you receive an e-mail to reset the online banking username and password. when you attempt to access the link the url appearing in the browser does not match the link. what is this known as?

Answers

Answer 1

An attempt was made to open the link. The link does not correspond to the URL displayed in the browser. It's called phishing.

What is phishing?Phishing attacks are counterfeit communications that appear to come from a trustworthy source but which can compromise all types of data sources. Attacks can facilitate access to your online accounts and personal data, obtain permissions to modify and compromise connected systems--such as point of sale terminals and order processing systems--and in some cases hijack entire computer networks until a ransom fee is delivered.Sometimes hackers are satisfied with getting your personal data and credit card information for financial gain. In other cases, phishing emails are sent to gather employee login information or other details for use in more malicious attacks against a few individuals or a specific company. Phishing is a type of cyber attack that everyone should learn about in order to protect themselves and ensure email security throughout an organization.

To learn more about cyber attack refer to:

https://brainly.com/question/7065536

#SPJ4


Related Questions

Which cloud service model provides the consumer with the infrastructure to create applications and host them?

Answers

The cloud service model that provides consumers with the infrastructure to create applications and host them is known as Infrastructure as a Service (IaaS).

Infrastructure as a Service (IaaS) is a cloud computing model that offers virtualized computing resources over the internet. It provides consumers with the fundamental building blocks to create, deploy, and manage their applications without the need to invest in physical infrastructure. With IaaS, consumers have access to virtualized servers, storage, networking, and other computing resources that can be scaled up or down based on their requirements.

IaaS allows consumers to focus on developing and running their applications without the hassle of managing hardware infrastructure. They can leverage the cloud provider's data centers and network infrastructure to deploy their applications quickly and efficiently. The cloud provider is responsible for maintaining the physical infrastructure, ensuring high availability, security, and scalability.

By using IaaS, consumers have greater flexibility and control over their application environments. They can install and configure the software and tools they need, manage the operating systems, and have the freedom to customize the infrastructure to suit their specific requirements. Additionally, IaaS enables consumers to easily scale their applications by adding or removing resources as demand fluctuates, providing cost-effectiveness and agility.

Learn more about infrastructure here:

https://brainly.com/question/17737837

#SPJ11

why it is important for steel to go through a fluid phase as it is being produced.

Answers

Answer: It is important because the object must go through heat to be melted and then it should be put into a mold to be formed. Also, it go though heat to keep it from cracking and go to be cooled and harden

Explanation:

Why is vocabulary important in science?

Answers

Answer:

A strong focus on vocabulary helps students understand and communicate using appropriate terminology, and the incorporation of imagery makes learning fun. Research has shown that words and text which enable the formation of images facilitate recall and that's why it is also important in science

Answer:

It helps you understand big words that can be used in science.

Explanation:

What were the requirements to get a job in engineering 15 years ago?




What are the requirements now?


How has technology changed this job in the last 15 years ago? Provide at least specific two examples.

If you can please list the sources used, thank you!

Answers

Answer:

at least four years of engineering experience.

an engineering related degree

Problem-solving. One of the most crucial skills an engineer can possess is strong problem-solving abilities. ...

Computer science. ...

Industry skills. ...

Pressure management. ...

Teamwork. ...

Creativity. ...

Structural analysis. ...

Communication.

All of these are needed to be a engineer

Explanation:

in your on-premises environment, you can create as many virtual servers as you need from a single template. what can you use to perform the same in aws?

Answers

In AWS, you can use Amazon Elastic Compute Cloud (Amazon EC2) to create as many virtual servers as you need from a single template.

AWS provides a web service that enables you to launch instances with a variety of operating systems, such as Windows and Linux. Additionally, AWS offers pre-configured Amazon Machine Images (AMIs) that serve as templates for your instances. These AMIs contain the information required to launch an instance, including the operating system, application server, and applications.

AWS services can be used to build, host, and run applications on the cloud. AWS provides a comprehensive collection of infrastructure and services, including computing, storage, networking, and databases, among others, that can be utilized to create an on-demand, scalable, and cost-effective cloud infrastructure to power your applications.

In summary, Amazon Elastic Compute Cloud (Amazon EC2) can be used in AWS to create as many virtual servers as you require from a single template.

To learn more about AWS visit : https://brainly.com/question/14014995

#SPJ11

During a client briefing, a senior development manager suggests using microsoft azure for their container orchestration solution, since they are a microsoft shop for their desktops. they are standardizing on kubernetes for containers. what red hat openshift solution could you recommend?

Answers

Answer:

You could recommend Red Hat OpenShift, which is a comprehensive enterprise-grade platform for container orchestration, built on top of Kubernetes and designed for organizations that want to deploy, manage, and scale their applications. OpenShift provides a consistent and secure environment for deploying and managing containers, as well as a suite of integrated tools and services to support development and operations teams. Since the client is already using Microsoft Azure and standardizing on Kubernetes, Red Hat OpenShift would be a suitable solution to complement their existing infrastructure.

The TechWorld goes on a fast pace, what do you think would be the solution to the growing amount of data being collected by the software applications to have a fully sustainable usage for customers like us?

Answers

The solution to the growing amount of data in software applications to have fully sustainable usage for customers is;

Development of a sustainable model for the future now requires data storage that is engineered to be lower power requirements, lower cooling requirements, and lower waste production.

Sustainable data storage and usage

The objective of Sustainable Data Storage Initiative is to spread awareness of the solutions that can reduce the environmental impact of high waste producing data centers.

The environmental impact of data infrastructure is growing as data workloads increase. Hence, building a sustainable model for the future now requires data storage that is engineered to be lower power requirements, lower cooling requirements, and lower waste production.

Read more on Sustainable data storage and usage;

https://brainly.com/question/24882256

it is not possible to nest boolean logical functions for a logical test in the logical_test argument of the if function in excel.

Answers

it is not possible to nest boolean logical functions for a logical test in the logical_test argument of the if function in excel.

This Statement is FALSE.

What is excel?

Microsoft Excel is a spreadsheet developed by Microsoft for Windows, macOS, Android and iOS. It features calculation or computation capabilities, graphing tools, pivot tables, and a macro programming language called Visual Basic for Applications (VBA). Excel forms part of the Microsoft 365 suite of software.

Microsoft Excel has the basic features of all spreadsheets, using a grid of cells arranged in numbered rows and letter-named columns to organize data manipulations like arithmetic operations. It has a battery of supplied functions to answer statistical, engineering, and financial needs.

In addition, it can display data as line graphs, histograms and charts, and with a very limited three-dimensional graphical display. It allows sectioning of data to view its dependencies on various factors for different perspectives (using pivot tables and the scenario manager).

Learn more about Microsoft Excel

https://brainly.com/question/24202382

#SPJ4

Find true or false. A hacker is hacking software with access in sensitive information from your computer​

Answers

ITS TRUE!!I SEARCHED IT

1) around % of households in the united states have broadband access to the internet. a) 45 b) 55 c) 75 d) 85

Answers

Broadband access to the internet has become an integral part of modern life, enabling people to stay connected, work, learn, and access information from anywhere. However, not all households in the United States have access to this essential service.

According to recent statistics, the percentage of households in the United States with broadband access to the internet is approximately 85%. This means that the vast majority of households have the ability to connect to the internet at high speeds, allowing for efficient use of online resources and greater access to online services.

In conclusion, the percentage of households in the United States with broadband access to the internet is 85%. While this number may be high, there are still many households that lack access to this important service. Efforts are underway to expand broadband access to underserved communities and bridge the digital divide, ensuring that everyone has the opportunity to benefit from the many advantages of a connected world.

To learn more about Broadband access, visit:

https://brainly.com/question/15860110

#SPJ11

anyone who play online game drop your name​

Answers

Answer:

kevinj720

Explanation:

Answer:

lightning bolt on ur Wala

How many keys are required in asymmetric encryption?

Answers

Two keys are used in asymmetric cryptography; if you encrypt with one key, you can decrypt with the other. An algorithmic one-way cryptographic transformation is called hashing.

In symmetric encryption, how many keys are there?

only one key Symmetric cryptography encrypts and decrypts data using the same key. Two keys are used in asymmetric cryptography, one for encryption and the other for decryption.

What two kinds of keys are employed in asymmetric encryption?

A key pair is used in asymmetric encryption; a distinct key is used for encryption and decryption. Typically, one of the keys is referred to as the private key, and the other as the public key.

To know more about encryption visit:-

https://brainly.com/question/9404669

#SPJ4

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

How does facial recognition software identify individuals from a database of thousands of driver's license photos and arrest mug shots?

A. The software looks at hairlines and eye color to establish a match between a photograph on file and a suspect.

B. The software is able to zoom in on the image from a surveillance camera and compare features such as distance between the eyes,width of the nose, and length of the jawline to those features on thousands of photographs.

C. The software is able to compare every photograph in its database with individuals passing under surveillance cameras in under
fifteen seconds.

D. Facial recognition has been shown to be largely ineffective.

Please help me if these questions I’m really stuck

Answers

A facial recognition system uses biometrics to map facial features from a photograph or video. It compares the information with a database of known faces to find a match. Facial recognition can help verify a person's identity, but it also raises privacy issues.

inheritance is a useful feature of a language because it promotes

Answers

Reusing code and cutting down on redundancy enables more effective and maintainable code, it enables the development of highly specialised classes that draw characteristics and traits from more broad classes.

Which function type encourages code reuse and lessens query complexity?

A Python function can have a single definition and be used repeatedly. You shouldn't write the same code more than once, therefore this encourages code reuse.

What are the two advantages of using reusable components for the development of this product for both programmers and users?

Reusable components have already been tested and have any issues fixed, making them more trustworthy than newly-coded components. This conserves resources, time, and money. So, to create a new subroutine with different arguments, just reuse the existing one.

To know more about code visit:-

https://brainly.com/question/17293834

#SPJ1

PLEASE HELP I NEED THIS DONE VERY VERY SOON LIKE ANSWER THIS WEEK PLEASE. tho I have to put it as something else on here because its not on here THIS IS FOR Digital Photography


1. Describe the mechanics of early photographic systems, analyzing how they differ from the systems of today.


2. The list of photographers who have contributed to the development of photography is long and diverse. Select at two photographers that you feel made essential contributions to the field and tell why.


3. Explain and evaluate photography as an invention rather than an art form.



4. How have the uses of photography changed over the years? What era in photography would you have liked to live in as a photographer?

Answers

1.) The earlier commercial camera was based on the Camera Obscura which is a portable room that was made by the Arabians in the 10th century.

In the 18th century, this model became more reduced and more portable and had a lens attached to the camera for making an image sharpener for drawing.  Lucida of the 19th C.E was used for travel and used as a tracing device.

Thus today camera has evolved from the earlier models the camera to a light sand captivating fragile tool.

2.) I'm going to go with Henri Cartier-Bresson and Carrie Mae Weems.

French photographer, Henri Cartier-Bresson, was the father of the "decisive moment" and a master of creating clean, compelling compositions with action and movement. The idea behind the decisive moment is that there is a fleeting fraction of a second in any action or scene that can best capture the essence of it in a photograph. He began work in the mid-1900s and passed away in 2004. There is also a famous quote attributed to him that is one of my favorites to share with new students. He said, "Your first 10,000 photographs are your worst." That can sound discouraging, but really, I just think of it as driving home the importance of taking way more photos than you need to get to your golden images!

Black American photographer, Carrie Mae Weems has been an amazing influence on artists and offered compelling commentary on race, gender, art, and politics in her pioneering work. She began her published work in the 1980s and continues to exhibit today. I had the honor of attending a talk she gave a couple of years ago at the University of North Carolina at Chapel Hill.

I also love the work of William Eggleston, Cindy Sherman, Gordon Parks, and Diane Arbus.

Regarding the changing uses of photography over the years, I would first mention that photography was not originally accepted as an art form worthy of museum exhibitions until really the early 1900s. Alfred Stieglitz was one of the early photography-as-art pioneers. Later, color photography was not seen as art and was considered vulgar by purists. William Eggleston was one of the photographers who helped to shake that up. We've continued to use photography as a document, and photojournalism remains crucial today. The photographers employed by the Farm Security Administration during the dust bowl of the 30s in the U.S. like Dorothea Lange and Walker Evans, as well as Gordon Parks, come to mind as documentary photography greats. Another photography great, Annie Liebowitz, makes me think of the lines between advertising and fine art has become increasingly blurred.

3.) Nicéphore Niépce is the father of photography.  In around 1816. Niépce became interested in the new technique of lithography and began to explore ways of using light-sensitive materials to produce images directly onto the printing plate or stone. The first successful photo was taken in 1826. Niépce used his heliography process to capture the first photograph but was soon overshadowed by the invention of the daguerreotype. The place of the shot was taken in Niépce's estate in Burgundy.

4.) Technically, photography has changed in that digital imaging has matured and advanced image-making creativeness possibilities and quality beyond what most people could conceive 20 years ago.

Professionally, the advent of easy-to-use digital cameras and unlimited shooting for essentially free has basically destroyed the professional photographers’ ability to charge a relatively living wage for workers. A few still command decent prices, but digitization has created commoditization, which always equals pricing deterioration.

The way we view images has changed from open and inviting prints on refrigerators, desks, and walls; to email snapshots that must be opened to participate and that we invest 5 seconds in viewing before terminating them.

As with every industry that has been impacted by digitization, great disruption has occurred. Sometimes for the better as in expanding the top one percent of creatives and in potential image quality. Most times diluting image quality by diluting the talent pool with mediocre uncommitted practitioners. (Like adding water to good wine, the more water the less desirable the wine. Taste, personality, and care are wasted by the dilution.)

Socially, the so-called democratization of photography through digital has diluted the commitment to quality image-making. Many people are just happy to get an image, even when they are beyond mediocre.

Malik built a simple electromagnet with copper wire, an iron bolt, and a 1. 5-volt battery. The electromagnet was able to lift a paper clip from 3 centimeters away. Select three ways malik can improve the strength of his electromagnet.

Answers

The following are all the ways Malik can strengthen his electromagnet:

1. He can use a longer wire that is wrapped around the bolt multiple times.

2. He can switch out the 1.5-volt battery for a higher-voltage battery.

An electromagnet is a specific kind of magnet in which a wire-wound coil of electric current generates the magnetic field.

The actions listed below can be taken to strengthen an electromagnet:

1. Use a longer wire that has been several times wrapped around the nail or rod.

2. By using a high-voltage battery, boost the current.

3. Take a copper wire that is thick or sturdy.

Therefore, Malik has the following options for enhancing the magnet's strength:

1. He can use a longer wire that is wrapped around the bolt more frequently.

2. He can switch out the 1.5-volt battery for a higher-voltage battery.

Here you can learn more about electromagnet in the link brainly.com/question/17057080

#SPJ4

Which of these statements is true about text superimposed over a photograph on a
slide?
It should never be done.
It should always be done.
It should have high color contrast.
O It should have low color contrast.

Answers

Answer:

It should have high color contrast.

How do you think smartphones will have changed in 5 years?

Give 3 features that you think smartphones will have in 5 years that it does not have right now.

Answers

Smart phones will be able to be navigated with your mind

Write a function swapvectorends() that swaps the first and last elements of its vector parameter. ex: sortvector = {10, 20, 30, 40} becomes {40, 20, 30, 10}. the vector's size may differ from 4.

Answers

Function "SwapVectorEnds" takes a vector as input and swaps its first and last elements. The function is called in a sample program that initializes a vector and prints its contents before and after calling the function.

Here's one possible implementation of the SwapVectorEnds() function:

void SwapVectorEnds(vector<int>& vec) {

  if (vec.size() < 2) {

     return;

  }

  int temp = vec.front();

  vec.front() = vec.back();

  vec.back() = temp;

}

The function takes a reference to a vector of integers as its parameter. It first checks if the vector has at least two elements (if not, there is nothing to swap). It then swaps the first and last elements of the vector by storing the first element in a temporary variable, setting the first element to be the current last element, and then setting the last element to be the temporary variable. Note that the function modifies the original vector directly, so there is no need to return anything.

The sample program can then call the SwapVectorEnds() function and print out the modified vector as follows:

int main() {

  vector<int> sortVector(4);

  int i = 0;

  sortVector.at(0) = 10;

  sortVector.at(1) = 20;

  sortVector.at(2) = 30;

  sortVector.at(3) = 40;

  SwapVectorEnds(sortVector);

  for (i = 0; i < sortVector.size(); ++i) {

     cout << sortVector.at(i) << " ";

  }

  cout << endl;

  return 0;

}

Output:

40 20 30 10

Learn more about SwapVectorEnds() here: brainly.com/question/19756685

#SPJ4

Complete question:

Write a function SwapVectorEnds() that swaps the first and last elements of its vector parameter. Ex: sortVector = {10, 20, 30, 40} becomes {40, 20, 30, 10}. The vector's size may differ from 4.

Sample program:

#include <iostream>

#include <vector>

using namespace std;

<STUDENT CODE>

int main() {

  vector<int> sortVector(4);

  int i = 0;

  sortVector.at(0) = 10;

  sortVector.at(1) = 20;

  sortVector.at(2) = 30;

  sortVector.at(3) = 40;

  SwapVectorEnds(sortVector);

  for (i = 0; i < sortVector.size(); ++i {

     cout << sortVector.at(i) << " ";

  }

  cout << endl;

  return 0;

}

For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

For all hypertext links in the document, set the font-color to ivory and set the text-decoration to none.
(CSS)

Answers

Using the knowledge in computational language in html it is possible to write a code that For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

Writting the code:

<!doctype html>

<html lang="en">

<head>

  <!--

  <meta charset="utf-8">

  <title>Coding Challenge 2-2</title>

</head>

<body>

  <header>

     <h1>Sports Talk</h1>

  </header>

  <nav>

     <h1>Top Ten Sports Websites</h1>

     <ul>

   

     </ul>

  </nav>

  <article>

     <h1>Jenkins on Ice</h1>

     <p>Retired NBA star Dennis Jenkins announced today that he has signed

        a contract with Long Sleep to have his body frozen before death, to

        be revived only when medical science has discovered a cure to the

        aging process.</p>

        always-entertaining Jenkins, 'I just want to return once they can give

        me back my eternal youth.' [sic] Perhaps Jenkins is also hoping medical

        science can cure his free-throw shooting - 47% and falling during his

        last year in the league.</p>

     <p>A reader tells us that Jenkins may not be aware that part of the

        least-valuable asset.</p>

  </article>

</body>

</html>

See more about html at brainly.com/question/15093505

#SPJ1

For ul elements nested within the nav element, set the list-style-type to none and set the line-height
For ul elements nested within the nav element, set the list-style-type to none and set the line-height

Pre-Test
Active
2
3
6
7
8
9
In order for a fictionalized story to be based on real events, the author should include
O characters with strong feelings
O historical matenal
O a narrator
O dialogue​

Answers

Some of the options in this question are not correct; here is the correct and complete question:

In order for a fictionalized story to be based on real events, the author should include

A. Characters with strong feelings

B. Historical material

C. A narrator

D. Dialogue​

The correct answer is B. Historical material

Explanation:

Stories, novels, and poems are said to be based on real events if these include or are inspired by real people, settings, or historical events. This includes using any historical material and adapting it to create a story. For example, the play "The Tragedy of Julius Caesar" written by Shakespeare is a play based on real events as it includes real characters such as Julius Caesar and some of the events in it are based on historical events.

According to this, the element that is necessary to make a story to be based on real events is historical material. Also, others such as a narrator, dialogue, or characters with strong feelings can be found in most stories including those that are completely fictionalized.

which of the following preflight actions is the pilot in command required to take in order to comply with the united states code of federal regulations regarding day visual flight rules (vfr)?

Answers

A preflight action that the pilot in command is required to take in order to comply with the United States code of federal regulations regarding day visual flight rules is to verify the airworthiness certificate is legible to passengers.

What preflight actions are required for a pilot?

For the preflight actions that are required for a pilot prior to every flight, pilots should gather all information vital to the nature of the flight, assess whether the flight would be safe, and then file a flight plan. Pilots can receive a regulatory-compliant briefing without contacting Flight Service.

A pilot in command may effectively accept a "land and hold short" (LAHSO) clearance in order to provide that he or she determines that the aircraft can safely land and stop.

Therefore, a preflight action that the pilot in command is required to take in order to verify the airworthiness certificate is legible to passengers.

To learn more about Preflight actions, refer to the link:

https://brainly.com/question/10371808

#SPJ1

Which of the following types of mobile Internet access methods offers the least amount of security?
O Mobile broadband
Wi-Fi hotspot
Tethering
a
O Gateway

Answers

I think that its a wifi hotspot since your IP address can be leaked and found. That is why some people use a VPN.

Answer:

Hot Spot since it provides viruses and security disable

Explanation:

A single computer on a network is called a____________.

Answers

Is it a vpn, I’m just guessing bc I don’t know anything about this stuff lol

Answer: A single computer on a network is called a node. pls brainliest

What can you do to manually exclude an individual from a recipient list?
O Add a new source list to the document without the recipient.
O Filter the recipients using a specific city or a specific ZIP code.
O Remove the check mark next to the person in Mail Merge Recipients.
O Delete the placeholder address block on the document's preview page.

Answers

Answer:

Remove the check mark next to the person in Mail Merge Recipients

Answer:

Option three/letter C.

Explanation:


Compiling and organizing data and information to prepare
technical geology reports?Any answer

Answers

Compiling and organizing data for technical geology reports involve a structured approach to collecting, analyzing, and interpreting geological data.

In the first phase, data collection, geologists gather information from a variety of sources, including field studies, laboratory tests, and remote sensing techniques. They may record observations about rock formations, conduct seismic surveys, or collect soil and rock samples for laboratory analysis. The gathered data is then organized using software tools to help visualize and interpret the findings. In the second phase, the data is analyzed and interpreted to draw meaningful conclusions about geological structures and processes. This could involve identifying rock types, interpreting seismic data to understand subsurface structures, or using geochemical data to infer past environmental conditions. The findings are then compiled into a technical report, which outlines the methodologies used, the data collected, and the interpretations made.

Learn more about technical reports here:

https://brainly.com/question/33652201

#SPJ11

How would you define a cloud today?
as a non-factor
networking
server
any remote virtualized computing infrastructure

Answers

Answer:

The answer is "any remote virtualized computing infrastructure".

Explanation:

The term cloud is used as the symbol of the internet because cloud computing is some kind of internet computing, that offers various services for computers and phones in organizations via the internet.  

The virtual network allows users to share numerous system resources throughout the network system.It allows you to access the optimal productivity by sharing the resources of a single physical computer on many virtual servers.

Which of the following scenarios should use a for loop? A. printing the names in a list until the user presses the space key B. printing all of the even numbers between 2 and 20 C. telling a car to slow down if it is going over 40 mph D. printing a message if the user enters a negative number​

Answers

Answer: A

Explanation:

Answer:

A.

Explanation:

Have you watched, or listened to, a documentary on your computer, smartphone, or on demand? Do you think these new distribution choices help or hurt future opportunities for video journalists? Support your answer.

Answers

Answer:

Yes, and No it does not hurt their opportunities

Explanation:

The main goal of video journalism is to get their work in front of as many people as possible so they can share their stories with the entire world. These platforms allow for this to happen. Smartphones, Computers, On-demand video platforms, etc. all allow Video Journalists to publish their work in various different platforms and formats in order to get their work seen by hundreds, thousands, or even millions of individuals. Therefore, It does not hurt video journalists, but instead encourages them and helps them further their work by creating more opportunities.

Other Questions
One of the major problems facing farmers in the 1920s was. At top speed, cheetahs can run 80 miles per hour. How fast would that be in meters/second? Part BBased on your research and understanding of Bush's new world order, was it realistic? Write 12 sentences to state your position and reasoning. how to import a Photoshop .psd file with layers as individual items. help me guys... my school wanted us to draw a comic about our school charmian Each if the 24 students in Mr. Macons class flipped 3 coins. How many students would you expect to get 3 heads. Pin Fins are to be specified for use in an industrial cooling application. The fins will be subjected to Air flowing at V = 10 m/s and a temperature of T_infinity = 300K. The cylindrical fin has a base temperature of T_b = 400 K, and a diameter of D = 15 mm. The cross-sectional areas of each fin are the same. Find: Which fin has the largest heat transfer rate? NEED ANSWER ASAPfind the domain. y=10/|2-x| Use the properties of equality to finish solving the equation. 3 4 (20y 8) + 5 = 1 2 y + 1 4 (20y + 8) 1. Distribute the 3 4 and 1 4 : 2. Combine like terms: 15y 6 + 5 = 1 2 y + 5y + 2 15y 1 = 11 2 y + 2 What is the solution? which part of a neuron receives nerve impulses from other neurons and conducts them towards the cell body? What two simple machines is a stapler made up of?1. wheel and axle and lever2. lever and pulley3. wedge and screw4. wedge and lever List two or three domain-specific terms you're likely to use in your letter. Explain what they mean. Use word roots and reference materials to help you.what do they mean by that? a cable hangs between two poles 12 yards apart. the cable forms a catenary that can be modeled by the equation y = 12 cosh ( x 12 ) 7 between x = 6 and x = 6 . find the area under the catenary.Round your answer to four decimal places. Arc Length yards Question Help: Message instructor this portion of a taxpayers W-2 form. Assume that the taxpayers wages for the year are under the Social Security limit. What entry should be in Box 4? 1. wages, tips, other compensation 2. Federal income tax withheld3. Social security wages 4. Social security tax withheld5. Medicare wages and tips 6. Medicare tax withheld$1346.767. Social security tips 8. Allocated tips9. Advance EIC payment 9. Dependent care benefits what is respiratory system A container with a volume of 893L contains how may moles of air at STP? Oriole Corporation reported the following for 2020: net sales $1,235,200, cost of goods sold $721,800, selling and administrative expenses $338,600, and an unrealized holding gain on available-for-sale debt securities $15,700.Required:Prepare a statement of comprehensive income, using (a) the one statement format, and (b) the two statement format. (Ignore income taxes and EPS). Bond J has a coupon of 5.2 percent. Bond K has a coupon of 9.2 percent. Both bonds have 15 years to maturity and have a YTM of 7.4 percent a. If interest rates suddenly rise by 1.6 percent, what is the percentage price change of these bonds? (A negative value should be indicated by a minus sign. Do not round intermediate calculations. Enter your answers as a percent rounded to 2 decimal places.) %A in Price Bond J Bond K % % b. If interest rates suddenly fall by 1.6 percent, what is the percentage price change of these bonds? (Do not round intermediate calculations. Enter your answers as a percent rounded to 2 decimal places.) %A in Price Bond J Bond K % % You went to the market one day. write about an incident that happened there Exercise 2 Draw two lines under the verb or verb phrase. In the blank, write its tense: present, past, future, present perfect, past perfect, or future perfect. Label each pronoun: nom. (nominative), obj. (objective), pos. (possessive).Mom and my sister had baked the cookies for us.