Given the scenario, before leaving the office, you ask the CIO to provide which formal document authorizing you to perform certain activities on the network?1. Syslogs2. Network flows3. Certificate authority4. Authorization memo

Answers

Answer 1

Answer:

Option 4 is the correct answer for the above question.

Explanation:

"Authorization memo" is a type of letter which is providing to anyone when a person wants to authorize a person to do any work. For example, if a person wants to authorize another person to use his id and the password to log on the internet, then he can do it by providing the authorization letter to him. this letter is known as an authorization memo.

The above question scenario said to take the authorization letter from the CEO. so the letter is known as an authorization memo. Hence option 4 is the correct answer while the other is not because-

Option 1 states about Syslog which is log file states about the system error.Option 2 states about the network flow which is not the correct answer.Option 3 states about the certificate authority which is used for the certificate.

Related Questions

You’re trying to cast a video presentation from your tablet to a projector for a training session with some new hires. Although you tested it successfully yesterday, today the connection is not cooperating. You’ve closed apps you’re not using, and you’ve checked that the projector and the tablet are working otherwise. Of the following troubleshooting steps, which should you try first? Second?
1. Restart the projector
2. Restart the tablet
3. Reinstall the presentation app.
4. Verify that you have Internet access on the tablet.

Answers

Answer:

Troubleshooting steps to take:

Restart the tabletRestart the projector

Explanation:

When such problems occur, the basic and quick troubleshooting step is to restart the device or devices involved.

Restart the tablet: This could come in handy regarding this problem. The inability to connect to the projector could be due to the inability of a specific service or driver needed for the projector. Restarting the tablet will load up the drivers and services again to enable smooth connections. When a restart is done, bugs are fixed, internet connection is rectified, memory leaks are stopped, performance is aided, the RAM (Random Access Memory) is flushed or cleaned. This should resolve the problem, however, if not, try number 2.Restart the projector: There are driver software on projectors, and due to one system failure or another, these software may fail to load. This could affect its connection to another device. As done in (1), restarting the projector will fix those bugs and load up, which should solve the connection issue.

A metacharacter is a character that has a special meaning assigned to it and is recognized as part of a scripting or programming language. Escaping metacharacters is a programmatic tactic to treat all characters as basic ASCII rather than as something with special meaning or purpose.a.True.b. False.

Answers

Answer:

The answer is "Option a"

Explanation:

Meta-character is a unique character, which is used in the system or information area, that provides information about the other characters. This type of character is used in both command-line and programming.  

It has a particular meaning and should be prevented for reasons except for its particular importance. It attempts in the algorithmic technique to view all character as a fundamental ASCII instead of a specific purpose.

Which search engine optimization technique involves sending data describing your web site to the search engines and then paying a fee to ensure that your pages are part of the site’s engine index?

Answers

Answer:

Search feeds.

Explanation:

Search feeds seem to be the search engine optimization strategy includes transmitting information to those of the search engines that explaining the user's website and afterward charging the fee to assure that is pages would be included in the site engine listing.

So, the following answer is correct according to the given scenario.

Henry is having a problem with the electrical system on his current laptop. The battery for the laptop will not charge. Henry took the AC adapter and battery from another laptop that is known to work, and put them in his current laptop, but still the battery will not charge. What possible actions can Henry take to make his laptop usable? (Select all that apply.)

Answers

Answer:

The following are the suitable answers.

He will replace the system board of the laptop. He can buy a brand new laptop. He can only use the laptop while the AC adapter is attached to the battery.

Explanation:

On his new system, Henry is experiencing an issue with their power system. The laptop should not charge. He picked up his adapter as well as battery from any other recognized laptop and insert that in his existing laptop, however, it might not start charging anything.

So, he follows some possible steps for his laptop that is:

Firstly, he will replace his system's board.  Otherwise, He will buy a brand new laptop.  Or, he will only use the laptop while the charger is attached to the battery.

A user contacted the help desk to report that the laser printer in his department is wrinkling the paper when printed. The user checked the paper in the supply tray, and it is smooth and unwrinkled.
Which of the following is the most likely reason for the wrinkled paper? (Select TWO.)
A. The paper does not meet the requirements for the printer.
B. The user is selecting the wrong driver for the printer.
C. The paper is creased before it is installed in the printer.
D. The pages being printed are using too much toner.
E. The paper is damp when run through the printer.
F. The printer does not have enough free memory.

Answers

Final answer:

The most likely reasons for wrinkled paper in a laser printer are E. damp paper and D. excessive toner usage.

Explanation:

The service centre received a complaint from a user who claimed that every page was damaged when printing using their office's laser printer. Despite being glossy and wrinkle-free, the user thoroughly examined the sheets inside the distribution tray. The most likely reasons for the wrinkled paper in the laser printer are:

The paper is damp when run through the printer: Moisture on the paper can cause it to become wrinkled when going through the heated pressure rollers.The pages being printed are using too much toner: If the toner is applied too heavily, it can cause the paper to wrinkle.

It is important to ensure that the paper is dry and that the correct amount of toner is being applied to prevent wrinkling.

Your macOS installation is corrupted and you want to boot from an external Thunderbolt hard drive to repair the installation. Which key(s) do you hold down at startup to boot from the external hard drive?

Answers

Answer:

The Alternate (Alt) key

Explanation:

Press down the Option (Alt) key, soon after turning on the mac.

To boot from an external Thunderbolt hard drive on macOS, hold down the Option key immediately after restarting your computer until the Startup Manager appears. Then, select the external drive to boot from it.

To boot from an external Thunderbolt hard drive on a macOS system, you need to restart your computer and immediately hold down the Option key. Continue to hold this key until the Startup Manager appears. Here, you will be able to select your external hard drive as the boot device. Ensure that your external drive is a bootable device with a macOS installer or a viable system backup. Using a Thunderbolt connection is advantageous for its speed and reliability, and booting from an SSD (Solid State Drive) would further enhance this process due to the speed and resilience it offers compared to traditional hard drives.

he "biggest cyber attack in history" could be prosecuted under which statute?​ a. ​CAN-SPAM b. ​Counterfeit Access Device and Computer Fraud Act c. ​Economic Espionage Act d. ​none of the above

Answers

Answer:

a. ​CAN-SPAM

Explanation:

CAN-SPAN is a law created in 2003 signed into law by President George W. Bush on December 16, this law was created for the Assault of Non-Solicited Marketing, and other situations, the standard was created to control the email and like the name the SPAM, this law was sponsored in congress by two senators Conrad Burns and Ron Wyden.

You recently upgraded your computer and added an extra 512 MB of RAM. Consequently, you want to increase your swap space by adding a new swap area. The second hard disk has an unused partition (/dev/sdb2) that you want to format for the swap area. In this lab, your task is to: Create a swap partition on /dev/sdb2. Activate the swap partition.

Answers

Answer:

Following are the answers of the question.

mkswap /dev/sdb2swapon /dev/sdb2

Explanation:

Firstly we have to generate the swap partition on the following directory then we have the following command for the swap partition that is :

mkswap /dev/sdb2

Then, we have to activate the following swap partition after generating the swap partition by using the following commands that is :

swapon /dev/sdb2

So, the following commands is correct for creating or activating the swap partition according to the following scenario.

Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek restarted the computer and noticed a long load time for Windows. Derek checked Task Manager and saw several processes that he did not recognize. What should Derek perform next on the client’s computer?

Answers

Answer: d. Run a virus scan

Explanation: Running a virus scan will reveal if the trojan virus or any other malware has been launched and the clearing the virus when detected. These will make the computer to start working well again. The unexplainable processes that started when the computer was rebooted can be viruses.

Answer:

Scan the system for malware.

Explanation:

The computer system is an information technology system that holds information received by the user in the network and also created by the user for official purposes.

Malwares like virus, worm, trojan horse, rootkit etc are used by attackers to weaken the security of computer systems in a network and even the network security policies. Antivirus softwares are used to detect and remove malwares from system. It must be updated regularly alongside the computer's operating system, for malware signature update.

Phobas Inc. offers an online service which stores notes made by customers on the cloud. When a customer enters notes on one device, it gets updated in all the devices he/she owns. Which of the following cloud-based offerings is being provided to the customers?

Answers

Answer:

Software as a service (SaaS)

Explanation:

Software as a service (SaaS) is a software licensing and release model in which the subscription basis of software licensing is done on a subscription basis and is centrally hosted. It is occasionally referred to as "on-demand software", and was in earlier times referred to as "software plus services" by Microsoft.

For instance, a company can write or build its own software packages and use the SaaS provider's APIs to incorporate those tools with the SaaS offering.

You have a web application hosted in AWS cloud where the application logs are sent to Amazon CloudWatch. Lately, the web application has recently been encountering some errors which can be resolved simply by restarting the instance. What will you do to automatically restart the EC2 instances whenever the same application error occurs?

Answers

Answer/Explanation:

In this scenario, you can:

- look at the existing CloudWatch logs for keywords related to the application error to create a custom metric;

- create a CloudWatch alarm for that custom metric which invokes an action to restart the EC2 instance;

- create alarms that automatically stop, terminate, reboot, or recover your EC2 instances using Amazon CloudWatch alarm actions;

- use the stop or terminate actions to help you save money when you no longer need an instance to be running; and

- use the reboot and recover actions to automatically reboot those instances or recover them onto new hardware if a system impairment occurs.

Cheers

Explain what a lookup table is (assembly). Write pseudo code

Answers

Answer: Lookup table

In computer science, a lookup table is an array that replaces runtime computation with a simpler array indexing operation. The savings in terms of processing time can be significant, since retrieving a value from memory is often faster than undergoing an "expensive" computation or input/output operation.[1] The tables may be precalculated and stored in static program storage, calculated (or "pre-fetched") as part of a program's initialization phase (memoization), or even stored in hardware in application-specific platforms. Lookup tables are also used extensively to validate input values by matching against a list of valid (or invalid) items in an array and, in some programming languages, may include pointer functions (or offsets to labels) to process the matching input. FPGAs also make extensive use of reconfigurable, hardware-implemented, lookup tables to provide programmable hardware functionality.

Shania has started a new job as an app developer. Her first task was to make an old app designed for Android available on other platforms. Which of the following would make her job easiest and fastest?A. Develop different versions of the same app for different programs. B. Use cross-platform tools to write code that will translate the existing Android app code into different native formats. C. Feed the existing code into cross-platform tools to develop different versions of the same app. D. Use the same set of codes for different platforms.

Answers

Answer:

Option B is correct.

Explanation:

As such an application programmer, Shania recently began a new work. The first assignment was to create an earlier software available on certain devices, developed for Android.  

So, she using cross-platform software to compose application code that might convert the current android application code across various native versions to makes it much simpler and quicker for her job.

Other options are incorrect because they are not related to the following scenario.

Final answer:

The option that would make Shania's job easiest and fastest is option B: Use cross-platform tools to write code that will translate the existing Android app code into different native formats.

Explanation:

The option that would make Shania's job easiest and fastest is option B: Use cross-platform tools to write code that will translate the existing Android app code into different native formats. Cross-platform tools allow developers to write code once and then use it to create apps for multiple platforms, such as iOS and Windows. This approach saves time and effort compared to developing different versions of the app for each platform.


By using cross-platform tools, Shania can leverage her existing Android app code and modify it as needed to work on other platforms. This allows her to avoid starting from scratch and ensures consistency across different versions of the app.


Overall, using cross-platform tools is the most efficient and effective way for Shania to make the old app available on other platforms.

3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All of the above e. None of the above

Answers

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

Your desktop computer has DVI and HDMI video ports. If a DVI monitor does not work on your system and yet you know the monitor is good, what is the best solution?

Answers

Answer:

The best possible and cost effective solution is that, Use DVI to HDMI converter to use the DVI monitor.

Explanation:

In above mentioned case, as the DVI port is not working, but DVI monitor is working properly. There are few solutions to use this monitor with the system. For example, a new monitor can be purchased that support HDMI port or replace the old DVI port or card with newer one. Both of the methods are too much costly and time consuming.

The best possible solution is just buy a DVI to HDMI converter and use it with DVI monitor and the system. It is most cost effective and time saving solution.

Answer:

Use a DVI to HDMI adapter to use the current DVI monitor and cable

Explanation:

DVI connections are becoming obsolete by the day. DVI and HDMI cables are both able to stream HD videos and are the same in various ways. In this case, however, it is most likely that the DVI ports on the monitors are somehow not compatible. The solution to this is to use a DVI to HDMI adapter or cable. DVI to HDMI adapter has DVI pins on one end and HDMI port on the other end. You connect using this cable and you will have picture and sound.

digital video recorders​ (DVRs) in an inventory are known to be defective. What is the probability you randomly select an item that is not​ defective?

Answers

Answer:

76%

Explanation:

Based on the information provided within the question it can be said that in this scenario the probability you randomly select an item that is not​ defective would be 76%. This can be calculated in the following way:

50-12=38  (Number of recorders in working condition)

(38)/(50)=0.76

The probability is: 0.76

Now we times this decimal by 100 to get the percent.

0.76 * 100 = 76%

All of the following statements concerning project portfolios are true EXCEPT: ​ a. The projects in a portfolio are managed as a group to achieve strategic business objectives. b. Portfolios cannot include operations and programs. c. Portfolios usually include a mix of some high-risk, high-reward projects and some low-risk projects. d. Each project in the portfolio should have a direct impact on the organization.

Answers

Answer:

Option B is correct

Explanation:

Portfolios should not involve operations as well as programs because it is a concept which applies to that of the collection of projects of that same enterprise as well as the method through which they are identified, handled , purposefully chosen that achieve certain operational objectives of the company.

So, the following are the reason that describe the answer is correct according to the scenario.

________ applications are software in which the vendor hosts the software online over the Internet and you do not to install the software on your computer. Select one: A. Platform as a Service B. Software as a Service C. Infrastructure as a Service D. Open Source as a Service

Answers

Answer:

B. Software as a Service

Explanation:

Software as a service (SaaS) is a cloud-based software in which the vendor hosts applications and make them available online for people to use without the need of installing them on their systems. Examples of Software as a service (SaaS) software include DocuSIgn, MailCHimp, Dropbox, BigCommerce, Salesforce etc.

Which audio editing effect uses the option ""Get Profile"" to execute its function?

Answers

Answer: The audio editing effect that uses the option "Get profile" is used in removing background noises in an audio recording

Explanation:

"Get profile" or "get noise profile" as the case may be; depending on the software used, can be used to remove background noises when editing audios. This helps in making audio recordings noise free. The navigation processes are attached.

In the context of the CIA triangle, confidentiality means that computers and networks are operating and authorized users can access the information they need. True

Answers

Answer:

False is the correct answer for the above question.

Explanation:

The CIA triangle is a concept of cybersecurity which tells the rules and fact for the Confidentiality, integrity, and availability to secure the information from the access of a wrong user.The confidentiality rules said that the information is accessed by the right user only. This is also said by the above question statement which is correct.But the above question statement also wants to say that confidentiality means that the networks and computers are operated by any person which is not correct. Hence false is the correct answer to the above question.

Amy has created a new brand for her company's goldfish training materials. She knows that other companies train goldfish and it is a popular sport, but realizes that it is a niche market. She wants to use a Google Display Ads campaign to build awareness for her new brand.
Which Google Display ad targeting option can help Amy with her goal of creating awareness within her niche market?

Answers

Answer:

Custom Affinity audiences .

Explanation:

Amy recently developed the latest product for the following training materials of the corporation. She understands that many corporations educate them, so it's a common activity, however she admits that this is a small market.

She decides to use the Google Display Advertising program for increase knowledge of her latest product. Custom Affinity audiences will allow Amy to increase recognition in her target market.

Business ethics the intranet is a private piece of a company's internet network that is made available to computers and/or vendor partners on the basis of secured access by a unique password.A. True B. False

Answers

Answer:

The answer is "Option A".

Explanation:

Intranets is a private network field, that enables you to efficiently share data within businesses. Its aim from an internal network is to improve communication, cooperation, and exchange of documentation for individuals inside the organization.

It offers a web site-operated email account. It enables people to access their e-mails because they have network and browser usage.

The following pseudocode is an example of ____.do stepAdo stepBif conditionC is true thendo stepDelsedo stepEendifwhile conditionF is truedo stepGendwhilea. nestingb. stackingc. posttestd. pretest

Answers

Answer:

Option d pretest

Explanation:

Given the pseudocode:

do stepAdo stepBif conditionC is true then do stepDelsedo stepEend ifwhile conditionF is truedo stepGend while

The pseudocode above shows that there is a pretest before some codes are executed. For example, line 3 check if condition is true then only execute stepD otherwise execute stepE. Line 8 check if conditionF is true then repeatedly execute stepG. These are examples of pretest a condition will must be met (pretest passed) before a block of codes can be executed. This pretest can be seen in if-else statements and also the while condition.  

Sara is writing a program to input her monthly phone bills and output the month name and amount for the month with maximum amount. She has defined an array to hold the month names. Complete the pseudocode program. [6] # Program to output maximum month's phone bill MonthName ["January", "February", "March", "April", "May", "June", "July", "August", "September", "October", "November", "December"] # Define an array to hold the phone bills for each month

Answers

Answer:

double [] phoneBills = new double[12];

Explanation:

Since the question has requested that an array be difined to hold phone bill for each month. Above declares an array that will hold floating point number (double) and it has been created to hold 12 values representing the months January to December

Values can be added in the array as shown in the program below.

public class PhoneBill {

   public static void main(String[] args) {

   String []  MonthName = {"January", "February", "March", "April", "May", "June", "July", "August",

           "September", "October", "November", "December"};

   double [] phoneBills = new double[12];

       phoneBills[0] = 4.5;

       phoneBills[1] = 4.5;

       phoneBills[2] = 5.5;

       phoneBills[3] = 6.5;

       phoneBills[4] = 3.5;

       phoneBills[5] = 5.5;

       phoneBills[6] = 6.5;

       phoneBills[7] = 7.5;

       phoneBills[8] = 8.5;

       phoneBills[9] = 4.5;

       phoneBills[10] = 3.5;

       phoneBills[11] = 7.5;

       System.out.println("Months and corresponding phone bill");

       System.out.println(Arrays.toString(MonthName));

       System.out.println(Arrays.toString(phoneBills));

   }

}

The output of this program is attached:

Final answer:

To complete Sara's pseudocode for identifying the month with the highest phone bill, an array to hold the phone bill amounts is defined and iterated through to find the maximum bill and its associated month.

Explanation:

Sara is trying to write a program to track her monthly phone bills and identify the month with the highest bill. To complete Sara's pseudocode, you would need to define an array to hold the phone bill amounts for each month, similar to how she has defined an array for MonthName.

The pseudocode might look something like this:

Define an array PhoneBills to hold the monthly phone bill amounts

Initialize a variable maxBill to hold the maximum bill amount

Initialize a variable maxMonth to hold the month of the maximum bill

Use a loop to iterate through the PhoneBills array

Inside the loop, compare each bill to maxBill and update maxBill and maxMonth if the current bill is higher

After the loop, output maxMonth and maxBill

Here is a more detailed version:

   maxBill = 0
   maxMonth = ""
   For i = 0 to PhoneBills.length - 1
       If PhoneBills[i] > maxBill Then
           maxBill = PhoneBills[i]
           maxMonth = MonthName[i]
       End If
   Next i
   Output "The month with the highest bill is " + maxMonth + " with an amount of $" + maxBill

This pseudocode will identify the month with the highest phone bill and output the result.

If Peyton Manning, a professional football player, wanted to remember his 16-digit credit card number, which of the following memory techniques would you recommend? Group of answer choices He should think of the numbers as a sequence of football statistics. He should picture each of the numbers in his head printed in a bright color. He should first memorize a few other sequences of 16 digits to gain some practice. He should visualize the front of his credit card showing a picture of him dribbling a basketball.

Answers

Answer:

He should think of the numbers as a sequence of football statistics.

Explanation:

One of the most common mnemonic devices that researchers suggest is that of trying to link the thing we want to memorize to something that is relevant to our own life. In this example, Manning would benefit from linking the numbers to something that he finds revelant, such as football statistics. This increases the probability of him remembering these numbers.

What type of IPv6 address should you use when you have multiple routers on a subnet and want hosts to use the nearest router for packets that should be delivered to remote networks?

Answers

Answer:

anycast

Explanation:

Anycast -

It refers to as the routing methodology and the networking address where only one destination address has more than two pathway for the end destination , is referred to as an anycast .

In this case , the router has the capability to select the pathway to reach the destination , depending on the latency measurement , cost , distance and hops .

Hence , from the given information of the question ,

The correct answer is anycast .

______is a multimodal application software platform. the centrealized and shared database system ties the entire organization together, allowing information to be entered once and made available to all users.

Answers

Answer:

Enterprise Resource Planning (ERP) system

Explanation:

The ERP system is an integrated system that mediate an organization processes that include collecting, managing, interpreting business data. The data storage is centralized and the entire organization can share the same business data. The data sharing is usually achieved through a continuously updated view of business data backed by a centralized database management system. This facilitate the information flow between different departments in an organization.

You are managing an FTP server installed in Ubuntu Server. The server has created a very large log file, vsftpd.log. Which command is appropriate to search the log file for activity of the user charlie?

Answers

Answer:

sudo grep "charlie" /var/log/vsftpd.log

Explanation:

Whenever the user becomes running and configured the FTP server within the following Server. That network generated a quite wide logging file, called vsftpd.log. Therefore the sudo grep "charlie" /var / log / vsftpd.log commands seems to be suitable towards searching the log document regarding user charlie operation.

So, the following command is correct according to the given statement.

Ria has modified the hard disk that hosts the operating system by using the fdisk command. The fdisk command indicates that the new partition information must be manually reloaded. Which of the following should she do next? (Choose two. Either answer is

Answers

Answer:

a and d

Explanation:

A. Run the parted command

D. Reboot the system

These two actions will make it easier to manually reload the fdisk

When sketching out your Web site you create a clear and straightforward site map that divides the Web site content into a logical set of topics and subtopics (pages and subpages). Which principle of Web design are you considering when you organize the user interface into a form that is clearly understandable for the user?

Answers

Answer:

Structure.

Explanation:

While drawing the user's site, the simple, as well as concise sitemaps, is created which separates the scope of that site into such a coherent collection for topics & sub-topics.  

So, the Structure concept in website development is regarded while designing a user interface in such a manner which is easily recognizable to the customer.

Other Questions
Air at 26 kPa, 230 K, and 220 rn/s enters a turbojet engine in flight. The air mass flow rate is 25 kg/s. The compressor pressure ratio is 11, the turbine inlet temperature is 1400 K, and air exits the nozzle 26 kPa. The diffuser and the nozzle processes are isentropic, the compressor and turbine have isentropic efficiencies of 85% and 90%, respectively. There is no pressure drop for flow through the combustor. Kinetic energy is negligible everywhere except at the diffuser inlet and the nozzle exit. On the basis of air-standard analysis, determine: (a)the pressures and temperatures at each state, (b)the rate of heat addition to the air passing through the combustor, (c) the velocity at the nozzle exit. Are Pleurococcus and Chlorella Unicellular or Colonial? Explain pls.... You are the general manager of a full-service FBO. Your company sells a customer a new aircraft, with a bank financing the purchase via a written security agreement on the aircraft, filed with the FAA Aircraft Registry and the International Registry. Later, the customer has your shop install an expensive upgraded avionics suite including the latest "glass cockpit" multifunction displays (MFD) integrating flight, navigation, engine and sensor data. Does your shop have the right to require the aircraft owner to pay the bill for this upgrade in full before you return the aircraft? Explain. If, when your shop has completed the upgrade but before the customer has paid the bill and while the FBO still has possession of the aircraft, the aircraft owner files for bankruptcy, who will be paid first from the proceeds of the bankruptcy sale of the aircraft: the FBO or the bank? Explain. Instead, in initial discussions over the price of the upgrade, the customer indicated that she wanted to buy the avionics package from the FBO and have your shop install it, but she wanted to pay the price of the equipment and installation in three equal monthly payments, instead of one lump sum. She has been a good customer, and the proposal is acceptable to you. How can you release the aircraft to her upon completion of the work while protecting the FBOs security interest in the aircraft to assure payment? After completing the transaction described in 3, above, your shop installs the avionics package and returns the aircraft to its owner. Before paying the bill, she files for bankruptcy. Now who will be paid first from the proceeds of the bankruptcy sale of the aircraft: the FBO or the bank? Explain. find the equation of a line that passes through (-2,4) and (1,-2) Find a linear function that models the data in the table. f(x)= *blank* x + *blank* a card is randomly chosen from a standard deck of cards. Find each probability. why is sodium more reactive than magnesium Question 2. Complete the following conditional statement so that the string 'More please' is assigned to the variable say_please if the number of nachos with cheese in ten_nachos is less than 5. Hint: You should not have to directly reference the variable ten_nachos. Because he was the court painter for Philip IV what can you infer about Diego Velazquezs work It had to please the kingIt had to be only portraits of the royal familyIt only had to please Velazquez himself They could only portray historical or religious scenes What is the diference between a conflict based on a power struggle and a conflict based on a personality difference? Which cell structures are present only in plants, not in animals? Select all that apply. Select all that apply. chloroplasts central vacuole plasma membrane ribosomes cell wall endoplasmic reticulum A partialhubcap is shown. Copy and complete thefigure so that the completed hubcap hasrotational symmetry of 90, 180, and 270. Jeff and Rob have a difficult time getting along at work. Most days, Jeff spends a lot of time cracking jokes and goofing off, while Rob constantly nags him and tells him to act like a grown up. On days when Jeff is more reserved, Rob does not nag him, hoping that this will result in improved behavior down the road. This is an example of which form of behavior modification?A. Empowerment.B. Extinction.C. Punishment.D. Avoidance learning.E. Positive reinforcement. Find the indicated complement. A certain group of women has a 0.55% rate of red/green color blindness. If a woman is randomly selected, what is the probability that she does not have red/green color blindness? What is the probability that the woman selected does not have red/green color blindness? nothing (Type an integer or a decimal. Do not round.) Whistle Works manufacturers safety whistle keychains. They have the following information available to prepare their master budget: Operating Expenses Variable Operating Costs $.75 per unit sold Fixed Operating Costs $475,000 Other Info: Units produced in 2016 42,000 Units sold in 2016 40,500 Whistle Works sells each whistle for $12. It's been determined that each unit costs $7.25 to manufacture. How much is total budgeted operating expenses for the year ended 2016? Access data is _ in a word document Which phase of matter consists of particles that vibrate only? Which examples demonstrate common Network Systems workplaces and employers? Check all that apply.Dee works in private homes of individual people.Phung spends most of her time in a company's server room.Myron works in the office of a large corporationLawrence often performs work while traveling in vehicles.Emilio protects data security for a government agency.Kira spends most of her time in a warehouse where computers are assembled Which number line represents all of the values of x for the equation x2 = 25? What was the most frequent political cause of revolution?