1
Select all the correct answers
Aubrey is on a Windows machine. She wants to back up her Halloween pictures on an external hard drive. Which of the following tasks is she
likely to perform as part of a sequence of actions do that?
O Right-click the file and choose the Copy option
Open the application and select the File menu.
Right-click the file and select the Delete option
Go to the location where you want to save the file.
Right-click an empty area and select the Paste option.

Answers

Answer 1

Answer:Go to the location where you want to save the file.

Explanation:


Related Questions

children and texhnology

Answers

Answer: technology better

Explanation:

a stop watch is used when an athlete runs why

Answers

Explanation:

A stopwatch is used when an athlete runs to measure the time it takes for them to complete a race or a specific distance. It allows for accurate timing and provides information on the athlete's performance. The stopwatch helps in evaluating the athlete's speed, progress, and overall improvement. It is a crucial tool for coaches, trainers, and athletes themselves to track their timing, set goals, and analyze their performance. Additionally, the recorded times can be compared to previous records or used for competitive purposes,such as determining winners in races or setting new records.

you can support by rating brainly it's very much appreciated ✅

to avoid id/ips or firewall detection, attacker use what common port?

Answers

Attacker often use common ports like 80 (HTTP) and 443 (HTTPS) to avoid detection by firewalls and intrusion detection systems.

Attacker often use common ports like port 80 (HTTP) and port 443 (HTTPS) to avoid detection by firewalls and intrusion detection/prevention systems. This is because these ports are typically open on most networks to allow for normal web traffic, making it easier for attackers to hide their malicious activity in the midst of legitimate traffic.

Using these ports can allow attackers to bypass some network security measures that are designed to block traffic on unusual ports or protocols. However, many organizations are aware of this tactic and may implement additional security measures such as deep packet inspection or SSL decryption to detect and prevent malicious activity on these ports.

It's important to note that not all traffic on these ports is necessarily malicious, and blocking them altogether could disrupt legitimate network traffic. Therefore, it's important to have a comprehensive network security strategy that includes multiple layers of defense and ongoing monitoring and analysis to detect and respond to potential threats.

Learn more about network security here:

https://brainly.com/question/14407522

#SPJ4

Which four of the following are true about fair use?

Which four of the following are true about fair use?

Answers

D,C,B

Should be the correct answers. I'm not the best when it comes to copyright but I believe those are correct.

Read the following scenario what type of business letter do you think is required in this situation?

Read the following scenario what type of business letter do you think is required in this situation?

Answers

Answer:

Cover letter

Explanation:

The type of business letter Melissa and Melrose would need to write is a Cover letter.

The Cover Letter is usually not more than a page document which gives a kind of summary or hint about who individual is and the quality of the individual, while highlighting why an individual is the best fit for the role they are seeking for.

Most recruiters usually make use of the cover letter, as a first hurdle, to screen out applicants especially when applications are much.

Melissa and Melrose, in addition to the resume they would submit for the volunteering job, would need a cover letter.

Problem: Longest Palindromic Substring (Special Characters Allowed)

Write a Python program that finds the longest palindromic substring in a given string, which can contain special characters and spaces. A palindrome is a word, phrase, number, or other sequence of characters that reads the same forward and backward. The program should find and return the longest palindromic substring from the input string, considering special characters and spaces as part of the palindrome. You do not need a "words.csv" as it should use dynamic programming to find the longest palindromic substring within that string.

For example, given the string "babad!b", the program should return "babad!b" as the longest palindromic substring. For the string "c bb d", the program should return " bb " as the longest palindromic substring.

Requirements:

Your program should take a string as input.
Your program should find and return the longest palindromic substring in the input string, considering special characters and spaces as part of the palindrome.
If there are multiple palindromic substrings with the same maximum length, your program should return any one of them.
Your program should be case-sensitive, meaning that "A" and "a" are considered different characters.
You should implement a function called longest_palindrome(string) that takes the input string and returns the longest palindromic substring.
Hint: You can use dynamic programming to solve this problem. Consider a 2D table where each cell (i, j) represents whether the substring from index i to j is a palindrome or not.

Note: This problem requires careful consideration of edge cases and efficient algorithm design. Take your time to think through the solution and test it with various input strings.

Answers

A Python program that finds the longest palindromic substring in a given string, considering special characters and spaces as part of the palindrome is given below.

Code:

def longest_palindrome(string):

   n = len(string)

   table = [[False] * n for _ in range(n)]

   # All substrings of length 1 are palindromes

   for i in range(n):

       table[i][i] = True

   start = 0

   max_length = 1

   # Check for substrings of length 2

   for i in range(n - 1):

       if string[i] == string[i + 1]:

           table[i][i + 1] = True

           start = i

           max_length = 2

   # Check for substrings of length greater than 2

   for length in range(3, n + 1):

       for i in range(n - length + 1):

           j = i + length - 1

           if string[i] == string[j] and table[i + 1][j - 1]:

               table[i][j] = True

               start = i

               max_length = length

   return string[start:start + max_length]

# Example usage

input_string = "babad!b"

result = longest_palindrome(input_string)

print(result)

This program defines the longest_palindrome function that takes an input string and uses a dynamic programming approach to find the longest palindromic substring within that string.

The program creates a 2D table to store whether a substring is a palindrome or not. It starts by marking all substrings of length 1 as palindromes and then checks for substrings of length 2.

Finally, it iterates over substrings of length greater than 2, updating the table accordingly.

The program keeps track of the start index and maximum length of the palindromic substring found so far.

After processing all substrings, it returns the longest palindromic substring using the start index and maximum length.

For more questions on Python program

https://brainly.com/question/30113981

#SPJ8

I don't know how to fix this, but it needs me to do something to install a game.

I don't know how to fix this, but it needs me to do something to install a game.

Answers

If you encounter an error message   stating that the feature you're trying to use is unavailable while installing the game,it may be related to the missing or corrupted Microsoft Visual C++ redistributable package.

 How is this so ?

To resolve this issue, you can try installing the   Microsoft Visual C++ 2015-2022 Redistributable (x64)- 14.36.32532 manually.

Visit the official Microsoft website,download the package, and follow the installation instructions provided   to fix the issue and successfully install the game.

Learn more about Microsoft Visual C++ at:

https://brainly.com/question/30743358

#SPJ1

NEED HELP ASAP! You are looking for information in the online catalog for your local library. Which field would you not expect to see in a library's catalog or database?
A. Author
B. Title
C. Year
D. Phone number

Answers

Answer:

The answer is D

Explanation:

     

In Coral Code Language - A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-life of about 6 hours in humans. Given the caffeine amount (in mg) as input, output the caffeine level after 6, 12, and 18 hours.

Ex: If the input is 100, the output is:

After 6 hours: 50.0 mg
After 12 hours: 25.0 mg
After 18 hours: 12.5 mg
Note: A cup of coffee has about 100 mg. A soda has about 40 mg. An "energy" drink (a misnomer) has between 100 mg and 200 mg.

Answers

To calculate the caffeine level after 6, 12, and 18 hours using the half-life of 6 hours, you can use the formula:

Caffeine level = Initial caffeine amount * (0.5 ^ (time elapsed / half-life))

Here's the Coral Code to calculate the caffeine level:

function calculateCaffeineLevel(initialCaffeineAmount) {

 const halfLife = 6; // Half-life of caffeine in hours

 const levelAfter6Hours = initialCaffeineAmount * Math.pow(0.5, 6 / halfLife);

 const levelAfter12Hours = initialCaffeineAmount * Math.pow(0.5, 12 / halfLife);

 const levelAfter18Hours = initialCaffeineAmount * Math.pow(0.5, 18/ halfLife);

 return {

   'After 6 hours': levelAfter6Hours.toFixed(1),

   'After 12 hours': levelAfter12Hours.toFixed(1),

   'After 18 hours': levelAfter18Hours.toFixed(1)

 };

}

// Example usage:

const initialCaffeineAmount = 100;

const caffeineLevels = calculateCaffeineLevel(initialCaffeineAmount);

console.log('After 6 hours:', caffeineLevels['After 6 hours'], 'mg');

console.log('After 12 hours:', caffeineLevels['After 12 hours'], 'mg');

console.log('After 18 hours:', caffeineLevels['After 18 hours'], 'mg');

When you run this code with an initial caffeine amount of 100 mg, it will output the caffeine levels after 6, 12, and 18 hours:

After 6 hours: 50.0 mg

After 12 hours: 25.0 mg

After 18 hours: 12.5 mg

You can replace the initialCaffeineAmount variable with any other value to calculate the caffeine levels for different initial amounts.

for similar questions on Coral Code Language.

https://brainly.com/question/31161819

#SPJ8

How many NOTS points are added to your record for not completely stopping at a stop sign?

Answers

The number of NOTS points added to your record for not completely stopping at a stop sign can vary depending on the location and laws of the jurisdiction where the traffic violation occurred. It is important to note that not stopping fully at a stop sign is a serious safety violation, and it can result in a traffic ticket, fines, and possible points on your driver's license record.

In some jurisdictions, failing to stop at a stop sign can result in a citation for running a stop sign or a similar violation. In other jurisdictions, it may be categorized as a failure to obey traffic signals or a similar violation. The number of NOTS points added to your record, if any, will depend on the specific violation charged and the point system used by the jurisdiction in question.

It's important to note that NOTS points are used to track and measure the driving record of a driver, and they may impact insurance rates and license status. It's always a good idea to familiarize yourself with the laws and regulations in your area and drive safely to reduce the risk of violations and penalties.

Summary of Activities: Learning/Insights:

Summary of Activities: Learning/Insights:

Answers

Summary of Activities:

Gathering Information: Researching, collecting data, and gathering relevant information from various sources such as books, articles, websites, or experts in the field.

What is the Summary about?

Others are:

Analysis: Reviewing and analyzing the gathered information to identify patterns, trends, and insights. Extracting key findings and observations from the data.Synthesis: Organizing and synthesizing the gathered information to create a coherent and structured overview of the topic or subject.Reflection: Reflecting on the findings and insights obtained from the research and analysis. Considering their implications, relevance, and potential applications.Evaluation: Assessing the quality, reliability, and validity of the information and insights obtained. Evaluating the strengths and weaknesses of the findings and the research process.

Lastly, Application: Applying the obtained knowledge and insights to real-life situations, problem-solving, decision-making, or creative ideation.

Read more about Summary here:

https://brainly.com/question/27029716

#SPJ1

fill in the blank. in the context of the operators used in a query by example (qbe) form, the___is used when only one of the conditions in the qbe form must be met.

Answers

The OR operator is used when only one of the conditions in the qbe form must be met.

What are Operators?

Operators are symbols that are used to perform operations on one or more operands in order to return a result. In programming, operators are used to perform operations on variables and values. These operations can include arithmetic, logical, comparison, assignment, and bitwise. Arithmetic operators are used for mathematical calculations, like addition, subtraction, multiplication, and division. Logical operators are used to check the logic between two statements or values. Comparison operators are used to compare two values. Assignment operators are used to assign a value to a variable. Bitwise operators are used to manipulate bits or binary values.

To know more about Operators

brainly.com/question/11193100

#SPJ4

which of the following issues often make reliable backups for client devices more challenging than for infrastructure devices? select all that apply.

Answers

Multiple factors can cause backups to become corrupt. Age or careless treatment of outdated media can cause corruption or damage. Even when you restore files, programs might not correctly launch because readable backups might not contain application-consistent data.

What do you mean by backups ?

Making a backup if your system's data enables you to recover it if your originals were lost or corrupted. If you have deleted previous data from your system, your can use backup to recover copies of those files. Backup is a widespread approach used by businesses and organisations to secure vital data, making it one of the critical components of a company's business continuity and recovery strategies. Data is extremely valuable to both individuals and corporations. Businesses cannot exist without data in the same way that people cannot exist without oxygen, water, and food. Companies that lack proper backup and disaster recovery processes only survive a disaster 40% of the time.

To know more about backups , visit
brainly.com/question/17355457
#SPJ4

state the differences between selecting a text and highlighting a text as used in computing​

Answers

Explanation:

The difference between highlighting the text and selecting the text is highlighting is when you change the highlight/back color of the text and selecting is when you temporarily highlight it to change a certain part

What service handles the execution of missed cron jobs in the /etc/cron.hourly, /etc/cron.daily, /etc/cron.weekly and cron.monthly files?

Answers

The service handles the execution of missed cron jobs is /etc/crontab.

Where are /etc/crontab is system crontabs file?

This is a command that is often used by root user or daemons. It is used to configure system different kinds of jobs.

Vonclusively, Cron jobs are often seen  in the spool directories. They are known to be often stored in tables known as crontabs. This /etc/crontab. is a service handles the execution of missed cron jobs.

Learn more about commands from

https://brainly.com/question/25243683

A computer processor stores numbers using a base of: _____.a) 2b) 10c) 8d) 16

Answers

It stores a base of 16

A computer processor stores numbers using a base of 16. The correct option is d).

What is a computer processor?

A computer processor is a computer processing unit that is a CPU. CPU controls all the functions of the computer. It stores memory, and it has two types of memory. Short-term and long-term. It executes all the instructions given to the computer.

The design expert discusses the project three-dimensionally at this point in the process. To define the character of the finished project and an ideal fulfillment of the project program, a variety of potential design concepts are investigated.

The different kinds of computer processors are: microprocessor, microcontroller, embedded processor, digital signal processor

Therefore, the correct option is d). 16.

To learn more about computer processors, refer to the link:

https://brainly.com/question/15102947

#SPJ5

completo con la ayuda de mis familiares los siguientes cuestionamientos.
1) ¿Que es un alargue?

2) ¿cual es la funcion de un alargue o prolongador?

Answers

La función principal de un cable de extensión es eléctrica y es extender un cable para alimentar un dispositivo que no llega a una toma de corriente.

Write a recursive function next_pow2(n) that returns the smallest integer value p such that for a non-negative value n. For example: function call return value next_pow2(0) 0 next_pow2(1) 0 next_pow2(2) 1 next_pow2(3) 2 next_pow2(4) 2 next_pow2(5) 3 next_pow2(6) 3 next_pow2(7) 3 next_pow2(8) 3 next_pow2(9) 4 next_pow2(255) 8 next_pow2(256) 8 next_pow2(257) 9

Answers

Answer:

Explanation:

The following code is written in Python and is a recursive function as requested that uses the current value of p (which is count in this instance) and raises 2 to the power of p. If the result is greater than or equal to the value of n then it returns the value of p (count) otherwise it raises it by 1 and calls the function again.

def next_pow2(n, count = 0):

   if (2**count) < n:

       count += 1

       return next_pow2(n, count)

   else:

       return count

Write a recursive function next_pow2(n) that returns the smallest integer value p such that for a non-negative

“If the information ______________________, then that information (should / should not) be stored because _____________. For example, ____________ (should / should not) be stored.”

Answers

The blanks spaces are filled with the following;

Is confidential, should notThere's risk of information theft on the cloudSocial security number, should not

Confidential information and the storage cloud

According to McGinley, in some cases, storing any type of personal information for one's self or one's customers in the cloud would be a mistake. Information relating to date of birth, Social Security number, passport numbers should not be kept in the cloud.

This follows from the fact that "Cloud providers are no less bulletproof than any of the other previous industry."

Read more on information storage;

https://brainly.com/question/24688176

The answer states that if the information is confidential, it should not be stored. This is because there is a risk of information theft on the cloud.

Given, information regarding storage of data.

The example given is the storage of a Social Security number. It is stated that Social Security numbers should not be stored in the cloud.

This is because cloud providers are not completely immune to security breaches or hacking attempts. Storing sensitive information like Social Security numbers on the cloud can potentially expose it to unauthorized access.

Confidential information should be handled with caution and stored in a secure manner to minimize the risk of unauthorized access or data breaches.

Know more about confidential information,

https://brainly.com/question/16230661

#SPJ3

PERGUNTA 1
Um pesquisador deve escolher o seu método de pesquisa:
a. Pelas facilidades em realizar a pesquisa.
b. Pelas experiências de outros pesquisadores.
c. Pelas especificidades do objeto de pesquisa.
d. Pelas regras dos manuais de pesquisa.
e. Por aquilo que for determinado pela instituição a qual está vinculado.

Answers

Answer:

c. Pelas especificidades do objeto de pesquisa.

Explanation:

É o que eu acho e quem achar diferente ta errado

Suppose you present a project and your supervisor comments that the graphics need to be a higher quality and suggests you replace a circuit board. To what circuit board is your supervisor referring?


graphics card

video card

sound card

system card

Answers

Answer:graphics card

Explanation:

Answer:

graphics card

Explanation:

Please help i’ll give you brainliest Please please

Please help ill give you brainliest Please please

Answers

Hey

when we use quotation marks in a search it means we are looking for a phrase so lets say we want to find cats jumping off a bed we can either look up cats jumping off a bed with no quotation marks and the algorithm will try to look for keywords in the search so cat bed and jumping (it ignores words like a and off) but the way it doses all this we will most likely find an image of a cat on a bed or jumping on a bed but we may not find one of the cat jumping off a bed. so this is where quotation marks come in they will make the algorithm look just for images and links tagged with "cat jumping off a bed"

the plus sign is when we want to add things to the search so we would use the plus sign if we wanted to find a cat that was on a bed and jumping it would be like this cat+bed+jumping

the pipe symbol is used when we are looking for two things that are basically the same but with one key difference so lets say we wanted cats jumping on a bed or dogs jumping on a bed we would use it then

and the words or and not can not be used in a search engine as the algorithm can not tell if they are being used as a tag.

-scav

Python high school assignment: please keep simpleIn pythonInstructionsUse the following initializer list:w = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]Write a loop that prints the words in uppercase letters.Sample RunALGORITHMLOGICFILTERSOFTWARENETWORKPARAMETERSANALYZEALGORITHMFUNCTIONALITYVIRUSES

Answers

Answer:

w = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]

for i in range (len(w)):

   print(w[i].upper())

Explanation:

every element needs to be upper cased

A loop that prints the words in uppercase letters is written below with the help of Python.

What is a function?

Simply said, a function is a "chunk" of code that you may reuse repeatedly so instead of having to write it out several times. Software developers can divide an issue into smaller, more manageable parts, which can each carry out a specific task, using functions.

A function, according to a technical definition, is a relationship between an amount of parameters and a set of potential outputs, where every other input is connected to precisely one output.

All the functions are to be written in uppercase:

w = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]

for i in range (len(w)):

  print(w[i].upper())

Learn more about function, Here:

https://brainly.com/question/29050409

#SPJ5

What does NOT match with Agile Manifesto?
Select the correct option(s) and click Submit.
Processes and tools over individuals and interactions
Working software over comprehensive documentation
Responding to change over following a plan
ent...
ed!
e Ai...
Contract negotiation over customer collaboration

Answers

Answer:

yes

Explanation:

What study skill is being used when taking a large project and breaking it down into smaller manageable tasks?

Answers

Not sure but I think it’s called prioritizing

Answer:

prioritization

Explanation:

this is the answer

Write Album's PrintSongsShorterThan() to print all the songs from the album shorter than the value of the parameter songDuration. Use Song's PrintSong() to print the songs.

Answers

Answer:

Here is the function PrintSongsShorterThan() which prints all the songs from the album shorter than the value of the parameter songDuration.

void Album::PrintSongsShorterThan(int songDuration) const {   //function that takes the songDuration as parameter

unsigned int i;  

Song currSong;    //object of Song

cout << "Songs shorter than " << songDuration << " seconds:" << endl;  

for(int i=0; i<albumSongs.size(); i++){    

currSong = albumSongs.at(i);    

if(currSong.GetDuration()<songDuration){    //checks if the song duration of the song from album is less than the value of songDuration

currSong.PrintSong();     } } }  //calls PrintSong method to print all the songs with less than the songDuration

Explanation:  

I will explain the working of the for loop in the above function.

The loop has a variable i that is initialized to 0. The loop continues to execute until the value of i exceeds the albumSongs vector size. The albumSongs is a Song type vector and vector works just like a dynamic array to store sequences.

At each iteration the for loop checks if the value of i is less than the size of albumSongs. If it is true then the statement inside the loop body execute. The at() is a vector function that is used to return a reference to the element at i-th position in the albumSongs.  

So the album song at the i-th index of albumSongs is assigned to the currSong. This currSong works as an instance. Next the if condition checks if that album song's duration is less than the specified value of songDuration. Here the method GetDuration() is used to return the value of duration of the song. If this condition evaluates to true then the printSong method is called using currSong object. The printSong() method has a statement cout << name << " - " << duration << endl; which prints/displays the name of the song with its duration.

If you see the main() function statement:

musicAlbum.PrintSongsShorterThan(210);  

The musicAlbum is the Album object to access the PrintSongsShorterThan(210) The value passed to this method is 210 which means this is the value of the songDuration.

As we know that the parameter of PrintSongsShorterThan method is songDuration. So the duration of each song in albumSongs vector is checked by this function and if the song duration is less than 210 then the name of the song along with its duration is displayed on the output screen.

For example if the album name is Anonymous and the songs name along with their duration are:

ABC 400  

XYZ 123  

CDE 300  

GHI 200  

KLM 100  

Then the above program displays the following output when the user types "quit" after entering the above information.

Anonymous                                                              

Songs shorter than 210 seconds:                                                                         XYZ - 123                                                                                                              

GHI - 200                                                                                                              

KLM - 100  

Notice that the song name ABC and CDE are not displayed because they exceed the songDuration i.e. 210.

Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the restrictssh group). Next, install an ftp server and configure it to allow anonymous logins. Create a second chroot jail that can be accessed by the anonymous account. You will probably need to create several new user accounts to facilitate testing your setups.

Answers

Answer:

Explanation:

#!/bin/bash

# This script can be used to create simple chroot environment

# Written by LinuxConfig.org  

# (c) 2020 LinuxConfig under GNU GPL v3.0+

#!/bin/bash

CHROOT='/var/chroot'

mkdir $CHROOT

for i in $( ldd $* | grep -v dynamic | cut -d " " -f 3 | sed 's/://' | sort | uniq )

 do

   cp --parents $i $CHROOT

 done

# ARCH amd64

if [ -f /lib64/ld-linux-x86-64.so.2 ]; then

  cp --parents /lib64/ld-linux-x86-64.so.2 /$CHROOT

fi

# ARCH i386

if [ -f  /lib/ld-linux.so.2 ]; then

  cp --parents /lib/ld-linux.so.2 /$CHROOT

fi

echo "Chroot jail is ready. To access it execute: chroot $CHROOT"

You decide that you want to run multiple operating systems on a single machine which of these will you need?

firmware

multitasker

hypervisor

0S switcher

Answers

Answer:

Hyer-V = Hypervisor

Explanation:

Hyper visor because their job is to mostly multi Task work

why it is important to follow the procedures and techniques inmaking paper mache?


pleaseee help i needed it right now​

Answers

Answer:

otherwise it will go wrong

An organization that has fewer than ten employees all working in the same building will probably have this type of network. LAN WAN DAN MAN

Answers

An organization with fewer than ten employees, all working in the same building, will most likely have a Local Area Network (LAN).

A LAN is a network that connects computers, servers, printers, and other devices within a limited geographical area, such as a building or a campus. In this case, since all the employees are working in the same building, it makes sense to have a LAN to facilitate communication and resource sharing among them.

A LAN typically utilizes Ethernet cables or Wi-Fi connections to interconnect the devices within the network. It may be set up using a router or a switch to manage the network traffic. A LAN allows for fast and reliable communication, file sharing, and access to shared resources, such as printers or shared storage devices.

On the other hand, WAN (Wide Area Network) is a network that covers a large geographical area, typically connecting multiple LANs or remote locations. Since the organization in question has all its employees in the same building, a WAN is not necessary.

As for DAN (Desk Area Network) and MAN (Metropolitan Area Network), these are less commonly used network types. DAN refers to a network that connects devices on a desk or workstation, typically using technologies like USB or Thunderbolt. MAN, on the other hand, connects devices over a larger geographical area, such as a city. These network types are not typically used for small organizations with fewer than ten employees.

Therefore, in the given scenario, a LAN would be the most appropriate network type.

Answer:

Local area Network (LAN)

Explanation:

Local area Network (LAN)

Other Questions
i) Describe any six common attacks in the detail.j) Recommend some important wide range of InfoSec Professionals and their roles in details.k) Why is Maintenance Model designed in the context of SecSDLC? Draw a maintenance model also.l) What do you mean by policy? What are the some basic rules of the policy? Draw a diagram of Bulls-eye layer Model and describe each layer.m) Why we need Issue Specific Security Policies (ISSP)? What are essential topics could include under ISSP? Describe major ISSP Components? Do you aware of different ISSP Approaches with their advantages and disadvantages? an astronaut of mass 60 kg is walking on the surface of a new planet. if their weight (in N) is twice their weight on earth, what is the mass of the planet if it has the same radius as earth (R earth = 6.37 x 10^6 m)? the mass of earth is 5.97 x 10^24 kg. What coordinates should she assign to the top-right vertex if the rectangle? what does the word dominion mean in this sentence? in alliance with the comanches they [the kiowa] held dominion in the southern plains for a hundred years. responses Can someone help me with B and D, ill give branliest! :) Can you guys plz help me What is true about this system of equations {2x-y=5 , x=4 Which formula is incorrect because it does not represent a known ionic compound?a) Ca2O3b) CaCl2c) RbBrd) MgCl2e) K2S Express the triple integral le f(x, y, z) dV as an iterated integral for the given function f and solid region E. (b) Evaluate the iterated integral. 9. f(x, y, z) = = X 10. f(x, y, z) = xy ZA ZA z=1- r y+z=2 z=4 - y2 y=x E 0 E y 11. f(x, y, z) = x + y 12. f(x, y, z) = 2 ZA ZA z = 4 + x x+z=2 x=y z=4-x z = 4 - y2 0 E E X A 64-year-old client reports symptoms consistent with a transient ischemic attack (TIA) to the physician in the emergency department. After completing ordered diagnostic tests, the physician indicates to the client what caused the symptoms that brought him to the hospital. What is the origin of the client's symptoms?a) Hypertensionb) Cardiac diseasec) Diabetes insipidusd) Impaired cerebral circulation Mrs. Carroll asked her students to write an exponential function that represents a growth rate of 15% each year with an initial value of 1,000. Which student completed the task correctly m - 2 = 3 its not a slope question If MN = 29.5, what is MQ? Which arrow represents the centripetal acceleration? Last-Minute Shopper #1 paid $102 for 3 gizmos and6 thingamajigs. Last-Minute Shopper #2 paid $179for 5 gizmos and 11 thingamajigs. Assume they bothshopped at the same store and bought the samebrands and model numbers, and then answer thequestions below.a) How much did each gizmo cost?b) How much did each thingamajig cost? Personal Narrative need help Distinguish among the three main wind systems. find the quotient of 1,644 and 4 what happens at the initial interview between wariuki and douglas jones? he is cast out by the parents for his dress. . he leaves in shame because he cannot afford a church wedding. he is welcomed in immediately. wauriki proposes that he and miramu elope. Which of the following is an irrational number? A B 0.16 C 2.53 D -1/5