with blocked top-level domain lists, email from entire countries or regions can be blocked and treated as spam. group of answer choices true false

Answers

Answer 1

The given statement is true which says with blocked top-level domain lists, email from entire countries or regions can be blocked and treated as spam.

What is a top-level domain?

The final component of a web address, which often comes after your domain name, is called a top-level domain. For instance, ".com"  Most likely, when browsing the internet, you came across various TLD subtypes. In fact, the IANA registry estimates that there will be over 1000 TLDs available in 2021.

Which five top-level domains are there?

TLDs come in 5 official categories:

Generic top-level Domains (gTLD)

Sponsored top-level Domains (sTLD)

Continent Code top level Domains (ccTLD)

Infrastructuretop level Domain (ARPA)

Test tTLDs, or top-level domains

To know more about Top-level domains visit:

https://brainly.com/question/28041008

#SPJ1


Related Questions

What is physically attractive in men (as judged by women) Multiple Choice is similar to what is physically attractive in women, namely, large eyes, small nose, small chin, and full lips. matters little to women in their choices because women don't care much about physical attractiveness. is more dependent on culture than what is attractive in women. depends partly on the woman's menstrual cycle.

Answers

Physically attractive in men, as judged by women, is partly dependent on the woman's menstrual cycle.

Research has indicated that women's preferences for certain physical traits in men can vary across different stages of their menstrual cycle. For example, during the fertile phase, women may show a preference for masculine features, such as a strong jawline or facial symmetry, which are associated with good genetic fitness. However, during other phases of the menstrual cycle, women may prioritize traits such as kindness, intelligence, or social status over physical appearance. Thus, the attractiveness of men to women can be influenced by hormonal and cyclical factors.

Learn more about menstrual cycle here:

https://brainly.com/question/32267539

#SPJ11

12. Which expression is equivaleType the correct answer in the box. Spell all words correctly.

Nathan is creating a presentation for the employees at his office. Which media element should he use in the navigational buttons and menus in his presentation?

Nathan should use text or ______elements for the navigational buttons and menus in his presentation. Nt to the given expression?

Answers

Answer:

nathan should use text or media element for the navigational button and menus in the presentation

Answer:

i think the first drop down is normal and second one complex

Explanation:

Question 10 of 10
What may occur if it is impossible for the condition in a while loop to be
false?
A. The program will find a way to meet the condition.
B. The loop will iterate forever.
C. The game's performance will speed up.
D. The amount of code will not be manageable.
SUBMIT

Answers

The answer is B).

The loop will iterate forever.

What would be displayed if you pinged a website that is down? By putting cmd in the start button and click on command prompt.

Answers

The result after pinging a website that is down will contain the line "Request timed out".

To carry out this simple procedure,

1. press the start button. While holding it, use another finger to press "R".

This will call up a dialogue box called "Run".

2. The Run dialogue box will contain a space where you can type "CMD" and hit the enter key. This will call up the Command Prompt interface.

3. Soon as that interface is displayed, type "ping" leave a space. Then type the name of the website you want to ping.

4. Soon as that is done hit the enter button. If the website is live and healthy, it will return  four lines each starting with "Reply from...."

5. If however, the resultant message contains "Request timed out", then the website is down.

Learn more about Pinging a Website here:

https://brainly.com/question/4261344

What would be displayed if you pinged a website that is down? By putting cmd in the start button and

An example of documentary evidence that might be presented at trial for a cyber crime is:


A. None of these choices.

B. data retrieved from slack space on a hard drive.

C. a cellular telephone.

D. a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses.

Answers

It’s d cause it has valuable info that the person was using to commit the crime

An example of documentary evidence that might be presented at trial for cybercrime is a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses. Thus, option D is correct.

 

What is the evidence?

Evidence is really the data used to attempt to support anything in a court of justice. Evidence is gathered from people, artifacts, and records. The only means through which the court may draw conclusions and reach a ruling is via the use of evidence.

According to the definition of information, it is the demonstration of any claim to be true. A hard copy of a hacker's worksheet with contact information and e-mail accounts is an illustration of documented evidence that might be used in court to prove a cybercrime. Therefore, option D is the correct option.

Learn more about evidence, here:

https://brainly.com/question/14370298

#SPJ2

1 point


If F = 4.0 N and m = 2.0 kg, what is the magnitude a of the acceleration for


the block shown below? The surface is frictionless. *


a.


F


F


40°


5.3 m/s^2


4.4 m/s^2


3.5 m/s^2


6.2 m/s^2


8.4 m/s^2

Answers

Answer:

2.0 m/sec^2

Explanation:

I don't see a block, but will assume the force is oriented in a horizonal direction and there is no friction.

F = ma

1 Newton is 1 kg*m*s^2

4.0 kg*m*s^2 = (2.0kg)(a)

2.0 m/sec^2

The options don't match, so I will assume the force is not parallel to the block.  Since all off the options are higher than 2.0 m/sec^2, it appears that the block is moving downward, and the force of gravity needs to be considered, and added.  The two vectors are the 4.0N force (at an angle) and the force of gravity (directed down).  The resultant vector, the combination of these two forces, will provide the correct answer.

What three blocks of addresses are defined by RFC 1918 for private network uno? (Choose three)
1. 10.0.0.0/8
2. 239.0.0.0/8
3. 169.254.0.0/16
4.100.64.0.0/14 05.
5. 172.16.0.0/12
6.192.168.0.0/16

Answers

The three blocks of addresses defined by RFC 1918 for private network uno are:
1. 10.0.0.0/8
2. 172.16.0.0/12
3. 192.168.0.0/16


What is RFC 1918?

RFC 1918 refers to a set of guidelines established by the Internet Engineering Task Force (IETF) that define a range of private IP address blocks to be used within a private network. These private IP address ranges are not globally routable, meaning that they are not meant to be used on the public internet. Instead, they are reserved for internal use within a private network to facilitate communication between devices without requiring public IP addresses. The three private IP address ranges defined by RFC 1918 are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.

Learn more about RFC 1918: https://brainly.com/question/12950573

#SPJ11

Why is it important to use the correct fingers when typing?

Answers

Explanation:

Typing quickly and accurately with correct finger placement involves building up some muscle memory in your hands, so they feel comfortable reaching for keys in sequence and the movements become automatic.

Answer:

It's important to use the correct fingers when typing to build a habit of quicker and proper typing. It can also make you more comfortable with speed-typing.

Jimmie Flowers, known as Agent 13, is back! However, he has a secret that until now nobody has noticed (although we aren't sure how we missed it!) Jimmie can't stand to have objects that are not properly aligned. If any object is slanted (not aligned), he feels obligated to adjust that object to properly align them. Jimmie needs your help, though! He wants you to take bricks (which we will represent by just one of their edges) and determine if they are aligned or not. The Problem: Given two unique points on a line, create a function that will accept these points and determine if the line is a horizontal or vertical line. How to check if there is vertical or horizontal line Given with two object points: P, (x,y), and P2 (ty). To determine if there are any vertical or horizontal lines, we check if either (x,xorly, y). Note: You need to implement pass by reference in solving this problem to demonstrate the use of pointers. Input Format: The input will begin with a single, positive integer, R, on a single line, representing the number of objects followed by the object unique points separated by line. For each object, there will be four non-negative integers, xl, yl. 22 and y2 (all S 100), on a single line cach separated by a single space where xl, yl) represents one point on the edge and (x2, y2) represents a second and different) point on the same edge. Example Input Output Format For each object, if it is slanted (not horizontal or vertical), output "We need to fix this" or output "It's all good" if it is not. Each output should be on a separate line. Example Output We need to fix this It's all good Example Program Execution: Example 1132 1131 we need to fix this It's all good Example 2 13510 5541 1121 It's all good It's all food He need to fix this Me need to fix this It's all good Note: Use the input from the screen shot above to test your program.

Answers

The given problem is a code implementation question. The given problem asks us to create a function that will accept two unique points on a line and determine if the line is a horizontal or vertical line. The given problem provides the format of input, output, and constraints that need to be followed while writing the code.

The function for the given problem can be written in C++ as follows:```#includeusing namespace std;void checkLine(int& x1,int& y1,int& x2,int& y2){ if(x1==x2) cout<<"It's all good\n"; else if(y1==y2) cout<<"It's all good\n"; else cout<<"We need to fix this\n";}int main(){ int n; cin>>n; while(n--){ int x1,y1,x2,y2; cin>>x1>>y1>>x2>>y2; checkLine(x1,y1,x2,y2); } return 0;}```In the above code, we have a function check-in that accepts four integer values x1,y1,x2,y2 which are the unique points on a line. The function uses pass by reference to modify the values of x1,y1,x2,y2 within the function.

The function checks if the line is horizontal by comparing the values of y1 and y2, if they are equal, then the line is horizontal. Similarly, the function checks if the line is vertical by comparing the values of x1 and x2, if they are equal, then the line is vertical.If the line is neither horizontal nor vertical, then the function prints "We need to fix this".In the main function, we take the input in the given format and call the checkLine function with the given points. The output is printed based on the value returned by the checkLine function.

To know more about horizontal  visit:-

https://brainly.com/question/29019854

#SPJ11

Shira’s Shoes sold 875,000 pairs of sandals in June, which was 70% of the total number of shoes sold. How many shoes did the company sell in June? Analyze Emily’s calculations. What error did she make?

Answers

Explanation:

Emily solved for a part when she should have solved for the whole. 875,000 should be the numerator of the equivalent ratio. 70 x 12,500 is 875,000. So the answer is 100 x 12,500 which is 1,250,000.

Answer:

Emily solved for a part when she should have solved for the whole. 875,000 should be the numerator of the equivalent ratio. 70 x 12,500 is 875,000. So the answer is 100 x 12,500 which is 1,250,000.

which network device can isolate broadcast traffic to the local network segment?

Answers

A network device that can isolate broadcast traffic to the local network segment is a network switch.

A switch operates at the data link layer (Layer 2) of the OSI model and is commonly used to connect devices within a local area network (LAN).

Switches work by examining the destination MAC addresses of incoming network packets and forwarding them only to the port where the destination device is connected.

This process is called switching or bridging. Unlike a hub, which broadcasts incoming packets to all connected devices, a switch intelligently directs packets to the specific device or devices that need them.

When a broadcast packet (e.g., an ARP request or a broadcast message) is received by a switch, it is forwarded to all ports except for the port it was received on.

This means that broadcast traffic is isolated within the local network segment and not propagated to other network segments or devices that do not require the broadcasted information. This behavior helps to minimize network congestion and reduce unnecessary network traffic.

By isolating broadcast traffic, switches improve network efficiency and security. Devices connected to different ports on a switch are effectively segregated from each other in terms of broadcast traffic.

This isolation helps to contain broadcasts within their intended network segment, preventing unnecessary consumption of network resources and potential security risks associated with unwanted broadcast traffic reaching unauthorized devices.

Learn more about broadcast traffic at: https://brainly.com/question/14447945

#SPJ11

pls help
Question 2 (1 point)
True or false: when you use someone's copyrighted work in something you are
selling, you only have to cite them.

Answers

The given statement of copyrighted work is false.

What do you mean by copyright?

A copyright is a type of intellectual property that grants the owner the exclusive right to copy, distribute, adapt, display, and perform a creative work for a specific period of time. The creative work could be literary, artistic, educational, or musical in nature. The purpose of copyright is to protect the original expression of an idea in the form of a creative work, not the idea itself. A copyright is subject to public interest limitations, such as the fair use doctrine in the United States.

When you use someone's copyrighted work in something you are selling, you must get their permission first.

To learn more about copyright

https://brainly.com/question/357686

#SPJ13

What caused accident? into passive voice​

Answers

Accident was caused by what

how do i multiply a loop (python)
I have x = [200, 300, 4, 125]
those are variables in x

y = 25

so how do I multiply y by each variable in x

Answers

Answer:

x = [200, 300, 4, 125]

y = 25

for item in x: Iterate over a_list.

y = y * item. multiply each element.

print(y)

Explanation:

ESSAY: In two or three sentences,
\( - \)
write your idea on how your knowledge in identifying, selecting and using appropriate kitchen tools, equipment and paraphernalia affects your life. ​

Answers

Answer:

Being able to use tools in the kitchen is essential for basic tasks. Knowing what to use helps to perform tasks properly such as cutting a lemon or peeling an apple. Not knowing how to use such tools can cause accidents that could've been avoided.

what is the difference between a table and a range in excel?

Answers

In Microsoft Excel, a table is a collection of data organized in rows and columns. Tables have special formatting that makes them easier to read and work with, such as banded rows, filter buttons, and total rows.

Tables are also dynamic, which means that if you add or remove rows or columns, the table will automatically adjust its size and formatting.

On the other hand, a range is simply a group of cells in Excel that can be selected and manipulated together. Ranges can include non-contiguous cells or multiple ranges on the same sheet or different sheets.

The main difference between a table and a range is that a table has built-in features that make it easier to manage and analyze data, while a range is just a group of cells that may or may not have any additional formatting or functionality. Another key difference is that tables can be referenced by a name, making it easier to write formulas or perform calculations based on specific data within the table.

Learn more about Microsoft Excel here:

https://brainly.com/question/30750284

#SPJ11

A file that is sent along with an email message is called a(n):
O Selected file
O Document
O Add-on
O Attachment

Answers

Answer:

Attachment

Explanation:

I send a lot of email

(true or false) A setter or getter method in object-oriented programming is an example of encapsulation.

Answers

Answer:

True.

Explanation:

Encapsulation wraps and bundle data under a single data(so external access to such variable outside of the class is restricted). Getter and Setters are functions that gets and sets a specific value within your object class. If you override the setter and getter function within the class(and not declare it in primary constructor), it allows to store and bind specific information about data inside the class.

Draw a flow chart that accepts mass and volume as input from the user. The flow chart should compute and display the density of the liquid.( Note: density = mass/volume ).​

Answers

Answer:

See attachment for flowchart

Explanation:

The flowchart is represented by the following algorithm:

1. Start

2. Input Mass

3. Input Volume

4 Density = Mass/Volume

5. Print Density

6. Stop

The flowchart is explained by the algorithm above.

It starts by accepting input for Mass

Then it accepts input for Volume

Step 4 of the flowchart/algorithm calculated the Density using the following formula: Density = Mass/Volume

Step 5 prints the calculated Density

The flowchart stops execution afterwards

Note that the flowchart assumes that the user input is of number type (integer, float, double, etc.)

Draw a flow chart that accepts mass and volume as input from the user. The flow chart should compute

a) Show that ¬(p∨(¬p∧q)) and ¬p∧¬q are logically equivalent by using series of logical equivalence. (3 marks)
b) Determine whether (p∧q)→(p∨q) is a tautology. (4 marks)
c) With the aid of a truth table, convert the expression (¬p→q)∧(¬q∨r) into Disjunction Normal Form (DNF) (5 marks)

Answers

a) To show that ¬(p∨(¬p∧q)) and ¬p∧¬q are logically equivalent, we can use a series of logical equivalences:

¬(p∨(¬p∧q))                    (De Morgan's Law)

≡ ¬p∧¬(¬p∧q)                    (De Morgan's Law)

≡ ¬p∧(p∨¬q)                     (Double Negation)

≡ (¬p∧p)∨(¬p∧¬q)                (Distributive Law)

≡ False∨(¬p∧¬q)                  (Negation Law)

≡ ¬p∧¬q                         (Identity Law)

Therefore, ¬(p∨(¬p∧q)) and ¬p∧¬q are logically equivalent.

b) To determine whether (p∧q)→(p∨q) is a tautology, we can construct a truth table:

p | q | (p∧q) | (p∨q) | (p∧q)→(p∨q)

-----------------------------------

T | T |   T   |   T   |     T

T | F |   F   |   T   |     T

F | T |   F   |   T   |     T

F | F |   F   |   F   |     T

Since the last column of the truth table always evaluates to true, (p∧q)→(p∨q) is a tautology.

c) Truth table for the expression (¬p→q)∧(¬q∨r):

p | q | r | ¬p | ¬p→q | ¬q | ¬q∨r | (¬p→q)∧(¬q∨r)

--------------------------------------------------

T | T | T |  F |   T  |  F  |   T  |       T

T | T | F |  F |   T  |  F  |   F  |       F

T | F | T |  F |   F  |  T  |   T  |       F

T | F | F |  F |   F  |  T  |   T  |       F

F | T | T |  T |   T  |  F  |   T  |       T

F | T | F |  T |   T  |  F  |   F  |       F

F | F | T |  T |   T  |  T  |   T  |       T

F | F | F |  T |   T  |  T  |   T  |       T

Converting the truth table into Disjunction Normal Form (DNF):

(¬p∧¬q∧r)∨(¬p∧q∧¬r)∨(p∧¬q∧r)∨(p∧¬q∧¬r)∨(p∧q∧r)

Therefore, the expression (¬p→q)∧(¬q∨r) in Disjunction Normal Form (DNF) is (¬p∧¬q∧r)∨(¬p∧q∧¬r)∨(p∧¬q∧r)∨(p∧¬q∧¬r)∨(p∧q∧r).

To know more about DNF, visit

https://brainly.com/question/31326308

#SPJ11

What does this sign mean?
A. Prepare for a reduction in traffic lanes ahead
B. The road surface ahead
C. You are approaching a one-way road
???

What does this sign mean?A. Prepare for a reduction in traffic lanes aheadB. The road surface aheadC.

Answers

Answer:

A. Prepare for a reduction in traffic lanes ahead

characteristics and purpose of a motherboard ​

Answers

A motherboard is the central board of a computer or server, to which most components of a computer are connected to each other. It essentially has the task of ensuring that the individual components work properly together.

More Complex Answer:

A motherboard can also be understood as a motorway junction of data. All data streams of a computer or data centre server must go through here, if only because servers are computers that act as a central unit of a network and are thus connected and communicate with other computers. In order for a server to fulfil its tasks such as managing domains, names and files, there are special server motherboards in server systems.

Characteristics:

Different system components can be found on a motherboard depending on the design, equipment and integration density.

Slot for the processor

Power supply for the processor

Clock generator

Real-time metre and battery

BIOS

Chipset

System bus

Memory module slots

Slots for the bus systems

Input/output interfaces

Onboard sound

Storage controllers

DMA controller

Interrupt controllers

Floppy controller

Keyboard processor

Connecters for the PC power supply

Fan connecters

When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?A. NTP serverB. PKI serverC. RADIUS serverD. TACACS server

Answers

The additional security component configuration required when configuring WPA2 Enterprise on a WLAN is a "RADIUS server." Option C is the correct answer.

When setting up WPA2 Enterprise on a WLAN, a RADIUS (Remote Authentication Dial-In User Service) server is needed for authentication and authorization of users. The RADIUS server acts as a central authentication server that validates user credentials and grants access to the network. It allows for more secure and granular control over user access compared to WPA2 Personal.

Option C, "RADIUS server," is the correct answer as it correctly identifies the additional security component required for WPA2 Enterprise configuration. The RADIUS server is responsible for managing user authentication and authorization in the network, enhancing the security of the WLAN.

You can learn more about WLAN at

https://brainly.com/question/27975067

#SPJ11

you have been asked to select at least 3 out of 7 possible sites for oil exploration. designate each site as s1, s2, s3, s4, s5, s6, and s7. the restrictions are: restriction 1. evaluating sites s1 and s3 will prevent you from exploring site s7. restriction 2. evaluating sites s2 or s4 will prevent you from assessing site s5. assuming that si is a binary variable, the constraint for the second restriction is:

Answers

The constraint ensures that if either s2 or s4 is selected (binary value of 1), then s5 cannot be selected (binary value of 0), as required by the restriction.

To select at least 3 out of 7 possible sites for oil exploration with the given restrictions, let's designate each site as s1, s2, s3, s4, s5, s6, and s7. The constraints are:

Restriction 1: Evaluating sites s1 and s3 will prevent you from exploring site s7.
Restriction 2: Evaluating sites s2 or s4 will prevent you from assessing site s5.

Assuming that si is a binary variable, the constraint for the second restriction can be represented as:

s2 + s4 <= 1 - s5

You can learn more about oil exploration at: brainly.com/question/5485691

#SPJ11

Where is chart Tools in Word?

Answers

In the word association process, you are asked to come up with another term that is somehow connected to the one you are given.

It is the text tool, which uses the main colors to enable you to type on the presentation layer. You may alter the font, font size, formatting (which includes color), justifications, blend mode, antialiasing, and text rendering mode using it. Additionally, it is employed for the aforementioned operations as well as for moving text from one part to another before formatting is complete. The prose tool examines the grammar and speech mechanics. Additionally, the letter tool is used to create letters. To draw lines, use the line tool. The text tool is therefore the best choice.

Learn more about Word association here:

https://brainly.com/question/14929504

#SPJ4

What is the disadvantage of server based network?

Answers

Answer:

do u have different networks too?

Answer:

The disadvantage of server based network are:

If one of the servers go down all the users are affected and it may bring the whole network down.More expensive to set up and maintain.ExpensiveAdministrating specialist staff such as a network manager is needed.

Event Viewer logs filter can be configured to
view these event types: Critical, Warning, Verbose,
Error and ___________.

Answers

The Event Viewer logs filter can be configured to view event types such as Critical, Warning, Verbose, Error, and Informational.

In addition to the event types mentioned in the question (Critical, Warning, Verbose, and Error), the Event Viewer logs filter can also be configured to display Informational events. Informational events provide general operational information and are typically used for auditing and monitoring purposes. These events can include notifications about successful operations, system status updates, or informational messages from applications and services.

By including the Informational event type in the Event Viewer logs filter, administrators and users can gain a comprehensive view of the system's activities and performance. This allows them to identify and troubleshoot issues, track system events, and gather information for analysis and reporting. The Event Viewer provides a centralized location for managing and reviewing logs from various sources on a Windows-based system, making it a valuable tool for system monitoring and diagnostics.

learn more about Event Viewer logs filter here:

https://brainly.com/question/31862419

#SPJ11

what unit is used to measure the frequency of memory, fsb, and the processor?

Answers

The unit commonly used to measure the frequency of memory, FSB (Front-Side Bus), and the processor is Hertz (Hz). However, the frequencies of these components are typically expressed in megahertz (MHz) or gigahertz (GHz) for easier understanding.

To give a long answer, the frequency of the processor refers to the speed at which it executes instructions and processes data. The frequency of memory, on the other hand, refers to the speed at which it can access data from the CPU. FSB frequency, meanwhile, refers to the speed at which data is transferred between the CPU and other system components. All of these frequencies are crucial in determining the overall performance of a computer system.


The unit used to measure the frequency of memory, FSB (Front Side Bus), and the processor is Hertz (Hz). Hertz is a unit of frequency that represents cycles per second. In the context of computer components, this unit indicates how many operations or cycles the component can perform in one second. To be more specific, when referring to memory, FSB, and processor frequencies, they are often measured in Megahertz (MHz) or Gigahertz (GHz), where 1 MHz equals 1 million Hertz, and 1 GHz equals 1 billion Hertz.

To know more about processor visit:-

https://brainly.com/question/29241589

#SPJ11

which data mining process/methodology is thought to be the most comprehensive, according to kdnuggets rankings?

Answers

CRISP-DM methodology is thought to be the most comprehensive, according to kdnuggets rankings.

What is data mining?Analyzing a vast amount of data to find patterns and trends is known as data mining.Businesses can utilize data mining for a variety of purposes, such as figuring out what products or services their customers are interested in purchasing, as well as for fraud and spam filtering.Based on the information users supply or request, data mining systems analyze patterns and connections in data.In order to make money, social media corporations utilize data mining techniques to commodify their users.Since consumers frequently are not aware that data mining is taking place with their personal information, especially when it is used to influence preferences, this use of data mining has come under fire recently.

To learn more about data mining, refer to

https://brainly.com/question/2596411

#SPJ4

Cicero is researching hash algorithms. Which algorithm would produce the longest and most secure digest

Answers

The SHA-256 secure hash algorithm algorithm converts inputs of arbitrary length into fixed-length hash values of 256 bits. It makes no difference.

What makes SHA-256 so secure?

Data is transformed into fixed-length, essentially irreversible hash values using SHA 256, which is primarily used to validate the authenticity of data. As we have established, SHA 256 is employed in some of the world's most secure networks because no one has yet been able to break it.

What are some examples of hashing algorithms?

The hashing methods MD5, SHA-1, SHA-2, NTLM, and LANMAN are all widely used. The fifth iteration of the Message Digest algorithm is referred to as MD5. 128-bit outputs are produced using MD5. A very popular hashing algorithm was MD5.

To know more about hash algorithms visit:-

https://brainly.com/question/29039860

#SPJ4

Other Questions
can someone please help me bethany is a student who has difficulty staying in her seat. she cannot relax during the school day. other students complain when they have to work with bethany because she talks so much. bethany may possibly be exhibiting behaviors typical of: what is meaning of online?? I GAVE YOU 33 POINTS JUST ANSWER THIS QUESTION PLZZZZZZZZZZ 3. What is one step you can take right now to be more media balanced? Write a concrete and actionable step you will take. In your response, include any challenges you might face and how you will address them. The U.S. Bureau of Labor and Statistics reported that a person between the ages of 18 and 34 has had an average of 9.3 jobs. To see if this average is correct, a researcher selected a random sample of 8 workers between the ages of 18 and 34 and asked how many different places they had worked. The results were as follows: 5. Which statement best defines what an act is?1.a major shift in the action of a play2.the words spoken between the characters3.what the actors do on stage4.a minor change of location in a play If a shape has a base of 28mm and a perimeter of 80mm what is the area of that shape? Archie bought 100 shares of stock in an ice cream company 2 years ago. He paid $60.65 per share. He just sold all of his shares for $67.68 per share. How much did he gain? a consumer is reading a magazine with ad advertisement, but is distracted from reading the advertisement or its key points. this unplanned static during the communication process is called The Standardization of Liturgy in the Late Byzantine Period: the Case of the Rite of Marriage in South-Slavic Manuscripts and Early Printed Editions a 10-year bond pays an annual coupon, its ytm is 8%, and it currently trades at a premium. which of the following statements is correct? When two lines intsecteach other in one pointand they make 90 degree angle And if the slope of the 1st line is M1 and the slope of the 2nd line ts we can say: MIXM2=1True or False If a market has a binding price ceiling and then the government removes it from the market, then we should expect a. a price to incrense and quantity demanded to decrease.b. price to increase and quantity supplied to decrease c. price to increase and quantity demanded to increase d. none of the above Show apple estimates that 2.8 million square feet of the building is used for office space. how much space does the average employee have to work? in other!words, what is the density of the building? round your answer to the nearest whole number. Find the absolute maximum and minimum values of the function on the given interval? f f(x)=x- 6x +5, 1-3,5] [ What is the frequency of the graph of y=2 sin(1/2x)? locate passages in which the first person narrator also functions as an omniscent, or all-knowing narrator. how would you characterize the narrator? In which type of fracture does the bone bend and split, but does not completely break? A thesaurus is most helpful for students whomust find the correct pronunciation for a difficult new word.need to find multiple definitions for one word.would like to keep their writing from becoming repetitive.are looking for multiple forms of one word. Can someone help me, i never get help from anyone :(Determine whether the sentence below is complex or a compound-complexNo one answered the phone when she called us.A. complexB. compound-complexPlease select the best answer from the choices provided.A.B.