The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authentication and __________ process.

Answers

Answer 1

Answer: Authorization process

Explanation

Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.

Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.

Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".


Related Questions

A ________ firewall handles all traditional firewall functions (SPI, ACLs, etc.) as well as additional security functions such as antivirus filtering, spam filtering, application proxy filtering, and so forth.

Answers

UTM consists of a firewall handling all traditional firewall functions (SPI, ACLs, etc.) as well as additional security functions such as antivirus filtering, spam filtering, application proxy filtering.

Explanation:

The term UTM stands for Unified Threat Management

A traditional firewall is defined as a device that can control the flow of traffic that is allowed to enter or exit a point within the network.

The  technique  of traffic monitoring means that the firewall just keep a check over each  data packet  individually without disturbing  the “flow” of traffic

Few Example of the fire wall used by  small business houses are  -Fortinet, Ubiquiti EdgeRouter, Cisco NGFW, OPNSense.

structure for forloop?

Answers

Answer:

for ( initialization; condition;increment)

{

code goes here;

}

in python:

for i in list/range:

code with proper indentation

By initialization above we mean, like int i=0; etc.

By condition like i<10;

and by increment it means like i++, ++i or i+=1; etc

And in python, i can be an integer value if the range is mentioned, and it can be an item of a list if the list is used. We can also use an array, string and various other data structures in python. like we can have characters in a string and so on.

Explanation:

Please check the answer section.

You want to allow members of the users group to use fdisk on the /dev/sda drive (and only that drive) and to use the yum command to update and install packages. Which command do you run?

Answers

Answer:

su ,sg and sudo command.

Explanation:

Whenever the user needs to enable workgroup mates should use fdisk including just that disk on both the /dev / sda disk, using the following command to update and configure the following packages. Thus he uses the command su, sg, and sudo.

So, the following commands are required according to the following statement.

Assuming that a user enters 5 as the age, what is the output of the following code snippet? int age = 0; Scanner in = new Scanner(System.in); System.out.print("Please enter your age: "); age = in.nextInt(); if (age < 10) { System.out.println("Kid"); } if (age < 30) { System.out.print("Young"); } if (age < 70) { System.out.print("Aged"); } if (age < 100) { System.out.print("Old"); }

Answers

Kid
YoungAgedOld

It will print out this way because the code uses if statements, rather than else if statements. As written, every single if statement will be triggered because each expression will evaluate to true. If there were else statements involved, then only the first one that is triggered will print out, and the rest will be ignored.

The reason for the weird formatting/spacing is because only the first print statement is println which adds a new line after printing. The other statements are just print, which does not add a new line or a space.

You are flying on an ifr flight plan at 5500 feet with a vfr on top clearance when you encounter icing. you know there is clear air above and you request 9500 feet from atc they deny the request. A. Yes, you are still IFR with a VFR-on-top clearance.
B. No, you are now VFR.
C. No, your VFR-on-top clearance has been canceled.

Answers

Answer:

A. Yes, you are still IFR with VFR-on-top clearance

Explanation:

Instrument Flight Rules (IFR) and Visual Flight Rules (VFR) are regulations controlling the operations of civil aviation. Pilots use these terms as well to describe their flight plan.

When your request is rejected to fly 9500 feet from atc, your VFR-on-top clearance is still active and you are still IFR.

covers a wide variety of applications such as web and computer-based training (CBT), and social networks. a. E-learning b. Modeling c. Videodisc instruction d. Vestibule instruction

Answers

Answer:

Option (a) is the correct answer of this question.

Explanation:

E-Learning means that Electronic Learning. It covers a broad spectrum of applications, including online and computer-based training (CBT) and public networks.E-Learning is learning to use new technology to navigate curricula beyond a conventional classroom is known as Electronic learning.

E-learning is a nurturing environment that allows use of information and communication technologies (ICTs) as a pedagogical tool.E-learning not a program distributed over a Disc or CD-ROM, a video tape or a TV channel.

There are two types of E-learning are known as:-

Synchronous E-learning. Asynchronous E-learning

Final answer:

E-learning is the correct answer, which includes web and CBT applications, and utilizes social networks for educational content delivery, interactive student engagement, and blending learning approaches.

Explanation:

The answer to the student's question which covers a wide variety of applications such as web and computer-based training (CBT), and social networks is e-learning. E-learning utilizes digital platforms to deliver educational content and can encompass various methods such as direct instruction, discussion activities, distance education, and the use of digital textbooks. The instructional processes in e-learning have evolved to include more open practices like blended learning approaches and two-way communication tools, encouraging active student engagement and interactive learning experiences.

Furthermore, e-learning methods have been used to adapt evidence-based programs for electronic delivery, making these programs more accessible and time-efficient. These advances align with the continual shift toward formal education and informal education that leverages modern technology for varied and flexible learning experiences.

For the client-server application over TCP, why must the server program be executed before the client program? For the client server application over UDP, why may the client program be executed before the server program?

Answers

Answer:

In a TCP connection the server program must be executed before the client program because if the server is not listening, the client fails to establish connection with the server.

UDP does not require a connection from the server.

The server software must be run before the client program in a TCP connection because the client cannot connect to the server if the server is not listening. The server does not need to establish a connection for UDP.

What is client server application?

In theory, a client/server application consists of client software that makes use of server software's services. The client contacts the server application's operations to request services from it.

A client frequently requests a server for goods or services rather than sharing any of its resources. Clients thereby establish channels of communication with servers, which subsequently keep an eye out for incoming requests. The client-server architecture is used by a number of computer programs, including email, network printing, and the World Wide Web.

A client application uses the framework provided by an underlying client to access the resources provided by WebSphere® Application Server.

Thus, The server software must be run before the client program in a TCP connection.

For more information about client server application, click here:

https://brainly.com/question/15012449

#SPJ2

The __________ stage of the data science process helps in converting raw data to a machine-readable format.

Answers

Answer:

The answer is "Data Cleaning".

Explanation:

In the given question some information is missing, that is the option of the question, which can be described as follows:

A) Data Gathering

B)  Data Description

C)  Data Cleaning

D) Exploratory Data  Analysis

Information cleaning is the method of processing information, that may not be accurate, complete, obsolete, replicated. It is used in to review the deleted and changing information, and certain options choice is incorrect, that can be explained as follows:

In option A, It is used in collecting data. In option B, It provides the details about the data. In option D, It is used in the statistical model for analyzing the data.

The __________ cipher is a method of encrypting alphabetic text by using a series of different monoalphabetic ciphers selected based on the letters of a keyword.

Answers

Answer:

Vigenère

Explanation:

It is a method of encrypting alphabetic text by using a form of polyalphabetic substitution. A polyalphabetic cipher is any cipher based on substitution, ie using multiple substitution of alphabets. The encryption is done using a Vigenère table.

To encrypt a message using the Vigenère Cipher you choose a keyphrase. Then repeat this keyword over and over until it is the same length as the original text; this is referred to as a keystream.

The __________ cipher is a single-alphabet substitution cipher that is a permutation of the Caesar cipher. All characters are rotated 13 characters through the alphabet.

Answers

Answer:

ROT13  is the correct answer of this question.

Explanation:

The ROT13 cipher is a single-alphabet substitution cipher, which is a Caesar cipher permutation. All letters are rotated through the alphabet to 13 characters. ROT13 is a particular case of the Caesar cypher that was created in ancient Rome.

ROT13 is a direct letter cryptographic hash function, combining a letter in the alphabet with the 13th letter after it. ROT13 is used from a casual viewpoint in online forums to cover surprises, punchlines, puzzle solutions and offensive content.

Final answer:

The ROT13 cipher is a permutation of the Caesar cipher where each character in the plaintext is rotated 13 places through the alphabet; it's different from the transposition cipher used in the Zimmerman Telegram.

Explanation:

The cipher described in the student's question is the ROT13 cipher. This cipher is a specific type of substitution cipher where each letter in the plaintext is rotated 13 positions down the alphabet. For example, 'A' becomes 'N' and 'N' becomes 'A'. It is called a permutation of the Caesar cipher because, like the Caesar cipher, it involves shifting the alphabet. However, the shift is always 13, making it a fixed variation. Unlike a transposition cipher, such as the one used in the Zimmerman Telegram, a substitution cipher replaces one character with another rather than rearranging them.

The __________ stage of the crisp-dm process focuses on understanding the objectives and requirements of a project.

Answers

Answer:

Data Understanding.

Explanation:

CRISP-DM (Cross Industry Standard Process for Data Mining). The stage Data Understanding characteristics:

This initial phase focuses on the understanding of the project objectives. This knowledge of the data is then converted into the definition of a data mining problem and a preliminary plan designed to achieve the objectives.The objective is to discover from the beginning important factors that can influence the outcome of the project.A comparative analysis of the project costs and the potential benefits for the business is carried out if the project is successful.

Under the ________ model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used. distributed computing grid computing cluster computing utility computing parallel computing

Answers

Answer:

utility computing

Explanation:

Fill in the blanks

under the utility computing model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used.

Recall that TCP can be enhanced with SSL to provide process-to-process security services, including encryption. Does SSL operate at the transport layer or the application layer? If the application developer wants TCP to be enhanced with SSL, what does the developer have to do?

Answers

Answer:

SSL has operate in Application Layer to encrypt the information from user and  pass it to the TCP. To enhance TCP security developer can integrate the code of SSL with application layer.

Explanation:

SSL certificate is used to enhance the security of user data and encrypt the information of passwords, data transfer and other information to make it secure. This certificate is  installed at application layer to make all the information secure and send it to the Transmission Control Protocol (TCP) to send it further. The TCP can be enhanced more by adding SSL code to the application Layer of the Network.

Assume that two int constants,FIRST_YEAR and LAST_YEAR have already been declared and initialized with year values (like 2009, 2014), along with a double variable oil that has been initialized with the number of barrels of oil consumed in Canada in the year given by FIRST_YEAR.

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

int count;

double oil=10.88;

int FIRST_YEAR=2009,LAST_YEAR=2014;

count = FIRST_YEAR;

do

{

cout << count << ": " << oil << endl;

oil *= 1.20;

count++;

} while ( count <= LAST_YEAR );

return 0;

}

Explanation:

Declare the required variables.Use a do-while loop that runs from first year to last year .Display count of oil .Increment oil by 20%  and count by 1.

You are tasked with accumulating survey data on a web page and are responsible for it being free from dirty data once you close the survey and get the data to the researching team. Which is the best way to handle the possibility of dirty data?

Answers

Answer:

Build a website that validates data as the survey participant takes the survey.

Explanation:

Whenever a user is charged towards gathering survey information on such a webpage and seems to be liable for freeing this against bad data when the survey is closed as well as the data will be sent to the testing group.

Creating a platform that validates information is just the easiest approach to tackle the risk of bad results as when the research user completes the test.

Show the printout of the following code.

public class Test {
public static void main(String[] args) {
double[][] m = {{1, 2, 3}, {1.5, 2.5, 3.5}, {0.1, 0.1, 0.1}};
System.out.println(sum(m));
}

public static double sum(double[][] m) {
double sum = 0;

for (int i = 0; i < m.length; i++)
sum += m[i][i];

return sum;
}
}

A). 3
B). 4
C). 4.0
D). 3.6
E). 3.0

Answers

Answer:

E. 7.0

Explanation:

the 7 of the out of the older and make a shame of waves and force of trying

The analysts at Techno Info Systems are considering the four-model approach to system development for a new client. If they make use of the four-model approach, which of the following is a likely outcome?
A. It will not be possible to get ac clear picture of the current system functions before modifications are made.
B. Time taken to develop the model increases.
C. The requirements of a new information system will always be different from the current information system.
D. Costs need to develop a logical and physical model of the current system will be less.

Answers

Answer:

Option B is correct.

Explanation:

Within Techno Info Systems the user has been analyst contemplating that four-model concept towards computer development for such its new customer. When they adopt that four-model method, thus the result seems to be the time taken to implement the rises in the method.

So, therefore the other options are incorrect according to the following scenario.

Final answer:

Using the four-model approach to system design likely leads to an increase in the time taken to develop the model, as it entails creating complex and detailed models to replace the real system for analysis.

Explanation:

If the analysts at Techno Info Systems employ the four-model approach to system development for a new client, a likely outcome is that time taken to develop the model increases. This approach involves creating different models, each with its purpose and complexity. For instance, understanding ecosystem dynamics necessitates analytical and simulation models that can predict the consequences of changes within an ecosystem. Similarly, a four-model approach in system development requires meticulous detail, and this extensive modeling aims to replace the real system with an easier-to-examine version, ultimately providing more reliable predictions and a detailed design.



However, as the complexity of models increases with the aim of better accuracy and understanding, it also often leads to longer development times. While the models serve to understand the system before making modifications, a more detailed four-model approach means investing more time to build and analyze each model. One must balance the drive for comprehensive understanding against the requirement to deliver results in a timely manner.

An optimal solution to a linear programming problem MUST lie A. somewere on the line between two corner points. B. somewhere outside of the feasible region. C. somewhere in the interior of the feasible region. D. at the intersection of at least two constraints.

Answers

Answer:

D. at the intersection of at least two constraints.

Explanation:

Linear programming is an optimization technique which is fine for the purpose of getting the best solution such as maximizing profit or certain o 4th era quantities. It is fine by modelling real life problems into mathematical models that have linear relationships or constraints such as in the form of objective functions. In linear programming, an objective function defines the formula for quantity optimization and the goal from this is to determine variable values that maximize or minimize the objective function depending on the problem robbery solved.

Use of the Internet for recruiting is: a. popular with job seekers, but not recruiters. b. the most commonly used search tactic by job seekers and recruiters. c. cheaper and easier, but less effective than other methods. d. popular with recruiters, but not job seekers.

Answers

Answer:

the most commonly used search tactic by job seekers and recruiters.

Explanation:

Internet is used in various ways and both job seekers and recruiters can take advantage of this to look for jobs and hire respectively.  Most business use this platform to help open doors to very many candidates. Almost everything nowadays in most situations is conducted online, from posting job ads, to emailing successful candidates to setting up interviews through video calls. Posting a job ad online widens the radius for interested candidates and most businesses are not constrained while trying to look for the perfect applicant. In America alone, almost 80% of Americans take leverage of the online resources to look for open job positions.

A stack is initially empty, then the following commands are performed: push 5, push 7, pop, push 10, push 5, pop, which of the following is the correct stack after those commands (assume the top of the stack is on the left)? A. 5, 10, 7, 5.
B. 5, 10.
C. 7, 5.
D. 10, 5.

Answers

Answer:

D. 10, 5.

Explanation:

Windows 10 features a storage solution called Storage Spaces. What is the name of the Storage Spaces feature that allows allocating space for redundant information using options that include two-way mirroring, three-way mirroring, and parity

Answers

Answer:

Data resiliency.

Explanation:

Spaces for storage may involve resilience to the information. Selecting a resiliency solution implies whether they assign capacity towards redundant details. The information resiliency choice regarding storage facilities.

Two-way mirror needs two capacity units or more. The information is engraved on both computers. Two-way mirror enables twice the volume of storage assigned to that of the storage capacity as such system capacity. This choice will prevent you against loss of a specific storage unit.

In older existing installations, where an equipment ground does not exist in a metal switch box that is located within reach of a conductive floor such as tile or cement, NEC 404.9(B) requires the use of what kind of faceplate

Answers

Answer:

A metal faceplate with grounding means

Explanation:

metal faceplate with grounding means is required in older existing installations, where an equipment ground does not exist in a metal switch box that is located within reach of a conductive floor such as tile or cement.

Answer:

The NEC requires the use of a metallic faceplate for this situation.

Explanation:

NEC 404.9(B) requires a metal faceplate having a means for grounding to be used in older installations where there is no ground for an equipment in a metal box switch located within a conductive floor. There is however an exception which states that as long as the wiring method does not have anything to do with an equipment-grounding conductor, it is required that a snap switch that is wired and located within reach of conductive floors must have a nonmetal faceplate or protected by an interrupter.

What happened if the offshore team members are not able to participate in the iterations demo due to timezone/infrastructure issues?



a) No issues. Onsite members can have the iteration demo with the product owner; it a single team anyway.



b) Offshore members will miss the opportunity to interact with product owner and get the direct feedback about the increment they created.



c) No Major issue. Since offshore lead and onsite members participate in the demo with the product owner, they can cascade the feedback back to the offshore members.



d) It is a loss as the offshore members will not be able to contribute to the ideas releated way of working

Answers

What happened if the offshore team members are not able to participate in the iterations demo due to timezone/infrastructure issues-(c) No Major issue. Since offshore lead and onsite members participate in the demo with the product owner, they can cascade the feedback back to the offshore members.

Explanation:

No Major issue. Since offshore lead and onsite members participate in the demo with the product owner, they can cascade the feedback back to the offshore members.

From the above statement it is clear that in case the offshore team members are not able to participate in the demo with the product owner due to timezone/infrastructure issues it want be a big issue since the onsite members of the team will participate in the demo and they can give all the valuable knowledge and feedback to the offshore members.As they all are part of the very same team

Hence the option(3) is the correct option

A Color class has a constructor that accepts three integer parameters: red, green and blue components in the range of 0 ... 255 with 0 representing no contribution of the component and 255 being the most intense value for that component. The effect of full or semi-transparency can be achieved by adding another component to the color called an alpha channel. This value can also be defined to be in the range of 0...255 with 0 representing opaque or totally non-transparent, and 255 representing full transparency. Define a class AlphaChannelColor to be a subclass of the Color class. AlphaChannelColor should have the following: - an integer instance variable alpha - a constructor that accepts four parameters: red, green, blue and alpha values in that order. The first three should be passed up to the Color class' constructor, and the alpha value should be used to initialize the alpha instance variable. - a getter (accessor) method for the alpha instance variable

Answers

Answer:

The following are the code in the Java Programming Language.

//define a class and inherit the other class

public class AlphaChannelColor extends Color {

//define constructor and pass arguments

public AlphaChannelColor(int red, int green, int blue, int alpha) {

super(red, green, blue);

this.alpha = alpha;

}

//define function

public int getAlpha()

{

return alpha;

}

//declare a private type variable

private int alpha;

}

Explanation:

The following are description of the program.

Firstly, define a class 'AlphaChannelColor' that inherits the other class that is 'Color' through the extend keyword. Define the constructor (in Java, the class name and the name of the constructor remain same) and pass four integer data type arguments 'red', 'green', 'blue' and 'alpha' in its parameter. Define the integer data type function 'getAlpha()' that returns the value of the variable 'alpha'.

A website that sells high-end ties notices that its ads are showing up for searches that include "cheap". Because its ties are expensive, it does not want its ads to show up for searchers using the word "cheap". What should this advertiser do?

Answers

Answer: Add "cheap" to the negative keyword list.

Explanation: Pretty self explanatory, by adding a negative keyword It should not use that word if searched to find people to advertise to.

A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed concern that unauthorized personnel might be able to access data on the server. The security administrator decided to check the server further. Of the following choices, what is the administrator MOST likely looking for on this server?
a. Trojan
b. spyware
c. adware
d. ransomware

Answers

Answer:

B. Spyware

Explanation:

Spywares are silent software that steals sensitive information such as internet or company data, and other similar information. They are oftentimes unnoticed and supply stolen data to external users, data centers or advertisement companies.

Sophisticated spyware can go as far as installing software to manipulate your settings or use passwords on your behalf.

Even though the Trojan was detected in our scenario, The Trojan would have created a backdoor to allow spyware in. This spyware will not be easily noticed by the technician or the antivirus, however, it could be more devastating than the Trojan.

That is why the security administration expresses concern over a breach despite the removal of the Trojan.

An IT department submits a purchase order to buy a new computer from a vendor. "Purchase orders" are documents issued by buyers that indicate a purchase they want to make from a seller. Which stage of the hardware lifecycle does this scenario belong to?

Answers

Answer:

Procurement

Explanation:

Characteristics hardware lifecycle:

Procurement- Acquiring new IT hardware assets involves evaluating vendors, purchase orders, receiving, and device labeling.Deployment - Hardware configuration and installment, placing hardware and software assets into production environments.Maintenance & Support - Management of assets include scheduling scans and getting audit history.Upgrade - Before you retire your IT hardware assets, you’ll reach a processing plateau that can be restored with hardware upgrades.
Final answer:

The scenario belongs to the Procurement stage of the hardware lifecycle.

Explanation:

The scenario described belongs to the Procurement stage of the hardware lifecycle.

During the procurement stage, the IT department submits a purchase order to buy the new computer from a vendor. A purchase order is a document issued by buyers that indicates a purchase they want to make from a seller. This document initiates the process of acquiring the computer.

Other stages of the hardware lifecycle include Planning, Acquisition, Implementation, and Retirement.

________ is a technique that uses IT to develop an ongoing relationship with the purchasers or buyers of an organization's product to maximize the value an organization can deliver to them over time. Effective reliability management (ERM) Organizational efficiency management (OEM) Total quality management (TQM) Continuous innovation management (CIM) Customer relationship management (CRM)

Answers

Answer:

Customer Relationship Management (CRM)

Explanation:

Establishing and managing the relationship between the organization, potential and current customers is important for organizational development. CRM manages the potential or established relationship between the customer and the organization, ensuring that customer satisfaction is met.

It analyses customer history data (purchases, products, time of purchase, etc.) with a special focus on retaining customers and improving sales. Compiling data from multiple communication channels showcases one of the vital parts of the CRM method. These channels can be social media, live chat, email, telephone, website and so on.

What is the name of the virus that appears to be a legitimate program but when opened

Answers

Answer: trojan horse virus

Explanation:A trojan horse is a non-replicating program that looks legitimate, but it is actually used to perform malicious and illicit activities when launched. Attackers use trojan horses to steal a user's

personal information like password information, or they may simply use it to destroy programs or data on the hard disk.

You want to know your grade in Computer Science, so write a program that continuously takes grades between 0 and 100 to standard input until you input "stop", at which point it should print your average to standard output.

Answers

Answer:

Following are the program in the Python Programming Language.

#declare variables and initialize to 0

s=0

n=0

avg=0

#set the infinite while loop  

while(True):

 #get input from the user

 score=input()

 #set if statement to break loop

 if(score =="stop"):

   break

 #otherwise, perform calculation

 else:  

   n+= 1

   s=s+ int(score)

   avg= s/n

#print average of the input

print ('average: ',avg)

Output:

58

96

34

15

stop

average:  50.75

Explanation:

Following are the description of the program.

Firstly, set three variable that is 's' for sum, 'n' for count and 'avg' for average and initialize them to 0.Set the infinite while loop and inside it, set variable 'score' that get input from the user then, set the if conditional statement for break the loop, otherwise we calculate the sum of the user input and calculate its average.Finally, we print the result with message.
Other Questions
A 3 billiard ball (mass = 0.16 kg) moving at 4.0 m/s collides elastically head-on with a cue ball (mass = 0.17 kg) that is initially at rest. Find the final velocities of both the cue ball and the 3 billiard ball after the collision. Pleaseeeeee helpppp meeeeeeee please don't skippp I am struggling baddd Which of the following is a legume? wheat clover corn oats Consider the following class declaration.public class Thing{private String color;public Thing(){color = "Blue";}public Thing(String setColor){color = setColor;}}Which of the following code segments, when appearing in a class other than Thing, would create a reference of type Thing with a value of null ?Thing someThing = new Thing("Green");AThing someThing = new Thing("");BThing someThing = new Thing();CThing someThing;DThing("Green");E 3) Which of the following statements aboutthe tundra biome is true?a. It is the coldest biome.b. There are no summers.c. It is the driest biome.d. It is covered with trees. If using the method of completing the square to solve the quadratic equation x^2+17x+12=0x 2 +17x+12=0, which number would have to be added to "complete the square"? Ray was driving to UHD on his way to class and he was late as usual. On the way to school, Ray saw his neighbor whom he strongly disliked, trip and fall over a flower pot. Ray let his window down, told his neighbor he should be more careful, and sped past the neighbor. The neighbor laid there for hours and sustained serious injuries that could have been prevented if someone had called the ambulance for him. If the neighbor sues Ray for negligence, will he prevail? Qu oracin no tiene el adjetivo demostrativo correcto?Alguno de aquellos taxis est libre?Esta biblioteca siempre tiene actividades interesantes.Algunos de estas empleados juegan al ftbol el fin de semana.Esa universidad es muy importante para la comunidad. How does the writer use text structure to develop the central idea of inequality?by presenting the girls problem and how she solves the dilemmaby making a comparison between the girl and her brotherby repeating emotionally charged questions that are not meant to be answeredby overstating the actions of the theatre manager When blood glucose levels are difficult to control in Type II diabetes, some forms of insulin may be added to the treatment regimen to control blood glucose and limit complication risks. Which of the following statements is accurate based on research?A. Premixed insulin analogues are better at lowering HbA1C and have less risk for hypoglycemia.B. Premixed insulin analogues and the newer premixed insulins are associated with more weight gain than the oral antidiabetic agents.C. Newer premixed insulins are better at lowering HbA1C and post-prandial glucose levels than are long-acting insulins.D. Patients who are not controlled on oral agents and have post-prandial hyperglycemia can have NPH insulin added at bedtime. What was the purpose of the Chinese Exclusion Act?A. It allowed Chinese men to bring their wives and families toAmerica.B. It made all Chinese immigrants return to China.C. It stopped immigration by Chinese workers and miners for 10years.OD. It stated that only immigrants from China would be allowed intothe United States. Successfully adapting to change, dealing with stress, b and bouncing back from life's inevitable disappointments demonstrates A) social stability. B) resiliency. C) emotional stability. D) confidence. 2. Which of the following personality traits involves the a ability to be likable and to cooperate with others In a study of the effects of acid rain, a random sample of 100 trees from a particular forest is examined. Forty percent of these show some signs of damage. Which of the following statements is correct? a.None of the above b. The sampling distribution of the proportion of damaged trees is approximately Normal c.This is a comparative experiment. d.If a sample of 1000 trees was examined, the variability of the sample proportion would be larger than in a sample of 100 trees e.If we took another random sample of trees, we would find that 40% of these would show some signs of damage Sulfur and fluorine react in a combination reaction to produce sulfur hexafluoride: S (s) 3F 2(g) SF 6 (g) The maximum amount of SF 6 that can be produced from the reaction of 3.5 g of sulfur with of fluorine is ________ g. Write a c++ application that computes gross salary for Mr.A,given that during the interview session and before started work, it was agreed that his hourly wage would be Ghs 47. Assume that he worked for 387 hrs and he resigned. Compute also his Net salary given the under listed information: Taxes. Value. Tax1. 4.7%ofgross. Tax2. Gh 87. Tax3. 3.2% ofgross. Tax4. Gh 3. Tax5. 0.4 of gross. Given that extra dispensation is given to employees in the form of bonuses. Compute the take home pay from the table below. Net salary. Bonus. 0-10. 5% of net value.11-500. 10% of net value501-1000. Ghs 5001001-2000. Ghs 600Above 2000. 5% of net salary In fractional distillation, liquid can be seen running from the bottom of the distillation column back into the distilling flask. What effect does this returning condensate have on the fractional distillation? what are the factors of x^2 100? Priya rewrites the expression 8y - 24 as 8(y - 3). Han rewrites 8y - 24 as 2 (4y - 12). Are Priya's and Han's expressions each equivalent to 8y - 24? Explain your reasoning Just a test. What is 2+2 equal to? how were the Nazis able to spreadtheir beliefs and actions to other countries?