You are the IT security administrator for a small corporate network. You use a special user account called Administrator to log on to your Linux computer. You suspect that someone has learned your password. You are currently logged on as Administrator.
In this lab, your task is to change your password to r8ting4str. The current password for the Administrator account is 7hevn9jan.

Answers

Answer 1

The right IT Security step to take in the above is to "Change the administrator user password to r8ting4str".

What is the rationale for the above response?

You update your administrator password from 7hevn9jan to r8ting4str in this lab as follows:

1. Type the password and click Enter at the command prompt.

2. For the UNIX password, enter 7hevn9jan and hit Enter.

3. For the new password, type r8ting4str and hit Enter.

4. Enter r8ting4str and click Enter when prompted to retype the new password.

Note that cyber security is the use of technology, procedures, and policies to defend against cyber assaults on systems, networks, programs, devices, and data. Its goal is to limit the risk of cyber assaults and safeguard against unauthorized use of systems, networks, and technology.

Learn more about IT Security:
https://brainly.com/question/28004913
#SPJ1


Related Questions

Discuss the decidability/undecidability of the following problem.
Given Turing Machine , state of and string ∈Σ∗, will input ever enter state ?
Formally, is there an such that (,⊢,0)→*(,,)?

Answers

Note that in the caseof the problem described, there is no algorithm that can determine with certainty whether   a given Turing machine, state, and input string will ever enter a specific state.

How is this so?

The problem of determining whether a given Turing machine, state, and string will ever enter a specific state is undecidable.

Alan Turing's   halting problem proves that thereis no algorithm that can always provide a correct answer for all inputs.

Due to the complex and unpredictable   behavior of Turing machines, it is impossible todetermine if a state will be reached in a general case.

Learn more about Turning Machine at:

https://brainly.com/question/31771123

#SPJ1

How To Approach Data Center And Server Room Installation?

Answers

Answer:

SEE BELOW AND GIVE ME BRAINLEST

Explanation:

Make a plan for your space: Determine how much space you will require and how it will be used. Consider power requirements, cooling requirements, and potential growth.

Choose your equipment: Based on your unique requirements, select the appropriate servers, storage devices, switches, routers, and other equipment.

Create your layout: Determine the room layout, including rack placement, cabling, and power distribution.

Set up your equipment: Install the servers, storage devices, switches, and other equipment as planned.

Connect your equipment: Connect and configure your servers and other network devices.

Check your systems: Check your equipment to ensure that everything is operating properly.

Maintain and monitor: To ensure maximum performance, always check your systems for problems and perform routine maintenance.

Game: scissor, rock, paper. Write a program that plays the scissor-rock-paper game. A scissor can cut a paper, a rock can knock a scissor, and a paper can wrap a rock. The program randomly generates a number 0, 1, or 2 representing scissor, rock, and paper. The program prompts the user to enter a number 0, 1, or 2 and displays a message indicating whether the user or the computer wins, loses, or draws. Use: 1.The Scanner Class 2.Switch Statement 3.if else if else Statements 4.Math class 5.IntelliJ as the IDE

Answers

Answer:

import java.util.*;

public class Main

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

    Random r = new Random();

    int computer = r.nextInt(3);

   

 System.out.print("Enter a number[0-1-2]: ");

 int user = input.nextInt();

 

 switch(computer){

     case 0:

         if(user == 0)

             System.out.println("It is a draw");

         else if(user == 1)

             System.out.println("User wins");

         else

             System.out.println("Computer wins");

      break;

      case 1:

         if(user == 0)

             System.out.println("Computer wins");

         else if(user == 1)

             System.out.println("It is a draw");

         else

             System.out.println("User wins");

       break;

       case 2:

         if(user == 0)

             System.out.println("User wins");

         else if(user == 1)

             System.out.println("Computer wins");

         else

             System.out.println("It is a draw");

       break;

 }

}

}

Explanation:

Create objects to use the Scanner and Random class

Using the nextInt() method with Random object r, generate a random number between 0 to 2 and set it to the variable named computer

Ask the user to enter a number using Scanner object and nextInt() method and set it to the variable named user

Check the value of computer variable using switch statement.

When computer is 0, check the value of the user variable using if statement. If user is 0, it is a draw. If user is 1, the user wins. Otherwise, the computer wins.

When computer is 1, check the value of the user variable using if statement. If user is 0, the computer wins. If user is 1, it is a draw. Otherwise, the user wins.

When computer is 2, check the value of the user variable using if statement. If user is 0, the user wins. If user is 1, the computer wins. Otherwise, it is a draw.

Which code snippet could be used to print the following series?

Which code snippet could be used to print the following series?

Answers

C is the answer, I think

Referring to narrative section 6.4.1.1. "Orders Database" in your course's case narrative you will:
1. Utilizing Microsoft VISIO, you are to leverage the content within the prescribed narrative to develop an Entit
Relationship Diagram (ERD). Make use of the 'Crow's Foot Database Notation' template available within VISIC
1.1. You will be constructing the entities [Tables] found within the schemas associated with the first letter of
your last name.
Student Last Name
A-E
F-J
K-O
P-T
U-Z
1.2. Your ERD must include the following items:
All entities must be shown with their appropriate attributes and attribute values (variable type and
length where applicable)
All Primary keys and Foreign Keys must be properly marked
Differentiate between standard entities and intersection entities, utilize rounded corners on tables for
intersection tables

.
Schema
1 and 2 as identified in 6.4.1.1.
1 and 3 as identified in 6.4.1.1.
1 and 4 as identified in 6.4.1.1.
1 and 5 as identified in 6.4.1.1.
1 and 6 as identified in 6.4.1.1.
.

Answers

The following is a description of the entities and relationships in the ERD  -

CustomersProductOrdersOrder Details

 How is  this so?

Customers is a standard entity that stores information about customers, such as their   name, address,and phone number.Products is a standard entity that stores information about products, such as their name, description, and price.Orders is an intersection   entity that stores information about orders, such as the customer who placed the order,the products that were ordered, andthe quantity of each product that was ordered.Order Details is an   intersection entity that stores information about the details of each order,such as the order date, the shipping address, and the payment method.

The relationships between the entities are as follows  -

A Customer   can place Orders.An Order can contain Products.A Product can be included inOrders.

The primary keys and foreign keys are as follows  -

The primary key for   Customers is the Customer ID.The primary key for Products is the Product ID.The primary key for Orders is the Order ID.The foreign key for   Orders is the Customer ID.The foreign key for Orders is theProduct ID.The foreign key for Order Details is the Order ID.The foreign key for Order Details is the Product ID

Learn more about ERD at:

https://brainly.com/question/30391958

#SPJ1

Select
the correct answer from each drop-down menu.
At which stage should James, a website designer, gather information about the website he wants to create, and at which stage should he begin its
coding?
James should gather information in the
phase and begin the site's coding in the
phase.

Answers

Answer:

At which stage should James, a website designer, gather information about the website he wants to create, and at which stage should he begin its coding?

James should gather information in the planning phase and begin the site's coding in the development phase.

Hope this helps!

Try running your function with the number 0 as the input, and see what you get

Answers

the correct answer is 25

During the preventive maintenance phase of a project involving a hydraulic power system, an engineer must change a gasket on a power system. Which of the following
describes why this happens?
O Pistons and pipes can clog and prevent proper airflow.
O Energy cannot be stored in the turbines without a proper gasket.
O Gaskets are typically made of rubber, which is an organic compound that can degrade quickly.
O Gases can be absorbed by the system, leading to inefficiency

Answers

C: Gaskets are typically made of rubber, which is an organic compound that can degrade quickly

Explanation: did it on edge

Answer:

A and C: Gaskets are typically made of rubber, which is an organic compound that can degrade quickly

Explanation:

A and C because EDGE updated the question algorithm for 2021 so its a bit different ! :D

Just make sure you press "Gaskets are typically made of rubber, which is an organic compound that can degrade quickly"

discuss seven multimedia keys​

Answers

Answer:

Any seven multimedia keys are :-

□Special keys

Alphabet keys

Number keys

□Control keys

Navigation keys

Punctuation keys

Symbol keys

Which of the following if statements uses a Boolean condition to test: "If you are 18 or older, you can vote"? (3 points)

if(age <= 18):
if(age >= 18):
if(age == 18):
if(age != 18):

Answers

The correct if statement that uses a Boolean condition to test the statement "If you are 18 or older, you can vote" is: if(age >= 18):

In the given statement, the condition is that a person should be 18 years or older in order to vote.

The comparison operator used here is the greater than or equal to (>=) operator, which checks if the value of the variable "age" is greater than or equal to 18.

This condition will evaluate to true if the person's age is 18 or any value greater than 18, indicating that they are eligible to vote.

Let's analyze the other if statements:

1)if(age <= 18):This statement checks if the value of the variable "age" is less than or equal to 18.

However, this condition would evaluate to true for ages less than or equal to 18, which implies that a person who is 18 years old or younger would be allowed to vote, which is not in line with the given statement.

2)if(age == 18):This statement checks if the value of the variable "age" is equal to 18. However, the given statement allows individuals who are older than 18 to vote.

Therefore, this condition would evaluate to false for ages greater than 18, which is not correct.

3)if(age != 18):This statement checks if the value of the variable "age" is not equal to 18.

While this condition would evaluate to true for ages other than 18, it does not specifically cater to the requirement of being 18 or older to vote.

For more questions on Boolean condition

https://brainly.com/question/26041371

#SPJ8

what’s the correct order of the boxes

whats the correct order of the boxes

Answers

The  correct order of the step boxes are:

13542

What is saving on the flash drive?

In order to be able to save, from any  application you are said to be using, one need to click on File, then one can also select Save As.

Note that by then one can  click on the My Computer icon, and also double-click on the USB drive.

A flash drive is known to be a computer tool that is often used in savings files and also used in moving files from one point to the other as well as editing.

Note therefore, The  correct order of the step boxes are:

13542

Learn more about flash drive from

https://brainly.com/question/27800037

#SPJ1

Multi-stage segmentation is the best form of segmentation for any organization. False False True

Answers

Multi-stage segmentation is the best form of segmentation for any organization: False.

What is geographic segmentation?

Geographic segmentation simply refers to a process that involves a business firm dividing its target market (consumers or customers) based on geographical location, so as to enable it tailor its marketing efforts efficiently and effectively.

What is multi-stage segmentation?

Multi-stage segmentation can be defined as a process through which business organizations (company or firms) divide its target market into multiple segments, so as to enable it target each of the segments with a different product (good) or message (information).

In conclusion, multi-stage segmentation is not considered as the best form of segmentation because it depends on the mission and vision of the organization.

Read more on geographic segmentation here: brainly.com/question/18103744

#SPJ1

A software developer is using a microphone and a sound editing app to
collect and edit sounds for his new game.
When collecting sounds, the software developer can decide on the sampling
resolution he wishes to use.
will affect how accurate the
meant by sampling resolution.
The bit map will contain a header
1)state two items you expected to see in the header
2)give three features you would like to see in the sound editing app

Answers

Ripping software is a software developer which is using a microphone and a sound editing app to collect and edit sounds for his new game.

What is Ripping software?

If you have audio or video files in a CD or DVD and you need them ripped or copied to an output source like a hard drive, you can use a ripper or ripping software to accomplish this task.

Ripping software digitally extracts and compresses raw sound from a cd, and the output copied to another cd, DVD, or hard disk drive. Some rippers have inbuilt encoders for compression while others have a converter program pre-installed to facilitate the conversion to an acceptable digital file format.

Therefore, Ripping software is a software developer which is using a microphone and a sound editing app to collect and edit sounds for his new game.

Learn more about software on:

https://brainly.com/question/1022352

#SPJ1

What types of user permissions can you set up when adding a new team member in QuickBooks Online Accountant?

Answers

Answer:

1. Standard User

2. Company Admin

3. Reports only

4. Time tracking only

5. Accountant

Explanation:

There are different types of user permissions one can set up when adding a new team member in QuickBooks Online Accountant. This includes the following:

1. Standard User: this can be utilized to specialize user's access right

2. Company Admin: this gives such users additional or access rights in the firm.

3. Reports only: this gives users the rights to reports only.

4. Time tracking only: this only gives users the ability to see the version that has timesheets and time reports

5. Accountant: this is designed for the firm's accountant.

Upon returning from a year long working holiday, Alberta, the youngest of 4 sisters, announced her whirlwind marriage. Her 3 sisters, Carla, Paula, and Roberta,
were amazed by her husband's name.
• The 4 men are Albert, Carl, Paul, and Robert. Their last names are Albertson, Carlson, Paulson, and Robertson.
• No woman's husband has a first name that consists of her first name without the final "a"; no woman's last name consists of her first name without the final
"a" and with "son" on the end; and, no man's last name consists of his first name with "son" added at the end.
• Paul is not married to Roberta, and Robert is not married to Paula.
• No husband and wife have "bert" in both their first names, but there is a man who has "bert" in his first and last names.
Carl's last name is not Paulson.
Work out Alberta's husband's first and last name, as well as Carla's, Paula's, and Roberta's husbands' first and last name

Answers

The couples, considering the patterns in the problem, are listed as follows:

Carla and Robert Paulson.Paula and Albert Robertson.Alberta and Paul Carlson.Roberta and Carl Albertson.

What are the couples?

We use the information from the bullet points to find the couples.

The first information is:

No woman's husband has a first name that consists of her first name without the final "a".

Hence:

Alberta is married to either Carl, Paul or Robert.Carla is married to either Albert, Paul or Robert.Paula is married to either Albert, Carl or Robert.Roberta is married to either Albert, Carl or Paul.

The second information is:

Paul is not married to Roberta, and Robert is not married to Paula.

Hence:

Roberta is married to either Albert or Carl.Paula is married to either Albert or Carl.

No husband and wife have "bert" in both their first names, hence:

Roberta is married to Carl.Paula is married to Albert.Alberta is married to Paul.Carla is married to Robert.

No woman's last name consists of her first name without the final "a" and with "son" on the end, and no man's last name consists of his first name with "son" added at the end, hence:

Roberta and Carl are either Albertson or Paulson.Paula and Albert are either Carlson or Robertson.Alberta and Paul are either Carlson or Robertson.Carla and Robert are either Albertson or Paulson.

There is a man who has "bert" in his first and last names, hence either of these two can be couples.

Carla and Robert Albertson.Paula and Albert Robertson.

Carl's last name is not Paulson, hence a couple is:

Carla and Robert Paulson.

Then Carla and Robert are Paulson, and the couples are:

Carla and Robert Paulson.Paula and Albert Robertson.Alberta and Paul Carlson.Roberta and Carl Albertson.

More can be learned about patterns at https://brainly.com/question/18941199

#SPJ1

Write an algorithm to sum all numbers between 0-1000 that are divisible by 7 and represent your answer in a flowchart​

Answers

Use the ternary operator and the modulus operator to find the answer!!!! Hope it helps you, and good luck!!!! :D

Describe the importance of human resource for business growth

Answers

Answer:

Having come a long way since traditional “personnel,” HR is a critical business function that helps companies succeed in hiring employees, keeping them engaged, and supporting their growth and development. HR Assists Managers and Team Leaders. ... HR Helps Employees Achieve Their Career Goals.

Josh wrote the following e-mail to his co-worker. PLEASE HELP QUWICK



i need the figues to enter them into my DBA presentation. ASAP. please send.

This is an example of _____.


effective communication

nonverbal communication

ineffective communication

workplace communication

Answers

Answer:

Answer choice 4

Explanation:

If Josh sends an e-mail to his... co-worker.... wouldn't that be... workplace communication?

D because he is sending a email to his coworker making it workplace communication

Your job is to protect your company's information assets. What security objectives
should you address?
1) Assets, liabilities, and threats
2) Common vulnerabilities and exposures
3) Confidentiality, integrity and availability
4) Risks, threats and vulnerabilities

Answers

Answer:3

Explanation: The CIA Triangle is the basis of all Security related needs.

Which topic would be included within the discipline of information systems

Answers

, , , , , are only a few of the subjects covered within the study area of information systems. Business functional areas like business productivity tools, application programming and implementation, e-commerce, digital media production, data mining, and decision support are just a few examples of how information management addresses practical and theoretical issues related to gathering and analyzing information.

Telecommunications technology is the subject of communication and networking. Information systems is a branch of computer science that integrates the fields of economics and computer science to investigate various business models and the accompanying algorithmic methods for developing IT systems.

Refer this link to know more- https://brainly.com/question/11768396

PROJECT: RESEARCHING THE HISTORY OF THE INTERNET
The Internet has had a profound effect on how we conduct business and our personal lives. Understanding a bit about its history is an important step to understanding how it changed the lives of people everywhere.

Using the Internet, books, and interviews with subject matter experts (with permission from your teacher), research one of the technological changes that enabled the Internet to exist as it does today. This may be something like TCP/IP, the World Wide Web, or how e-mail works. Look at what led to the change (research, social or business issues, etc.) and how that technology has advanced since it was invented.
Write a research paper of at least 2, 000 words discussing this technology. Make sure to address the technology’s development, history, and how it impacts the Internet and users today. Write in narrative prose, and include a small number of bullet points if it will help illustrate a concept. It is not necessary to use footnotes or endnotes, but make sure to cite all your sources at the end of the paper. Use at least five different sources.

Submission Requirements
Use standard English and write full phrases or sentences. Do not use texting abbreviations or other shortcuts.
Make any tables, charts, or screen shots neat and well organized.
Make the information easy to understand.

Answers

E-mail, short for “electronic mail” is one of most widely used forms of digital communication. It can be used from nearly any device, and unlike paper mail, it is delivered nearly instantly. E-mail is used in all strata of society, and has endless possibilities for personal and professional uses.

It can be used to send messages, links, images and files, essentially everyone on the planet who uses computers will use e-mail. It powers business and connects families together across continents, and the best part of all is that it is essentially free. People use e-mail on personal computers, mobile phones, tablets, even on ‘smart’ televisions!

Every e-mail address has an inbox. This is where new messages are deposited. An e-mail message has a status called “unread” which disappears after the e-mail has been opened. A typical e-mail inbox will also have a ‘Sent’ folder for viewing messages that you have sent in the past. It also will have an ‘Outgoing’ folder, where messages stay until they have been fully transmitted. It is also common to have a ‘Drafts’ folder for messages that were started but never sent, and a ‘Spam’ folder, where unwanted marketing messages will usually be directed. You can of course setup your own folders and sort your e-mails however you like .


how do I turn it on the orange button isn’t working :,)

how do I turn it on the orange button isnt working :,)

Answers

Answer:

keep holding it

Explanation:

Hold the button for 30 seconds

Which definition of levels of is correct?
O A. voltage at which an audio device receives sound
B.
volume at which someone plays audio on a device
OC. voltage at which a device plays audio
OD. frequency of sound waves alternating on a device

Answers

Answer:

D. frequency of sound waves alternating on a device

Explanation:

Answer:

frequency of sound waves alternating on a device

Explanation:

You just started your new position at a small doctor’s office. A nurse asks you to print out a report for a patient. The patient’s name is Tim Drake, but you find multiple files with that name. You discover that the files are named differently. Looking at the files for Mr. Drake, you find the following files:

01_DrakeTim

DrakeTim_A

TimDrake001

timdrake

2. Initial Post: Create a new thread and answer all three parts of the initial prompt below

What methods could you use to help you find the files you need?

Why is choosing a descriptive or detailed name for your files a useful practice?

What recommendations might you make to the office manager to better organize the office files?

Answers

To find the files for Tim Drake, who has multiple files with different naming conventions, you can use the following methods:

Search Function: Utilize the search function in the file management system or operating system. Enter the name "Tim Drake" or a variation of it to locate the relevant files. The search function will scan file names and contents, making it easier to find the specific files you need.

Sorting: Sort the files by name, date modified, or any other relevant criteria. This can help group similar files together and make it easier to identify the correct ones. For example, sorting the files alphabetically will cluster the files with similar names closer to each other.

File Metadata: Check the metadata or properties of the files. Some file systems allow you to add tags or keywords to files, making it easier to search for them based on specific attributes. Ensure that the files are properly tagged with relevant information like patient names, dates, or other identifying details.

Choosing descriptive or detailed names for files is a useful practice for several reasons:

Easy Identification: A descriptive file name provides clear information about the content or purpose of the file. When you or others need to locate a specific file, a well-named file can be easily identified among many others. It reduces confusion and saves time.

Organization: Descriptive file names help in organizing files within a system. By using meaningful names, files can be grouped or sorted based on their purpose, type, or relevance. This enhances overall file management and facilitates efficient retrieval of information.

Clarity and Consistency: A consistent naming convention ensures uniformity and clarity across files. It helps maintain a standardized structure and allows for easy understanding of file names by all users. This consistency improves collaboration and reduces errors.

To better organize the office files, the following recommendations can be made to the office manager:

Implement a File Naming Convention: Establish a standardized naming convention for files that includes relevant details such as patient names, dates, and file types. Ensure that all staff members adhere to this convention when creating or saving files. This will promote consistency and ease of file retrieval.

Folder Structure: Create a well-structured folder hierarchy based on categories, such as patient names, departments, or file types. This arrangement should be intuitive and reflect the needs of the office. Maintain consistency throughout the folder structure to facilitate easy navigation and organization of files.

Document Management System: Consider implementing a document management system (DMS) or electronic health record (EHR) system to centralize and streamline file management. These systems offer features like robust search capabilities, metadata tagging, version control, and secure access controls. They can greatly improve file organization and retrieval efficiency.

For more questions on conventions

https://brainly.com/question/31174724

#SPJ11

_____ work(s) with the hardware and control(s) the basic functioning of the computer.

Answers

Operating system work(s) with the hardware and control(s) the basic functioning of the computer.

What is the Operating system?

An operating system (OS) is a software program that manages and controls the resources of a computer. It acts as an intermediary between the computer's hardware and its software applications.

Note that the OS is responsible for managing and allocating the computer's memory, processing power, and storage. It also controls and manages input and output operations, such as keyboard input, mouse movement, and file access.

Learn more about Operating system from

https://brainly.com/question/22811693
#SPJ1

Florescent tubes are a continuous light source.
True
False

Answers

TRUE BECAUSE OF FLORESENT LIGHT

The early success of Microsoft was cemented by the release of which software product:

A) Altair BASIC

B) MS-DOS for the IBM PC

C) IBM’s OS/360

D) P/M

Answers

Answer:

MS-DOS for the IBM PC

Explanation:

Shortly after its launch most personal computer companies adopted MS-DOS as their operating system.

Answer:

basically B

Explanation:

the person above is correct

Play now? Play later?
You can become a millionaire! That's what the junk mail said. But then there was the fine print:

If you send in your entry before midnight tonight, then here are your chances:
0.1% that you win $1,000,000
75% that you win nothing
Otherwise, you must PAY $1,000

But wait, there's more! If you don't win the million AND you don't have to pay on your first attempt,
then you can choose to play one more time. If you choose to play again, then here are your chances:
2% that you win $100,000
20% that you win $500
Otherwise, you must PAY $2,000

What is your expected outcome for attempting this venture? Solve this problem using
a decision tree and clearly show all calculations and the expected monetary value at each node.
Use maximization of expected value as your decision criterion.

Answer these questions:
1) Should you play at all? (5%) If you play, what is your expected (net) monetary value? (15%)
2) If you play and don't win at all on the first try (but don't lose money), should you try again? (5%) Why? (10%)
3) Clearly show the decision tree (40%) and expected net monetary value at each node (25%)

Answers

Answer:

wow what a scam

Explanation:

Use the drop-down menus to complete statements about how to use the database documenter

options for 2: Home crate external data database tools

options for 3: reports analyze relationships documentation

options for 5: end finish ok run

Use the drop-down menus to complete statements about how to use the database documenteroptions for 2:

Answers

To use the database documenter, follow these steps -

2: Select "Database Tools" from   the dropdown menu.3: Choose "Analyze"   from the dropdown menu.5: Click on   "OK" to run the documenter and generate the desired reports and documentation.

How is this so?

This is the suggested sequence of steps to use the database documenter based on the given options.

By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.

Learn more about database documenter at:

https://brainly.com/question/31450253

#SPJ1

website is a collection of (a)audio files(b) image files (c) video files (d)HTML files​

Answers

Website is a collection of (b) image files (c) video files and  (d)HTML files​

What is website

Many websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.

To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.

Learn more about  website  from

https://brainly.com/question/28431103

#SPJ1

Other Questions
which diagram represents diffraction of wavefronts as they encounter an obstacle? A cone has a height of 11 yards and a radius of 7 yards. What is its volume? Use 3.14 and round your answer to the nearest hundredth. wich linear function has the same slope as tge one thatis reperswnted by the table? Indias landmass has been pushing into Asia for millions of years. What are two consequences of this constant pushing?Type your answer in 4 or more sentences. The mean diameter of holes produced by a drilling machine bit is 4.05 mm and the stan dard deviation of the diameters is 0.0028 mm For twenty holes drilled using this machine, determine, correct to the nearest whole num ber, how many are likely to have diame ters of between (a) 4.048 and 4.0553 mm and (b) 4.052 and 4.056 mm, assuming the diameters are normally distributed. mr. lubrano teaches eighth-grade social studies. he begins an economics lesson by organizing students into heterogeneous groups. he assigns each group a prereading activity to be used with the textbook. as they read in their groups, the students are instructed to create a list of target words. later in the lesson, they will define the words and discuss as a group.this activity fulfills a language objective because it gives the ells the opportunity to: I NEED THIS ANSWERED ASAP!!! A bicycle wheel makes five rotations. The bicycle travels 44.48 ft. Find the diameter of the wheel in inches. Use 3.14 for . the process of communicating the income and expenses of a business and its financial health is known as . Drag and drop the correct person/group to their quote.Answer slots:Cherokee NationJohn MarshallAndrew JacksonGeorgia Farmer if two different compounds have rf values of 0.50 and 0.60, how far will they be separated (in cm) from each other on a tlc plate if the solvent front has moved 20.0 cm? pls help me with this Good morning!write a speech on my country. A food tray has a perimeter of 86 cm. The length of the tray is 5 cm less than triple the width. What is the length, in cm, of the tray? What is the value of sinACD? The basketball team lost their last 12 games. They lost by a total of 384 points. Determine their average number of points they lost each game. Which of the following is capable of undergoing successive rearrangements (receptor editing) to prevent the formation of autoreactive B lymphocyte receptors? A) IgL B)T cell genes C)IgH (IgM heavy chain) D)Both A and B E)All of the above the entry of which country into the korean war contributed to the internationalization of the war? a. japan b. india c. china d. vietnam A professor believes the students in a statistics class this term are more creative than most other students attending the university. A previous study found that students at the university had a mean score of 40 on a standard creativity test, and the current class has an average score of 47 on this scale with an estimated population standard deviation of 5. The standard deviation of the distribution of means is 1.30. If there were 16 students in the class, and the professor wanted to test the null hypothesis described in the scenario using the 5% level of significance, the cutoff t score would be: The day to day knowledge and skills necessary for independence, including communication, self-care, social skills, home living, leisure skills, and self-direction are referred to as: which kind of power do we willingly give to another person when we identify with and feel connected to that person? multiple choiceA> expert power B. informational powerC. reward power D. referent power