jahi is a security engineer for a u.s. department of defense contractor. he is implementing a more secure method for remote users to log into an internal system over a virtual private network (vpn). in addition to requiring a password, this method asks the user to enter a pin texted to their mobile phone, and to use a fingerprint reader mounted to their company-issued laptop. which method is jahi deploying?

Answers

Answer 1

Since Jahi is a security engineer for a u.s. department of defense contractor. The method that he is deploying is option A: Multifactor authentication

What does employing multiple factors of authentication serve?

Multi-factor authentication's main goal is to lessen the possibility of account takeovers and increase security for users and their accounts. Since weak or stolen passwords account for more than 80% of cyberattacks, MFA can add the extra security layers required to safeguard users' data and their accounts.

Therefore Jahi is using a system that uses multi-factor authentication requires a user to login using a combination of two or more credentials to prove their identity. It is a tiered approach to data and application security.

Learn more about Multifactor authentication from

https://brainly.com/question/14330595
#SPJ1

See options below

Multifactor authentication

 Biometric authentication  

Two-factor authentication


Related Questions

Capital Allocation Line(CAL) is a straight line originated from
the risk free rate. What can cause the kink in CAL?

Answers

The thing that can cause the kink in CAL is when the borrowing rate is different from the lending rate.

What is the Capital Allocation Line

The Capital Allocation Line (CAL) is a straight line in the field of finance that illustrates various possibilities of risk and return for a portfolio that comprises both a risk-free asset (like Treasury bills) and a risky asset (such as stocks).

Typically, the Capital Allocation Line (CAL) is a direct path that starts from the risk-free rate and extends through the anticipated gains and volatility of a risky investment portfolio.

Learn more about Capital Allocation Line from

https://brainly.com/question/31236442

#SPJ4


Explain why it is important for you to understand and describe the basic internal and external components of a computer in the
workplace. How might you use this information?

Answers

Users can adequately describe to your boss or consumer if they know the identity of an internal part of a computer, i.e. RAM, Processor, HDD, motherboard, etc and the further discussion can be defined as follows:

When any problems in a few of our computers are present user have to know the computer part names like keyboard, cursor, printer, scanner, microphone, cam, etc.Users can explain easily which inner or outside part of a computer is problematic if a problem has been found.

Therefore, We can easily deal with it and solve issues if we know of various components at work in a computer.

Learn more:

brainly.com/question/12899825

if the lookback window is seven days and a user sees an ad on day one, sees an ad again on day three, sees and clicks on an ad on day four, and converts on day ten, then which impression gets the conversion credit?

Answers

The conversion credit would be applied to the day four impression when the user clicked on the advertisement.

Ad - what is it?

The word "ad" is an abbreviation for "advertisement," which is a type of communication meant to influence viewers, readers, or listeners to take a particular action with regard to goods, concepts, or services. Advertisements can be found in a variety of media, including papers, magazines, television, radio, billboards, and online. They are often placed by marketers, corporations, and organizations. Reaching an audience is assured with advertisements. By creating an appealing ad, and paying enough to reach your target consumers, adverts can have an immediate influence on business. Among many other indicators, this impact may be seen in increased brand awareness or improved commerce.

To know more about Ad
https://brainly.com/question/3163475
#SPJ4

the term 'beta version' software generally refers to: group of answer choices software that has not yet been tested in its entirety by the developers software that still requires further integration and unit testing software that is feature complete but still requires end-user testing with real data a completely finished system ready for production

Answers

Beta Version: This is the software that has been made available to the general public but still has many unfinished features.

What is a software beta version?

An incomplete early version of a computer software or application that has the majority of the key elements. For testing and feedback, these versions are occasionally exclusively made available to a small group of people or to the broader public.

A web browser application is what?

A web browser is a piece of software that enables access to the World Wide Web. It is also known as an internet browser or just a browser. With only one click, you have access to all of human knowledge and can look up any question you have.

To know more about 'beta version' software visit:-

https://brainly.com/question/23465069

#SPJ4

08. Consider the following four binary numbers.
11100111
10101010
11110000
11001100
Which of the following displays the numbers in ascending order?
(A) 10101010, 11001100, 11100111, 11110000
(B) 11110000, 11100111, 11001100, 10101010
(C) 11100111, 10101010, 11110000, 11001100
(D) 10101010, 11001100, 11110000, 11100111

Answers

Answer: A
Explanation: If you convert the binary into decimal
you can easily determine the order from least to
greatest. In this instance of "a," we have 170, 204,
231, 240.

When opening and closing a security container, complete the _____.
a. SF 701
b. SF 700
c. SF 702
d. SF 703

Answers

Option c is correct. SF 702 is the answer to this question. SF 702 is used to open and close security containers. Track security containers.

The security container can be opened and closed at any time. However, if possible, security containers should only be opened for privacy and security reasons. Security containers should use all possible safeguards such as guard protection, password protection, fingerprint protection, etc. Standard Form (SF 702) – Security Container Inspection Sheet. A standard form (SF 702 Security Container Sheet) tracks who opens, closes, and inspects security containers containing sensitive information.

SF 702 or "Security Container Check Sheet" is used to record the opening and closing of the data carrier. An area check is carried out in the SF 701 after the daily check is finished. The

SF 702 must be stored and disposed of according to a component records management program. SF 702 will be stored in the NDC until the next conformance inspection by a higher level control center.

Know more about information here:

https://brainly.com/question/29244533

#SPJ4

targeted study that readies you for a specific application of knowledge

Answers

Targeted study refers to focused learning that prepares individuals for a specific application of knowledge by tailoring their efforts towards acquiring expertise, skills, and practical experience directly relevant to their desired field or profession.

What is targeted study and how does it prepare individuals for a specific application of knowledge?

A targeted study refers to a focused approach to learning that prepares individuals for a specific application of knowledge. It involves concentrating efforts on acquiring expertise and skills relevant to a particular field, industry, or profession.

When pursuing targeted study, individuals identify their specific goals and tailor their learning activities accordingly. This may involve selecting relevant courses, workshops, certifications, or specialized training programs that directly align with the desired application of knowledge.

The advantage of targeted study is that it allows individuals to acquire in-depth knowledge and skills in a specific area, enhancing their proficiency and competitiveness within their chosen field. By focusing on the specific application of knowledge, individuals can develop a specialized skill set that meets the requirements of a particular industry or job role.

Targeted study enables individuals to gain practical experience, theoretical knowledge, and problem-solving abilities that are directly applicable to their desired field. It provides a more efficient and directed learning path, allowing individuals to make significant progress in a shorter timeframes compared to a more generalized approach to learning.

Ultimately, targeted study increases the readiness and effectiveness of individuals in applying their knowledge to a specific context, increasing their prospects for success in their chosen field or application.

Learn more about knowledge

brainly.com/question/28025185

#SPJ11

The activities of untrained volunteers to create content and resources which can be utlized by others describes: geolocating. cartography. crowdsourcing. geotagging.

Answers

Crowdsourcing is a technique that allows companies and organizations to accomplish their goals by soliciting the help of a large group of individuals, usually through the internet. The activities of untrained volunteers to create content and resources which can be utilized by others describe crowdsourcing.

It is a modern, cost-effective way to collaborate on a shared objective by utilizing the power of online communities.The term "crowdsourcing" was first coined in 2006 by Jeff Howe, a writer for Wired Magazine, who described it as "the act of taking a job traditionally performed by a designated agent (usually an employee) and outsourcing it to an undefined, generally large group of people in the form of an open call." Crowdsourcing can be used in many different industries and for various tasks, from product design to fundraising to disaster relief efforts.

Crowdsourcing content creation is a popular use of the technique, with volunteers submitting photos, videos, and articles for use in various projects.The activities of untrained volunteers to create content and resources which can be utilized by others can be seen in many different forms of crowdsourcing. For example, Wikipedia relies on volunteers to create and edit articles, while citizen science projects enlist the public to help with scientific research. Open-source software projects use crowdsourcing to develop software code, and crowdfunding platforms leverage crowdsourcing to raise money for new products and initiatives.

Overall, crowdsourcing is a powerful tool for collaboration that can harness the collective knowledge, skills, and enthusiasm of a large group of people. It has the potential to help companies and organizations achieve their goals more efficiently and effectively, while also providing a unique opportunity for individuals to contribute to something larger than themselves.

To know more about crowdsourcing visit :

https://brainly.com/question/9452858

#SPJ11

When is the ap computer science principles create task due 2022.

Answers

The AP Computer Science Principles Create Task for 2022 is due on May 6th, 2022.

This task is a major component of the AP CSP exam and accounts for 24% of the overall score. The Create Task requires students to design and develop a program that solves a real-world problem.

The program must be created using one or more programming languages and must incorporate computing concepts such as data structures, algorithms, and abstraction. Students must also submit documentation that explains the program's purpose, design, and functionality.

It's important for students to start working on their Create Task early to ensure they have enough time to complete it and meet the deadline. Teachers can provide guidance and support throughout the process to help students succeed.

Learn more about AP computer at

https://brainly.com/question/31722044

#SPJ11

You want the output to be left justified in a field that is nine characters wide. What format string do you need?

print('{: __ __ }' .format(23)

Answers

Answer:

> and 8

Explanation:

> and 8 format string one will need in this particular input of the java string.

What is a format string?

The Format String is the contention of the Format Function and is an ASCII Z string that contains text and configuration boundaries, as printf. The parameter as %x %s characterizes the sort of transformation of the format function.

Python String design() is a capability used to supplant, substitute, or convert the string with placeholders with legitimate qualities in the last string. It is an inherent capability of the Python string class, which returns the designed string as a result.

The '8' specifies the field width of the input The Format String is the contention of the Configuration Capability and is an ASCII Z string that contains the text.

Learn more about format string, here:

https://brainly.com/question/28989849

#SPJ3

Which of these statements regarding time-cost tradeoffs in CPM networks is true?
a. Crashing is not possible unless there are multiple critical paths.
b. Crashing a project often reduces the length of long-duration, but non-critical, activities.
c. Activities not on the critical path can never be on the critical path, even after crashing.
d. Crashing shortens the project duration by assigning more resources to one or more of the critical tasks.
e. None of the above.

Answers

The correct statement regarding time-cost tradeoffs in CPM networks is d. Crashing shortens the project duration by assigning more resources to one or more of the critical tasks.

Time-cost tradeoffs are a technique used in project management to speed up project completion by trading time with money. Time-cost tradeoffs involve accelerating the project's time frame by allocating additional resources (usually labor) to the project.

By adding more resources, the project team will complete more tasks in less time, resulting in shorter project completion times.

Crashing is achieved by increasing the resources required for the activities, which may include adding additional personnel or other resources. Crashing does not affect the scope of the project, only the time required to complete it.

Fast tracking: The process of overlapping project activities that would otherwise be completed sequentially is known as fast tracking.

Fast tracking can also result in increased risk because tasks are being performed simultaneously instead of sequentially.

For such more question on networks:

https://brainly.com/question/28342757

#SPJ11

Use the drop-down menus to complete the steps for filtering records in a form.

1. Open the (1) tab.

3. In the Sort & Filter group, click (2), and click Filter by Form.

4. Enter or select a value to set the filter.

5. On the Home tab, in the Sort & Filter group, click the (3) button to toggle the filter.


1= create, database tools, file, home

2= advanced, filtering, find, new

3= ascending, descending, apply filter, toggle filter

Answers

Answer:

Home, advanced, apply filter

Explanation:

edge 2021

In the completion of the steps for filtering records, one can:

Open the Home tab.click (advanced), and click Filter by Form.click the (apply filter ) button to toggle the filter.  

What is filtering of records?

Filtering is know to be a very vital methods that is used  to see only the data that a person want to be shown in Access databases.

Conclusively, By following the steps above, one can achieving the filtering of the records that they desires.

Learn more about filtering records from

https://brainly.com/question/22238933

#SPJ1

Which is better Mac os, Windows or Linux?​

Answers

Answer:

\(Windows \: or \: Linux.......\)

Depends on what are you gonna do with it. Though all three are widely used, there are significant differences between Linux vs MAC vs Windows. Windows is dominant over the other two as 90% of users prefer Windows. ... Linux is free, and anyone can download and use it. MAC is costlier than Windows, and the user is forced to buy a MAC system built by Apple.

a person has started a new technical job. in which situation would esd be an issue? when replacing a motherboard while exchanging one laptop ac adapter with one that is not from the original equipment manufacturer when installing a dual-voltage power supply when using a grounded mat and working on a computer on an ungrounded workbench

Answers

a person has started a new technical job. The  situation where ESD be an issue is when installing a processor or motherboard (Option a)

What is a processor?

The logic equipment that listens to and executes the basic instructions that operate a computer is known as a processor (CPU). The CPU is regarded as the primary and most important integrated circuits (IC) chip in a computer since it is responsible for understanding the majority of the computer's orders.

The CPU is regarded as the primary and most important integrated circuits (IC) chip in a computer since it is responsible for understanding the majority of the computer's orders. CPUs conduct the majority of fundamental arithmetic, logic, and I/O activities, as well as allocating commands to other processors and components in a computer.

Learn more about processor  at:

https://brainly.com/question/28902482

#SPJ1

is makes it possible to evaluate performance by capturing current data in addition to analyzing historical data. often managers are faced with an overwhelming volume of data and analyzing it becomes very time consuming, a situation known as:_____.

Answers

An overwhelming volume of data and analyzing it becomes very time-consuming, a situation known as Analysis paralysis.

What is the process of data analysis?

The process of gathering, purifying, classifying, and processing raw data in order to derive pertinent and beneficial information for enterprises is known as data analytics.A thorough grasp of data can enhance customer satisfaction, customer retention, targeting, operational cost reduction, and problem-solving techniques. Finding insights into data, such as measurements, facts, and statistics requires the use of data analysis methodologies and procedures.Techniques for qualitative and quantitative data analysis are the two main approaches to data analysis. Data analysis tools are software and programs that gather and analyze data about a company, its clients, and its competitors in order to streamline operations and help decipher patterns so that decisions may be made using the data.The findings are shared, offering interpretations and aiding in decision-making.

To learn more about data analysis refer to:

https://brainly.com/question/29384413

#SPJ4

what option should be used in conjunction with the lp command in order to specify the destination printer name?

Answers

To specify the destination printer name when using the lp command, you can use the -d option followed by the name of the printer.

For example:

lp -d printer_name file.txt

This will print the file file.txt to the printer with the name printer_name.

Explanation in detail:

If you have multiple printers installed on your system and you want to specify which one to use, you can use the -d option to select the desired printer.

You can also use the lpstat -p command to list all available printers on the system, which can be useful if you are unsure of the exact name of the printer you want to use.

For example:

lpstat -p

This will display a list of all available printers on the system, along with their names and status. You can then use the -d option to specify the desired printer when printing a file.

Note that the lp command and the lpstat command are part of the CUPS (Common Unix Printing System) and are available on most Unix-like operating systems, including Linux and macOS. The exact syntax and options may vary depending on your system and the version of CUPS you are using.

To know more about lp command, visit: https://brainly.com/question/25808182

#SPJ4

Mobile device apps that enable users to pay for things or check-in to hotels or venues use _________ technology. Select one: a. GPS b. GIS c. TCP/IP d. NFC

Answers

Answer:

ip

vgfjffffffffvfdxx

Explanation:

fsxqwvetsgsrwfuxhsrwctsdqccdhvxrsbx7shgxfrxvshxrc

How many keys are required for two people to communicate via a symmetric cipher? Select one: a. 3 b. 1 c. 4 d. 2

Answers

In a symmetric cipher d. 2 keys are needed for two people to communicate.

What is symmetric cipher?

A symmetric cipher is a cryptographic method in which a single cryptographic key is used to encrypt and decrypt information. Symmetric encryption is a method of encrypting data where the same key is used for encryption and decryption.

What is the working of symmetric cipher?

In symmetric-key encryption, the same key is used for both encryption and decryption. Symmetric-key algorithms are much faster than public-key cryptography algorithms since they use simple mathematical operations. However, because both sender and receiver must have a shared secret key, this method isn't practical for use over the internet.

Only people who have the key can decrypt and see the original message. Symmetric encryption is considerably faster than public-key encryption, but it requires that the sender and receiver agree on a shared secret key.

What are the uses of a symmetric cipher?

Symmetric encryption is used in several situations. Symmetric encryption algorithms are generally used to encrypt large amounts of data that need to be transferred rapidly. Symmetric encryption can be used to secure data transmitted over networks, as well as to store data in a protected form on a hard disk or other storage device.

It is commonly used for file and email encryption, as well as for encrypting large data sets, such as financial information.

To know more about symmetric cipher refer to-

https://brainly.com/question/30458106#

#SPJ11

The computer that you are working on is not able to complete a Windows update. The update process begins to download the file, but then you receive an error message saying that the Windows update was unable to download. You have checked your Internet connection, and it is working. You have tried the update on your other computer, and it worked. What should you do first to fix the problem with the Windows update

Answers

Answer: Remove malware

Explanation:

The first thing to do in order to fix the problem with the Windows update is to remove malware. Malware refers to malicious software variants such as spyware, viruses, Trojan horse etc.

It should be noted that malware are harmful to a computer user as they can be used to delete, steal, or encrypt sensitive data, or monitor the activities of a user.

With regards to the question, the presence of malware may result in the inability of the Windows update to download.

Cuá es la relación entre la tecnología  y la vida?

Answers

Answer:

La innovación tecnológica ha permitido que la humanidad avanzara sobre la base de disponer de unas prótesis más potentes en el divagar por la tierra

Explanation:

Hola! Dicho esto en el mundo en que vivimos hoy en día hemos podido con la tecnología inventar cosas que nos ayudan con nuestras vidas cotidianas como son los medios de comunicación, transporte, entre otros. Y para terminar de contestar la pregunta como tal pues sería algo como:

"La relación entre la tecnología  y la vida es que la tecnología ayuda al ser humano en diferentes áreas tales como el transporte y la comunicación que hoy en día son un punto clave para poder vivir mejor."

¡Espero que te haya ayudado mucho!! ¡Bonito día!

Match each role to the corresponding web development task.

Match each role to the corresponding web development task.

Answers

Answer:

1. Art director: selecting color palettes.

2. Web project manager: creating budget spreadsheets.

3. Usability lead: researching target audiences.

4. Developer: coding.

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations of a web page to be displayed.

The various role performed during the web development process (task) includes;

1. Art director: selecting color palettes. This individual is saddled with the responsibility of choosing the color that best fits a website.

2. Web project manager: creating budget spreadsheets. He or she is responsible for performing tasks such as creating a financial (budget) plan, start and finish date (timing), procurement, etc.

3. Usability lead: researching target audiences. This individual is saddled with the responsibility of surveying and collecting data from the demography for which the website is designed.

4. Developer: coding. This is the technical expert referred to as a web developer and is responsible for writing the set of instructions (codes) that enables the website to work properly and serve a purpose.

During a fire emergency, what is the very first action you should take according to the race/racer/racee fire protocol?.

Answers

RACE: Remove, Alarm, Confine and Extinguish or Evacuate.

In the event of a fire, the following steps should be taken to ensure the safety of all building occupants:

1.Activate the fire alarm.

2.Call 911 immediately and provide information.

3.Assist injured personnel or notify emergency responders of the medical        
  emergency.

4.Exit the building following emergency maps.
You can learn more about RACE at:

brainly.com/question/22050167#SPJ4

Which object is a storage container that contains data in rows and columns and is the primary element of Access databases? procedures queries forms tables

Answers

Answer:

tables

Explanation:

For accessing the database there are four objects namely tables, queries, forms, and reports.

As the name suggests, the table is treated as an object in which the data is stored in a row and column format plus is the main element for accessing the database

Therefore in the given case, the last option is correct

Answer:

D. tables

Explanation:

took the test, theyre right too

who is he can anyone help me​

who is he can anyone help me

Answers

This person is Elon Musk, the owner of Tesla :)
The person in the photo is Elon Musk. He’s the CEO of SpaceX and CEO and product architect of Tesla, Inc.,founder of The Boring Company, co-founder of Neuralink, and co-founder and initial co-chairman of OpenAI.

print 3 numbers before asking a user to input an integer

print 3 numbers before asking a user to input an integer

Answers

Answer:

you can use an array to do this

Explanation:

(I've written this in java - I think it should work out):

Scanner input = new Scanner(System.in);

System.out.println("Enter an integer: ");

int userInt = input.nextInt();

int[] array = new int[userInt - 1];

for(int i = userInt-1; i < userInt; i--)

     System.out.println(array[i]);

TRUE / FALSE. general controls include all of the following except group of answer choices processing controls. systems development. online security. hardware controls.

Answers

The statement-"general controls include all of the following except group of answer choices processing controls'is TRUE.

General controls include all of the following except processing controls. General controls typically involve system development, online security, and hardware controls. These are measures taken to ensure the proper functioning and security of an organization's information systems. Processing controls, on the other hand, are more specific and focus on the accuracy, completeness, and authorization of transactions within a system.

general control refers to the management and coordination of various activities and processes within a computer system or software application. It involves the implementation of control mechanisms to ensure the proper functioning, efficiency, and security of the system. Here are some common aspects of general control in computer science.

To learn more about general control https://brainly.com/question/31565108

#SPJ11

The software program that creates, manipulates, and accesses the database goes bythe acronym: a)DBMS.b)DBP.c)OS.d)DBA.

Answers

The acronym you are referring to is a) DBMS, which stands for Database Management System.

So, the correct answer is A.

A DBMS is a software program that allows users to create, manipulate, and access databases in an efficient and organized manner. It acts as an interface between the database and its end-users, ensuring data consistency, integrity, and security.

DBMS software helps manage and maintain the structure of databases, handle queries, and provide various data manipulation functions. Examples of popular DBMS programs include MySQL, Oracle, and Microsoft SQL Server.

Overall, a DBMS is an essential tool for effectively managing and retrieving information within a database.

Hence, the answer of the question is A.

Learn more about software at https://brainly.com/question/985406

#SPJ11

The questions are from HTML. State whether the following statements are true or false. 1. HTML is the programming language. 2. Web page is the collection of website. 3. <marquee> tag is used to link the Hyper text. 4. Heading tag supports different levels from H1 to H6. 5. Attributes provide additional information to the HTML tags. 6. Empty tags must be closed with ending tag </>. ​

Answers

Answer:

true

Explanation:

hope this helps

What can Amber do to make sure no one else can access her document? O Use password protection. O Add editing restrictions. O Use Hidden text. O Mark it as final.​

Answers

Add a password.

The question is asking how to make sure no one can “access” it which means look at it at all. This means that Editing restricting still allow people to access it, white text does nothing but make the text invisible, and marking it as final still gives them access
use password protection.

Who is obsessed with Stranger Things, and waiting for the new season?!?!

Answers

Answer:

Me

Explanation:

Answer:

ME I CANNOT WAIT I'VE BEEN WAITING EVER SINCE ME AND MY STRANGER THINGS OBSESSED REALLY CLOSE FRIEND AND I FINISHED SEASON 3 THE DAY IT CAME OUT

Explanation:

Other Questions
Which ethnic group is responsible for the huge decrease in immigration in the early 1850s? Original price (OP): _________Rate of discount (RD): _________Amount of discount (AD): Php60.00Sale Price (SP): Php240.00 Read the passage below and answer the question that follows. "He waited. His breath was visible in the air. She would come. He knew she would come. "Which of the following words best describes the length of each of the sentences in this passage? a. lengthyb. rambling c. economicald. wordy A. compute u, v, and u v for the given vectors in R3 .u=5ij+2k , v=i+jkB. Find theprojection of u=i+j+k onto v = 2i+j3k. The function h(t) --4.922 +17.69+575 is used to model the height of an object being tossed from a tall building, where h(t) isthe height in meters and t is the time in seconds. What are the domain and range? Round to the nearest hundredth.domain: [0, 12.76]range: (1.80, 590.90)domain: [1.80,12.76]range: [1.80, 590.90)domain: [1.80,12.76]range: [0, 590.90]domain: [0, 12.76]range: [0,590.90] A glass contains 320cm3 of milk. The mass of the milk is 330g. Calculate the density of the milk in kilograms per cubic metre (kg/m3). Give your answer to the nearest integer arper went into a movie theater and bought 10 bags of popcorn and 6 drinks, costing a total of $79. Damian went into the same movie theater and bought 3 bags of popcorn and 5 drinks, costing a total of $36.50. Write a system of equations that could be used to determine the price of each bag of popcorn and the price of each drink. Define the variables that you use to write the system. solve the following problem below Please someone help Im really confused Stick Storage manufactures and sells computer flash drives. Last year it sold 2.5 million flash drives at a price of $10 each. They paid 20 million in monetary outlays to manufacture the flash drives. The opportunity cost of manufacturing the flash drives as 10 million. For last year, the firm's What is the nth term rule of the quadratic sequence below?8,14,22,32,44,58,74,... What happens when the pressure falls within the magma?A. The silica in the magma gets hotter.B. The bubbles of gas get bigger.C. The magma cools and solidifies.D. The density of the magma increases 2C2H6 + 7 O2 4 CO2 + 6 H2OUse the above equation, in the following problem:How many moles of H2O are produced from the combustion of 1.8 moles of C2H6? vice buys a model train that vosts $6.55. why might he give the sales person a $10 bill and a nickel? what is his change? Oscar collects string. He has 95 yards rolled into a ball. How many piecesthat are 0.05 of yard long can he cut from his ball of string? Describe your experience of the first day at online class in about 120 words You are studying transplant rejection in a wild and genetically diverse population of mice. You have captured some of the mice for laboratory studies. You have four mice from a family. Mouse 1, mouse 2, and mouse 3 are littermates, thus they all share the same mother and father. Mouse 4 is the father of the other three mice. You transplant a small patch of skin from mouse 2 (the donor) onto mouse 1 (the recipient). There is a delayed inflammatory response and two weeks later the skin is necrotic due to transplant rejection. You decide to attempt another transplant. Which follow-up transplant is LEAST likely to be rejected?a. skin from mouse 1b. skin from mouse 2c. skin from mouse 3d. skin from mouse 4-incorrect Your company has two offices located approximately one kilometre apart. There is a need to transfer data between the two offices at speeds up to 100 Mbps. Design two solutions that are technically and financially feasible for interconnecting the two buildings. Provide appropriate justification to support the proposed solution. Buddhism was begun by a man named_____.GautamaAshokaGangeticMauryan Does the graph below represent a function? Also theres another answer but it got cut off and it says D. Not enough information