when a hacker obtains a unique identifier for a user and may therefore assume the identity of this user and perhaps add or remove items from the user's shopping cart, this would be:

Answers

Answer 1

When a hacker obtains a unique identifier for a user, it means that they have somehow gained access to sensitive information such as a username, password, or other identifying details.



If the hacker is able to access the user's shopping cart, they may add or remove items without the user's knowledge or consent. This can result in the user being charged for items they did not purchase or having items they intended to purchase removed from their cart. This type of identity theft and unauthorized access is a serious concern for individuals and businesses alike.

It is important to protect sensitive information and regularly monitor accounts for any suspicious activity. Additionally, using strong and unique passwords and enabling two-factor authentication can help prevent unauthorized access to accounts.

know more about hacker here:

https://brainly.com/question/14366812

#SPJ11


Related Questions

write a program to enter length of a square and print area of square.
(class 8)​

Answers

Explanation:

Using python,

Length=int(input('Enter the length :'))

Breadth=int(input('Enter the breadth :'))

Area=length*breadth

print('The area is:' , Area)

Answer:

program by INPUT statement

Explanation:

CLS

REM to enter length of a square and print area of square.

INPUT "Enter length of a square"; l

LET Area of a square = l^2

PRINT " AOF "; Area of a square.

END

A person who leads a
group uses
skills.

Answers

Answer:

He uses skills to make sure he is good leader

Explanation:

What is a benefit of the Name Manager feature?
A) add, edit, filter names you have created
B) add, edit, filter predetermined names for cells
C) create a name from a selection
D) rename a worksheet or a workbook

ANSWER: A

Answers

Answer:Its A

Explanation: edge2020

The benefit of the Name Manager feature is to add, edit, and filter names you have created. The correct option is A.

What is the Name Manager feature?

The name manager feature is present in the ribbon present in the window of the tab. To open this, open click the formula tab. For instance, we sometimes utilize names rather than cell references when working with formulas in Excel.

The Name Manager allows us to add new references, update existing references, and delete references as well.

To interact with all declared names and table names in a worksheet, use the Name Manager dialog box. You could want to check for names with mistakes, confirm the reference and value of a name, see or update the descriptive comments, or figure out the scope, for instance.

Therefore, the correct option is A) add, edit, and filter the names you have created.

To learn more about the Name Manager feature, refer to the link:

https://brainly.com/question/27817373

#SPJ2

Python String Functions: Create a new Python Program called StringPractice. Prompt the user to input their name, then complete the following:
Length
• Print: “The length of your name is: [insert length here]”
Equals
• Test to see if the user typed in your name. If so, print an appropriate message

Really appreciate the help.

Answers

#Swap this value by your name. Mine is Hamza :)

my_name = "Hamza"

#Get input from user.

inp = input("What's your name?: ")

#Print the length of his/her name.

print("The length of your name is",len(inp),"characters.")

#Check if the input matches with my name?

#Using lower() method due to the case insensitive. Much important!!

if(inp.lower()==my_name.lower()):

   print("My name is",my_name,"too! Nice to meet you then.")

the most powerful computers, , can evaluate complex data very quickly. many of these computers in the united states are owned by the government or major research institutions and can cost $1 million dollars or more.

Answers

The most powerful computers, supercomputers, can evaluate complex data very quickly. Many of these computers in the United States are owned by the government or major research institutions and can cost $1 million dollars or more.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data through the central processing unit (CPU) into an output (information) that could be seen and used by an end user.

What is a supercomputer?

A supercomputer simply refers to one of the most powerful computers that is designed and developed for handling, evaluating, and solving very complicated problems or tasks. Additionally, supercomputers have the ability to carry out trillions of calculations per second.

Read more on supercomputer here: https://brainly.com/question/14883920

#SPJ1

Complete Question:

The most powerful computers, _____, can evaluate complex data very quickly. Many of these computers in the United States are owned by the government or major research institutions and can cost $1 million dollars or more.

A Glam Event Company has hired you to create a database to store information about the parks of their event. Based on the following requirements, you need to design an ER/EER Diagram.
The park has a number of locations throughout the city. Each location has a location ID, and Address, a description and a maximum capacity.
Each location has different areas, for example, picnic areas, football fields, etc. Each area has an area ID, a type, a description and a size. Each Area is managed by one location.
Events are held at the park, and the park tracks the Event ID, the event name, description where the event is being held. One event can be held across multiple areas and each area able to accept many events.
There are three different types of events, Sporting Events, which have the name of the team competing, Performances, which have the name of the performer, and the duration. Each performance can have multiple performers, and Conferences, which have a sponsoring organization.
The park also wishes to track information about visitors to the park. They assign each visitor a visitor ID, and store their name, date of birth and registration date. A visitor can visit many locations and each location can be visited by many visitors. They also record information about the locations visited by each visitor, and the date/time of each visit.

Answers

We can deduce here that based on the requirements provided, we can design an ER/EER Diagram for the database of the park's event. Here's an example of how the entities and their relationships can be represented:

                   |     Location    |

                   +-----------------+

                   | LocationID (PK) |

                   | Address         |

                   | Description     |

                   | MaxCapacity     |

                   +-----------------+

What the diagram is all about?

This diagram illustrates the relationships between the entities:

A Location can have multiple Areas, while an Area is managed by only one Location.An Event is held at a specific Location and can be held across multiple Areas.Sporting Events, Performances, and Conferences are specific types of Events with their respective attributes.Performances can have multiple Performers associated with them.Visitors are assigned a unique VisitorID and can visit multiple Locations. Each Location can be visited by multiple Visitors.Visits are recorded for each Visitor, indicating the Location visited and the corresponding date and time.

Learn more about database on https://brainly.com/question/518894

#SPJ4

which of the following uses a two-way authentication system known as mutual authentication?
A. LDAP B. Kerberos C. RADIUS D. 802.1X

Answers

The option that uses a two-way authentication system known as mutual authentication is B. Kerberos.

Kerberos is a network authentication protocol that uses mutual authentication to verify the identities of both the user and the network services. It uses a ticketing system to grant access to resources and requires the user to prove their identity to the network and the network to prove its identity to the user. This two-way authentication system ensures secure communication between the user and the network. LDAP, RADIUS, and 802.1X do not use mutual authentication in the same way as Kerberos.

Know more about Kerberos, here:

https://brainly.com/question/31921672

#SPJ11

I WILL GIVE BRAINLIEST TO WHOEVER HELPS ME

I keep pressing the "fn" key or "function" key and the disable / enable touchpad button
fn + f9 = enable/disable touchpad
but all it's doing is disabling it, everytime I press to enable it just keeps saying "touchpad has been disabled"

I WILL GIVE BRAINLIEST TO WHOEVER HELPS MEI keep pressing the "fn" key or "function" key and the disable

Answers

Assuming you're using Windows 10/11, navigate to settings --> Bluetooth and settings --> Touchpad (Or just search Touchpad on your search bar) --> Toggle the touchpad on.

Hope this helps! :)

Think of a situation in the not-too-distant future in which an autonomous robot, for example a factory manufacturing robot or a self-driving car, through some unfortunate coincidental combination of circumstances accidentally causes a human serious injury or even death. In a case such as this, who should be held responsible for the crime and damages? Can the developer or team of developers who wrote the code justifiably be held responsible? Is it simply considered a mechanical malfunction and nobody is held responsible, but the machine is destroyed?

Answers

Machines do not have souls and hence cannot have a will. They do what they are programmed to do. Any error that a machine no matter how intelligent, makes must be considered vicarious. This means that the makes must all be held liable for their errors.

What is Vicarious liability?

Vicarious liability is a type of stringent, secondary liability that derives from the common law theory of agency, respondeat superior, or the superior's responsibility for the actions of their subordinate.

Attachment of blame to a person for injury or losses caused by another person in a negligence action or criminal prosecution (also known as "imputed culpability"). Vicarious responsibility is a type of tort that holds an employer liable for a tort committed by his employee while the latter is on the job.

There are various forms of business insurance available to protect business owners from vicarious liability claims, including general liability, errors and omissions, and umbrella insurance, which covers everything not covered by general liability insurance.

Learn more about Vicarious liability:
https://brainly.com/question/16891800
#SPJ1

What is an Array? 20 POINTS!!!
a. the total number of items in the collection

b. how you could order items in the collection (for example, date, price, name, color, and so on)

c. a unique address or location in the collection (for example, page number in an album, shelf on a bookcase, and so on)

d. the type of item being stored in the collection (for example, DC Comics, $1 coins, Pokémon cards, and so on)

Answers

Answer:

I'm about 99% sure it's C: a unique address or location un the collection

Can anyone please help me on these two questions it would really help xxx

Can anyone please help me on these two questions it would really help xxx

Answers

Answer: No one can interpret or hack it.

Explanation:

Because there is nothing to hack.

take it from someone who hack their teachers laptop as a dare. It was so easy.

Es uno de los componentes de una red utilizado para conectar segmentos de


una red de área local (LAN), contiene múltiples puertos, usualmente son de 4,5,


8, 16 o 24. *

Answers

Un switch es un componente de una red que se utiliza para conectar segmentos de una red de área local (LAN) y que contiene múltiples puertos. Usualmente, estos puertos son de 4, 5, 8, 16 o 24.

Un switch se utiliza para facilitar el tráfico en una red de área local, permitiendo a múltiples dispositivos compartir los recursos disponibles, como Internet y archivos. El switch funciona enviando paquetes de datos a través de la red a su destino.

Las VLAN son redes lógicas que se crean dentro de una red física. Esto permite que los usuarios de una VLAN compartan recursos en la red sin ser interrumpidos por otros usuarios que no están en la misma VLAN.
En conclusión, el switch es un componente crítico de la infraestructura de red de una organización. Es necesario para mejorar la seguridad de la red, gestionar el tráfico y aumentar la eficiencia de la red.

To know more about conectar visit:

https://brainly.com/question/31910442

#SPJ11

The purpose of data analysis is to filter the data so that only the important data is viewed.


False

True

Answers

Answer:

YES IT IS TRUE!

Explanation:

WILL GIVE BRAINLIEST! 20 POINTS! PLZ HELP!

What does the following line of code do?

if (num2==50){

A. It creates a variable called num2 and sets it equal to 50.

B. It checks whether a variable called num2 is equal to 50.

C. It prints num2 == 50.

D. It requests user input if the variable num2 is equal to 50.

Answers

Answer:

B

Explanation:

== returns true if both the left side and right side are equal

Answer:

D

Explanation:

write a sql query to create a table that contains the titles of all albums with tracks longer than 6 minutes on them.

Answers

The provided SQL query creates a new table called "AlbumsWithLongTracks" that contains the titles of all albums with tracks longer than 6 minutes.

To create a table that contains the titles of all albums with tracks longer than 6 minutes, you can use the following SQL query:

CREATE TABLE long_track_albums AS SELECT DISTINCT a.title AS album_title FROM albums a JOIN tracks t ON a.album_id = t.album_id WHERE t.duration > 360;

1. We start by creating a new table called `long_track_albums` using the `CREATE TABLE` statement followed by the table name and the `AS` keyword.
2. Next, we use a `SELECT DISTINCT` statement to avoid duplicate album titles in the new table. We only select the album title from the `albums` table, and we use the alias `a` for the table.
3. We then use a `JOIN` statement to join the `albums` and `tracks` tables together, matching rows where the `album_id` is the same in both tables.
4. Lastly, we add a `WHERE` clause to filter the results to only include tracks with a duration greater than 6 minutes (360 seconds).

Learn more about SQL query visit:

https://brainly.com/question/31759954

#SPJ11

Please I have been having a problem with this assignment of mine but I have not gotten an answer. Idiot know if anybody could be of help to me.
Part 1

Write a Python program that does the following.

Create a string that is a long series of words separated by spaces. The string is your own creative choice. It can be names, favorite foods, animals, anything. Just make it up yourself. Do not copy the string from another source.

Turn the string into a list of words using split.

Delete three words from the list, but delete each one using a different kind of Python operation.

Sort the list.

Add new words to the list (three or more) using three different kinds of Python operation.

Turn the list of words back into a single string using join.

Print the string.

Part 2

Provide your own examples of the following using Python lists. Create your own examples. Do not copy them from another source.

Nested lists
The “*” operator
List slices
The “+=” operator
A list filter
A list operation that is legal but does the "wrong" thing, not what the programmer expects
Provide the Python code and output for your program and all your examples
Thanks.

Answers

Answer:

ummm

Explanation:

your on your own it doesn't makes since

Select the correct answer from each drop-down menu. What are the effects of emerging technology? has brought the internet to almost every location around the world. has led to the proliferation of on-the-go computing. Reset Next​

Select the correct answer from each drop-down menu. What are the effects of emerging technology? has

Answers

Answer:

The correct answers are:

Wireless web

Mobile computing

Explanation:

I got it right on the Edmentum test.

Wireless web has brought the internet to almost every location around the world. Mobile computing has led to the proliferation of on-the-go computing.

What is technology?

Technology, or as it is sometimes referred to, the modification and manipulation of the human environment, is the application of scientific knowledge to the practical goals of human life.

A catchall phrase for unrestricted access to the Internet and other services like email and messages.

The wireless Web is made up of public and private hotspots, cellular Internet access, and all other fixed or mobile wireless access services.

In human-computer interaction known as mobile computing, a computer is expected to be carried around while being used, allowing for the transmission of data, speech, and video.

Mobile hardware, mobile software, and mobile communication are all components of mobile computing.

Thus, these are the effects of emerging technology.

For more details regarding technology, visit:

https://brainly.com/question/9171028

#SPJ5

Which of the following tasks best shows an example where the searching and sorting techniques of big data may be involved?

There are TWO correct answers.

Group of answer choices

Creating a seating chart for a classroom based on an alphabetized list of student Names

Tallying how many pencils and pens you use throughout a school year so you know how many to buy for the start of the next school year to insure you will have enough

Recording the amount of time it takes a student to travel from one class to another class in order to find the average

Keeping track of all employees’ email use to see how many personal or work-related emails are sent during work time to check for productivity

Answers

The following task best show searching and sorting techniques of big data.

Creating a seating chart for a classroom based on an alphabetized list of student Names.

Keeping track of all employees’ email use to see how many personal or work-related emails are sent during work time to check for productivity.

What is big data?

Big data refer large or hard to manage volume of data that cover day to day businesses. It is analysed to improve business activities.

What is searching and sorting techniques?

Searching and sorting techniques refer to the process of looking and arranging data in the data base.

Therefore, The following task best show searching and sorting techniques of big data.

Creating a seating chart for a classroom based on an alphabetized list of student Names.

Keeping track of all employees’ email use to see how many personal or work-related emails are sent during work time to check for productivity.

For more details on Big data, check the link below.

https://brainly.com/question/24916490

Based on the question above, the correct answers are;

Creating a seating chart for a classroom based on an alphabetized list of student Names

Keeping track of all employees’ email use to see how many personal or work-related emails are sent during work time to check for productivity

Searching and sorting techniques of big data

Sorting refers to arranging data in a particular format

Types of Sorting Techniques

Bubble Sort.Selection Sort.Merge Sort.Insertion Sort.Quick Sort

In conclusion, we can conclude that the correct answers are the ones specified above.

Learn more about Sorting Techniques here: https://brainly.com/question/8126920

In CSS, how would you select all the tags on a page?
Choose 1 answer:

Answers

To select all the tags on a page using CSS, you can use the universal selector (*). The universal selector matches any element type, so applying a style rule to it will affect all the elements on the page.

Here is an example:

* {

 /* CSS styles */

}

In the above code, the asterisk (*) selects all the elements on the page, and the CSS styles within the curly braces apply to all those elements.

Keep in mind that applying styles to all elements on a page using the universal selector can have unintended consequences and potentially affect the performance of your website. It's generally better to be more specific with your selectors whenever possible

Read more about CSS here:
https://brainly.com/question/29410311
#SPJ1

Taylor, Catherine, and Naomi all made
inventions that improved people's
. They all protected.
their inventions by getting a

Taylor, Catherine, and Naomi all madeinventions that improved people's. They all protected.their inventions

Answers

Taylor, Catherine, and Naomie all invented things that helped people's health.They all protected their inventions by getting a solution.

What do you mean by an invention?

A unique or novel device, method, composition, idea, or process is defined as an invention. An invention can be an enhancement to a machine, product, or process that increases efficiency or reduces costs. It is possible to patent an idea if it is distinct enough, either as a stand-alone invention or as a significant improvement over the work of others. If granted, a patent grants the inventor a proprietary interest in the patent for a set period of time, which can be licenced for monetary gain.

To learn more about invention

https://brainly.com/question/17931211

#SPJ13

What is it called when you make a window smaller?

Answers

Most operating systems have a minimize button on the top right corner of any open window, which can be clicked to reduce the size of the window to the taskbar. Alternatively, you can also right-click (or control-click on a Mac) on the title bar of the window and select the “minimize” option.

What is it called when you make a window smaller?

This action is called "minimizing" a window.

Minimizing a window is when you reduce the size of the window to the smallest size possible, usually to the taskbar of your computer or the dock on a Mac. This is a useful feature when you want to quickly reduce the amount of space a window is taking up on your desktop without having to close it completely. This also makes it easier to access other windows, as the minimized window will be out of the way.

Learn more about Windows: https://brainly.com/question/1594289

#SPJ4

karl is trying to figure out what he should name his excel file before saving it. what should he avoid when creating a file name?

Answers

When creating a file name for an Excel file, Karl should avoid using special characters, Reserved keywords, Excessive length, spaces. The file name should be kept short and descriptive, so it is easy to identify the content of the file.

Special characters: Karl should avoid using special characters such as *, /, , ?, ", <, >, |, : in the file name.Spaces: It is generally recommended to avoid using spaces in file names, especially when working with different operating systems or sharing files. Reserved keywords: Karl should avoid using reserved keywords or filenames that are already associated with certain functions or purposes in the operating system or software.Excessive length: Extremely long file names may cause problems in some systems, as there are usually limits to the maximum length of a file name.

By avoiding these pitfalls, Karl can ensure that his file name is compatible with different systems, easy to manage, and less prone to errors or conflicts and he can use it in his Excel file.

To learn more about Excel: https://brainly.com/question/30300099

#SPJ11

Example of negative body language include all but

Answers

Answer:

Avoidance of eye contact.

Staring.

Crossed arms.

Overuse of hands.

Looking at watch.

Poor posture.

Frowning.

Sweating.

( but what??)

For this question, we'll use the data
useful way
data. Use t
a scatter pl
on the y-ax


er plot is a
rensional
skage to make
∣1
avfert ) on

the x-axis. Lancı un y-anıs 'Crop Yield" and the x-axis "Fertilizer". Do you notice any pattern from the scatter plot?

Answers

From the scatter plot, a pattern can be observed between the variables "Crop Yield" and "Fertilizer."

In the scatter plot, the "Crop Yield" is plotted on the y-axis, while the "Fertilizer" is plotted on the x-axis. By examining the distribution of the data points, we can identify any relationship or pattern between the two variables.

The scatter plot allows us to visualize the data points and observe if there is a linear or nonlinear association between the variables. If there is a pattern, it can provide insights into the impact of the fertilizer on crop yield.

By analyzing the scatter plot, we can look for trends such as a positive or negative correlation. If there is a positive correlation, it suggests that an increase in fertilizer usage leads to higher crop yields. Conversely, a negative correlation implies that higher fertilizer usage results in lower crop yields. Additionally, the scatter plot can reveal any outliers or clusters that may affect the relationship between the variables.

By interpreting the scatter plot, we can gain a better understanding of the relationship between crop yield and fertilizer usage, helping us make informed decisions and optimize agricultural practices.

To learn more about variables visit:

brainly.com/question/32410789

#SPJ11

Which of the following statements describe surge protectors and the purpose of using them? Check all of
the boxes that apply.
They protect hardware from damage caused by electrical storms.
They keep your computer and peripherals safe from power surges.
They need only be used when you are at home or in school.
They are built in to all computers to protect from external harm.

Which of the following statements describe surge protectors and the purpose of using them? Check all

Answers

-They protect hardware from damage caused by electrical storms.
-They keep your computer and peripherals safe from power surges.



The dude above isn’t funny nor smart...

Answer: A B

Explanation:

70s music or russian music

Answers

Explanation:

BB cgbfyhcthcfgvxdrgjyfddg

Don’t listen to any

URGENT! I know it has to be one of these answers, but I cannot tell the difference between them for the life of me. Help.

URGENT! I know it has to be one of these answers, but I cannot tell the difference between them for the

Answers

I don't see a difference. Otherwise, they both are correct.

Express 42 as a product  of its prime factor​

Answers

The only way to write 42 as the product
of primes.

Except to change the order of the factors is
2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.
The only way to write 42 as the product of primes (except to change the order of the factors) is 2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.

analiza esta frase: algunas personas sueñan con grandes logros mientras que otros se quedan despiertos y actuan​

analiza esta frase: algunas personas suean con grandes logros mientras que otros se quedan despiertos

Answers

Answer:

Para lograr tus sueños y objetivos se debe trabajar duro, hacer lo posible por hacerlos realidad, no quedarse con solo la idea de tu sueño.

Explanation:

Create a secure password (10 points)
Ask the user how long they want their password to be, then return a randomized password that includes all the letters of the alphabets, capitalization, numbers, and special characters.

Answers

Answer:

python

Explanation:

import random

secret_length = input("how long you want the secret to be?\n")

secret_length = int(secret_length)

characters = r"abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789$%^&*("
secret = ""

for i in range(secret_length):

   secret = secret + random.choice(characters)

print(secret)

Other Questions
Discuss TWO possible ways in which the COVID-19 Pandemicimpacted the flow of international business during the period 2020till present. Discussions must be elaborate, and well-written 4[1 2 -1 5]Someone help me with this bs Which kind of therapy involves employs principles of learning to help clients change undesirable behaviors?. Read the facts about the lost city of Atlantis.The Greek philosopher Plato told a story in the fourth century BCE about a great sea kingdom called Atlantis.According to legend, Atlantis was a wealthy and powerful country that traded extensively and was swallowed up by the sea.In the nineteenth century CE, a civilization called the Minoans was discovered to have lived on the island of Crete.Scientific evidence suggests that the Minoan culture was destroyed by a tsunami.How did the discovery of the Minoan culture most likely impact historical conclusions about Atlantis?It proved that other historical writings of Plato were also true.It confirmed Platos story and proved that Atlantis was on Crete.It provided scientific evidence that the civilization of Atlantis may actually have existed.It changed nothing because there is no solid evidence linking the Minoans to Atlantis. Both types of mediavideo and audioof the Maasai man and his herd are intended to Sometimes called known unknowns and are included in the project cost baseline: Emergency Reserves Management Reserves Just in time Reserves Contingency Reserves What is the central idea of the US government?. Spring 1 and Spring 2 are the same type of spring. Both springs were pushed or compressed into different positions and clamped into placeLWhich spring has less potential energy? WILL GIVE BRAINLIEST IF CORRECT PLEASE ANSWER!!!!!!Find the value of sin G rounded to the nearest hundredth, if necessary. Sol - MiGuess the song There are 2 BEATS in every measure. You start on SOL. 2. Save and read structured data We're really only interested in the Queensland Government spend in the near future, so we will create a new dataframe with more relevant columns, and save that datafra Defects in fetus is caused by ( ). what is 2*38 i need help please solve this...... please help please thankyou Find the product. (a2)(2a3)(a2 "" 8a 9) 2a7 "" 16a6 18a5 2a7 "" 16a6 "" 18a5 2a8 "" 16a7 18a6 2a12 "" 16a7 18a6 A polypeptide in a wild type microbe contains the sequence Leu-Pro-Tyr-Ser-Pro. A phenotypic variant of the species has the peptide sequence Leu-Pro-Cys-Ser-Pro. This is an example of a(n) ________ mutation. Group of answer choices 1/2 (b - 10) + 2b = 25 Which of the following is the correct structure of a nucleotide? Phosphate-sugar-phosphate Base-sugar-base Phesphate-sugar-base Phospholipit-base-sucar. How do prokaryotic and eukaryotic chramexames ister? Prokaryotic chromosomes are not contoned ha membrane tound ortanke, Geneic information is stored as CWA in eukrrosce celts ind as profeint in srokarouccette Ah of the folowing compounds are necessary componens for photosysetieis: EXCEPT The products of photosynthesis are carbon dicwite, chlorophyll, and oxreen. carbon dionde, water, and enerzv. glucose, water, and axyen. 5lucose and carbon dionide. clucose and water. What is the function of a plant cell vacuole? Stores water Replicates chromosomes Packages proteins for export. Initiates division of the cell Find: 11/32/3 the question is five and