the path to the distribution share should always be referred to by which path to ensure that it can be accessed over the network during unattended installations?

Answers

Answer 1

IT workers can create and maintain unattended setup response files for Windows using the Microsoft Windows System Image Manager (SIM) tool found in the Windows Assessment and Deployment Kit before installing the operating system.

Windows SIM also displays every variable component parameter present in a Windows image. IT professionals can add device drivers, third-party software, language packs, and more to the response files.

The first step in using an answer file with Windows SIM is creating a catalogue file. The catalogue file holds a writeable replica of the install. windows file from the Windows installation disc that the administrator uses to set up the OS.the files that the answer file specifically requests are shared. The specific folder designated by IT is where these files are maintained. The paths to the files are immediately adjusted to point to the right folder.

Additionally, IT can import any packages containing instructions for adding or removing apps from the distribution share but are not included in the Windows image. IT can then apply the distribution share's packages to the answer file.

Once the response file is configured, IT professionals can add elements, properties, and other resources to it.

IT may employ scripts, applications, or third-party drivers from a distribution pool, an optional storage place, in terms of extra resources. In addition, IT can select from a distribution smaller, more portable configuration sets.

Learn more about Windows image from here:

https://brainly.com/question/23792543

#SPJ4


Related Questions

Define Rule Of Thirds

Answers

Answer:

In photography, the rule of thirds is a type of composition in which an image is divided evenly into thirds, both horizontally and vertically, and the subject of the image is placed at the intersection of those dividing lines, or along one of the lines itself.

Multiple TCP streams can distinguished on a given machine using.
Select one:
a. network interface cards
b. All of the mentioned ,t. c. Ports
0 d. DNS addresses

Answers

The correct answer is option c. Ports.

Multiple TCP streams can be distinguished on a given machine using ports. In TCP/IP networking, ports are used to identify specific applications or services running on a device. Each TCP stream is associated with a unique combination of source and destination ports, allowing the system to differentiate between multiple concurrent connections.By using different port numbers for each TCP stream, the operating system can correctly route incoming packets to the corresponding application or service, ensuring that the data is delivered to the correct destination.

Learn more about TCP here:

https://brainly.com/question/27975075

#SPJ11

Adjust the code you wrote for the last problem to allow for sponsored Olympic events. Add an amount of prize money for Olympians who won an event as a sponsored athlete.

The

Get_Winnings(m, s)
function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.

Here's my answer for question 1 please adjust it thanks!

def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

Answers

Answer:def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

exp: looking through this this anwser seemes without flaws and i dont follow

if you can provide what you are not understanding ican an help

Here is the answer to Edhesive 7.5 code practice


def GPAcalc(grade, weight):


grades = {"A": 4, "B": 3, "C": 2, "D": 1, "F": 0}


if weight == 0:


return grades[grade]


else:


return grades[grade] + 1


def Main(Random):

Print ("hi")


classes = int(input("How many Classes are you taking? "))


total = 0


for x in range(classes):


letter = input("Enter your Letter Grade: ")


user_weight = int(input("Is it weighted? (1 = yes 0 = no) "))


grade = GPAcalc(letter, user_weight)


total += grade


print("Your GPA score is: ", grade)


print("Your weighted GPA is a",(total/classes))

Answers

oh my god i could never do coding

true/false. this method changes the capacity of the underlying storage for the array elements. it does not change values or order of any elements currently stored in the dynamic array.

Answers

The statement  is true. The "reserve" method changes the capacity of the underlying storage for the array elements, but it does not change the values or order of any elements currently stored in the dynamic array.



The statement in the question refers to the method called "reserve" in C++ (and similar methods in other programming languages). The "reserve" method is used to pre-allocate memory for a dynamic array without actually inserting any elements into the array. This can be useful in situations where you know ahead of time how many elements you will need to store in the array, so you can avoid the overhead of multiple reallocations of the underlying storage as the array grows. However, it is important to note that the "reserve" method does not actually allocate any memory for the elements themselves, only for the underlying storage. So if you subsequently insert more elements into the array than you reserved space for, the array will still need to be resized and the existing elements will need to be copied to a new location in memory. This can be a performance hit if you frequently need to add elements to the array.


To know more about capacity visit :-

https://brainly.com/question/25567134

#SPJ11

Which two contextual tabs help you change the look and feel of SmartArt?

Answers

PowerPoint offers two contextual tabs that enable you to modify the design and format of your SmartArt graphics: the SmartArt Tools – Design tab and the SmartArt Tools – Format tab. Note that these contextual tabs appear only when you have selected a graphic. If they disappear, select your graphic again to view them.

Describe each of the principal factors risk factors in
information systems projects (20 marks)

Answers

The principal risk factors in information systems projects encompass various aspects such as project complexity, technology challenges, organizational factors, and external influences.

These factors contribute to the potential risks and uncertainties associated with the successful implementation of information systems projects.

Project Complexity: Information systems projects can be inherently complex due to factors such as scope, scale, and the integration of multiple components. The complexity may arise from intricate business processes, diverse stakeholder requirements, or the need for extensive data management. Complex projects pose risks in terms of project management, resource allocation, and potential delays or cost overruns.

Technology Challenges: Information systems projects often involve implementing new technologies, software systems, or infrastructure. Technological risks include compatibility issues, scalability limitations, security vulnerabilities, and the need for specialized expertise. These challenges may impact the project timeline, functionality, and long-term viability of the system.

Organizational Factors: The success of an information systems project depends on organizational factors such as leadership, communication, and stakeholder engagement. Risks in this domain include lack of management support, insufficient user involvement, resistance to change, inadequate training, and poor project governance. Failure to address these factors can lead to user dissatisfaction, low adoption rates, and project failure.

External Influences: External factors, such as changes in regulatory requirements, market dynamics, or economic conditions, can introduce risks to information systems projects. These factors may necessitate modifications to project scope, increased compliance efforts, or adjustments to business strategies. Failure to anticipate and adapt to external influences can disrupt project timelines and impact the project's overall success.

Understanding and managing these principal risk factors is crucial for effective project planning, risk mitigation, and successful implementation of information systems projects. Proper risk assessment, contingency planning, stakeholder involvement, and ongoing monitoring are essential to minimize the impact of these risks and ensure project success.

Learn more about  information systems here:

https://brainly.com/question/13081794

#SPJ11

Which of the following characterizes pooled interdependence? Multiple Choice Each member has a great deal of discretion in terms of what they do and with whom they interact while collaborating to accomplish the team’s work. Interaction in the team only occurs between members who perform tasks that are next to each other in a sequence. Members interact with a subset of other members to complete the team’s work. Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output. Different tasks are done in a prescribed order, and the group is structured such that the members specialize in these tasks.

Answers

Answer:

Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.

Explanation:

A pooled interdependence arise or occurs when the members of a group are able to function with relative independence and then their combined output or level of productivity is used to significantly augment the group's overall performance.

A characteristic of pooled interdependence is that group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.

A firm would be most likely to establish an enterprise portal if it wanted to Multiple Choice prevent outsiders from using its information network. allow users to access different areas of its network depending on their relationship to the firm. prevent viruses from being downloaded from the company's website. search for hidden patterns and unknown relationships among data stored in different information systems.

Answers

Answer:

prevent outsiders from using its information network.

Explanation:

The firm would use a portal to create a network or intranet for all its information because only employees would have access to it.

As important as it is to plan ahead, sometimes you _____. A. Need to throw all the rules of the road out the window B. Can't stop things from going wrong C. Have a higher priority than driving safely D. Will regret having made plans

Answers

Answer:

B

Explanation:

This seems the most appropriate..

a lock guarantees the open use of a data item to multiple transactions.

Answers

A lock guarantees the open use of a data item for multiple transactions. This statement is false.

Any data item may have a lock applied to it in order to monitor its state and ensure isolation and non-interference during concurrent transactions. It is the most straightforward method of securing data during a transaction. Simple lock-based protocols enable all transactions to obtain a lock on the data prior to inserting, deleting, or updating it. Once the transaction has been completed, the data item will be unlocked. The database manager locks buffer pools, tables, data partitions, table blocks, or table rows to provide concurrency control and prevent unauthorized data access. Grain locking. Another program might not be able to access a database object if one application has a lock on it.

Learn more about lock guarantees here:-

https://brainly.com/question/29832972

#SPJ4

In 3-5 sentences, describe how you would insert a graph in your word-processing document.

Answers

Answer:

Click the “Insert” tab, then click the “Chart” button on the Illustrations section to open the “Insert Chart” pop-up window.

Select the type of graph to add to the document, such as a pie chart or bar graph. ...

Click “OK” and Word adds a chart with generic data points to the document.

Explanation:

Why would it be beneficial to move the Virtual memory to a different physical disk than the (C:) drive?

Answers

Virtual memory is beneficial to be moved to a different physical disk than the (C:) drive because it helps improve system performance and reduces disk contention.

How does moving virtual memory to a separate disk benefit system performance and reduce disk contention?

When virtual memory is moved to a different physical disk than the (C:) drive, it brings several advantages. Virtual memory is a mechanism used by the operating system to allocate additional memory when the physical RAM (Random Access Memory) becomes insufficient to handle the tasks at hand. By relocating the virtual memory to a separate disk, the system can access it more efficiently, leading to improved performance.

The (C:) drive is typically used for the operating system, applications, and other files, which can create heavy disk activity. When virtual memory is stored on the same disk, it competes for resources and can result in disk contention. This contention occurs when multiple processes are trying to access the disk simultaneously, leading to slower response times and potential bottlenecks.

Moving virtual memory to a different physical disk helps alleviate this contention. By separating the virtual memory from the (C:) drive, the system can distribute the disk I/O (Input/Output) load across multiple disks, reducing the overall contention and improving system responsiveness. This approach is especially beneficial when dealing with memory-intensive tasks or running multiple applications simultaneously.

Learn more about virtual memory

brainly.com/question/30756270

#SPJ11

Warmer weather may result in sales of cold food products, water, fans, and swimwear is an example of :a. Heuristics b. Inference engines c. Rule-based systems d. Hierarchical learning

Answers

Warmer weather may result in sales of cold food products, water, fans, and swimwear is an example of rule-based systems. Hence, option C is correct.



This statement presents a set of rules that connect warmer weather to specific products that are likely to sell well. Rule-based systems are a type of artificial intelligence that uses a set of predetermined rules to make decisions or draw conclusions. In this case, the rules connect weather patterns to consumer behavior and preferences, leading to the selection of certain products to sell.

This is different from heuristic systems, which use trial and error to arrive at solutions, or inference engines, which use algorithms to draw conclusions based on available data. Hierarchical learning is another type of artificial intelligence that uses a hierarchy of models to learn and adapt to new information.

To learn more about Rule-based systems, click here:

https://brainly.com/question/16942470

#SPJ11

Should consider the following: 1. Table of content, 2. An introduction, 3. Page numbers, 4. In-lext citations, 5. Reference list 6. Your font should be 12 Arial or Times of Roman, Assignment 1 [50 Marks] Critically explain the evotution of management thought through the classical, behavioral and quanfitative perspectives.

Answers

When writing an assignment, it is essential to include certain elements that make it easy for readers to navigate the document and understand the ideas presented. These elements include a table of content, an introduction, page numbers, in-text citations, and a reference list.

Additionally, it is important to adhere to specific formatting requirements such as using a 12-point Arial or Times New Roman font. In this assignment, you are tasked with critically explaining the evolution of management thought through the classical, behavioral, and quantitative perspectives. To do this effectively, you should consider the key ideas and theorists associated with each perspective and evaluate their contributions to the field of management.

Begin by introducing the topic and providing some background information on the evolution of management thought. Then, move on to discuss the classical perspective, which emerged in the late 19th and early 20th centuries and focused on increasing efficiency and productivity through principles such as scientific management and bureaucracy.
Next, explore the behavioral perspective, which emerged in the mid-20th century and emphasized the importance of understanding human behavior and motivation in the workplace. Finally, discuss the quantitative perspective, which emerged in the 1950s and focused on using mathematical models and statistical analysis to improve decision-making.
Throughout your analysis, be sure to provide examples of key theorists and their contributions to each perspective. You should also consider the criticisms and limitations of each perspective, as well as how they have influenced contemporary management practices.

Know more about writing an assignment here:

https://brainly.com/question/2233875

#SPJ11

The bullet points above describe _____.
A.) network topologies
B.) access privileges
C.) modems
D.) firewalls

Answers

Answer:

B

Explanation:

composed of clients and services, protocols, and network drivers is called?

Answers

The term "Protocol Stack" is used to describe a network architecture composed of clients and services, protocols, and network drivers.

A Protocol Stack, also known as a Network Protocol Stack or Network Stack, is a software framework or architecture that defines how networking protocols and services are organized and interact within a computer network. It is composed of multiple layers, each responsible for specific functions related to network communication.

The Protocol Stack consists of three main components: clients and services, protocols, and network drivers. Clients and services represent the applications or programs that initiate or consume network services. Protocols refer to the set of rules and conventions that govern how data is formatted, transmitted, received, and interpreted across the network. Network drivers, also known as network interface controllers or NICs, are the software components that facilitate communication between the computer's operating system and the physical network hardware.

The Protocol Stack follows a layered approach, with each layer building upon the functionalities provided by the layer below it. Common examples of protocol stacks include the TCP/IP (Transmission Control Protocol/Internet Protocol) stack, which is the foundation of the Internet, and the OSI (Open Systems Interconnection) model, a conceptual framework that describes network protocols and their interactions.

In summary, the term "Protocol Stack" refers to the network architecture that encompasses clients and services, protocols, and network drivers. It provides a structured and layered approach to network communication, facilitating the exchange of data between networked devices and enabling the interoperability of different network protocols and services.

Learn more about TCP/IP : brainly.com/question/17387945

#SPJ4

Wanda is taking photos using a lens that sees and records a very narrow view with a focal length longer than 60mm. When her friend asks what type of lens she is using for their photography outing,

Answers

Answer:

a telephoto lensExplanation: It's on Quizlet lol

And I got it correct on the test...

It provides an instant 2x optical zoom and has a focal length that is twice that of the primary lens. Additionally, it has a limited field of view, which causes distant things to resemble those that are nearby.

What role of telephoto lens in taking photos?

Simply put, a telephoto lens deceives the eye into thinking a topic is closer than it actually is. This may be the best option for photographers who are physically unable to go close to their subjects or who are concerned for their safety.

With a telephoto lens, the background elements appear larger and nearer to the foreground elements. The converse is true with wide-angle lenses, which make background elements appear smaller and farther away from the camera.

Therefore, a telephoto lens Wanda uses a lens longer than 60 mm in focal length to capture images with a very small field of view. When her friend inquires about the lens she will be using on their photographic excursion.

Learn more about telephoto lens here:

https://brainly.com/question/15599633

#SPJ2

Draw truth table for the following logic circuit:

(Please I really need help with this)

Draw truth table for the following logic circuit: (Please I really need help with this)

Answers

Keep Scrolling! :D

\( \rule{999pt}{66646pt}\)

You want to allow RDP 3389 traffic into your network for a group of users to access a particular workstation that has a special application in your office. Which endpoint security tool would you use to make this happen

Answers

Firewall Rules often monitor the control information that is present in individual packets. The endpoint security tool would you use to make this happen is firewall rules.

Rules are often known to be guarding looks into the control information.

The Rules often block or allow those packets using the rules that are spelt out on these pages.

It is also given mainly to computers or to policies that are assigned to a computer or collection of computers.

Learn more from

https://brainly.com/question/15681183

To print your worksheet on a piece of paper larger than 8 1/2×11 inches which EXCEL tab would you use : _________

Answers

Choose Page Setup from the Page Layout tab. Choose the Adapt to checkbox on the Page tab, then decide by what percentage you want the sheet to be smaller or larger.

If your worksheet contains numerous columns, you can utilise the Scale to Fit options to make it smaller so that it would print more comfortably.

Take these actions: On the ribbon, click the Page Layout tab.

Choose 1 page in the Width box and Automatic in the Height box in the Scale to Fit group. Now the columns will fill one page, but the rows may fill more than one page. It's important to comprehend a few concepts related to resizing a worksheet to suit a printed page.

Learn more  about Page Setup here:

https://brainly.com/question/29577990

#SPJ4

The box on a slide that has a dotted or hatch-marked border and that contains the insertion point is a text ____.

Answers

it is known as a text placeholder

Placeholder is the answer

is willingness to be held accountable for your actions

Answers

Answer:

Responsibility.

Explanation:

Responsibility is the willingness to be held accountable for your actions.

A responsible person would always take measured and careful step or engage in well-thought-out actions that will add value to their lives and positively impact their immediate environment.

This ultimately implies that, responsibility is an individual characteristic which typically involves acting in a positive manner and owning up to any of your actions.

In a nutshell, responsibility requires that an individual does the right thing, the right way, at all times.

What are pixels that are the exact same between multiple frames called?

Answers

Answer:

the answer is temporal redundancy

Explanation:

Computer Definition. Pixels in two video frames that have the same values in the same location. Exploiting temporal redundancy is one of the primary techniques in video compression (see interframe coding). Contrast with spatial redundancy.

Pixels that are the exact same between multiple frames are called: temporal redundancy.

A digital image can be defined as a type of image that comprises a matrix of pixels and is typically stored in binary form.

In digital imaging, pixel can be defined as the smallest (minute) are of illumination on an output device through which an image is  formed. Thus, a pixel is a small or minute dot that a digital image is composed of.

A frame can be defined illustration or presentation of all of the multiple visual elements in an image.

A temporal redundancy is also referred to as exploiting interframe coding and it can be defined as pixels that are the exact same between multiple frames.

For instance, when there are pixels in two (2) frames that are having exactly the same values in the same location, this is usually described as temporal redundancy.

Read more: https://brainly.com/question/12972964

What does Amara hope will
happen when Dad sits on the sofa?

Answers

Amara hope her  Dad will be comfortable using the sofa. Check more about sofa below.

What does sofa implies?

A sofa is known to be a type of long seat that is often made with arms and it also has a back rest. One can convert the sofa to a bed.

Conclusively, when Amara got the sofa for her dad, she hope that her dad will be comfortable using the sofa.

Learn more about sofa from

https://brainly.com/question/14791147

In Excel, what are the headings in the Insert - Charts tab?
a PivotChart only
b Recommended charts only
c Maps only
d Recommended charts, maps, PivotChart

Answers

In Excel, under the Insert tab, a user can find multiple options for creating charts. These options include d) Recommended charts, PivotCharts, and Maps.

These charts can be created from either existing data on a worksheet or from scratch.The Recommended charts option provides a list of charts that Excel recommends for a specific set of data. It is a very helpful tool for people who are new to chart making. Users can simply select the type of chart they want and Excel will automatically create the chart. PivotCharts are charts that are created based on PivotTables. PivotTables are used to summarize large amounts of data and make it easier to analyze. PivotCharts allow users to visualize this data in a chart format.

Maps, on the other hand, are used to represent data based on geographic location. They can be used to create heat maps, tree maps, and other types of maps based on data. In conclusion, under the Insert tab in Excel, users can find three options for creating charts: Recommended charts, PivotCharts, and Maps. Each of these options provides a unique way of creating charts based on different types of data. So the answer is d Recommended charts, maps, PivotChart.

Learn more about creating charts: https://brainly.com/question/29777209

#SPJ11

Need help with my hw.​

Need help with my hw.

Answers

If I am correct, it should be D. Hopefully I was helpful.
It is d I got it today

Which actions help to protect a computer and keep it running properly? Check all that apply.
performing regular scans
deleting any unwanted files
backing up files and other data
saving Internet browsing history
saving and storing all junk files

Answers

Answer:

backing up files and other data

Submit your definitions for the words below:

gigabyte
intranet
pixel
telecommunication
modem
raster graphic
vector graphic
digital
GUI

Answers

Answer:

1. gigabyte- Technology branded as GIGABYTE or sometimes GIGA-BYTE; formally GIGA-BYTE Technology Co., Ltd. it is a Taiwanese manufacturer and distributor of computer hardware. Gigabyte's principal business is motherboards.

2. intranet-a computer network for sharing information, collaboration tools, operational systems, and other computing services within an organization, usually to the exclusion of access by outsiders.

3.  pixel-a minute area of illumination on a display screen, one of many from which an image is composed.

4. telecommunication-the transmission of information by various types of technologies over wire, radio, optical or other electromagnetic systems.

5. modem- a  combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line.

6. raster graphic-In computer graphics and digital photography, a raster graphic or bitmap image is a dot matrix data structure that represents a generally rectangular grid of pixels (points of color), viewable via a bitmapped display (monitor), paper, or other display medium.

7.  vector graphic-computer graphics images that are defined in terms of points on a Cartesian plane, which are connected by lines and curves to form polygons and other shapes.

8.  digital-expressed as series of the digits 0 and 1, typically represented by values of a physical quantity such as voltage or magnetic polarization.GUI-a system of interactive visual components for computer software.

9. GUI- displays objects that convey information, and represent actions that can be taken by the user. The objects change color, size, or visibility when the user interacts with them.punineep and 15 more users found this answer helpful4.0(6 votes)

Explanation:

Tom wants to send some songs to one of his friends by short-range wireless connection in his home. Which technology would suit this task?

a. Wifi
b. WLAN
c. Bluetooth
d. PAN

Answers

Answer:

a

Explanation:

Other Questions
true/false: currency futures are usually customized contracts which are negotiated between mnc's and banks Write the exponential equation in logarithmic form.8 e^ 2.079In______ What is an example of autonomy in nursing? can u help please? i don't understand this The aggregate supply curve shows the relationship between:A) the level of inputs and aggregate output.B) the inflation rate and the level of inputs.C) the wage rate and the level of employment.D) the inflation rate and the level of aggregate output supplied. How would the pattern in the last question be different if the slit were 0.06mm wide instead of 0.02mm? Again assume that the slit is vertical.A: It would look very similar but 3 times broader (including three times more space between dark spots if any.)B: It would be hard to tell any difference because the slits are so small anyway.C: The width of the pattern is about the same, but it is three times taller.D: It would look very similar but 9 times broader (including nine times more space between dark spots if any.)E: It would look very similar but 3 times narrower (including three times less space between dark spots if any.)F: It would look very similar but 9 times narrower (including nine times less space between dark spots if any.)G: The width of the pattern is about the same, but it is about a third as tall. a wire carrying current I is perpendicular to a magnetic field of strenght B. Assuming a fixed lenght of wire, which of the following changes will result in decreasing the force on the wire by a factor of 2?*the options are in the picture attached The table gives a set of outcomes and their probabilities. Let A be the event "the outcome is a divisor of 4". Find P(A). Outcome Probability 1 0.02 2 0.09 3 0.01 4 0.44 5 0.44 Vernon wonders whether nadph and atp should be classified as reactants or as products of photosynthesis. how should these compounds be classified? a. as reactants, because they are used up by photosynthesis b. as products, because they are generated by photosynthesis c. as either reactants or products, depending on the rate that photosynthesis occurs d. as neither reactant nor product, because they are recycled instead of made or used up In neutron moderation, neutrons are slowed down so that: How do crooks words to lennie about loneliness reinforce this theme of the novel? (Of Mice and Men - Part 4) advertising is the action of a firm that is intended to maintain the differentiation of its product over time. Identify some grievances addressed in the Declaration of Independence and then how they were "Fixed" in the U.S. Constitution? 1. Suppose we have a die that has a 40% chance of coming up "red". We roll the die 12 times.(a) Show that this situation meets the criteria for using the binomial distribution.(b) How many ways are there to get exactly 5 red results in those 12 rolls?(c) What is the probability of getting exactly 5 red results in those 12rolls?(d) What is the probability of getting at least one red result in the 12?(e) What is the probability of getting exactly 1 red result in the 12 rolls? (This is NOT the same question as (d))(f) What is the expected number of red results in the 12 rolls?(g) What is the standard deviation of the number of red results in the 12 rolls? The Gospel of Mark presents the darkest and most scandalous view of the cross as compared to the other three Gospels Matthew, Luke, and John _______ In John 11 Jesus waited 4 days to come to the tomb of Jesus to prove He overcomes death through His own resurrection _______. government should only regulate personal behavior when (and only to the extent that) a persons behavior may have significant adverse impact on the well-being of other persons. What is the magnitude of the magnetic field at the point the center of a long, straight solenoid; the solenoid carries current 0.300 A and has 4.00 * 103 windings per meter How to calculate the area of this? on a linux system using rpm for package management, which of the following commands would you use to search online repositories for an available firefox package? How do I make someone brainlyiest?