include Information about different types of handicrafts?to show how handicrafts are still thrivingto show how the demand for handicrafts is fadingto show a wide range of popular handicraftsto show how technology has replaced traditional handicraft techniquesto show a brief history of the development of handicrafts birdseed cost $1.25 per pound how much does 6 pounds of birdseed cost How is the Domino Theory and the start of the Vietnam War related? What happened in Book 9 of The Odyssey? Explain the properties of following shapes in detail -(a) Parallelogram(b) Trapezium(c) RhombusSatisfied answerer will get thanks and brainliest. What connection does the author draw between government leaders and the Great Depression An ________ is developed to outline the resources school age students with disabilities need to support their education. which major industry was transformed by use of the assembly line in the early 20th century The results of a survey that asked 120 eighth graders if they prefer math or social studies are shown in the frequency table.Math Social Studies TotalGirls 37 31 68Boys 439 52Total 80 40120The relative frequency table includes some of the relative frequencies from the table.Math Social Studies TotalGirls 0.31Boys_[blank]Total 0.671.00What is the relative frequency for the total number of boys in this survey, rounded to the nearest hundredth?Enter your answer as the value that correctly fills in the blank in the table, rounded to the nearest hundredth, like this: 42.53 I dont know which one it is when i take notes what do i write only historywhat are the important thing what i need to write down ? 4. A tankful of liquid has a volumeof 0.2m3. What is the volume in (a)lities (b) cm3 (c)ml Jermaine owns all 200 shares of Peach Corporation stock valued at $50,000 Kenya, a new shareholder, receives 200 newly issued shares from Peach Corporation in exchange for inventory with an adjusted basis of $40,000 and an FMV of $50,000 Which of the following statements is correct? O A Konya may defer the recognition of any tax until the stock is sold B. No gain will be recognized by Konya OC. The transaction results in $10,000 of capital gain for Kenya OD. The transaction results in $10,000 of ordinary income for Kenya