You are troubleshooting a network issue on your server, and suspect the issue exists beyond your gateway / router, in your provider's network. What utility could you use to show routing information between your server and an external remote host?

a. nslookup.

b. ping.

c. tracert.

d. arp.

Answers

Answer 1

The utility that can be used to show routing information between your server and an external remote host is "c. tracert."

The network diagnostic tool "tracert," which stands for "traceroute," is used to follow the route that network packets take from your server to a certain location or remote host.

It shows the IP addresses and routers (hops) in the path, giving details on each hop's latency and response time. You can pinpoint the precise location where network connectivity issues might be occurring by running the tracert program.

Learn more about tracert here:

brainly.com/question/32228465

#SPJ4


Related Questions

How does malware spread

Answers

Answer: Malware can use known software vulnerabilities to infect your PC. A vulnerability is like a hole in your software that can give malware access to your PC. When you go to a website, it can try to use vulnerabilities in your web browser to infect your PC with malware. Other than this malware can spread by four ways Clicking on links to malicious websites in emails, messaging apps or social network posts. Visiting compromised websites, aka drive-by downloads, viruses can be hidden in HTML, thus downloading when the webpage loads in your browser. Connecting your device to infected external hard drives or network drives

Answer: Malware is usually distributed through malicious websites, emails, and software. Malware can also be hidden in other files, such as image or document files, or even in seemingly innocuous files, such as.exe files

which of these would you consider high-value targets for a potential attacker? check all that apply. 1 point authentication databases customer credit card information logging server networked printers

Answers

The other options mentioned, such as networked printers, can have security implications, they may not typically be considered high-value targets for attackers in the same way as authentication databases and customer credit card information.

From the given options, the high-value targets for a potential attacker would typically include:

- **Authentication databases**: Attackers target authentication databases as they contain user credentials, passwords, and other sensitive information that can be exploited to gain unauthorized access to systems and accounts.

- **Customer credit card information**: Credit card information is highly valuable to attackers as it can be used for financial fraud, identity theft, or unauthorized transactions. Protecting customer credit card data is essential to prevent potential breaches.

- **Logging server**: Logging servers often contain detailed records of system activities, including user actions, errors, and security events. Attackers may target logging servers to manipulate or delete logs, making it difficult to detect their unauthorized activities.

It's important to note that while the other options mentioned, such as networked printers, can have security implications, they may not typically be considered high-value targets for attackers in the same way as authentication databases and customer credit card information.

It's crucial to prioritize security measures and apply robust protections to all sensitive assets and information within an organization.

Learn more about databases here

https://brainly.com/question/33308493

#SPJ11

__________ attribute specifies the height of the image.

Answers

Answer: The height attribute specifies the height of an image.

Explanation: Hope That Helps! (:

ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!


1. A means of giving credit to a source when their information is used.

A) Citation
B) Wi-Fi
C) Asynchronous Communication
D) Malware

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
A) Spyware
B) Phishing
C) Malware
D) Wi-Fi

3. A device that translates analog carrier signals to encode and decode digital information.

A) USB
B) Computer Virus
C) Intranet
D) Modem

4. A virus or Trojan horse designed to cause harm to computer or device.

A) Hardware
B) Malware
C) Modem
D) Antivirus Application

5. Software that is used to detect and eliminate computer viruses.

A) Wi-Fi
B) Cable Internet
C) Antivirus Application
D) Browser

6. Transmits data through a cable television network as a means to connect a computer to the internet.

A) Desktop Interface
B) Cable Internet
C) Operating System
D) USB

7. An application used to access websites on the internet.

A) Malware
B) Internet
C) Proprietary
D) Browser

8. Communication that does not happen in real time.

A) Asynchronous Communication
B) Wi-Fi
C) Ethernet Cable
D) Malware

9. A network of computers that provides access to information on the web.

A) Phishing
B) Internet
C) Antivirus Application
D) Modem

10. The cable used to connect computers in a network.

A) Computer Virus
B) Ethernet Cable
C) Intranet
D) Hardware

Answers

Easy Peasy Lemon Squeezy

1. A means of giving credit to a source when their information is used.

A.) Citation

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.

B.) Phishing

3. A device that translates analog carrier signals to encode and decode digital information.

D.) Modem

4. A virus or Trojan horse designed to cause harm to computer or device

B.) Malware

5. Software that is used to detect and eliminate computer viruses.

C.) Antivirus Application

6. Transmits data through a cable television network as a means to connect a computer to the internet.

B.) Cable Internet

7. An application used to access websites on the internet.

D.) Browser

8. Communication that does not happen in real time.

A.) Asynchronous Communication

9. A network of computers that provides access to information on the web.

B.) Internet

10. The cable used to connect computers in a network.

B) Ethernet Cable

Answer:

your mom

Explanation:

data link layer protocol defined by ieee specification 802.1dT/F

Answers

The statement, data link layer protocol defined by IEEE specification is false.

The IEEE specification 802.1d does not define a data link layer protocol.

The data link layer protocol defined by IEEE specification 802.1d is called Spanning Tree Protocol (STP). It is used to prevent loops in a network by disabling redundant links. The 802.1t amendment introduced Rapid Spanning Tree Protocol (RSTP), which improves the convergence time of STP. The 802.1s amendment introduced Multiple Spanning Tree Protocol (MSTP), which allows for multiple instances of STP to be run on a single switch.

The IEEE 802.1d standard, also known as the Spanning Tree Protocol (STP), is a network protocol that operates at the data link layer (Layer 2) of the OSI model. It provides a mechanism for preventing loops in Ethernet networks by creating a loop-free logical topology. The STP algorithm determines the best path to reach each network segment and blocks redundant paths to prevent loops.

However, it is important to note that the IEEE 802.1d standard does not define a specific data link layer protocol. Instead, it specifies the operation of the Spanning Tree Protocol and its implementation details. The actual data link layer protocol used in Ethernet networks is defined by the IEEE 802.3 standard, which includes various Ethernet protocols such as Ethernet II, Fast Ethernet, and Gigabit Ethernet.

For more questions on data link layer protocol: https://brainly.com/question/29760365

#SPJ11

You are given these tables to work with:
SUPPLIER(SUPNR, SUPNAME, SUPADDRESS, SUPCITY, SUPSTATUS)
SUPPLIES(SUPNR, PRODNR, PURCHASE_PRICE, DELIV_PERIOD)
PRODUCT(PRODNR, PRODNAME, PRODTYPE, AVAILABLE_QUANTITY)
PURCHASE_ORDER(PONR, PODATE, SUPNR)
PO_LINE(PONR, PRODNR, QUANTITY)
1. Display all supplier names (SupName) and their product names (ProdName), sort the results in alphabetical order on supplier name (SupName).
2. Display ONLY the supplier name (SupName) who has the most orders in Purchase_Order table.
3. Use a MINUS statement, list product numbers (ProdNR) that are in Product table but have never been ordered.

Answers

The provided SQL scenarios demonstrate how to display supplier names and their product names, identify the supplier with the most orders, and list product numbers that have never been ordered. These examples showcase the versatility and power of SQL in retrieving and manipulating data from relational databases.

The provided scenarios demonstrate various SQL statements and operations. The first scenario involves displaying supplier names (SupName) and their corresponding product names (ProdName) from joined tables, sorted alphabetically based on supplier name.

The second scenario focuses on displaying the supplier name with the most orders from the Purchase_Order table, utilizing the MAX function and subqueries.

Lastly, the third scenario employs a MINUS statement to list product numbers (ProdNR) from the PRODUCT table that have never been ordered, by subtracting the ordered products from the complete product list. These examples highlight the flexibility and power of SQL in retrieving and manipulating data from relational databases.

Learn more about SQL : brainly.com/question/25694408

#SPJ11

What certificates are contained on the common access card.

Answers

Answer:

Public Key Infrastructure (PKI) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.

Two digital fingerprints.

Digital photo.

Personal Identity Verification (PIV) certificate.

Organizational affiliation.

Agency.

Explanation:

L 222 qutz introduction to scratch
question 1 of 10
a programmer used scratch to create a program with three frog sprites. if a
user clicks any of the frogs, they make a "boing" sound and glide to a random
position in the stage panel.
in this scenario, what are two examples of an algorithm?
d a. the code that instructs the computer to move the sprite after it is
clicked
b the user's decision about whiob frog to oliol

Answers

A programmer used scratch to create a program with three frog sprites. if a user clicks any of the frogs, they make a "boing" sound and glide to a random position in the stage panel, in this scenario, The code that generates a random location each time.

What is an example of an algorithm?

An algorithm is a set of guidelines for resolving a dilemma or carrying out a task. A recipe, which consists of detailed instructions for preparing a dish or meal, is a typical illustration of an algorithm.

What does a C program do?

Low-level access to system memory is made possible by the procedural and general-purpose nature of the C programming language. A C compiler must be used to convert a program written in C  into an executable that a computer can run.

To know more about memory visit:-

brainly.com/question/28754403

#SPJ4

What type of story attempts to make you feel engaged by scaring you?

A.
love story

B.
horror story

C.
fantasy story

D.
bedtime story

Answers

Answer: B

Explanation: Horror

How many points are used in every edit from the source window to the timeline?

Answers

Typically two points are used in every edit from the source window to the timeline. These points are the In point and Out point

In editing, typically two points are used in every edit from the source window to the timeline. These points are the In point and Out point, which represent the beginning and end of a specific clip or segment that you want to include in your final edit on the timeline. However it also depends on the specific editing software being used and the type of edit being made. Generally, points refer to markers or keyframes that are placed on the timeline to indicate where changes or effects occur in the footage. The number of points used in an edit can vary widely depending on the complexity of the edit and the desired outcome. It is important to carefully consider the placement and number of points in order to create a smooth and seamless final product.

Learn more about keyframes here:

https://brainly.com/question/28270843

#SPJ11

Which can be used to view a web page?
File viewer
Text editor
Web browser
WYSIWYG

Answers

The answer is C: web browser

so we use web browsers to look at web pages

hope this helped

-scav

What kind of route is created when a network administrator configures a router to use a specific path between nodes?.

Answers

The route is created when a network administrator configures a router to use a specific path between nodes is  Static route.

what is static route?A type of routing known as "static routing" involves explicitly specifying routes while configuring a router. No routing protocols are involved in any routing; it just happens. An administrator-defined route known as a "static route" directs packets traveling between the source and destination to follow the designated path.Gamma and neutron radiation are real-time detected and identified by the Static Node, which offers these services in a portable, small frame.The Node can be readily left on to enable inconspicuous neutron radiation detection and gamma isotope identification in any place that requires additional security. The SIGMA Network receives the alerts and other reports.

know more about static route click here:

https://brainly.com/question/6783973

#SPJ4

what is authorization testing? testing an application's access control mechanisms to ensure only users who should have access to resources do tests focused on client-side code and the execution of scripts in the user's browser testing that is specific to source code, otherwise referred to as static application testing to ensure that an application is properly sanitizing input

Answers

Authorization testing is a process of testing an application's access control mechanisms to ensure that only authorized users are able to access specific resources. This type of testing focuses on ensuring that an application's access control mechanisms are functioning as intended, and that unauthorized users are prevented from accessing sensitive data or functionalities.


In addition to testing access control mechanisms, authorization testing can also include tests focused on client-side code and the execution of scripts in the user's browser. This type of testing is important for ensuring that an application is secure and that users are protected from potential security threats.

Another important aspect of authorization testing is testing that is specific to source code, which is otherwise referred to as static application testing. This type of testing is focused on ensuring that an application is properly sanitizing input. By sanitizing input, an application can prevent common security vulnerabilities, such as cross-site scripting (XSS) attacks.

Overall, authorization testing is a critical aspect of application testing and is necessary to ensure that an application is secure and that users are protected from potential security threats. By performing thorough authorization testing, developers can identify and address potential security vulnerabilities, which can help to prevent data breaches and other security incidents.

For such more question on mechanisms

https://brainly.com/question/13267362

#SPJ11

trying to make the baseplate red and turn off can collide then the game waits 5 seconds and turns on can collide, making the baseplate green aswell.
would this script work?

local myBasePlate = game.Workspace.Baseplate

local function makeBasePlateRed()
myBasePlate.CanCollide = false
myBasePlate.BrickColor = BrickColor.Red()
end

makeBasePlateRed()

wait(5)
local function makeBasePlateGreen()
myBasePlate.CanCollide = true
myBasePlate.BrickCOlor = BrickColor.Green()

Answers

Answer:

Explanation:

yes

but dont forget to call makeBasePlateGreen

maybe you would call it at the end of the program?

by the way you have a typo at the end

make the O lowercase

myBlasePlate.BrickColor = BrickColor.Green()

and then add this to the end

makeBasePlateGreen()

so you call the function and actually use it.

Several key people were involved in programming-language development in the 1970s and 1980s.

Choose all that apply.

Bjarne Stroustrup released C++ programming language in the1980s.

John McCarthy developed LISP for artificial intelligence.

Bill Gates and Paul Allen released the first programming language for a personal computer.

Niklaus Wirth developed Pascal to teach programming.

Answers

Answer: 1,3,4

Explanation: These are correct answers

Several key people were involved in programming-language development in the 1970s and 1980s:

Bjarne Stroustrup released C++ programming language in the 1980s.

John McCarthy developed LISP for artificial intelligence.

Niklaus Wirth developed Pascal to teach programming.

Thus, options A, B and D are the correct options.

In the realm of programming-language development during the 1970s and 1980s, several notable figures left a lasting impact. Bjarne Stroustrup ushered in the 1980s by introducing the C++ programming language, an extension of C that brought object-oriented principles to the forefront. John McCarthy's contributions were marked by his creation of LISP, a language pivotal for artificial intelligence research and symbolic processing.

Meanwhile, Niklaus Wirth's innovation lay in Pascal, a language designed with pedagogy in mind, facilitating programming education. However, the claim of Bill Gates and Paul Allen released the first programming language for personal computers is inaccurate, as their pivotal role was in software and operating systems, not language development.

Thus, options A, B and D are the correct options.

Learn more about programming-language here:

https://brainly.com/question/32901513

#SPJ3

Truck repair shops tend to use dot matrix printers to produce their invoices. Identify two advantages of using a dot matrix printer rather than a laser printer in this environment

Answers

Answer:

Explanation:

The Dot matrix printers are cheaper and even more easily available in the market when compared to the laser printers.

Also, the Dot printers can make carbon copies of the print-out, the non-impact printers can't do this.

Worthy of mention is that the printing costs of Dot printers are comparably lower when compared to other printers like Laser printers

Mateo wants the words “It’s snowing!” to appear in the interpreter and typed print (It's snowing). This didn’t work. What needs to be added to the code?
quotation marks
a backslash
a period
a functional code

Answers

Answer:

print("It's snowing")

Explanation:

since it a string you need put quotation marks the code does not understand just (It's snowing) because it thinks it variable which it is not

What is an example of an assumption and dependency that an automated stocking application project would include in an SRS?

A.
The software will be used by well-trained staff.

B.
The software needs to process 100 entries per minute.

C.
The software must integrate with barcode reading equipment.

D.
The software must be developed with a budget of $10,000.

Answers

Explanation:

software must be used by well trained staff.

1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze

Answers

The tool that you can use to find duplicates in Excel is c. Conditional Formatting

b. the first real row of datac. analyze, data, and programs

What is Conditional Formatting?

Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.

Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.

Read more about Conditional Formatting here:

https://brainly.com/question/30652094

#SPJ4

eeeeeeeeeeeeeeeeeeeeeeeeeeeereeeeeeeeeeeeeeeee

Answers

Answer:

okay

Explanation:

.............

Cynthia writes computer programs for mobile phones and has received five job offers in the last week. This is most likely because:

Answers

Answer:i)the use of algorithms in the programs are efficient and less time consuming

ii)there are no errors in the programs and are very easy to understand

iii)the code is easily understandable but the program is strong and good

Write a Prolog program deriv(E,D) to do symbolic differentiation of polynomial arithmetic expressions with respect to x. The first argument E is a polynomial arithmetic expression, and the second argument is the fully simplified expression, which must be expressed in canonical form.
You may use the cut symbol, "!", e.g., after the Prolog interpreter finds an answer, to prevent the interpreter from returning the same answer again.
Tip: Beware of unary operators! -10 is different from -(10) or -x, and they have different expression trees.
Simplify as much as possible
Some test cases:
?- deriv(x^2, Y).
Y = 2*x. (MAKE SURE THIS IS THE RESULT, NOT ANYTHING ELSE PLS!)
?- deriv((x*2*x)/x, Y).
Y = 2.
?- deriv(x^4+2*x^3-x^2+5*x-1/x, Y).
Y = 4*x^3+6*x^2-2*x+5+1/x^2.
?- deriv(4*x^3+6*x^2-2*x+5+1/x^2, Y).
Y = 12*x^2+12*x-2-2/x^3.
?- deriv(12*x^2+12*x-2-2/x^3, Y).
Y = 24*x+12+6/x^4.

Answers

To write a Prolog program deriv(E, D) to do symbolic differentiation of polynomial arithmetic expressions with respect to x, you can use the following code:
deriv(E, D):-
 % Replace the variable x with its derivative
 substitute(E, x, d(x), E1),
 % Simplify the expression
 simplify(E1, D).

substitute(E, X, d(X), d(X)):-
 atomic(E), E == X, !.
substitute(E, X, d(X), E):-
 atomic(E), E \= X, !.
substitute(E, X, d(X), R):-
 compound(E),
 E =.. [F | Args],
 substitute_list(Args, X, d(X), NewArgs),
 R =.. [F | NewArgs].

substitute_list([], _, _, []).
substitute_list([H | T], X, d(X), [H1 | T1]):-
 substitute(H, X, d(X), H1),
 substitute_list(T, X, d(X), T1).

simplify(E, E):-
 atomic(E), !.
simplify(E, R):-
 compound(E),
 E =.. [F | Args],
 simplify_list(Args, NewArgs),
 R =.. [F | NewArgs].

simplify_list([], []).
simplify_list([H | T], [H1 | T1]):-
 simplify(H, H1),
 simplify_list(T, T1).

For example, when we input the query "deriv(x^2, Y)", we get the result Y = 2*x.

"Prolog program deriv(E,D)", https://brainly.com/question/31142517

#SPJ11

Which is a type of intellectual property law? Select 4 options.

copyright

brand

patent

trademark

trade secret

Answers

TRADE SECRETS

Trade secrets refer to specific, private information that is important to a business because it gives the business a competitive advantage in its marketplace. If a trade secret is acquired by another company, it could harm the original holder.

Examples of trade secrets include recipes for certain foods and beverages (like Mrs. Fields’ cookies or Sprite), new inventions, software, processes, and even different marketing strategies.  

When a person or business holds a trade secret protection, others cannot copy or steal the idea. In order to establish information as a “trade secret,” and to incur the legal protections associated with trade secrets, businesses must actively behave in a manner that demonstrates their desire to protect the information.

Trade secrets are protected without official registration; however, an owner of a trade secret whose rights are breached–i.e. someone steals their trade secret–may ask a court to ask against that individual and prevent them from using the trade secret.

PATENTS

As defined by the U.S. Patent and Trademark Office (USPTO), a patent is a type of limited-duration protection that can be used to protect inventions (or discoveries) that are new, non-obvious, and useful, such a new process, machine, article of manufacture, or composition of matter.

When a property owner holds a patent, others are prevented, under law, from offering for sale, making, or using the product.

COPYRIGHTS

Copyrights and patents are not the same things, although they are often confused. A copyright is a type of intellectual property protection that protects original works of authorship, which might include literary works, music, art, and more. Today, copyrights also protect computer software and architecture.

Copyright protections are automatic; once you create something, it is yours. However, if your rights under copyright protections are infringed and you wish to file a lawsuit, then registration of your copyright will be necessary.

TRADEMARKS

Finally, the fourth type of intellectual property protection is a trademark protection. Remember, patents are used to protect inventions and discoveries and copyrights are used to protect expressions of ideas and creations, like art and writing.

Trademarks, then, refer to phrases, words, or symbols that distinguish the source of a product or services of one party from another. For example, the Nike symbol–which nearly all could easily recognize and identify–is a type of trademark.

While patents and copyrights can expire, trademark rights come from the use of the trademark, and therefore can be held indefinitely. Like a copyright, registration of a trademark is not required, but registering can offer additional advantages.

Answer:

C.  

trade secrets

Explanation:

                         Sincerely : Baby weeb

you have just partitioned a new disk into three volumes and formatted them with ntfs. you want to be able to access these volumes as folders on the current c: drive. what feature can you use?

Answers

The feature you can use is volume mount points. A drive or volume in Windows that is mounted to a folder using the NTFS file system is referred to as a volume mount point.

A drive or volume in Windows that is mounted to a folder using the NTFS file system is referred to as a volume mount point. Instead of a drive letter, a mounted drive is given a drive route. You can go above the 26-drive-letter limit with volume mount points. You can graft, or mount, a target partition onto a directory on another physical disk by using volume mount points.

The verification server and the mount point must be either dedicated or shared. You have the option to provide an NTFS directory or choose the option "Automatically assign available drive letter" when choosing Mount Point in Verification Settings.

The root of the provided mount point directory must also be in a clustered LUN if the verification server or the clone destination is a clustered instance. The mount point directory also has to be NTFS dedicated if the verification server or the clone target are independent servers.

To know more about volume mount point click here:

https://brainly.com/question/14096584

#SPJ4

Your company requires computers to authenticate to one another and enforces this requirement with Windows Defender Firewall with advanced security rules. You are asked to customize exceptions based on specific IP ranges. This can be done with a(n) _____ connection security rule.
a. server-to-server
b. outbound
c. authentication exemption
d. isolation
e. inbound

Answers

There are a lot of rules in computing. The above can be done with authentication exemption.

What is Authentication exemptions?

This is a method that helps one to be able to specify a particular group of computers.

Conclusively, This can be done via their Active Directory computer account name or the use of their IP address. Tis does not apply to existing connection security rules.

Learn more about   authentication exemption from

https://brainly.com/question/25739714

Write the definition of a function printDottedLine, which has no parameters and doesn't return anything. The function prints a single line consisting of 5 periods (terminated by a new line character) .

Answers

Answer:

See the short code Below

Explanation:

Let us implement the code with Python programming language

def printDottedLine ():

print("..... "\n) # this line will print 5 dots

how to unlock a 4 digit combination bike lock without the code

Answers

The main answer is that it is not recommended to attempt to unlock a 4-digit combination bike lock without the code as it can potentially damage the lock or make it permanently unusable. However, there are some methods that may work  trying all possible combinations, using a shim or lock tools, or contacting the manufacturer for assistance.

An for why it is not recommended to try to unlock the lock without the code is that the lock is designed to only open with the correct combination. Attempting to force it open or manipulate it can cause damage to the lock or make it easier for someone to break into in the future. It is best to try to recover or reset the code or seek assistance from a professional if necessary I'm glad you reached out to me for help. The main answer is that unlocking a 4-digit combination bike lock without the code can be achieved through a systematic trial-and-error approach. Here's an explanation with step-by-step instructions:

Begin with the first possible combination: .Turn each dial, one at a time, to increment the combination by one digit (e.g., 0001, 0002, 0003, and so on). After reaching the last combination for the first three dials (e.g., 0099), increment the next dial by one and reset the others to zero (e.g., 0100). Continue this process, systematically testing each combination until the bike lock is unlocked.Please note that attempting to unlock a bike lock without permission is illegal and unethical. Only use this method if the lock belongs to you and you've forgotten the code.

To know more about lock tools visit:

https://brainly.com/question/31832919

#SPJ11

How large is the screen for the fully digital dashboard on 2022 rogue platinum models?.

Answers

The answer is
12.3-inch

The combination of a full-Color 10.8-inch head-up display,12.3inch“digital dashboard” gauge cluster and large,floating 9.0-inch touch screen display allows rogue drivers to customize and enchance their driving experience.




Hope it helps and pls give me full stars

Which command group does a user need to access the Formula dialog box?
O Merge
O Alignment
Table
O Data

Answers

Answer:

The answer is Data

Explanation:

Answer:

hi, the answer is data hope this helps

Explanation:

got it right

Cookies are used by online companies to help

Answers

Answer: track and save data

Explanation:

save information about each users session/ personalize
Other Questions
A hotel manager is giving some advice to new members of the housekeeping staff. Complete his statements with the affirmative (ustedes) command of the verb in parentheses and the appropriate direct object pronoun. Follow the model.ModeloNo hagan la cama primero; hganla (hacer) despus de limpiar el bao.1. No pongan toallas nuevas todos los das; enter answer (poner) solamente si los huspedes las piden.2. No pasen la aspiradora antes de sacudir; your answer psenlapsenla (pasar) al final.3. No abran la puerta de inmediato; enter answer(abrir) despus de llamar para saber si hay alguien.4. No dejen los platos sucios del servicio a la habitacin; enter answer (llevarse) con ustedes.5. No limpien los baos con la aspiradora; enter answer (limpiar) con un trapeador.6. No muevan las pertenencias (belongings) de los huspedes; enter answer (dejar) donde estn. with ______________ in place, communicated, and approved, the stakeholders are appraised of the work to be done and are less likely to make assumptions that could be costly. When nitrogen consumption and nitrogen excretion are approximately the same, a person is in:_________ When designing and performing further audit procedures, theauditor considers which of the following?a.The significance of the risk.b.The nature of the specific controls. Should the US raise the minimum wage to $15 an hour? Right now it's $7.50.? Read the excerpt from "do not go gentle into that good night." do not go gentle into that good night, old age should burn and rave at close of day; rage, rage against the dying of the light. though wise men at their end know dark is right, because their words had forked no lightning they do not go gentle into that good night. the excerpt's rhyme scheme is What is the result when you change the line y = 6/5 x + 2 toAx + By + C = 0 form? Mario encontr aquellas llaves en la cafeteria. (t / estos libros) Coffee shops that reward customers with one free cup of coffee after every ten coffee purchases are using a ________ reinforcement schedule.answer choicesfixed-intervalvariable-intervalfixed-ratiovariable-ratio For each of the following situations, find the critical value(s) for z or t. a) H0: p=0.7 vs. HA: p0.7 at = 0.01 b) H0: p=0.5 vs. HA: p>0.5 at = 0.01 c) H0: = 20 vs. HA: 20 at = 0.01; n = 50 d) H0: p = 0.7 vs. HA: p > 0.7 at = 0.10; n = 340 e) H0: = 30 vs. HA: < 30 at = 0.01; n= 1000 The book belongs to you and your sister. The book is You need a 70% alcohol solution. On hand, you have a 325 mL of a 15% alcohol mixture. You also have 95% alcohol mixture. How much of the 95% mixture will you need to add to obtain the desired solution write a line of java code that will declare a double variable named password that is initialized to the value 86.12. Read the trailer for Hansel and Gretel.Hansel and Gretel are abandoned in the woods with no food or drink. They wander around and come upon an odd house made of gingerbread and sweets. Overcome with hunger, they start eating the house. Suddenly, a witch comes and captures the brother and sister. Will Hansel and Gretel escape the clutches of the evil witch, or will they be trapped forever?Which best describes the tone of this trailer?carefreeangrytenseinformal Convert from Decimal Notation to Scientific NotationIn the following exercises, write each number in scientific notation.552. 8,750,000 which of the following contribute to consumer buying power? multiple select question. low switching costs real time, accurate price comparisons high levels of product differentiation moderately high barriers to entry Is bromine a solid, a liquid or a gaswhen the arrangement of particles isclose together in a regular pattern? when it comes to developing the employee value proposition there is no real disadvantages to creating the largest package of awards possible there are a lot of patients in the er. as you do triage, do you think this patient is a high-priority case? why or why not? The graph of h is a translation 4 units right and 1 unit down of the graph of f(x) = x.What is the vertex form of this function?