In this unit, you learned that one concern of back-end website development is security. can you think of a situation that might create a problem
for a website's security? what could a back-end developer do to prevent this situation from occurring?

Answers

Answer 1

Situations that leads to back-end website development  security are:

Injection Flaws.Lack of Transport Layer Protection. Broken Authentication, etc.

What are the security risk to database?

The injection flaws is known to be a very dangerous web application risk as it helps user to have data containing keywords that will change the behavior of queries created on the database.

This can be handle by:

ValidationEncode, etc.

Therefore, Situations that leads to back-end website development  security are:

Injection Flaws.Lack of Transport Layer Protection. Broken Authentication, etc.

Learn more about back-end website from

https://brainly.com/question/13263206

#SPJ1


Related Questions

Which of the following is an example of a technical ("hard") skill?.

Answers

Answer: Microsoft Office, Troubleshooting, Interpreting Data, Video Editing, Graphic Design

Explanation:

Which window allows you to view, sort, organize all assets for the game?

Answers

The window that allows you to view, sort, and organize all assets for the game in Unity is called the "Project" window.

In Unity, the Project window is a central hub for managing all the assets used in a game project. It provides a hierarchical view of the project's folder structure and displays all the assets stored within those folders. You can navigate through the folders, preview assets, search for specific assets, and organize them into custom folders and subfolders.

Additionally, the Project window allows you to import new assets, create new folders, and perform various operations on the assets, such as renaming, deleting, and moving them within the project.

You can learn more about Project window at

https://brainly.com/question/28347547

#SPJ11

Is Autodesk student license free?

Answers

Autodesk offers free student licenses for eligible students and educators for personal, non-commercial use, along with free licenses for nonprofits and startups meeting eligibility requirements.

Autodesk provides free student licenses for eligible students and educators for personal, non-commercial use. These licenses are valid for a period of 3 years and include access to the same features and functionality as the commercial licenses. However, note that some restrictions may apply, and not all Autodesk products may be available under the student license program.

Autodesk offers student licenses for many of its popular products, including AutoCAD, Maya, 3ds Max, Revit, and Fusion 360, among others. To be eligible for a student license, you must be a current student or educator at an accredited educational institution and be able to provide proof of enrollment or employment. Autodesk also offers free educational resources and tutorials to help students and educators learn how to use their software effectively.

Autodesk also offers free licenses for nonprofits and startups that meet certain eligibility requirements. These licenses may be limited in terms of the number of users or features available. Autodesk's license offerings and eligibility requirements may change over time, so it is always best to check their website for the latest information.

Learn more about website here:

https://brainly.com/question/2497249

#SPJ4

____, as a technique, is quite similar to e-mail bombing. However, it is accomplished differently and involves enrolling potentially hundreds of target users through e-mail lists and distributed e-mail message systems.

Answers

The term mentioned in the question is "list bombing." It is a technique that is quite similar to e-mail bombing. However, it is accomplished differently and involves enrolling potentially hundreds of target users through e-mail lists and distributed e-mail message systems.

In list bombing, attackers will obtain email addresses and create email addresses in bulk that are often fake, and then add them to a large number of email lists. Through this method, they gain access to the user's email account, and as a result, they receive several emails that they did not opt for. This technique is used to overload email accounts, resulting in lost or delayed legitimate emails. List bombing is a problem because users frequently abandon email accounts as a result of being overwhelmed by unwanted emails, and attackers can later use these accounts to gather information or commit fraud.In conclusion, list bombing is a malicious technique that attackers use to flood target users' email accounts with unwanted emails.

Attackers use this technique to gain access to user's email accounts and later use them to gather sensitive information or commit fraud. It is, therefore, important for email providers to take proactive steps to detect and mitigate this threat to protect their users' email accounts.

To know more about list bombing visit:-

https://brainly.com/question/15087590

#SPJ11

How was the creation of the world wide web browser a stepping stone for future scientific breakthroughs?

Answers

Answer:

Following are the point that described the web browser for the stepping stone as a  future scientific breakthroughs.

Explanation:

Tim Berners Lee was the founder of world wide web .The Tim Berners Lee  is software engineer at CERN they had seen the troubling of exchanging the data .In that time there are various data in various computer .The Tim  Berners Lee  felt he had found the way for resolving this problem and develop a thing so that we can exchange the data in any where .In that time already lots of computer are already linked each other with the high speed of the internet so tim develop a new technology called hypertext .In the March 1989, in a paper titled  known as "Information Management" Tim is developed but this proposal is rejected .In the 1990 Tim is developed the three technology HTML ,URI and  HTTP   with the help of this the world wide web is developed and we can share the information anywhere in the world .The sharing of information in a easy way gives the future bright the person in anywhere in the world will access the data or the information also We cam communicate anywhere in the world by using email .

Give 5 advantages of using powerpoint?​

Answers

it can be presented pictorially and thus make it easier to adopt the material

Which term does the osi model use that's different from the tcp/ip model in reference to the terms frame, packet, and segment?

Answers

The term that OSI model use is protocol data unit (PDU). A PDU is a data unit that includes headers and trailers for the specific layer as well as the encapsulated data.

What is OSI model?

The Open Systems Interconnection (OSI) framework depicts 7 layers that data centers use to connect via a network.

It was the first general framework for network communications, and it was adopted by all major computer and telecommunications companies in the early 1980s.

The term used by the OSI model is data protocol unit (PDU). A PDU is a data unit that includes the specific layer's headers and trailers as well as the encapsulated data.

Thus, the answer is protocol data unit.

For more details regarding OSI model, visit:

https://brainly.com/question/14433133

#SPJ1

Which was a concem raised about the advance of digital and electronic technologies in your course material? Displacement of workforce Security of information Invasion of privacy All of the above Question 44 Kirby Ferguson informs us that the intention of patent law, which is sometimes countermanded by the application of patent law, is... fairly compensate injured parties. allow companies to buy and bury ideas maxamize corporate profits: to promote the progress of useful arts.

Answers

In my course material, concerns raised about the advance of digital and electronic technologies include the displacement of the workforce, security of information, and invasion of privacy.

Regarding Question 44, the intention of patent law, as explained by Kirby Ferguson, is to "promote the progress of useful arts."

What are electronic technologies

Patent laws are designed to encourage innovation and the development of new ideas by granting exclusive rights to inventors for a limited period.

Patent law aims to encourage progress, but sometimes it can have the opposite effect when companies buy and hide good ideas or when it doesn't compensate those who are hurt fairly.

Learn more about  technologies  from

https://brainly.com/question/25110079

#SPJ1

We're sorry, but an error has occurred.
Please contact your uPortal administrator and provide the following information:
Your name and user id
What content were you trying to view when this error occurred?
Any other useful information to help reproduce the error

Answers

Answer:

this looks pretty good

Explanation:

I would write with it

And we will contact you as soon as possible

Which right is an example of an Enlightenment idea?

Which right is an example of an Enlightenment idea?

Answers

The right that is an example of an Enlightenment idea is option B and C:

First amendment freedom of speech guarantees.First amendment freedom of religion guarantees.

Which rights is an example of an Enlightenment idea?

Thinkers of the Enlightenment were more interested in improving the lives of people now than they were in religion or the afterlife. These thinkers cherished what they referred to as "natural rights" such as those of life, liberty, and that of property.

The idea that any political system or any form of government must uphold some fundamental human rights in order to be legitimate is another significant right that is an illustration of an Enlightenment-era concept.

Although these rights differed, some of them recognized men's freedom as well as equality.

Therefore, based on the above, the right that is an example of an Enlightenment idea is option B and C of the freedom of speech and religion guarantees are correct.

Learn more about Enlightenment idea from

https://brainly.com/question/21086796
#SPJ1

Which kinds of sites are not credible because anyone can change the information on them?.

Answers

Answer:

Yes

Explanation:

Non-credible websites may have poor design, broken links, and grammar and spelling errors. They may lack author, date, and/or source information. They will not be associated with credible institutions, organizations, or entities. They may contain unbelievable or incorrect information.

Resolved -The United States Federal Government should ban the collection of personal data through biometric recognition technology.
I need to write a public forum debate case negating this resolution

Answers

Sure, here's a possible case negating the resolution:

Introduction:

Thank you, Mr./Madam Chair, and esteemed opponents. We, the negating team, believe that the United States Federal Government should not ban the collection of personal data through biometric recognition technology. While we acknowledge the concerns raised by the affirming team, we argue that biometric recognition technology has several benefits that outweigh its potential drawbacks.

Contention 1: Biometric recognition technology enhances security and public safety.

Biometric recognition technology enables law enforcement agencies to identify and track criminals, terrorists, and other threats more accurately and efficiently. For instance, facial recognition technology has helped the police to identify suspects in cases of kidnapping, robbery, and terrorism. A study by the National Institute of Standards and Technology (NIST) found that some facial recognition algorithms have a high accuracy rate of up to 99%, especially for high-quality images. Biometric recognition technology can also enhance security in sensitive areas such as airports, government buildings, and military installations, by verifying the identity of individuals before granting access.

Contention 2: Biometric recognition technology facilitates convenience and efficiency.

Biometric recognition technology can also facilitate convenient and efficient transactions and services, both in the public and private sectors. For example, many smartphones, laptops, and other devices now have fingerprint or face recognition features that allow users to unlock their devices, make payments, and access apps without having to remember passwords. This technology can also streamline and speed up processes such as voting, banking, and healthcare by eliminating the need for paper-based forms and identity verification procedures.

Contention 3: Biometric recognition technology is subject to regulation and oversight.

Contrary to the affirming team's claims, biometric recognition technology is not a lawless Wild West. The technology is already subject to several regulations and oversight mechanisms, such as the Privacy Act, the Electronic Communications Privacy Act, and the Fair Information Practice Principles. Additionally, several states, including Illinois and Texas, have passed biometric privacy laws that impose restrictions on how private entities can collect and use biometric data. The federal government can build on these existing regulations and frameworks to ensure that biometric recognition technology is used ethically and responsibly.

Conclusion:

In conclusion, we urge the judges and the audience to consider the benefits of biometric recognition technology, such as enhancing security, convenience, and efficiency, and the existing regulations and oversight mechanisms that can mitigate its potential risks. We believe that a balanced approach that recognizes both the benefits and challenges of this technology is the way forward, rather than an outright ban that would deprive society of its potential benefits. Thank you.

The public forum debate case negating the resolution has been stated below.

What is the federal government?

The national government of the United States is represented by the federal government. The public forum debate case negating the resolution is mentioned as follows:

Introduction:

The United States Federal Government, in our opinion, shouldn't outlaw the collection of personal information using biometric recognition technology, according to the opposing camp. We appreciate the issues stated by the affirmation team, but we contend that there are significant advantages to biometric recognition technology that exceed any possible disadvantages.

First claim: biometric identification technology improves safety and security.

Law enforcement organizations can more precisely and effectively identify and trace criminals, terrorists, and other dangers thanks to biometric identification technology. For example, face recognition technology has assisted law enforcement in locating suspects in kidnapping, robbery, and terrorist situations.

Second claim: Biometric recognition technology promotes efficiency and convenience.

Both in the public and private sectors, biometric recognition technology can enable simple and effective transactions and services. For instance, many modern smartphones, laptops, and other gadgets include face or fingerprint recognition capabilities that let users access apps, pay for items, and unlock their devices without having to remember a password.

Second claim: The use of biometric identification technology is governed and supervised.

The biometric identification technology is not a lawless Wild West, despite what the affirming team asserts. A number of laws and regulatory frameworks, including the Fair Information Practise Principles, the Electronic Communications Privacy Act, and the Privacy Act, already apply to the technology.

Conclusion:

Finally, we implore the judges and the audience to take into account the advantages of biometric recognition technology, such as improving security, ease, and effectiveness, as well as the current legislation and supervision frameworks that can reduce its potential threats.

Learn more about Federal Government here:

https://brainly.com/question/371257

#SPJ2

The fireworks were a lantern in the sky

Answers

Answer:

So your saying thst when a firework blows then it is a big lantern in the sky???

An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking?

A. It shares the company’s plans with competitors, making it transparent and honest.

B. It allows the users to share their experiences with the game on a different platform while the site is down.

Answers

Answer:

I guess it is B

Explanation:

because it allows the user to share their experience

Which guideline should an employee use when taking notes for a report?

Answers

The guideline that  an employee should use when taking notes for a report is to write ideas briefly in your own words, and give the source.

What is the report about?

When taking notes for a report, an employee should use the following guideline: write ideas briefly in their own words and give the source. This means that the employee should summarize information in a concise and clear manner and clearly indicate where the information came from, such as by citing a book, article, or website.

Therefore, This ensures that the report is accurate and properly attributed, and also helps to prevent plagiarism.

Learn more about  report from

https://brainly.com/question/26177190

#SPJ1

How do you choose the best point of view for your own narratives?

Answers

Answer:

If you want to write the entire story in individual, quirky language, choose first person. If you want your POV character to indulge in lengthy ruminations, choose first person. If you want your reader to feel high identification with your POV character, choose first person or close third.

Explanation:

Tyrell is responsible for selecting cryptographic products for his company. The company wants to encrypt the drives of all laptops. The product they have selected uses 128-bit AES encryption for full disk encryption, and users select a password to decrypt the drive. What, if any, would be the major weakness in this system

Answers

The major weakness in this system is the potential vulnerability of user-selected passwords, which can be easily guessed or cracked by attackers.

While 128-bit AES encryption is considered secure, the strength of the encryption is only as good as the password chosen by the user. If users choose weak passwords, such as common words or easily guessable phrases, attackers could potentially crack the password and gain access to the encrypted data.

Additionally, if the password is stolen or intercepted by keylogging malware, it could also compromise the security of the system.

To mitigate this risk, companies should enforce strong password policies and consider using additional factors, such as multi-factor authentication or biometric authentication, to enhance the security of the system.

For more questions like Encryption click the link below:

https://brainly.com/question/30652694

#SPJ11

Which statement best describes the purpose of SmartArt graphics in PowerPoint presentations?

They are used to create different-sized text fonts.
They are a simplified way to create bar and line graphs.
They are an easy mechanism for combining text and graphics.
They are a method used to find infographics online.

Answers

Answer:

They are an easy mechanism for combining text and graphics.

Explanation:

There is a huge demand for cyber security professionals. True or false

Answers

True.
Thank You!
Please mark Brainliest

Answer: True. The demand for cyber security professionals has raised significantly as data breaches increase each year.

while t >= 1 for i 2:length(t) =
T_ppc (i) (T water T cork (i- = - 1)) (exp (cst_1*t)) + T cork (i-1);
T cork (i) (T_ppc (i) - T pet (i- = 1)) (exp (cst_2*t)) + T_pet (i-1);
T_pet (i) (T cork (i)
=
T_air) (exp (cst_3*t)) + T_air;
end
T final ppc = T_ppc (t);
disp (newline + "The temperature of the water at + num2str(t) + "seconds is:" + newline + T_final_ppc + " Kelvin" + newline + "or" + newline +num2str(T_final_ppc-273) + degrees Celsius" + newline newline);
ansl = input (prompt, 's');
switch ansl case 'Yes', 'yes'} Z = input (IntroText); continue case {'No', 'no'} break otherwise error ('Please type "Yes" or "No"')
end
end

Answers

The given code describes a temperature change model that predicts the final temperature of water based on various input parameters such as the temperatures of cork, pet, and air.

It appears that you are providing a code snippet written in MATLAB or a similar programming language. The code seems to involve a temperature calculation involving variables such as T_ppc, T_water, T_cork, T_pet, and T_air. The calculations involve exponential functions and iterative updates based on previous values.

The model uses a set of equations to calculate the temperature changes for each component.

The equations used in the model are as follows:

T_ppc(i) = (T_water – T_cork(i-1)) * (exp(cst_1 * t)) + T_cork(i-1)T_cork(i) = (T_ppc(i) – T_pet(i-1)) * (exp(cst_2 * t)) + T_pet(i-1)T_pet(i) = (T_cork(i) – T_air) * (exp(cst_3 * t)) + T_air

These equations are implemented within a for loop, where the input variables t, T_water, T_cork, T_pet, cst_1, cst_2, cst_3 are provided, and the output variable T_final_ppc represents the final temperature of the water after the temperature change.

Additionally, the code includes a prompt that allows the user to enter "Yes" or "No." Choosing "Yes" continues the execution of the code, while selecting "No" stops the code.

Overall, the code simulates and predicts the temperature changes of water based on the given inputs and equations, and offers the option to continue or terminate the execution based on user input.

Learn more about MATLAB: https://brainly.com/question/13715760

#SPJ11

which format of image files can be inserted in html?​

Answers

GIF (Graphics Interchange Format)

Hope it helps you

Which sentence combines information about both passages (tricky tomatoes and killer tomatoes)

Answers

The fact that tomato plants constantly communicate about insects describes tomatoes as both killer and tricky tomatoes.

Which claim is corroborated by deadly and difficult tomatoes alike?

The attack on the housewife by the tomato that starts the movie. The fact that what the police initially thought was blood was actually tomato juice intrigues them. Attacks are becoming more frequent, so the government steps in.

What Is Tomatoes Sentence?

Letters create words, and then words create sentences. In most cases, a sentence finishes with a full stop and always starts with a capital letter. The Naming and Doing components of a sentence are always present.

To know more about tricky tomatoes visit :-

https://brainly.com/question/21335974

#SPJ4

if the dispersion of returns on a particular security is very spread out from the security's mean return, the security . multiple choice question. is highly risky is risk-free has a low level of risk

Answers

Answer:

highly risky

Explanation:

If the dispersion of returns on a particular security is very spread out from the security's mean return, the security  is highly risk

What is meant by dispersion of returns ?

Dispersion in finance refers to a range of potential returns on an investment. It is a tool to assess how risky an investment is. It is a dangerous investment if the dispersion is large because there are several possible values for the return on that investment.

The range of distribution of information regarding an expected value is referred to as dispersion. It displays the relationship between the distribution and the reference point or centre value. When determining the quality, volatility, and yield of data for any statistical observation, it is a crucial consideration.

Dispersion is a statistical word that describes the magnitude of the expected value distribution for a given variable.

To learn more about dispersion refer to :

https://brainly.com/question/29560631

#SPJ4

The current chief executive and financial officers have only been employed by ABC Company for the past five months of year 2. ABC Company is presenting comparative financial statements on Years 1 and 2, both of which were audited by William Jones, CPA. For which year( s) should Jones obtain written representations from these two individuals?

Answers

Answer:

Explanation:

Jones should obtain written representations from the current chief executive and financial officers for Year 2

Written representations are obtained to confirm the completeness and accuracy of financial statements and to ensure that all necessary information has been disclosed. In this scenario, since the current chief executive and financial officers have only been employed for the past five months of Year 2, they can provide representations for their tenure during that year.

As the financial statements for both Year 1 and Year 2 are being presented, it is important to obtain written representations specifically for Year 2 to ensure that any changes or significant events during that period are properly addressed and disclosed in the financial statements.

By obtaining written representations from the individuals for Year 2, it helps to provide a comprehensive and accurate representation of the financial statements for that specific period.

Learn more about the importance of obtaining written representations from key individuals to support the accuracy and completeness of audited financial statements.

https://brainly.in/question/48936475

#SPJ11

A bank wants to reject erroneous account numbers to avoid invalid input. Management of the bank was told that there is a method that involves adding another number at the end of the account numbers and subjecting the other numbers to an algorithm to compare with the extra numbers. What technique is this

Answers

Answer:

validity check

Explanation:

validity check

Quick!
who can solve this?

:}
:}
:}
:}
:}​

Quick!who can solve this?:}:}:}:}:}

Answers

Answer:

1.server

2.container

3.empty

4.lead

5.body

6.conttribute

i just know this much

sry

In Word you can _____ or merge two different copies of the same document into one document. a. replicate b. duplicate c. copy d. combine

Answers

D) combine
combine and merge are synonyms of each other.
hope this helps x

If you mistakenly undo an action, how do you correct your mistake?
a. press CTRL+R
b. click the redo button in the quick access toolbar
c. click the undo button in the quick access toolbar
d. press CTRL+Z

Answers

If you mistakenly undo an action  press CTRL + Z in order to correct your mistake.

Option D is correct.

What functions do the undo and redo commands serve?

Press Ctrl + Z to undo an action; press Ctrl + Y to redo an undone action. The Undo and Redo features allow you to remove or repeat single or multiple typing actions; however, you can only undo or redo actions in the order in which you did them; you are unable to skip actions.

Undo :

Undo is a method of interaction that is used by many computer programs. It restores the document to an earlier state by erasing the most recent modification. Undo will overwrite the last command that was executed on the file that is being edited in some more advanced programs, like graphic processing software.

Learn more about CTRL + Z:

brainly.com/question/29386414

#SPJ4

Question 3 (8 marks): Write a program that takes a string from the user and splits it into a list using a space (" ") as the delimiter. Do not use split(). Print the result. Hints: Use a for loop to loop through the string. Keep track of the index of the last part of the string that you "split". When you reach a space, you know to split again. Use string slicing to get the portion of the string that you want.

Answers

Answer:

In Python:

mystr = input("Sentence: ")

mylist = []

word = ""

for i in range(len(mystr)):

   if not i == len(mystr)-1:

       if not mystr[i] == " ":

           word+=mystr[i]

       else:

           mylist.append(word)

           word = ""

   else:

       word+=mystr[i]

       mylist.append(word)

print(mylist)

Explanation:

Prompt the user for an input sentence

mystr = input("Sentence: ")

Initialize an empty list

mylist = []

Initialize each word to an empty string

word = ""

Iterates through the input sentence

for i in range(len(mystr)):

If index is not the last, the following if condition is executed

   if not i == len(mystr)-1:

If the current character is not space

       if not mystr[i] == " ":

Append the character to word

           word+=mystr[i]

If otherwise

       else:

Append word to the list

           mylist.append(word)

Set word to an empty string

           word = ""

If otherwise; i.e. If index is not the last

   else:

Append the last character to word

       word+=mystr[i]

Append word to the list

       mylist.append(word)

Print the list

print(mylist)

Choose the correct option. i) An object thrown from a moving bus is on example of
(A) Uniform circular motion
(B) Rectilinear motion
(C) Projectile motion
(D) Motion in one dimension​
age

Answers

PROJECTILE MOTION

The answer is option C: "Projectile motion."

Projectile motion refers to the motion of an object that is thrown or launched into the air and follows a parabolic path under the influence of gravity. An object thrown from a moving bus is an example of projectile motion because it is launched into the air and follows a curved path due to the force of gravity.

Option A: "Uniform circular motion" refers to the motion of an object moving in a circular path at a constant speed.

Option B: "Rectilinear motion" refers to the motion of an object moving in a straight line.

Option D: "Motion in one dimension" refers to motion that occurs along a single straight line, rather than in two or three dimensions.

Hope This Helps You!

Other Questions
The supply decisions of firms is the topic of Module 2, but the competitiveness of a market plays an important role in explaining the supply decisions of firms. What is meant by "the competitiveness of markets" and how does it impact the economic analysis of firms? Specifically, how is the upward-sloping supply curve of a competitive market determined by the level of competitiveness in a market? Solve for x: one over four (4x + 15) = 24 Which skill are you using when you useyour five senses to gather information?A posing questionsB. observingC. developing hypothesesD. designing experiments I need a answer by 6:00pm Calls received by a car rescue service occur independently and at a constant average rate of 3 per minute.a. Find the probability that, in a randomly chosen period of 1 minute, the number of calls received by the service is(1) at most 3 (II) at least 3(III) between 2 and 5 (inclusive)b. Find the probability that, in a randomly chosen period of 2 minute, the number of calls received by the service is at most 5. The middle way refers to the A. Scandinavian response to the Great Depression. B. reform of German reparations payments. C. new literary efforts of writers such as Joyce and Faulkner. D. British Liberal party. 7. Use the Division Algorithm to establish that the fourth power of any integer is either of the form 5k or 5k+1 Which colony was the settlement at Roanoke island attempted suppose that a new experiment consists of first rolling a die and then tossing a coin twice. let b be the event that the first and second coin tosses land on heads. let c be the event that either a three or a four is rolled first, followed by landing a head on the first coin toss. are the events b and c mutually exclusive? How was the NAACP involved with political matters (give examples)? What is the purpose of the quotation at the beginning of the chapter?to provide answers to topic questions and essaysto help readers better understand the purpose of the passageto summarize all of the information in the paragraphs after itto capture readers attention with a witty and funny introduction a self-fulfilling prophecy causes a person to act in a way that: fits the person's beliefs about herself. makes that person unlikeable to others. is in accordance with others' expectations of that person. leads others to expect that person to be smarter than she actually is. Ephedrine and amphedamine_________________________ Which two countries lost the smallest percentage of their populations? the UK and Russia Italy and the US the US and the UK Italy and France. I need help with question 1 Solve the equation.2(3x 1) = 5 (x + 3) Write a number using the following clues:a multiple of 6greater than 40, but less than 90 what is the variable term for for the experetion 1-3m+14 3 Write the expression cos in the form a+bi. 4 15 3 [cos ()+ i sin () - (Type an exact answer, using radicals as needed. Use integers or fractions for any numbers in the expression.) + i sin 4 Solving equations with fractions- how do i solve this Someone help needed!!