you are the network administrator for a fortune 500 company. the accounting department has recently purchased a custom application for running financial models. to run properly, the application requires that you make some changes to the computer policy. you decide to deploy the changes through a local group policy setting. you suspect that the policy is not being applied properly because of a conflict somewhere with another local group policy setting. what command should you run to see a list of how the group policies have been applied to the computer and the user?

Answers

Answer 1

To examine a list of the ways the guidelines have been implemented to the machine and the user, execute the gpresult command.

What is an administrator's job description?

An administrator is essential to the efficient operation of a firm and offers office assistance to both an individual or a team. They could be in charge of answering phones, welcoming and guiding guests, word processing, making spreadsheets , presentations, and filing.

A leader or an administrator?

Despite the fact that the titles lead and administration are sometimes used interchangeably, there are clear distinctions between them in terms of administrative structure and modes of thought. Every leader can also be an administrator, but not every administrator must also be a leader.

To know more about Administrator visit:

brainly.com/question/28729189

#SPJ4


Related Questions

All of the following statements about MapReduce are true EXCEPT: MapReduce handles the complexities of network communication. MapReduce is a general-purpose execution engine. MapReduce handles parallel programming. MapReduce runs without fault tolerance.

Answers

Answer:

The correct option is;

MapReduce runs without fault tolerance

Explanation:

Map Reduce is a technique of processing or a framework of software, that is geared towards managing, sorting and handling large data by working in the Map and Reduce phases where the map function involves the dividing, filtering and sorting of the data and mapping of the split data while the reduce method involves the rearranging, summary activities having the data reduced.

When adopting and implementing a Software as a Service (SaaS) platform such as Salesforce for your business, which responsibility falls on you, as the client company?

Answers

Answer:

Software as a service (SaaS) platform would give the client company the responsibility of offering applications over the internet, develop, host, and update the product.

Explanation:

Salesforce is an example of Software as a service (SaaS), offering applications for businesses over the internet.

Software as a Service (SaaS) uses the cloud to host web-based apps and make them available to users over the internet, eliminating the need for users to install and maintain application software. Users only access this service with an internet connection and a web browser.

A wimming pool contain 18,000 gallon of water. A boiler with an output of 50,000 Btu/hr i operated 8 hour per day to heat the pool. Auming all the heat i aborbed by the pool water with no loe to the ground or air, how much higher i the temperature of pool after the 8 hour of heating?

Answers

The temperature of pool after the 8 hour of heating will be 2.66 F.

Calculating the problem:

Density of water = 64 .4 lb /ft²

volume = 18,000 gallon

volume   = 18,000 × 0.1336

               = 2404.8 ft³

Mass of water :

m = 64.4 × 2404.8

m = 150059. 52 lb

Q = m cΔT

q × t = m c ΔT

50000 × 8 = 150059.52 × 1× ΔT

ΔT = 2.66 F

What do you mean by temperature?

Temperature is a measure of heat or cold expressed on one of several scales, including Fahrenheit and Celsius. Temperature indicates the direction in which heat energy spontaneously flows. H. Hot body (high temperature) to cold body.

How do you measure the temperature?

Use a thermometer to take my temperature. I think I have one thermometer at home to take my temperature when I'm feeling down. I used to use thermometers containing mercury, but I stopped using them because mercury is dangerous if it leaks or breaks the thermometer.

Learn more about temperature:

brainly.com/question/26866637

#SPJ4

given a string matrix we in that need to find the
number which is occured two times or more than two times and and
give the sum of those numbers
Sample input::
[1 3 4
3 6 8
8 6 8]
Output:
3+8=11"
Plea

Answers

Given a string matrix, we need to find the number that occurred two times or more than two times and give the sum of those numbers. In order to do this, we can take the following approach:We can convert the string matrix into an integer matrix. We can create an empty dictionary. We will iterate through each element in the matrix.

If the element is not present in the dictionary, we will add it with the value 1. If the element is already present in the dictionary, we will increment its value by 1. After iterating through the matrix, we will iterate through the keys of the dictionary and add the sum of the keys whose values are greater than or equal to 2. The sum of these keys will be the desired output.

Here is the implementation of the above approach in Python: matrix = [[1, 3, 4], [3, 6, 8], [8, 6, 8]]d = {}# Convert string matrix to integer matrix for i in range(len(matrix)):    for j in range(len(matrix[i])):        matrix[i][j] = int(matrix[i][j])# Populate dictionary with occurrences of each number for i in range(len(matrix)):    for j in range(len(matrix[i])):        if matrix[i][j] not in d:            d[matrix[i][j]] = 1        else:            d[matrix[i][j]] += 1# Calculate sum of numbers that occurred 2 or more times sum = 0for key in d:    if d[key] >= 2:        sum += key print(sum) In the given problem, we have a matrix of strings and we need to find the numbers that occurred two or more times and sum them up. To solve this problem, we first need to convert the string matrix into an integer matrix. We then need to iterate through each element in the matrix and populate a dictionary with occurrences of each number in the matrix.

To know more about matrix visit:

https://brainly.com/question/29132693

#SPJ11

Is this statement true or false? While in slide show mode, a click and drag is no different than a click. True false.

Answers

In slide show mode, it should be noted that a click and drag is the same as a click. Therefore, the statement is true.

It should be noted that slide show mode typically occupies the full computer screen. One can see how the graphics and animations will look during the actual presentation.

Rather than waiting and clicking, one can make the PowerPoint files open directly in the slide show mode. Therefore, it's not different from clicking.

Learn more about slideshow on:

https://brainly.com/question/25327617

Answer:

"True"

Explanation:

I took the test!

write any four commandments of Computer ethics​

Answers

Answer:

Thou shalt not use a computer to harm other people

Thou shalt not interfere with other people's computer work

Thou shalt not snoop in other people's computer files

Thou shalt not use a computer to steal

Thou shalt not use a computer to bear false witness

Thou shalt not appropriate other people's intellectual output

Explanation:

Compared with the traditional licensing model in which users purchase and install software, SaaS _____. a.can be accessed from fewer devices per license b.provides more reliable access in areas with no Internet service c.offers less expensive upgrades and new releases d.requires more maintenance on the part of customers

Answers

Compared with the traditional licensing model in which users purchase and install software, SaaS requires more maintenance on the part of customers.

What is software?

Software is a set of instructions, data or programs used to operate computers and execute specific tasks. It can be divided into two main categories: system software and application software. System software is used to operate the computer itself, while application software is used to perform specific tasks for the user. Examples of system software include operating systems, device drivers and utility programs. Examples of application software include word processing programs, spreadsheets, web browsers, and media players. Software is essential for computers to function properly and to be able to perform tasks for the user. Without software, computers would be unable to run.

To learn more about software
https://brainly.com/question/28224061

#SPJ4

which is true? a. a class can implement only one interface b. a class can inherit from multiple classes c. an interface can implement multiple classes d. a class can implement multiple interfaces

Answers

A class can implement multiple interfaces. So option (d) holds the correct answer which is "a class can implement multiple interfaces".

In Java, an interface is a reference type that is implemented by a class. All methods of an interface are defined in the class that implements the interface unless otherwise the class that implements the interface is defined to be abstract. The Java class offers the feature to implement more than one interface from a single class that reflects an effect of multiple inheritance.

Since the question asks in the context of Java programming language and the only correct answer is that a class in Java has the ability to implement multiple interfaces.

You can learn more about Java interfaces at

https://brainly.com/question/28481652

#SPJ4

Why do cooler substances have a tendency to sink?

Answers

Answer:

Explanation:

the molecules to slow down and they get closer to together.

:)

Convection

Convection happens in fluids (liquids & gases). The heat energy moves through the material as the particles in the material move through the material.

Hot liquids and gases rise because when they are heated they expand and become less dense. The less dense warm liquid or gas then floats up through the more dense cold liquids and gases.

Cold liquids and gases sink because when cooled they contract and become more dense. The more dense cold liquids and gases sink down through the less dense warm liquids and gases.

These changes in density cause the convection currents in the liquid or gas.
Why do cooler substances have a tendency to sink?

.Explain how encrypting data during transmission protects it from being read by an unauthorised person who intercepts the transmission.

Answers

Answer:

Encryption is an effective and efficient technique used to prevent unauthorized access to informations transmitted over the internet.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

SSL/TLS are standard protocols that provides link encryption for the transmission of messages over the internet such as electronic mail (e-mail).

SSL is an acronym for Secured Socket Layer and it is one of the secured way of authenticating and encrypting data between a computer and the mail server.

In the case of TLS, it is an acronym for Transport Layer Security and it basically is used for providing authentication and encryption of data between two communicating systems on a network.

This ultimately implies that, SSL/TLS are standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. The SSL/TLS are an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.

Which structure is the following true for?
_________ have a return mechanism involving the system stack.
Procedures
Macros
Both Macros and Procedures
Neither Macros Nor Procedures

Answers

The given statement is true for both macros and procedures.

Both macros and procedures have a return mechanism involving the system stack.

Procedures are reusable blocks of code that perform specific tasks. When a procedure is called, the program execution jumps to the procedure's code and continues from there. The return mechanism in procedures involves pushing the return address onto the system stack. This allows the program to remember the location from where the procedure was called so that it can resume execution at the correct point after the procedure completes.

Macros, on the other hand, are a way to define reusable code snippets that are expanded at compile-time. They are expanded inline, meaning that the macro code is directly inserted into the program during compilation. Macros also have a return mechanism involving the system stack. When a macro is invoked, the program execution follows the expanded code of the macro, and the return address is pushed onto the stack to ensure the program can resume execution correctly.

In conclusion, both macros and procedures have a return mechanism involving the system stack, allowing them to handle control flow and resume execution at the appropriate location after they are called.

learn more about macros here:

https://brainly.com/question/31845930

#SPJ11

What rough outline of a policy would you establish to determine who should be allowed to have administrative rights on a computer system with role-based access control? Remember, policies can refer to specific workstations, employee types, customer types, etc. Defend the major tenets of your policy.

Answers

RBAC, also referred to as rule-based access control, is the most popular type of access control system. RBAC is not only in high demand among households, but it has also grown in popularity in the business sphere.

What are households?

In addition to any unrelated individuals who share a residence with related family members, a household may also contain lodgers, foster children, wards, or employees. Families, blended families, shared housing, group homes, boarding houses, houses of multiple occupancies (UK), and single-room occupancy are some examples of household types (US).

Also referred to as rule-based access control, is the most popular type of access control system. RBAC is not only in high demand among households, but it has also grown in popularity in the business sphere. Access control can be configured with conditions, roles, and a script that determines whether the 'answer' variable is true or false.

Therefore, RBAC is not only in high demand among households, but it has also grown in popularity in the business sphere.

Learn more about households here:

https://brainly.com/question/29351418

#SPJ1

A Chief Security Officer (CSO) has asked a technician to devise a solution that can detect unauthorized execution privileges from the OS in both executable and data files, and can work in conjunction with proxies or UTM. Which of the following would BEST meet the CSO's requirements?
A. Fuzzing.
B. Sandboxing.
C. Static code analysis.
D. Code review.

Answers

A solution which would best meet the CSO's requirements is: B. Sandboxing.

What is a sandbox?

A sandbox can be defined as an isolated environment in a computer system or on a network that is designed and developed to mimic end user operating system (OS) and environments, so as to detect unauthorized execution privileges from the operating system (OS).

In cybersecurity, sandboxing is typically used to safely execute suspicious code and data files without causing any harm to the host device or network. Also, sandboxing can work in conjunction with proxies or unified threat management (UTM).

Read more on sandboxing here: https://brainly.com/question/25883753

why is it important to be part of a team in times you fail and in times you succeed?​

Answers

Answer:

well you will feel better when you lose and have a better time winning with friends?

Explanation:

T/F: A computer server experiences large fluctuations in the amount of data requests it receives throughout the day. Because of this variation, Little's Law does not apply. False: Little's Law applies even if there are fluctuations in inventory, flow rates, and flow times.

Answers

False: Little's Law still holds true in the presence of varying inventories, flow rates, and flow times.

Regardless of changes in the volume of data requests, Little's law will hold. When determining the relationship between an item's entry and exit from the system, Little's law can be used in any situation. In addition, we may utilize Little's law to inventories the system's capacity and time spent in operation. According to Little's Law, the long-term average number of customers in a stable system is equal to the long-term average effective arrival rate,, multiplied by the typical length of time a customer spends in the system. L denotes the typical number of customers a business has over the long run.is the arrival rate for these clients (assuming an identical departure rate).

The letter W stands for the typical length of time that patrons stay within the establishment.

Just invert the equation to find L, the total population of a company:

λ W = L

Learn more about inventories here:

https://brainly.com/question/14184995

#SPJ4

how do you give brianliest

Answers

Answer:

When you ask a question in brainly, two helpers will answer it, then on each answerer you'll find "mark as brainliest" button which looks like a crown.

Hope this helps :)

Why when i want to answer a profile that starts with a will put a link to "https://bitly.com/"

Why when i want to answer a profile that starts with a will put a link to "https://bitly.com/"

Answers

i don’t know i checked it and i think it’s a virus or something like that don’t click on link

This is an individual work. The main task of this assignment is for you to develop a mini Microsoft access project. You are to develop Labour record management system using Microsoft Access. You are to create where a person or any small business holder can keep a record of his/her labour. You can follow the listed feature as an example to accomplish this goal. 1. Labour Profile 2. Attendance 3. Meals Record 4. Payment System (Day wise or hourly rate or fixed price) 5. Tasks accomplished 6. Payment (Pending or Done) 7. Any features deemed appropriate

Answers

The Labor Record Management System developed using Microsoft Access should include features such as labor profiles, attendance tracking, meals record, payment system (day-wise, hourly rate, or fixed price), tasks accomplished, and payment status. Additional features can be added based on user requirements.

Individual work refers to work that has been performed by an individual. In this case, the individual is expected to develop a mini Microsoft Access project. The objective of the project is to create a labor record management system that uses Microsoft Access. The primary purpose of the system is to enable a person or small business owner to keep a record of his/her labor.Microsoft Access is a database management system that is part of the Microsoft Office Suite. It is used to create, manage, and maintain data, which can be stored in tables. Microsoft Access also allows users to create forms, reports, and queries that make it easier to access and manage data.Payment System is one of the features that should be included in the Labor Record Management System that is developed using Microsoft Access. This feature will allow the user to manage payments made to laborers. The payment system can be day-wise, hourly rate, or fixed price, depending on what the user prefers.In conclusion, the Labor Record Management System should include the following features:Labour ProfileAttendanceMeals RecordPayment System (Day wise or hourly rate or fixed price)Tasks accomplishedPayment (Pending or Done)Any other features that are deemed appropriate by the user.

learn more about Microsoft Access here;

https://brainly.com/question/17330346?

#SPJ11

Which of the following is an example of machine learning?

Which of the following is an example of machine learning?

Answers

Answer: auto correct

Explanation: The iPhone can determine what you are going to type because of your past history.

An example of machine learning is autocorrect. The correct option is c.

What is machine learning?

Machine learning is a branch of artificial intelligence that is widely described as a machine's ability to mimic intelligent human behavior.

Autocorrect is a word processing technology that detects misspelled words and utilizes algorithms to identify the words most likely to have been intended before editing the text.

In the context of machine learning, autocorrect relies solely on Natural Language Processing (NLP). It is programmed to fix spellings and errors when inputting text, as the name implies. Auto-Correction spellchecks your keyboard dictionary as you type, automatically fixing misspelled words. Simply enter text into a text area to use it.

Therefore, the correct option is C, autocorrect.

To learn more about machine learning, refer to the link:

https://brainly.com/question/16042499

#SPJ2

Why are Quick Parts useful in an Outlook message?

Spreadsheet data sources can be hyperlinked to an email message.
Stored text and graphics can be quickly inserted into an email message.
A gallery of shapes will open up, and you can quickly choose one to insert.
Highlighted parts of Word documents can be inserted into a message body.

Answers

Answer:

I hope the picture helped

Why are Quick Parts useful in an Outlook message?Spreadsheet data sources can be hyperlinked to an email

Answer:

B. stored text and graphics can be quickly inserted into an email message

Explanation:

Edge 2021

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

how do you configure your windows system to prompt for additional credentials whenever a sensitive action is taken?

Answers

edit user account control (UAC) settings!

true or false A client is a computer that responds to requests from other computers.​

Answers

Answer:

it's answer is option A )true

Mike decides to humiliate a former friend by posting embarrassing photos on social media Which ethical standard did he violate?

Mike decides to humiliate a former friend by posting embarrassing photos on social media Which ethical

Answers

Answer:

The answer is "Human dignity "

Explanation:

It is the basic human nature, in which it is the recognition of the importance of humans, and it is inherent, and also that they deserve respect for just being humans, and the wrong choice can be defined as follows:

Property rights are the wrong choice because it is used to determine the use and possession of a resource or economic good. Confidentiality is also a wrong choice because it is a detail that provides verbally or in writing. The term civility also was wrong because it relates to politeness.

Select all statements from the given choices that are the negation of the statement:
Michael's PC runs Linux.
Select one or more:
a. It is not true that Michael's PC runs Linux.
b. It is not the case that Michael's PC runs Linux.
c. None of these
d. Michael's PC runs Mac OS software.
e. Michael's PC runs Mac OS software and windows.
f. It is false that Michael's PC runs Linux.
g. Michael's PC doesn't run Linux.
h. Michael's PC runs Mac OS software or windows.
i. Michael's PC runs Windows

Answers

The statements that are the negation of "Michael's PC runs Linux" are: a. It is not true that Michael's PC runs Linux. b. It is not the case that Michael's PC runs Linux. d. Michael's PC runs Mac OS software. e. Michael's PC runs Mac OS software and windows. f. It is false that Michael's PC runs Linux. g. Michael's PC doesn't run Linux. h. Michael's PC runs Mac OS software or windows. i. Michael's PC runs Windows.

The negation of a statement is the opposite or contradictory statement. In this case, the statement "Michael's PC runs Linux" can be negated in multiple ways.

Options a, b, f, and g all express the negation by denying the truth of the original statement. Option d states that Michael's PC runs Mac OS software, which contradicts the statement that it runs Linux. Option e extends the negation by adding the condition that Michael's PC runs both Mac OS software and Windows, further diverging from the original statement. Option h also offers a contradictory statement by stating that Michael's PC runs either Mac OS software or Windows, but not Linux. Finally, option i simply states that Michael's PC runs Windows, which excludes Linux.

In summary, options a, b, d, e, f, g, h, and i all provide statements that negate the original claim that Michael's PC runs Linux.

Learn more about software.

brainly.com/question/32393976

#SPJ11

7.7% complete Question An aviation tracking system maintains flight records for equipment and personnel. The system is a critical command and control system that must maintain a global availability rate of 99%. The entire system is on a cloud platform that guarantees a failover to multiple zones within a region. In addition to the multi-zonal cloud failover, what other solution would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable

Answers

The solution that would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable is offline.

What is data?

It should be noted that data simply means the representation of facts ans concepts on a formalized manner.

In this case, the solution that would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable is offline.

Learn more about data on:

brainly.com/question/4219149

#SPJ12

A modem converts original ________ signals to ________ signals that can travel down the telephone system.

Answers

A modem converts original analog signals to digital signals that can travel down the telephone system.


A modem (modulator-demodulator) is a device that transforms digital signals into analog signals. It enables data transmission via analog telephone lines, which were designed for voice communications, by transforming data from computers or other digital devices into analog signals that can be transmitted over these lines. A modem then transforms the received analog signals back into digital signals, which can then be processed by the computer. Modems are used by both personal and corporate users to connect to the internet, as well as for remote access to systems and services. They are used for many purposes, including high-speed broadband internet access, remote device control, file transfers, and online gaming.

The primary purpose of a modem is to convert digital signals into analog signals so that they can be transmitted over the phone line. This is accomplished by modulating a carrier signal to represent digital bits. A modem is also in charge of demodulating received analog signals back into digital bits. This enables a computer to communicate with another computer via a telephone line.

Learn more about modem here

https://brainly.com/question/7320816

#SPJ11

The mode that allows the kernel to take care of low-level tasks requiring unlimited access to the hardware is called what

Answers

Answer:

Supervisor mode is used by the kernel for low level tasks that need unrestricted access to hardware, such as controlling how memory is accessed, and communicating with devices such as disk drives and video display devices. User mode, in contrast, is used for almost everything else.

Explanation:

______ that coordinate the sending and receiving devices by precisely defining how the message will be sent across the communications channel are called data transmission specifications.

Answers

Data transmission specifications that coordinate the sending and receiving devices by precisely defining how the message will be sent across the communications channel are called data transmission specifications.

These specifications are crucial to ensure that the transmitted data is received accurately and without errors.The purpose of protocols is to set common rules and guidelines for communicating data over networks. These specifications are used to establish reliable and efficient communication between different devices in a network, ensuring that the data is delivered accurately and consistently.

The use of data transmission specifications is necessary because different devices may have different communication requirements, making it challenging to establish consistent communication between them. As a result, data transmission protocols help standardize communication, which is critical for the success of networked devices and applications.

Learn more about transmission at

https://brainly.com/question/30352783

#SPJ11

only the attack portion of the samples are played from ram, while the rest of the samples are played directly from the hard drive. what is this process called?

Answers

The process of playing only the attack portion of the samples from RAM while the rest of the samples are played directly from the hard drive is called "streaming."

Streaming is a method of delivering data over the internet that involves playing an audio or video file as it is being downloaded from a server. It is a technique that allows you to play media content without waiting for the entire file to download, which can be beneficial for larger files such as movies or long music tracks. The concept of streaming is also used in music production software where it is necessary to play back samples in real-time to check how they sound in a mix, and this can be done by loading the samples into RAM and streaming them.

Learn more about server visit:

https://brainly.com/question/7007432

#SPJ11

Other Questions
Which of the following sanctions are NOT at the correctional official's disposal?A. Solitary confinementB. Reduction of good-time creditC. Restricting visitationD. Corporal punishment Choose the correct form of the imperfect.La familia __________ (decorar) el rbol de navidad. What do you think Emerson's opinion of society is? Which statement BEST describes scientific theories? A. Scientific theories attempt to explain an entire group of related phenomena. B. Scientific theories are based on facts that describe natural events. C. Scientific theories describe natural events but do not explain them. D. Scientific theories are facts based on observations of events in the natural world. I NEED ANSWERS FAST!! An online encyclopedia is an example of aO A. statutory law sourceB. common law sourceC. primary sourceD. secondary source Find the volume of a hemisphere that has the radius of 3 m to the nearest 10(PLEASE ANSWER) a) A college faculty consists of 400 men and 250 women. The college administration wants to draw a sample of 65 faculty members to ask their opinion about a new parking fee. They draw a simple random sample of 40 men and another simple random sample of 25 women.[ Select ] ["Convenience Sampling", "Stratified Sampling", "Cluster Sampling", "Systematic Sampling", "Voluntary Response Sampling", "Simple Random Sampling"] Which of the following would be in demand all year round in most of the United States?A) umbrellasB) snow tiresC) swim suitsD) sleds In order for strategic, long-term, plans to become reality, organizations must develop tactical plans, which are designed to implement the objectives specified in the strategic plans. (true or false) The CREATE TABLE command lets you define constraints when you use the CONSTRAINT keyword, known as a(n) ___ constraint.columntableindexcell Who developed the first effective polio vaccine and refused to patent it so that as many children as possible could get it quickly? enrico fermi jonas salk albert einstein charles richard drew Please show work aswell I am VERY confused She was one of the first successful and wealthy African-American businesswomen, creating a line of hair care products at the turn of the 20th Century.A) Sarah E. GoodeB) Miriam E. BenjaminC) Dr. Patricia E. BathD) Madam C.J. Walker Why cant Ponyboy accept her opinion of the Socs?From the novel The Outsiders hello please help I WILL GIVE BRAINLIEST! How is Macbeth a round character?. Differentiate the function. f(x)=x ^3 (x+6) What would be a modern way to say this proverb from the Analects:The man who moves a mountain begins by carrying away small stones.Select one:a.Dont make a big deal out of something that is small.b.Sometimes you cant see a situation when you are in it.c.Humans were created to explore the Earth.d.A large job can be accomplished one step at a time. Im trying do it on my own just checking my answer Suppose that $x$ is a multiple of 6 (not necessarily positive). If the square of $x$ is less than 200, how many possible values of $x$ are there