________ applications are software in which the vendor hosts the software online over the Internet and you do not to install the software on your computer. Select one: A. Platform as a Service B. Software as a Service C. Infrastructure as a Service D. Open Source as a Service

Answers

Answer 1

Answer:

B. Software as a Service

Explanation:

Software as a service (SaaS) is a cloud-based software in which the vendor hosts applications and make them available online for people to use without the need of installing them on their systems. Examples of Software as a service (SaaS) software include DocuSIgn, MailCHimp, Dropbox, BigCommerce, Salesforce etc.


Related Questions

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?

Answers

Answer:Logic bomb

Explanation:

A logic bomb is a malicious program that is triggered when a logical condition is met, such as after a number of transactions have been processed, or on a specific date (also called a time bomb). Malware such as worms often contain logic bombs, behaving in one manner, then changing tactics on a specific date and time.

Common malicious actions that logic bombs are able to commit include data corruption, file deletion or hard drive clearing. Unlike other forms of malware that break into a secure system, logic bomb attacks tend to be cyber sabotage from a person within an organization who has access to sensitive data.

You have a web application hosted in AWS cloud where the application logs are sent to Amazon CloudWatch. Lately, the web application has recently been encountering some errors which can be resolved simply by restarting the instance. What will you do to automatically restart the EC2 instances whenever the same application error occurs?

Answers

Answer/Explanation:

In this scenario, you can:

- look at the existing CloudWatch logs for keywords related to the application error to create a custom metric;

- create a CloudWatch alarm for that custom metric which invokes an action to restart the EC2 instance;

- create alarms that automatically stop, terminate, reboot, or recover your EC2 instances using Amazon CloudWatch alarm actions;

- use the stop or terminate actions to help you save money when you no longer need an instance to be running; and

- use the reboot and recover actions to automatically reboot those instances or recover them onto new hardware if a system impairment occurs.

Cheers

Why are some constraints automatically applied by the software

Answers

Answer:

Some constraint are automatically applied by the software while others must be entered manually because we have some shapes that just come with automatic constraint.

In instance can be given with square, this have all ot iits four sides equal with two set of parallel sides.

Explanation:

see Answer.

QUESTION 3 Which of the following for loop headers will cause the body of the loop to be executed 100 times? a. for(int i = 0; i <= 100; i++) b. for(int i = 1; i < 100; i++) c. for(int i = 1; i <= 101; i++) d. for(int i = 0; i < 100; i++) e. none of these for loops will execute the loop body 100 times

Answers

Answer: a

Explanation:

for(int i = 1; i <= 100; i++)

means the execution start from 1 that is i=1 and execution will stop at 100 dot.

the loop will test the statement, if the statement is true it will execute and go to the next(that is increment by 1).

Answer:

0 + 10i

Explanation:

just did it on edge 2020

An increasing concern for privacy and widespread availability of encryption products has led to the use of encryption for individual files and even entire devices. Briefly discuss the current state of encryption with respect to forensic investigation.

Answers

Answer:

As investigators, we are limited to the information on the device that we can access. If a hard drive is fully encrypted, we have no easy access to the stored data and our investigative options become limited. The first thing an investigator must do is to determine the level and extent of the encryption. Weak passwords can be cracked, but if the user has implemented a strong password it becomes almost impossible to access via brute force methods. It could be that just a few files are encrypted and there could be unencrypted copies elsewhere on the device. The user could also be a creature of habit and use the same set of passwords. These passwords can be quickly located in easily decipherable formats throughout the system. In all cases, though, I tell investigators that digital evidence is just one piece of the body of evidence in a case. Don’t fall into a trap where you spend too much time trying to decrypt a potentially probative item, when valuable unencrypted data may be found by simply continuing your examination

What is the system that consists of nonproprietary hardware and software based on publicly known standards that allow third parties to create add-on products to plug into or interoperate with the system?

Answers

Answer:

Open systems

Explanation:

Open systems are very different from Open Source applications or software, it should not be confused.

Open systems work with the blend of open software standards, portability, and interoperability. Computer systems that interoperate among multiple standards and vendors to ensure that computer resources (hardware and software) are not allotted to a particular vendor. Such computer systems are considered as open systems.

For instance, computer systems that run a Microsoft Windows OS can be considered as an Open system. This is because of their capability to run different versions of the Microsoft Windows OS on that particular computer system. More clearly, A computer with Windows 10 OS, can be used to install Windows 8 OS without any issue. That same computer system can run the Windows 7 OS. This makes the computer system and open system.

The screened subnet protects the DMZ systems and information from outside threats by providing a network with intermediate security, which means the network is less secure as the general public networks but more secure than the internal network.1. True2. False

Answers

Answer:swswsw

Explanation:swwsws

The cloud computing model has several unique and essential characteristics that distinguish cloud computing from an in-house infrastructure. One of these characteristics is ________.

Answers

Answer:

Rapid Elasticity is the correct answer of this question.

Explanation:

Rapid elasticity is a cloud computing phrase for scalable storage, or the capacity to deliver scalable software. The cloud computing model has many different and necessary features which separate both cloud computing and an in-house technology. One such attribute is Rapid Elasticity.

The principle of rapid elasticity in specific cloud computing conditions does cause some problems.The knowledge that companies still need to distribute and decommission services is often negligible on the part of the client or user.

____, a Symantec product, offers a number of residential firewall and security applications that also provide various degrees of content filtering and proxy services.

Answers

Answer:

Norton

Explanation:

Fill in the blanks

Norton , a Symantec product, offers a number of residential firewall and security applications that also provide various degrees of content filtering and proxy services.

Business ethics the intranet is a private piece of a company's internet network that is made available to computers and/or vendor partners on the basis of secured access by a unique password.A. True B. False

Answers

Answer:

The answer is "Option A".

Explanation:

In the private sector of communications offers intranets, it is also known as the area of business ethics, that share data within corporations. The purpose of this service is to improve communication, coordination, and data sharing within the organization for employees.

It allows you to make a free email account, that runs on a server.  It navigate emails when they have Internet speeds as well as a browser.

I have sampled a trumpet note and keymapped it to MIDI notes 55 to 65. If I play MIDI note 60 and hear middle C, what will I hear if I play MIDI note 62?

Answers

Answer:

The answer is D.

Explanation:

The musical interval between two notes depends on the ratio of their frequencies. An octave is a ratio of 2:1, an octave comprises 12 equal semitones. Each semitone therefore has a ratio of:

[tex]2^{\frac{1}{12} }[/tex]≈ 1.059

Then by convention, A4 is often set at 440 Hz and has MIDI note 69.

MIDI note 68 wich is one semitone below A4, that is, G#:

G#= [tex]\frac{440}{1.059}[/tex]=415.3 Hz

MIDI note 67 wich is one semitone below G#, that is, G:

G= [tex]\frac{415.3 }{1.059}[/tex]=392 Hz

MIDI note 66 wich is one semitone below G, that is, F#:

F#= [tex]\frac{392 }{1.059}[/tex]=369.9 Hz

MIDI note 65 wich is one semitone below F#, that is, F:

F= [tex]\frac{369.9 }{1.059}[/tex]=349.23 Hz

MIDI note 64 wich is one semitone below F, that is, E:

E= [tex]\frac{349.23 }{1.059}[/tex]=329.63 Hz

MIDI note 63 wich is one semitone below E, that is, D#:

D#= [tex]\frac{329.63 }{1.059}[/tex]=311.13 Hz

Therefore MIDI note 62 wich is one semitone below D#, that is,D:

D= [tex]\frac{311.13 }{1.059}[/tex]=293.6 Hz

Final answer:

If MIDI note 60 corresponds to middle C, then playing MIDI note 62 will result in the note D4, which is two semitones higher.

Explanation:

The student is asking about the relationship between MIDI notes and the pitches they represent. When a student plays MIDI note 60 and hears middle C, they are referencing the standard tuning where MIDI note 60 corresponds to middle C, which is 261.63 Hz (slight discrepancy from the 263 Hz mentioned, but both are commonly used to represent middle C). If the student then plays MIDI note 62 on the same key-mapped trumpet sample, they should expect to hear a note that is two semitones higher than middle C, which is the note D4.

What option is available on a Host A record to tell the system how long the record should remain in the database after it was created or last updated?

Answers

Answer:

Time to live.    

Explanation:

The Time to Live is used for the purpose of the expiration table in the rows dynamically.The Time to live is represented in the time limit to stay in the database the Time to live It is no longer possible to fetch the data that has passed its closing timeout value also it is not displayed in the store metrics.

The Time to live is available on the host in the log informing the system how long the record will stay in the database after it has been generated or last modified.

Keira is using the software development life cycle to create a new app. She has the pseudocode for her program. Which stage of the software development life cycle is Keira ready for next?

Answers

Keira is using the software development life cycle to create a new app. She has the pseudocode for her program. The next stage for Keira is CODING.

Explanation :

SDLC or the Software Development Life Cycle is a process that produces software with the highest quality and lowest cost in the shortest time. SDLC includes a detailed plan for how to develop, alter, maintain, and replace a software system.SDLC involves several distinct stages, including planning, design, building, testing, and deployment. Popular SDLC models include the waterfall model, spiral model, and Agile model.The steps of the SDLC are given below :Identify the current problems. “What don’t we want?” Plan. “What do we want?” Design. “How will we get what we want?” Build. “Let’s create what we want.” This SDLC stage develops the software by generating all the actual code. If the previous steps have been followed with attention to detail, this is actually the least complicated step.Build is the phase which Keira should move onto in the SDLCSDLC done right can allow the highest level of management control and documentation. Developers understand what they should build and why. All parties agree on the goal up front and see a clear plan for arriving at that goal. Everyone understands the costs and resources required.

Answer:

The answer is A because

Explanation:

People who are regular visitors to SyFy (a website maintained by a science fiction cable network) and those who are regular visitors to BHG (a website maintained by the producers of BHG-TV and the publishers of a women's magazine) belong to different ________ segments.

Answers

Answer: Psychographic Segments

Explanation:

Psychographics is the qualitative method of studying consumers or people based on their psychological characteristics and traits. When values, aspirations, goals, desires, interests, and lifestyle choices of people are utilized to in other to know exactly what to bring into the market, then you are using Psychographics in marketing focus which is usually focused on understanding the consumer's emotions and values, to market whatever it is more accurately.

From the question, those who visit Syfy and those that regularly visit BHG are from different psychographic segments because they have different interests and/or values. And the owners of these sites upload contents that will make them to continue to visit the site and enrich the site owners. (Market)

In one week, your company received the following quantities of e-mail messages. Monday 240 Tuesday 315 Wednesday 290 Thursday 180 Friday 375 What is the average number of e-mail messages? A. 280 B. 285 C. 275 D. 310

Answers

Answer:

280

Explanation:

Average = (240 + 315 + 290 + 180 + 375) ÷ 5

= 1400 ÷ 5

= 280

Cheers

You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You check the motherboard documentation and purchase the fastest processor supported by the motherboard. However, when you start the computer, it beeps regularly, nothing is displayed on the screen, and it doesn't start. What should you do?A. Return the CPU for a new one.B. Update the UEFI firmware.C. Press F8 while booting the computer.D. Upgrade the motherboard.

Answers

Answer:

B. Update the UEFI firmware

Explanation:

UEFI (Unified Extensible Firmware Interface) is a standard firmware interface for PCs. It is responsible for waking up the computer hardware components and ensure they are functioning properly.

The old processor was controlled by an older version of the UEFI but to run the new processor, you update the Firmware Interface to enable it communicate with the computer's hardware components.

Wireshark capture files, like the DemoCapturepcap file found in this lab, have a __________ extension, which stands for packet capture, next generation.

Answers

Answer:

The answer is ".pcapng"

Explanation:

Wireshark format includes a "dump" with data packets, which is collected over a channel and sometimes a common folder to store, that data in the PCAP Next Iteration file system.

The .pcapng stands for the file system, this file system compatible with the recorded data transmission packet. It includes several data blocks. It is quite robust, but it should not be helped by the other devices. Wireshark allows the libpcap system as well.

You need to provide connectivity between two buildings without running any cables. You decided to use two 802.11ac APs to provide wireless connectivity between the buildings. Which of the following is the BEST choice to support this need?
a. Use omnidirectional antennas on both APs.
b. Use wide channels.
c. Use the 2.4 GHz frequency band.
d. Use direction antennas on both APs.

Answers

Answer:

D

Explanation:

Use Directional antennas on both APs

A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.

Answers

Answer:

User application

Explanation:

A user application is a program that is created by using a standard software that is adjusted to the user's needs that can't be fulfilled by an existing system. According to this, the answer is that a user application utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.

If you are viewing a webpage with customized or regenerated content, such as updated stock quotes, what type of webpage are you viewing? Group of answer choices dynamic static transformative animated

Answers

Answer:

Dynamic

Explanation:

A dynamic web page is a type of web page that shows different and diverse content each time it's viewed. For instance, the webpage may adjust with every passing time of day, it might also change according to the different preference of each user that accesses the webpage, or the kind of user interaction.

Given the scenario, before leaving the office, you ask the CIO to provide which formal document authorizing you to perform certain activities on the network?1. Syslogs2. Network flows3. Certificate authority4. Authorization memo

Answers

Answer:4. Authorization memo

Explanation: Authorization memo is a document that gives a go ahead to perform certain activities on the network, gives you the opportunity to work on the network on behalf of the CIO, although you are as well reminded that you are only doing this on behalf of someone, therefore advised to take precautions. Authorization memo is a reminder formal document that gives you access to do something on behalf of your CIO.

Due to ________, early file processing systems were difficult to maintain.
a. frequent software upgrades
b. data dependency between the programs and files
c. complicated tables and fields with no metadata
d. lack of database administrators and IT personnel.

Answers

Answer:

b-data dependency between programs and files

Explanation:

The close relationship between data stored in files and the software programs that update and maintain those files. Any change in data organization or format requires a change in all the programs associated with those files.  

Amy has created a new brand for her company's goldfish training materials. She knows that other companies train goldfish and it is a popular sport, but realizes that it is a niche market. She wants to use a Google Display Ads campaign to build awareness for her new brand.
Which Google Display ad targeting option can help Amy with her goal of creating awareness within her niche market?

Answers

Answer:

Custom Affinity audiences .

Explanation:

Amy recently developed the latest product for the following training materials of the corporation. She understands that many corporations educate them, so it's a common activity, however she admits that this is a small market.

She decides to use the Google Display Advertising program for increase knowledge of her latest product. Custom Affinity audiences will allow Amy to increase recognition in her target market.

___________provides vital protection and maintenance services for system hardware and software, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure.a. User support
b. Database administration
c. Systems support and security
d. Network administration

Answers

Answer:

C-Systems support and security

Explanation:

Systems support and security protect and maintain the system by troubleshooting and ensuring the proper installation of both the hardware and software as well as the system updates. It also including enterprise computing systems, transaction processing systems, and corporate IT infrastructure.

When configuring inter-VLAN routing using the router-on-a-stick model, the physical interface of the router must be connected to a ___________________ on the adjacent switch.

Answers

Answer:

vlan

Explanation:

it has the switch on it I think

When configuring inter-VLAN routing using the router-on-a-stick model, the physical interface of the router must be connected to a trunk on the adjacent switch.

What is inter-VLAN routing?

VLAN routing can be used to extend a VLAN across different physical networks, provide additional segmentation or security, or let more than one physical port to existing on the same subnet.

VLANs operate on switches, whereas subnets require a router to execute. Setting up a routed network is more challenging than one that is switched. A switched network doesn't produce different broadcast domains unless you utilize VLANs, whereas a routed network does.

Therefore, the physical interface of the router needs to be linked to a trunk on the neighboring switch in order to configure inter-VLAN routing using the router-on-a-stick paradigm.

To learn more about inter-VLAN routing, refer to the link:

https://brainly.com/question/14530025

#SPJ2

Yesterday you installed a new game on your computer. When you ran the computer, you noticed that the application was running very slow. After you exited the game and restarted it, you received an error message saying, "Insufficient memory or disk space." You checked your hard drive and saw that you had more than 250GB of free space.What should you check next in Task Manager?

Answers

Answer:

Performance tab - Memory available

Explanation:

Based on the scenario being described within the question it can be said that the next thing you should check in the task manager would be the memory available in the performance tab. This tells you the amount of RAM memory that certain applications are using. Sometimes applications such as games, may have a memory leak in the coding causing the game to take up an excess amount of memory to run, which would cause the game to crash.

Final answer:

The next step in troubleshooting the error message is to open Task Manager and check the memory usage of your system in both the 'Performance' and 'Processes' tabs to identify if RAM is fully utilized and if any applications are consuming too much memory.

Explanation:

When you encounter the error message 'Insufficient memory or disk space' despite having ample free hard drive space, the issue is likely related to RAM (Random Access Memory) and not storage space. The next step to troubleshoot in the Task Manager is to check the memory usage of your system. You can open Task Manager by pressing Ctrl + Shift + Esc or by right-clicking on the taskbar and selecting Task Manager.

Once opened, click on the 'Performance' tab to see if the RAM is being fully utilized. If it is, you may need to close some programs that are using a high amount of memory, or consider adding more RAM to your computer if possible. It can also be helpful to check the 'Processes' tab to see if any applications besides the game are consuming a disproportionate amount of memory.

To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

Answers

Answer:

Codes of conduct

Explanation:

Codes of conduct are a set of rules or norms established by an organization for all employees, students or users, to ensure individual responsibilities and proper practices. The code of conduct can cover overall behaviour of individuals in an organization, but a specific code of conduct can be developed for proper computer use in order to establish what is appropriate and available to use in the organization´s computers, and also to restrict or avoid non related content.

Answer:

Code of conduct.

Explanation:

Code of conduct is a documented set of rules that govern the activities in an organization based on the needed ethics and culture of all the departments in the organization.

It shows the dos and don'ts of the company. It could also outline the acceptable Computer system use and behaviors of it's members.

What is a "telescreen"? How is it different from the televisions we know? Is it possible to make a television that could see and hear everything in the room? Could such a device be used for discovering criminals and terrorists? Could it be used for political control? Would it be a good idea to instal?

Answers

Answer:

Telescreens are devices that operate as televisions, security cameras, and microphones.A television is an electronic communication medium that allows the transmission of real-time visual images, and often sound while a telescreen is a television and security camera-like device used to keep things or people under constant surveillance, thus eliminating the chance of secret conspiracies.It could be employed in secretly investigating criminals and terrorists.It could also play a major role in politics by investigating suspicious government officials and those that plan Ill towards a nation.It would definitely be a great idea to install one of such.

Explanation:

You have designed a serverless learning management system and you are ready to deploy your code in to a test/dev environment. The system uses a combination of Lambda, API Gateway, S3 and CloudFront and is architected to be highly available, fault-tolerant and scalable. What are the three different ways you can deploy your code to Lambda?

Answers

Answer:

Lambda is a cloud computing platform developed by Amazon. It provides the opportunity to run without any form of administration. Clients pay based on computing power consumption.

To deploy your code to Lambda, the following options can be used. They are:

Inside Lambda, you can copy and paste your code to the IDE (Integrated Development Environment).

You can upload the zipped file of your code via the Lambda console

You can also write a cloud formation template to help ensure code and environment deployment.

You are generating a derivatively classified piece of information and are looking for information in a classified database. While you are searching, you find a piece of information that is extremely helpful. It includes a banner line and a notice regarding the content only being marked at the highest level of classification within the database. Is this information authorized for use as a source of derivative classification?
a) yes
b) no

Answers

Answer:

No

Explanation:

The information without any authentic source including a banner line and a notice regarding the content only being marked at the highest level of classification within the database is not authorized for use as a source of derivative classification.

Answer:

Yes

Explanation:

The information can be safely use as alternative source of derivative classification. This is because the information is reliable. The reliability of the information comes from the fact that the sources are authentic and easily traceable. In addition, such information follows the highest standards of safety, such as encryption, safety protocols, URL checks, malware checks and many other security checks.

Other Questions
Research examining the associations between IQ scores and outcomes such as income and occupational success has demonstrated that: Group of answer choices a. IQ is more closely related to individuals' occupational success than any other factor ever studied. b. regardless of the socioeconomic status of an individual's family of origin, indivduals with high IQ scores always succeed. c. other factors, such as motivation and social skills, have little impact on economic success. d. People with comparable IQs tend to make similar amounts of money, depsite variability in level of education. Which of the following statements represent a weakness or limitation of ratio analysis? Check all that apply. Ratio analysis is conducted using benchmarking techniques. A firms ratios can lead to conflicting conclusionssome ratios might be ""good"" and some ""bad."" Inflation can distort balance sheet data. (Copied and pasted because no time) EXTREMELY URGENT! I'm in a timed math test atm, and I need answers for lots of questions! Look at the pictures posted, ignore my answer, as I am not confident in it, I just dont have time to leave the questions blank According to Jamie Dimon, "Most leaders I know are working to build something of which they can be proud. They usually work hard, not because they must but because they want to do so." What specific message on leadership is embedded in this statement? Multiple Choice Leaders should routinely deal with organizational crisis Leaders should be problem solvers Leaders should promote the strengths of the business that they are passionate about Leaders should resolve the weakness of the business that they are in charge of The Department of Natural Resources has selected certain species that are on the verge of extinction due to a lack of prey. These species are used for game sport. In an effort to protect the species, the department has started arranging for food for these species. Which method is the department adopting? A piano tuner charged a flat rate of $25 plus $12 per hour to tune a piano. Which expression represents how much the piano tuner earns tuning a piano for h hours? If Peyton Manning, a professional football player, wanted to remember his 16-digit credit card number, which of the following memory techniques would you recommend? Group of answer choices He should think of the numbers as a sequence of football statistics. He should picture each of the numbers in his head printed in a bright color. He should first memorize a few other sequences of 16 digits to gain some practice. He should visualize the front of his credit card showing a picture of him dribbling a basketball. There are three popcorn vendors at a local tournament. Collectively, the vendors sold 3,000 boxes of popcorn throughout the tournament. If Bob's Snack Shack sold 900 boxes, Ally's Eats sold 1,350 boxes, and Gameday Grub sold 750 boxes. Which two vendors combined make up 70% of the sales? 3. A powerful motorcycle can produce an acceleration of while traveling at 90.0 km/h. At that speed the forces resisting motion, including friction and air resistance, total 400 N. (Air resistance is analogous to air friction. It always opposes the motion of an object.) What force does the motorcycle exert backward on the ground to produce its acceleration if the mass of the motorcycle with rider is 245 kg An investor has purchased less than 20% of the common stock available from each of 12 different investees. As part of their financial statements, they provide a report that details the cost and fair value for each of the investments. What is the purpose of this report? If the distance from a plane to a radar station is 160 miles and the angle of depression is 34 degrees, find the number of ground miles from a point directly below the plane to the radar station. 35 PTS!!! What is the correct definition of metabolism? the process by which nutrients travel through the body the process by which cells absorb nutrients the process by which the body gets energy from food the process by which food remnants are removed from the body What's an anatomical detail that some dinosaurs share with birds todoes)?a. Scalesb. BeaksWishbonesd. EggsDinosaurs used feathers to fi Two cars are driving towards an intersection from perpendicular directions. The first car's velocity is 101010 meters per second and the second car's velocity is 666 meters per second. At a certain instant, the first car is 444 meters from the intersection and the second car is 333 meters from the intersection. What is the rate of change of the distance between the cars at that instant (in meters per second) A large sample of tires from cabs driven within a city have an average tire tread depth of 0.25cm at the end of the winter. If the citys average winter tire tread depth is 2.2cm, with a standard deviation of 0.33cm at the end of the same winter, what is the probability cab tires depths would be shallower than 0.25cm. Need help pls (projectiles) ToyMax seeks to determine the number of Kanban containers needed to feed a newly established work cell. The cell requires 600 parts over an eight-hour day. Production lead time for the parts needed by the cell is 3 hours and the cell supervisor recommends a safety stock equal to 50% of the cells daily production. Assuming a container size of 100 parts, how many containers are needed for the new cell? A test used by the Supreme Court in racial discrimination cases and other cases involving civil liberties and civil rights that places the burden of proof on the government rather than on the challengers to show that the law in question is constitutional. 1. Intermediate scrutiny2. Strict scrutiny3. Jim Crow laws Atmospheric pressure at sea level has a value of 100kpa. The density of sea water is 1020kg/m-3. At which depth in the sea would the total pressure be 110kpa? Find x.5x - 20 A x=90B x=35C x=14D x= 22