if you need to perform port scanning in your network, which of the following tool are you likely to use?

Answers

Answer 1

If you need to perform port scanning in your network, you are likely to use the "Nmap" tool. Option A is answer.

Nmap (Network Mapper) is a powerful and popular open-source tool used for network exploration and security auditing. It is commonly used for port scanning, which involves scanning a target network to identify open ports on various systems. By using Nmap, you can gather information about the open ports on specific hosts, determine the services running on those ports, and identify potential vulnerabilities.

Nmap provides a wide range of scanning techniques and options, allowing you to customize the scanning process based on your requirements. It is widely used by network administrators and security professionals for network analysis and reconnaissance. Therefore, Nmap is the correct option for performing port scanning in a network.

Option A is answer.

""

if you need to perform port scanning in your network, which of the following tool are you likely to use?

Nmap

Tmap

Zmap

None

""

You can learn more about Network Mapper at

https://brainly.com/question/30029137

#SPJ11


Related Questions

Key end users should be assigned to a developmental team, known as the united application development team. True or False

Answers

The given statement "Key end users should be assigned to a developmental team, known as the united application development team" is TRUE

.A united application development team is a group of individuals who come together to develop an application that meets certain requirements. This group will include developers, testers, and project managers, among other roles.

However, the team's success is dependent on the involvement of the end-users who provide feedback on the application during the development process. It is important for key end-users to be assigned to the team because they can provide valuable insight into the application's functionality and user-friendliness. Key end-users are those who will be the primary users of the application.  

Learn more about developmental team at

https://brainly.com/question/31164482

#SPJ11

Write an LMC program as follows instructions:
A) User to input a number (n)
B) Already store a number 113
C) Output number 113 in n times such as n=2, show 113
113.
D) add a comment with a details exp

Answers

The LMC program takes an input number (n) from the user, stores the number 113 in memory, and then outputs the number 113 n times.

The LMC program can be written as follows:

sql

Copy code

INP

STA 113

INP

LDA 113

OUT

SUB ONE

BRP LOOP

HLT

ONE DAT 1

Explanation:

A) The "INP" instruction is used to take input from the user and store it in the accumulator.

B) The "STA" instruction is used to store the number 113 in memory location 113.

C) The "INP" instruction is used to take input from the user again.

D) The "LDA" instruction loads the value from memory location 113 into the accumulator.

E) The "OUT" instruction outputs the value in the accumulator.

F) The "SUB" instruction subtracts 1 from the value in the accumulator.

G) The "BRP" instruction branches back to the "LOOP" label if the result of the subtraction is positive or zero.

H) The "HLT" instruction halts the program.

I) The "ONE" instruction defines a data value of 1.

The LMC program takes an input number (n) from the user, stores the number 113 in memory, and then outputs the number 113 n times.

To know more about LMC program visit :

https://brainly.com/question/14532071

#SPJ11

I use the wrap text feature in Excel daily. What is the difference in how this behaves or is used in Excel versus Word? Please explain in detail the differences and similarities.

Answers

The wrap text feature is an essential tool used to format text, particularly long texts or data within a cell in Microsoft Excel. In this question, we need to explain the difference between how wrap text behaves in Microsoft Excel versus how it is used in Microsoft Word.

Wrap Text in Microsoft Excel: Wrap text in Excel is a formatting option that is used to adjust text or data within a cell. When the text entered exceeds the size of the cell, it can be hard to read, and this is where wrap text comes in handy. Wrap text in Excel automatically formats the data within the cell and adjusts the text size to fit the cell's width. If a cell contains too much data to fit in the column, the cell's text wraps to the next line within the same cell.

To wrap text in Excel, follow these simple steps:

Select the cell or range of cells containing the text that needs wrapping. Right-click on the selected cell and click Format Cells. In the Format Cells dialog box, click on the Alignment tab. Click the Wrap text option and then click OK.

Wrap Text in Microsoft Word: In Microsoft Word, the Wrap Text feature is used to format text around images and graphics. It is used to change the way the text flows around the image, allowing users to position images and graphics in the document. Wrap Text in Microsoft Word does not adjust the font size of the text to fit the width of the cell like in Excel.

To wrap text in Microsoft Word, follow these simple steps:

Insert the image in the document. Select the image and go to the Picture Format tab. Click on Wrap Text, and you can choose how you want the text to wrap around the image.

The main difference between the use of Wrap Text in Microsoft Excel and Microsoft Word is that Wrap Text in Excel is used to format long data and adjust text size to fit the width of the cell while Wrap Text in Microsoft Word is used to format text around images and graphics.

To learn more about wrap text, visit:

https://brainly.com/question/27962229

#SPJ11

1000+1010 in binary addition

Answers

Answer

010010

Explanation

\(\boxed{\large{\bold{\blue{ANSWER~:) }}}}\)

1010+1000=10010

Explanation:-

Number 1 in the decimal system

\(1010_{2}= 10_{10}\)

Number 2 in the decimal system

\(1000_{2} = 8_{10}\)

Their sum

10 + 8 = 18

Result in binary form

\(\sf{18_{10} = 10010_{2}}\)

state the components of The Havard architecture​

Answers

Answer:

Explanation:

Harvard Architecture consists of Arithmetic Logic Unit, Data Memory, Input/output, Data Memory, Instruction Memory, and the Control Unit. Harvard Architecture has separate memory for data and instructions. In that way, both instruction and data can be fetched at the same time, thus making it comfortable for the users.

The Harvard architecture is a computer architecture model that is used in many microcontrollers and microprocessors. The key components of the Harvard architecture are:

Instruction memory: A separate memory unit that stores the program instructions. This memory is usually read-only, meaning that the instructions cannot be modified during runtime.Data memory: A separate memory unit that stores the data being processed by the program. This memory is usually read-write, meaning that the data can be both read from and written to during runtime.Processor core: The central processing unit (CPU) that performs the arithmetic and logic operations. The processor core has direct access to both the instruction memory and the data memory.Bus structure: A set of buses that connect the various components of the Harvard architecture. The instruction bus carries the instruction from the instruction memory to the processor core, while the data bus carries data between the data memory and the processor core.Input/Output (I/O) interface: A mechanism for communicating with external devices, such as sensors and actuators. The I/O interface allows the processor core to read and write data from and to external devices.

These components work together to allow the Harvard architecture to efficiently execute the program instructions and perform data processing tasks. The separate instruction and data memory units allow the processor core to fetch and execute instructions while simultaneously accessing the data memory, improving performance and making the Harvard architecture well suited for real-time control applications.

what is the answer to the image​

what is the answer to the image

Answers

your answer is

b

you’re welcome

Which of the following can be created from a Pivot Table? O 1.PivotFormats O 2. PivotFills O 3. PivotFilters O 4. PivotCharts.

Answers

The option that can be created from a Pivot Table is option 4. PivotCharts.

What is the Pivot Table?

A Pivot Table is a tool in programs like Microsoft Excel that helps you summarize data. This helps you study and shorten lots of information by arranging and changing it into a neat and organized form. Pivot Tables cannot make PivotFormats, PivotFills, or PivotFilters by themselves, but they can be used to make PivotCharts.

PivotCharts show pictures of the information in a Pivot Table. They help you show and share important information in different types of pictures, such as columns, bars, lines, and pies.

Learn more about  Pivot Table from

https://brainly.com/question/15214258

#SPJ4

_____ have networked and texted all of their lives with smartphones, tablets, and high-speed Internet.

Answers

Digital natives have networked and texted all of their lives with smartphones, tablets, and high-speed Internet.

Digital natives simply refer to the people who have grown up under the influence of the internet and other information technologies.

A digital native refers to someone that's raised in a digital world. Such a person is in close contact with the internet, video games consoles, computers, etc. The term is usually associated with millennials.

In conclusion, the correct option is digital natives.

Read related link on:

https://brainly.com/question/25393713

why does messenger keep saying waiting for network

Answers

you prob need to fix your data or redownload it again

Add pictures using the_____tab

Answers

insert

in word, click on the insert tab at the navigation pane.

This is an example of what type of formula? =average(d1:d17) question 1 options: addition subtraction range average

Answers

Answer:

d average

Explanation:

The average is the ratio of the sum of the observation to the total number of observations. Then the correct option is D.

What is average?

Average is simply defined as the mean of the given set of numbers. The mean is considered as one of the measures of central tendencies in statistics. The average is said to be an arithmetic mean.

The average is given as

\(\rm Average = \dfrac{Sum\ of\ the\ observation}{Total\ number\ of \ observations}\)

This is an example of the average formula.

More about the average link is given below.

https://brainly.com/question/521501

a message ____________________ is a fingerprint of the author’s message that is compared with the recipient’s locally calculated hash of the same message.

Answers

A message fingerprint is a unique digital signature that identifies the author's message and is compared to the recipient's locally calculated hash of the same message. This method of verification helps to ensure the authenticity and integrity of the message being sent.

Message fingerprinting is a widespread approach in modern communication networks for preventing unwanted access to data and ensuring that messages have not been tampered with during transit. A hashing technique is used to turn the content of a communication into a unique digital signature before it is transmitted. This signature, or fingerprint, is then delivered to the receiver along with the message.

When the message is received, the recipient's system computes the hash of the message and compares it to the sender's hash to guarantee that they match. If they don't match, it means the communication was tampered with or distorted in route. The communication will be refused in such instances, and the sender will be alerted.

Message fingerprinting is a crucial security measure that is used in various communication technologies such as email, instant messaging, and file-sharing systems. By using message fingerprints, organizations can ensure that their sensitive data remains secure and that their messages are delivered without any tampering or unauthorized access.

To learn more about the digital signature, visit:

https://brainly.com/question/14862771

#SPJ11

what is a disadvantage of network-based ips as compared to host-based ips?

Answers

One disadvantage of network-based IPS is that it may not be able to detect host-specific attacks, whereas host-based IPS can provide more granular protection.

Network-based Intrusion Prevention Systems (IPS) and host-based IPS are two different approaches to intrusion detection and prevention. Network-based IPS operates at the network layer and examines traffic as it flows through the network, whereas host-based IPS is installed on individual hosts and monitors traffic at the host level.

One of the main disadvantages of network-based IPS is that it can be less granular in its protection as compared to host-based IPS. Network-based IPS can only detect and prevent threats at the network layer, which means it may not be able to detect threats that are specific to a particular host. For example, a network-based IPS may not be able to detect an attack that targets a specific application or operating system running on a particular host.

Host-based IPS, on the other hand, operates at the individual host level and can monitor traffic that is specific to that host. This means that host-based IPS is generally better at detecting and preventing attacks that are specific to a particular host or application. For example, if a host-based IPS is installed on a server running a web application, it can detect and prevent attacks that are specific to that application, such as SQL injection attacks or cross-site scripting attacks.

However, there are also some disadvantages to host-based IPS. For example, it can be more resource-intensive than network-based IPS, as it requires resources on each individual host. Host-based IPS can also be more difficult to manage and maintain, as it requires installation and configuration on each individual host.

Overall, the choice between network-based IPS and host-based IPS depends on the specific needs of the organization and the level of protection required. In some cases, a combination of both approaches may be necessary to provide comprehensive protection against a wide range of threats.

Know more about the click here:

https://brainly.com/question/31835174

#SPJ11

Which is true about best practice frameworks and standards?a. Most frameworks and standards consider processes critical to a successful IT department,therefore, lessening the responsibility of the service desk itself.b. Microsoft Operations Framework, the international standard for IT service management,guides organizations in improving their IT processes.c. Successful IT organizations purchase tools first and then design or redesign theirprocesses to best utilize their tools and obtain meaningful data.d. Most process-related initiatives are handled as formal projects to ensure that allstakeholders are engaged and that desired outcomes are achieved.

Answers

The conventional method of managing IT services is writhing in its last kicks. When practically every organization has digital transformation at the core of their objectives, ITSM still relies on a rigid culture that won't change in the face of the fourth industrial revolution. So ,option b is the correct one.

using technology to provide services However, what we are seeing now is a transitory strategy that aims to do two things at once:Take advantage of the positive aspects of the past, such incident and service desk management.Accept the new digital realities, which are characterized by technology-first delivery that is flexible and customer-focused.Organizations and individuals need to stop viewing IT service management as a separate silo that provides technological answers, says Kirstie Magowan. Instead, we must consider service management in its entirety as a vital tool for bringing about business value, not only IT value.The goal of MOF 4.0 was to offer direction throughout the full IT life cycle. Early in 2008, was finished, and it incorporates processes created by the community, governance, risk, and compliance processes, management reviews, and Microsoft Solutions Framework (MSF) best practises.All of the activities and procedures involved in managing an IT service, including its conception, development, operation, maintenance, and eventually, retirement, are covered by the recommendations in the Microsoft Framework.

To learn more about " Microsoft framework" Click on below link brainly.com/question/14633741

#SPJ4

What do you understand by the following malicious programs (i) computer virus (ii) worm (iii) trojan horse (iv) sweeper (v) malware (vi) spyware.​

Answers

Answer:

Computer virus- A computer virus is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their system. For instance, you could receive an email with a malicious attachment, open the file unknowingly, and then the computer virus runs on your computer.

Worm virus- A computer worm virus is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.

Trojan horse virus- A Trojan Horse (Trojan) virus is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.

Sweeper virus- Sweeper virus is a fake anti-spyware program known to be an updated version of the rogue anti-spyware program Virus Doctor. Virus Sweeper is a program that when it is installed starts to perform actions such as scanning your computer without your permission.

Malware- Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.

Spyware- Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware is a kind of malware that secretly gathers information about a person or organization and relays this data to other parties.

how do you loop a makebeat in earsketch

Answers

Answer:

i dont know if this help but To do this, we will use a 'for loop'. The “for loop” allows the programmer to call a section of code repeatedly within a range of values. The range() function will return integer values depending on the arguments.

Explanation:

Filtering data in Excel Online keeps all data on the screen and highlights the content that fits your criteria.

True
False

Answers

Answer:

True.

Explanation:

Excel Online is the web version of the Microsoft Excel software application used for analyzing and visualizing spreadsheet documents.

A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems.

When the data that are contained in a spreadsheet is filtered with Excel Online, the data will remain on the screen while the elements that matches the criteria (filtered data) are highlighted for the user to see.

Filtering data in Excel Online keeps all data on the screen and highlights the content that fits your criteria.

Zoey wants to change the margins in her Word document but is not sure how to do it. What tab should she select to find directions?
OHelp
O Home
O Layout
O View

Answers

Answer:

I believe that it is layout

The health monitor stores 4 MiB of data.
Construct ari expression to show how many bits are in 4 MiB.

Answers

To convert from Mebibytes (MiB) to bits, we can use the following expression:

4 MiB * 1024 KiB/MiB * 1024 bytes/KiB * 8 bits/byte

Simplifying this expression:

4 * 1024 * 1024 * 8 = 33,554,432 bits

Therefore, there are 33,554,432 bits in 4 MiB of data.

How would you rate this answer on a scale of 1 to 5 stars?

Creates a table in MS Excel with each of the following accounts and indicates their effect on the expanded accounting equation The 1. in February 2020, Miguel Toro established a home rental business under the name Miguel's Rentals. During the month of March, the following transactions were recorded: o To open the business, he deposited $70,000 of his personal funds as an investment. He bought equipment for $5,000 in cash. O Purchased office supplies for $1,500 on credit. He received income from renting a property for $3,500 in cash. He paid for utilities for $800.00. He paid $1,200 of the equipment purchased on credit from the third transaction. O He received income from managing the rent of a building for $4,000 in cash. He provided a rental counseling service to a client for $3,000 on credit. He paid salaries of $1,500 to his secretary. He made a withdrawal of $500.00 for his personal use. O 0 0 O O 0 00

Answers

To create a table in MS Excel and indicate the effect of each account on the expanded accounting equation, you can follow these steps:

1. Open Microsoft Excel and create a new worksheet.

2. Label the columns as follows: Account, Assets, Liabilities, Owner's Equity.

3. Enter the following accounts in the "Account" column: Cash, Equipment, Office Supplies, Rental Income, Utilities Expense, Accounts Payable, Rental Counseling Service, Salaries Expense, Owner's Withdrawals.

4. Leave the Assets, Liabilities, and Owner's Equity columns blank for now.

Next, we will analyze each transaction and update the table accordingly:

Transaction 1: Miguel deposited $70,000 of his personal funds as an investment.

- Increase the Cash account by $70,000.

- Increase the Owner's Equity account by $70,000.

Transaction 2: Miguel bought equipment for $5,000 in cash.

- Increase the Equipment account by $5,000.

- Decrease the Cash account by $5,000.

Transaction 3: Miguel purchased office supplies for $1,500 on credit.

- Increase the Office Supplies account by $1,500.

- Increase the Accounts Payable (Liabilities) account by $1,500.

Transaction 4: Miguel received income from renting a property for $3,500 in cash.

- Increase the Cash account by $3,500.

- Increase the Rental Income account by $3,500.

Transaction 5: Miguel paid $800 for utilities.

- Decrease the Cash account by $800.

- Decrease the Utilities Expense account by $800.

Transaction 6: Miguel paid $1,200 of the equipment purchased on credit.

- Decrease the Accounts Payable (Liabilities) account by $1,200.

- Decrease the Equipment account by $1,200.

Transaction 7: Miguel received income from managing the rent of a building for $4,000 in cash.

- Increase the Cash account by $4,000.

- Increase the Rental Income account by $4,000.

Transaction 8: Miguel provided a rental counseling service to a client for $3,000 on credit.

- Increase the Rental Counseling Service account by $3,000.

- Increase the Accounts Payable (Liabilities) account by $3,000.

Transaction 9: Miguel paid $1,500 salaries to his secretary.

- Decrease the Cash account by $1,500.

- Decrease the Salaries Expense account by $1,500.

Transaction 10: Miguel made a withdrawal of $500 for his personal use.

- Decrease the Cash account by $500.

- Decrease the Owner's Equity account by $500.

Now, you can calculate the totals for the Assets, Liabilities, and Owner's Equity columns by summing the respective account values. The Assets column should include the totals of Cash, Equipment, and Office Supplies. The Liabilities column should include the total of Accounts Payable. The Owner's Equity column should include the total of Owner's Equity minus Owner's Withdrawals.

By creating this table and updating it with the effects of each transaction, you can track the changes in the expanded accounting equation (Assets = Liabilities + Owner's Equity) for Miguel's Rentals during the month of March.

To know more about MS Excel, visit

https://brainly.com/question/30465081

#SPJ11

once you write and properly debug a function, you can use it in the program (or different programs) again and again without having to rewrite the same code repeatedly.

Answers

The parenthesis following the function name are not necessary if the formal parameter list of the function is empty.

Explain about the formal parameter?

A variable that you specify when choosing the subroutine or function is referred to as a formal parameter. The list of potential variables, their locations, and their data types are defined by these parameters.

Formal parameter: The name given to the value that a caller passes to a method as a formal parameter. actual parameter: The actual value that the method's caller passes in. For instance, the parameter 200 used when process Deposit is invoked is real.

Parameters are used to send information to subprograms. A parameter is referred to as a formal parameter if it is mentioned in the subprogram body after being declared there.

To learn more about formal parameter refer to:

https://brainly.com/question/29555936

#SPJ4

T/F: when configuring a network printer in windows, the raw queue is most commonly used.

Answers

When configuring a network printer in windows, the raw queue is most commonly used is true. A raw queue refers to a print queue that sends the print job as-is to the printer, without any conversion or modification. So that the statement is True.

The print job must be in a format that the printer can recognize and print. In comparison to a LPR queue, a raw queue lacks the features of a formatting or spooling component.

This means that the raw queue is ideal for printers that do not need spooling or formatting of print jobs. The raw queue is a common method of printing to network printers in Windows.

This type of queue sends the print job directly to the printer, avoiding the need for any print spooling or formatting. Therefore, the statement is True.

To learn more about printer: https://brainly.com/question/1885137

#SPJ11

Which of the following describes a decision support system (DSS)?
O A. Maintains payroll accounts
B. Assists upper-level management in making long-term decisions
C. Handles requests related to everyday business procedures
O D. Processes business transactions
SUBMIT

Answers

Answer: B. Assists upper-level management in making long-term decisions

A decision support system assists upper-level management in making long-term decisions. Therefore, option B is correct.

What is a decision support system?

A decision support system (DSS) is an interactive computer-based system that helps users make decisions based on data and models. It is designed to support decision-making activities that involve analysis, prediction, and optimization.

A DSS typically provides access to a variety of data sources, analytical tools, and models to help users make informed decisions.

While other options, such as maintaining payroll accounts, handling requests related to everyday business procedures, and processing business transactions, are all important functions of information systems, they do not describe the specific purpose and capabilities of a decision support system. Thus, option B is correct.

Learn more about the decision support system, here:

https://brainly.com/question/28170825

#SPJ2

HELP PLEASE!!!!!!!!!
Please fix the coding! thanks I give brainliest

HELP PLEASE!!!!!!!!!Please fix the coding! thanks I give brainliest

Answers

Answer:

right you have 3 quotes if that is problem

Display the desktop without minimizing or closing any windows.

Answers

The desktop can be fully displayed without minimizing or closing any windows by maximizing it.

What is a desktop display?

The desktop display is the computer monitor that shows the graphical interface of the window screen.

In the desktop mode on your window, you can display your entire desktop screen by clicking on the maximize button.

This enables you to see each icon on the screen clearly.

The image attached below shows a clear view of how to display the screen without minimizing or closing any windows.

Learn more about the desktop display here:

https://brainly.com/question/8384714

Display the desktop without minimizing or closing any windows.
Display the desktop without minimizing or closing any windows.

The need for a functioning computer in countries having different electrical systems is an example of a ________.

Answers

It should be noted that Technical requirements serves as a need for a functioning computer in countries having different electrical systems.

What is Technical requirements?

Technical requirements  can be regarded as a technical issues which is required  in completing a project.

It entails aspects such as performance, reliability, and availability of functioning computer.

Learn more about Technical requirements at:

https://brainly.com/question/26550671

Which option is the correct format of placing HTML tags while coding in HTML?
A.

B.

C.

D.

Answers

Answer:

Where are the format to select please? It shows just empty A,B,C,D

Answer:

<ul><li><li><ul>

Explanation:

trust me

Which group often works as part of a team to secure an organization's computers and networks?

Answers

Network administrators are group often works as part of a team to secure an organization's computers and networks.

What is a network administrator do?

Network and computer systems administrators are known to be people that are said to be responsible for the daily  running of the  operation of these networks.

Hence, Network administrators are group often works as part of a team to secure an organization's computers and networks.

Learn more about Network administrators from

https://brainly.com/question/5860806

#SPJ1

What are examples of intermediate goals that require funding? Check all that apply.

1.) applying to college
2.) attending college
3.) interviewing for a job
4.) getting a summer job
5.) getting a promotion
6.) taking a licensing exam

Answers

Answer:

The answer is 1,2,6

Explanation:

The examples of intermediate goals that require funding are applying to college and attending college. Thus, option A and B are correct.

Which careers require college degree?

Some careers in the financial services sector require a college degree and others require a specialized license. Those requiring a unique license are banking and accounting.

A bank is an institution that deals in money and its substitutes and provides other money-related services. In its role as a financial intermediary, a bank accepts deposits and makes loans. Many banks provide related services such as financial management and products such as mutual funds and credit cards. For career in a banking field, a persons require specialized license.

Therefore, The examples of intermediate goals that require funding are applying to college and attending college. Thus, option A and B are correct.

Learn more about bank here:

brainly.com/question/29797792

#SPJ5

distinguish between the desktop publishing packages and multimedia packages​

Answers

Answer:

___________________________________________________________

Word processing software is used for working with text, while desktop publishing software involves production of documents that combine text with graphics. DTP software is perfect for making flyers, brochures, booklets. This type of software is usually more advanced than word processing apps.

___________________________________________________________

Other Questions
What does Marah achieve by giving contrasting descriptions of her City before and after the start of the war alexia lunch at a restaurant costs $34.00, without tax. She leaves the waiter a tip of 12% of the cost of the lunch, without tax. What is the total cost of the lunch, including the tip? Inflation a. causes people to spend more time reducing money balances. When inflation is unexpectedly high it redistributes wealth from lenders to borrowers. b. causes people to spend more time reducing money balances. When inflation is unexpectedly high it redistributes wealth from borrowers to lenders. c. causes people to spend less time reducing money balances. When inflation is unexpectedly high it redistributes wealth from lenders to borrowers. d. causes people to spend less time reducing money balances. When inflation is unexpectedly high it redistributes wealth from borrowers to lenders. Troy and Lisa were shopping for school supplies. Each purchased different quantities of the same notebook and thumb drive. Troy bought 4 notebooks and 5 thumb drives for $116. Lisa bought 2 notebooks and 3 thumb drives for $68. Find the cost of each notebook and each thumb drive Which of the following modifications to the list of assets and liabilities below would result in a net worth of $100,000?Recreational Vehicle valued at $110,000.Car valued at $27,000.Medical bills totaling $8,700.Loan balance of $80,000.Savings of $5,000.Retirement fund of $50,000.Credit card balance of $2,300.a.recreational vehicle value decreasing to $100,000b.borrowing $10,000 more in loansc.withdrawing $20,000 from the retirement fundd.adding $1,000 in credit card debtPlease select the best answer from the choices provided "Like bees upon the whitest flower, these questions swarmed around me." What figurative language is that? increased bilirubin production, impaired hepatic uptake and excretion of bilirubin, and reabsorption of bilirubin in the small intestine can each lead to: a. pathologic jaundice of the newborn. b. physiologic jaundice of the newborn. c. hepatitis a. d. infantile cirrhosis. you're trying to save to buy a new $191,000 ferrari. you have $41,000 today that can be invested at your bank. the bank pays 4.9 percent annual interest on its accounts. how long will it be before you have enough to buy the car? Can someone give me examples what to paint i need to paint it for performance task. The table below shows some results of a study which investigated the effect of different temperatures and levels of light on the growth of tomatoes. The amount of tomatoes produced by each plant is called the yield. In this example the yield is measured in kilograms of tomatoes. The yield of each plant was measured at different temperatures and light levels. 12345373737269943773884= Let ABCD be a parallelogram, E is the symmetric of B with respect to C and F is 1 defined by DF = DB 1 Show that A, F and E are collinear. 2 The straight line (A F) cuts (DC) at J. Find the real number k such that DJ = kDC the selection pointer is the blinking vertical line in the document window. T/F What did the fall of the Berlin Wall symbolize group of answer choices? a flywheel of radius 24.45 cm rotates with a frequency of 5757 rpm. what is the value of the centripetal acceleration at a point on the edge of the flywheel? Baleen whales are:a. in the suborder Odontoceti.b. in the suborder Mysticeti.c. in the class Osteichthyes.d. are in the order Teleostei. Discuss the various stakeholders to an organisation such as Nandos and explain the concerns of each one. As consumers consume more units of an item, the marginal benefit of each additional unit decreases at an increasing rate. This can be seen through: In the roman republic there was a clear divide between the __________ and the __________ and the __________ and the __________. Which of the following contains the greatest number of unipotent stem cells?A. 3-day-old embryoB. AdultC. BlastocystD. 6-week-old embryo