how does a wide area network (wan) enhance the business ecosystem? select two that apply.(2 points)employees in different locations can share software.the network ensures privacy of customer information.team members can review files on the shared drive synchronously.the network provides greater security.

Answers

Answer 1

The two ways in which a wide area network (WAN) can enhance the business ecosystem are WANs function at OSI Layers 1 and 2 (Physical Layer and Data Link Layer, respectively).

WANs are not the same as the Internet, which is a collection of interconnected networks. Option d is erroneous because WANs can be created using wired connections as well as wireless ones.

Wide Area Networks (WANs) should be referred to as:

With the use of leased phone lines or satellite links, WANs are large-scale networks that link numerous Local Area Networks (LANs) across a considerable geographic area. They work at the Network Layer, which is in charge of data forwarding and routing between various networks.
1. Employees in different locations can share software: With a WAN, employees from different locations can easily access and share software, which enables them to work collaboratively on projects. This can result in increased productivity and efficiency, as team members can work on the same document simultaneously, without having to worry about version control or sending files back and forth.
2. The network ensures privacy of customer information: Privacy is a critical concern for businesses, especially those that deal with sensitive customer information. A WAN can provide a secure environment for storing and transmitting data, protecting against cyber threats and ensuring that customer information remains confidential. This is especially important for businesses that operate across different locations, as it allows them to maintain a consistent level of security across all their operations.

Learn more about Wide Area Networks (WAN) here

https://brainly.com/question/31415729

#SPJ11


Related Questions

Think about examples of Machine Learning you may have encountered in the past such as a website that recommends what video you may be interested in watching next. Are the recommendations ever wrong or unfair? Give an example and explain how this could be addressed

Answers

I get video recommendations on social media platforms for topics that are completely inconsistent with my interests such as Java programing or web development.

What is machine learning?

Machine learning (ML) is also known as artificial intelligence (AI) and it refers to a subfield in computer science which typically focuses on the use of computer algorithms and technology to develop a smart computer-controlled robot that has the ability to automatically perform and manage tasks that are exclusively meant for humans or by using human intelligence.

Sometimes I get video recommendations on you-tube for topics that are completely inconsistent with my interests such as Java programing or web development. As a solution, I would suggest that machine learning (ML) should be used to improve the video recommendations by collecting user-specific data on the types of videos that each user loves to watch.

Read more on machine learning here: brainly.com/question/25523571

Why is the number 0 important in computing?

Answers

B I N A R Y [0 , 1] yw

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

create a custom autofill list from the values in range a11 a14 ?

Answers

1.Select one or more cells you want to use as a basis for filling additional cells. For a series like 1, 2, 3, 4, 5..., type a11 and a12 in the first two cells. .

2.Drag the fill handle .

3.If needed, click Auto Fill Options. and choose the option you want.

You can save time inputting data manually into a worksheet with Excel's fantastic feature called AutoFill. The weeks and months are already kept in Excel, so it's not quite that magical, but the interesting part is that you can add your own unique lists. You should use custom lists if you frequently type out information like the names of employees, office locations, trading partners' nations, etc.Our list can now be added.

Press the Import list from cells area's choose range button.

Choose a few values from your list to highlight in the list.

Activate the Import button.

Hit the OK button.

You will be returned to the Options box.

learn more about  Excel cells here:

https://brainly.com/question/1380185

#SPJ1

Please help explain Loops question. I will give brainliest.

Please help explain Loops question. I will give brainliest.

Answers

Answer:

And 1 and 2 and 3

Explanation:

It is asked to display the 'and' every time, and the count is equal to 1 plus the previous count starting at zero, so it runs 3 times

Which programming scenario would most likely involve this array block?

Which programming scenario would most likely involve this array block?

Answers

The programming scenario that would most likely involve this array block is determining the number of items in the player's inventory. The correct option is D.

What is an array block?

Array block is also known as logic array block. This contains numerous cells from a certain number to a certain number. These cells are the PAL with the registered output.

The programming scenario that is shown in the picture tells the number of items in the inventory, and it shows the list.

Therefore, the correct option is D. Determining the number of items in the player's inventory

To learn more about array blocks, refer to the link:

https://brainly.com/question/13851399

#SPJ9

Answer: B is the correct answer

Explanation:

Factorise (x+y)^3- (x^3+y^3)​

Answers

Answer:

3xy(x+y)

Explanation:

if you want to simplify it it's 3x^2y+3xy^2 but you said factorise so it should be the answer 3xy(x+y)

Hope this helps:)

Answer:

3xy (x +y)

Explanation:

Step 1 Evaluate: (x+y)^3 = x^3+3x^2y+3xy^2+y^3

Step 2 Pull out like terms: 3x^2y+3xy^2 = 3xy × (x+y)

Answer:

3xy (x +y)

Amelia wants to create a website using the Python computer language to code her site. She will also use CodeSkulptor3 to help her. CodeSkulptor3 is an example of a(n):

A.
browser-based code editor.

B.
online coding tutorial.

C.
code repository.

D.
web page hosting site.

Answers

Amelia wants to create a website using the Python computer language to code her site. She will also use CodeSkulptor3 is an example of browser-based code editor. The correct option is A.

What is python?

Python is a programming language generally used to make websites and software.  Automated tasks and data analysis are also carried out using python.

CodeSkulptor3 is also a browser-based Python interpreter.  It has implemented a subset of Python 3.

Thus, CodeSkulptor3 is an example of browser-based code editor. The correct option is A.

Learn more about python.

https://brainly.com/question/19045688

#SPJ1

The Cloe button reduce a window o that it only appear a a button on the takbar. A. True

b. Fale

Answers

The statement "The Close button reduces a window o that it only appears as a button on the taskbar" is true. The correct option is A.

What is a taskbar?

The Close button minimizes a window so that all that is left of it on the taskbar is a button. The file's name, location, and size are determined by the operating system.

One of the functions that your operating system performs when you add information to a word processing document is saving your unsaved work to temporary storage.

Therefore, the statement is true. The correct option is A.

To learn more about the taskbar, refer to the below link:

https://brainly.com/question/13029467

#SPJ4

To select nonadjacent items, select the first item as usual, press and hold down the ____ key, and then while holding down the key, select the additional items.

Answers

Answer:

CTRL key

Explanation:

To select nonadjacent items in a spreadsheet, hold down the control key.

please help! ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎ ‎

please help!

Answers

I think the answer the the question is C

what will the following code print list1 = [40,50,60] list2 = [10,20,30] list3 = list1 list2 print(list3)

Answers

A Python list is a collection of ordered and changeable elements that can be of different data types. It is one of the most commonly used data structures in Python.

In Python list is assigned to a new variable, it creates a reference to the same list object rather than making a copy. So, in the given code, `list3` is assigned the value of `list1`, which means both variables are pointing to the same list object in memory. As a result, any modifications made to `list1` or `list2` will be reflected in `list3` since they all refer to the same list.

Learn more about Python list here:

https://brainly.com/question/30765812

#SPJ11

Do you need a internet browser to go to the intrnet?​

Answers

Answer:

No you do not need a interent browzer to get to the internet.

Explanation:

Not sure but I don’t think so

"Caller ID" is the feature that displays the telephone number of the caller on the telephone of the person he or she calls. With Caller ID now routine and widely used, it might be surprising that when the service was first available, it was very controversial because of privacy implications. (a) What aspect of privacy (in the sense of Section 2.1.1) does Caller ID protect for the recipient of the call? What aspect of privacy does Caller ID violate for the caller? (b) What are some good reasons why a nonbusiness, noncriminal caller might not want his or her number displayed?

Answers

Answer: Provided in the explanation section

Explanation:

please follow this explanation for proper guiding.

(a)

i. What aspect of privacy does Caller ID protect for the recipient of the call?

* The beneficiary of the call utilizing the Caller ID highlight becomes more acquainted with who precisely the guest is, independent of the guest being a decent/terrible individual or authentic/ill-conceived call.  

* Depending on how the call went or wound up, i.e., the discussion, business, messages passed on, the beneficiary would have the option to act in like manner and suitably dependent on the guest and his message's respectability, habits, morals, demonstrable skill, or telephone decorums, and so forth.  

* Also, the beneficiary gets the alternative to choose how to manage the call even before him/her picking the call, when he/she comes to know who the guest is through Caller ID include, the beneficiary gets security by either separating the call, sending or diverting the call, recording the call, not noting the call, or in any event, blocking or announcing the number in any case. Along these lines, the beneficiary's security is ensured from various perspectives.

ii. What aspect of privacy does Caller ID violate for the caller?

* Even however as it were, in fact it distinguishes, confirms, and validates the guest demonstrating he/she is who he/she professes to be. In any case, the guest ID highlight or innovation unveils numerous information and data about the guest, for example, his accurate phone number or PDA number, nation code, the specific phone or versatile transporter organize he/she is utilizing, and so on., as this data may make dangers the guest's security, (for example, character burglaries or just assailants caricaturing others utilizing this current guest's data), classification, it might cause accessibility issue for the guest as when the guest is besieged with ill-conceived calls, spam, and undesirable calls, there are chances their telephone numbers could and would be imparted to many advertising and selling organizations or industry without the guest's assent, there are chances somebody focusing on the guest may tap or wire his/her significant, basic business, social, expert, individual, or private calls for touchy data to assault them and abuse the bantered data. The guest certainly loses his/her secrecy, opportunity, directly for discourse, security, and wellbeing when passing on messages over the call when they know there could be somebody tapping or recording the call, or even the beneficiary may abuse the guest's character and his/her passed on data.  

* Hence, the guest doesn't get the opportunity from reconnaissance i.e., from being followed, followed, watched, and spying upon by trouble makers.  

* The guest would lose the control of their data on how it would be put away or utilized.  

* The guest probably won't get opportunity from interruptions.

(b).  What are some good reasons why a non-business, non-criminal caller might not want his or her number displayed?

* A non-business and a noncriminal guest would need to enjoy typical, common, and regular exercises; mingle and do his/her own day by day close to home, private, and public activities' assignments, occupations, occasions, social occasions, correspondences, individuals organizing, and so on., without making any whine about things, exposure stunts, without causing anyone to notice tail, screen, follow, question, or explore the guest superfluously except if the guest has enjoyed, asked, stated, discussed, or passed on any message that is unlawful, exploitative, wrongdoing, and culpable.  

* Such a guest would need total or most extreme namelessness, as to them, guest ID innovation just uncovers their own and private life exercises, correspondences, and so forth., to others to pass judgment on them, question them, and later cross examine and research them on their interchanges.  

* Such guests for the most part search for security in general.  

* Specifically, such guests need classification of their calls, discussions, messages, call logs, and so forth.  

* The beneficiary on occasion may get the guest's private unlisted number without the guest's assent or authorization.  

* The beneficiary may utilize the guest's telephone number and name to get a lot other data about him/her, which the beneficiary should, that would incorporate the guest's location (area) through an opposite catalog or just turning upward in any phone registry.  

* The beneficiary might not have any desire to talk, mingle, or work with the guest in view of the area (address), ethnicity (from the name), race, or district the guest is from.  

which of the following are true concerning the default vlan and vlan trunking? (select two.)

Answers

Concerning the default VLAN and VLAN trunking, it is true that the default VLAN is the VLAN to which a port is assigned when it is not explicitly assigned to a different VLAN.

This means that all untagged traffic on a port belongs to the default VLAN. Additionally, VLAN trunking allows multiple VLANs to be carried over a single physical link between switches, which helps to reduce the number of physical connections required. It is important to note that the default VLAN should be changed from its default configuration on all devices to improve network security. Leaving the default VLAN unchanged can allow unauthorized access to the network, as many devices are pre-configured to use this VLAN. In terms of VLAN trunking, it is important to ensure that all devices on the trunk link are configured with the same allowed VLANs to prevent any potential issues. Additionally, it is important to properly configure native VLANs to avoid any security vulnerabilities.

Overall, understanding the default VLAN and VLAN trunking is crucial for proper network configuration and security.

Learn more about network here: https://brainly.com/question/30456221

#SPJ11

data is communicated in to and out of a function through ___________.

Answers

We can see here that data is communicated in to and out of a function through  parameters and return values.

What is data?

Data refers to any information or facts that can be collected, recorded, or stored. It represents raw and unprocessed facts, numbers, text, images, sounds, or any other form of input that is used to convey meaning or represent something.

Data is essential in various domains and industries. It serves as the foundation for analysis, decision-making, research, software development, machine learning, and many other applications.

Learn more about data on https://brainly.com/question/28333051

#SPJ4

Which method will successfully launch the Spelling and/or Grammar Checker dialog box?

Click the Review tab on the ribbon; in the Proofing group, click on the Spelling & Grammar button.
Press the F7 key on your keyboard.
Right-click a word that is marked with a spelling or grammar error, and select Spelling or Grammar from the menu list.
All the above statements are correct.

Answers

Answer:all of the above

Explanation:

I got it correct

The correct is D. All the above statements are correct which All the above statements are correct.

To check your spelling and grammar, select the Review tab and then Spelling & Grammar.

What program is used in the word to check the spelling?

Spell checking is a unique function in Microsoft Word that lets you check your work for grammatical and spelling errors. A software program that detects misspelled words in a document is what spell check essentially is.

Grammar checkers are a great tool for people who aren't writers or are very technical. These apps help users become more fluent in the English language by pointing out their flaws. Your writing will be reviewed by Grammar Checker Tools to ensure that it is accurate and error-free.

Select Spelling & Grammar from the Review tab. In the event that Word discovers a potential error, the Spelling & Grammar dialog box will launch with red text for spelling mistakes and green text for grammatical mistakes.

Thus, the ideal selection is option D.

Learn more about the Spelling and/or Grammar Checker here:

https://brainly.com/question/16798012

#SPJ2

What is geolocation?

A. It is a website that allows users to determine their location in real life.
B.It is the act of determining a user's real-life location using Internet and mobile devices.
C. It is a paid service offered by Internet browsers to users who wish to know and share their location.
D.It is a free service offered by Internet browsers to users who wish to know and share their location.

Answers

Answer:

B

Explanation:

This is the correct answer because it correctly defines geolocation itself, the others go deeper and define select geolocation services.

excel functions are prebuilt formulas within excel.

Answers

Formulas are mathematical equations that integrate cell references, excel  values, and operators to compute results. It is not necessary to write the underlying formula when using functions because they are prebuilt formulas that can be rapidly fed values.

What do Excel's functions and formulas mean?

Functions are pre-written formulas that perform calculations using specific variables, also known as inputs, in a predetermined order or structure. Functions can be used to do calculations of any complexity. The Formulas tab on the Ribbon contains the syntax for all of Excel's functions.

What is the name of the pre-written formulas in Excel?

An already written formula is a function. A function performs an operation on a value (or values), then returns a new value (or values.)

To know more about excel  visit:-

https://brainly.com/question/3441128

#SPJ4

A(n) __________ structure is a structure that causes a statement or a set of statements to execute repeatedly.

Answers

Answer:

you cant do anything with the start of the question unless you explained more about it

Explanation:

The activity where hackers wander throughout an area with a computer with wireless capability, searching for wireless networks they can access is referred to as which of the following?
- War-driving
- War-dialing
- Indirect attack
- Brute force attack

Answers

The activity where hackers wander throughout an area with a computer with wireless capability, searching for wireless networks they can access is referred to as "war-driving".

This term is used to describe the practice of driving around in a vehicle while using a laptop or other mobile device to detect wireless networks. The aim of war-driving is to identify vulnerable networks that the hackers can exploit, either for malicious purposes or to steal data. It is an example of a direct attack on wireless networks, and it is a technique that is frequently used by cybercriminals to gain unauthorized access to sensitive information.

learn more about  wireless networks here:

https://brainly.com/question/31630650

#SPJ11

Why do most data scientists and companies collect enormous amounts of
data?
A. To reduce the huge amount of data found on the internet
B. To store the data and save it for future generations to examine
C. To compete with other data scientists and companies
O D. To make more accurate predictions about their users and their
behaviors

Answers

I believe it’s B because Scientist collect data for further examination more like theories and unknown things.

Answer: D.

Explanation: got it right

HELP FAST PLEASE
A computer-aided solution that completes a task is .
A. computer monitor
b.an abstraction
c. a decomposed solution
d. a problem statement
e. an automated solutions

Answers

To answer your question it is e

Why should we not underestimate the widespread of mass media?
Select one:

a.
While we do not seem to be aware of it, media has always been a useful and influential part of our lives.

b.
Media's span of influence knows no bounds

c.
All of the given choices are correct

d.
The media could reach almost anywhere in the world

Answers

C. A false statement by a good media source can go a long way

We should not underestimate the widespread of mass media because C. All of the given choices are correct.

It should be noted that media has always been a useful and influential part of our lives and its span of influence knows no bounds.

Also, it's important for one not to underestimate mass media because media could reach almost anywhere in the world. Therefore, all the options are correct.

Read related link on:

https://brainly.com/question/23270499

"Internet service providers (ISPs) connect the networks
of their customers to the Internet. How many tiers of ISPs exist in
the US?
Group of answer choices
A three
B. four
C. five
D. six

Answers

In the United States, the number of tiers of Internet service providers (ISPs) can vary, but commonly there are four tiers of ISPs. These tiers represent the hierarchical structure of ISPs and their role in connecting customer networks to the Internet.

The Internet infrastructure consists of multiple layers or tiers of ISPs, each with its own specific function and level of connectivity. The number of tiers can vary depending on the specific context and region. However, in the United States, the commonly recognized model includes four tiers of ISPs.

The first tier, known as Tier 1 ISPs, are the backbone providers that have a global network and peer directly with other Tier 1 ISPs. They have extensive network infrastructure and handle a significant amount of Internet traffic. Tier 1 ISPs do not pay for transit services.

The second tier, known as Tier 2 ISPs, connects to Tier 1 ISPs and may also peer with other Tier 2 ISPs. They have regional or national networks and may pay for transit services from Tier 1 ISPs to reach certain destinations on the Internet.

The third tier, known as Tier 3 ISPs, are typically regional or local ISPs that connect to Tier 2 ISPs to gain access to the wider Internet. They serve a smaller customer base and may purchase transit services from Tier 2 ISPs.

Finally, the fourth tier consists of Internet service providers that serve end-users, such as residential and small business customers. These ISPs connect to Tier 3 ISPs or may purchase wholesale Internet services from higher-tier ISPs.

While there may be additional subdivisions and variations within each tier, the four-tier model is commonly used to understand the hierarchical structure of ISPs in the United States. It represents the interconnected network of ISPs that enable the connection of customer networks to the global Internet.

Learn more about the Internet here:- brainly.com/question/16721461

#SPJ11

Match the following.
1. the process of reducing repetition of data
data normalization
2. individual categories of data you will enter in a database
records
3. a field that is a unique identifier for each record in the table
fields
4. data that is entered in the database
primary key
5. a link between two tables
relationship

Answers

Answer:

1192783728439

Explanation:

Calculate the total time (in milliseconds) required to send a file of size of 8000 bytes. Assume one-way propagation delay of 40 milli second on a link with bandwidth of 0. 8 x106 bytes/second and a packet size of 1000 bytes where data packets can be sent continuously with no packet loss. Please fill in just the value and not any units. For example if the answer is 40 msec, just write 40

Answers

The total time required to send a file of size 8000 bytes is 41.25 milliseconds.To calculate the total time required to send a file of size 8000 bytes, we need to consider two types of delays: propagation delay and transmission delay.

The propagation delay is given as 40 milliseconds (ms), and we need to convert the file size from bytes to bits by multiplying it by 8. Therefore, the propagation delay in bits is:

Propagation delay = 40 ms = 40 x 10^-3 s

File size = 8000 bytes = 64000 bits

The transmission delay can be calculated by dividing the packet size (1000 bytes = 8000 bits) by the link bandwidth (0.8 x 10^6 bytes/second = 6.4 x 10^6 bits/second), which gives us:

Transmission delay = packet size / link bandwidth

Transmission delay = 8000 bits / 6.4 x 10^6 bits/second

Transmission delay = 1.25 x 10^-3 seconds

Since we can send data packets continuously with no packet loss, we do not need to consider any other types of delays. Therefore, the total time required to send the file can be calculated as:

Total time = propagation delay + transmission delay

Total time = 40 x 10^-3 s + 1.25 x 10^-3 s

Total time = 41.25 ms

Thus, the total time required to send a file of size 8000 bytes is 41.25 milliseconds.

Find out more about total time

brainly.com/question/14473164

#SPJ4

Attorneys can now submit documents electronically in many courts; the standard format in federal courts is ____.A) Microsoft Word (DOC)B) Portable Document Format (PDF)C) Encapsulated Postscript (EPS)D) Postscript (PS)

Answers

With the advancement of technology, many courts now allow attorneys to submit their legal documents electronically. However, there is often a standard format that must be followed.

In federal courts, the standard format for electronic document submission is the Portable Document Format (PDF). This file format allows for documents to be easily shared, viewed, and printed on different devices without any changes to the formatting. Therefore, if you are an attorney submitting documents electronically to federal courts, it is important to ensure that they are in the correct format, which is PDF. This will help to ensure that your documents are easily accessible and can be viewed by all parties involved in the case.

To learn more about technology, visit:

https://brainly.com/question/9171028

#SPJ11

What type of software problem is it when a particular program on the pc works for a short time but then suddenly terminates and its not hardware related

Answers

When a particular program on a PC works for a short time but then suddenly terminates, it is likely a software problem related to the program itself or the operating system. There could be several reasons for this issue, including:

Software bugs: The program may have a coding error that causes it to crash after running for a short time. This could be due to a memory leak, infinite loop, or other programming errors.Compatibility issues: The program may not be compatible with the operating system or other software on the PC, causing it to crash.Corrupted files: The program files may have become corrupted, which can cause the program to crash.Insufficient resources: The program may require more system resources than are available, causing it to crash.To resolve this issue, users can try several solutions, such as updating the program, reinstalling it, running a virus scan to ensure that the PC is not infected with malware, and checking for any conflicts with other software or hardware. If the issue persists, users may need to seek help from the software developer or a technical support professional.

To learn more about operating system click the link below:

brainly.com/question/6689423

#SPJ4

Compare and contrast the features of the four computer career fields. Write a paragraph on each and specify how the four career options differ from each other, and explain how they are similar to each other. For your research, you can browse through the Bureau of Labor Statistics website.

Answers

1.Big data engineer · 2. Applications architect · 3. Web developer · 4. Database administrator.

What is computer ?

A computer is a device that may be configured to automatically perform series of mathematical or logical operations (computation). Modern digital computers are capable of running programmes, which are generalised sets of operations. These apps give machines the ability to carry out a variety of tasks. A computer is a minimally functional computer that contains the peripheral devices, operating system (primary software), and hardware required for proper operation. This phrase may also apply to a collection of connected computers that work as a unit, such as a computer system or group of computers. Computers are used as control systems in a wide range of commercial and industrial goods.

To know more about computers visit:

brainly.com/question/21474169

#SPJ1

Other Questions
A local radio station holds a charitable event in which you can buy a chance to win a new car forA local radio station has a bag filled with 28 balls. 3 of those balls have a "win a car" sticker on them, and the other 25 are blank. In order to win the car, you need to select a car ball 3 times in a row. What is the probability of doing so:a. With no replacement of car balls?B. With replacement of car balls help meeeeeeeeeeeeee pleaseeeeeeeeeee rn rnnnn!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!help meeeeeeeeeeeeee pleaseeeeeeeeeee rn rnnnn!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!help meeeeeeeeeeeeee pleaseeeeeeeeeee rn rnnnn!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! What is exactly 1 light year from Earth? Which action is most likely to help solve a problem associated withglobalization?A. Inventing a cheap method for purifying polluted water sourcesB. Demanding that governments cut funding to expensive health careprogramsShrC. Pressuring farmers to limit the amount of food they produceD. Eliminating international organizations such as the United Nations Which of these elements show that "A Letter to the Editor" is not a mysteryplay? Choose the three correct answers.A. It has lines of dialogue that give the setting.B. It gives information instead of having action.OC. It is a letter instead of a drama.D. It is a written work meant to be in a newspaper.E. It centers on solving something using clues. 5. in a one paragraph response, what assessment findings in ihuman led you to select the two opportunities you have identified? utilize the optional assigned readings, course lessons, or an outside scholarly source of your choice to support your thoughts and ideas. cite your resources in your paragraphs and list your reference(s) after your response. katrina has a collection of DVDs she gave one third of theseDVDS to her friend. then she bought 7 more dvds. now, she has 39dvds. how many dvds were there in the collection initially. How many stanzas are in the poem the big hit?How many lines are in the poem the big hit? Who performed the oil-drop experiment?O A. Albert EinsteinB. Robert MillikanO C. J. J. ThomsonD. Niels Bohr Imagine that you own a company and can publish just one page onthe web about your company. What would be necessary to include onthat page?Once you have made your post, read and respond to at least 2. What is the opportunity cost of buying a $.75 soda every school day for three years instead of drinking water? Assume you are in school for 36 weeks a year and that water is free. Consider the equality xy k. Write the following inverse proportion: y is inversely proportional to x. When y = 12, x=5. 64When I have seen by Time's fell hand defac'd enj.The rich proud cost of outworn buried age; hardP Pn nWhen sometime lofty towers I see down-ras'd enj.And brass eternal slave to mortal rage: hardnn The SALT I treaty did which of the following?A. It limited the amount of nuclear weapons for the US and USSR.B. It increased the amount of nuclear weapons for the US andUSSR.C. Removed all nuclear weapons in the US and USSR.D. Stopped the production of all nuclear weapons in the world.Points!! Asap Rotate point C(6,-3) 90 clockwisePLEASE HELP find the quotient. simplify your answer. 3b/4 divided by -c/6 brian is a lower-level manager at a men's clothing store in a mall. brian's boss trusts him to find new ways to attract customers and compete with other clothing stores in the mall. because brian often walks around the store and the mall, he has developed a good understanding of the store's customers and thus he is able to react quickly to their changing needs. brian's store operates as a(n) organization. A book is at rest on a table top. The gravitational force acting on it is 100 N. A free-bodydiagram for this situation looks like this: A writer shouldto organize ideas for an informative essay Drag each tile to the correct location on the table.Categorize each characteristic as belonging to either a direct or an indirect recommendation report.lists evidence first lists evidence lastlikely to be difficult to get approval forlikely to be easy to get approval forDirect Recommendation Report Indirect Recommendation Report