under which vulnerability can an attacker steal information from a user's phone using a device to connect to the phone without physically touching it?

Answers

Answer 1

In Data theft,  an attacker steals information from a user's phone using a device to connect to the phone without physically touching it.

Data theft is the practice of stealing information from servers, devices, and databases owned by businesses. This kind of corporate theft is a severe threat to businesses of all sizes since it can occur from both within and outside the organization.

Data theft can occur accidentally, despite the phrase "data theft" suggesting that this form of the breach was committed with malice aforethought. A worker, for instance, might take information home on an unsecured flash drive or keep access to it after their employment is over.

The malicious theft of employee data frequently occurs without the victims even being aware of it because their accounts or personal devices were breached by hackers who took advantage of poor password management or vulnerable networks. When they get access to a company's systems, malicious users may remain there for days, weeks, or even years while assuming the identity of a legitimate user.

By getting additional access rights to more private company datasets while remaining unreported, they pose an increasing risk to unwary businesses.

To learn more about data theft click here:

brainly.com/question/13160916

#SPJ4


Related Questions

based on a​ poll, ​% of internet users are more careful about personal information when using a public​ wi-fi hotspot. what is the probability that among randomly selected internet​ users, at least one is more careful about personal information when using a public​ wi-fi hotspot? how is the result affected by the additional information that the survey subjects volunteered to​ respond?

Answers

Based on Craik and Lockhart's levels of processing memory model, the following information about dogs can be arranged from the shallowest to the deepest encoding:

Physical Characteristics: This refers to surface-level information about the appearance of dogs, such as their size, color, or breed. It involves shallow processing as it focuses on perceptual features.Category Membership: Categorizing dogs as animals and classifying them as mammals would involve a slightly deeper level of processing compared to physical characteristics. It relates to understanding the broader category to which dogs belong.Semantic Information: This includes knowledge about dogs in terms of their behavior, traits, habits, or general characteristics. It involves a deeper level of processing as it requires understanding the meaning and concept of dogs.Personal Experiences and Emotional Connections: This level of processing involves encoding information about dogs based on personal experiences, emotions, and connections. It is the deepest level of processing as it connects the information to personal relevance and significance.

To know more about memory click the link below:

brainly.com/question/27116776

#SPJ11

The complete questions is :Question: Based On A Poll, 64% Of Internet Users Are More Careful About Personal Information When Using A Public Wi-Fi Hotspot. What Is The Probability That Among Four Randomly Selected Internet Users, At Least One Is More Careful About Personal Information When Using A Public Wi-Fi Hotspot? How Is The Result Affected By The Additional Information That The Survey

How to fix operands could not be broadcast together with shapes?

Answers

To fix the "operands could not be passed along with shapes" error in NumPy, you need to make sure that the shapes of both arrays match or are compatible.

To fix "operands could not be broadcast together with shapes" error in NumPy, you need to follow these steps:

Find the shapes of both arrays and make sure they match, numpy arrays can only be streamed together if their dimensions are the same or compatible.In the given arrays, all dimensions with size 1 are stretched to match the corresponding dimension in the other array.Arrays with mismatched dimensions generate the error "could not pass operands along with shapes".To reshape the array, The reshape() method can be used to change the shape of an array to make it compatible with another array.You can use numpy.reshape() to reshape an array from one shape to another without changing the data.Instead of passing in two matrices, use np.dot() or np.matmul() to perform the operation. The methods np.dot() and np.matmul() can be used to multiply two matrices.Transmission should only be used when necessary.The given error message "operands could not be passed along with shapes" appears when two arrays of different shapes are used in a NumPy operation, and their shapes are not compatible with each other.In NumPy, casting allows the operation to be performed even if the dimensions of the two arrays are not the same.

Learn more about NumPy:

https://brainly.com/question/14105602

#SPJ11

What is the output?
password = "sdf# 356"
>>> password. isalnum()

Answers

The output is False because the string password contains #.

Answer:

The answer is False.

Explanation:

The answer is false becasue it has other characters than letters and numbers.

Have a great day, I hope this helped.

Write a program to output The sum of the cubes of odd integers between 11 and 49​

Answers

Answer:

779400

Explanation:

There are 20 odd integers between 11 and 49, they are 11, 13, 15, 17, 19, 21, 23, 25, 27, 29, 31, 33, 35, 37, 39, 41, 43, 45, 47, 49. There are 5 odd numbers before 11, and 25 odd numbers from 1 to 49.

Use the formula to calculate the sum

25^2 * (2 * 25^2 - 1) - 5^2 * (2 * 5^2 - 1)

= 25^2 * (2 * 625 - 1) - 5^2 * (2 * 25 - 1)

= 25^2 * (1250 - 1) - 5^2 * (50 - 1)

= 625 * 1249 - 25 * 49

= 780625 - 1225

= 779400

Verify:

11^3 + 13^3 + 15^3 + 17^3 + 19^3 + 21^3 + 23^3 + 25^3 + 27^3 + 29^3 + 31^3 + 33^3 + 35^3 + 37^3 + 39^3 + 41^3 + 43^3 + 45^3 + 47^3 + 49^3

= 1331 + 2197 + 3375 + 4913 + 6859 + 9261 + 12167 + 15625 + 19683 + 24389 + 29791 + 35937 + 42875 + 50653 + 59319 + 68921 + 79507 + 91125 + 103823 + 117649

= 779400

Here's a Python program that will output the sum of the cubes of odd integers between 11 and 49:

sum_of_cubes = 0

for i in range(11, 50):

if i % 2 == 1:

sum_of_cubes += i ** 3

print("The sum of the cubes of odd integers between 11 and 49 is:", sum_of_cubes)

This program initializes a variable called sum_of_cubes to 0, then uses a for loop to iterate through the range of numbers between 11 and 49. For each number in that range, it checks if the number is odd by using the modulus operator (%) to check if the number is divisible by 2 with a remainder of 1. If the number is odd, it adds the cube of that number to the sum_of_cubes variable.

Finally, the program prints out the total sum of the cubes of the odd integers between 11 and 49.

Database Model: KimTay

The management of KimTay Pet Supplies (a supplier of pet supplies, food, and accessories located in Cody, Wyoming) has determined that the company’s recent growth no longer makes it feasible to maintain customer, invoice, and inventory data using its manual systems. In addition, KimTay Pet Supplies wants to build an Internet presence. With the data stored in a database, management will be able to ensure that the data is up-to-date and more accurate than in the current manual systems. In addition, managers will be able to obtain answers to their questions concerning the data in the database easily and quickly, with the option of producing a variety of useful reports.

The CUSTOMER table maintains information about each customer, such as their ID, first and last name, address, balance, and credit limit.

CUSTOMER table

In the INVOICES table contains information about each invoice, such as the invoice number, date, and the customer being invoiced.

INVOICES table

The INVOICE_LINE table has the itemized information for each invoice. This includes the item ids, quantity, and price for each invoice.

INVOICE_LINE table

The ITEM table has a information pertaining to each item for sale by KimTay's Pet Supplies. This includes a description, the number in stock, location, and price.

ITEM table

The SALES_REP table includes the information for each sales representative for KimTay's Pet Supplies. This includes first and last name, address, cell-phone, commission, and commission rate.

Task 5: Write and execute the command to retrieve the item ID, description, invoice number, and quoted price for all invoices in the ITEM_INVOICE VIEW for items with a quoted prices that exceed $100

Answers

To retrieve the item ID, description, invoice number, and quoted price for all invoices in the ITEM_INVOICE view for items with a quoted price that exceeds $100.

You can execute the following SQL command:

SELECT item_id, description, invoice_number, quoted_price

FROM ITEM_INVOICE

WHERE quoted_price > 100;

This command will select the specified columns from the ITEM_INVOICE view and filter the results based on the condition that the quoted price is greater than $100.

Learn more about SQL here:

brainly.com/question/31663284

#SPJ11

Describe the term density.

Answers

Density is the frequency of something divided by the area/space. For instance, 50 people per square kilometer of land.

Answer:

Density is the frequency of something divided by the area/space. For instance, 50 people per square kilometer of land.

Explanation:

who is spring trap form fnaf game

Answers

Answer:

fnaf fredy yellow

Explanation:

Answer: Springtrap is William afton from fnaf 3 but he is william afton when he is dead. william afton killed 7 kids (in my au) but originally 5

Explanation:you can look it up for more info

I use the wrap text feature in Excel daily. What is the difference in how this behaves or is used in Excel versus Word? Please explain in detail the differences and similarities.

Answers

The wrap text feature is an essential tool used to format text, particularly long texts or data within a cell in Microsoft Excel. In this question, we need to explain the difference between how wrap text behaves in Microsoft Excel versus how it is used in Microsoft Word.

Wrap Text in Microsoft Excel: Wrap text in Excel is a formatting option that is used to adjust text or data within a cell. When the text entered exceeds the size of the cell, it can be hard to read, and this is where wrap text comes in handy. Wrap text in Excel automatically formats the data within the cell and adjusts the text size to fit the cell's width. If a cell contains too much data to fit in the column, the cell's text wraps to the next line within the same cell.

To wrap text in Excel, follow these simple steps:

Select the cell or range of cells containing the text that needs wrapping. Right-click on the selected cell and click Format Cells. In the Format Cells dialog box, click on the Alignment tab. Click the Wrap text option and then click OK.

Wrap Text in Microsoft Word: In Microsoft Word, the Wrap Text feature is used to format text around images and graphics. It is used to change the way the text flows around the image, allowing users to position images and graphics in the document. Wrap Text in Microsoft Word does not adjust the font size of the text to fit the width of the cell like in Excel.

To wrap text in Microsoft Word, follow these simple steps:

Insert the image in the document. Select the image and go to the Picture Format tab. Click on Wrap Text, and you can choose how you want the text to wrap around the image.

The main difference between the use of Wrap Text in Microsoft Excel and Microsoft Word is that Wrap Text in Excel is used to format long data and adjust text size to fit the width of the cell while Wrap Text in Microsoft Word is used to format text around images and graphics.

To learn more about wrap text, visit:

https://brainly.com/question/27962229

#SPJ11

Option 4: "Inform Me" Create a graphic organizer about the connection between the statements of the problem and collection of data.
hello sorry the research subject is not on the list. can u help me by explaining this?thank u
it's a capstone project research, and our goal is to make a graphic organizer that connects the statements of the problem to collection of data. and the further instructions for the graphic organizer are in the screenshot. Thank you. i just need some example that i can possibly put in the graphic organizer. thank u

Answers

My topic is: Education is a critical factor in influencing individuals, communities, and the global community as a whole. Acquiring knowledge, abilities, principles, and outlooks can come about through either formal or informal methods.

What is the graphic organizer

Education:  Acquiring knowledge, skills, values, and attitudes through formal or informal means.

Education: empowers individuals for personal and professional growth. Education is essential for social and economic development. Education helps reduce inequality by providing equal opportunities regardless of background.

Learn more about graphic organizer  from

https://brainly.com/question/26091844

#SPJ4

The cost of an items is Rs 200. what will be the cost of 50 such items. write a simple program​

Answers

Answer:

In Python:

Unit_Cost = 200

Cost50 = 50 * Unit_Cost

print("Cost of 50 items: Rs."+str(Cost50))

Explanation:

This initializes the unit cost to 200

Unit_Cost = 200

This calculates the cost of 50 of such items

Cost50 = 50 * Unit_Cost

This prints the calculated cost

print("Cost of 50 items: Rs."+str(Cost50))

Which is linux operating system?
1. Private OS
2. Open source OS
3. Windows operating System
4. None of these above​

Answers

Answer: None of these above

hope its help you

have a great day keep smiling be happy stay safe .

Wiliam would like to sort a list of items after the data is already entered
Which method is NOT an available sort option?
number
date
text
symbol

Answers

Answer symbol

Explanation:

Symbol is not an available sort option.

This is an example of what type of formula?

=(D1+D17)

Question 2 options:

ADDITION


SUBTRACTION


RANGE


AVERAGE

Answers

Answer:

Average

Explanation:

The term 'average' refers to the 'middle' or 'central' point. When used in mathematics, the term refers to a number that is a typical representation of a group of numbers (or data set). Averages can be calculated in different ways - this page covers the mean, median and mode.

Need the answer ASAP. Thanks

Need the answer ASAP. Thanks

Answers

Answer:

join

Explanation:

It’s

Join.

That’s the correct word.

How do I calculate this square footage?

How do I calculate this square footage?

Answers

Answer:

To calculate it, you have to break it apart. Sorry for the bad writing but after you break it apart, you multiply the smaller squares. Then with all of the smaller areas, add them together for the final answer which in this case is 456.

How do I calculate this square footage?

Compared with the traditional licensing model in which users purchase and install software, SaaS _____. a.can be accessed from fewer devices per license b.provides more reliable access in areas with no Internet service c.offers less expensive upgrades and new releases d.requires more maintenance on the part of customers

Answers

Compared with the traditional licensing model in which users purchase and install software, SaaS requires more maintenance on the part of customers.

What is software?

Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It can be divided into two main categories: system software and application software. System software is used to operate the computer itself, while application software is used to perform specific tasks for the user. Examples of system software include operating systems, device drivers and utility programs. Examples of application software include word processing programs, spreadsheets, web browsers, and media players. Software is essential for computers to function properly and to be able to perform tasks for the user. Without software, computers would be unable to run.

To learn more about software
https://brainly.com/question/28224061

#SPJ4

_____ is confirming the significance of what another person is feeling.

Answers

Validation: Understanding and showing acceptance for another person                

Answer:

Validation

Explanation:

I took the quiz

Formulas should follow the___
last cell used
signs
order of operations
call of operations

Answers

Answer:

Order of operations

Explanation:

what is functional media? what is the distinction between the three types of functional media? what is motility? list three forms of motility in bacteria

Answers

The following are answers to some of your questions above :

Functional media

Determination of unknown microbial identity, and available in several forms

3 Primary forms of functional media

1. Selective: contain agent(s) that prohibit the growth of some organisms, thus selecting or allowing the growth of other organisms

2. Differential : enable many types of microbes to grow; however, differential media contain an indicator that enables differences between microbes to be visualized

3. Enriched : supplemented with essential growth factors for organisms that do not grow well on typical media

Bacterial Motility

Motility is a Self-propelled motion; present in many but not all bacteria. Bacterial motility is classified into three form: flagellar, spirochaetal, and gliding.

Learn more about bacterial mortility at brainly: https://brainly.com/question/28901124

#SPJ4

which of the following is an ascribed status? group of answer choices queen of england starting quarterback in the super bowl archaeology professor pr

Answers

Queen of England is an ascribed status based on bloodline.

What is Ascribed Status?

Sure, I can help you with that!

The ascribed status is a social position that is assigned to an individual at birth or based on certain characteristics that are perceived as inherent, such as race, gender, or social class.

Out of the options given, the ascribed status would be "queen of England" as this is a position that is typically inherited through bloodline and is not something that can be achieved through personal merit or effort.

Ascribed status: Queen of England

This is a social position that is assigned to an individual based on their bloodline and cannot be achieved through personal effort.

Learn more about  Ascribed status

brainly.com/question/29988680

#SPJ11

What MIPS32 command is associated with the following hexadecimal instruction: 2888006416 A. slti Sto, $a0, 100 B. sub $vo, $t8, $19 C. sub $v0, $t9, $t8 D. slti $a0,$t0, 100

Answers

The MIPS32 instruction associated with the hexadecimal instruction 2888006416 is D. slti $a0, $t0, 100.

What is MIPS32?

MIPS32 is a reduced instruction set computing (RISC) architecture that is based on the MIPS Computer Systems company's MIPS I instruction set. This is one of the most widely used instruction sets in the embedded processor space, and it has been in use for a long time. Because the architecture is both compact and efficient, it is frequently used in embedded applications and is a common platform for embedded systems development.

The MIPS32 architecture is similar to other RISC-based architectures, which are characterised by a limited number of instructions and fast execution times. Instructions have a fixed length of 32 bits, and operands are mostly 32 bits wide. The MIPS instruction set is divided into three different instruction formats. The R-type, I-type, and J-type are the three types of instructions. Each instruction format contains a variety of fields that are used to specify the operands and the operation to be performed.

Learn more about RISC here:

https://brainly.com/question/13266932

#SPJ11

Design factors that are intended to help productivity by minimizing operator fatigue and discomfort are called
ergonomics. Which of the following is an example of a problem that could be caused by poor ergonomics?

1.poor programming technique

2. carpal tunnel syndrome

3. being unable to find the "save" command

4. the manual for an application not being useful

Answers

Number 1, poor programming technique

Answer:

1. poor programming technique

Explanation:

what are three consequences of a negative digital Trail​

Answers

Answer:

The digital footprint that is had behind can have repercussions in every aspect of your adolescent's life, conceivably bringing about botched occupation chances, public sharing of individual data, destroyed connections

Explanation:

Digital trail what's left behind as you calmly peruse the web, post via web-based media or even sort into a visit administration. Regardless of whether you're mindful, you add to your advanced impression or profile every day when you sign onto the Internet. The sites you visit, the news posts you remark on, the remarks you leave via web-based media stages—every one of these things meet up to make a representation of your online life.  

The digital footprint that is had behind can have repercussions in every aspect of your adolescent's life, conceivably bringing about botched occupation chances, public sharing of individual data, destroyed connections — or, in what is likely more pertinent to them at this moment: Their folks discovering what they've been up to and along these lines being rebuffed.

Assignment: Blues Progression
Blues is a sub-genre of jazz that follows some specific guidelines: specifically, the Blues scale and the Blues chord progression.
In this assignment, you’ll write out a 12-bar Blues chord progression. This assignment is a MuseScore assignment. Do not turn in this document for grading.

Directions:

1. Create a new document in MuseScore
a. For the title, write “MuseScore Assignment: Blues”.
b. For the composer, write your name., then click "next".
c. Under "general", choose “Grand Staff”, then click “Next”.
d. Choose G major for your key signature (1 sharp), then click next.
e. Choose “Piano” (in the Keyboards section) for your instrument. (This step may or may not show for you. It's ok either way!)
f. Choose 4/4 for your Time Signature and 12 measures for number of measure.
g. Click “Finish”.

2. In the Bass Clef, write out a 12-bar Blues Chord Progression.
a. Use whole notes for your chords
b. I – I – I – I – IV – IV – I – I – V7 – IV – I – V7

Save your assignment (with your name!) and submit it to the Composition: Blues Progression Dropbox basket. Turn in the MuseScore file only.

Answers

Explanation:

I can provide you with the 12-bar Blues chord progression as you requested:

In the key of G major:

I (G) – I (G) – I (G) – I (G)

IV (C) – IV (C) – I (G) – I (G)

V7 (D7) – IV (C) – I (G) – V7 (D7)

The Roman numerals in parentheses represent the chords to play in each measure, and the chord names outside the parentheses indicate the actual chords to play in the key of G major.

who knows a good binary app or site for addition with 4 numbers ?​

Answers

What ? I don’t get it
I’m not sure but I guess you could use Math.way
who knows a good binary app or site for addition with 4 numbers ?

How do science, mathematics, and technology each influence engineering

Answers

Answer:

In order to start engineering you must know the basics Science, Math, and Technology. For example you need math to get all the parts in the right place and fix any pieces that need to be angled right, science because you need to know what happens if you put this with that if it’ll spark break or anything, and technology because you need to know the different pieces and their purpose, hope it helps!

Explanation:

Answer:

Math: By using numbers and some problems are really hard and they like solving them makes some kids want to do engineering

Science: By do expirments and getting kids excited about doing something like engineering

Technolgy: I think this speaks for itself by saying that if you like computers and dealing with technogly you would want to do engineering

Explanation:

A month ago, Amelia used a long-awaited check to make online purchases for gardening supplies. Now she sees advertisements for similar garden supplies on every website she visits. What is the MOST likely reason these ads are appearing?

A.
Amelia specified on her browser preferences to see only ads related to garden supplies.

B.
Marketers tracked Amelia as she visited various websites to help guide their ad placements.

C.
There is no real basis for these ads to appear, though that doesn’t lessen Amelia’s sense of being tracked.

D.
Amelia's computer has enough artificial intelligence to predict what she will likely purchase.

Answers

The likely reason these ads are appearing as Amelia's computer has enough artificial intelligence to predict what she will likely purchase. Thus the correct option is D.

What is an advertisement?

An advertisement has referred a tool of promotion which helps in creating awareness as well as education prospect audiences that a new product is launched or modification in existing products in order to persuade the to buy.

The internet or social media site you are visiting may receive delivery confirmation from the computer or search engine you are using, which is the most likely cause of the problem. It is possible to evaluate a customer's purchasing habits by collecting user data.

Therefore, option D is appropriate.

Learn more about Advertisement, here:

https://brainly.com/question/3163475

#SPJ1

Which method will return an empty string when it has attempted to read beyond the end of a file? a. read b. getline c. input d. readline d . readline

Answers

It is to be noted that the method will return an empty string when it has attempted to read beyond the end of a file is: "readline" (Option D).

What is an empty string?

An empty string is a zero-length string instance, but a null string has no value at all. The character "" represents an empty string. It consists of a zero-character sequence. Null represents a null string.

The empty string is a specific instance in which the sequence has length zero and so contains no symbols. There is only one empty string since two strings are only distinct if their lengths or symbol sequences differ.

Learn more about files:
https://brainly.com/question/14338673
#SPJ1

You find a list of websites that relate to your chosen topic and click on the first one. You ask yourself the three questions presented in this lesson to see if this site is reliable: 1) Who wrote it? There isn't an author listed anywhere that you can find. 2) What type of site is it? The site name ends in . 3) How current is the information? You see the site was updated yesterday. Is this website reliable and worth examining further? True or False?

Answers

Answer:

False

Explanation:

Information reliability is essential in production. sourcing information from a reliable source is base on several criteria. They are; the author of the resource file, the type of media platform holding the information, the frequent revision of the information, additional support or collaboration to publish public information, etc.

A government website ( with the site-address ending with a '.gov' ) which is concurrently revised by the institute, gives a piece genuine and reliable information, whereas a commercial website with no author and just recently revised or published, would be judged as an unreliable source of information

Positives and negatives side effects of government the stimulus check


Help pls☹️

Answers

Answer:

Stımulus check ıs the check offered to cıtızens of America inorder to help them to meet thier needs at that particular point in time. This is done, if there is an unforseen circumstances that made them not to earn an income.

Some of the postitves of stimulus check include:

1. Ability of the citizens to pay for their rent and other bills.

2. Ability to do some shopping and feeding

3. It create the sense of recognition among the citizens that the government always remember them in their moment of their needs.

4. To let the working class people know that their tax payment is used judiciously in helping other citizens.

The negative side effects of stimulus check include:

1. It makes people lazy since it is free money.

2. More money would be spent in the course of trying to meet the needs of everyone.

3. People would manipulate the system thereby getting more than one stimulus pay check.

4. Working class people would be angry with the system. This is because, they wil feel that all their hard work and taxes isbeing used to feed some lazy citizens who has never contributed anything to the country.

5. It would increase the debt profile of the government.

Explanation:

Other Questions
Drag the tiles to the correct boxes to complete the pairs. Match each function to its domain and range. amanda wants 16 bottels of water she only has 20 dollars each bottel costs 2 does she have enough in contrast to a patient with a blood glucose level of 25 mg/dl, a patient with a blood glucose level of 800 mg/dl would be expected to present with: The right of an agent to retain possession of his principalsgoods until he is paid is called agent:a.indemnityb.subrogationc.mitigation I like onions, but they don't like me. What kind of figurative language is it? please help asap what is the difference between ovaries and testes Can someone Write a MLA works cited page for me please, I honestly wish I could do it myself but Ive never done one in my life before and I have no idea how to do it You carry out the reaction below in the winter and found that you collected 50 g of Ca(OH). In the summer, you collect less Ca(OH), even though you ran the reaction under the same conditions. What is a possible explanation? Which principle of U.S. government is most clearly reflected in the Bill of Rights?Individual rightsRepublicanismSeparation of powersChecks and balances Which type of data is best represented using a line plot?data that changes over timedata that is spread out over a large range of numbersfrequency data that can be plotted under categorical headingsfrequency data that can be plotted on a number line C 100 cng nhn lm thu sn xut trong 1 thng c 12500 n v sn phm vi chi ph t bn bt bin l 250.000 USD. Gi tr sc lao ng 1 thng ca mi cng nhn l 250 USD, t sut gi tr thng d l 300%.Hy xc nh gi tr ca 1 n v sn phm v kt cu ca n What is the adverb in the sentence. The architect who just restored that apartment building won an award for his work. compute the critical value z a/2 that corresponds to 97% level of confidence, compute the critical value z a/2 that corresponds to 80% level of confidence? For the triangles to be congruent by hl, what must be the value of x? 8 9 17 34 (X+m)(c+n) if m=5 and n=-7 Select the reading strategy that will help the reader monitor comprehension in each situation.Michael is reading a text with long sentences about the importance of learning philosophy. He couldMaria has forgotten the name of Don Quixote's horse. She should considerMia is wondering if the novel she's reading is referring to current issues in society. She couldMiguel is wondering about details in the setting of the novel Wuthering Heights. He should consider The exchange rate in some prehistoric village was 6 jagged rocks for every 2 smooth pebbles. Also, one shiny rock could be traded for 3 smooth pebbles. If Joaquin has 30 jagged rocks, what is the maximum number of shiny rocks he could trade for? A. 6B. 4C. 5D. 3 find the value of x that makes lines u and v parallel. Maybe the not knowing how to care for the fish was helped along by the steam heat of theflat. Maybe the bowl was not large enough. There might have been a dozen reasons.You never can tell."The organizational pattern of the selection is(2 points)1)spatial.2) chronological.3) cause/effect.4) compare/contrast Assume that you have just won an essay competition, and you are offered two options for your prize money, either $500 one year from now or $450 today. If the interest rate is 5%, which prize do you accept? Explain