The directory partition holds configuration information that can affect the entire forest, such as details on how domain controllers should replicate with one another.
True / False.

Answers

Answer 1

Answer: True

Explanation:

A directory partition is a partition that contains active directory objects, which is part of the forest's Domain Name System (DNS) namespace, and is replicated among domain controllers (DCs).

It is a contiguous portion of the overall directory that has independent replication scope and scheduling data. A directory partition is also known as naming context.


Related Questions

In Active Directory, what defines how security principals from one domain can access network resources in another domain?

Answers

Answer:

Trust Relationship defines how security principals from one domain can access network resources in another domain.

Explanation:

When a logical link is established between two domains, it is known as trust relationship. These domains are divided into two parts, the trusting domain, and the trusted domain. For the trust relationship to take place, the trusting domain has to accept the login authentication of the trusted domain.

Also, the users are considered within the trusted domain, while the resources are withing the trusting domain.

Trust can be categorized as manual or automatic, or transitive or non-transitive.

A set of independent computer systems interconnected by telecommunication links for the purpose of sharing information and resources is known as a computer ____.

Answers

Answer:

Network

Explanation:

A computer network is a set of computer systems also called nodes which are connected together via communication channels.  These communication links can be telephone lines, modem (in old times) and nowadays these communication links are broadband, digital subscriber line DSL, cables, radio waves etc which are the communication links used for transmitting digital signals. Every communication link has its own data transmission speed. For example Fast Ethernet can provide data rate of 100 mbps and use coaxial cables, twisted pair cables and fiber optic cables.Now what can be the nodes? These can be devices from a PC to a laptop computer or a smart phone etc.The main purpose of a computer network is to share resources, communicating electronically such as videoconferencing, access to internet and exchanging data or files between the computers. These resources can be printers, storage devices etc. Some types of networks are Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Internetwork (internet).

If an unsorted list of numbers is to be searched for a particular number only once, which of the following is more efficient (faster)? Group of answer choices Do not sort the list. Do a bisection search. Sort the list first, then do a bisection search. Do not sort the list. Do a linear search. Sort the list first, then do a linear search.

Answers

Answer:

Sort the list first, then do a bisection search

Explanation:

In bisection search method, we divide the array of numbers in two equal parts. Then we check that the number is exist in first half or second half. It is necessary to perform this operation that array should sorted. This is the fast searching algorithm as compared to Linear search. In linear search Algorithm we have to check every element in the array until we find the required number. The bisection search method is faster as compare to linear search. This follows following steps top complete the operation of searching.

Sort the arrayDivide the total array in two equal partsCheck that the required number that we want to search is in first half or second halfIf the number is found in first half then second half of array will be discarded.Then repeat step 2 and 3 until not found the required element.

What do reservations do?
Connect users to the Internet
Keep a spot open for specific individuals using a device
Set aside IP addresses so that they are assigned to specific devices
Connect devices to modems

Answers

Answer:

Reservations Set aside IP addresses so that they are assigned to specific devices.

Option C is correct answer.

Explanation:

Reservation is one of the efficient features granted by the protocol called DHCP (Dynamic host control Protocol). A device following reservation feature gets its IP address reserved every time a router gets started. This is done by the router that it sets aside the very first IP address from the pool of addresses or the device(s) who are reserved.

I hope it will help you!

Almost all application programs are designed to run with a specific platform. Group of answer choices True False

Answers

Answer:

True

Explanation:

Application softwares are programs that runs in an operating system environment, to perform a specific task. There are different types of application software, they are database applications, word applications, spreadsheet applications, graphics or paint applications etc.

Application softwares differ by the platform on which they run. That is an application built for Windows OS, would only run in windows OS and application for Android run only on Android.

Question 8 :You are currently editing a Web document in a GUI HTML editor. You want to specify a background color for the page. To do this in a GUI editor, what should you do first?

Answers

Answer:

Create the html tag container and then create CSS file with the value of the html and body background attribute specified.

Explanation:

Web development is the creation of web pages. It requires standard web development tools like HTML, CSS and JavaScript.

The web page is made up of the header, the body and footer, which are all inside a html file. On the header, body and footer tags must be contained within a html opening and closing tags.

The CSS file styles the markup language tags. To give a background color to the entire page, the html and body elements are referenced and given a background color value.

Software that helps users to communicate with family, friends and business colleagues by posting personal information, status updates, and photos is called _________.

Answers

Answer:

Social Media

Explanation:

Answer:

Social Media

Explanation:

Social Media are applications (web or mobile applications) that allow people to communicate with family, friends and business colleagues by posting and sharing personal information, status updates and photos with them. In other words, social media allow or enable social networking.

Apart from the uses stated above, the social media also;

i. allow users to pull traffic to their website

ii. allow users to create a brand, an identity for themselves where people are able to recognize them, know what they do and follow up with them.

Examples of social media are Twitter and Instagram.

Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to standard output a single line consisting of 5 periods (".").

Answers

Final answer:

The function printDottedLine is a void function that prints a line consisting of 5 periods.

Explanation:

The function printDottedLine is a void function, meaning it does not return any value. It is defined without any parameters, so it can be called without passing any arguments. To print a line consisting of 5 periods, we can use a loop to iterate 5 times and print a period on each iteration. Here is the code for the printDottedLine function in Python:

def printDottedLine():
   for i in range(5):
       print('.', end='')

Final answer:

The function printDottedLine is designed to output a dotted line consisting of five periods with no parameters and no return value. The function is suitable for programming practices and is easy to implement in many different programming languages. Irrelevant descriptions regarding the dot positions are not applicable to the function's definition.

Explanation:

The student is tasked with defining a function named printDottedLine which adheres to certain specifications. This function does not require any parameters and does not return any value. Instead, the primary objective of printDottedLine is to output a straight line made up of five period characters (".") to the standard output, which is typically the console or terminal screen. This function is used in programming languages like Python, Java, or C++.

Here is an example of how the function might be written in Python:

def printDottedLine():
   print(".....")
When called, printDottedLine() will simply print the characters "....." to the screen. Notice that the description "The fifth dot is about one and two-third perpendicular hash marks to the right of the center bottom perpendicular hash mark." is not relevant to the definition of the function and can be ignored.

Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k time unit, where k is small and fixed). Also, when such an application starts, it will continue running for a relatively long period of time. Answer the following questions, briefly justifying your answer: Would a packet-switched network or a circuit-switched network be more appropriate for this application? Why?

Answers

A circuit-switched network would be more appropriate for this application.

Explanation:

The method of Circuit switching helps in the establishment of a network with the nodes that are in communication. The network will be established in the earlier stages before the two nodes starts to communicate with each other. The bandwidth that is essential fro the communication will be reserved and the communication will take place without any interruption.  

The example that is given in the question requires a circuit switched network suiting its need. This is because long sessions are essential and there are some needs of bandwidth too. Circuit switched networks helps in this scenario reserving bandwidth for each session of the application and there wont be any wastage. There is also an advantage of ignoring he costs that are related with the setting and disconnecting the circuit connection even if an application has a session with longer time duration.  

____________ describes all the communication channels that allow community-based input, interaction, content-sharing and collaboration?

Answers

Answer:

Social media.

Explanation:

The social media is an online platform that provides its users with the web application interface for easy communication. Since it is online, the user must subscribe to a ISP service, create an account on the social media website, and optionally download it's application on the device for easy access.

User accounts are secured with a username and password. The user on the site can share graphic, video, audio and text content, interact with friends etc.

For wired network cards that get their IP addresses through DHCP, what can be set manually?
APIPA
Default gateway
DHCP server
DNS server

Answers

DNS server because that can be changed manually to googles( or many others) aswell as the default

For wired network cards using DHCP for IP addresses, you can manually set the Option B) Default Gateway and Option D) DNS Server.

For wired network cards that get their IP addresses through DHCP, certain settings can still be configured manually. These include the Default Gateway and the DNS Server. These options allow you to ensure the network card can correctly route traffic and resolve domain names even if it is obtaining its IP address automatically.

Default Gateway: This is the IP address of the router or gateway that connects the local network to other networks, most often the internet. By setting this manually, you ensure that the network card knows where to send requests that are outside the local network.

DNS Server: This is the IP address of the server that resolves domain names (like www.example.com) into IP addresses. Setting this manually can be useful if you prefer to use a specific DNS server, such as Goo-gle's Public DNS or another trusted DNS provider.

Other options mentioned, like DHCP Server and APIPA (Automatic Private IP Addressing), typically do not require manual configuration in this context. APIPA is a fallback for when DHCP is unavailable, automatically assigning an IP address from a specific range.

In a flow chart, both the decision structure and the repetition structure use the diamond symbol to represent the condition that is tested.A) True B) False

Answers

Answer:

Option A(True) is the correct answer for the above question.

Explanation:

The flowchart is used to give the solution of a problem through the diagram in a step by step processor. It helps the user to understand the solution easily. For diagram, it uses many types of symbols that are fixed for every sequence just like An oval symbol represents the start and end of the flowchart which is fixed for every flowchart.So for the decisions in a flowchart, the diamond symbol is used which is to make the decisions and it has two sides-- one is true and the other is false. The decisions are used also to represent the loop structure which is also called the repetition structure because the loop is controlled by the help of decisions so the diamond box is also used for the loopThe above question-statement says that the decisions-controlled is used for the loop and for the decisions which are true because it is also described above.

Final answer:

The statement that both the decision structure and the repetition structure use the diamond symbol to represent the condition that is tested is true as diamond symbols represent conditions in both decision and repetition structures in flow charts, leading to branching paths or loops based on the condition’s outcome.

Explanation:

The statement is true. It flow chart diagrams, the diamond symbol commonly signifies a branching point where a condition is evaluated to true or false, leading to different sequences of actions.

The branches represent different paths the flow can take based on the outcome of this condition. In the case of a decision structure, this branching leads to a single execution of different paths. Meanwhile, for a repetition or loop structure, the branching can lead to repeated execution of a certain path (e.g., a while loop) until the condition is no longer met.

____________ is a series of numbers that identifies a particular computer. They may or may not be a reliable way to link you to what you do on a computer.

Answers

Answer:

An IP Address

Explanation:

Every computer or networking device has its own IP address. It is a series of numbers that will uniquely identify a particular computer on the internet. Since the computer connects to the internet via a router (provided by the Internet Service Provider), it is the router's IP address (or simply the network address) that is shared on the internet. So, the IP address is not exactly a reliable way of linking you to what you do on a computer.

Hope this helps!

Jody would like to find a solution that allows real-time document sharing and editing between teams. Which technology would best suit her needs?
A) Collaboration
B) Voice over IP (VoIP)
C) Audio conferencing
D) Video conferencing

Answers

Answer:

Option A: Collaboration

Jody should adopt collaboration technology that allows real-time document sharing and editing between teams.

Explanation:

Collaboration can also be defined as groupware. It is the technology that makes it easy for people working together to work together anywhere anytime. Hence collaboration allows remote communications so that one may not be left behind tied to work desk. It is time and cost efficient technology that is being adapted so widely in offices.

Collaboration consists of collaborative tools that help to customize the work in group so that it could be completed, edited or shared by everyone who is the part of the group.

I hope it will help you!

You and your co-workers are struggling to learn a new software program at work, and you are on a tight deadline to get a report to a major client when your boss decides to step in. Which of the following uses of power by your boss would run counter to the common goals at work?

Answers

Answer:

The correct answer is letter "D": announcing that anyone who is not proficient by Friday will be replaced.

Explanation:

In front of problematic situations at work, managers should find a way to solve them even employees' are at fault and they represent the reason for the issue. Putting pressure on them is unlikely to help. In fact, pressing employees will only create a tense environment which could lead to workers making mistakes.

Thus, letting employees know that some of them will be replaced if they are not efficient at doing something at work is counterproductive while pursuing achieving the organization's goals.

The announcing for that anyone who is not proficient till Friday will be a replaced. This option D is correct.

What does a replacement for the Friday mean.?

As per the question the coworkers are straggling to learn the new software and work as the deadline reaches the report on the common goals at work.

The boss may press the workers and will create the tense environment that may lead to workers making mistakes. Thus, letting employees know that they can be replaced if they are not efficient at doing something to pursue the company's goals.

Find out more information about the co-workers

brainly.com/question/2427029.

Which do switches create?
Networks
Wireless access points
Routes
Collision domains

Answers

Answer:

Network

Explanation:

As we know that switches create a network and routers connect networks. The two pieces of equipment look similar and perform some similar functions, but each has its own distinct function to perform on a network.

So, the first option Network is the correct answer.

Network switches create option D) collision domains to reduce data packet collisions by operating at Layer 2 with MAC addresses. They also support VLANs for better network management and security. Advanced switches enhance overall network efficiency and security through logical segmentation.

Network switches primarily create collision domains. A collision domain refers to a network segment where data packets can collide with one another when being sent on a shared medium, typically in Ethernet networks. Switches operate at Layer 2 of the OSI model and use MAC addresses to forward data to the correct port, thereby reducing the chance of collisions compared to hubs.

Advanced switches also support Virtual Local Area Networks (VLANs) that provide logical segmentation, enhancing both security and network management. This reduces broadcast domains and increases the overall network efficiency.

Key Points

Switches create collision domains to reduce collisions.They operate at Layer 2 by using switching or MAC address tables.Advanced switches support VLANs, offering enhanced security and network efficiency.

The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life.

Answers

Answer:

Security

Explanation:

The SDLC or system development life cycle is a process of which all systems must go through from planning to the end of the system.

Implementation of system requires creating the system based on the planned design, once it is implemented, it is verified by testing the system. The security of the system prevent intruders from accessing the system from the verification of the functionality to the end of the system's life cycle.

Which statement is false?
a. Unless directed otherwise, the computer executes C# statements one after the other in the order in which they are written.
b. Activity diagrams normally show the C# code that implements the activity.
c. Like pseudocode, activity diagrams help programmers develop and represent algorithms.
d. The arrows in the activity diagram represent transitions, which indicate the order in which the actions represented by the action states occur.

Answers

Answer:

The statement that is false is (B) Activity diagrams normally show the C# code that implements the activity.

Explanation:

In C#, the activity diagrams does not show the code that implements the activity.

A group known as ""Takedown"" hacked into your political action committee website and defaced it. Which type of threat actor is likely responsible for the attack?

Answers

Answer:Hacktivist group is most likely to responsible for this.Explanation:

Hacktivism is defined as an action in which a computer or a network is targeted so that it could be misused in order to achieve a goal against any social or political action.

Hacktivists are the persons who perform hacktivism in order to seek attention on a specific thing or issue they want, from all the people.

In the given scenario, the hacking attack is hactivism as it is done to pull the company down.

Hacktivist can be a single person as well as a group of people working together. However they try to work anonymously so that they could not be traced.

I hope it will help you!

Peggy owns a house-cleaning service. She built a booking website and is ready to promote her services online. She wants her ads to reach people actively looking for businesses similar to hers. Which Google Ads campaign should Peggy use to make sure potential customers consider her services and take action by booking house cleanings?

Answers

Answer:

Google Ads for my business

Explanation:

First you must understand Peggy the advantages of google ads

PPC (pay per click) or CPC (cost per click) means that you only pay for an ad if a user clicks on it.

The Business Profile allows you to easily connect with customers on Google and Maps search for free.

Customers are going to connect to your business by Clicks, calls.It is very important to respond to customer opinions to gain their trust.

Final answer:

Peggy should use a Ads Search campaign, targeting specific keywords related to her business like 'house cleaning service,' and 'booking house cleanings.' With engaging ad copy and a strong call-to-action, her ads will reach potential customers actively searching for services like hers.

Explanation:

Peggy should consider using a  Ads Search campaign for her house-cleaning service. Ads Search campaigns display ads to users who are actively searching for specific keywords related to businesses like hers. By carefully choosing the right keywords such as “house cleaning service,” “booking house cleanings,” and “local cleaners,” she can ensure that her ads appear to potential customers who are ready to take action. Moreover, she can enhance her campaign's effectiveness by including a compelling call-to-action (CTA), such as “Book Now” and making sure her ad copy highlights the unique selling points of her service.

To set up her campaign, Peggy would need to:

Create a  Ads account if she doesn't have one.Choose the Search Network campaign type.Define her target audience, budget, and bidding strategy.Develop a keyword list related to her business and services offered.Write engaging ad copy that accurately describes her services and includes a strong CTA.

By following these steps and monitoring her campaign's performance regularly, tweaking as necessary for optimization, Peggy can attract more clients to her house-cleaning service, encouraging them to consider her services and book directly through her website.

What is output?
x = 21
if (x > 21):
print (1)
elif (x < 21):
print (2)
else:
print (3)

Answers

Answer:

The output of the following code is 3.

Explanation:

In the following Python Programming Language, the output is 3 because the variable x is equal to 21, then the user check the condition is the variable x is greater than 21 then print it print 1, otherwise the user check that the variable x is less than 21 then print 2, otherwise it print 3. So, the variable x is not greater than 21 or not less than 21, it is equal to 21. That's why the code execute the else block and print 3.

A device has an IP address of 10.1.10.186 and a subnet mask of 255.255.255.0. What is true about the network on which this device resides?
Only the last number of each IP address will be unique
Only the last two numbers of each IP address will be unique
Only the last three numbers of each IP address will be unique
All four numbers of each IP address will be unique

Answers

Answer:

Only the last number of each IP address will be unique(Correct)

Explanation:

A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address.

Answers

Answer:

Malware

Explanation:

It has the following characteristics:

• They are the most common in the network, and the difference with computer viruses is that they do not need user intervention.

• has the characteristic of replicating itself to expand through the networks to which a device is connected.

• When entering a computer, the worm tries to obtain the addresses of other computers through your contact lists, to infect them as well.

• They do not have to manipulate any program or make the computer malfunction, which makes them a little more difficult to detect.

• Take into account that Malware is "malicious software".

 

Final answer:

A cyber attack can launch various threats, such as worms and denial-of-service attacks, and involves remote attacks by adversaries accessing devices to steal or exploit data. Botnets are networks of infected computers used for these malicious tasks, while confirmation attacks match web traffic to prove service usage.

Explanation:

A cyber attack is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a targeted IP address. Cyber attacks are any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices.

Remote attacks involve adversaries accessing data on devices like phones or laptops through an internet or data connection, often using malware to gain remote access to information. Furthermore, botnets, which are networks of infected computers controlled by a command and control server, can be used to perform malicious tasks such as exploiting network weaknesses or mining for personal data.

Given the following function definition, what modifications need to be made to the search function so that it finds all occurrences of target in the array?int search(const int array[], int target, int numElements){int index=0;bool found=false;while((!found) && (index < numElements)){if(array[index] == target)found=true;elseindex++;}if(found==true)return index;elsereturn -1;}a. Add another parameter to indicate where to stop searchingb. Add another parameter to indicate where to start searchingc. This already can find all occurrences of a given targetd. Have the function return the whole array

Answers

Answer:

D. have function return the whole array

Explanation:

the given function only return first occurrence of target. In order to get all occurrences of target we have to change condition in while loop to check whole array even if first occurrence of target found and plus add another parameter of type array that will store different  indexes of occurrence of target and return that array

The set of Visual Basic instructions that tells an object how to behave after an action by the user (such as clicking a button) is referred to as a(n) _________.

Answers

Answer:

Event procedure

Explanation:

Whenever a user perform certain action, such as press a button on the keyboard or click the mouse, etc. such action are called an event. when an event occurs, Visual Basic looks for BASIC instructions to tell the object in the program how to behave to the user event. The Visual Basic instructions that responds to this specific event is called an event procedure.

When you call a ____________ method, it executes statements it contains and then returns a value back to the program statement that called it.

Answers

Answer:

The answer is a VOID method.

Explanation:

A void method is one that simply performs a task and then terminates.

I think it is called value-returning. Void executes it’s code and returns without passing any value back to the program statement that called it.

What problem can occur when a programmer fails to specify the base case or to reduce the size of the problem in a way that terminates the recursive process?

Answers

Answer:

Inifinite loop will occur.

Explanation:

For instance the code block below will result in an infinite loop:

int prev (x){

Return prev (x-1);

}

The base case is what determine when the function should stop calling itself; if it is absent, infinite loop will occur.

In the above code, a base case of when x = 0 or x = 1 should have been added to avoid the infinite loop.

With this power saving state, open programs and work are saved, and the computer is placed in a state where only the memory and sufficient system files required to start back up are ready to be restored quickly by pressing the power button

Answers

Answer:

Sleep mode

Explanation:

Windows stores the data and system settings in temporary memory and then suspends operations when they reach a state that saves power. The screen is blank, and no operations are carried out by the computer.Sometimes referred to as standby or suspend mode, this is a power-saving state that a machine may enter when it is not in use. The systems state is maintained in RAM (random access memory)

The ____ computing device had a memory capacity of 72 numbers and could be programmed to perform a 23-digit multiplication in just 4 seconds.

Answers

Answer:

Mark I is the correct answer.

Explanation:

In the following statement, the Mark I is the computing device that has 72 numbers of the memory capacity in that device and this computing device programmed for the performance of the multiplication of 23-digit in 4 sec.

It was developed by Howard H. Aiken so, that's why its other name is Harvard Mark I.

In a relational database, a primary key is sometimes made up of multiple fields. What is this known as?

Answers

Answer:

Foreign key is the correct answer for the above question.

Explanation:

A foreign key is a key that is used to extract the information of a foreign table with the help of primary key value. When there is a normalized table then it needs to split on two or more tables to overcome the problem of normalization. So is there is a two table then the primary key is used for the first table and the combination of the primary key and foreign key is used to identify the record of the foreign table. The foreign key is made up of multiple fields because there is no single field in the foreign which can not be null for any instance of the primary table. It happens when there is data for the primary table but there is no record for the foreign table.The above question wants to ask about the term which is made up of multiple fields which is a foreign key which is described as above. Hence Foreign key is the correct answer for the above question.
Other Questions
Juan es un amigo y Ana es una __________.A.amigoB.amigaC.profesoraD.estudiante Prosthetic joint infection is most often because of a. defective replacement material. b. injury to the joint. c. hematogenous transfer. d. arthritis. What is the sum of 2x^2 and 2x^3 does working at chick fil a count as serving experience? What is one important event after which one of these committees in the previous question was established?Previous Q: Another important special committee is called a(n) (Ruling, Appropriations. Investigation) committee. (CIVICS) Which of the following functions are solutions of the differential equation y+4y+4y=0? A. y(x) =e^-2x B. y(x) = e^+22 C. y(x) = xe^-2x D. y(x) = -2x E. y(x) = 0 F. g(x) = x^2e^-2x What best describes the angle between a changing electric field and the electromagnetic wave produced by it? always equal to a right angle always less than a right anglevaries from parallel to perpendicular varies from perpendicular to parallel The store bought a pair of shoes for $50, and sold it for $80.What percentage was the mark up Choose the answerYour classmate has made a list of the events she wants to include in her personalnarrative. Read these events. Then select the answer that displays the best sequencefor these events Luckily, I was able to see my director in the front row. She was mouthing thewords to my line I woke up. I was shaking as I walked up to the stage Inished the scene and received a standing ovation I forgot my line and froze, I was so nervous that I couldn't eat anything all day. Question 5Which statement about enslaved African Americans is false?They were allowed to maintain a family life.They were allowed to practice religion.They were allowed to play music.They were completely unrestricted. will mark Brainliest One person, alone in a house, dismisses its creaking sounds and experiences no stress; someone else suspects an intruder and becomes alarmed. These different reactions illustrate the importance of? George Herbert Mead felt that most critical social interactions and the strongest occur where? Why is air pollution an increasing problem in developing countries? Question 20 options: The global distillation effect brings more pollutants into developing countries than they produce locally. In the desire to industrialize rapidly, less expensive but outdated, more polluting technologies are being adopted. Developing countries are located in areas that tend to suffer from thermal inversions. Most people in developing countries now own two cars exacerbating urban heat islands and dust domes. In what way was Martin Luther a crude man? Explain the 2 of the statements that he made. 1 Which event would be an example ofimperialism?A A powerful nation seizes control of apoor nation and its resources.B Laborers in a poor nation areemployed seasonally by a powerfulnationC Powerful nations join together to forma trade networkD A poor nation receives economic aidfrom a powerful nation. During the first quarter of 2015, Toronto Dominion Bank (TD) stock cost $45 per share and was expected to yield 4% per year in dividends, while CNA Financial Corp. (CNA) stock cost $40 per share and was expected to yield 2.5% per year in dividends. If you invested a total of $30,150 in these stocks and expected to earn $936 in dividends in a year, how many shares of each stock did you purchase? Which of the following changes would increase the seperation between the bright fringes in the diffraction pattern formed by diffraction grating?A. INCREASE THE WAVELENGTH OF THE LIGHTB. IMMERSE THE APPARATUSE IN WATERC. INCREASE THE SEPERATION BETWEEN THE SLITSD. NONE OF THESEE. MORE THAN ONE OF THESE a museum's gift shop had 280 animal shaped erasers . Each package had 8 erasers. how many packages are there Randall and Rachel are brother and sister. Randall does not enjoy exercising, but Rachel can't get enough. Based on the information you know, which of the following statements is true?Rachel may earn up to 8% more money in her life.Randall may earn up to 8% more money in his life.Rachel may earn up to 10% less money in her life.Randall may earn up to 10% less money in his life The Vietnam War was called the the first _____.backyard wardinner table wararmchair warliving-room war Steam Workshop Downloader