__________ implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

Answers

Answer 1

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!


Related Questions

What is the limitation of the procedure forward()?

Answers

Answer:

sandwich breadtughug

Explanation:

Katty bread

what is a possible effect of malicious code cyber awareness?

Answers

Answer:

Explanation:

for say some effects are erasing your files, corupting files etc just doing bad thing to your files.

Answer:

Files corruption, erased or destroyed.  

Explanation:

there has been an attack on your public website, and the virtual machines resources have been overwhelmed and are now unavailable to customers. what service should you use to prevent this type of attack?

Answers

AWS Shield service can be used to prevent a DDos attack on your public website, and the virtual machine's resources have been overwhelmed and are now unavailable to customers.

A Denial of Service (DoS) attack is a malicious attempt to reduce a targeted system's accessibility to authorized end users, such as a website or application. Attackers frequently produce a lot of packets or requests, which eventually overwhelm the target system. In the event of a Distributed Denial of Service (DDoS) attack, the attacker creates the attack using numerous compromised or controlled sources.

DDoS attacks can generally be classified according to the layer of the Open Systems Interconnection (OSI) model that they target. The Network (Layer 3), Transport (Layer 4), Presentation (Layer 6), and Application (Layer 7) Layers are where they are most frequently found.

When considering defenses against these assaults, it is helpful to categorize them as Infrastructure layers (Layers 3 and 4).

To learn more about AWS click here:

brainly.com/question/29708908

#SPJ4

Is computing gcse easy or hard

Answers

Answer:

my friend that took it said that there was a lot of complex theory involved- i was initially supposed to take it, but my blocks didn't align so i had to take geography instead

honestly, i would say it was one of the best decisions I've made, since i see lots of computing students completely confused by what they're doing.

To be honest i have never taken a GCSE but give your self time to study like any other  test and stress about it.

hope this helped

-scav

what two attributes must be contained in the composite entity between store and product? use proper terminology in your answer. group of answer choices the composite entity must at least include the primary keys of the (parent) entities it references. the composite entity must at least include the foreign keys of the (parent) entities it references. the composite entity must at least include the primary key of the composite (child) entity. the composite entity must at least include the foreign key of the composite (child) enti

Answers

The two attributes that must be contained in the composite entity between store and product are the primary keys of the parent entities it references and the foreign keys of the parent entities it references.

This means that the composite entity should include the primary keys of both the store and product entities, as well as the foreign keys that link them together.

The primary keys are necessary to uniquely identify each record in the composite entity, while the foreign keys ensure that the records in the composite entity are properly linked to the records in the parent entities. By including both of these attributes, the composite entity can effectively represent the relationship between stores and products in a database.

For more such questions on composite entity , click on:

https://brainly.com/question/28505002

#SPJ11

Examples of vector graphics include Select all that apply. A. logos B. blueprints C. photos D typefaces

Answers

Examples of vector graphics include A. logos and B. blueprints. Vector graphics are created using mathematical equations and can be scaled up or down without losing their quality. Logos and blueprints are often created as vector graphics because they need to be precise and scalable.

Photos and D. typefaces, on the other hand, are not examples of vector graphics. Photos are raster images, which are made up of pixels, and cannot be scaled up without losing quality. Typefaces, while they can be created as vector graphics, are typically used as raster images in digital media and print. In summary, the examples of vector graphics include logos and blueprints.

examples of vector graphics include: Logos, Blueprints, By configuring the settings, users can set restrictions on who can access certain files or applications, which devices can connect to the computer, and what actions can be performed on the computer. By implementing the security policies, users can increase the overall security of their computer and prevent potential security breaches. True. The Task Scheduler is a tool in Windows operating systems that allows users to automate tasks on their computer. Users can schedule tasks to run at specific times or intervals, start programs or scripts, and stop services. The Task Scheduler can help users save time and improve productivity by automating repetitive tasks. Additionally, users can also use the Task Scheduler to perform maintenance tasks such as system backups or updates. Overall, the Task Scheduler is a useful tool that can help users streamline their workflow and improve the efficiency of their computer.faces Vector graphics are commonly used for these types of designs because they can be easily resized without losing quality. Photos (C) are not vector graphics, as they are raster images composed of pixels.

To know more about graphics visit:

https://brainly.com/question/14191900

#SPJ11

What is the difference between user program and packages program?

Answers

Answer//

program is to enter a program or other instructions into (a computer or other electronic device) to instruct it to do a particular task while package is to pack or bundle something.

// have a great day //

Explanation//

A program is exactly that: a set of instructions that tells a computer how to do something.

The term package has multiple meanings, but with regard to programs, it generally means “the set of program files, data files, and other things that make up a particular application”.

// may I have Brainliest? //

Which of the following is a property of peer-to-peer systems? A) Separate machines act as either the client of the server but not both. B) They do not offer any advantages over traditional client-server systems. C) They suffer from the server acting as the bottleneck in performance. D)None of the above

Answers

Federal regulation of food and drugs has been a topic of much debate and criticism over the years. However, there is one option among the provided choices that does not fit the bill. Option a) states that federal regulation of health foods is too strict, but this is not a common criticism of the FDA or its regulations.

In fact, many critics argue that the FDA is not strict enough when it comes to regulating health foods and dietary supplements.
Option b) is a widely held criticism of the FDA - that it is too cozy with pharmaceutical companies. This is a concern because the FDA is responsible for approving  and ensuring their safety for public use. Critics argue that the agency's close ties to the pharmaceutical industry may compromise its ability to make impartial decisions.
Option c) is also a common criticism of the federal food safety regulations. The food safety system in the United States is made up of a patchwork of laws and regulations that vary by state and industry. This can make it difficult to enforce consistent standards across the entire food supply chain.
Option d) is another valid concern when it comes to food safety. The food supply chain is vast and complex, and it can be difficult to ensure that it is secure from terrorist attacks or intentional contamination.

In conclusion, while federal regulation of food and drugs has been criticized for a number of reasons, the criticism that federal regulation of health foods is too strict is not one of them. Instead, the FDA has faced criticism for being too cozy with pharmaceutical companies, for overseeing a patchwork system of food safety regulations, and for vulnerability to terrorist attacks.

To learn more about food safety regulations here

https://brainly.com/question/30094028

#SPJ11

How did early games in generation 1 or 2 influence zelda botw

Answers

Answer:

Open world exploration and inventory management

Explanation:

In the first Zelda game (NES) and Zelda ii (NES) there were very early open world mechanics along with inventory management.

Answer:

5 or 4

Explanation:

I know that Zelda 1 and Windwaker were inspristions, and then we have Ocarina of Time for the Korok forest, Gerudo Desert, and etc. And A Link to the Past was where Kakriko Village originated and the same theme was used for Botw as an easter egg. You may not believe me, but it's in there. But if you wanna get techinical, tons of outfits from the old games are in botw thanks to the dlcs, so...all of them actually are what botw is on.

what are the steps for using a gradient descent algorithm? calculate error between the actual value and the predicted value reiterate until you find the best weights of network pass an input through the network and get values from output layer initialize random weight and bias go to each neurons which contributes to the error and change its respective values to reduce the error

Answers

The steps that you can follow for using a gradient descent algorithm, are:

Choose a starting point (initialization). Calculate the gradient at this point. Create a scaled step in the opposite direction to the gradient (objective: minimize). Rerun points 2 and 3 until one of the criteria is met.

There are three kinds of gradient descent learning algorithms: batch gradient descent, stochastic gradient descent, and mini-batch gradient descent. Gradient Descent can be described as an optimization algorithm for finding a local minimum of a differentiable function. Gradient descent in machine learning can be used to find the values of a function's parameters (coefficients) that minimize a cost function as far as possible.

Learn more about a gradient descent algorithm at https://brainly.com/question/28234921

#SPJ4

A user finished working on a computer in the lab. What should the user do so
that their work is safe and others can use the computer?

Answers

Answer:

Explanation:

The best thing to do in this scenario would be to save all of the work that the user has just finished on a personal data USB drive and then delete any of his work off of the computer. Also, if the user entered into the computer using their own account they should also log off from the computer. The next individual can log in with their own account if they need to use the computer. This would make sure that their work is safe and with them, as well as making sure that no other individual can see, take, or modify the work that they have done.

If both the integers are negative, then their sum is?

Answers

You travel left in some kind of a negative direction because both variables are negative and the total is also negative.

What is the integer rule?

Division and Multiplication of Integers. Rule 1: A owing to better and a low integer cannot be added together. RULE 2: A positive number is the result of two positive integers. Rule three states that the amount of two integrand is affirmative.

What number of digits make up an integer?

An integer field can have 3, 5, 10, even 20 digits, with length being specified in terms of the number of digits. Storage requirements for 3-digit fields are one byte, for 5-digit fields two bytes, for 10-digit fields four bytes, and for 20-digit fields eight bytes.

To know more about Integers visit:

https://brainly.com/question/24128001

#SPJ4

I Need help with this ASAP

I Need help with this ASAP

Answers

Answer:It´s B. The code reults in an error

Explanation:

The function pow(x, y), requires which header file? group of answer choices cstdlib cstring iostream cmath iomanip

Answers

The function pow(x, y), requires the header file known to be option d. cmath

What does cmath used for?

CMath is known to be a term that connote the chartered mathematician title that is said to be given by the Institute of Mathematics as well as its Applications.

Note that the cmath header file is one that has the description for C++ and it is one that is often used in the area of computing common mathematical functions.

Therefore, The function pow(x, y), requires the header file known to be option d. cmath.

Learn more about header file from

https://brainly.com/question/28039573

#SPJ1

The function pow(x, y), requires which header file?

a. cstdlib

b. cstring

c. iostream

d. cmath

e. iomanip


What are the reasons for battery problems? How can these problems be corrected?

Answers

because of a bad alternator

What's the smallest part of a computer

A microchip

A byte

A bit

A mouse click

Answers

Answer:

A byte

Explanation:

I just had that question on my quiz

A byte!
It can be referring to any sort of byte according to the question. (kilobyte would be pretty small)

what is a defult? pls help if you wouldn't mind

Answers

Answer:

a beginner or a novice

Explanation:

failure to fulfill an obligation, especially to repay a loan or appear in a court of law.

HIPAA has electronic transaction standards which must be followed to be compliant. Which one of the following is a series of fixed length records used to bill services such as those performed in a hospital or inpatient setting?a. Encryption b. National standard format c. ANSI standardsd. UB-04 flat file

Answers

The series of fixed length records used to bill services such as those performed in a hospital or inpatient setting is called the UB-04 flat file.

UB-04 is a national standard format developed by the National Uniform Billing Committee (NUBC) for electronic submission of healthcare claims to Medicare and other third-party payers in the United States. It is one of the transaction standards required by HIPAA for electronic healthcare transactions.

Encryption is a method used to protect electronic health information from unauthorized access, while ANSI (American National Standards Institute) standards refer to various standards for electronic data interchange in healthcare.

To know more about Flat File, visit: brainly.com/question/21937138

#SPJ4

A customer seeks to buy A new computer for private use at home. The customer primarily needs the computer to use the microsoft powerpoint application for the purpose of practising representation skills. As a salesperson what size hard disc would you recommend and why?

Answers

Answer:

I think 128GB of storage would be fine.

Explanation:

It sounds like this person he's only looking to do basic tasks as you would still have room to do other things.

Given two integers N and K returns a palindrome of length of length N which consist of K distinct lower case letters?

Answers

Use these steps to generate a palindrome of length N made up of K different lowercase letters:

1. Ensure that N and K are legitimate inputs, i.e., 1 K N and K 26 because the English alphabet has 26 lowercase letters.
2. Choose the first K lowercase letters to create a unique set of characters.
3. In a repeating pattern, fill the first half of the palindrome (N/2 locations) with these K characters, ensuring that the total number of different characters remains K.
4. Mirror these characters to form the second half of the palindrome.
5. If N is odd, add the first character of the distinct set in the middle of the palindrome.

Following these steps, you can create a palindrome of length N consisting of K distinct lowercase letters.

Learn more about palindrome numbers:

https://brainly.com/question/21901688

#SPJ11

Montel needs to add a calculated field into a report that he has built that will show the total sale price of items sold in a given month. Which type of control should he add in Design view?

control box

text box

label

subreport

Answers

Answer: Label

pls mark brainleist

Answer:

D. Subreport

Explanation:

A subreport is a report inserted into another report.

Let me know if this is correct.

Hope this helps!

When a relationship is established between two tables, the primary key in one table is joined to the _____ in the other table.

Answers

When a relationship is established between two tables, the primary key in one table is joined to the foreign key in the other table.

What is the relationship between tables in a relational database?

The relationship between tables in a relational database is established by linking a field or column, which acts as the primary key of one table, to a field or column of another table known as the foreign key.

The table that includes the primary key of another table, known as the parent table, is linked to the table containing the foreign key.

A foreign key is a reference to a primary key in another table. It is used to identify the association between two tables, allowing them to work together to produce a comprehensive view of the database.

To know more about primary key visit :-

brainly.com/question/10167757

#SPJ11

create a spreadsheet with 15rows and 15column give their headings​

Answers

Answer:

|      |   A   |   B   |   C   |   D   |   E   |   F   |   G   |   H   |   I   |   J   |   K   |   L   |   M   |   N   |

|------|-------|-------|-------|-------|-------|-------|-------|-------|-------|-------|-------|-------|-------|-------|

|   1  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   2  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   3  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   4  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   5  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   6  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   7  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   8  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   9  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|  10  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|  11  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|  12  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|  13  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|  14  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|  15  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

Explanation:

you can save the code as a text file on your computer. To do this, simply copy the code to a text editor (such as Notepad on Windows or TextEdit on Mac) and save the file with a .py extension. You can then open the file in a Python interpreter to run the code whenever you need it.

Question 6 (2 points)
The recipe for good communication includes these "ingredients":

a.clause, brevity, comments, impact, value

B.clarity, brevity, comments, impact, value

C.clarity, brevity, context, impact, value

D.clause, brevity, context, impact, value

Answers

Answer:

C

Explanation:

i think lng hehehehehe

From the list below, select all that apply to the MOST CURRENT functions of the NIST cybersecurity
framework. O Identify O Protect O Detect O Respond O Recover Sustain

Answers

The NIST Cybersecurity Framework was first introduced in 2014 and has since undergone updates to keep up with the changing cyber threat landscape. The most current functions of the framework are as follows: 1. Identify: This function involves identifying and understanding the various systems, assets, data, and capabilities that need protection against cyber threats.

It includes establishing governance structures, policies, and procedures to manage cybersecurity risk. 2. Protect: This function involves implementing safeguards and measures to protect against cyber threats. This includes access controls, awareness and training programs, data encryption, and other security measures. 3. Detect: This function involves identifying cyber threats and events in a timely manner. This includes monitoring systems, networks, and assets for potential threats and anomalies. 4. Respond: This function involves taking action to contain, mitigate, and recover from cyber incidents. This includes incident response planning, communication protocols, and other measures to minimize the impact of a cyber incident.

5. Recover: This function involves restoring systems, assets, and data to normal operations after a cyber incident. This includes recovery planning, backups, and other measures to ensure business continuity. Overall, the NIST Cybersecurity Framework is designed to be a flexible and adaptable approach to managing cybersecurity risk. It provides a common language and framework for organizations to use when developing and implementing their cybersecurity strategies. Sustainment is not an explicit function within the framework, but it is an implicit goal, as the framework is designed to promote ongoing monitoring, assessment, and improvement of an organization's cybersecurity posture.

Learn more about cyber threats here-

https://brainly.com/question/30777515

#SPJ11

The normal time to perform a repetitive manual assembly task is 4.25 min. In addition, an irregular work element whose normal time is 1.75 min must be performed every 8 cycles. Two work units are produced each cycle. The PFD allowance factor is 16%. Determine (a) the standard time per piece, (b) how many work units are produced in an 8-hour shift at standard performance, and (c) the anticipated amount of time worked and the amount of time lost per 8-hour shift that corresponds to the PFD allowance factor of 16%.

Answers

The standard time per piece in a manual assembly task is 7.75 minutes, which includes a repetitive task time of 4.25 minutes and an irregular work element time of 3.5 minutes. In an 8-hour shift, at standard performance, 60 work units are produced considering a cycle time of 8 cycles and two units per cycle. The PFD allowance factor of 16% accounts for anticipated time lost due to personal needs, fatigue, and minor delays.

(a) Standard Time per Piece: Repetitive Task Time = 4.25 min.

Irregular Work Element Time = 1.75 min * 2 units (since two work units are produced each cycle) = 3.5 min.

Total Standard Time per Piece = Repetitive Task Time + Irregular Work Element Time.

= 4.25 min + 3.5 min.

= 7.75 min.

(b) Number of Work Units Produced in an 8-Hour Shift:

Cycle Time = 8 cycles (since the irregular work element is performed every 8 cycles).

Working Time = 8 hours = 8 * 60 minutes = 480 minutes.

Number of Work Units Produced = (Working Time) / (Cycle Time) * (Work Units per Cycle).

= 480 min / 8 cycles * 2 units.

= 60 units.

(c) Time Worked and Time Lost:

PFD (Performance Factor with Delay) allowance factor is 16%. This factor represents the anticipated amount of time lost due to personal needs, fatigue, and minor delays.

Time Worked = Working Time * (1 - PFD allowance factor).

= 480 min * (1 - 0.16).

= 480 min * 0.84.

= 403.2 min.

Time Lost = Working Time - Time Worked.

= 480 min - 403.2 min.

= 76.8 min.

Read more about Manual assembly tasks.

https://brainly.com/question/28605071

#SPJ11

you recently installed an ieee 802.11g/n wireless network in a small office. one of the employees has been complaining of poor performance and mentioned her notebook computer runs very slowly because of the access point it connects to. what could cause this notebook computer to be performing poorly?

Answers

Hi! I'd be happy to help you with your question. The poor performance of the notebook computer in the small office could be due to several factors involving the wireless network and the access point it connects to.

1. Change: The recently installed IEEE 802.11g/n network might have a different configuration or settings than the previous network, causing compatibility issues with the employee's notebook computer.

2. Transfer: If there are multiple devices connected to the same access point, it can cause slow data transfer rates, affecting the performance of the notebook computer.

3. Device: The employee's notebook computer might have outdated hardware or software that is not optimized for the IEEE 802.11g/n wireless network, causing performance issues.

4. Malware: The notebook computer could have been infected with malware, which can slow down its performance and affect the connectivity to the access point.

5. Strength: The signal strength of the wireless network might be weak in the employee's location, causing the notebook computer to have a slow or unstable connection to the access point.

6. Router Point: The router or access point itself might be experiencing issues, such as being overloaded or having outdated firmware, affecting its ability to provide a stable and fast connection for the notebook computer.

To resolve the issue, you can try updating the notebook computer's hardware and software, checking for malware, adjusting the wireless network's configuration, and ensuring that the router or access point is functioning optimall

For more such questions on Malware

brainly.com/question/14276107

#SPJ11

What is the scope of numC?

def usernameMaker (strFirst, strLast):
return strFirst + strLast[0]


def passwordMaker (strA, numC):
answer = dogName[0:3]
return answer + str(numC)

# the main part of your program that calls the function
username = usernameMaker ('Chris', 'Smith')
dogName = 'Sammy'
favoriteNumber = 7
password = passwordMaker (dogName,favoriteNumber)

Options
the entire program

usernameMaker

passwordMaker

# the main part of your program that calls the function

Answers

Answer:

local scope which is the entire body of the function/method that it is being used in

Explanation:

The variable numC has a local scope which is the entire body of the function/method that it is being used in, which in this scenario is the passwordMaker method. This is because the variable numC is being used as a parameter variable for that method, meaning that a piece of information is being inputted by when the method is called and saved as the variable numC which is then used by the lines of code inside the method, but cannot be accessed from outside the method thus.

Answer:

The answer is passwordMaker

Explanation:

Edge 2020.

PLEASE ANSWRR ALL ASAP

ILL GIVE BRAINLY PLEASE HELP

PLEASE ANSWRR ALL ASAPILL GIVE BRAINLY PLEASE HELP

Answers

Answer:

2D from hexadecimal to denary is 13 + 2*16 = 45

68 from hexadecimal to denary, using the same logic as above, is 104.

AB from hexadecimal to denary, using the same logic as above, is 171.

Lastly, F9 from hexadecimal to denary is 249.

31 from denary to hexadecimal is 1F (notice that it is one less than 32, which is 2*16).

73 from denary to hexadecimal is 49.

184 from denary to hexadecimal is B8

Lastly, 255 is FF (notice that it is one less than 256, which is 16*16)

The signature of a method consists of ____________. A. return type, method name, and parameter list B. parameter list C. method name and parameter list D. method name

Answers

The signature of a method consists of A. return type, method name, and parameter list.

The signature of a method consists of return type, method name, and parameter list. Therefore, option A is the correct answer.A method signature is a string that describes a method's full definition, which includes the return type, method name, and parameter list.

When you write a method, you specify its return type, name, and parameters. This is called the method's signature. You can think of a method's signature as a blueprint for the method.

To know more about method visit:

https://brainly.com/question/31670851

#SPJ11

Other Questions
what must happen for historians to consider a particular time in a civilization a classical period? the civilization must make extraordinary achievements in areas such as art and science the civilization must make extraordinary achievements in areas such as art and science someone must unite the entire area of the civilization into an empire someone must unite the entire area of the civilization into an empire, a written language must develop and be used by the population a written language must develop and be used by the population rulers must govern according to religious or philosophical teachings CMR 234 in MA1. A PHDH may apply for a Permit M?a. Trueb. False2. A dental hygienist completes 15 hours of CEUs on line. Is this permissible for license renewal?3. List six (6) records that must be provided to the BORID upon request from a sponsor of a course issuing continuing education units? (a) State the Mean Value Theorem. (b) Prove that[In x - In y l > I x - y I if 0 < x < y 1/2 I x - y I if 2 < x < y Find the pH of 0.05M Pyridine C 6 H 5 N solution. Know the base dissociation constant K C6H5N = 1.7.10 -9 . The slope of the given line is:A. 2B. 4C. -2D. None Miles wants to write the equation for photosynthesis. The villagram below represents one of the molecules in the equationWhich chemical formula rellects the diagram Which is the equivalent of 2000 mm?a. 200 m b. 2 m c. 0.002 m d. 0.02 m You are considering paying $700 per year for a health plan that pays 70% of the first $1,000 of medical costs and 100% ofany additional costs over that. If your total medical expenses for the year are $900, is it worth it for you to get the plan?a) Yesb) no. help please im really stuck and i need help please The Patel family made a 6-pound turkey for dinner. If each person will eat 12 of a pound, how many people will it take to finish the turkey? how did this molecule form? a positively charged molecule. this molecule consists of three hydrogen atoms bonded to an oxygen atom. how did this molecule form? a positively charged molecule. this molecule consists of three hydrogen atoms bonded to an oxygen atom. a hydrogen molecule bonded with an oh- molecule. a water molecule split in half. a water molecule gained an hydrogen ion from another water molecule. two water molecules bonded. evaporation. which planet will receive a radio signal that is redshifted and which planet receives a radio signal that is blueshifted respectively? these bones form the pectoral girdle. these bones form the pectoral girdle. humerus and scapula coxal bones femur and coxal bone clavicle and scapula Part 1 Question A: "Incentives" Suggested time 20 minutes. 10 Pts. Reportable Standard:Directions: Read Stimulus article #1 titled: "As its competitors lower prices, General Motors does the opposite.", located in the stimulus package and respond to the question prompt below:Prompt: "Using your knowledge of the concept of Incentives and with specific references to the article, analyze and then explain how incentives can influence/affect peoples behavior. Include a personal example how incentives have influenced your own economic behavior. Which equation could be rearranged to calculate the frequency of a wave The guidelines for brainstorming include all of the following EXCEPT:a. piggy-backing on others ideas is encouraged.b. all criticism is ruled out.c. quality is important.d. freewheeling" is welcomed.quantity is important. incorporating paraphrasing restating or generating in new form information that is already a survey asked 26 adults how many years of education they had. the sample mean was 13.03 with a sample standard deviation of 3.22. it is reasonable to assume that the population is approximately normal with unknown population standard deviation. construct a 90% confidence interval for the mean number of years of education. Which is a property of an angle?O has two sides that each extend forever in both directionsO has two endpojintsO has two center pointsO has two rays that share a common endpoint 8.In 2002, 1,551 delegates to Afghanistan's Grand Council picked the nextnational government. Two hundred of these delegates were women.Which of the following statements is most correct regarding the situation described above?