Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside attack on the internal network. They specialize in building secure firewalls as well as complex intrusion detection systems designed to keep intruders out. They watch and monitor the incoming message traffic very closely. But no matter how well they protect the private network from outside access without proper authority, they do not help prevent an attack by a malicious or disgruntled employee from the inside. And they cannot prevent breaches due to a simple lack of understanding of security policy by internal employees.When do YOU think an organization needs information systems security policies? Why?

Answers

Answer 1

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

It defines what is required from organization’s employees for the security of the IT systemsInformation security policies provide a means to secure the organization against external and internal threats Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities Information security policies are created to hold each employee responsible with regard to information security

Related Questions

true or false you can create a. network with 2 computers?

Answers

Explanation:

true true jsjsdkdkskdkdksksksksk

Answer:

True :)

Explanation:

29. Find and correct the error 4( x -5 )= 4x -5​

Answers

Answer:

L.H.S = 3 4 x + 3 ≠ R.H.S. The correct statement is 3 4 x + 3 = 3 4 x + 3

Answer:

4x-20

Explanation:

4(x-5) = x(4) - 5(4)

= 4x-20

1. Write a one-page review of an article about the subject of operating systems that
appeared in a recent computing magazine or academic journal. Give a summary of
the article, including the primary topic, your own summary of the information
presented, and the author's conclusion. Give your personal evaluation of the article,
including topics that made the article interesting to you (or not) and its relevance to
your own experiences. Be sure to cite your source.
(Reference: Mello, John. Microsoft Hardens Latest Windows Version against Attackers. Tech
News World, Jan 17, 2017.)

Answers

David Jones wrote an article about operating system security issues and how companies like Intel, Microosoft, Gooogle, and others are attempting to deal with them.

What exactly is an operating system?

An interface between a computer user and its hardware is an operating system (OS). An operating system is software that handles input and output, handles file and memory management, handles process management, and controls peripheral devices like printers and disk drives.

What are the primary roles that the operating system plays?

The management of files and folders is the primary function of an operating system (OS). The management of a computer's files falls under the purview of operating systems. File creation, opening, closing, and deletion are all included in this.

To know more about operating system visit :-

https://brainly.com/question/24760752

#SPJ1

Write a program that prompts for a positive integer and prints the factors of all integers from 1 to that input integer. For example, if the user enters the integer 6 then the program will output: 1: 1 2: 1, 2 3: 1, 3 4: 1, 2, 4 5: 1, 5 6: 1, 2, 3, 6 Determine the appropriate loop(s) to use (while loop or for loop) when a task requires looping. Study the tests below to help you understand program behavior. Use the following tests and your own tests to run against your solution in Develop mode. These are the same tests that your solution will be executed against when you submit your work in Submit mode. User input is in bold:

Answers

74(Frequency) or 34(frequency)

Which of the following is the best example of a purpose of e-mail?
rapidly create and track project schedules of employees in different locations
easily provide printed documents to multiple people in one location
quickly share information with multiple recipients in several locations
O privately communicate with select participants at a single, common location

Answers

Answer:

The best example of a purpose of email among the options provided is: quickly share information with multiple recipients in several locations.

While each option serves a specific purpose, the ability to quickly share information with multiple recipients in different locations is one of the primary and most commonly used functions of email. Email allows for efficient communication, ensuring that information can be disseminated to multiple individuals simultaneously, regardless of their physical location. It eliminates the need for physical copies or face-to-face interactions, making it an effective tool for communication across distances.

Explanation:

3.2 lesson practice edhesive ​

Answers

Answer:

3.2 Question 1

x = float(input("Enter a number: "))

if (x > 45.6):

   print("Greater than 45.6")

3.2 Question 2

x = float(input("Enter your grade: "))

if (x >= 90):

   print("Great! ")

Explanation:

I hope this works I do not know exactly what you were asking for

Write a Java program that will be using the string that the user input. That string will be used as a screen
saver with a panel background color BLACK. The panel will be of a size of 500 pixels wide and 500 pixels in
height. The text will be changing color and position every 50 milliseconds. You need to have a variable
iterator that will be used to decrease the RGB color depending on if it is 0 for Red, 1 for Green, or 2 for Blue,
in multiples of 5. The initial color should be the combination for 255, 255, 255 for RGB. The text to display
should include the Red, Green, and Blue values. The initial position of the string will be the bottom right of
the panel and has to go moving towards the top left corner of the panel.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that string will be used as a screen saver with a panel background color BLACK.

Writting the code:

import java.awt.*;

import java.util.*;

import javax.swing.JFrame;

class ScreenSaver

{

    public static void main( String args[] )

   {

       Scanner sc=new Scanner(System.in);

       System.out.println("Enter a name you want add as a Screen_saver:");

       String s=sc.nextLine(); //read input

       sc.close();

           JFrame frame = new JFrame( " Name ScreenSaver " );

       frame.setDefaultCloseOperation( JFrame.EXIT_ON_CLOSE );

             JPanalSaver saver1JPanel = new JPanalSaver(s);

               saver1JPanel.setPreferredSize(new Dimension(500,500));

               frame.add( saver1JPanel );

       frame.setSize( 500, 500 ); // set the frame size (if panel size is not equal to frame size, text will not go to top left corner)

       frame.setVisible( true ); // displaying frame

   }

}

JPanalSaver.java

import java.awt.Color;

import java.awt.Graphics;

import javax.swing.JPanel;

public class JPanalSaver extends JPanel {

   int x1 = 500, y1 = 500;

   int r = 255, g1 = 255, b = 255;

   String color;

   int iterator = 0;

   JPanalSaver(String c) {

       color = c;

   }

   public void paintComponent(Graphics g) {

       super.paintComponent(g); // call super class's paintComponent

       x1 = x1 - 5;

       y1 = y1 - 5;

              if (iterator ==0) {

                     r = Math.abs((r - 5) % 255);

           iterator = 1;

       } else if (iterator == 1) {

           g1 = Math.abs((g1 - 5) % 255);

           iterator = 2;

       } else {

           b = Math.abs((b - 5) % 255);

           iterator = 0;

       }

       g.setColor(new Color(r, g1, b));

       g.drawString(color + " " + r + " " + g1 + " " + b, x1, y1); //string + value of RGB

       //top left position (0,0 will not display the data, hence used 5,10)

       if (x1 > 5 && y1 > 10)

       {

           repaint(); // repaint component

           try {

               Thread.sleep(50);

           } catch (InterruptedException e) {

           }   //50 milliseconds sleep

       } else

           return;

   }

See more about JAVA at brainly.com/question/13208346

#SPJ1

Write a Java program that will be using the string that the user input. That string will be used as a

What are 4 apps like giggl? There are lots of portals open and it's so laggy, please give me good alternatives.

Answers

Not sure what that is, but I use Discord, if that's similar.


A technician assists Joe, an employee in the sales department who needs access to the client database, by granting him
administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database.
Which of the following security practices was violated?
Principle of least privilege
Strong password policy
Entry control roster
Multifactor authentication

Answers

Answer:

Principle of least privilege

Explanation:

The principle of least privilege means the user has only access to that data which is required to complete the task

Therefore as per the given situation, Joe who is an emloyee wants to access the client data base but later on he needs to access the payroll data base

So as per the given situation, the first option should be violated

Hence, the same is to be considered

In reinforcement learning, an episode:

Answers

In reinforcement learning, an episode refers to a sequence of interactions between an agent and its environment. It represents a complete task or a single run of the learning process.

The reinforcement learning

During an episode, the agent takes actions in the environment based on its current state. The environment then transitions to a new state, and the agent receives a reward signal that indicates how well it performed in that state. The agent's objective is to learn a policy or a strategy that maximizes the cumulative reward it receives over multiple episodes.

The concept of episodes is particularly relevant in episodic tasks, where each episode has a clear start and end point.

Read more on reinforcement learning here:https://brainly.com/question/21328677

#SPJ1

What does this Python expression evaluate to?

100 != 100

True

False

“True”

“False”

Answers

Answer: False

Explanation:

I need help finishing this coding section, I am lost on what I am being asked.

I need help finishing this coding section, I am lost on what I am being asked.
I need help finishing this coding section, I am lost on what I am being asked.
I need help finishing this coding section, I am lost on what I am being asked.

Answers

Answer:

when cmd is open tell me

Explanation:

use cmd for better explanatios

Which one of the statements is true about cryptocurrency?

Cryptocurrency controls blockchain technology.
Cryptocurrency is a type of digital asset that can be owned.
Cryptocurrency is a type of hash that gives value to a block of data.
Cryptocurrency gets its value based on how many blocks of data it is made of.

Answers

Cryptocurrency is a type of digital asset that can be owned.

The true statement about cryptocurrency is that it is a type of digital asset that can be owned.

Thus option B is correct.

Here,

Cryptocurrency is a digital or virtual currency that uses cryptography (the practice of secure communication) for security and operates independently of a central bank. It is decentralized and can be used to make transactions without the need for an intermediary such as a bank.

Cryptocurrency can be owned and stored in digital wallets, just like traditional money. Its value is determined by market demand and supply, meaning that the price of cryptocurrency can be highly volatile.

Cryptocurrency is not a type of hash or a control of blockchain technology.

Know more about cryptocurrency,

https://brainly.com/question/31646159

#SPJ6

Explain what it means when industry leaders indicate that they are moving their organization from knowledge-centered support to knowledge-centered service. Also describe some of the implications for this movement towards knowledge centered service. What are some of the struggles employees may face?

Answers

Organizational support teams may find it difficult to keep up, but Knowledge Centered Service is changing that. Knowledge is emphasized as a crucial asset for providing service and support in the knowledge-centered service model, or KCS

What are some of the benefits of using KCS methodology?Businesses that employ KCS methodology discover that it offers a variety of advantages. It gradually enhances customer satisfaction, lowers employee turnover, and shortens the time required for new hires to complete their training. Ursa Major is working to set up a program with these features in order to achieve those benefits.The goal of the content standard is to formally document or use a template that outlines the choices that must be made regarding the structure and content of KCS articles in order to promote consistency. KCS articles come in two varieties: - Close the loop since articles are produced in response to customer demand.Digital is a way of life in the twenty-first century, particularly inside any business or organization. It seems that support functions can hardly keep up with the significant changes in innovation and productivity. Now that technical support is a daily part of customer interactions, it is no longer the internal, back-office division that customers never saw. Organizational support teams may find it difficult to keep up, but Knowledge Centered Service is changing that.

To learn more about KCS methodology refer to:

https://brainly.com/question/28656413

#SPJ1

If you are upgrading your computer, which setup would give you the highest
processing speed?
OA. 4.1 GHz CPU, 8 cores, hard disk drive, 16 GB RAM
B. 4.1 GHZ CPU, 16 cores, solid-state drive, 32 GB RAM
C. 3.8 GHz CPU, 4 cores, hard disk drive, 4 GB RAM
D. 3.8 GHz CPU, 8 cores, solid-state drive, 8 GB RAM

Answers

B is the correct answer.

Can someone help me with the following logical circuit, perform two actions. FIRST, convert the circuit into a logical
statement. SECOND, create a truth table based on the circuit/statement. (20 pts. each for statement and
truth table.

Can someone help me with the following logical circuit, perform two actions. FIRST, convert the circuit

Answers

Creation of Truth Table Based on the logical statement, we can create a truth table as shown below:

A B (not A) (not A) and B (not A) and B or A A or (not A) and B 0 0 1 0 1 0 0 1 0 0 1 0 1 1 0 1 1 0 1 1 1 0 1 1 0 1 1 0 1 1 1

The first two columns show the input values, the next column shows the output of the NOT gate, then the output of the AND gate, then the output of the OR gate and finally the output of the logical statement.

We can observe that the output of the logical statement is the same as the output of the OR gate.

Given the logical circuit, we are required to perform two actions on it. Firstly, convert the circuit into a logical statement. Secondly, create a truth table based on the circuit/statement. Let's understand how to do these actions one by one:Conversion of Circuit into Logical Statement.

The given circuit contains three components: NOT gate, AND gate and OR gate. Let's analyze the working of this circuit. The two input variables A and B are first passed through the NOT gate, which gives the opposite of the input signal.

Then the NOT gate output is passed through the AND gate along with the input variable B. The output of the AND gate is then passed through the OR gate along with the input variable A.We can create a logical statement based on this working as: (not A) and B or A. This can also be represented as A or (not A) and B. Either of these statements is correct and can be used to construct the truth table.

Creation of Truth Table Based on the logical statement, we can create a truth table as shown below:

A B (not A) (not A) and B (not A) and B or A A or (not A) and B 0 0 1 0 1 0 0 1 0 0 1 0 1 1 0 1 1 0 1 1 1 0 1 1 0 1 1 0 1 1 1

In the truth table, we have all possible combinations of input variables A and B and their corresponding outputs for each component of the circuit.

The first two columns show the input values, the next column shows the output of the NOT gate, then the output of the AND gate, then the output of the OR gate and finally the output of the logical statement.

We can observe that the output of the logical statement is the same as the output of the OR gate.

For more such questions on Truth Table, click on:

https://brainly.com/question/13425324

#SPJ8

Can some one help me right a 3 paragraph sentace on iPhone and androids specs it has too be 7 sentaces each paragraph

Can some one help me right a 3 paragraph sentace on iPhone and androids specs it has too be 7 sentaces

Answers

Answer:

iPhone

The iPhone has come a long way since its first model, the iPhone 3G. Now, the current iPhone 11 Pro Max comes with a 6.5-inch Super Retina XDR OLED display, a triple-camera system, and up to 512GB of storage. It has a powerful A13 Bionic chip with a neural engine and is powered by a 3,969 mAh battery. With its dual-SIM support and 5G capability, the iPhone is a great choice for those who want the latest and greatest in mobile technology.

Android

Android phones come in a wide range of specs and sizes, so there’s something for everyone. The current top-of-the-line Android phone is the Samsung Galaxy S20 Ultra 5G, which boasts a 6.9-inch Dynamic AMOLED display, a triple-camera system, and up to 512GB of storage. It has a Qualcomm Snapdragon 865 processor and is powered by a 5,000 mAh battery. With its dual-SIM support and 5G capability, the Android phone offers a great mix of performance and features.

Comparison

When it comes to specs, the iPhone and Android phones offer a comparable experience. Both come with powerful processors and large displays, as well as dual-SIM support and 5G capability. The main differences are in design and the camera systems. The iPhone has a unique design and a triple-camera system, while Android phones come in a variety of shapes and sizes, and often feature four or more cameras. The choice ultimately comes down to personal preference.

Make sure your animal_list.py program prints the following things, in this order:
The list of animals 1.0
The number of animals in the list 1.0
The number of dogs in the list 1.0
The list reversed 1.0
The list sorted alphabetically 1.0
The list of animals with “bear” added to the end 1.0
The list of animals with “lion” added at the beginning 1.0
The list of animals after “elephant” is removed 1.0
The bear being removed, and the list of animals with "bear" removed 1.0
The lion being removed, and the list of animals with "lion" removed

Need the code promise brainliest plus 100 points

Answers

Answer:#Animal List animals = ["monkey","dog","cat","elephant","armadillo"]print("These are the animals in the:\n",animals)print("The number of animals in the list:\n", len(animals))print("The number of dogs in the list:\n",animals.count("dog"))animals.reverse()print("The list reversed:\n",animals)animals.sort()print("Here's the list sorted alphabetically:\n",animals)animals.append("bear")print("The new list of animals:\n",animals)

Explanation:

Mark’s friends told him about an automated program that sends unsolicited messages to multiple users. Which type of program were Mark’s friends referring to?

Answers

Answer:

Spambots.

Explanation:

Spambots send thousands of messages world wide once they get your information things like email and such and send out unsolicited things out constantly. 

In cryptography, the concept known as the web of trust (WOT) allows compatible systems to establish what?


a method to destroy data in which the magnetic field of a storage drive is removed or reduced


part of an encryption protocol that calculates and compares data on either end


the necessary authenticity between a public key and its owner


the process of securing a computer system by reducing its vulnerabilities

Answers

In cryptography, the concept known as the web of trust (WOT) allows compatible systems to establish option C: the necessary authenticity between a public key and its owner.

How does PGP make use of the idea of trust?

PGP relies on a Web of trust model rather than a single certificate authority to authenticate digital certificates. According to the Web of Trust, if you accept that my digital certificate verifies my identity, you must also accept all the other digital certificates that I accept.

Hence, To establish the validity of the connection between a public key and its owner, PGP, GnuPG, and other OpenPGP-compatible systems use the cryptographic concept of a web of trust.

Learn more about cryptography from

https://brainly.com/question/88001
#SPJ1

What tool is used to cut heavy walled conduit? A.portable band saw
B.reciprocating saw
C.table saw
D.circular saw

Answers

The tool commonly used to cut heavy-walled conduit is (option A). Portable band saws

What is the tool?

Portable saws that are specifically crafted can effortlessly slice through an array of substances comprising of metallic tubes and conduits.

The band saw's mobility allows it to be utilized for cutting specific lengths of heavy-walled conduit in on-site or field settings.  The tool's ability to make precise and effective cuts through dense materials such as conduit has made it a popular choice for such applications.

Learn more about Portable band saws from

https://brainly.com/question/28220210?source=archive

#SPJ1

An organization has hired a new remote workforce. Many new employees are reporting that they are unable to access the shared network resources while traveling. They need to be able to travel to and from different locations on a weekly basis. Shared offices are retained at the headquarters location. The remote workforce will have identical file and system access requirements, and must also be able to log in to the headquarters location remotely. Which of the following BEST represent how the remote employees should have been set up initially?

a. User-based access control
b. Shared accounts
c. Group-based access control
d. Roaming profiles
e. Individual accounts

Answers

Answer:

A

Explanation:

Ez put me as brainlist

What formatting changes do spreadsheet applications permit in the rows and columns of a spreadsheet?
Row and Column Formatting Options
Formatting rows and columns is similar to cell formatting. In an OpenOffice Calc spreadsheet, you can format data entered into rows and columns with the help of the Rows and Columns options. You can insert rows and columns into, or delete rows and columns from, a spreadsheet. Use the Insert or Delete rows and columns option on the Insert tab. Alternatively, select the row or column where you want new rows or columns to appear, right-click, and select Insert Only Row or Only Column options.

You can hide or show rows and columns in a spreadsheet. Use the Hide or Show option on the Format tab. For example, to hide a row, first select the row, then choose the Insert tab, then select the Row option, and then select Hide. Alternatively, you can select the row or columns, right-click, and select the Hide or Show option.

You can adjust the height of rows and width of columns. Select Row and then select the Height option on the Format tab. Similarly, select Column, then select the Width option on the Format tab. Alternatively, you can hold the mouse on the row and column divider, and drag the double arrow to the position. You can also use the AutoFit option on the Table tab to resize rows and columns.

Answers

Formatting rows and columns in a spreadsheet is similar to cell formatting. In OpenOffice Calc, users can insert or delete rows and columns, hide or show them, and adjust the height and width of the rows and columns.

What is spreadsheet?

A spreadsheet is an electronic document that stores data in a tabular format and is used to perform calculations and analysis. It is a type of software program designed to assist with data entry, calculations, and other analysis tasks. Spreadsheets often contain formulas and functions that allow users to quickly and accurately calculate values based on the data they enter. Spreadsheets also provide users with the ability to present data in an organized and visually appealing way. Spreadsheets are an essential tool for businesses, schools, and other organizations to help them make decisions, track progress, and manage resources.

Users can access these options from the Insert, Format, and Table tabs. Alternatively, they can select the row or column they want to format, right-click, and select the relevant option. Additionally, users can hold the mouse on the row or column divider and drag the double arrow to the desired position. The AutoFit option on the Table tab can also be used to resize rows and columns.

To learn more about spreadsheet
https://brainly.com/question/30039670
#SPJ1

What is a trojan horse in computer science?

Answers

Answer:A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program

Explanation:

Why should you try out a camera bag before taking it on a vacation?

So you can make sure that your passport fits in it
So that you can make sure it is comfortable
So that you can get a different color
So that you can add more equipment

Answers

Answer:

b or c

Explanation:

I think it’s B but I could also be c

QUESTION 1 Choose a term from COLUMN B that matches a description in COLUMN A. Write only the letter (A-L) next to the question number (1.1-1.10) in the ANSWER BOOK. COLUMN A 1.1. Substances that provide nourishment to the body 1.2. How you think and feel about something 1.3. Helps to cope with the challenges of being a student Exercise relating to increasing your heart rate 1.5. Having traits or qualities traditionally associated with 1.4. men 1.6. Seeing, hearing, or sensing something that is not really there 1.7. 1.8. Leaving everything till the last minute Is Chapter 2 in the Constitution of SA 1.9. Group of people who share notes and information 1.10. Ability to exercise for extended period of time COLUMN B A hallucination B nutrients C study group D procrastinate E endurance F Bill of Rights G Cardio-vascular H masculine I attitude J resilience K strength L flexibility ​

Answers

Answer:

1.1 B nutrients 1.2 I attitude 1.3 J resilience 1.4 H masculine 1.5 L flexibility 1.6 A hallucination 1.7 D procrastinate 1.8 F Bill of Rights 1.9 C study group 1.10 E endurance

Explanation:

What is the practical application of science to enhance mankind’s problem solving ability

Answers

Answer:

Science is concerned about aggregating and understanding perceptions of the physical world.

Explanation:

Science is concerned about aggregating and understanding perceptions of the physical world. That seeing alone takes care of no issues. Distinctive individuals need to follow up on that comprehension for it to help take care of issues. For example, science has discovered that ordinary exercise can bring down your danger of coronary illness.

In 2-5 paragraphs, describe how technology helps business professionals to be more efficient.

Answers

The ways that technology helps business professionals to be more efficient is that  Business professionals may stay more organized, communicate more effectively, and keep firms secure with the use of technology.

Technology makes it simpler to connect with employees by utilizing e-mail and memos, and it helps keep employee information and corporate paperwork a lot more organized using computers and software.

How does technology improve the productivity of business people?

By streamlining time-consuming procedures, technology also increases office productivity. For instance, using document management software eliminates the need for manual data entry, filing, as well as in file retrieval.

Therefore, one can say that Technology can be used to safeguard private executive decisions, financial data, and other forms of proprietary information that gives a company a competitive edge. Simply simply, technology aids firms in protecting their ideas from rivals.

Learn more about technology from

https://brainly.com/question/1162014
#SPJ1

write an algorithm to find the area of a circle of radius r

Answers

Answer:

e=mc^2

Explanation:

You would like the cell reference in a formula to remain the same when you copy
it from cell A9 to cell B9. This is called a/an _______ cell reference.
a) absolute
b) active
c) mixed
d) relative

Answers

Answer:

The answer is:

A) Absolute cell reference

Explanation:

An absolute cell reference is used in Excel when you want to keep a specific cell reference constant in a formula, regardless of where the formula is copied. Absolute cell references in a formula are identified by the dollar sign ($) before the column letter and row number.

Hope this helped you!! Have a good day/night!!

Answer:

A is the right option absolute
Other Questions
I NEED HELP ASAP! I WILL GIVE BRAINLIEST!Has anybody do the assignment called The American Search of Utopia? I need help with the writing challenge. The writing challenge says The author ends by suggesting that space will be the next utopian-building site. When people do finally achieve the technology to colonize space, how will this milestone compare to the opening of North America in the 1600s? How will the two events provide common opportunities for utopia seekers? How will they be totally different? Do you agree with the authors prediction? Why or why not? Assume that the economy has an 25% chance of booming, a 33% chance of being normal, and being recessionary the remainder of the time. A stock is expected to return 21.18% in a boom, 10.24% in a normal economy, and 14.26% in a recession. What is the expected return on the stock? Enter your answer as a percentage, rounded off to two decimal points. Do not enter % in the answer box. how can a soccer ball and a small tennis ball bouncing relates to newtons first law interita? An electron is trapped in an infinitely deep potential well 0.300 nm} in length. (a) If the electron is in its ground state, what is the probability of finding it within 0.100 nm of the left-hand wall? Describe what makes a computer or an airplane a global product.WILL GIVE BRAINLIEST IF ANSWERED RIGHT beginning january 1, year 1, justin deposits 12 monthly payments of $1,000 in a savings account, with the last payment made on december 1, year 1. if the monthly interest rate is 1%, what is the present value of the deposits? what does scout see as the difference between the world of women and the world of men? Michael Corporation manufactures railroad cars, which is its only product. The standards for the railroad cars are as follows:Standard tons of direct material (steel) per car 4Standard cost per ton of steel $ 17.00During the month of March, the company produced 1,650 cars. Related production data for the month follows:Actual materials purchased and used (tons) 6,650Actual direct materials total cost $ 115,000What is the direct materials quantity variance for the month?A) $ 850 favorableB) $ 850 unfavorableC) $ 1,950 favorableD) $ 1,950 unfavorable Find the greatest common factor for each problem.use the t-chart to slow? 16 and 40Gcf: which accessdata feature compares known file hash values to files on your evidence drive or image files to see whether they contain suspicious data? Which of the following habits will help you stay on the wellness end of the health continuum?staying up too late and not getting enough restgoing on a calorie-limiting dietjogging regularly with friends going to the movies need to slove the expression?2x+7=1 As a result of the Missouri Compromise.Missouri was required to free its slaves when they reached full adulthood.slavery was outlawed in all states.there were more slave than free states in the Union.slavery was banned north of 36 30 in the Louisiana Purchase territory. true or false a number that corresponds to a point is an origin PLEASE HELPDrag the expressions into the boxes to correctly complete the table.Polynomial Not a polynomial algebra what is agebra. Write the inequality (without solving) ANYTHING THAT CAN CAUSE INJURY, DISEASE DEATH TO HUMANS DAMAGE TO PERSONAL OR PUBLIC PROPERTY DETERIORATION OR DESTRUCTION OF PART OF THE ENVIROMENT IS KNOWN AS WHAT?A A HAZARDB PERCEIVED RISKC FEARD HAZARD ASSESSMENT a nurse attended a seminar on community-based health care. which information indicates the nurse has a good understanding of community-based health care? solve the system[tex]2x + y = 9 \\ x - y + 5z = 8 \\ 3y - 2z = 1[/tex]