ou begin your first day of responsibilities by examining the recent IS security breach at GearUp to get ideas for safeguards you will take. At GearUp, criminals accessed the company's improperly-secured wireless system and stole customers' credit card information as well as employee social security numbers. What kind of computer crime did GearUp face

Answers

Answer 1

GearUp faced the computer crime of "Unauthorized Access" or "Unauthorized Intrusion."

What kind of computer crime did GearUp experience when criminals accessed their improperly-secured wireless system and stole customer credit card information and employee social security numbers?

The computer crime that GearUp faced is "Unauthorized Access" or "Unauthorized Intrusion."

This refers to the act of gaining unauthorized access to a computer system, network, or database without permission or proper authentication.

In the case of GearUp, criminals were able to breach the company's improperly-secured wireless system, which means they accessed the system without legitimate authorization.

The criminals took advantage of the security vulnerability in GearUp's wireless system to infiltrate and gain entry into the company's network.

Once inside, they targeted and stole sensitive information, including customers' credit card information and employee social security numbers.

Unauthorized access is considered a serious computer crime as it violates the privacy and security of individuals and organizations.

It can lead to financial losses, identity theft, fraud, and other harmful consequences.

Protecting against unauthorized access requires implementing robust security measures, such as strong authentication methods, encryption, firewalls, and regular security audits, to ensure the confidentiality and integrity of sensitive data.

Learn more about Unauthorized Access

brainly.com/question/30871386

#SPJ11


Related Questions

When using word, on which tab would you find the word count tool
A) home tab
B) insert tab
C) backstage view
D) review tab​

Answers

D trust me I know this because

Answer:

your answer is d. review tab becoz it comes under the proofing group and the proofing group is found in the review tab

Which of the following statements regarding working inside a laptop computer is true?
a. when upgrading a laptop, you should use components that are the same brand as the laptop, or use only recommended components
b. if an internal component needs replacing, you should always replace the component rather than disable it
c. repairing a laptop is always more cost effective than buying a new one
d. the LCD screen of a laptop is never considered to be a field replaceable unit

Answers

Option A is the true statement. When upgrading a laptop, it is recommended to use components that are the same brand as the laptop or use only recommended components.

Option A is correct because using components that are the same brand as the laptop or recommended components ensures compatibility and reduces the risk of compatibility issues or performance problems. Laptop manufacturers often provide a list of compatible components or recommend specific upgrades to maintain optimal performance and avoid potential hardware or software conflicts.

Option B is not true because there may be instances where disabling a faulty internal component is a viable solution. For example, if a laptop's dedicated graphics card fails, it may be more cost-effective to disable it and rely on the integrated graphics rather than replacing the dedicated card.

Option C is not universally true as the cost-effectiveness of repairing a laptop versus buying a new one depends on various factors, such as the extent of the damage, the age of the laptop, and the availability of affordable repair options. In some cases, repairing a laptop can be more cost-effective, while in others, it may be more practical to invest in a new device.

Option D is not true because the LCD screen of a laptop is considered a field replaceable unit. Although it may require some technical expertise to replace, the LCD screen can be replaced if it becomes damaged or malfunctioning.

Learn more about software here: https://brainly.com/question/1022352

#SPJ11

Most ________ are accompanied by several common utility programs, including a search program, a storage management program, and a backup program.

Answers

Answer:

operating systems

Explanation:

The operating systems is shortly known as OS. It is a system software which manages the software resources of the computer, computer hardware and also provides some common services for the various computer programs.

Most of the operating systems available in the market provides some common utility programs such as the search program, a backup program and a storage management program also.

Some common operating systems are : Linux, Microsoft Windows, Ubuntu, macOS, Unix, and many more.

what are the advantages of using oil paint filter on adobe photoshop?​

Answers

Answer:

The advantage is that your picture can easily be transformed into an amazing painting instantly. Say you want an oil painting of a house. Instead of buy oil paints, and then spending hours painting a house, you can just go on Photoshop, pull up an image of a house and apply the filter.

How many bits do we have in the MAC address of an Ethernet card?

Answers

Answer: It is 6 bytes (48 bits) long

Detailed Explanation:

In a LAN, each node is assigned a physical address, also known as a MAC/Ethernet address. This address is unique to each of the nodes on the LAN and is 6 bytes (48 bits) long, which is burned on the Ethernet card (also known as the network interface card)

there are ____ main file formats involved in creating a flash video.

Answers

There are two main file formats involved in creating a flash video: FLV and SWF.

FLV (Flash Video) is a container format that stores video and audio data compressed with various codecs, such as H.264, VP6, and MP3. It is the most common format used for online streaming and sharing videos.

SWF (Shockwave Flash) is a file format used for multimedia, vector graphics, and animation. It contains interactive elements such as buttons, menus, and animations. When a SWF file is embedded into a webpage, it can interact with other web technologies such as HTML and JavaScript.

Both FLV and SWF formats are essential for creating a complete flash video. FLV is used for the actual video and audio content, while SWF is used for the interactive elements that enhance the user experience. Without either of these formats, a flash video would not be complete.

know more about FLV and SWF, here:

https://brainly.com/question/31763854

#SPJ11

Assignment 4: Evens and Odds (FIX PLEASE)

Write a program that will ask a user for how many numbers they would like to check. Then, using a for loop, prompt the user for a number, and output if that number is even or odd. Continue doing this as many times as the user indicated. Once the loop ends, output how many even numbers were entered and how many odd numbers were entered.

Hint: For a number to be even, when the number is divided by 2, there should be no remainder - so you will want to use the modulus (%) operator.

Hint: You will need two count variables to keep track of odd and even numbers.

Sample Run 1
How many numbers do you need to check? 5
Enter number: 20
20 is an even number.
Enter number: 33
33 is an odd number.
Enter number: 4
4 is an even number.
Enter number: 77
77 is an odd number.
Enter number: 8
8 is an even number.
You entered 3 even number(s).
You entered 2 odd number(s).
Sample Run 2
How many numbers do you need to check? 3
Enter number: 10
10 is an even number.
Enter number: 3
3 is an odd number.
Enter number: 400
You entered 2 even number(s).
You entered 1 odd number(s).

Benchmarks
Prompt the user to answer the question, “How many numbers do you need to check? “
Create and initialize two count variables - one for odd and one for even.
Based on the previous input, create a for loop that will run that exact number of times.
Prompt the user to “Enter number: “
If that number is even, output “[number] is an even number.”
Update the even count variable.
Or else if the number is odd, output “[number] is an odd number.”
Update the odd count variable.
Output “You entered [number] even number(s).”
Output “You entered [number] odd number(s).”

Assignment 4: Evens and Odds (FIX PLEASE)Write a program that will ask a user for how many numbers they

Answers

n = int(input("How many numbers do you need to check? "))

odd = 0

even = 0

for x in range(n):

   num = int(input("Enter number: "))

   if num % 2 == 0:

       even += 1

       print(str(num)+" is an even number")

   else:

       odd += 1

       print(str(num)+" is an odd number")

print("You entered "+str(even)+" even number(s).")

print("You entered "+str(odd)+" odd number(s).")

This uses a for loop. Sorry about the previous answer. Also, you may want to check the text inside the input functions. For instance, int(input("Enter number: ")) might have different capitalization similar to int(input("Enter Number: "))

In this exercise we have to write a python code requested in the statement, like this:

find the code in the attached image

We can write the code in a simple way like this below:

n = int(input("How many numbers do you need to check? "))

odd = 0

even = 0

for x in range(n):

  num = int(input("Enter number: "))

  if num % 2 == 0:

      even += 1

      print(str(num)+" is an even number")

  else:

      odd += 1

      print(str(num)+" is an odd number")

print("You entered "+str(even)+" even number(s).")

print("You entered "+str(odd)+" odd number(s).")

See more about python at brainly.com/question/26104476

Assignment 4: Evens and Odds (FIX PLEASE)Write a program that will ask a user for how many numbers they

As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she checked last week. This surprises her, since she didn't make any changes to her TCP/IP configuration. The user has had no problems running her web browser. You immediately know that:

Answers

Answer:

D. Her computer is a DHCP client.

Explanation:

Since in the question it is mentioned that IP address is different as compared in the previous week also the user did not make any changes with respect to the TCP/IP configuration and the system is working well

So this situation represents that the user computer is a client of DHCP as it deals with the client-server protocol in which it automatically generates the IP i.e Internet protocol along with the IP address

Hence, the correct option is d.

Chose the devices you think you should use in order to…

Go to my friend’s house and watch some movies.

A. DVD
B.CD
C.Memory card
D. USB flash memory

Listen to music while I’m running..

A. DVD
B.CD
C.Memory card
D. USB flash memory

Save photos to my computer ..

A. DVD
B.CD
C.Memory card
D. USB flash memory


Answers

Answer:

I think it's B, D, C

Explanation:

Cd for movies

Usb for the phone music and

Memory card to be inserted into the computer

Answer:

USB flash memory is the answer of all these question.

Explanation:

USB flash memory is the answer of all these question because it is small in size so you can easily carry it anywhere in your pocket. Below is the photo of USB flash drive

Chose the devices you think you should use in order toGo to my friends house and watch some movies.A.

HTTP https CSS JavaScript and HTML are types of coding and formatting behind web pages true or false?

Answers

Answer:

True

Explanation:

In order to be able to run a webpage successfully, there are various coding and formatting that are required and can considered necessary.

They are:

a) Hypertext Transfer Protocol(HTTP): This is a protocol that is made use of on webpages. It is used to determine the information or data that is collected and transmitted through webpages. The commands that are programmed on webpages are modified by this protocol. The data or information that can be transmitted using HTTP includes: Pictures, Video or Audio recordings e.t.c.

b) Hypertext Transfer Protocol Secure(HTTPS) : This is an advanced or modified form of HTTP. The difference between them is HTTPS is more secure than HTTP. HTTPS is defined as a more secured protocol thorough which data or information can be transmitted from one webpage to another. HTTPS make used of an encrypted type of security during data transmission.

c) Cascading Style (CSS): It is a computer language technology that helps to define and modify the way a webpage looks like. Cascading Style can be defined as a formatting style that deal with the fonts, colour , layout of a webpage.

d) JavaScript :This is a programming language that is used on webpages. It is a set of coding that has commands embedded insided that is written to make webpages more interactive and fun for the users of the Internet.

e)Hypertext Markup Language (HTML): This is what is used to create webpages on the internet. Hypertext Markup Language defines what a webpage actually looks like which involves, the written document on the webpage

Answer:

true 100 percent true

Explanation:

its the truuth its the truuuth its the truuuuuuuth
yea aa

what major changes occur in your reproductive system during the puberty stage?

Answers

Puberty is associated with emotional and hormonal changes, as well as physical changes such as breast development in females (thelarche), pubic hair development (pubarche), genital changes in males, voice changes, an increase in height, and the onset of menstruation (menarche)

During the puberty stage, there are significant changes that occur in the reproductive system. These changes include the growth and development of the reproductive organs, such as the ovaries in females and the testes in males.

Hormonal changes also occur during this time, including an increase in the production of estrogen in females and testosterone in males. In females, the menstrual cycle begins as the body prepares for potential pregnancy.

In males, sperm production begins as they become capable of fathering a child. Additionally, sexual characteristics develop, such as the growth of pubic hair, breasts in females, and a deeper voice in males.

These changes mark the onset of sexual maturity and the ability to reproduce.

Learn more about puberty at https://brainly.com/question/2759721

#SPJ11

is it bad to leave your laptop plugged in all the time

Answers

Answer:

no, its not bad. the only way its bad is if your computer has something wrong with it.

Explanation:

____ is an older tcp/ip protocol and an application used for text-based commmunication

Answers

Telnet is an older TCP/IP protocol and an application used for text-based communication.

Developed in the late 1960s, it allows users to remotely access another computer over a network. Telnet works by establishing a connection between a client and a server, with the client sending commands to the server for execution.

As a text-based protocol, Telnet is simple to use and can be accessed through a command-line interface or a dedicated application. However, it has been largely replaced by more secure alternatives like SSH, as Telnet transmits data in plain text, making it vulnerable to eavesdropping and unauthorized access. Despite its security flaws, Telnet remains a valuable tool for network diagnostics, troubleshooting, and simple remote access to legacy systems.

Learn more about Telnet here: https://brainly.com/question/29417864

#SPJ11

While in the Current View command group for notes, which view options do you have available? Check all that apply.

Answers

Answer: A, B, C (is this for a Microsoft class?)

Explanation: Edge

Answer:

Icon

Note list

Last 7 days

Explanation:

Question 1 (5 points) When you are at a job interview, you should use effective communication strategies, like formal language. What is formal language and why do we use it? Formal language helps create the impression that the speaker is an expert on the topic. It suggests to audience members that the speaker's points deserve respectful consideration, and it presents the ideas of the speech in the most polished possible way.. Formal language is archaic and derived from Shakespeare to help us sound fancy in order to ensure that an employer can see that we are versatile Formal language is our ability to speak more than just one language. If we are bilingual, we have a better chance at being hired.​

Answers

This prompt is about formal oanguage and styles of communication. See the explanation below.

What is formal language and why do we use it ?

Formal language refers to a style of communication that follows specific grammatical and linguistic conventions, typically associated with academic, professional, or formal settings. It is characterized by the use of proper grammar, syntax, and vocabulary, and avoids slang or colloquial expressions.

We use formal language in job interviews to convey professionalism, competence, and respect for the setting and the interviewer. It also helps to convey our ideas in a clear and concise manner, without the distractions of informal language.

Contrary to the notion that formal language is archaic or derived from Shakespeare, it is a contemporary and widely used mode of communication in formal settings. It is not related to bilingualism, which refers to the ability to speak two languages fluently.

Learn more about formal language:
https://brainly.com/question/24222916
#SPJ1

What wireless security technology contains significant flaws and should never be used?

Answers

The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

What is the primary weakness of Wired Equivalent Privacy WEP )?

Wired Equivalent Privacy (WEP) is known to be a kind of a security protocol, that is seen in the IEEE Wireless Fidelity (Wi-Fi) standard known to be 802.11b.

Note that the primary weakness of wired equivalent privacy (WEP) is that It functions only on some given brands of APs and as such, The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

Learn more about wireless security from

https://brainly.com/question/25633298

#SPJ1

PA theme is a major message that a writer convoys through a text. you have explored many themes in the hobbit one theme in the novel is that good has the ability to triumph over evil. using specific examples from the text, explain how this theme develops over the course of the novel

Answers

Answer:

The Hobbit’s main theme is Bilbo’s development into a hero, which more broadly represents the development of a common person into a hero. At the beginning of the story, Bilbo is timid, comfortable, and complacent in his secure little hole at Bag End. When Gandalf talks him into embarking on the quest with Thorin’s dwarves, Bilbo becomes so frightened that he faints. But as the novel progresses, Bilbo prevails in the face of danger and adversity, justifying Gandalf’s early claim that there is more to the little hobbit than meets the eye.??????

Explanation:

How can you rotate and resize your drawing?​

Answers

Answer:

Do one of the following:

To rotate the shape counterclockwise, on the Home tab, in the Arrange group, click Position, point to Rotate Shapes, and select Rotate Left 90º.

To rotate the shape clockwise, on the Home tab, in the Arrange group, click Position, point to Rotate Shapes, and select Rotate Right 90º

Answer:

By using the PICTURE application built into your computer, you can set a custom image editing type. It goes very easily from there

Explanation:

...

An investment bank has a distributed batch processing application which is hosted in an Auto Scaling group of Spot EC2 instances with an SQS queue. You configured your components to use client-side buffering so that the calls made from the client will be buffered first and then sent as a batch request to SQS. What is a period of time during which the SQS queue prevents other consuming components from receiving and processing a message

Answers

Answer: Visibility timeout

Explanation:

The period of time during which the SQS queue prevents other consuming components from receiving and processing a message is known as the visibility timeout.

It is the length of time when a message will be hidden after such message has been grabbed by a consumer. It is essential as it prevents others from processing such message again.

if you hard working right now go to this EASY question


#BRAINLY and I will give you brainlist something I forgot what's it called for your hard work

Answers

Ok, where is the question so I can try my best?
Whats the question??? Lol

What hardware support is needed to implement a time sharing CPU scheduler?
(A) Timer and Memory Management Unit (MMU)
(B) Timer and interrupt
(C) Interrupt and Sync instructions

Answers

To construct a time sharing system, timer and interrupt hardware capability is required. the CPU scheduler.

How are CPU scheduler types defined?

Preemptive and non-preemptive scheduling are the two primary categories of CPU scheduling. Preemptive scheduling occurs when a process switches from being in a running state to being ready or from being in a waiting state to being ready. When a process ends or changes from a running to a waiting state, non-preemptive scheduling is used.

What is a CPU scheduler's function?

Making sure that as many jobs are running at once as possible is the main goal of CPU scheduling. A single job should always be executing on a single CPU system. We can keep a lot of jobs ready to go at all times thanks to multiprogramming.

To know more about CPU scheduler visit:-

https://brainly.com/question/28559095

#SPJ4

Steffi needs to find the domain name of the webpage she is currently viewing. to do this, she needs to look at the address bar of the browser.a. trueb. false

Answers

Answer: A. True

To find the domain name of a webpage that Steffi is currently viewing, she can look at the address bar of the browser. The domain name is typically located between the protocol (e.g., http:// or https://) and the path (e.g., /index.html) in the URL displayed in the address bar.

For example, in the URL https://www.example.com/index.html, the domain name is "example.com". By looking at the address bar, Steffi can easily find the domain name of the webpage she is currently viewing.

Explanation:

what os the full form of cpu​

Answers

Answer:

central processing unit

Central processing unit

Which is NOT part of the respiratory system?

Diaphragm

Lungs

Thorax

Adductors

Answers

Answer:

abductors

Explanation:

the diaphragm is the muscle that works your lungs, the lungs are what fills with air for respiration, and the thorax is the cavity they reside in. abductors are your abs.

(also i dont think you meant to put this in the computers section)

How many voltage values can be represented with a 10-bit binary code?
A. 128
B. 256
C. 512
D. 1024​

Answers

Answer is D. 1024
8 bits is enough to represent 256 different numbers. 9 bits is enough to represent 512 numbers. 10 bits can represent 1024 numbers.

1024  voltage values can be represented with a 10-bit binary code. Thus, option D is correct.  

What is binary code?

A binary code uses a two-symbol method to describe text, central processing unit instruction, and any other material. The signed binary system's "0" and "1" are frequently employed as the two signals in this system. The symbol, command, etc. is given a set of binary digits, often referred to this as bits, by the binary code.

These methods incorporate this program to comprehend operational directives and user actions and provide the user with a pertinent output. 256 distinct numerals can be represented using only 8 bits. 512 numbers can be represented with 9 bits. 1024 values can be represented by 10 bits.

Therefore, option D is the correct option.

Learn more about binary code, here:

https://brainly.com/question/28222245

#SPJ2

Tech A says that most lug nuts and studs are right-hand threaded, which means they tighten when turned clockwise. Tech B says that some lug nuts and studs are left-handed, which means they tighten when turned counterclockwise.

Answers

This question is incomplete.

Complete Question

Tech A says that most lug nuts and studs are right-hand threaded, which means they tighten when turned clockwise. Tech B says that some lug nuts and studs are left-handed, which means they tighten when turned counterclockwise. Who is correct?

a) Tech A

b) Tech B

c) Both Tech A and B

d) Neither Tech A not B

Answer:

c) Both Tech A and B

Explanation:

The Wheels of cars or vehicles are attached or fastened to the car rims using what we call lug nuts and wheel studs. The lug nuts attached or torqued properly on the wheel studs in order to ensure that the wheels of the car are well secured , attached and firm.

We have different types of lug nuts and wheel studs. The differences is based on the threading that it found on both the lug nut and wheel studs.

We have:

a) The right handed threaded lug nuts and studs(wheel studs)

b) The left handed threaded lug nuts and studs(wheel studs).

The right handed threaded lug nuts and studs are tightened when they are turned in the clockwise direction while left handed threaded lug nuts and studs are tightened in the anticlockwise or counterclockwise direction.

It is important to note that no matter the kind of lug nuts and studs(whether right handed threaded or left handed threaded) used to fastened wheels to car rims, it is essential that they are well fastened and torqued to car to prevent them from loosening up.

For the question above, both Tech A and Tech B are correct. Therefore , Option C is the correct option.

Loading multiple Excel Sheets
Create a pd.ExcelFile() object using the file 'listings.xlsx' and assign to xls. Then save the sheet_names attribute of xls as exchanges. Finally using exchanges to specify sheet names and n/a to specify missing values in pd.read_excel(), read the data from all sheets in xls, and assign to a dictionary listings.

Answers

The Python program given below that loads multiple Excel sheets using the pandas library:

import pandas as pd

# Create a pd.ExcelFile() object using the file 'listings.xlsx'

xls = pd.ExcelFile('listings.xlsx')

# Save the sheet_names attribute of xls as exchanges

exchanges = xls.sheet_names

# Read the data from all sheets in xls using exchanges and assign to a dictionary listings

listings = {}

for exchange in exchanges:

   listings[exchange] = pd.read_excel(xls, sheet_name=exchange, na_values='n/a')


Explanation:

In this above-given Python program, we first create a pd.ExcelFile() object named xls using the file 'listings.xlsx'. This allows us to access the Excel sheets within the file without having to repeatedly load the file. We then save the sheet_names attribute of xls as exchanges, which contains a list of the sheet names within the Excel file. Finally, we use a for loop to read the data from all sheets in xls using pd.read_excel(), with exchanges used to specify the sheet names and 'n/a' used to specify missing values. The data for each sheet is then assigned to a dictionary listing with the sheet name as the key.

To know more about pandas library click here:

https://brainly.com/question/30829252

#SPJ11

you are a bank loan officer. carter has to come into your office and applied for a loan for a car.you ran his credit report, and his score is 541. What will you say to carter?

Answers

Answer:

Carter score falls within the range of scores, from 300 to 579, considered Very Poor. Score is significantly below the average credit score.

Explanation:

Some organizations and individuals, such as patent trolls, abuse intellectual property laws .



computer science

Answers

Answer:

False.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of

I. Trademarks.

II. Patents.

III. Copyright.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

Patent trolls buy up patents in order to collect royalties and sue other companies. This ultimately implies that, patent trolls are individuals or companies that are mainly focused on enforcing patent infringement claims against accused or potential infringers in order to win litigations for profits or competitive advantage.

Hence, some organizations and individuals, such as patent trolls, do not abuse intellectual property laws.

Answer:

the answer is intentionally

Explanation:

i took the test

how is an operating system like a translator?

Answers

Answer:

Operating systems work like translators because they are able to take software and hardware, and put it all together to work in a way that is readable and usable for the consumer.

Other Questions
simplify (5) leaving answer in index form I need the answers please and thank u The nurse in charge is caring for a patient who is in the first stage of labor. What is the shortest but most difficult part of this stage? Select one: O a. Latent phase. b. Active phase. c. Transitional phase. O d. Complete phase. audit sampling for tests of controls is generally appropriate when the completion of a control procedure Please help me fast. 2. identify the participle in the sentence below. "Billy loves to go swimming in his tattered old swim trunks." a. swimming b. tattered c. old does a reaction occur when aqueous solutions of potassium chloride and silver(i) acetate are combined? NEED THIS ASAP!!!! it for math why finger print is the cheapest and easiest method of personal identification? I NEED SOME HELP?Given the arithmetic sequence {-12, -7, -2, 3, ...} what is the 15th term of the sequence? Group of answer choices5833434863 If one were testing whether a particular sample was drawn from a population with a particular mean and the standard deviation of the entire population was known, one would use the _____ to statistically answer the question Two ships leave a harbor together travelingon courses that have an angle of 128between them. If they each travel 543 miles,how far apart are they (to the nearest mile)?A) 976 miB) 476 miC) 42 miD) 1952 mi Find the volume of a pyramid with a square base, where the area of the base is 12. 4\text{ ft}^212. 4 ft 2 and the height of the pyramid is 5\text{ ft}5 ft. The (labelled by) of an ECG corresponds to C A B D E APA a) Pwave; E: ventricular depolarization b) Q wave; A; atrial depolarization c) QRS complex; BCD; ventricular repolarization d) Twave; E: ventri What is the molarity of a solution with 55 grams of CaCL2 dissolved in. 78 L of water?A. 1. 3 MB. . 64 MC. . 91 MD. . 71 M Please help! Correct answer only!There are 10 cards in a hat, numbered 1 to 10. The game is to draw one card out of the hat. If the number you draw is even, you win $30. If the number you draw is odd, you win nothing. If you play the game, what is the expected payoff?$___ ASAP! Could somebody tell me the answer to 1.10.5 vacation guides in HTML and 1.10.6 Put Karel Together? Copy and paste it please. Financial accounting is chiefly concerned with providing information to external usersTrueFalse What enabled wheat and apples to become key crops in Washington? What is The Sun Also Rises basically about? can you spell this? track car