question 1 what is an attack vector? 1 point the severity of the attack the direction an attack is going in the classification of attack type a mechanism by which an attacker can interact with your network or systems

Answers

Answer 1

An attack vector is a path or means by which a hacker can gain access to a computer system to deliver malicious code or exploits.

Define attack vector and its uses?

Attack vector is a path or means by which a hacker can gain access to a computer or network server to deploy a malicious program or code. Attack vectors can include malicious websites, email attachments, software downloads, or even physical access to the system. Attack vectors are used to gain unauthorized access to system resources, steal sensitive data, or cause disruption to services. Attack vectors can be used to exploit vulnerabilities in web applications, operating systems, and network devices, leading to data leaks, system compromise, and other malicious activities. Attack vectors are also used to spread malware, launch distributed denial-of-service (DDoS) attacks, and gain access to privileged account credentials. Attack vectors are an important part of an overall security strategy, so understanding them and how to protect against them is essential.

To learn more about attack vector refer to:

https://brainly.com/question/28145956

#SPJ4


Related Questions

What is the output in the parent process? int main() {
int a=2, pid;
pid=fork();
if (pid ==0){ a=a-10; printf("u=%d\n", a);
}
else { a=a+10; printf("x=%d\n",a); }
}
A.u=-10 B. x=10 C.x=12 D. u=10

Answers

1. To retrieve a Cursor with all rows from an SQLite table called 'names', a query needs to be executed with the appropriate SQL statement. 2. To retrieve a layout named "row_layout.xml" using a LayoutInflater variable named "inflater", the inflate() method needs to be called. 3. To create a new SQLite table called 'names' with columns 'id' (autoincrementing key) and 'name' using a SQLiteDatabase variable named "db", an SQL statement needs to be executed. 4. To insert a new row with a name of 'Elon Musk' into an SQLite table called 'names' with columns 'id' and 'name', an SQL INSERT statement needs to be executed.

To retrieve a Cursor with all rows from the 'names' table in SQLite, the query method of the SQLiteDatabase class needs to be called with the SQL statement "SELECT * FROM names". This will return a Cursor object containing all the rows in the 'names' table. To retrieve a layout named "row_layout.xml" using a LayoutInflater variable named "inflater", the inflate() method needs to be called on the inflater object. The line of Java code would be:

View layoutView = inflater.inflate(R.layout.row_layout, null);

This code inflates the layout file "row_layout.xml" and returns the corresponding View object.

To create a new SQLite table called 'names' with columns 'id' (autoincrementing key) and 'name' using a SQLiteDatabase variable named "db", the execSQL() method needs to be called on the db object with the appropriate SQL statement. The code snippet would be:

db.execSQL("CREATE TABLE names (id INTEGER PRIMARY KEY AUTOINCREMENT, name TEXT)");

This executes an SQL CREATE TABLE statement to create the 'names' table with the specified columns and their data types.

To insert a new row with a name of 'Elon Musk' into the 'names' table with columns 'id' and 'name', the execSQL() method needs to be called on the SQLiteDatabase object with the appropriate SQL INSERT statement. The code snippet would be:

db.execSQL("INSERT INTO names (name) VALUES ('Elon Musk')");

This executes an SQL INSERT statement, specifying the table name and the value to be inserted into the 'name' column. The 'id' column, being an autoincrementing key, will automatically generate a unique value for the new row.

Learn more about SQL here: https://brainly.com/question/31837731

#SPJ11

To find the area, Andrea tiled a rectangle and sketched her answer. Sketch Andrea's rectangle, and find the area. Show your multiplication work.

Answers

Answer:

\(Area = 6.25\)

Explanation:

Given

\(Length = 2.5\)

\(Width = 2.5\)

See attachment for rectangle

Required

Determine the area of the rectangle

Area is calculated as:

\(Area = Length * Width\)

This gives:

\(Area = 2.5 * 2.5\)

\(Area = 6.25\)

The area of Andrea's sketch is 6.25

To find the area, Andrea tiled a rectangle and sketched her answer. Sketch Andrea's rectangle, and find

relevez le rôle principal de la peau dans l,organime humain. je suis bloquée aidez moi metci​

Answers

Answer:

language?

Explanation:

Please give answers between 500 words.
What have been the major issues and benefits in
Electronic Data Interchanges (EDI) and Web-Based/Internet
Tools?

Answers

The major issues and benefits of electronic data interchange (EDI) and web-based/Internet tools, such as compatibility and standardization, privacy, cost, dependence on internet connectivity, etc.,

One of the challenges of EDI is that it is ensuring compatibility between different systems and  also establishing standardized formats for data exchange. It requires agreement and coordination among trading partners in order to ensure the seamless communication, while there are many benefits that include EDI and web-based tools that enable faster and more efficient exchange of information, eliminating manual processes, paperwork, and potential errors. Real-time data exchange improves operational efficiency and enables faster decision-making. Apart from this, there are many other benefits to these.

Learn more about EDI here

https://brainly.com/question/29755779

#SPJ4

with ______, phone calls are treated as just another kind of data.

Answers

Answer:

With Voice over Internet Protocol (VoIP), phone calls are treated as just another kind of data. VoIP is a technology that allows voice communication to be transmitted over an internet connection instead of traditional telephone lines. This means that voice calls can be sent and received like other types of data, such as email or instant messaging, using the same network infrastructure. VoIP has become increasingly popular in recent years due to its cost-effectiveness and flexibility compared to traditional telephone systems.

The answer to the question is that with VoIP (Voice over Internet Protocol), phone calls are treated as just another kind of data.

VoIP allows voice signals to be transmitted over the internet in digital form, similar to how data is transmitted. This means that phone calls can be sent and received using the same network infrastructure as data, making it a more cost-effective and efficient communication solution.

An answer would be that VoIP works by breaking down voice signals into digital packets and transmitting them over the internet using IP (Internet Protocol) networks. These packets are then reassembled into voice signals at the receiving end. VoIP can use different protocols, such as SIP (Session Initiation Protocol) and RTP (Real-Time Transport Protocol), to manage the signaling and transmission of voice packets.

One of the advantages of VoIP is that it can offer better call quality and reliability than traditional phone lines, as well as additional features such as video calling, conferencing, and voicemail-to-email transcription. VoIP also allows for greater flexibility in terms of where and how calls can be made, as it can be used on a variety of devices such as computers, smartphones, and IP phones.

In summary, with VoIP, phone calls are treated as just another kind of data, allowing for more cost-effective and efficient communication.

Learn more about VoIP (Voice over Internet Protocol): https://brainly.com/question/29453075

#SPJ11

how can turning on text and email alerts help keep your account safe?

Answers

Turning on text and email alerts can help keep your account safe by notifying you if any suspicious activity occurs on your account.

What is account?

An account is a record of financial transactions for a specific entity. It is a method of tracking the financial position of an individual, company, or other entity. Accounts are tracked through a series of ledgers, which are documents that show the debits and credits related to each transaction. Accounts are classified as either assets, liabilities, equity, income, or expenses. Assets are items of value that are owned by the entity, such as cash, investments, or property. Liabilities are amounts owed to creditors or other entities.

This way, you can quickly take action if you see a suspicious transaction or other activity so that you can protect your account and personal information. Text and email alerts provide an extra layer of security that can help you detect and prevent fraud or identity theft.

To learn more about account

brainly.com/question/26986135

#SPJ4

FILL IN THE BLANK. In addition to the client being authenticated by the server, certificate authentication also provides ______.

Answers

In addition to the client being authenticated by the server, certificate authentication also provides Server authentication.

What is server authentication and client authentication?

The SSL authentication method is seen as known as Server Authentication is employed when using SSL to secure communications. This is the bare minimum of security offered by SSL and enables the client to verify that the server is who it claims to be. SS

Note that Client authentication uses an SSL certificate to verify the identity of the client to the server, whereas that of server authentication uses an SSL certificate issued to the server to validate their identity to the client.

Therefore, one can say that an application known as an authentication server enables the authentication of a network accessing entity. A human user or another server could be such an object. An Ethernet switch, access point, as well as dedicated computer, or network access server are all possible locations for any given authentication server.

Learn more about Server authentication from

https://brainly.com/question/28344936
#SPJ1

Marcia is using the software program Slack. What is she most likely using it for at work?

Answers

Answer:

Communicating with collegues.

Explanation:

Marica is probably using slack for communicating with colleagues as slack has great features for work and organizations. It is most popular and reccomended for organizations and schools/colleges.

I hope for your success!

Carlos, a network technician, replaces a failed switch with a new switch. Carlos informs the users on the subnet served by the switch that they can reconnect to the network. One user calls to report that she is still unable to access any resources on the network. Carlos checks the indicator light for the switch port to which that user is connected. The LED light is not lit. What action should Carlos take next to resolve this problem

Answers

Answer:

Explanation:

If the indicated network switch port has no glowing green LED then that switch port is either off or failing. This can sometimes happen even with newly replaced switches. In this case Carlos should first check to make sure that the switch port is properly installed. If so, then he should switch the port for a new one. If the LED light turns on and is still not green, then it may be an error with a faulty cable, and in this case Carlos should replace the cable with a new one, which should solve the issue.

HELP ASAP!!
What is the difference between an internal event and an external event?

Answers

Answer:

External events involve an exchange transaction between the company and a separate economic entity. For every external transaction, the company is receiving something in exchange for something else. Internal events do not involve an exchange transaction bud do affect the financial position of the company.

Explanation:

The difference between an internal event and an external event is that they both serve distinct goals and necessitate distinct methods.

What are Internal Events?

An internal event is one that takes place within your company, including your stakeholders and staff. Internal events can be held for a variety of purposes, ranging from workshops and seminars to stressing business values.

What are External Events?

External events serve as a channel for your products, services, and brand to reach new audiences. Taking your external events virtual takes it to a whole new level. People from Australia and Argentina may now attend your event in a couple of minutes.

The difference between an internal event and an external event is that they both serve distinct goals and necessitate distinct methods. The major purpose of internal events is to improve and nurture current connections, whereas the goal of external events is to bring in new clients and form new networks.

Learn more about Internal events and External events:

https://brainly.com/question/27827939

#SPJ2

8. 14 LAB: Mileage tracker for a runner Given the MileageTrackerNode class, complete main() to insert nodes into a linked list (using the InsertAfter() function). The first user-input value is the number of nodes in the linked list. Use the PrintNodeData() function to print the entire linked list. DO NOT print the dummy head node

Answers

In the given exercise "8.14 LAB: Mileage tracker for a runner," the task is to complete the main() function to insert nodes into a linked list using the InsertAfter() function.

To complete the main() function for the "Mileage tracker for a runner" exercise, you need to incorporate the InsertAfter() function to insert nodes into a linked list. The user is prompted to input the number of nodes required for the linked list. You will use this input value in a loop to create and insert the nodes one by one.

Inside the loop, you can call the InsertAfter() function to insert each node after the previous one. The specific implementation of the InsertAfter() function will depend on the code provided in the exercise.

After all the nodes are inserted, the PrintNodeData() function can be used to print the data of each node in the linked list. However, it is important to exclude the dummy head node from the printed output, as specified in the exercise instructions.

By following this approach, you can successfully complete the main() function to insert nodes into the linked list and print the data of the individual nodes, excluding the dummy head node.

learn more about nodes here; brainly.com/question/31843196

#SPJ11

Tesla's new upcoming Pi is susceptible to the supply chain, and can it take on iPhone? The Pi phone is rumored to be the next generation of smarts phones, but how could they possibly surpass apple? What is your takeaway from this? How would you argue this? Please be specific about which marketing concept you are using. Please craft a question I could answer that relates to Pi marketing.

Answers

As an AI Helper, I am unable to provide real-time information on unreleased products or future marketing strategies. However, I can explain a marketing concept that could potentially be relevant to the marketing of Tesla's upcoming Pi phone.

One marketing concept that Tesla could consider leveraging is "Differentiation." Differentiation involves positioning a product or brand in a way that sets it apart from competitors and creates a unique value proposition. To apply this concept to the Pi phone, Tesla could focus on its key differentiating features. For example, they could emphasize the phone's integration with Tesla's electric vehicle ecosystem,

Tesla could argue that the Pi phone surpasses the iPhone by providing a distinct user experience that combines cutting-edge technology with a seamless integration into Tesla's ecosystem. By leveraging Tesla's brand reputation and their expertise in innovation, they could target a niche market segment of environmentally-conscious consumers who are also Tesla enthusiasts.
To know more about information visit:

https://brainly.com/question/33427978

#SPJ11

It is difficult to definitively determine whether Tesla's upcoming Pi phone can surpass Apple's iPhone as it depends on various factors such as product features, marketing strategies.

One marketing concept that could be relevant in this context is differentiation. Tesla would need to identify unique features, capabilities, or value propositions that set the Pi phone apart from the iPhone. This could include innovative technology, design elements, sustainability features, or any other aspect that appeals to target consumers and differentiates the Pi phone from the competition.

To argue for the success of Tesla's Pi phone, one could highlight Tesla's brand reputation for innovation and disruption in the technology industry. Tesla's strong brand image, built through their success in the electric vehicle market, could translate into positive perceptions and expectations for their Pi phone. Tesla could leverage its existing customer base and brand loyalty to attract initial adopters and generate buzz around the new product.

A potential question related to Pi phone marketing could be: "How does Tesla plan to position the Pi phone in the market to differentiate it from established competitors like the iPhone and attract a significant customer base?" This question focuses on Tesla's marketing strategy, specifically their approach to positioning and differentiation, which are critical factors in successfully competing with established players in the smartphone industry.

Learn more about Tesla:

https://brainly.com/question/27396014

#SPJ11

an employee complains that a windows pc cannot connect to the internet. a network technician issues the ipconfig command on the pc and is shown an ip address of 169.254.10.3. which two conclusions can be drawn? (choose two.)

Answers

The PC is not receiving a valid IP address from the network's DHCP server and that it is using an automatic private IP addressing (APIPA) address.

What is IP address?Each device connected to a computer network that uses the Internet Protocol is given a unique numerical label known as an IP address. In most networks, IP addresses are assigned to devices dynamically by a DHCP (Dynamic Host Configuration Protocol) server, which assigns a unique IP address to each device on the network.If a device is unable to obtain a valid IP address from the DHCP server, it may use an APIPA address instead. APIPA addresses are reserved for use in situations where a device is unable to obtain a valid IP address from the DHCP server, and are in the range of 169.254.0.0 to 169.254.255.255. When a device uses an APIPA address, it means that it is unable to communicate with the DHCP server and may not be able to access the internet or other resources on the network.

To learn more about IP address refer :

https://brainly.com/question/14219853

#SPJ4

Assume choice refers to a string. The following if statement determines whether choice is equal to Y or y.
if choice == 'Y' or choice == 'y':
Rewrite this statement so it only makes one comparison and does not use the or operator. Write this in Python

Answers

Answer:

if choice.lower() == 'y':

Explanation:

which database encryption method can you use to encrypt data at rest?

Answers

Answer:

Transparent Data Encryption

Explanation:

Manufacturing production systems
can be classified as

Answers

Answer:

Job-shop, Batch, Mass and Continuous production systems.

Answer:

Explanation:

Production systems can be classified as Job-shop, Batch, Mass and Continuous production systems.

Who invented the television and what year did color come out? Explain​

Answers

The television was not invented by a single person, but its development involved contributions from several inventors and engineers.

How is this so?

Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.

As for color television, it was first introduced commercially in the United States in 1953 by RCA.

The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.

Learn more about television at:

https://brainly.com/question/12079773

#SPJ1

you need to assign an interface on the router with the ip address 192.168.1.250 and subnet mask of 255.255.255.0. which command will accomplish this task? answer ip address mask 192.168.1.250 255.255.255.0 ip address 192.168.1.250 / 255.255.255.0 ip address 255.255.255.0 192.168.1.250 ip address 192.168.1.250 255.255.255.0

Answers

to assign an interface on the router with the ip address 192.168.1.250 and subnet mask of 255.255.255.0. We use the command

ip address 192.168.1.250 255.255.255.0

What is an IP Address?

An Internet Protocol address is a numerical label that identifies a computer network that employs the Internet Protocol for communication. An example of one is 192.0.2.1. Network interface identification and location addressing are the two primary purposes of an IP address.

Data's IP address reveals both its source and the destination to which it should be sent. Static or dynamic IP addresses are also possible. An appliance connected to a network that requires a permanent address is given a static IP address (e.g., a server, firewall or router).

To learn more about IP Address, use the link given
https://brainly.com/question/14219853
#SPJ1

in this basket-making technique, warps radiate out from the center to create the framework of the basket. this basket-making technique is called .

Answers

This basket-making technique is called plaiting. Thick strips of basket material are passed under and over one another during the plaiting weaving process to create an exquisite pattern that resembles a checkerboard.

Which of the following best describes a beekeeping basket?

One of the most recognizable symbols of beekeeping is the bee skep, a domed-shaped basket that is frequently composed of straw or dried grass. For thousands of years, beekeepers have housed honey bee colonies in these hand-made constructions.

What does weaving plait mean?

In the plaiting process, material strips are crossed over and under one another to create a pattern that resembles a "checkerboard." The bottom, sides, or cover of a basket can be made using flat wefts created by the plaiting technique.

What method is employed in the creation of baskets?

The three primary methods of weaving are coiling, plaiting, and twining. There are several versions of these techniques used in Northwest Coast basketry.

To know more about basket weaving visit:

https://brainly.com/question/13577587

#SPJ4

What is the best CPU you can put inside a Dell Precision T3500?

And what would be the best graphics card you could put with this CPU?

Answers

Answer:

Whatever fits

Explanation:

If an intel i9 or a Ryzen 9 fits, use that. 3090's are very big, so try adding a 3060-3080.

Hope this helps!

Information Systems
Sketch five User Interface screens on one sheet.
All five screens should be connected by interaction (e.g. one
leads to the next). Upload the five screens as one
JPG file.

Answers

I can give you a verbal description of how these screens might look and be connected.

Imagine a five-screen flow for a mobile app, let's say, a library app. Screen 1 is the login screen, where users can enter their credentials. Once logged in, users are taken to Screen 2, the main dashboard displaying categories of books. Selecting a category takes users to Screen 3, where they can see a list of books in that category. Tapping on a book title leads to Screen 4, the book detail page. Finally, a "Borrow" button on this page takes users to Screen 5, a confirmation screen for borrowing the book.

Learn more about graphic design software here:

https://brainly.com/question/11299456

#SPJ11

Which of the following is NOT an advantage of database systems?

Redundant data

Program-data independence

Better data quality

Reduced program maintenance

Answers

Redundant data is NOT an advantage of database systems. Database systems offer numerous advantages for managing data efficiently.

Redundant data, however, is not one of them. Redundancy refers to the duplication of data, which can lead to several problems in a database system. It consumes extra storage space, increases the risk of data inconsistency, and complicates data maintenance and updates. In contrast, database systems aim to minimize redundancy by promoting data normalization and providing mechanisms for data integrity and consistency.

Program-data independence is one of the advantages of database systems. It refers to the separation of the application programs from the physical aspects of data storage and access. This allows for flexibility and scalability, as changes in the database structure do not require modifying all the application programs. It also enables concurrent access to data by multiple users and provides data security and privacy controls.

Better data quality is another advantage of database systems. Centralized data management allows for data validation and integrity checks, ensuring that the data entered into the system is accurate, complete, and consistent. This leads to improved decision-making, as users can rely on the quality of the data stored in the database.

Reduced program maintenance is yet another advantage of database systems. With a well-designed database system, program maintenance becomes easier and more efficient. Changes to data structures or access methods can be handled at the database level without requiring modifications to all the associated programs. This reduces the time, effort, and potential errors associated with program updates and maintenance.

In summary, while redundant data is not an advantage, database systems provide benefits such as program-data independence, better data quality, and reduced program maintenance.

Learn more about Database here:

https://brainly.com/question/29412324

#SPJ11

Online interaction with social media platforms:__________.
i. Social Engine Optimization
ii. Testimonials
iii. Social Media Presence

Answers

Answer:

social media precense is your answer

How big is our cache if the block size is 64B, the associativity is 4, and the number of sets is 128: Choice 1 of 4:32B Choice 2 of 4:32KB Choice 3 of 4:32GB Choice 4 of 4:32TB

Answers

The size of a cache is determined by the block size, associativity, and number of sets. Given that the block size is 64B, associativity is 4, and the number of sets is 128, we can calculate the cache size as follows:

cache size = block size x associativity x number of sets

= 64B x 4 x 128

= 32KB

Therefore, the answer is Choice 2 of 4: 32KB. This means that the cache can hold up to 32 kilobytes of data. It is important to note that the cache size is a trade-off between cost, performance, and capacity. A larger cache size can provide better performance, but it also increases the cost of the system. On the other hand, a smaller cache size can be more cost-effective, but it may not provide the same level of performance. As such, cache size is an important consideration in designing computer systems and is often optimized for specific applications and workloads.

Learn more about block size here:

https://brainly.com/question/30047126

#SPJ11

To pair metrics with dimensions, what should they have in common?
a. Same creator.
b. Same creation date.
c. Same view.
d. Same scope.

Answers

To pair metrics with dimensions, they should have the same scope (option d). This ensures that the data is compatible and can provide meaningful insights when analyzed together.

To pair metrics with dimensions, they should have the same scope. The scope refers to the level of analysis or the perspective of the data being measured. For example, if you are measuring website traffic, the scope could be at the page level or at the site level. The metrics and dimensions should be aligned in terms of the scope to ensure that they are measuring the same thing and can be accurately compared and analyzed. Having the same creator or creation date or view is not necessarily relevant to pairing metrics with dimensions.


Learn more about aligned about

https://brainly.com/question/14517960

#SPJ11

This tool lets you insert text anywhere in your document. O Cut О сору O Drag O Paste​

Answers

Answer:

Drag or paste (im not 100% sure tho)

Explanation:

TRUE/FALSE

6) If a primary key is not assigned, it will not be added automatically as an ID at the
time of creating the table
7. Field name in MS Access can start with blank space
8. Field name can have maximum of 64 characters
9. A table can have two primary keys
10. Number data type can hold both decimal and non-decimal digits
11. A row cannot be deleted from a B. Match the following
table in MS Access 2010

Answers

Answer:

6 true

7 true

8 false

9 true

10 true

11 false

Write an assembly program to find the largest item in an array and store it in a variable named MAXIMUM. Hint: Use both Jump and loop instructions to write the program. Logic: Assume that the first item of the array is the minimum and store it in variable MAXIMUM Write a loop. Inside the loop, compare the each array item with the minimum If the array item is less than the MAXIMUM, update MAXIMUM with that array item. . Data Array WORD 10, 2, 23, 45, 21, 11 MAXIMUM WORD

Answers

Use the knowledge of computational language in C++ to write the a code assembly program to find the largest item.

How to write a maximum function in C++?

To make it simpler the code is described as:

#include<bitd/stdc++.h>

Using namespace std;

Int main(){

Int arr[10]={10, 2, 23, 45, 21, 11};

Int min=INT_MAX;

Int max=INT_MIN;

for(int i=0;i<10;i++)

If(min<arr[i])min=arr[i];

for(int j=0;j<10;j++)

if(max>arr[j])max=arr[j];

Cout<<max<<” “<<min<<endl;

return 0;

See more about C++ code at brainly.com/question/19705654

Write an assembly program to find the largest item in an array and store it in a variable named MAXIMUM.

you are not sure if a certain word has an"e"at the end

Answers

What exactly are you asking ?

The largest amount of data, in bytes, which can be accomodated by a particilar network, link, or physical-layer is called the?

Answers

The largest amount of data, in bytes, which can be accommodated by a certain network, link, or physical layer exists named the maximum transmission unit (MTU).

What is meant by MTU?The largest data packets that an Internet-connected device may receive are referred to as maximum transmission units (MTU). Bytes are used to measure MTU. The maximum MTU size is 1,500 bytes.

Each piece of data that is carried over the Internet is split up into smaller components called packets. The header and payload are the two fundamental components of each data packet.

The payload is the actual content of the packet, whereas the header details its source and destination addresses.

The entire packet, including all headers and the payload, is measured by MTU. The maximum transmission unit (MTU) refers to the greatest quantity of data, expressed in bytes, that a specific network, link, or physical-layer can support (MTU).

The largest amount of data, in bytes, which can be accommodated by a certain network, link, or physical layer exists named the maximum transmission unit (MTU).

To learn more about data packets refer to:

https://brainly.com/question/28140546

#SPJ4

Other Questions
What do you think?Hello, you probably have no idea who I am, but is it really important? Ill probably be dead in a few years anyway. All you should know is that I am writing this from inside a cell. Please know that I have committed no crimes but am a prisoner of war, more of a peace treaty addition. Its been 2 years since the war has been postponed and the daughter of their leader gave me this notebook, its a little old and worn but still great for writing my thoughts. I must admit humans are strange with their games and fighting. If you thought I was human, now that would make me laugh. While my kind is similar to humans we have differences as well, for example, our immune system has decayed to the point where we would die from diseases that wouldnt be fatal to humans. I am the third born in a family of 6 I have 2 older brothers and a younger sister. We are the rulers of our small town, in fact, thanks to humanity we are less than 10,000 now. This war though taken its toll I know we will remain vigilant and emerge victorious in the end. I remember when the leaders daughter and I first met, it was about a month into my imprisonment, and I was lying on the so-called bed they have. I heard footsteps but didnt move as I knew the reality. I'm never getting out. Help!The number of cookies that were made at a bakery for each of seven days is shown:108, 96, 96, 84, 108, 240, and 84The best measure of center for this data set is the-A: median because all of the values are close to one another in valueB: mean because all of the values are close to one another in valueC: median because 240 is much higher than the other numbers in the data setD: mean because 240 is much higher than the other numbers in the data set Solve.4. Find the value of x in the diagram at the right. James Rhodes seems differently to me today, I can't tell why. When a company owner practices price discrimination, the marginal revenue of an extra unit sold. why is biodiversity in a certain environment important?pag tama ung answer i brainliest you What does 1.5 times more than that mean? Like for an example, Ken ate x grams of almonds, and Han ate 1.5 times more than that? So what does 1.5 times more than that mean? PLEASE HELP WITH EXPLANATION Mary always saved 45% of his salary. When his salary decreased by 20% in April, his savings decreased by $180.How much was Marys salary before the decease? an intercepted arc is the arc that lies between the ___ of an inscribed angle Question No1: A rectangular bar shown in Figure 1 is subjected to the axial load of 500 N. Using the second order tetrahedral element mesh, (i) determine the maximum stress induced at the deep notched shown in the Figure 1. (ii) Using the mesh control technique, change the element size at the notch to be 1 mm and recalculate the maximum stress using the simulation tool. Please make a comment in the results obtained by using the mesh control technique. Please use the material as alloy steel for all the above cases. A seasonal index of indicates that the season is average A) o B) 0.5 C) 10 D) 100 E) 1 state the meaning or give another term for each underlined item below What does Capulet tell Paris about the two families ability to keep the peace? Is he confident that they can do so? howdoes high CO2 in the blood affect the pH in the urine? how much heat in kilojoules is evolved or absorbed in the reaction of 1.00g of Na with H2O?Change in heat = -368.4 kj Wich of the following is not a defense mechanism where on the map should I draw? Thomas Jefferson goal was toA. Build factories B. Build a better USAC. Reduce the size of the government D. Close the national bank What is the domain of the function v=6r2 if the range is v0? a piece of cork has a mass of 15 g in air and a specific gravity of 0.25. the cork is attached to a lead sinker whose mass is 230 g in air. what will be the apparent mass of the pair when they are both submerged in water?