juan, a cybersecurity expert, has been hired by an organization whose networks have been compromised by a malware attack. after analyzing the network systems, juan submits a report to the company mentioning that the devices are infected with malware that uses a split infection technique on files. which malware attack is juan reporting?

Answers

Answer 1

Juan sends a report to the business saying that the computers have malware on them that uses the split infection method to attack files. He reported a virus attack.

What is the most common usage of malware that can conceal its goals inside other processes and remain undetected?

Rootkit is a type of malware that modifies the operating system's processes by accessing undocumented functionalities or the operating system's lower layers.

What exactly is cybersecurity, and how can you prevent cybercrime?

Layers of defense are included in a solid cybersecurity plan to combat cybercrime, such as attempts to access, modify, or delete data; demand money from users or the organization; or obstruct regular business activities.

To learn more about cybersecurity visit:

brainly.com/question/24856293

#SPJ4


Related Questions

Sydney Bark is twenty-three years old, and is looking forward to celebrating her birthday on April 12. For her birthday, she saved up to buy a new computer, and now she must come up with a password for it.
What is the best password for Sydney to use?

Sydney Bark is twenty-three years old, and is looking forward to celebrating her birthday on April 12.

Answers

Answer:

a future date

Explanation:

Because most people when trying to guess a password, start with basic ones like: 1234,abcde, password,l and dates (like their birthday). whereas, the person would never guess it was a future date like when the person would be 30 or when they are going on a trip .

Answer: Its B or Second one

Explanation:

Correct  edge 2021

Which of the following WAN technologies provides digital dial-up connections on two 64 Kbps data channels? a. X.25 b. ISDN c. BRI d. ATM e. Frame relay

Answers

The WAN technology that provides digital dial-up connections on two 64 Kbps data channels is ISDN.

ISDN (Integrated Services Digital Network) is a telecommunications technology that was widely used in the past for transmitting voice, video, and data over digital telephone lines. It provided faster and more reliable communication compared to traditional analog systems.

ISDN offered a range of services, including:

1. Basic Rate Interface (BRI): BRI was a type of ISDN connection commonly used for residential and small business purposes. It consisted of two 64 kilobits per second (Kbps) bearer channels for voice or data transmission and one 16 Kbps signaling channel for call setup and control.

2. Primary Rate Interface (PRI): PRI was designed for larger organizations and provided more capacity than BRI. It typically consisted of 23 bearer channels, each operating at 64 Kbps, and one 64 Kbps signaling channel.

ISDN had several advantages over traditional analog systems, including:

1. Digital Transmission: ISDN allowed for the transmission of voice, data, and video in a digital format, resulting in higher quality and clarity compared to analog systems.

2. Faster Connection Setup: ISDN enabled quicker call setup times compared to analog systems, as the signaling channel facilitated faster connection establishment.

3. Channel Flexibility: ISDN allowed for the dynamic allocation of bearer channels, meaning that additional channels could be added or removed based on the specific needs of a call or data transfer.

However, with the advent of more advanced and efficient technologies such as broadband internet and Voice over IP (VoIP), the use of ISDN has significantly declined. Many telecommunications providers have phased out ISDN services in favor of newer technologies that offer greater bandwidth and flexibility.

It's worth noting that as of my knowledge cutoff in September 2021, ISDN is still used in some regions or specific industries, but its overall usage has diminished.

Learn more about ISDN:https://brainly.com/question/14752244

#SPJ11

you need to create a user account via the useradd utility. after checking this distribution's account creation configuration files, you discover that the home directive points to a different location than desired. which useradd option will allow you to create the home in an alternative location?

Answers

The useradd option that will allow you to create the home in an alternative location when creating a user account via the useradd utility is -d

What is the useradd command?

The useradd command is the most basic method through which you can add a user on a Linux OS. In a useradd command, there are so many options to choose from when adding or creating a new user account. They include: -d, -r -u -G jellyfin etc.  

Learn more on Useradd command from:

https://brainly.com/question/28635202?referrer=searchResults

#SPJ4

Please help me with coding!

Please help me with coding!

Answers

Answer:

key code space

Explanation:

the transformation

The answer is the third question

What software maintain and increase the efficiency of a computer system?

Answers

Answer:

Computer maintenance software

Explanation:

Computer maintenance software perform optimization tasks such as the removal of files that are not used in the operation of the system or by the applications in the system such as memory dumps, temporary files, and old log files

Computer maintenance software can also perform cleaning of the registry of the computer such that clutter in the computer registry is removed

You begin the installation process and discover that you need to load additional drivers to support your storage controller so that Windows can write to that disc. What should you do?
Allow Windows to find the necessary drivers.
Insert or connect to the installation media and boot from that media.
Remove all drivers and restart.
Load the necessary drivers from a USB drive.

Answers

To support the storage controller, you need to allow Windows to find the necessary drivers. Option A

How to load additional drivers

If you need to load additional drivers to support your storage controller during the installation process, you should load the necessary drivers from a USB drive.

This is done by following the instructions provided by the manufacturer of the storage controller, which typically involves downloading the driver files from their website, copying them onto a USB drive, and then selecting the option to load drivers during the installation process.

Allowing Windows to find the necessary drivers may not always be possible, and removing all drivers and restarting is not a recommended solution.

Booting from installation media is also a valid option, but may not always be necessary.

Read more about additional drivers at: https://brainly.com/question/30034916

#SPJ1

What are the requirements to access email on the web?

A. a webmail provider's URL and a password
B. a webmail provider's URL a username and a password
C. a credit or debit card, a username, and a password
D. an email server ID and a password

Answers

Answer:

it's B

Explanation:

You need to have a provider (such as outlook) and a username/password

It’s either A or D u Choose now

Furthermore, advanced techniques like _____ _____ can analyze language usage, faces, locations, and other items to match a unique individual

Answers

One advanced technique that can be used to analyze language usage, faces, locations, and other items to match a unique individual is called biometric identification.

This technique uses various physical and behavioral characteristics of an individual, such as fingerprints, facial features, and speech patterns, to identify and verify their identity. With the help of sophisticated algorithms and advanced technologies, biometric identification can accurately match individuals even in complex situations. This technique is widely used in security systems, border control, and other industries where accurate identification and authentication are critical. Overall, biometric identification is a powerful tool that can help to improve security, reduce fraud, and streamline various processes.

learn more about biometric identification.  here:

https://brainly.com/question/30320941

#SPJ11

Who designed the apple i computer in 1976?

steve wozniak

richard stallman

paul allen

konrad zuse

Answers

Steve Wozniak

An Apple 1 at the Computer History Museum, Mountain View. demonstrated the first Apple Computer that he designed and hand-built at the Homebrew Computer Club in Menlo Park, California in July 1976

Answer:

Steve Wozniak

Explanation:

It said the computer is made by apple, Which was started by Steve Jobs and Steve Wozniak,

Paul Allen helped start Microsoft

Richard stallman worked for MIT

Konrad Zuse started Zuse KG

Display a program that accepts the length and width of rectangle it should calculate and display its area

Answers

A program that accepts the length and width of a rectangle it should calculate and display its area is given below'

The Program

# Python Program to find Perimeter of a Rectangle using length and width

length = float(input('Please Enter the Length of a Triangle: '))

width = float(input('Please Enter the Width of a Triangle: '))

# calculate the perimeter

perimeter = 2 * (length + width)

print("Perimeter of a Rectangle using", length, "and", width, " = ", perimeter)

The Output

Please Enter the Length of a Triangle: 2

Please Enter the Width of a Triangle: 2

preimeter of a rectamgle is 8.0

preimeter of a rectamgle is 4.0

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

What is a good first step to understanding any kind of text?

A. Create meaning
B. Find the main idea
C. Take some notes
D. Focus on details​

Answers

Answer:

thanks , that's really useful

Answer:
D. Focus on details

Explanation:
Another Brainly post has the answer

How does the payload free worm method differ from the payload method?

Answers

A worm is a type of computer virus that is self-replicating and can spread throughout a network or the internet. It is a self-contained program that can replicate and spread without the need for a host file. Payload is a program or code that is hidden within the worm and executed on an infected computer.

These payloads can cause damage to the infected system, steal data, or launch additional attacks on other systems or networks. The payload-free worm is a worm that replicates and spreads like a traditional worm but does not contain any payload or malicious code.

It does not cause any damage to the infected system or network. This type of worm is often used for research purposes to study the spread of worms without causing harm to any system. The payload method is a worm that has a hidden code that is designed to cause damage to the infected system or network.

The payload can be programmed to perform various functions, including deleting files, stealing data, launching attacks on other systems, or installing additional malware. This type of worm is often used by cybercriminals to launch attacks on specific targets or to spread malware for financial gain.

For more such questions Payload,Click on

https://brainly.com/question/30144748

#SPJ8

Today, scientists agree that good research is ethical in nature and is guided by basic respect for human dignity and safety. However, as you read in the Tuskegee Syphilis Study, this was not the case. Discuss any THREE (3) the ethical violations in the study

Answers

Answer:

Ethical violations in the Tuskegee Syphilis Study

1)  Discrimination. Syphilis was recognized as a disease with a major impact on the afro-descendant and in poor conditions population. The studied population was not treated fairly, they were selected from a vulnerable group. Against the bioethical principles of justice.

2) The ethical principle of beneficence was violated since the participants did not have a real benefit from their participation and in the case of the sick people, they had no option to be treated (in 1947 penicillin was already used as a treatment).

Due to the ignorance of the study, the general population was affected by the transmission of the infectious disease.

3) There was no informed consent against the autonomy principle of clinical Ethic. People were studied for about 40 years (1932 - 1972) with no information about it.

Explanation:

It was a study conducted by the Public Health Service in the city of Tuskegee (Alabama). The objective was the study of the natural progression of syphilis.

The controversies regarding this study were related to the fact that it was conducted in an African American and literate population that was not informed and did not have access to treatment.

Your supervisor has asked you to configure a new system using existing configurations. He said to use either an ARM template or a blueprint. What would you suggest and why? When do you think it is appropriate to use an ARM template and when is it not?

Answers

If precise control over infrastructure configuration is needed, use an ARM template. If enforcing standards and ensuring consistency is the priority, opt for Azure Blueprints.

When considering whether to use an ARM template or a blueprint for configuring a new system using existing configurations, the choice depends on the specific requirements and circumstances of the project.

Here are some considerations for each option:

ARM Templates:

1. ARM templates are Infrastructure as Code (IaC) templates used to define and deploy Azure infrastructure resources. They provide a declarative approach to provisioning resources.

2. Use ARM templates when you need precise control over the infrastructure configuration, including virtual machines, networking, storage, and other Azure services.

3. ARM templates are beneficial when you require version control, repeatability, and scalability for infrastructure deployments.

4. They allow for automation and rapid provisioning of resources, making it easier to manage and maintain infrastructure deployments.

Blueprints:

1. Azure Blueprints are used to create and manage a collection of Azure resources that can be repeatedly deployed as a package.

2. Use blueprints when you want to enforce compliance, governance, and organizational standards across multiple deployments.

3. Blueprints are suitable for scenarios where you need to ensure consistency and security compliance within a specific environment or for specific types of workloads.

4. They enable centralized management and governance, allowing organizations to maintain control over deployments and ensure compliance with regulations.

The choice between ARM templates and blueprints ultimately depends on the specific needs of the project. If the focus is on infrastructure provisioning and customization, ARM templates provide granular control.

On the other hand, if the emphasis is on governance, compliance, and enforcing standards, blueprints offer a higher level of abstraction and central management.

It is appropriate to use ARM templates when you require flexibility, customization, and fine-grained control over the infrastructure. However, if the primary concern is enforcing standards and ensuring consistency across deployments, blueprints would be a more suitable choice.

In summary, evaluate the project requirements in terms of infrastructure control versus governance needs to determine whether to use an ARM template or a blueprint for configuring the new system using existing configurations.

Learn more about Blueprints:

https://brainly.com/question/4406389

#SPJ11

if you were giving a presentation there were 35 people in the room including yourself and you were to shake every person's hand in the room would you shake 35 hands. is it true or false?​

Answers

Answer:

False, unless you were to shake your own hand.

Explanation:

question 10 a video conferencing application isn't working due to a domain name system (dns) port error. which record requires modification to fix the issue?

Answers

Serving history (SRV) record requires modification to fix the issue. IP addresses are resolved via address records, sometimes referred to as host records.

Service records (SRV records) are data records that specify DNS parameters such as the port numbers, servers, hostnames, priorities, and weights of defined or cataloged services servers, as well as their IP addresses. The SRV record is the source of information, and the search engine will use it to determine where specific services are located when a user's application requests them. The ports and unique settings for a new email client come from a configured SRV; otherwise, the email client's parameters will be off. Using the Dynamic Host Configuration Protocol (DHCP), a server can automatically choose an IP address for a computer from a predetermined range of numbers (i.e., a scope) established for a certain network.

Learn more about service here-

https://brainly.com/question/12096912

#SPJ4

What will help the programmer understand what’s going on in the program?

Answers

Answer:

Programming languages to help solve algorithms

Explanation:

The first step to keeping your home safe is to minimize the overall amount of _______________ materials you store in your home. (9 letters)

Answers

Answer: Hazardous

Explanation: Hazardous materials should be kept somewhere safe.

Answer:

i believe it would be dangerious

Explanation:

What happens if u get too many warnings?

Answers

Answer:

Too many warnings in a short period of time can result in your auto insurance company recognizing.

Which user interface part shows graphical output of mined data?

Which user interface part shows graphical output of mined data?

Answers

Answer:

Screen real estate

Explanation:

Im trying it on Plato. Not sure if its correct but its my last hope!

Answer:

screen

Explanation:

got it right on plato

a city government would like to make their streets more bike-friendly with features such as protected bike lanes. however, government officials are concerned about the effect on traffic flow. they hire a software consultant agency to develop a simulation of the traffic after the proposed changes.what are the most likely benefits of creating a computer simulation of the proposal?

Answers

Creating a computer simulation can help city officials make informed decisions about the proposed changes, potentially save costs and time, and improve accuracy in predicting the impact of the changes on traffic flow.

There are several benefits of creating a computer simulation of the proposed changes to the city's streets:

Predictive analysis: A computer simulation can accurately predict the effects of the proposed changes on traffic flow, which can help city officials make informed decisions about the feasibility of the project.

Cost savings: Conducting a simulation is usually less expensive and less time-consuming than implementing the changes in real life. By conducting a simulation, officials can identify potential problems and make adjustments before committing resources to the project.

Improved accuracy: A computer simulation can provide more accurate results than traditional analytical methods. The simulation can incorporate complex traffic patterns, road layouts, and other factors that may not be captured by simple mathematical models.

Testing different scenarios: The simulation can be used to test different scenarios, such as changing the design of the bike lanes or adjusting traffic signals, to determine the best course of action.

Visual representation: A simulation can provide a visual representation of the proposed changes, making it easier for officials to understand the impact of the changes on traffic flow.

For more question on computer simulation click on

https://brainly.com/question/23274872

#SPJ11

I=5
While I <=20
TextWindow.Write (A + " " )
I = I + 6
EndWhile

Answers

The code provided is a simple example of a while loop written in the BASIC programming language. The loop uses a counter variable 'I' to execute a block of code repeatedly until a specific condition is met.

In this particular example, the loop initializes the variable 'I' to 5, and then executes a block of code that writes the value of a variable 'A' to the console using the TextWindow.Write method. After writing the value to the console, the loop increments the value of 'I' by 6.The loop continues to execute the code block and increment the value of 'I' until the condition 'I <= 20' is no longer true. This means that the loop will execute as long as the value of 'I' is less than or equal to 20. Once the value of 'I' becomes greater than 20, the loop terminates, and the program moves on to the next line of code.

To learn more about while loop click the link below:

brainly.com/question/15091477

#SPJ1

If a driver update creates a problem, you can __________________ the driver update if the previous drivers were working.

Answers

Answer:

rollback the driver update if the previous drivers were working

Radha is using nslookup to troubleshoot DNS-related issues on SERVER1. She uses the command prompt and types in the statement nslookup servery. Zone1. Com. SERVER1 returns an incorrect result. If SERVER1 is non-authoritative for this lookup, what should Radha do to resolve this issue?

A) Ensure that the configuration of any stub zones is correct

B) Configure the IP address of the correct DNS server in network interface properties on the resolver

C) Modify the associated records in the zone on SERVER1 to include the correct information

D) Clear the DNS Server cache, and clear the DNS cache on the resolver

Answers

Answer:

Clear the DNS Server cache, and clear the DNS cache on the resolver

Explanation:

How do I manually update my HP printer firmware?

Answers

Choose Setup, Service, or Setting tab from control panel. Click Tools, Printer Maintenance, or Preferences. Pick LaserJet Update, Printer Update, or Web. If i get any advice to enable Web Services, heed them.

Are inexpensive printers worth it?

It's important to think about how long your cartridges survive and the amount they end up costing over time when looking for a printer with affordable ink. The more expensive, less cost-effective printers are frequently justified in some cases because of their much greater page yields.

What wireless printers are worth?

If you're on the road, using a wifi dongle that depends on a hands-free device is easier. The fact that there isn't any installation needed means that you will surely save myself a lot of money. They work within any home or company's financial constraints.

To know more about Printer visit:

https://brainly.com/question/17136779

#SPJ4

Explain how SEO impacts the way you should interpret search engine results ???

Answers

Answer:

For the majority of businesses, the goal of SEO is to gain leads from search engines, by:

Increasing organic traffic. Increasing keyword rankings. Ranking for more keywords.

Puede pasar de un estado de bloqueo a un estado de conducción en ambos sentidos de polarización, aplicando un pulso de tensión en la puerta.

Answers

Answer:s

Explanation:n

studying computer science is really worth it for future?​

Answers

Yes, a computer science degree is worth it for many student also they make 74,762 annual salary
Yes, it is a vital job and they make very good money

The perusal activity is individual work. The activity must be submitted in the drop box through TURN-IT-IN. Note the key aspects which is the rubric/criteria below, for which the activity marks will be allocated. Activity Objectives: Address all key aspects of the activity: a. Summarize global growth scenario 2020 and 2022 b. Identify key events that have contributed to global growth scenario. c. Explain macroeconomic actions countries have taken in response Note: That you must adhere to proper referencing (APA style). Activity must be typed in WORD format, Times New Roman, 1.5 line spacing and 12 font) Resources: World Economic Outlook Update Jan 2020 World Economic Outlook Update July 2022 Other credible sources) Global growth had been revised downwards for 2019-2020 and for 2021-2022. Peruse through Jan 2020 Economic Outlook Update and the July 2022 Economic Outlook Update and do the following: i) Write a paragraph each explaining global growth scenario for 2020 and 2022 (100 words each) [12 marks] ii) For each Economic Outlook: a) Cite three key events that have impacted global growth potential. [24 marks] b) Discuss three actions major countries have taken and are taking in response [24 marks]

Answers

General understanding of global growth scenarios and some examples of key events and macroeconomic actions that have influenced them. You can use this information as a starting point and conduct further research to complete the activity.

Global Growth Scenario:

In the January 2020 Economic Outlook Update, the global growth scenario for 2020 was revised downwards due to various factors such as trade tensions, geopolitical uncertainties, and subdued investment. Economic growth was expected to be moderate, with risks tilted to the downside.

In the July 2022 Economic Outlook Update, the global growth scenario for 2022 had also been revised downwards, primarily due to the impact of the COVID-19 pandemic. The pandemic led to disruptions in global supply chains, reduced consumer spending, and weakened business investments, contributing to a decline in global growth prospects.

Key Events Impacting Global Growth:

1. Trade Wars: The ongoing trade tensions between major economies, such as the United States and China, have had a significant impact on global growth. Tariffs and trade restrictions have disrupted international trade, leading to reduced business confidence and investment.

2. COVID-19 Pandemic: The emergence of the COVID-19 pandemic in 2020 had a profound impact on the global economy. Lockdown measures, travel restrictions, and reduced consumer activity resulted in a sharp contraction in economic activity across various sectors.

3. Policy Responses to the Pandemic: Governments and central banks implemented various fiscal and monetary policies to mitigate the economic impact of the pandemic. These measures included stimulus packages, interest rate cuts, and liquidity injections to support businesses, households, and financial markets.

Macro-economic Actions by Major Countries:

1. Fiscal Stimulus: Governments implemented expansionary fiscal policies by increasing public spending, providing financial assistance to affected industries, and implementing tax relief measures to stimulate economic growth.

2. Monetary Policy Easing: Central banks employed accommodative monetary policies by reducing interest rates, implementing quantitative easing programs, and providing liquidity support to banks to encourage borrowing, investment, and lending.

3. Structural Reforms: Some countries initiated structural reforms aimed at improving competitiveness, attracting investments, and enhancing productivity. These reforms focused on areas such as labor market flexibility, taxation, regulatory frameworks, and infrastructure development.

Remember to reference your sources using APA style and ensure that the content you provide aligns with the specific resources mentioned in your assignment instructions.

Learn more about macroeconomic here:

https://brainly.com/question/28489802

#SPJ11

tell me your thoughts about cryptocurrency and blockchain
accounting.
Can
we rely on cryptocurrency?
Do
you think this is our future or just a fad?
How
comfortable would you feel if you were"

Answers

In conclusion, I believe that cryptocurrency and blockchain accounting are innovative technologies that have the potential to transform the way we do business. If I were in a position to use cryptocurrency, I would feel comfortable using it if I understood it well and trusted the source.

Cryptocurrency is a new technological innovation that has revolutionized the monetary exchange industry. A cryptocurrency is a digital or virtual currency that uses cryptography for security. The most famous cryptocurrencies are Bitcoin, Ethereum, Ripple, and Litecoin. Cryptocurrency has become a hot topic, and people are still trying to figure out how to rely on it and whether it is the future or just a fad.

Blockchain accounting is an online ledger that tracks the history of transactions. Blockchain technology has been critical to the development of cryptocurrency. The decentralization and transparency of blockchain accounting make it an excellent tool for tracking and verifying transactions. Blockchain accounting is tamper-proof, making it very reliable.

Learn more about blockchain: https://brainly.com/question/30793651

#SPJ11

Other Questions
50 Pts! What is the value of the expression 4(80 + b) - 12 Where b = 20? Even those who don't think they are born with a natural talent for music can benefit the supreme court has ruled that it is unconstitutional to execute someone who committed his/her crime when he/she was under 18 years old Which of the following statements is NOT true about Calcium?A. Broccoli is a good source of CalciumB. It helps maintain healthy teethC. It helps maintain healthy bonesD. Calcium is a vitamin, not a mineral DQuestion 411 ptsTelophase is accompanied by the division of cytoplasm between two daughter cells. What is thisprocess called?O ProphaseO CytokinesisO InterphaseO Synthesis phase Find the next two terms in this sequence. -900, 300,-100,_,_? Please I need help For a demonstration, a science teacher needs a liquid alkali and a liquid acid. The diagram shows the proportional relationship between the number of beakers filled with alkali and the number of beakers filled with acid needed for the demonstration. What is the constant of proportionality in terms of beakers of acid per beaker of alkali? Which activity is best described as a scientific endeavor? a. researching historical data to inform plans for preventing floods caused by hurricanes b. developing and testing devices used to measure the strength of hurricanes c. inventing technology that can be used to help buildings withstand hurricanes d. designing investigations to predict the effects of hurricanes usdfryzhguwhat is america The figure shows an isosceles right triangle. What is the length of the hypotenuse? Show your work. (Related to Checkpoint 6.5) (Present value of a growing perpetuity) What is the present value of a perpetual stream of cash flows that pays $6,000 at the end of year one and the annual cash flows grow at a rate of 4% per year indefinitely, if the appropriate discount rate is 8%? What if the appropriate discount rate is 6%? a. If the appropriate discount rate is 8%, the present value of the growing perpetuity is $ (Round to the nearest cent.) Imagine that a classmate is claiming that one gender is smarter than the other and that one racial or ethnic group is smarter than others. Using the evidence presented in Psychology for AP second edition, write a response to this student. Be sure to discuss what psychologists believe in relation to these claims. Milton Industries expects free cash flows of $20 million each year. Milton's corporate tax rate is 22%, and its unlevered cost of capital is 16%. Milton also has outstanding debt of $26.48 million, and it expects to maintain this level of debt permanently. a. What is the value of Milton Industries without leverage? b. What is the value of Milton Industries with leverage? a. What is the value of Milton Industries without leverage? The value of Milton Industries without leverage is $ million. (Round to two decimal places.) b. What is the value of Milton Industries with leverage? The value of Milton Industries with leverage is $ million. (Round to two decimal places.) After a nasty fall off his homebuilt "lawnchair rocket", Johnny Notsobright lost a lot of blood and he was admitted to the hospital emergency ward. With his bad luck, Johnny (who is blood type \( \mat evaluate without a calculator: tan (sin-1 (( 7)/7) Ratio..A candy store sells snacks by weight. A six ounce bag of candy cost $3.60. Predict the cost of a 2ounce bag. How many solutions does the equation y = -2x2 - 7x + 5 have? Which plants were introduced to Europe from the Americas? Question 2 options: potatoes, tomatoes, corn wheat, sugarcane And orange contains 100 mg of vitamin C. It is recommended for a person to eat up to 2000 mg of vitamin C in a day. If you eat seven or just throughout the day what percent of your daily intake of vitamin C did you eat. Round to the nearest whole percentA. 17%B.35%C.49%D.5% Hello! Can someone help me please? Thank you so much!