Use a text editor (such as Nano) to open the 'notadmin.txt' file. Change this file so that it reads 'the answer' instead of 'not the answer'. Use 'md5sum' to generate an MD5 hash of the file again. What are the first four characters of the new MD5 hash of this file

Answers

Answer 1

The first four characters of the new MD5 hash of the 'notadmin.txt' file are: 0e05.

To change the content of the 'notadmin.txt' file, you can use a text editor such as Nano. Open the file using the Nano text editor and replace the phrase 'not the answer' with 'the answer'. Save the changes and exit the editor.

Next, you can generate the MD5 hash of the modified file using the 'md5sum' command. The MD5 hash is a unique string of characters generated by applying the MD5 algorithm to the contents of a file. It is commonly used to verify the integrity of files and detect any changes made to them.

After generating the MD5 hash of the modified file, you can examine the hash value. The first four characters of the new MD5 hash for the 'notadmin.txt' file, where the content has been changed to 'the answer', are 0e05.

This means that the MD5 hash for the modified file starts with the characters '0e05'. MD5 hashes are hexadecimal values, and the '0e' prefix indicates that the following characters are interpreted as an exponent. In this case, the exponent value is '05', which is equivalent to 5.

It is important to note that MD5 is a weak cryptographic hash function and is no longer considered secure for sensitive applications. It is susceptible to collision attacks, where different inputs can produce the same hash value. Therefore, it is not recommended to rely on MD5 for security purposes.

Learn more about MD5

brainly.com/question/32218881

#SPJ11


Related Questions

On SnapI blocked someone, unblocked them and I want to add them again but I forgot their username. Is there anything I can do? Does snap have a list of like my former friends or people I’ve blocked?

Answers

Answer:

There is no list of people you had blocked formerly, however you should have seen their username when unblocking them? That's the only way I can think to find their user. Maybe if you have a friend who knows their username, you can get it that way. Or if you remember just a bit of it or their first/last name, you can try searching that.

Montel needs to add a calculated field into a report that he has built that will show the total sale price of items sold in a given month. Which type of control should he add in Design view?

control box

text box

label

subreport

Answers

Answer: Label

pls mark brainleist

Answer:

D. Subreport

Explanation:

A subreport is a report inserted into another report.

Let me know if this is correct.

Hope this helps!

B the payload contains the following data:
11110000 10000011 00110011 00111111 11111110 11100011
use this data to show how the receiving computer can verify that the
received payload was error-free.

Answers

A cyclic redundancy check that adds every single bit to the payload and stores the value as a hexadecimal number before transmission.

When the data arrives, the computer recalculates one bit. The computer compares this value with the value sent in the payload. If the values ​​match, no error occurred. Otherwise, the data will be resent. Big data software is used to process complex data and extract information from a large number of data sets. Traditional databases are unable to process a large amount of data. We can therefore use this tool to manage our data with ease.

10010101 11011000 0

01110000 11011011 1

00111000 00000000 1

00011011 00111010 1

01110000 10100101 1

10100110 10011100 0

Learn more about data here-

https://brainly.com/question/11941925

#SPJ4

What does it mean by does the author create an emotional connection toward the readers?

(Emotional connection reading definition)

Answers

Answer:

the author makes an emotional connection between you and the character

Explanation:

short version:you feel the characters emotion

ANYONE THERE!?!?








TO HELP ME.

ANYONE THERE!?!? TO HELP ME.
ANYONE THERE!?!? TO HELP ME.
ANYONE THERE!?!? TO HELP ME.
ANYONE THERE!?!? TO HELP ME.

Answers

Answer:

Penguin

Explanation:

the sprite is Penguin and it is going to say what you put into the answer spot

Cross peoples father chops just disappear with the advent of manufacturing today some manufacturing jobs are disappearing in favor of digital solutions what parallel can you draw between these two phenomena guns

Answers

Both the disappearance of manual labor jobs in manufacturing and the decline in the use of hand-chopped firewood can be seen as consequences of technological advancements and increased automation.

What is Automation?

Automation refers to the use of technology to perform tasks that would otherwise require human intervention. This can be achieved through the use of machines, software, or algorithms that are designed to perform specific tasks without the need for direct human involvement.

Automation has been widely adopted in industries such as manufacturing, transportation, and finance, as it allows for greater efficiency, speed, and cost savings. However, it can also result in job loss and the need for workers to acquire new skills to adapt to changing job markets.

To learn more about Automation, visit: https://brainly.com/question/28530316

#SPJ1

6. Before cleaning your electronics, you should turn off the power to the device.
True
False

Answers

Answer:

True

Explanation:

If you leave the device on while cleaning, you risk electrocution.

Answer:

true to prevent damage or a nasty shock, you need to turn off power to your machine. For computers, you should power down and then unplug the device. You'll also want to unplug the individual monitors. Unplug laptops and remove their batteries if your model allows for this to be done. Explanation:

Tcp is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. computer 1 sends a syn packet to computer 2. which packet does computer 2 send back?

Answers

TCP as an connection-oriented protocol ]uses a three-way handshake to establish a connection to a system port and the packet that does the above i and 2 are: SYN/ACK

What is SYN and ACK?

Client requests connection is one that is often done by sending SYN kind of (synchronize) message to the server.

Note that the Server is one that acknowledges by transmitting SYN-ACK (synchronize-acknowledge) message back to its client.

Hence, the  Client often responds using an ACK ( which is an acknowledge) message, and the connection is  said to be set up or established.

Hence, TCP as an connection-oriented protocol ]uses a three-way handshake to establish a connection to a system port and the packet that does the above i and 2 are: SYN/ACK

Learn more about TCP  from

https://brainly.com/question/27742993

#SPJ1

change into binary to decimal

Answers

Hope it helps !!

☘☘☘.................

change into binary to decimal

Answer:

90 into decimal

ok for eg.

2|90|0

2|44|0

2|22|0

2|11|1

2|5|1

2|2|0

2|1|1

0

(90)10 to decimal (01911000)2

To light up an LED, you need to connect the cathode leg to one of the Digital Pins and connect the Anode leg to the ……………. on the Arduino board.

Answers

Answer bobobobobobobobo

In what situations might you need to use a function that calls another function?

Answers

Answer:

Explanation:

It is important to understand that each of the functions we write can be used and called from other functions we write. This is one of the most important ways that computer programmers take a large problem and break it down into a group of smaller problems.

7.5 Code Practice I need help

Answers

Answer:

ok hold on ok

Explanation: ok

What are files that reproduce by making copies of themselves within a computer’s memory, storage, or network?.

Answers

A file that can make copies of itself on a computer's memory, storage, or network is a computer worm.

Explanation of computer worms

A computer worm is defined as a computer program that can reproduce itself in a computer system. A worm can reproduce itself by utilizing the network (LAN / WAN / Internet) without the need for intervention from the user itself. Worms are not like ordinary computer viruses, which reproduce by inserting their own programs into existing programs on the computer, but worms take advantage of open security holes, known as vulnerabilities.

Computer worms have several structures. The following are structures or components that are commonly owned by computer worms:

ReconnaissanceAttackCommunicationReignIntelligent

Learn more about computer worms at : brainly.com/question/16582802

#SPJ1

What type of animation is used to move objects off of a slide?
A Elaborate
B Emphasis
CEntrance
D Exit

Answers

Answer:

I do not know 100% but i think it is the Exit which is letter D

Explanation:

How does computer science play a role in art?

Answers

Answer:

Many artists now learn to code; computer scientists develop algorithms with aesthetics as the goal. Projects such as Deep Dream, a program that uses neural networks to produce new visuals, let anyone use AI approaches to generate, ostensibly, art.

/*
Third section of sqlzoo, SELECT from Nobel
*/
--#1
/*
Change the query shown so that it displays Nobel prizes for 1950.
*/
SELECT yr, subject, winner
FROM nobel
WHERE yr = 1950
--#2
/*
Show who won the 1962 prize for Literature.
*/
SELECT winner
FROM nobel
WHERE yr = 1962 AND subject = 'Literature'
--#3
/*
Show the year and subject that won 'Albert Einstein' his prize.
*/
SELECT yr, subject
FROM nobel
WHERE winner = 'Albert Einstein'
--#4
/*
Give the name of the 'Peace' winners since the year 2000, including 2000.
*/
SELECT winner
FROM nobel
WHERE subject = 'Peace' AND yr >= 2000
--#5
/*
Show all details (yr, subject, winner) of the Literature prize winners for 1980 to 1989 inclusive
*/
SELECT yr, subject, winner
FROM nobel
WHERE (yr >=1980 AND yr <=1989) AND subject = 'Literature'
--#6
/*
Show all details of the presidential winners:
Theodore Roosevelt
Woodrow Wilson
Jimmy Carter
*/
SELECT *
FROM nobel
WHERE winner IN ('Theodore Roosevelt', 'Woodrow Wilson', 'Jimmy Carter')
--#7
/*
Show the winners with first name John
*/
SELECT winner
FROM nobel
WHERE winner LIKE 'john%'
--#8
/*
Show the Physics winners for 1980 together with the Chemistry winners for 1984.
*/
SELECT *
FROM nobel
WHERE (subject = "Physics" AND yr = '1980') OR (subject = 'Chemistry' AND yr = 1984)
--#9
/*
Show the winners for 1980 excluding the Chemistry and Medicine
*/
SELECT *
FROM nobel
WHERE yr = 1980 AND subject NOT IN ('Chemistry', 'Medicine')
--#10
/*
Show who won a 'Medicine' prize in an early year (before 1910, not including 1910) together with winners of a 'Literature' prize in a later year (after 2004, including 2004)
*/
SELECT *
FROM nobel
WHERE (subject = 'Medicine' AND yr < 1910) OR (subject = 'Literature' AND yr >= 2004)
--#11
/*
Find all details of the prize won by PETER GRÜNBERG
*/
SELECT *
FROM nobel
WHERE winner LIKE 'peter gr%nberg'
--#12
/*
Find all details of the prize won by EUGENE O'NEILL
*/
SELECT *
FROM nobel
WHERE winner = 'Eugene O''Neill'
--#13
/*
Knights in order
List the winners, year and subject where the winner starts with Sir. Show the the most recent first, then by name order.
*/
SELECT winner, yr, subject
FROM nobel
WHERE winner LIKE 'sir%'
ORDER BY yr DESC, winner
--#14
/*
The expression subject IN ('Chemistry','Physics') can be used as a value - it will be 0 or 1.
Show the 1984 winners ordered by subject and winner name; but list Chemistry and Physics last.
*/
SELECT winner, subject, subject IN ('Physics','Chemistry')
FROM nobel
WHERE yr=1984
ORDER BY subject IN ('Physics','Chemistry'),subject,winner
Footer
© 2023 GitHub, Inc.

Answers

The mentioned code consists of a sequence of SQL inquiries aimed at fetching information from the "nobel" database table.

What does each query do?

Each query serves a distinct purpose and extracts diverse data, depending on specific criteria such as the year, subject, or laureate of the Nobel prizes.

The data is chosen and sifted by the code according to specific conditions, and the output is arranged in predetermined patterns by applying functions such as SELECT, WHERE, LIKE, IN, and ORDER BY.

The search requests yield data on the recipients of Nobel awards in particular fields, during particular periods, and based on specific regulations, among other factors.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ4

User can use ______ commands to search for and correct words in a document

Copy and Paste


Find and Replace


Header and Footer


Print and Print preview

Answers

find and replace is the answer

professional graphic artists would use blank______ programs, also called page layout programs to create documents such as brochures, newsletters, newspapers, and textbooks.

Answers

Professional graphic artists would use page layout programs, also known as desktop publishing (DTP) programs, to create documents such as brochures, newsletters, newspapers, and textbooks.

Page layout programs, or desktop publishing programs, are specialized software designed for creating and designing printed materials. These programs provide a range of tools and features that allow graphic artists to create visually appealing and professionally formatted documents. They offer precise control over page layout, typography, graphics placement, and other design elements.

With page layout programs, graphic artists can import and manipulate images, adjust text formatting, create columns and grids, apply color schemes, and arrange content in a visually pleasing manner. These programs often include templates and pre-designed layouts to assist in creating various types of documents, making it easier for graphic artists to achieve a polished and professional look.

By using page layout programs, professional graphic artists can unleash their creativity and produce high-quality designs for brochures, newsletters, newspapers, textbooks, and other printed materials. These programs provide the necessary tools and flexibility to bring their artistic vision to life while ensuring that the final documents meet industry standards for design and layout.

To learn more about page layout visit:

brainly.com/question/27842450

#SPJ11

explain how a binary search tree can be used as the implementation of the map adt. would this be a good choice for this implementation?

Answers

A binary search tree can be used as the implementation of the map ADT. Yes, this is a good choice for this implementation.

What is a binary search tree?A binary search tree is a kind of binary tree in which each node has at most two child nodes, commonly known as left and right child nodes. It has the following features:Each node has a unique key. The left subtree of a node contains only keys lesser than the node's key.The right subtree of a node contains only keys greater than the node's key.Both the left and right subtrees must be binary search trees themselves. We can use the binary search tree data structure as the basis for the map ADT implementation. As a result, for a given key, the tree structure maps keys to values. Since the tree maintains keys in sorted order, it's easy to find an element in the binary search tree. The data structure is frequently employed in search-based applications due to its efficiency.The map ADT can be implemented using a variety of data structures, including a binary search tree. It is appropriate to use a binary search tree for this purpose because it has all of the required functionality for the map ADT, such as insert, delete, search, and update functions. Furthermore, the binary search tree's time complexity for these operations is generally low. As a result, we may conclude that using a binary search tree as a map ADT implementation is a good decision.

learn more about binary search tree here:

https://brainly.com/question/12946457

#SPJ11

Q:Ideally, how often should you back up the data on your computer? once an hour once a day once a month once a year

A: It's once a day

Answers

Answer:

Ideally you should do it once a day!

Explanation:

On edge! And it's on google too but I know it from my tests and learning!

Ideally, you should back up the data on your computer regularly, and the frequency of backups will depend on the amount and importance of the data you generate or modify.

What is backup?

Backup refers to the process of creating a copy of data and storing it in a separate location or device in case the original data is lost, damaged, or corrupted.

Ideally, you should back up your computer's data on a regular basis, with the frequency of backups determined by the amount and importance of the data you generate or modify.

It is recommended to back up critical data, such as important documents, financial records, and photos, at least once a day, and even more frequently if possible, such as hourly or in real-time.

Monthly or weekly backups may be sufficient for less critical data. The key is to have a consistent and dependable backup system in place to safeguard your data in the event of hardware failure, theft, loss, or other disasters.

Thus, this way, the data should be backed up regularly.

For more details regarding backup, visit:

https://brainly.com/question/29590057

#SPJ2

what specific types of backups will allow you to perform a system state recovery? (choose all that apply.)

Answers

The types of backups that will allow you to perform a system state recovery are full backups, differential backups, and incremental backups.  So, All of these are correct

A full backup is a complete copy of your data stored in a single file. It allows for a complete system recovery because it contains all the data in the system.

Differential backups contain only the files that have changed since the last full backup. This means that if the system was to crash, only the files that have changed since the last full backup will need to be recovered.

Incremental backups contain only the files that have changed since the last full or incremental backup. This type of backup allows you to save time and space because only the most recently changed files need to be backed up.

Overall, these three types of backups will allow you to perform a system state recovery in the event of a system crash or failure.

So, the correct answer to the question "what specific types of backups will allow you to perform a system state recovery? (choose all that apply.) full backups, differential backups, incremental backups, all of these " is All of these as full backups, differential backups, and incremental backups allowing system state recovery.

You can learn more about the backup at: brainly.com/question/28232811

#SPJ11

write an expression that evaluates to true if and only if the value of x is equal to zero.

Answers

Only when the value of x is equal to zero does the expression x == 0 evaluate to true.

Value in ethics and social sciences refers to the degree of significance of something or action, with the intention of deciding which acts are preferable to take or how to live (normative ethics in ethics), or to define the relevance of various activities. Value systems are prospective and prescriptive beliefs that influence an individual's ethical behavior or serve as the foundation for their deliberate actions. Frequently, core values are solid and secondary values can be changed. The ethical values of the things an action increases, reduces or modifies may also have an impact on how valuable it is. An "ethic or philosophic good" is a thing that has "ethical value" (noun sense).

Learn more about Value here:

https://brainly.com/question/15004268

#SPJ4

What is the largest domain?

Answers

Note that this function is fully defined for any values of x other than 0 for the domain. The largest domain is (,0)(0,), assuming that we want to remain with real values.

Is domain ordered by size?

Keep in mind that the domain and range are always written from smaller to larger values, or from left to right, and that the range is always written from the bottom of the graph to the top of the graph.

Is the realm of Infinity?

The open interval from -infinity to infinity can be used to represent the set of real numbers. Infinity and negative infinity are not included in the domain, as indicated by the parenthesis next to the infinity symbols. This is due to the fact that these values are not true numbers.

To know more about the domain visit:-

https://brainly.com/question/28135761

#SPJ4

The technique that allows you to have multiple logical lans operating on the same physical equipment is known as a.

Answers

Answer:

As far as i know, it is Virtual Local Area Network (VLAN). You can read more about this here: https://en.wikipedia.org/wiki/VLAN

A business analyst compares 2017 daily sales to 2018 daily sales using descriptive statistics for each. In 2017, the standard deviation of daily sales was 73.87, while in 2018 the standard deviation of daily sales was 136.32. The analyst could conclude that ____________.

Answers

Answer:

The analyst could conclude that there was more variation in sales in 2018.

Explanation:

Given

\(SD_{2017} = 73.87\)

\(SD_{2018} = 136.32\)

Required

Conclusion about the standard deviations

In statistics, standard deviation gives the average variation in the data being measured.

The standard deviation of 2018 is more than that of 2017. This implies that, in 2018, there is more variation in daily sales compared to 2017

So, the analyst could conclude that there was more variation in sales in 2018.

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

4.2 Code Practice: Question 1
Can someone help me write the code in python language?

Answers

Answer:

number = int(input("Enter a number: "))

sum = number

c = 1

while (sum<=100):

   number = int(input("Enter a number: "))

   sum = sum + number

   c = c + 1

print("Sum: " + str(sum))

print("Numbers Entered: " + str(c))

Explanation:

Hope this helps lovely :)

top 10 ways to survive squid game?

Answers

Answer:

dont d i e

Explanation:

ik

Answer: use tactics for the games, in rlgl, kinda runwalk so that you dont trip when the doll stops singing or says red light

in honey comb, lick the cookie

in tug of war, tie the rope around your back if you are the last in line

in marbles, if the normal version is not working for you, do the one you throw, its quite easy

in glass bridges, the tempered glass has a wavy reflection

in squid game, if your quick, do offense, if your strong, do defence and go near the triangle to narrow out the goal

Explanation: ive seen way too many tactic videos on yt

the hamming distance between two unsigned integers is the number of positions at which the corresponding bits are different. given two unsigned integers x and y, return the hamming distance between them. unsigned int is 4 bytes no requirement of running time either for time or memory. all standard libc functions are allowed. int hamming(unsigned x, unsigned y) { } input: x

Answers

To calculate the Hamming distance between two unsigned integers, x and y, you can use a bitwise XOR operation followed by counting the number of set bits in the result.

The implementation of the function "int hamming(unsigned x, unsigned y)" would involve performing a bitwise XOR operation between x and y, which results in a value where the corresponding bits are set if and only if they differ between x and y. Then, you can use a bit-counting algorithm, such as the "popcount" function, to count the number of set bits in the XOR result. The resulting count would represent the Hamming distance between the two unsigned integers.

By using the XOR operation and counting the set bits, you can efficiently determine the number of positions at which the corresponding bits are different between the two unsigned integers. This approach provides a straightforward and effective way to calculate the Hamming distance without any specific requirement for running time or memory usage, and it utilizes standard libc functions.

Learn more about set bits here: brainly.com/question/3787658

#SPJ11

Select the best answer for the following:
Computer can
i. do calculations ii. store data 111. take a decision
a.
iv, all of them​

Answers

iv— it can do all of them
Other Questions
(2, -4) and (6,-10)find the midpoint of the segment If productCost and productPrice are numeric variables, and productName is a string variable, which of the following statements are valid assignments? If a statement is not valid, explain why not.productCost = 100 which of these is the best description of voice? question 1 options: the sound produced by humans and other vertebrates using the lungs the expression of human communication through which knowledge can be explained and shared the oral expression of thoughts, feelings, and ideas -a? - 2bc - Iclif a = -2, b = 3,and c = -3problem in the photo algebra why do we need confidence intervals? (choose one or more) group of answer choices to give insight about the magnitude of the effect to express statistical uncertainty to accurately state a range of a population parameter to tell us the chance (95%) of a particular outcome in 2022, laureen is currently single. she paid $2,440 of qualified tuition and related expenses for each of her twin daughters sheri and meri to attend state university as freshmen ($2,440 each, for a total of $4,880). sheri and meri qualify as laureen's dependents. laureen also paid $1,770 for her son ryan's (also laureen's dependent) tuition and related expenses to attend his junior year at state university. finally, laureen paid $1,270 for herself to attend seminars at a community college to help her improve her job skills. what is the maximum amount of education credits laureen can claim for these expenditures in each of the following alternative scenarios? note: leave no answer blank. enter zero if applicable. Which of these options is a simple sentence?Choose 1 answer:Choose 1 answer:(Choice A) I dont want to go into this caveI think its full of bats!AI dont want to go into this caveI think its full of bats!(Choice B) This cave is full of bats; I don't want to go inside!BThis cave is full of bats; I don't want to go inside!(Choice C) I don't want to go inside this cave full of bats.CI don't want to go inside this cave full of bats. Quote of the Week: Raise your words, not your voice. It is rain that grows flowers, not thunder. - Rumiwhat does this mean? don't say random thoughts. An ideal gas occupies 400ml at 270 mm Hg and 65C. If the pressure is changed to 1.4 atm and thetemperature is increased to 100C, what is the new volume? Which one is right ! red paint is 1 and blue paint is 3 how much red is there for each blue? Im low on points so u sadly only get 10 Literally, the word courante means running. As such, the dance is fast paced.TrueFalse Which set of equations would have infinitely many solutions?y = 3x + 7y=3x+7 and y = 3x - 5y=3x5y = \frac{6}{2}x + \frac{8}{2}y=26x+28and y = 3x + 4y=3x+4y = 5x + 10y=5x+10 and y = -5x - 10y=5x102y = 2x2y=2x and y = 2xy=2x The table provides various values including all minimum and maximum of a cosine function f(x) on the interval [0, pi] What is the period of the function One can use the Gibbs free energy definition, written here at standard pressureg=h-tsto compute the Gibbs free energy at any arbitrary temperature. One can additionally assume that theenthalpy and entropy of a reaction do not change with temperature significantly if the change from 298 is notgreat. In the next few exercises we will assume thatht=h298. and. st=s298so that we can use the enthalpy and entropy of a reaction at 298 K to estimate AGO at any other T.Estimate the Gibbs free energy of a reaction at 537.6 K if the enthalpy and the entropy are -91.2 kJ mol and410.3 J mol1 K1 respectively.g537.=220668.5 kJ mol-1. You are a science student completing an outline to guide you in conducting an experiment. You create a main topiccalled Equipment. You create subtopics for this main topic named Bottles, Scale, and Safety Glasses. Which outline stepare you performing?labelingorderingO brainstormingo organizing coco promised to sell estee her diamond necklace and estee promised to pay $2,000 for the necklace. what type of contract is this? car wheels slip in mud The prism below is made of cubes which measure of a centimeter on one side. Which of the following represents the volume of the prism? Drag the tiles to the correct boxes to complete the pairs.Simplify the inequalities and match them with the graphs that represent them.arrowRightarrowRightarrowRightarrowRight3x > 152x > 12x + 1 < 87x < 42 i need answers asp