(T/F) The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed.

Answers

Answer 1

By overloading the network with messages, which prevents regular messages from being processed, the denial-of-service attack breaks down the network. The use of fake source IP addresses by DoS attackers makes it more difficult to recognize the DoS messages.

What is a denial of service attack (DoS) ?An attack known as a denial-of-service (DoS) attempt aims to take down a computer system or network and prevent its intended users from accessing it. DoS attacks achieve this by providing information to the target that causes a crash or by flooding it with traffic. In both situations, the DoS attack denies expected services or resources to genuine users (i.e., employees, members, or account holders).DoS assaults frequently target the web servers of renowned businesses like media, banking, and retail enterprises as well as governmental and commercial institutions. Despite the fact that DoS assaults rarely lead to the loss or theft of important data or other assets, they can nonetheless be very time- and money-consuming for the victim to deal with.Flooding services or crashing services are the two main types of DoS attacks. Flood assaults happen when the server cannot handle the volume of traffic, which causes the system to sluggishly and eventually cease.

To Learn more About DoS attackers refer to:

https://brainly.com/question/14390016

#SPJ4


Related Questions

write an algorithm to find the area of a parallelogram​

Answers

Answer:

a = bh

Explanation:

a = Area
b = Base

h = Height

The smallest unit of storage is​

Answers

Answer:

Hey mate......

Explanation:

The smallest unit of storage is Bytes......

hope it helps you,

mark me as the brainliest,

follow me..........

I need help!!!

What’s a keyboard?

What’s a monitor?

What’s a usb?

What’s a tv?

What’s a laptop?

What’s a remote?

Answers

Keyboard: a board, with keys, that can attach wirelessly OR by using cables, can be plugged into a usb port

Monitor: the screen used to see what’s happening on the desktop

Usb: a type of storage device/ a way to plug things into the computer

Laptop: a portable computer

Remote: a device to control other devices

Answer:

a keyboard is what u r using to type this question rn

a monitor is technically the security cams in among us

a usb is something that you use to attach information onto a computer

a tv is literally a box that shows images and transmits sounds

a laptop is a computer but that is used more for traveling

a remote is another box but smaller that helps you navigate through the channels in a tv.

Explanation:

O_o how did you not know this...

also could i have brainliest plz?!

I am working on 8.8.6 "Totals of Lots of Rolls" in codeHS javascript and
I do not know what to do can someone help me?

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that rolls a 6-sided die 100 times.

Writting the code:

var counts = [0, 0, 0, 0, 0, 0, 0];

for (var i = 0; i < 100; i++) {

   counts[Math.floor(1 + Math.random() * 6)]++;

}

console.log('You rolled ' + counts[1] + ' ones.');

console.log('You rolled ' + counts[2] + ' twos.');

console.log('You rolled ' + counts[3] + ' threes.');

console.log('You rolled ' + counts[4] + ' fours.');

console.log('You rolled ' + counts[5] + ' fives.');

console.log('You rolled ' + counts[6] + ' sixes.');

See more about JAVA at brainly.com/question/12975450

#SPJ1

I am working on 8.8.6 "Totals of Lots of Rolls" in codeHS javascript and I do not know what to do can

factorieze
\( {x}^{2} - 4x - 5\)

Answers

Answer:

The factorization of \(x^2-4x-5\) is (x+1)(x-5)

Explanation:

Factorization is a method to find the factors of a polynomial or write the polynomial in simplified form.

Factorization method involves making pairs of the middle term with x and then making two linear factors.

Given

\(x^2-4x-5\\Factorizing\\=x^2-5x+x-5\\= x(x-5)+1(x-5)\\=(x+1)(x-5)\)

Hence,

The factorization of \(x^2-4x-5\) is (x+1)(x-5)

A victimless crime is committed when
|. Select 3 options.
someone downloads a pirated song or video
a copyrighted image is used without permission
a stranger accesses your internet banking
a person downloads and uses pirated software
a hacker sells a company's financial statements

Answers

Someone downloads a pirated song or video a copyrighted image is used without permission and a person downloads and uses pirated software.

A victimless crime is committed when a copyrighted image is used without permission 2. a stranger accesses your internet banking 3. a hacker sells a company’s financial statements.

Victimless crimes are illegal acts that break the laws, but there is no single victim of the crime. They are against social values and laws. A copyrighted image is used without permission

Examples are gambling, traffic violations, etc. Thus, Victimless crimes differ from other types of crime because it does not have an identifiable victim. This crime is against laws and social values and beliefs.

To know more about victimless crimes, visit:

brainly.com/question/17251009

#SPJ6


Using the in databases at the , perform the queries show belowFor each querytype the answer on the first line and the command used on the second line. Use the items ordered database on the siteYou will type your SQL command in the box at the bottom of the SQLCourse2 page you have completed your query correctly, you will receive the answer your query is incorrect , you will get an error message or only see a dot ) the page. One point will be given for answer and one point for correct query command

Using the in databases at the , perform the queries show belowFor each querytype the answer on the first

Answers

Using the knowledge in computational language in SQL it is possible to write a code that using the in databases at the , perform the queries show belowFor each querytype.

Writting the code:

Database: employee

       Owner: SYSDBA                        

PAGE_SIZE 4096

Number of DB pages allocated = 270

Sweep interval = 20000

Forced Writes are ON

Transaction - oldest = 190

Transaction - oldest active = 191

Transaction - oldest snapshot = 191

Transaction - Next = 211

ODS = 11.2

Default Character set: NONE

Database: employee

       Owner: SYSDBA                        

PAGE_SIZE 4096

...

Default Character set: NONE

See more about SQL at brainly.com/question/19705654

#SPJ1

Using the in databases at the , perform the queries show belowFor each querytype the answer on the first

On the AdvertisingCosts worksheet, create a Line chart of the data for the total spent on advertising each month from January through June. The primary horizontal axis should be the months of the year, and the Vertical (value) Axis should be the total spent on advertising each month.

Answers

I can provide you with general instructions on how to create a line chart in Microsoft Excel based on the data you have mentioned.

How to create the line chart

To create a line chart of the data for the total spent on advertising each month from January through June in Microsoft Excel, you can follow these steps:

Open Microsoft Excel and open the AdvertisingCosts worksheet.

Select the data range for the months and total spent on advertising from January through June.

Click on the "Insert" tab on the Excel ribbon.

Click on the "Line" chart type under the "Charts" section.

Select the chart subtype that you prefer from the drop-down menu. For example, you can choose a simple line chart or a chart with markers for each data point.

Your chart will be created, but it may need some adjustments to make it look better. For example, you may want to add a chart title, axis titles, and legend to the chart.

Click on the chart to activate the "Chart Tools" tab on the Excel ribbon.

Use the options on this tab to customize your chart as needed. For example, you can add a chart title by clicking on the "Chart Title" button, or you can change the axis titles by clicking on the "Axis Titles" button.

Once you have completed these steps, you should have a line chart of the data for the total spent on advertising each month from January through June. The primary horizontal axis should be the months of the year, and the Vertical (value) Axis should be the total spent on advertising each month.

Read more about spreadsheets here:

https://brainly.com/question/26919847

#SPJ1

When an external device becomes ready to be serviced by the processor the device sends a(n) _________ signal to the processor? A) accessB) haltC) handlerD) interrupt

Answers

When an external device becomes ready to be serviced by the processor the device sends a access.

What is processor?

A processor is an integrated electronic circuit that performs the calculations that run a computer. A processor performs arithmetical, logical, input/output (I/O) and other basic instructions that are passed from an operating system (OS). Most other processes are dependent on the operations of a processor.

The terms processor, central processing unit (CPU) and microprocessor are commonly linked as synonyms. Most people use the word “processor” interchangeably with the term “CPU” nowadays, it is technically not correct since the CPU is just one of the processors inside a personal computer (PC).

The Graphics Processing Unit (GPU) is another processor, and even some hard drives are technically capable of performing some processing.

To know more about computer

https://brainly.com/question/614196

#SPJ4

write an if statement to Test if a number stored in y is between 6 and 10 inclusive. only an if statement.

Answers

y = whatever value you want

if 5 < y < 11:

   print("Your number is between 6 and 10")

Help picture for 25 points

 Help picture for 25 points

Answers

Divide one number by the other, then multiply the result by 100 to get the percentage of the two numbers.

Explain about the Percentage?

Holding down Shift while pressing the 5 key at the top of the keyboard will produce a percent symbol on a U.S. keyboard. You can also construct a percent by using the Alt code Alt +37.

To open the Format Cells dialogue box, click the icon next to Number in the Number group on the Home tab. Click Percentage in the Category list of the Format Cells dialogue box. Enter the number of decimal places you want to display in the Decimal places box.

The percent sign is found on the numeral 5 key, which is placed above the R and T on a US keyboard layout. Press the 5 key while holding down the Shift key to insert%.

To learn more about Percentage refer to:

https://brainly.com/question/24877689

#SPJ1

on React
1) Create counter and an increment button, default value of the counter would be 1, clicking on increment button adds 5 to the counter. The max value of the counter would be 20, after reaching this value , counter would not increment. Add a reset button which would set the counter value to 1.
[8:53 PM]
2) Create a button with label “true” , clicking on the button toggle the value from “true” => “false” and “false” => “true”.(edited)

techsith (patel) — 03/03/2021
3) Create a counter and a button. clicking on the button increments the counter by one. double clicking on the button resets the counter to 0

Answers

Answer:too many words ahhh

Explanation:

(assuming jsx)

function Buttons (props) {

return(

{props.counterValue}

counter

increment

reset

);

}

var counterValue = 1;

function addup(a){

if(counterValue + a <= 20){

counterValue += a;

} else if (counterValue + a > 20){

//do nothing

}

ReactDOM.render(

 ,

 document.getElementById('root')

);

}

function reset() {

counterValue = 1;

ReactDOM.render(

 ,

 document.getElementById('root')

);

}

a really excellent way of getting you started on setting up a workbook to perform a useful function.

Answers

Templates a really excellent way of getting you started on setting up a workbook to perform a useful function.

What is the workbook  about?

One excellent way to get started on setting up a workbook to perform a useful function is to begin by defining the problem you are trying to solve or the goal you want to achieve. This will help you determine the necessary inputs, outputs, and calculations required to accomplish your objective.

Once you have a clear understanding of your goal, you can start designing your workbook by creating a plan and organizing your data into logical categories.

Next, you can start building the necessary formulas and functions to perform the required calculations and operations. This might involve using built-in functions such as SUM, AVERAGE, or IF, or creating custom formulas to perform more complex calculations.

Read more about workbook here:

https://brainly.com/question/27960083

#SPJ1

How is the query wizard used on a table?

Answers

The query wizard is a tool in database management systems that helps users create queries to retrieve specific data from a table. Here are the steps to use the query wizard on a table:

1. Open the database management system, such as Microsoft Access.
2. Open the table you want to query.
3. Locate the "Query Wizard" option, which is typically found in the toolbar or menu.
4. Click on the "Query Wizard" option to launch the wizard.
5. Follow the instructions provided by the query wizard.
6. Select the fields you want to include in your query from the available options.
7. Choose the criteria you want to use to filter the data. This can be based on specific values, ranges, or conditions.
8. Specify the sorting order for the query results, if desired.
9. Name the query and choose whether to immediately view the results or modify the design of the query further.
10. Click "Finish" or "OK" to generate the query and view the results.
By using the query wizard, you can easily create and customize queries without needing to write complex SQL statements manually. It provides a user-friendly interface to guide you through the process of querying a table.

For more such questions wizard,Click on

https://brainly.com/question/30670647

#SPJ8

Explain the importance of internal and external communication when managing a cyber-attack.

Answers

When managing a cyber-attack, effective communication is crucial for mitigating the attack's impact and minimizing damage to the organization's reputation and operations. Both internal and external communication plays a significant role in managing a cyber-attack, and their importance can be explained as follows:

Internal Communication: Internal communication is vital for ensuring that everyone in the organization is aware of the cyber-attack, its impact, and their roles and responsibilities in managing the incident. Some key aspects of internal communication during a cyber-attack include:

Rapid communication: The internal communication channels should be well-established and tested regularly, to ensure that information can be disseminated quickly and accurately in the event of an attack.

Coordination: Internal communication helps to ensure that different teams and stakeholders are working together effectively to respond to the attack. For example, the IT team may need to work closely with the legal team to address any legal implications of the attack.

Empowerment: Clear and effective internal communication can help to empower employees to take the necessary actions to protect the organization's systems and data. For example, employees may need to be instructed to change their passwords or avoid opening suspicious emails.

External Communication: External communication is equally important, as it helps to maintain trust and transparency with stakeholders outside of the organization. Some key aspects of external communication during a cyber-attack include:

Crisis management: External communication helps to manage the crisis by communicating with stakeholders such as customers, partners, regulators, and the media. It's essential to be transparent about the attack and provide regular updates on the organization's response.

Reputation management: The organization's reputation may be at risk during a cyber-attack, and external communication can help to mitigate this risk. For example, prompt communication can demonstrate that the organization is taking the attack seriously and working to protect its customers and partners.

Legal compliance: External communication may be required by law or regulatory bodies. Failure to communicate promptly and effectively can result in legal and financial penalties.

In summary, effective communication, both internal and external, is essential for managing a cyber-attack. It helps to coordinate the response, empower employees, manage the crisis, maintain the organization's reputation, and comply with legal and regulatory requirements.

The performance of a superscalar processor is often enhanced with hardware t upport the following: Branch prediction Register renaming Out-of-order execution The speculative reordering of load instructions Strided prefetching Sketch an assembly language program that would benefit from the u all of these techniques when executed on a superscalar processor. Br describe how each of the techniques helps to improve the performan [10] your program.

Answers

A well-designed assembly language program can benefit from the use of branch prediction, register renaming, out-of-order execution, speculative reordering of load instructions, and strided prefetching on a superscalar processor, leading to improved performance.

Branch prediction helps to mitigate the performance impact of conditional branches by predicting the likely outcome and speculatively executing the predicted path.

This allows the processor to fetch and execute instructions ahead of time, avoiding pipeline stalls.

Register renaming enables the processor to assign physical registers to architectural registers dynamically, reducing dependencies and enabling parallel execution of instructions. Out-of-order execution allows instructions to be executed in an order that maximizes resource utilization, even if their original order in the program is different. Speculative reordering of load instructions enables the processor to fetch data speculatively, assuming that it will be used, and then reorder subsequent instructions accordingly. This technique helps hide memory latency. Strided prefetching anticipates memory accesses based on regular patterns and fetches data in advance, reducing memory latency and improving overall performance.

By incorporating these techniques into an assembly language program, the program can take advantage of the superscalar processor's capabilities and achieve higher performance.

For more questions on processor

https://brainly.com/question/29353229

#SPJ8

PLEASE HURRY AND BE SERIOUS

Which of the following statements describes the way networks are set up?

LANs are made up of LANs.

WANs are made up of WANs.

LANs are made up of WANs.

WANs are made up of LANs.

Answers

Answer:  D: WANs are made up of LANs.

Explanation:

Answer:

answer is D WANS are made up of LANS

Explanation:

Aaron is stating the main idea of what he read in his own words. He is _____.

paraphrasing
summarizing
outlining
organizing

Answers

Answer:

summarizing

Explanation:

when someone explains in their own words the main idea of a story, it is summarizing.

The answer is B. He’s just rereading everything quickly but short

Why does Homework exist? Why is it so important?

Answers

Answer:

Homework exist because it give you extra work and practice to learn more. It important because it better your grade.

A motor takes a current of 27.5 amperes per leaf on a 440-volt, three-phase circuit. The power factor is 0.80. What is the load in watts? Round the answer to the nearer whole watt.

Answers

The load in watts for the motor is 16766 watts

To calculate the load in watts for the given motor, you can use the following formula:

Load (W) = Voltage (V) × Current (I) × Power Factor (PF) × √3

In this case:
Voltage (V) = 440 volts
Current (I) = 27.5 amperes per phase
Power Factor (PF) = 0.80
√3 represents the square root of 3, which is approximately 1.732

Now, plug in the values:

Load (W) = Voltage (V) × Current (I) × Power Factor (PF) × √3

Load (W) = 440 × 27.5 × 0.80 × 1.732

Load (W) = 16765.7 watts

Rounded to the nearest whole watt, the load is approximately 16766 watts.

Know more about the motor here :

https://brainly.com/question/29713010

#SPJ11

In "PUBATTLEGROUNDS” what is the name of the Military Base island?

Answers

Answer:

Erangel

Explanation:

Answer:

Erangel

Explanation:

The Military Base is located on the main map known as Erangel. Erangel is the original map in the game and features various landmarks and areas, including the Military Base.

The Military Base is a high-risk area with a significant amount of loot, making it an attractive drop location for players looking for strong weapons and equipment. It is situated on the southern coast of Erangel and is known for its large buildings, warehouses, and military-themed structures.

The Military Base is a popular destination for intense early-game fights due to its high loot density and potential for player encounters.

Hope this helps!

Question #4
Multiple Select
Which of the following statements are true regarding abstraction? Select 3 options.

O Creating a model must occur before abstraction.

O Refinement is the opposite of abstraction.

O Abstraction provides a way to see a complex situation more clearly.

O The level of abstraction needed depends on the situation and your goals.

O Abstraction is a process where details are added to further define the problem.

Answers

Answer:

B: the level of abstraction needed depends on the situation and your goals

C: refinement is the oppostie of abstraction

E: abstraction provides a way to see a complex situtation more clearly

Explanation:

I just completed the assignemnet and was checking it while I made this answer.

Please help me I don’t know what I’m doing wrong.

Please help me I dont know what Im doing wrong.
Please help me I dont know what Im doing wrong.

Answers

Answer:

Explanation:

I noticed the \n, \n will cause the new line break, delete it.

try code below:

System.out.println(" " + " " + "NO PARKING");

System.out.println("2:00 - 6:00 a.m.");

1. Utilizing Microsoft VISIO, you are to leverage the content within the prescribed narrative to develop an Entity Relationship Diagram (ERD). Make use of the 'Crow's Foot Database Notation' template available within VISIO.
1.1. You will be constructing the entities [Tables] found within the schemas associated with the first letter of your last name.
Student Last Name
A -F
K-0
P -T
U-7
Schema
1 and 2 as identified in 6.4.1.1.
1 and 3 as identified in 6.4.1.1.
1 and 4 as identified in 6.4.1.1.
1 and 5 as identified in 6.4.1.1.
1 and 6 as identified in 6.4.1.1.
1.2. Your ERD must include the following items:
• All entities must be shown with their appropriate attributes and attribute values (variable type and length where applicable)
•All Primary keys and Foreign Keys must be properly marked
Differentiate between standard entities and intersection entities, utilize rounded corners on tables for

Answers

To create an Entity Relationship Diagram (ERD) using Microsoft Visio, here is what you need to do.

Steps for creating ERD using Visio

Open Microsoft Visio and select the 'Crow's Foot Database Notation' template.Identify the schemas associated with the first letter of your last name. For example, if your last name starts with A-F, choose Schema 1 and Schema 2.Construct the entities (tables) within the chosen schemas based on the provided narrative.Include all necessary attributes and their values for each entity, specifying variable type and length where applicable.Properly mark the Primary Keys and Foreign Keys within the entities.Differentiate between standard entities and intersection entities by using rounded corners on tables.

By following these steps, you can create an ERD using Microsoft Visio, representing the entities, attributes, relationships, and key identifiers of the database schema associated with your given criteria.

Learn more about Microsoft Visio:
https://brainly.com/question/29340759
#SPJ1

Home communication involves controlling systems such as heating, cooling, and security.
a. True
b. False

Answers

Answer:

A. True

Explanation:

Home communications involves automating home. It includes controlling the air-con,water heater, webcam, etc. A

The global communication network that allows computers to connect and pass through information is called?

Answers

Answer: Internet

Explanation:

Answer:

The Internet.

Explanation:

List 2 positive impacts of cybersecurity.




**Answer and I will give you brainiliest**​

Answers

Answer:

Protection for your business and Increased productivity

Explanation:

This is because it ensures your employees aren't at risk from potential threats and, since there no virus, the computers will work well (not slow down)

The purpose of a flowchart is similar to the purpose of pseudocode.
True
False

Answers

I would say true. They both exist to provide people with a reference point.

Answer:

True

Explanation:

Pseudocode: In computer science, pseudocode is a plain language description of the steps in an algorithm or another system. Pseudocode often uses structural conventions of a normal programming language, but is intended for human reading rather than machine reading.

Flowchart: A flowchart is a type of diagram that represents a workflow or process. A flowchart can also be defined as a diagrammatic representation of an algorithm, a step-by-step approach to solving a task. The flowchart shows the steps as boxes of various kinds, and their order by connecting the boxes with arrows.

They are both human-written descriptions of the process or algorithm of a task.

I hope this helpedThanks for your timeJuri Davis

In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.

Answers

Answer: Excel Average functions

Explanation: it gets the work done.

Answer:

excel average

Explanation:

Select the correct answer from each drop-down menu. Erin is writing an essay about the factors that can lead to mental illness Choose the correct way to complete each sentence. One factor leading to mental illness is Exposure to toxins during © 2023 Edmentum. All rights reserved. which can be caused by the type of closed-head injury that occurs during a car accident. also increases the risk of developing a mental illnesses ​

Answers

A wide variety of mental health conditions—disorders that impact your emotions, thinking, and behavior—are referred to as mental illnesses, sometimes known as mental health disorders.

Thus, Depression, anxiety disorders, schizophrenia, eating disorders, and compulsive behaviors are a few examples of mental illnesses. Many people occasionally experience problems with their mental health.

However, a mental health issue turns into a mental disease when persistent symptoms put you under a lot of stress and impair your capacity to perform daily tasks.

A mental illness can make your life miserable and interfere with regular activities including work, school, and relationships. Most of the time, a combination of medicine and talk therapy helps control symptoms.

Thus, A wide variety of mental health conditions—disorders that impact your emotions, thinking, and behavior—are referred to as mental illnesses, sometimes known as mental health disorders.

Learn more about Mental health, refer to the link:

https://brainly.com/question/31708532

#SPJ1

Other Questions
In the article "10 Things You Can Do to Avoid Fraud," what is the definition of foiled as it is used in paragraph 2 of the introduction?Group of answer choices"Improved or made better.""Charged with a crime.""Prevented from succeeding." please help please!!!! Peter is considering two cell phone plans. The first company charges $400 for the phone and $30 per month for the calling plan that Peter wants. The second company charges $125 for the same phone, but charges $55 per month for the calling plan that Peter wants. After how many months would the total cost of the two plans be the same? (i) Explain how Amdahl's Law and Gustafson's Law applies to parallel processing. [2 marks] (ii) Why Amdahl's Law appears to put a limit on parallel processing effectiveness. Explain how Gustafson's Law can act as a counter-argument to it. [4 Marks] The Multiregional Model suggests that the occasional appearance in the fossil record of __________ is evidence of regional continuity. Which of the following is a sign of food spoilage?-a. Soil on unwashed vegetables-b. Bruised fruit-c. Bulging or leaking cans-d. Cloudy egg whites (albumin) Question 7 1 pts Homo erectus: was a species of hominin that lasted for more than 1 milion years were adapted to cold environments is only found in Africa used the same tools as Homo habilis Which claim about Titan's mysterious lake do you think is most true at this time. Explain why.a) Claim 1- The lake froze.b) Claim 2- The lake evaporated. Rectangle ABCD ~ Rectangle WXYZ. Find the missing measurement Many organizations now use automated ________ to handle routine, online conversations with customers. A) blogsB) chatbotsC) taggingD) taskbotsE) tag clouds selection within pathogen hosts typically favors _____; selection across hosts favors _____: InequalitiesWhich is the graph of the system x + 3y > -3 and y < 1/2x +1? 5. Explain turn ratio' on control valve. What effect would this have on the control loop? 6. What effect would a valves installed gain have on the overall performance of a typical industrial closed loop control if it were to change? Use simple valve gain curves to elaborate. 4The belief that bodies of water, animals, trees, and other natural objects have spirits is knownas....O A. Ancestor worshipO B. AnimismO C. AgnosticismO D. Altruism FILL THE BLANK. piaget called children's self-directed utterances ________ speech, reflecting his belief that young children have difficulty taking the perspectives of others. Question 23In which of the following occasions would formal rulemaking be used by a federal agency?In all circumstances when rules are made.In no circumstances when rules are made.O When Congress has specifically indicated in the enabling statute that agency rules must be made off the record before a hearing.When Congress has specifically indicated in the enabling statute that agency rules must be made on the record after a hearing. 5) Consider the following transfer function of a system \( \quad G_{1}(s)=\frac{1}{s(s+1)} \) In the z-plane, design digital controllers so that the dominant closed-loop poles have \( \zeta=0.5 \) and Needing answers, giving brainliest.In this one Ive added the height and width so now you guys can figure it out.Height: 3/4 footWidth: 5/7 foot (aka, shoulder width) Round 5.951 to the place value of the underlined digit ( underlined digit is 9)6.06.95.955.9 Write one paragraph explaining one example of foreshadomng using specific examples to show how the foreshadowing helps predict. what happens. this is off of edge help asap