the information security function cannot be placed within physical security, as a peer of physical security or protective services. a. true b. false

Answers

Answer 1

The information security role cannot be positioned inside physical security as a rival to protective services or physical security. This claim is untrue.

What are all the three security features?

When discussing data and information, the CIA triptych must be considered. Confidentiality, honesty, and availability are the three elements of the CIA triad, a concept in information security. Each subsystem represents a significant information security objective.

What significance does security have?

Security fosters situational awareness and preserves equilibrium. Without security, people frequently get comfortable and fail to notice strange conduct of bystanders, including workers and other citizens. Security drives an optimistic and proactive culture since awareness is a continuous process and people want to behave morally.

To know more about Security visit :

https://brainly.com/question/5042768

#SPJ4


Related Questions

PLZ HELP FAST
The third party which is authorized to make a final decision in a dispute is called the ______.
a.
Mediator
b.
Arbiter
c.
Supervisor
d.
Manager


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

This is called an Arbiter!

Explanation:

A somehow similar task belongs to the mediator, that is to help in solving of the conflict, but the mediator does not have the power of making a final decision. The Arbiter however takes the final decision and all the parties are expected to accept this decision.

Within a word processing program, predesigned files that have layout and some page elements already completed are called
text boxes
templates.
frames
typography

Answers

Answer:

I think it's B) templates

     

                   Sorry if it's wrong I'm not sure!!

Explanation:

Within a word processing program, predesigned files that have layout and some page elements already completed are called: B. templates.

In Computers and Technology, word processor can be defined as a processing software program that is typically designed for typing and formatting text-based documents. Thus, it is an application software that avail end users the ability to type, format and save text-based documents such as .docx, .txt, and .doc files.

A template refers to a predesigned file or sample in which some of its page elements and layout have already completed by the software developer.

In this context, predesigned files in a word processing program, that have layout and some page elements already completed by the software developer is referred to as a template.

Read more on template here: https://brainly.com/question/13859569

what is the name of the windows location that stores cut or copied information

Answers

Answer:

clip board

Explanation:

it is known as a clipboard

Clipboard

The clipboard, also known as pasteboard, is a particular location on a computer, phone, or tablet memory that temporarily stores cut or copied text or other data.

Where is data stored when you copy something?

The clipboard is located in the computer's RAM (Random Access Memory). Every time you copy something — text, image, file or other data — the selected portion to be copied is placed in the clipboard. Once placed there, this data can be 'pasted' into another program or document.

Where is clipboard located?

Open the messaging app on your Android, and press the + symbol to the left of the text field. Select the keyboard icon. When the keyboard appears, select the > symbol at the top. Here, you can tap the clipboard icon to open the Android clipboard.

To learn more about The clipboard, refer

https://brainly.com/question/1594289

#SPJ2

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. Please select the best answer from the choices provided T F

Answers

Answer:

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. False- most teachers use the textbooks as guides. Visiting the library to seek books on your current topic will not help you in determining what to study.

Explanation:

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. False- most teachers use the textbooks as guides. Visiting the library to seek books on your current topic will not help you in determining what to study.

Answer:

False

Explanation: I took the test and passed!!

Working with text in presentation programs is very ____
using text in other applications.

a) similar to

b)different from

Working with text in presentation programs is very ____using text in other applications.a) similar tob)different

Answers

Answer:

a) similar to

Explanation:

Answer: it is A

Explanation: Your inquiry states that "Working with text in presentation programs is very ____ using text in other applications." Working in presentation software such as Microsoft PowerPoint and Microsoft Word, is very different. Microsoft PowerPoint allows you to do so much more on the visuals, Microsoft PowerPoint and other presentation software also has capabilities to present information than displaying it in a text-editor.

pls make me branliest

which tool lets you create system maintenance tasks that are performed on a regular schedule or when system events occur? a. performance monitor b. event viewer c. iscsi initiator d. task scheduler

Answers

Task Scheduler lets you create system maintenance tasks that are performed on a regular schedule or when system events occur

The Task Scheduler is a tool in Windows that allows you to create and manage tasks that are performed on a regular basis or in response to certain events. You can use the Task Scheduler to perform system maintenance tasks, such as backing up files or running disk defragmentation, that are performed on a regular schedule. You can also use it to run tasks in response to events, such as when a user logs on or an application crashes.

The Task Scheduler is a valuable tool that can help you automate routine maintenance tasks and keep your system running smoothly.

Learn more on Task Scheduler here:

https://brainly.com/question/19999569

#SPJ4

Why is Internet Key Exchange preffered in enterprise VPN deployments?

Answers

In this IKE mode, shared secret keys are generated using a DH exchange, identities are verified, and algorithms and hashes are negotiated. This IKE mode packs more key exchange and negotiation into fewer packets.

How can the management of spam by a mail gateway enhance security?

No matter if you use Office 365 or G-Suite, Mail Gateway offers email security by preventing threats from reaching the mail server. Businesses are protected by this system from denial-of-service assaults, spam, viruses, and malware.

What causes emails to be marked as spam?

Because of this, spam filters are on high alert, and grammatical and spelling mistakes could send your email to the spam bin. Not to mention, your audience will perceive you as unprofessional.

To know more about mail gateway visit:-

brainly.com/question/29561721

#SPJ4

does filtering by form enable you to filter by single field in ms access​

Answers

Filtering by Form makes it easy to create a filter that uses more than one criterion. The Filter by Form window enables you to enter your filter criterion by picking values that you want the filtered records to have.

Answer:

Yes

Explanation:

It filters out by form so you can have a clear vision as to what your look for

the repetition of a series of steps is called a(n) ____.

Answers

The repetition of a series of steps is called a loop.

In programming, a loop is used to execute a set of statements repeatedly until a certain condition is met. There are two types of loops: a for loop and a while loop. A for loop is used to execute a set of statements a specified number of times, while a while loop is used to execute a set of statements until a specific condition is met. The use of loops in programming can help reduce the amount of code needed to perform a task and can make the code more efficient.

This process can be applied to various fields such as mathematics, computer programming, and problem-solving. For example, in computer programming, a loop is used to iterate through a set of instructions multiple times until a certain condition is met. Overall, iteration allows for efficiency and optimization when performing repetitive tasks or improving upon a solution.

Learn more about programming here,

https://brainly.com/question/31515798

#SPJ11

Name the nation that manufactures the most computer chips
globally. Describe the impact of the CHIPs Act, which Congress just
enacted, on the US computer sector.

Answers

The nation that manufactures the most computer chips globally is Taiwan. Taiwan is known for its advanced semiconductor industry, with companies like TSMC (Taiwan Semiconductor Manufacturing Company) being major players in the global chip market.

Now, let's discuss the impact of the CHIPs Act on the US computer sector. The CHIPs Act, which stands for Creating Helpful Incentives to Produce Semiconductors, was recently enacted by Congress in order to strengthen domestic semiconductor production in the United States.

The impact of the CHIPs Act on the US computer sector can be significant. By providing financial incentives and support to domestic chip manufacturers, the act aims to promote investment in new fabrication facilities, research and development, and workforce development in the United States.
To know more about manufactures visit:

https://brainly.com/question/29489393

#SPJ11

Which of the following helps you plan out every step of an animation

Code

Answers

The factor that helps you plan out every step of an animationCode is Storyboards.

What are storyboards?

A storyboard is known to be a kind of a graphic depiction of how a person's video will be shown, and this is often done shot by shot.

It is said to be made up of a  series of squares with depiction or pictures showing each shot, with notes about them.

Therefore, The factor that helps you plan out every step of an animationCode is Storyboards.

Learn more about animationCode from

https://brainly.com/question/18260878

#SPJ1

You've configured your organization's DHCP server to dynamically assign IP addresses and changed the default lease time from eight to four days.

What impact, if any, will this have on the network?

Answers

When one has configured their organization's DHCP Server to dynamically assign IP addresses and changed the default lease time from eight to four days. The impact, if any, this will have on the network is "Increased network traffic" (Option E)

What is a DHCP Server?

The Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that automatically assigns an IP address and other configuration information to an Internet Protocol (IP) host, such as the subnet mask and default gateway.

Each device connecting to the Internet on an IP network must be allocated a unique IP address. DHCP allows network managers to centrally monitor and assign IP addresses. When a computer is relocated, it might automatically give a new IP address to it.

Learn more about DHCP Server:
https://brainly.com/question/10097408
#SPJ1

Full Question:

You have configured your organization's DHCP server to dynamically assign IP addresses to DHCP clients using a lease duration of four days.

You are using a Windows server for DHCP, and the default lease time is eight days.

What impact, if any, will this have on the network?

No impactRouter performance will improveNetwork bandwidth will increaseDecreased network trafficIncreased network traffic

Since the advent of online writing, our audience:

A. has grown much larger

B. rarely reads what we write

C. has become disinterested

D. usually comprises one person​

Answers

Answer:

C............. I think

Since the advent of online writing, our audience: A. has grown much larger.

Writing refers to an act (process) of using alphabets and writing symbols to communicate ideas, emotions, and thoughts in a readable form.

On a related note, online writing can be defined as a process that involves writing and making a literary work (piece) solely available for an audience over the internet.

Generally, the audience for online writing has grown much larger, as a result of technological advancement and the availability of communication devices such as:

SmartphonesLaptopsPalmtopse-diaries

In conclusion, our audience has grown much larger since the advent of online writing.

Read more on online writing here: https://brainly.com/question/10354868

Why are the READ and DATA statements used
together?​

Answers

Explanation:

DATA statements are used in conjunction with READ statements. Together they assign numbers or strings to variable names.

Assume the arrays numberArray1 and numberArray2 each have 100 elements.
Design an algorithm that copies the values in numberArray1 to numberArray2.

In bash or pseudocode, please.

Answers

In Bash, you could use a loop to iterate through each element of numberArray1 and copy its value to the corresponding element of numberArray2 using array indexing.

The Program

#!/bin/bash

# initialize numberArray1

numberArray1=(1 2 3 ... 99 100)

# initialize numberArray2

numberArray2=()

# copy values from numberArray1 to numberArray2

for ((i=0; i<100; i++))

do

 numberArray2[i]=${numberArray1[i]}

done

In pseudocode, the algorithm would look like this:

for i = 0 to 99

 numberArray2[i] = numberArray1[i]

end for

This code iterates through each element of numberArray1, copying its value to the corresponding element of numberArray2 using array indexing. By the end of the loop, numberArray2 will have the same values as numberArray1.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

1. What does "IdentifyGrid" do?
2. What do "Set_Grids" and "PickAGrid" do?
3.Why did you use if-else if-else blocks? What do they do while the program running? How did you create your conditions?

Answers

Using the knowledge of computational language in C++ it is possible to write a code that "Set_Grids" and "PickAGrid".

The "IdentifyGrid" do:

subroutine set_grids

   use species, only: init_species

   use egrid, only: setvgrid, x0, x0_maxw, zeroes, zeroes_maxw

   use species, only: nspec, spec, f0_maxwellian

   use theta_grid, only: init_theta_grid, ntgrid, nbset, bset, eps_trapped

   use file_utils, only: open_output_file, close_output_file

   use mp, only: proc0

   implicit none

   integer :: tsize,is

   logical :: has_maxwellian_species

   integer :: unit

   call init_theta_grid

   call init_species

   allocate (dele(negrid,nspec),speed(negrid,nspec),speed_maxw(negrid),w_maxw(negrid),energy_maxw(negrid))

   w_maxw = 0.0

   energy_maxw = 0.0

   speed_maxw = 0.0

   has_maxwellian_species = .false.

   speed = sqrt(energy)

   do is = 1,nspec

     if  (spec(is)%f0type .EQ. f0_maxwellian) then

        has_maxwellian_species = .true.

        w_maxw(:) = w(:,is)

        energy_maxw(:) = energy(:,is)

        speed_maxw(:) = speed(:,is)

        zeroes_maxw(:) = zeroes(:,is)

        x0_maxw = x0(is)

        exit

     end if

   end do

   if (.not. has_maxwellian_species) write(*,*) &

       'Warning; no maxwellian species; collisions will fail'

See more about C++ at  brainly.com/question/29594386

#SPJ1

1. What does "IdentifyGrid" do? 2. What do "Set_Grids" and "PickAGrid" do?3.Why did you use if-else if-else

In one to three sentences, describe how a digital ink pen could make a task more efficient.

Answers

Answer:

First, digital ink pens will never run out of ink as they do not use ink at all for writing, making it more efficient for the writer to right for longer periods of time. Second, digital ink pens can be used to take notes on any device such as cell phones, tablets, etc.

Explanation:

(25 POINTS)Which statement best reflects the importance of following safety guidelines?

Workplace injuries can result in losses to an organization’s profits.

OSHA responds to complaints of unsafe work environments, and can fine or take negligent employers to court.

Every year, thousands of people die as a result of workplace injuries.

Using equipment safely is faster and makes work more efficient.

Answers

Answer:

I think, Every year, thousands of people die as a result of workplace injuries.

Answer:

B

Explanation:

To securely erase data, the U.S. Department of Defense suggests that data be ______. A) encoded. B) refactored. C) deleted. D) overwritten multiple times.

Answers

The correct answer is D) Overwritten multiple times.To securely erase data, the U.S. Department of Defense suggests that data.

The U.S. Department of Defense suggests that data be overwritten multiple times to securely erase it. This is commonly known as data wiping or data erasure, and it involves writing over the existing data on a storage device with new data to make the original data unrecoverable. The number of times the data should be overwritten depends on the sensitivity of the data and the security requirements of the organization.

To know more about erase data click the link below:

brainly.com/question/3595829

#SPJ11

Draw a flow chart for the examples in selection 1:2:1
Someone help me please.

Answers

Answer:

See picture

Explanation:

Here is an example of a flowchart I found on the web. You use a rhombus shape for a decision, that usually branches into a yes and a no branch.

Without more details, that's about as much that can be said.

Draw a flow chart for the examples in selection 1:2:1 Someone help me please.

7.3 code practice edhesive

Answers

I am guessing this is wht u asked for

def print_sum(a,b,c):

print(a+b+c)

one = int(input("Enter the 1st number: "))

two = int(input("Enter the 2nd number: "))

three = int(input("Enter the 3rd number: "))

print_sum(one,two,three)

You can find the print command in which menu
Format

File

Insert

View

Answers

Click the File menu under Menus tab; Then you will view the Print Preview item.
You go the the menu “File” and if you look down, you will see the “print” option , then you’ll click on that and print your document.

Paraphrase the following passage:
All employee e-mail accounts should be used only for business purposes; use of company e-mail accounts for personal
messages is strictly prohibited. All e-mail is company property and the company reserves the right to access any e-mail sent to
or from any company personal computer. E-mails sent from company e-mail accounts may not contain libelous, slanderous, or
generally offensive content and may not be used to harass any other employee or customer. Employees who violate this policy
are subject to HR discipline up to and including termination, depending on the violation and its consequences.

Answers

Answer:

The usage of official e-mail accounts by employees should be strictly restricted to business-related communication only. Personal messages must not be sent through company e-mails. The company owns all e-mail correspondence, and can review any e-mail sent or received on office computers. Any e-mails transmitted through official accounts should not contain any abusive, defamatory, or insulting content, nor should they be used to harass fellow employees or customers. Those violating this policy are liable to HR penalties, which may lead to their termination, depending on the severity and consequences of the offense.

Jill is interested in a career as a paramedic. She is trained to use medical equipment, she remains calm under pressure, and she has good bedside manner. Which career pathway would best fit Jill’s interests and skills?

Answers

This question is incomplete because it lacks the appropriate options

Complete Question:

Jill is interested in a career as a paramedic. She is trained to use medical equipment, she remains calm under pressure, and she has good bedside manner. Which career pathway would best fit Jill’s interests and skills?

A. Security and Protective Services

B. Law Enforcement Services

C. Emergency and Fire Management Services

D. Correction Services

Answer:

c) Emergency and Fire Management Services

Explanation:

Emergency and Fire Management Services is a career path or occupation where personnels work to ensure that there is a prompt emergency response to incidents or accidents whereby the safety of human lives and properties are threatened.

Emergency and Fire Management services deal with the following incidents listed below:

a) Fire incidents

b) Car accidents

c) Medical emergencies

Staffs or Personnels that work in Emergency and Fire Management services:

a) Fire Fighters

b) Paramedics

Personnels who work with Emergency and Fire Management services should have the following traits or characteristics.

a) They must be calm regardless of any situations they are in

b) They must have the ability and training to use essential medical equipments.

c) They must have excellent people skills as well as good bedside manners.

d) They must possess the ability to work under intense pressure

e) They must possess the ability to calm victims of fire or car accidents

In the question above, the career pathway that is best for Jill based on the skills and interests that she possesses is a career pathway in Emergency and Fire Management Services.

Answer:

the person above me is right

Explanation:

which output will be displayed by the following program?
print(Grade List)
print(100)
print(93)
print(82)
print(Total)
print(100+93+82)

Answers

Answer:SyntaxError: unexpected data type

Explanation:I just took the test and i tried the code in python

:) good luck on the test!!

The output for the given program will be SyntaxError: invalid syntax.

What is invalid syntax?

Invalid syntax simply implies that the code one wrote cannot be interpreted as valid Python instructions. "Syntax" called to the rules and structures of a language, both spoken a s well as written.

Python creates syntax errors when it transforms source code to byte code. They usually implies that something is wrong with the program's syntax.

For illustration: The message is redundant when the colon at the end of a def statement is removed. SyntaxError: insufficient syntax.

Here are some examples of Python syntax errors: x, y = myfunction Otherwise, return x + y: print("Hello!") if mark is greater than 50 print("You succeeded!") If you arrive, print("Hi!") print("Bye!") else If flag is set, print("Flag is set!")

Thus, as per the given program, it is not showing proper format of the language so it will be showing SyntaxError.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ5

Computerized spreadsheets that consider in combination both the
risk that different situations will occur and the consequences if
they do are called _________________.

Answers

risk assessment spreadsheets or risk analysis spreadsheets

Both answers are correct

The given statement refers to computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do which are called decision tables.

A decision table is a form of decision aid. It is a tool for portraying and evaluating decision logic. A decision table is a grid that contains one or more columns and two or more rows. In the table, each row specifies one rule, and each column represents a condition that is true or false. The advantage of using a decision table is that it simplifies the decision-making process. Decision tables can be used to analyze and manage complex business logic.

In conclusion, computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do are called decision tables. Decision tables can help simplify the decision-making process and can be used to analyze and manage complex business logic.

To know more about spreadsheets visit:

https://brainly.com/question/31511720

#SPJ11

TCH SYS Y DATA CLASS. . . A multi-leveled list is basically _____.

A. a paragraph

B. an outline


C. a document

Answers

C. A document I just took the quiz hope it’s right have a great day ☺️
I thibks it’s a document also known as c :)!

recently, techjury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. what percentage of cyberattacks are aimed at small businesses?

Answers

Answer:

43%

Explanation:

43 percent of cyber attacks are aimed at small businesses.

43 percentage of cyberattacks are aimed at small businesses. As techjury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks.

What is cyberattacks?

Cyber attacks are assaults carried out by internet criminals using one or more computers to target one or more computers or networks. Data theft, purposeful system shutdown, or the use of a compromised computer as a launching pad for other attacks are all possibilities in a cyber attack.

A cyber attack is when an individual, group, or organized gang makes an attempt to maliciously breach the security system of another person or organization. Although the image of hackers breaking into an online banking system and stealing billions may come to mind, data breaches are the most common kind of cyberattack.

Thus, it is 43 percent.

For more information about cyberattacks, click here:

https://brainly.com/question/27726629

#SPJ2

4. Write technical term for the following statements
A) The computers designed to handle specific single tasks.
B) The networked computers dedicated to the users for professional wrok.
C) The computers that uses microprocessor as their CPU.
D) A computer that users analog and digital device.
E) The computer that processes discontinuous data.
F) The portable computer which can be used keeping in laps.
G) The general purpose computers used keeping on desk. ​

Answers

Answer:

a) Special-purpose computer

b)

c)microcomputers

d) hybrid computer

e) digital computer

f) laptop computers

g) desktop computers.

Please mark me as brainlist :)

A PIN is easier for the account owner to use and remember because it is shorter than a password. However, a PIN can only be used once. However, it is also easier for hackers to steal. However, a password can safely be stored. However, it is more difficult for hackers to steal.

Answers

Answer:

Pin

Explanation:

Pin number works for me.

Other Questions
Find the missing side length.1) 10 / ?2) 24 / 15 ( look at photo ) Calculate the average power required to lift a 750 N object a vertical distance of 10 meters in 4.0 seconds. there are several types of intrusion detection systems (idss). what type of ids builds a profile of an environment's normal activities and assigns an anomaly score to packets based on the profile? Complete logical predictions with the correct forms of the verbs in the future tense. OJO! Use each verb once. Several of these verbs are reflexive.aceptardecirsepedirseapoyarenojarsequejarsearrepentirseestarsalirconversarhablartranquilizarsedecidirinvitaPero poco a poco, los dos (6) ________ y (7) ________ amablemente sobre las expectativas de cada uno. Finalmente, los novios (8) ________ de la pelea porque estn locos de amor el uno por el otro y (9) ________ disculpas. l la (10) ________ decidir a hacer un viaje juntos. Ella (11) ________ ir al viaje. Al poco tiempo los dos (12) ________ casarse. Sus amigos (13) ________ muy felices y (14) ________ aceptar la decisin. Which is the closest antonym for the word analyze?A. InspectB. PonderC. ReconsiderD. Overlook 9-22 Throughput costing (continuation of 9-21). The variable maufacturing costs per unit of Nascar Motors are as follows: April May Direct cost per unit $6,700 $6,700 Direct manufacturing labor cost per unit $1,500 $1,500 Manufacturing overhead cost per unit $1,800 $1,800 1. Prepare income statements for Nascar Motors in April and May 2017 under throughput costing. 2. Contrast the results in requirement 1 with those in requirement 1 of Exercise 9-21. 3. Give one motivation for Nascar Motors to adopt throughput costing. Question 1 McDonald's, a big burger joint, is charging $6 for its very famous Big Mac hamburger and selling around 20 million Big Mac in a year in Australia. a. Suppose McDonald's increases the price of its Big Mac to $6.50. Consequently, quantity sold of the Big Mac falls to 17 million. How much revenue will McDonald's gain? What can you infer about the price elasticity of demand (PED) for McDonald's Big Mac? Assume in an alternative scenario, the increase in the price of Big Mac to $ 6.5 reduces its quantity sold to 19 million. How much revenue will McDonald's gain now? What can you conclude about the PED now? (4 Marks) I need help! Im struggling. I just need to find a which technique would a speaker use to control the speed at which the listener hears a poem.A. pacingB. repetitionC. rhymeD. volume how to create a culture at your new technology startup that promotes innovation, trust, and high performance What factors contributed to industrial growth in the late 1800s? Solve the equation 4cos20 + 10cos 0 = -4 given that 00 < 2T. Provide your answer below: write a nonupdateable rental stats view that returns the rating column and a rent ratio column calculated by dividing the num rentals by inventory cnt column value found in the film stats view of chapter 14 (learning sql). the rental stats view should have the following structure when you describe it. ------------ ------------------------------------ ------ ----- --------- ------- | field | type | null | key | default | extra | ------------ ------------------------------------ ------ ----- --------- ------- | rating | enum('g','pg','pg-13','r','nc-17') | yes | | g | | | rent ratio | decimal(24,4) | yes | | null | | ------------ ------------------------------------ ------ ----- --------- ------- 2 rows in set (0.16 sec) assuming you wrote the rental stats view correctly, you should be able to run the following query: select * from rental stats where rent ratio > 4 order by rating; the query should display 130 rows, like: -------- ------------ | rating | rent ratio | -------- ------------ | g | 4.4000 | | g | 4.1667 | | g | 4.2500 | | g | 5.0000 | ... | nc-17 | 4.2857 | | nc-17 | 4.5000 | | nc-17 | 4.5000 | -------- ------------ 130 rows in set (0.02 sec) There are seven possible processes. how many processes do you think your rock material will go through? if you were working with a follower who exhibited d4 tendencies, what type of leader would you need to be? Select four traits preschoolers will develop if supported and encouraged as toddlers.sharp memorytrust in othersstrong spatial skillsself-confidencecuriositythe need for constant attentionappreciation for musicempathy question 5 jonah is an 18-month-old boy from central america who experienced extreme deprivation during the first year of his life. although he was adopted by a loving family in the united states, jonah showed signs of reactive attachment disorder. which of the following is not a sign or symptom jonah would be likely to display? jonah is willing to wander off with a stranger. jonah cries easily and is not soothed by his mother or father. jonah relies on himself for comfort and is reluctant to seek help from others when he is scared, upset, or unsure. jonah acts withdrawn and avoids interaction with adults. Use a power-reducing identity to rewrite the following expression below in terms containing only firstpowers of cosine.cos4(x)tan?(x) Ozmar earns a gross annual salary of $85,000, Marzo earns a gross annual salary of $90,000 and the taxable earnings on their savings combined is $2,000 per year. Their marginal tax rate is 35%. Marzo has a student loan which is paid monthly, the current balance is $25,000 with an interest rate of 1.2%, compounded monthly. This loan will be paid in full in 3 years. While Ozmar was able to purchase a car outright, Marzo purchased a new car 2 years ago at a cost of $22,000, and financed it through the dealerships plan for 60 months at 1.99% compounded monthly. Payments are monthly. Ozmar and Marzo took your earlier advice about credit card balances and now pay off their balance each month. They use their credit cards only for car expenses and restaurant meals which combined tend to be about $300 per month.Ozmar and Marzos apartment rent includes all utilities plus 2 underground parking spaces for $2,800 per month. Their car insurance combined is $300 per month and tenants insurance is $50 per month, food, entertainment and "other" run at about $650 per month and their joint cell phone bill is $200 per month. Marzo pays $550 per year for parking at work.Given the prices in the GTA, Ozmar and Marzo understand that they will need to move farther east and/or north to be able to afford to purchase a home. Thus they anticipate Ozmar will need to drive to work and Marzo will have a further drive so they anticipate their car expenses are likely to increase to about $600 per month, plus Ozmar would need to pay for parking at work which is $350 per year.In addition to a mortgage payment, Marzo and Ozmar would also need to pay property taxes, which they estimate at $2,500 per year, utilities (electricity, water, internet) which they estimate at $300 per month and maintenance which they estimate at $1,200 per year. Marzo and Ozmar have $150000 in savings available for use in a house purchase. They have been examining the market for a while and realize that they will need about $3,000 for closing costs, and would like to keep $15,000 as an emergency fund, which leaves them with a down payment of $132,000. They have seen a property North of Whitby which they are very interested in. It is about 20 years old but has been well maintained, although not upgraded. They believe that they could acquire this property for $700,000. They realize that they do not meet the 20% minimum down payment amount so will have to pay Mortgage Loan Insurance. Thus, they estimate the monthly payments for a 5 year fixed mortgage, with a 25 year amortization period at a rate of 3.59% will be $2,862.91. For a 5 year variable rate, closed mortgage, with a 25 year amortization period at a rate of 2.05%, they estimate their monthly payment would be $2,421.35.Marzo and Ozmar have received pre-approval for a mortgage up to $700,000 and have determined they will go with the 5 year fixed rate of 3.59%. Before they move forward to purchase the property, they would like to do a comparison of renting versus buying. The information above provides a significant number of estimates for you to use, however, also assume that Ozmar and Marzo could earn an annual return of 2% on their security deposit or downpayment if it was not being used otherwise; that their home owners insurance policy would be $1000 per year and that, combining their car insurance policies with their home owners policy would reduce the annual car insurance cost by 15%. Also assume an expected increase in property value of 5% over 3 years and that mortgage payments over 3 years would reduce the balance owed by $44,620.10.Create a table similar to that in Exhibit 7.9 (page 216 in the text) to compare the cost of renting versus buying. The information given provides actual numbers or estimates for the elements in the table.Based on this table, was the decision to purchase a wise investment? Why or why not?Marzo and Ozmar are very happy. They have just discovered that their planned family will begin somewhat earlier than originally anticipated. They expect to be parents in 7 months. They are able to purchase creditor insurance and critical illness insurance on their mortgage. They can purchase creditor insurance coverage for $65.59 per month. They can add critical illness for one party for $136.23 per month; if they wish to provide combined insurance for both Ozmar and Marzo, the cost would be $231.60 per month. Provide recommendations (with explanations as to why) regarding creditor insurance. Also provide recommendations (with explanations as to why) regarding including critical illness insurance for Ozmar or Marzo or both. 6.16 (**) Consider a parametric model governed by the parameter vector w together with a data set of input values X1, ..., XN and a nonlinear feature mapping Q(x). Suppose that the dependence of the error function on w takes the form J(w) = f(wT(x1), ..., wT(xn)) + g(wIw) W W W T W (6.97) where g() is a monotonically increasing function. By writing w in the form N W = ape(x)+w| (6.98) n=1 show that the value of w that minimizes J(w) takes the form of a linear combination of the basis functions (xn) for n = 1, ...,N.