if mark has a read-write permission to the share \\fileserver\securefiles and a read-only permission to the file coolstuff.docx on the ntfs file system shared by the file share, he is able to perform which action?

Answers

Answer 1
If Mark has a read-write permission to the share \fileserver\securefiles and a read-only permission to the file coolstuff.docx on the NTFS file system shared by the file share, he is able to perform the following actions:

Read the contents of coolstuff.docx.
Copy coolstuff.docx to another location on the file share or to another location on his local machine.
Create, edit, and delete other files and folders on the \fileserver\securefiles share.
Modify the permissions on coolstuff.docx or other files and folders on the \fileserver\securefiles share.
However, Mark would not be able to modify the contents of coolstuff.docx, as he only has read-only permission to that file

Related Questions

You are updating the operating system on your iPad. Your iPad is connected to your computer and you are using iTunes to install the update.
Which of the following BEST describes what would happen to your iPad if you disconnect it before the operating system update is complete?
iTunes would pause the update process until you reconnect your iPad to your computer.
If you disconnect during the update, the operating system could become corrupted.
The update would continue wirelessly (if a wireless network is available).
Your iPad would revert to the previous version of the operating system, so you'd have to start the update again from the beginning to get the update.

Answers

If you disconnect your iPad before the operating system update is complete while using iTunes, the following option BEST describes what would happen.

If you disconnect during the update, the operating system could become corrupted. Disconnecting the iPad during an operating system update can interrupt the update process and lead to potential issues. This interruption can cause the operating system to become corrupted, resulting in an unstable or non-functional state for your iPad. It is generally recommended to ensure a stable and uninterrupted connection between your iPad and the computer throughout the entire update process to avoid any potential problems.

Learn more about operating system here:

https://brainly.com/question/29579972

#SPJ11

What parts of the computer does it not need to function?​

Answers

Fancy lights, mouse, keyboard, you can do fan but the computer will eventually overheat, it need coolant for it to run for a long while

The statement of cash flows classifies items as
a. operating and nonoperating.
b. operating, investing, and financing.
c. current and noncurrent.
d. recurring and nonrecurring.

Answers

Items are categorised as operating, investment, and financing in the statement of cash flows.

What is cash flow?The amount of money that enters and leaves your company over a specific time period is measured as cash flow. More money is entering into your business than is leaving it when you have a positive cash flow. Contrarily, this is true when your cash flow is negative. The net flow of cash and cash equivalents into and out of an organisation is referred to as cash flow. Outflows are represented by the money spent, while inflows are represented by the money received.Spending that occurs naturally during business operations is included in cash flow from operations. Payroll, the price of items sold, rent, and utility bills are a few examples of these cash outflows.

Therefore, the correct option is b) operating, investing, and financing.

To learn more about cash flows, refer to:

https://brainly.com/question/21329718

Given:



public Customer(String name, int measurement) {…}



How would you instantiate a Customer object using this constructor?




1. Customer c1 = new Customer("Pinky", 3);




2. Customer c1 = new Customer("Pinky", "S");




3. Customer c1 = new Customer();




4. Customer c1 = new Customer("Pinky", 3, items);




5. Customer c1 = new Customer("Pinky");




Customer c1 = new Customer("Pinky", "S", items);

Answers

A constructor is a special method that is used to initialize objects and is called when the object is created. The constructors always have the same name as that of the class. Whenever an object is created using the new() keyword, at least one constructor is invoked to allocate memory for the object.

When it comes to invoking the constructor with parameters, the argument types and order should match with that of the constructor in the class.The given constructor takes two parameters, one is of String data type, and the other is of integer data type, so to create an object for this constructor, we need to pass the string and integer arguments as well. From the given options, option 1 contains the correct arguments with correct datatypes. Hence, option 1 is the correct statement to instantiate a Customer object using the constructor, public Customer(String name, int measurement) {...}.Option 2 has String and a character as arguments, which is incorrect, hence it is an incorrect statement.

Similarly, option 3 has no arguments, which is incorrect. In option 4, there are three arguments and items is not defined, hence it is also an incorrect statement. Option 5 has only one argument of string type, which is incorrect for this given constructor. Thus, option 1 is the correct statement to instantiate a Customer object using the constructor, public Customer(String name, int measurement) {...}.

The correct statement out of the following to instantiate a Customer object using the constructor, public Customer(String name, int measurement) {...}, is: 1. Customer c1 = new Customer("Pinky", 3).

To know more about constructor visit

https://brainly.com/question/32203928

#SPJ11

An Administrator wants to make a list of all prospects who complete the Contact Us form but only wants them to be added the first time they complete the form. If a prospect is ever removed from the list, they shouldn't be able to get added back to it. What is the best way to create this type of list

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The easiest way to build such a list is by using an algorithm rule, where the prospects who complete the form are then matched with the rule and added to the list because the developer would also like to list of the all applicants, who fill out all the contact us Application, but still only prefer to also have them added when they fill-up the form first. When an outlook is ever omitted from the list, it should not be included.

Which of the following are necessary components for encryption and decryption operations when using an asymmetric encryption system?

Answers

Asymmetric encryption, also known as public key cryptography, is a widely used method for secure communication and data protection. It involves the use of a key pair - a public key for encryption and a private key for decryption.

There are several necessary components for encryption and decryption operations when using an asymmetric encryption system:

Key pair: This consists of a public key, which is shared openly, and a private key, which must be kept secret. The public key is used for encryption, and the private key is used for decryption.Encryption algorithm: This is the mathematical process used to convert the plaintext message into an encrypted ciphertext using the public key. Common algorithms include RSA, ECC, and ElGamal.Decryption algorithm: This is the mathematical process used to convert the encrypted ciphertext back into the original plaintext message using the private key.Digital signature: An additional security feature that can be incorporated, digital signatures allow the receiver to verify the authenticity of the sender by using the sender's public key to validate a signature created with their private key.

To perform encryption and decryption operations in an asymmetric encryption system, you need a key pair (public and private keys), encryption and decryption algorithms, and optionally, a digital signature for authenticity. These components work together to ensure secure communication and protect sensitive information.

To learn more about Asymmetric encryption, visit:

https://brainly.com/question/15187715

#SPJ11

what is a file named TR/Dldr.Adload.ugkeo doing on my computer

Answers

Answer:

That's brainly's way of making sure you're not a bot

Explanation:

I don't actually know

Answer:

did you download any file from this user or this similar link look at the picture below. If you please take it to someone who know how to get rid of viruses

what is a file named TR/Dldr.Adload.ugkeo doing on my computer

During which phase of the software development process are developers most likely to log bugs?

Answers

Answer:

During the Evaluation phase of software development process are developers most likely to log bugs.

Hope this helps! :)

when a single network server can't handle all the data processing requests, more servers can be added and joined together to create a . choose all that apply, then click done.

Answers

what are the answer choices??

Upload your dream job research that includes a 150-word description of the career and why it would be good for you, a 150-word description of the training involved, a 75-word explanation for why you selected a certain position, and the job posting that you selected.

Answers

A career that many people may find interesting and fulfilling is being a physical therapist or work as cybersecurity analyst.  

A physical therapist is responsible for helping people who have suffered from an injury or illness recover and regain their strength and mobility. Physical therapists use various techniques such as exercise, massage, and stretches to help their patients. As a physical therapist, one can work in a variety of settings, including hospitals, clinics, and sports teams.

If one wants to become a physical therapist, it involves obtaining a degree in physical therapy and obtaining a license to practice. Most physical therapists have a doctorate in physical therapy, which typically takes around three years to complete. After obtaining a degree, physical therapists also need to pass a licensing exam.

I selected this position because I find it rewarding to help others and seeing the progress that people make through my help would be fulfilling. Moreover, this career has a high demand, and there are plenty of opportunities for growth and advancement.

Here is a sample job posting for a physical therapist:

Title: Physical Therapist

Location: Los Angeles, CA

Description: We are seeking a highly motivated physical therapist to join our team. The ideal candidate should have a degree in physical therapy and a valid license to practice. The physical therapist will be responsible for developing and implementing treatment plans, working with patients to achieve their goals, and communicating with other healthcare professionals. The successful candidate should have excellent communication and interpersonal skills.

Salary: Competitive salary and benefits package

If you are interested in this position, please submit your resume and cover letter for consideration.

To know more about cybersecurity  visit

https://brainly.com/question/30409110

#SPJ11

WILL GIVE BRAINLEST!!!!!!!! 10 POINTS!!!!
What are the three necessary parts of an if statement?
Question 13 options:
1) if, a variable, a semi-colon
2) if, a print statement, a colon
3) if, a condition, a colon
4) if, a print statement, a semi-colon

Answers

Answer:

option 4 : if, a print statement, a semi-colon

Explanation:

Hope it helps :)

Answer:

i think 4

Explanation:

hope it helps

a two-digit code used in addition to the procedure code to indicate circumstances in which the procedure differs in some way from that described is called a

Answers

The two-digit code used in addition to the procedure code is called a modifier. It is used to indicate that the procedure performed had some special circumstances that set it apart from the standard procedure code description.

Modifiers provide additional information to payers and coders regarding the nature of the procedure performed. They are necessary to ensure accurate payment and prevent fraudulent billing. Common modifiers include those indicating a procedure was performed on multiple sites, with a different technique, or by a different provider. The two-digit code used in addition to the procedure code is called a modifier. Modifiers are typically added to the end of the procedure code and are an essential component of the medical coding and billing process.

Learn more about code here:

https://brainly.com/question/17204194

#SPJ11

a two-digit code used in addition to the procedure code to indicate circumstances in which the procedure differs in some way from that described is called a________.

why do most operating systems let users make changes

Answers

By these changes you most likely are thinking of the term 'Over Clocking'
Over Clocking is used on most Operating Systems to bring the item your over clocking to the max.
Over Clocking; is mostly used for Crypto mining and gaming.

How many times can a simulation be repeated?

Answers

Answer:

Explanation:

A general idea is that you should repeat the simulation until the results converge. An easy but illustrative example of this is that we want to see if the R function rbinom is accurate in simulating a coin toss with a given probability. We will simulate one coin toss 10000 times, and plot the percentage of heads against the number of coin tosses:

set.seed(1)

n <- 10000

result <- NULL

percent <- NULL

for (i in 1:n) {

 result[i] <- rbinom(1,1,0.5)

 percent[i] <- sum(result)/i

}

plot(seq(1:10000),percent, type="l")

abline(0.5, 0, lty=2)

explain the following types of storages


flash disk ​

Answers

Explanation:

a data storage device that uses flash memory specifically : a small rectangular device that is designed to be plugged directly into a USB port on a computer and is often used for transferring files from one computer to another. — called also thumb drive.

Answer:

storage module made of flash memory chips. Flash disks have no mechanical platters or access arms, but the term "disk" is used because the data are accessed as if they were on a hard drive. The disk storage structure is emulated.

The first flash disks were housed in Type II PC Cards for expanding laptop storage. Subsequently, flash memory disks have arrived in a variety of formats, including entire hard drive replacements (see SSD), memory cards for digital cameras (see flash memory) and modules that fit on a keychain (see USB drive

what type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms?

Answers

The type of attack you are referring to is called a "Known-plaintext attack."

In this type of attack, the attacker has access to both the encrypted (ciphertext) and decrypted (plaintext) forms of the messages. Using this information, the attacker's goal is to determine the encryption key or decryption algorithm being used. This can potentially compromise the security of the entire cryptosystem. The attacker may then use this knowledge to decrypt other ciphertexts encrypted with the same key or algorithm, without requiring any further plaintext-ciphertext pairs. Known-plaintext attacks are less common in modern cryptography, as more secure encryption algorithms and methods have been developed to counter such attacks.

To know more about Known-plaintext attacks visit:

https://brainly.com/question/31824190

#SPJ11

What is incorrect about the following code? Suggest a possible revision of the code to correct the error.
Xtrengoazbside Thai to deliveza! pstrong>

Answers

This is really cool but no one cares

suppose the client-to-server http get message is the following: get /kurose ross/interactive/quotation9.htm http/1.1 host: gaia.cs.umass.edu accept: video/mpeg accept-language: en-us, fr if-modified-since: wed, 21 feb 2018 11:50:08 -0800 user agent: mozilla/5.0 (windows nt 6.1; wow64; rv:9.0.1) gecko/20100101 firefox/9.0.1 what formats of text, images, audio, and video does the client browser prefer to receive?

Answers

quotation8.htm b)HTTP/1.1 (version 1.1) c) The client's preferred formats are Text formats include plain, HTML, XML, GIF, and PNG; audio formats include MPEG and VNF; and video formats include mp4 and MPEG. d) The character "*/*" in an HTTP request's accept header.

What kind of requests do web browsers usually make to servers?

The computer sends a "GET" request to the server that hosts the web address once the user fills in the address. The GET request, which is sent via HTTP and informs the TechTarget server that the user is looking for the HTML, is sent by the client.

What kind of response does your browser anticipate getting?

The server is fully aware of the appropriate response to provide for each request. As a result, the server replies. Each piece of information that you requested is included in this response.

To know more about Text formats visit:-

https://brainly.com/question/29496361

#SPJ4

An else statement will be executed in what situation?
the if statement is true
the if statement is false
there is a syntax error
the elif statement is executed

Answers

Answer:

The second one.

Explanation:

An `else` statement is like the alternative route for the code. I like to put it in my own words like, "If the user puts a number insted of a letter tell them they did a good job! Else(Otherwise) Tell them they need to try again.

I hope I helped!

Answer:

b) the if statement is false

Explanation:

The else statement is performed if the if statement's condition is not fulfilled. An else statement executes if an if statement is false. The else statement gives the code a backup if the if statement fails. If the if statement fails, this might propose a different course of action.

An if statement may test whether an integer is even or odd by dividing it by two. This tells the computer whether the number is even or odd. If the input number is divisible by 2, the software will print "the number is even" if it is the computer that determines whether the number is even or odd. If the input number is divisible by 2, the software will print "the number is even" if it is. The else statement may show that the "number is odd" if the integer cannot be divided by two.

Is this correct?
The Arithmetic Logic Unit converts input data to a form the computer can read, processes the data and displays that information in the form humans understand.

Answers

The Arithmetic Logic Unit converts input data to a form the computer can read, processes the data and displays that information in the form humans understand is not correct.

What is the Arithmetic Logic Unit?

The Arithmetic Logic Unit (ALU) is a digital circuit that performs arithmetic and logical operations on input data. It is a fundamental building block of the central processing unit (CPU) and is responsible for performing basic operations such as addition, subtraction, and logical operations like AND, OR, and NOT.

The Input/Output (I/O) device is the component that converts input data to a form the computer can read, and the output devices are responsible for displaying the processed data in a way that humans can understand.

In all, the ALU is a fundamental part of the CPU that performs arithmetic and logical operations on input data, but it does not convert input data to a form the computer can read or display information in the form humans understand.

Learn more about Arithmetic Logic Unit from

https://brainly.com/question/7994884

#SPJ1

Identify and describe at least three ways that analysts can improve task or interface design to help, respectively, a person who is visually impaired, hearing impaired, or mobility impaired. Insure to provide pros and cons for each.

Answers

Analysts can improve task or interface design to assist individuals with disabilities in several ways.

How is this so?

For visually impaired users, providing screen reader compatibility allows the interface to be read aloud.

Including captions or transcripts for multimedia content helps those with hearing impairments. Implementing keyboard accessibility allows users with mobility impairments to navigate using keyboard shortcuts or tab navigation.

However, these improvements may require additional development time, may not support complex visual elements, and may necessitate changes in layout and design.

Learn more about analysts at:

https://brainly.com/question/28132995

#SPJ1

For Computer Security Assignment. Please list reliable sources.

Explain with illustration (at least) Three similarities and Three differences between APTs and Ransomware attacks (put in a tabular form).

Answers

APT stands for Advanced Persistent Threat, while Ransomware attacks involve a hacker or a group of hackers encrypting a victim's files and then demanding payment to release them.

Here are three similarities and three differences between APTs and Ransomware attacks:Three similarities between APTs and Ransomware attacks:Both APTs and Ransomware attacks are malicious attacks on computer systems.Both APTs and Ransomware attacks are highly effective against their targets.Both APTs and Ransomware attacks use similar attack vectors, such as phishing, drive-by downloads, or watering holes.Three differences between APTs and Ransomware attacks:APTs are focused on espionage and theft, while Ransomware attacks are focused on monetary gain.APTs are designed to stay hidden on a victim's system for a long time, while Ransomware attacks are designed to be immediately noticeable.APTs can come from various sources, while Ransomware attacks are typically the work of a single group of hackers. Reliable sources for researching computer security include: The Computer Emergency Response Team Coordination Center (CERT/CC)3. The Information Systems Security Association (ISSA)4. The International Association of Computer Security Professionals (IACSP)5. The Electronic Frontier Foundation (EFF).

Learn more about hacker :

https://brainly.com/question/32413644

#SPJ11

What's the best way to find diamonds in Mine craft?

Answers

Answer:

go to creative mode

make a diamond block

and go to survivor mode and mine

give a like

Go to a certain y level in the ground. (I'm not sure the exact level )

Also you can go to an abandoned ship and find a map.

You can always just go into creative mode and give your self a stack and then go back into survival

Your team is about to introduce and lunch a product never seen before in Barbados, an Ultrasonic Pest Repellent, that repels pests (small insects) while causing no harm to your pets, yourself, or any animals in range.
1) In your own word, state the market objectives your team wishes to attain with the lunch of this new product. Ensure your objective are written clearly and S.M.A.R.T.
ii) Identify any concerns that may affect the completion of the objective.

Answers

Market Objectives are Increase Market Share,  Generate Revenue and Build Brand Awareness. Concerns are as follows Market Acceptance, Competitive Landscape and Regulatory Compliance.

i) Market Objectives:

1. Increase Market Share: Increase the market share of the Ultrasonic Pest Repellent in Barbados by 20% within the first year of launch.

(Specific: Increase market share, Measurable: 20% increase, Achievable: Based on market demand and competition, Relevant: Aligns with the product launch, Time-bound: Within the first year)

2. Generate Revenue: Achieve a sales target of $100,000 in the first six months after product launch.

(Specific: Achieve sales target, Measurable: $100,000, Achievable: Based on market potential and pricing strategy, Relevant: Revenue generation, Time-bound: Within the first six months)

3. Build Brand Awareness: Increase brand recognition and awareness of the Ultrasonic Pest Repellent among the target audience by implementing a comprehensive marketing campaign, resulting in 75% brand recognition within the first year.

(Specific: Increase brand awareness, Measurable: 75% brand recognition, Achievable: Through effective marketing strategies, Relevant: Brand building, Time-bound: Within the first year)

ii) Concerns:

1. Market Acceptance: There may be concerns regarding the acceptance and adoption of the Ultrasonic Pest Repellent among consumers in Barbados. Awareness and education campaigns may be required to overcome skepticism and build trust in the product's effectiveness.

2. Competitive Landscape: Competitors already offering pest control solutions may pose a challenge. It is important to differentiate the Ultrasonic Pest Repellent and effectively communicate its unique selling points to gain a competitive advantage.

3. Regulatory Compliance: Ensuring compliance with local regulations and safety standards regarding the sale and usage of pest control products is crucial. Failure to meet regulatory requirements could result in delays or restrictions on product launch.

Learn more about marketing campaign :

https://brainly.com/question/30237897

#SPJ11

What is the greatest magnitude negative number one can represent in

an 8-bit 2's complement code? Write your result in binary and

decimal.

Answers

In 2's complement notation, the range of numbers that can be represented with an n-bit system is from -2ⁿ⁻¹ to 2ⁿ⁻¹ - 1. In an 8-bit system.

This means that the maximum magnitude of a positive number that can be represented is 2⁷ = 128 and the minimum magnitude of a negative number that can be represented is -2⁷ = -128. This leaves one bit for representing the sign of the number.

The greatest magnitude negative number that can be represented in an 8-bit 2's complement code would have a binary representation of 10000000. To find the decimal equivalent, we can calculate the value of the bits using their corresponding powers of 2 and add them together:1 * -128 + 0 * 64 + 0 * 32 + 0 * 16 + 0 * 8 + 0 * 4 + 0 * 2 + 0 * 1= -128Therefore, the greatest magnitude negative number that can be represented in an 8-bit 2's complement code is -128, with a binary representation of 10000000.

To know more about range visit:

https://brainly.com/question/29204101

#SPJ11

Which do you think is more important: Motorized vehicles like cars and airplanes or computers?

Answers

Answer:

I think computers are more important

Explanation:

The average person drives a vehicle to work to go and work on a computer.

what part of the meat help you identify the less tender cuts​

Answers

If a muscle gets a lot of exercise in an animal it will be a less tender cut of meat.

OPERATION SHEET 6.2.2 Given the Neccesary tools materials and equipment identify the common faults and errors of computer when you detached the following Keyboard-PS/2 Mouse-PS/2 Hard disk- IDE cable Floppy disk drive-IDE cable Room disk-IDE CABLE

OPERATION SHEET 6.2.2 Given the Neccesary tools materials and equipment identify the common faults and

Answers

Answer: NO MORE TYPING! NO MORE CLICKING! NO MORE MEMORY! NO MORE OPERATING!

Which of the following is NOT an example of written communication?
Tweets
Blogs
Emails
A conversation between co-workers

Answers

Answer:A conversation between co-workers

Explanation:

Introduction:

Communication is medium of exchange of information. There are two types of communication , Written and Oral.

Explanation:

The written forms of communication can be both formal and informal which includes any exchange of information based on paper or either on soft copy which can be kept as an evidence for later use.

Oral communication are verbal and often non formal.

Conclusion:

The given examples of Blogs, Tweets and emails are for written communication. The only oral communication is A conversation between co-workers.

Learn more at https://brainly.com/question/24577222

If, as a result of inappropriate use of the strategic management process, performance data and activity reports indicate undesirable performance, then operational managers must: *know about it so that they can correct the employee activity.change the strategic management model.immediately notify the board of directors.allow sufficient time to pass to verify if it is the process or just the usage that is the problem.check the performance data to ensure their accuracy and take two more measurements.

Answers

Know about it so that they can correct the employee activity indicate undesirable performance. Hence option 1 is correct.

What is employee activity?

Employee activity is defined as any legitimate service rendered for pay or compensation under a written, express, or implicit contract for hire or a work study program that has been given the go-ahead.  In order to boost employee retention, happiness, and productivity, it is important for employers and employees to have a good working relationship.

Feedback must be reciprocal if it is to be effective in raising employee performance. Employees should receive frequent, constructive feedback from managers while working. Employee feedback on workflows, processes, or tasks that may be holding them down is also necessary.

Thus, know about it so that they can correct the employee activity indicate undesirable performance. Hence option 1 is correct.

To learn more about employee activity, refer to the link below:

https://brainly.com/question/14769946

#SPJ1

Other Questions
Cuntos aos _______________ t? tenen tenes tienen tienes In data analytics, a pattern is defined as a process or set of rules to be followed for a specific task.a. trueb. false in 10 seconds, a total of 5 waves crash onto the shore of a beach. The distance between each wave crest on the water is 8 meters.Find the:A. Wavelength:B. Period:C. FrequencyD. Wave speed Which of the following is a feature of weight-loss remedies?Hot baths raise the metabolic rate by 5-10% for 1-2 hours and may serve as part of a general weight-loss programDietary supplements are not necessarily tested for safety or effectivenessSauna baths may reach temperatures high enough to melt visceral but not subcutaneous fat storesBody wraps and creams that have FDA approval are helpful for weight-reduction regimes What was the purpose of literacy tests during the bourbon era? to improve education to limit access to voting to promote political activism to support the convict labor system Her alibi was typical since it was supported by similar reports. Some modern personality researchers believe our identity may be helpfully revealed using ___________which involves collecting a rich narrative detailing our unique life history. Calculate and express your answer in decimal form: 1/2 x 17 * what is the climax of the story ''me talk pretty one day''? how do you know? Please help I will mark brain! Element x decays radioactively with a half life of 15 minutes. if there are 960 grams of element x, how long, to the nearest tenth of a minute, would it take the element to decay to 295 grams?y=a(.5)^(t/h) 5. Three square tiles are placed The total area is 300cm. Whatis the perimeter of one of the squares. A new robotic production plant lower the cot of production and will reult in increae in ____? Each of the following is true for Listeria monocytogenes except: Question 1 options: A) Penetrates alveolar macrophages B) Possesses flagella C) Can result in septicemia D) Resistant to cold According to the _________ hypothesis, differences in the earnings of women and men are the result of differences in womens and mens levels of education, skills, training, and work experience. A new business should be based on an entrepreneur's individual interests because the entrepreneur must have sufficient confidence to succeed. be willing to take personal responsibility. have enough determination to work alone. dedicate as many hours as needed to the work. Given right triangle XYZ, with altitudeWZ, find each length.a. If XW = 3 and WY= 12, determineWZ.b. If WZ=4 and XW= 2, determineWY.c. If XY = 22 and XW = 9, determineWZ.d. If XZ = 10 and XW = 4, determine XY.e. If WZ 18 and XW = 9, determine XZ.=f. If WZ = 4, XW = x, and XY = 10, determine ZY. Question 40 What are the two types of heroes? Rogue & Citizen Dead & Alive Regular & Deluxe Rogue & Celebrity Item 3 is unpinned. Click to pin.When Grant was 9 years old he was 54 inches tall. Grant is now 12 years old and he is 66 inches tall. Find the percent of increase in Grants height. FILL THE BLANK. most phospholipids move freely within a semifluid membrane blank______.