Warren is a systems administrator working in a corporate data center, and he has been tasked with hiding storage resources from a server that does not need access to the storage device hosting the storage resources. What can Warren configure on the storage controller to accomplish this task?

Answers

Answer 1

Answer:

LUN masking.

Explanation:

Servers in networks are very important, since they hold the data needed by the clients in the network. A data center is a network of server that provides cloud computing services.

The servers have different categories of storage, they read and write data like DAS, NAS and SAN. This storages are hidden or authorization policies are configured to provide security and majorly to prevent storage corruption by other servers.

The logical unit numbers masking is used to determine the number of users that can access the storage, therefore, it is hidden from other unauthorised users.


Related Questions

.doc What is the difference between a skilled hacker and an unskilled hacker, other than skill levels? How does the protection against each differ?

Answers

Answer/Explanation:

Skilled hacker knows what do to and how to do. He makes his own scripts and codes which he uses for hacking. He knows where to exploit the script and where to attack whereas, an unskilled hacker isn't an expert in programming languages, codes, etc.A skilled hacker is a pro in programming languages, codes etc. whereas, an unskilled hacker doesn't know what to do.An unskilled hacker uses the scripts and codes of skilled hacker. He has to face failure more often then a skilled hacker.

Discuss the textbook's recommendations for improving business-IT communication. Provide examples from your own experience to support your ideas.

Answers

Answer:

Make the importance of effective communicationWork with HR to develop new Skills  expectations and rolesMaking Oral ReportsUsing the TelephoneGive Direction and Feedback

Explanation:

Good communication skill is the most important skill for having a good relationship with business and that is why nowadays companies are making it must-have skill for every IT employee. They are also including it into performance appraisals so that way employees are giving it a topmost priorityCompanies are creating the jobs having titles such as "technology relationship manager", "IT Business Analyst" and "business technology specialist" where the titles suggest that the main focus of such titles is IT-Business relationship. One another way companies are trying to adopt is moving IT employees temporary for some time in business so that they can learn the business and enhance the relationship with them. You will need to make oral reports to other staff, such as the executive chef or restaurant manager. For example, you might have to report on the condition of some equipment or explain your actions regarding a problem with a restaurant supplier. You will also need to make oral reports to people who work under you, such as apprentices or salad preparation staff. For example, you might have to explain the preparation of a new menu item. An effective oral report has the same parts as an effective written report, namely an introduction, a body (or explanation), and a conclusion. Communicating on the telephone can be more difficult than speaking in person because many of the non-verbal cues are missing. When dealing with guests and other outsiders, it is particularly important to create a good first impression of your business. This first impression is created almost solely by your voice. For example, if you pick up the phone and bark “Yo” into the receiver, the caller is likely to be put off by your offhand manner and tone of voice. The caller may wonder whether he or she has reached the right number.A form of oral report that you will have to make if you supervise other people feedback on others’ performance. Feedback can be constructive or destructive. As these words imply, only constructive feedback serves any useful purpose. Take an example where the apprentice under your supervision is making pastries. Destructive feedback would be, “Are you stupid or something? The oven needs to be preheated before you put the pastries in to bake!” Do not use blaming words or indulge in name calling (“You are so…”). When people feel blamed, they often tune out of the discussion and do not hear your positive suggestions for improvement.

Which of the following statements is true? Question 9 options: A) The internet is now an Internet of Things. B) Each thing in the Internet of Things must have the ability to send data automatically over a network. C) The Internet is just a network of computers. D) Each thing in the Internet of things is an object with an IP address.

Answers

Answer:

Option C i.e., The Internet is just a network of computers is the correct option.

Explanation:

Basically, the Internet of Things is not only the computer network at present because with the help of the internet we can connect people all over the world for the purpose of communication and exchange our thoughts, but we can also send and receive data through the internet and it also the computer network.

What is a massive, room-sized computer that process and store enormous amounts of bulk data and information?

Answers

Answer:

Mainframe Computer

Explanation:

The Mainframe Computers are designed for bulk data processing with high speed and storing huge data that can't be performed by other regular PCs. They can run multiple instances of operating systems at the same time. They are used for application such as accounting, business transaction, information retrieval, airlines for the seat reservation and engineering computation.

Below is an image from Google Trends that plots Cats and Dogs. It shows a line that is higher for dogs than cats. Choose the most accurate description of what this data is actually showing based on what you know about how Google Trends works?
A. People like dogs more than cats.
B. People search for "dogs" more frequently than "cats".
C. There was a sharp increase in the dog population sometime between 2014 and 2015.
D. The popularity of dogs as pets is slightly increasing over time, while the popularity of cats is relatively flat.

Answers

Answer:

People search for "dogs" more frequently than "cats"

Explanation:

Though the image you spoke about in the question is not given but Google Trends is a search trends feature that shows how often Google's search engine is queried using a given word or phrase in relation to the site's total search volume over a given period of time. So if a particular trend(A) plots higher than another(B) it shows that people are searching for "A" more frequently than "B". So option B is the likely answer without showing the image you speak of.

is the abstraction of web-based computers, resources, and services that system developers can utilize to implement complex web-based systems

Answers

Answer:

Cloud computing

Explanation:

Cloud computing is a network of resource servers on the internet, used by individuals or a corporation to store and access data. This platform helps reduce the cost of installing and managing a data center, but allows the use of the resources based on subscription if the organization. It promotes a central access of resources, since all the data are stored in a place.

System developers take advantage of cloud computing with all it's resources to expand the services within managed networks.

Final answer:

The question pertains to the strategies and methodologies used by developers to build complex web-based systems, specifically through the use of web services, virtual servers, and Service-Oriented Architecture (SOA). These abstractions enable the scalable and efficient development of web applications.

Explanation:

The abstraction of web-based computers, resources, and services that system developers can utilize to implement complex web-based systems refers to a collection of strategies and methodologies that allow for the efficient development, deployment, and maintenance of web applications and services. This includes the use of web services, virtual servers, and architectures like Service-Oriented Architecture (SOA) to facilitate the interaction between disparate services over the internet. Developers leverage these abstractions to build scalable, robust applications that can interact seamlessly with other web services, manage resources dynamically, and adapt to changing demands without the need for constant redesign.

Specifically, web services enable applications to offer their APIs over the web, allowing for the integration of various services such as booking systems, payment processing, and content delivery. Virtual servers abstract physical hardware resources, allowing multiple virtual systems to operate independently on a single physical server, which optimizes resource utilization and can reduce costs. SOA, on the other hand, provides a framework for building applications that can easily communicate with each other, making it easier to integrate new features or services without significant disruptions to existing systems.

The trust relationship between the primary domain and the trusted domain failed. what does this phrase mean?

Answers

Answer:

It's an error message

Explanation:

This error indicates that this computer in no longer trusted and diconnected from the Active Directory since the local computer password doesn’t match this computer object password stored in the AD database. Trust relationship may fail if the computer tries to authenticate on a domain with an invalid password. Typically, this occurs after reinstalling Windows.

A system trusted by a user, is one that the user feels safe to use, and trusts to do tasks without secretly executing harmful or unauthorised programs; while trusted computing refers to whether programs can trust the platform to be unmodified from that expected, whether or not those programs are innocent, malicious or otherwise.

Generally, websites ending in .edu, .gov, and .org are less likely to be biased, or to show preference toward a certain financial product, than those ending in , .net, or .biz.A. TrueB. False

Answers

Answer:

True

Explanation:

Domain extensions always appear at the end of a website's address.

It's a means to categorise websites.

.edu domains are used for educational purposes

.gov are restricted to by government entities

.org is largely used by nonprofit websites.

While

.net is derived from the word network, indicating it was originally intended for organizations involved in networking technologies, such as Internet service providers and other infrastructure companies

.biz is intended for registration of domains to be used by businesses

The right domain extension adds credibility and memorability to your website by aligning it with a specific brand purpose.

Supplemental security software (such as anti-virus [anti-malware]) is: Generally considered essential for all desktops and laptops. An optional addition. Already included by the manufacturer on all computers. Generally considered essential for personally-owned devices only.

Answers

Answer:

Explanation:

With an anti-virus, we can search, detect, and delete malware like spyware, worms, Trojans, rootkits, pseudoviruses, etc.

An anti-virus can detect virus with several methods like:

Digital signatureHeuristic detectionBehavior detectionSandbox detection

Is necessary for personal laptops and desktops, even in companies hardware.

What is thhe name of service included with windows server operating systemthat manages a centralized database containing user account and security information?

Answers

Answer:

The active directory (AD)

Explanation:

Included in the operating system of Windows server is a primary feature called Active Directory which essentially manages a centralized database containing user account and security information such as password.

The AD is created by Microsoft and allows users (typically admins) to manage network and IT resources and application data of a system running the Windows operating system. AD can be used to create users, authenticate users and authorize users to be able to access servers and applications on the system.

Which Windows Server 2016 feature allows a user to utilize a software environment in which an application can run but is isolated from much of the rest of the operating system and other applications?

Answers

Answer:

Windows containers is the correct answer.

Explanation:

Windows containers provide permission to the users to make use of a software or an application environment with that they individually execute because of the many other operating system and other applications. Windows containers is also the feature of the Windows server operating system. That's why the following answer is correct.

What is the term for the intentional search for information about others' feelings to help explain the meaning of uncertain circumstances and events?

Answers

Answer: Social referencing.

Explanation:

Social referencing is the process whereby infants use affective display of an adult to regulate their behaviors.

Most likely occurs when a situation breeds uncertainty. For instance, If a child receives conflicting messages from their mother and father, the child becomes quite upset.

Final answer:

The term for intentionally seeking information about others' feelings to understand uncertain situations is called social referencing. It is a key component of social cognition and often involves using emotional cues from others to guide one's behavior in uncertain scenarios.

Explanation:

The term for the intentional search for information about others' feelings to help explain the meaning of uncertain circumstances and events is known as social referencing. This concept refers to the process by which individuals look for information from others to clarify a situation. People often use the emotional expressions of others as a source of information to make decisions about their own behavior when they are faced with ambiguous or uncertain circumstances. This dynamic becomes even more complex during social interactions because individuals are simultaneously seeking and providing cues to one another, which can be influenced by variables such as social group stereotypes or personal simulation of reactions in similar situations.

Social referencing is part of social cognition, a field in social psychology that focuses on how we think about others and the social world. This can involve processes like simulation, where we imagine what we would feel in another person's situation, or projection, where we assume others share our thoughts and emotions. However, relying too much on projection can lead to egocentrism and inaccuracies in social perception, as we may overestimate the similarity of other people's mental states to our own.

Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would jeopardize confidentiality? a. Securing wiring closets b. Applying patches promptly c. Implementing LAN configuration standards d. Applying strong encryption

Answers

Answer:

D. Applying strong encryption

Explanation:

Strong cryptography or cryptographic-ally strong are general terms applied to cryptographic systems or components that are considered highly resistant to cryptanalysis.One cryptographic cipher has been mathematically proven to be unbreakable when it is used correctly, but it is only very rarely used.

Between which zones and a DMZ should firewalls be placed? Choose two answers.
Remote
Segregated
Internal
External

Answers

Answer:

DMZ is placed between Internal and External separated by firewalls.

Explanation:

DMZ is demilitarized Zone, that is used to enhance the security feature of the local area network of the organization of firm from other networks exist on the internet. Few organizations need more security from the users that tries to access the resources and information from outside the organization. These users may steal some confidential information or tries to hack the network.

There are three major zones in these types of network, Internal, DMZ and External zones. Internal Zones is separated by DMZ with the help of firewall. The traffic that tries to access the internal network from DMZ checked through this security firewall. The external zone is also separated through a firewall from DMZ, used to monitor the external traffic tries to access the the network.

The system administrator at a small but high-profile company realizes that they need to secure the company’s email. Which email protocols does the system administrator secure with Secure Sockets Layer/Transport Layer Security (SSL/TLS) that also use Transmission Control Protocol (TCP) ports 993 and 995, once secured?

Answers

Answer:

IMAP and POP

Explanation:

The internet message access protocol (IMAP) is an internet protocol used for email retrieval through the port number 993 over the TCP protocol, from the mailing server. It server listens on port number 143 and the protocol allows for emails to be store permanently by the choice of the user.

The POP or post office protocol is sometimes used with the IMAP in the email system configuration. It is used to send email to a mail box through TCP port number 995. It's server listen to the request channel at port 110. It allows for a copy of the email to be downloaded by the client, with the original still in the server.

Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization through a set of organizational guidelines?

A. Planning
B. Policy
C. Programs
D. People

Answers

Answer:

The correct answer to the following question will be Option B (Policy).

Explanation:

The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.Policies are usually implemented by the governing body throughout the corporation.It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.

Therefore, Option B is the right answer.

Final answer:

The Information Security Management function that employs organizational guidelines to dictate behavior is B. Policy.

Explanation:

Policies are the formal statements that provide guidance on how an organization's members should behave and the principles they must adhere to. These policies are crucial for ensuring compliance with legal requirements and for providing a safe and secure environment for both the data and the people within the organization.

Within the broader context of Institutional & Corporate Management, policies serve as a cornerstone for expected behavior and strategic planning. They can reflect the overarching goals of the organization, which might include safeguarding privacy, ensuring ethical communication, and adhering to professional standards of security, particularly in an age where information technology is deeply integrated into everyday operations.

______ has gained widespread acceptance, as it allows for representing characters and scripts beyond the Latin alphabet, including Chinese, Cyrillic, Hebrew, and Arabic

Answers

Answer:

Unicode

Explanation:

Unicode is a character set  for the consistent encoding of the most major living languages in the world.

It also covers scientific symbols. Unicode is created by a consortium which consists of Apple, Microsoft, IBM, HP and Digital in 1993. It has become a computing industry standard to encode text.

The most recent version of Unicode 12.1 contains 137994 characters that cover 150 modern and historic scripts and also emoji.

Your boss wants you to suggest a secure way to connect to the corporate network from home. You will have to connect through the Internet. What is a possible solution?

Answers

Answer:

Using SSH on port 22

Explanation:

When you want to remotely connect to a corporate network and at the same securely.  SSH protocol connection is your best shot. There are few clients software that can help you achieve that. Example include Putty, SecureCRT etc

A certain disk can store 600 megabytes of information. If an average word requires 9.0 bytes of storage, how many words can be stored on one disk?

Answers

Answer:

69,905,067 (approximate).

Explanation:

1 MB is equal to 1024 KB.

1 KB is equal to 1024 bytes.

So 1 MB is equal to 1024 x 1024 = 1,048,576 bytes.

600 MB is equal to 600 x 1,048,576 = 629,145,600‬ bytes

If an average word is of size 9 bytes then 600 MB size disk can store,

approximately 629,145,600 / 9 = 69,905,067 words.

What can be controlled through IoT? Choose four answers.
Desktops
Door locks
Laptops
Light switches
Security cameras
Thermostat

Answers

The answer is:

Door locks, light switches, security cameras and desktops (even laptops too)

When we say Internet of Things, it is basically all objects that can be connected to internet (objects that are parts of our daily lives) can be included in this phrase or quote). There are technologies pertaining to common household items such as locks, switches and cameras that can be controlled through the use of phones and internet. These things collect and stores data such as names, fingerprints, pictures and scans that are used for verification and authentication purposes.

People are starting to type in whole questions rather than specific words, which leads credence to having _____ that have this as a post rather than spend money on a keyword. a. corporate blogs b. social media c. display ads d. landing pages

Answers

Answer:

a. corporate blogs

Explanation:

corporate blog is the practice of creating content that addresses various topics which includes (updates, expert tips or best practices and company news) from the perspective of a brand. Also, blogs make posts and comments easy to reach and follow.

_____ programs calculate and display the number of hops between computers and the time it takes to traverse the entire one-way path between machines.benchmarking.link checker.route-tracing.indexing.

Answers

Answer:

Route-tracking.

Explanation:

Benchmarking in computer networking is used to track the network stock and comparing it to the cost, security and performance of the network. It is used to determine the effectiveness of the network.

Link checker are third party applications used to check and fix bad or incorrect links on a web page.

The Route-tracking is a command or program that is used to track the path and time taken from one computer to the other.

If your main supplier was late in delivering goods, which type of system would you use to update your production schedule?

A) ESS
B) TPS
C) MIS
D) DSS

Answers

Answer:B. TPS

Explanation:TPS(Transaction processing system) is a computer based data management system for handling information. It can be used in supply chain management to ensure proper tracking and control of the delivery and supply of materials. It is used in various Transactions like BOOKING OF AIR OR TRAIN TICKETS, EMPLOYEE RECORDS, UPDATE OF PRODUCTION SCHEDULE, UPDATE OF INVENTORIES etc.

Final answer:

To update a production schedule after a main supplier's late delivery, a Decision Support System (DSS) would be the most appropriate tool as it aids decision-making in dynamic and uncertain conditions. The correct answer is option (D).

Explanation:

If your main supplier was late in delivering goods and you needed to update your production schedule accordingly, the correct type of system to use would be a Decision Support System (DSS). A DSS is designed to assist with making decisions based on the analysis of data; it is especially useful for situations that are not structured beforehand, such as unexpected delays from a supplier.

In contrast, an Executive Support System (ESS) is used for high-level strategic decision making, a Transaction Processing System (TPS) is employed for the collection and processing of transaction data, and a Management Information System (MIS) is utilized for regular structured decision-making based on the processing of data into information.

Social networks allow users to share vast amounts of private information about their lives. A security concern of this technology is that this publicly available data may enable stalkers or other criminals to identify potential targets.

Answers

Answer:

The statement is TRUE

Linnea's father called her to say that a message suddenly appeared on his screen that says his software license has expired and he must immediately pay $500 to have it renewed before control of the computer will be returned to him. What type of malware is this?

Answers

Answer:

blocking ransomware            

Explanation:

Ransomware is a malware used for money extortion. This malicious software locks the computer and data files by encrypting the data which cannot be decrypted by the user.This malware exploits the vulnerabilities in your computer and infects your computer with ransomware and it starts again even after rebooting the computer.A ransomware message appears on the computer screen which shows some instructions that you need to follow in order to get back access to your blocked computer just as in this scenario, the blocker ransomware acts to be a software publisher and displays a message that the software license has expired and $500 is demanded to get back the control of the computer.As a result the user cannot be able to use the computer or its resources until he pays the demanded money.

ListenListen with ReadSpeakerAn administrator working on a Windows Server 2016 Server Core installation needs to disable DHCP on all interfaces on the server. What PowerShell command should be used?

Answers

Answer:- Set-Netipinterface is used in window server 2016 Server core installation to disable DHCP on all interface on the server.

Explanation:

This is because Set-NetIPInterface cmdlet modifies an IP interface, including Dynamic Host Configuration Protocol DHCP etc, On LAN (WOL) settings.

What are the equivalence classes of these bit strings forthe equivalence relation in Exercise 11?a)010b)1011c)11111d)01010101

Answers

Answer:

d) 01010101

Explanation:

What will be the output of the following code snippet? boolean token1 = true; while (token1) { for (int i = 0; i < 10; i++) { System.out.println("Hello"); } token1 = false; }

Answers

Answer:

The output of the code snippet will be ten “Hello” messages

Explanation:

while token = true

i = 0 sends “Hello” to the screen

i = 1 sends “Hello” to the screen

i = 2 sends “Hello” to the screen

i = 3 sends “Hello” to the screen

i = 4 sends “Hello” to the screen

i = 5 sends “Hello” to the screen

i = 6 sends “Hello” to the screen

i = 7 sends “Hello” to the screen

i = 8 sends “Hello” to the screen

i = 9 sends “Hello” to the screen

 

The coherent application of methodical investigatory techniques to collect, preserve, and present evidence of crimes in a court or court-like setting is known as _________.

Answers

Answer:

The correct answer to the following question will be "Forensics ".

Explanation:

Forensic would be the application of science to criminal law, especially on the civil side in the course of criminal investigations, following the legal standards of admissible evidence and criminal law.The consistent use of methodological methods for collecting, preserving and presenting evidence of a crime in court or jury-like settings is recognized as Forensics.In the course of an investigation, forensic scientists accumulate, maintain and evaluate scientific proof. Although some forensic experts go to the crime scene to retrieve the items themselves, some assume a laboratory function, examining artifacts given to them by other people.

Therefore, Forensics is the right answer.

Technician A says that front and rear U-joints on a RWD axle should operate at different angles to prevent vibration. Technician B says that front and rear U-joints on a RWD axle should operate at equal angles to prevent vibration. Which technician is correct?

Answers

Answer:

Technician B is correct only

Explanation:

The actions of technician b helps to eliminate uneven rotating speed which causes vibrations.

Other Questions
_____ tends to appear in specialized trade publications or professional journals, in direct-mail pieces sent to businesses, or in trade shows. What is the ratio of ai3+ions to s2- ions in the neutral compound A dielectric-filled parallel-plate capacitor has plate area A = 10.0 cm2 , plate separation d = 10.0 mm and dielectric constant k = 3.00. The capacitor is connected to a battery that creates a constant voltage V = 15.0 V. Use 0 = 8.8510 C/Nm. The dielectric plate is now slowly pulled out of the capacitor, which remains connected to the battery. Find the energy U2 of the capacitor at the moment when the capacitor is half-filled with the dielectric. Sociology is the study of _______a.humans as rational utility maximizersb.the underlying variation or causal mechanisms within the biological nature of individuals.c.how urges, drives, and the mind can account for human behaviord.group-level dynamics and social structures What is the relationship between Temperature in urchin survival Four examples for each of these literary terms with one picture relating to the definition. Please help, I have included the definitions for the three literary terms below.Conflict: The struggle between two or more forces, internal and /or external, that drive the plot. Genre: The various classifications of literary works.Symbol: A thing, person, or place that is present as a representation of a larger meaning Use the following information to calculate the sales price of a boat under both GAAP and for internal decision purposes:Number of boats to be sold 500 Upstream costs $5,000,000 Direct materials per boat $50,000 Direct labor per boat $30,000 Overhead per boat $ 20,000 Downstream costs $2,000,000 (1). Assume the company wants to sell each boat for 20% more than the cost to produce the boat. Which of the following would be the sales price under GAAP and for internal decision purposes? GAAP Internal Decision(A) $120,000 $136,800 (B) $ 136,800 $136,800 (C) $ 120,000 $114,000 (D)) $136,800 $ 114,000 Amicus curiae briefs: A. help experts testifying in court get their point across. B. provide a way to influence the court when expert testimony is not allowed. C. summarize the questions raised by the jury during deliberation of a verdict. D. reflect scientists' lack of interest in the legal system. According to Mathis Wackernagel, ecological overshoot is caused by an overuse of resources. Which of the following practices could contribute to ecological overshoot?1. Switching to renewable energy sources with lower CO2 emissions2. Recycling materials after they are used3. Catching fish more rapidly than the population can sustain4. Replanting trees as timber is harvested The method by which a message is conveyed between people is called a __________.a. deviceb. channelc. messaged. symbole. model Water from a 100 ft x 200 ft lawn converges into a gully. During a 1-hour storm, discharge into the gully is 0.37 cfs (ft3/s). The interception by grass is 0.02 acre-ft. Overall, 70% of the rain is infiltrated. What is the amount of rainfall? Why would a free market never operate at a quantity greater than the equilibrium quantity? Hint: What would be required for a transaction to occur at that quantity? A 1.5 kg ball is thrown upward at 10 m/s. What is its velocity when it is 2 m above the release point? PLEASE HELP!!!!Choose the statements that explain the disparity between the North and the South at the beginning of the Civil War that gave the North an advantage. 1. More than 70% of railroads were located in the North providing a greater capacity to transport food, troops, supplies, and other materials2. Prior to the war, many Southerns knew how to hunt and ride a horse, translating to a skilled cavalry 3. All of the U.S. Navy remained in the hands of the federal government 4. The North had a huge population, mostly through immigration that provided a potential source of manpower 5. The Souths plan was to fight a defensive war by bringing their southern enemy into their territory and exhausting them6. The economy of the North was based primarily on manufacturing, while the economy of the South was based on agriculture *50 POINTS -- FRESHMEN ~ ALGEBRA I *Large boxes weigh 75 pounds, and small boxes weigh 40 pounds.a. Write an inequality that represents the numbers of large, x, and small, y, boxes a 200-pound delivery person can take on the elevator.b. Select the reason(s) why some solutions of the inequality might not be practical in real life.>The number of boxes must be a whole number.>The number of boxes must be a rational number.>It is unlikely that one person will carry 20 large boxes.>It is unlikely that one person will carry 45 small boxes.For a, I got 75x + 40y 200 --- I got it wrong but I'm not sure why? Suppose that a bank only permits passwords that are strings from the alphabet = {a, b, c, d, 1, 2, 3, 4} that follow the rules: The length is at least five characters It begins with a letter {a, b, c, d} It ends with two digits {1, 2, 3, 4}The set of legal passwords forms a regular language L. Construct a regular expression r such that L(r) = L. Over the past five years, Teen Clothing stock produced returns of 18.7, 5.8, 7.9, 10.8, and 11.6 percent,respectively. For the same five years, the risk-free rate 5.2, 3.4, 2.8, 3.4, and 3.9 percent, respectively.What is the arithmetic average risk premium on Teen Clothing stock for this time period?A. 6.89 percentB. 7.01 percentC. 7.22 percentD. 7.34 percentE. 7.57 percent The social intelligence quotient or SQ proves that any individual cannot attempt to be altering their attitudes and behavior in response to their environment. 7-81. Aja and Emilie were riding their skateboards. They knew that they could ride 3 miles in 20 minutes. b. If y represents the distance in miles and x represents the time in minutes, write an equation torepresent the distance traveled for any time. When women take birth control pills, some of the hormones found in the pills eventually make their way into lakes and waterways. In one study, a water sample was taken from various lakes. The data indicate that as the concentration of estrogen in the lake water goes up, the fertility level of fish in the lake goes down. The estrogen level is measured in parts per trillion (ppt) and the fertility level is recorded as the percent of eggs fertilized.a. What are the cases in this study?b. How many variables are mentioned in the description?c. What are the variables?d. Classify each variable as either qualitative or quantitative. Steam Workshop Downloader