Write the importance of cyber law? In point .

Answers

Answer 1

Answer:

Cyber law is important because it covers all aspects of transactions and behavior related to the internet, the worldwide web and cyberspace.it controls crimes that could pose a major threat to the security and financial health of nations.

Answer 2

Answer: Cyber law is important because It covers all the aspects of transactions and behavior by concerning the internet

Explanation:


Related Questions

Which of the following are addressed by programing design? Choose all that apply.

Who will work on the programming
The problem being addressed
The goals of the project
The programming language that will be used

Answers

Answer:

Its B, D, and E

Explanation:

Hope this helps

Answer:

3/7

B

D

E

4/7

Just a page

5/7

B

C

6/7

Page

7/7

A

B

D

Why error occurs during transmission? Explain different types of errors with suitable examples. 5 (b) How do you detect error using CRC? Generate the CRC code for the data word 1101011011 The divisor is x4+x+1. 7

Answers

During transmission, errors occur due to a variety of factors such as atmospheric conditions, system malfunction, or network errors.

Different types of errors include Single Bit Error, Burst Error, and Burst Error Correction. Here are the different types of errors with suitable examples: Single Bit Error: It occurs when one bit of data is changed from 1 to 0 or from 0 to 1 in data transfer. This type of error is mainly caused by a small amount of interference or noise in the transmission medium. For instance, a parity bit error.Burst Error: It occurs when two or more bits are incorrect during data transmission. A Burst Error occurs when bits of data are lost or changed in groups, which can affect multiple data bits at once. It can be caused by signal loss or attenuation in fiber-optic cables. Burst Error Correction: To overcome the issue of Burst Error, Burst Error Correction is used. This method divides data into blocks to detect and fix errors. Reed-Solomon coding and Viterbi decoding are two types of burst error correction techniques. There are different techniques for error detection, and the Cyclic Redundancy Check (CRC) is one of them. CRC checks the checksum at the receiver's end to ensure that the data was not corrupted during transmission. To detect errors using CRC, follow these steps: Divide the data word by the generator polynomial. Generator polynomial: x4 + x + 1 Divide 1101011011 by x4 + x + 1 and find the remainder by using the modulo 2 division method.1101011011 10011- 10011000- 10011000- 10010100- 10010100- 10000001- 10000001- 1111100- 1111100- 1001The remainder of the above step is the CRC code of the data word, which is 1001. Therefore, the CRC code for the data word 1101011011 is 1001.

know more about type of error.

https://brainly.com/question/31751999

#SPJ11

__________ is more efficient than interrupt-driven or programmed I/O for a multiple-word I/O transfer.

Answers

Answer:

Direct memory access

Explanation:

DMA is Direct Memory Access, which is the way a peripheral transfers data in blocks, rather than characters. It's faster, and frees up the CPU to get on with other stuff while the data transfer happens independently.

Which of the following is a consideration of the ethical issue
of privacy in the digital environment??
What information is held about an individual?
Is the data correct?
Can the person modify the info

Answers

Considerations of the ethical issue of privacy in the digital environment include information held about an individual, data accuracy, and the ability to modify personal information.

What are some key aspects to consider regarding privacy in the digital environment?

The ethical issue of privacy in the digital environment encompasses several important considerations. Firstly, it involves questioning what information is held about an individual.

In the digital landscape, various entities collect and store vast amounts of personal data, ranging from contact details and financial information to browsing habits and online interactions. Understanding the scope and nature of this information is crucial for assessing privacy risks and potential violations.

Secondly, verifying the accuracy of the data is essential. Inaccurate or outdated information can have significant consequences for individuals, leading to erroneous judgments, denial of services, or exposure to targeted advertising and personalized content.

Ensuring data accuracy is vital to protect individuals' privacy and maintain their trust in digital platforms and services.

Lastly, individuals should have the ability to modify their personal information. Empowering individuals to review, update, and delete their data helps maintain their privacy rights and control over their digital footprint. This aspect becomes increasingly important as personal data is shared and processed across multiple platforms and services.

The ethical implications of privacy in the digital environment, including data protection regulations, privacy policies, and best practices for safeguarding personal information.

Understanding these considerations is crucial for individuals, organizations, and policymakers to address privacy challenges and promote responsible data handling practices.

Learn more about digital environment

brainly.com/question/30156799

#SPJ11

security analyst must enforce policies to harden a mdm infrastructure. ensure mobile device can be traded and wiped confirm mobile devices are encryption

Answers

To harden a Mobile Device Management (MDM) infrastructure and ensure the security of mobile devices, a security analyst can enforce the following policies:

1. Implement strong authentication: Require users to use complex passwords, multi-factor authentication, or biometric authentication to access their devices.

2. Enable device encryption: Ensure that mobile devices have encryption enabled to protect sensitive data stored on them. This can be achieved through encryption settings provided by the MDM solution or by using device-level encryption options.

3. Enforce remote wipe capability: Enable the ability to remotely wipe data from lost or stolen devices. This ensures that sensitive information does not fall into the wrong hands.

4. Regularly update software and firmware: Promptly install software updates and patches to address any security vulnerabilities and ensure devices are protected against the latest threats.

5. Implement device compliance checks: Regularly assess devices for compliance with security policies, such as detecting jailbroken or rooted devices, outdated operating systems, or unauthorized applications.

6. Employ mobile threat defense solutions: Utilize mobile threat defense solutions that provide real-time threat detection and protection against mobile malware, phishing attacks, and other security risks.

7. Educate users on security best practices: Conduct regular security awareness training to educate users on the importance of following security policies and guidelines when using mobile devices.

To harden an MDM infrastructure and ensure the security of mobile devices, a security analyst should enforce strong authentication, enable device encryption, enforce remote wipe capability, update software and firmware, implement device compliance checks, employ mobile threat defense solutions, and educate users on security best practices. This will help protect sensitive data and ensure the overall security of the MDM environment.

To know more about mobile devices , visit ;

https://brainly.com/question/4673326

#SPJ11

How to limit the number of guesses in python

Answers

I thinkkkkk this is kind of what you are looking for?

while user != the_number:

   ...

   if count == 5:

       print("etc etc")

       break

else:

   print("You guessed it!!, the number is", the_number, "and it only"\

         " took you", count , "tries")

Basically if you have 5 guesses it'll break it and stop the guesses

In Word, you can format the font, size, and alignment but not the color of text.

Answers

Answer:

You can change color of text as well.

Explanation:

It is false that in word one can format the font, size, and alignment but not the color of text.

What is text formatting?

In computing, formatted text, styled text, or rich text, as opposed to plain text, is digital text that contains styling information in addition to the bare minimum of semantic elements: colors, styles, sizes, and special HTML features.

Formatted text is text that is displayed in a specific manner. Formatting data may be associated with text data in computer applications to generate formatted text.

The operating system and application software used on the computer determine how formatted text is created and displayed.

In Word, you can change the font, size, alignment, and even the color of the text.

Thus, the given statement is false.

For more details regarding text formatting, visit:

https://brainly.com/question/766378

#SPJ2

The following is a table of activities associated with a project at Rafay Ishfaq's software firm in Chicago, their durations, what activities each must precede and the crash cost to reduce duration per week: Suppose that Rafay is only given 6 weeks (instead of 9 ) to complete the project. By how many weeks should each activity be crashed in order to meet the deadline? Assume that you can crash an activity down to 0 weeks duration.

Answers

To determine by how many weeks each activity should be crashed in order to meet the deadline, we need to calculate the total crash time required for each activity. The total crash time is the difference between the normal duration and the desired duration.

Given that the project originally had a duration of 9 weeks and now needs to be completed in 6 weeks, we can calculate the crash time as follows:

Activity A:

Normal duration = 2 weeks

Desired duration = 0 weeks (crash to the minimum)

Crash time = Normal duration - Desired duration = 2 weeks - 0 weeks = 2 weeks

Activity B:

Normal duration = 3 weeks

Desired duration = 2 weeks

Crash time = Normal duration - Desired duration = 3 weeks - 2 weeks = 1 week

Activity C:

Normal duration = 4 weeks

Desired duration = 3 weeks

Crash time = Normal duration - Desired duration = 4 weeks - 3 weeks = 1 week

Activity D:

Normal duration = 3 weeks

Desired duration = 2 weeks

Crash time = Normal duration - Desired duration = 3 weeks - 2 weeks = 1 week

Activity E:

Normal duration = 5 weeks

Desired duration = 4 weeks

Crash time = Normal duration - Desired duration = 5 weeks - 4 weeks = 1 week

Activity F:

Normal duration = 4 weeks

Desired duration = 3 weeks

Crash time = Normal duration - Desired duration = 4 weeks - 3 weeks = 1 week

Activity G:

Normal duration = 2 weeks

Desired duration = 1 week

Crash time = Normal duration - Desired duration = 2 weeks - 1 week = 1 week

Activity H:

Normal duration = 2 weeks

Desired duration = 1 week

Crash time = Normal duration - Desired duration = 2 weeks - 1 week = 1 week

Activity I:

Normal duration = 2 weeks

Desired duration = 1 week

Crash time = Normal duration - Desired duration = 2 weeks - 1 week = 1 week

Therefore, each activity should be crashed by the corresponding number of weeks mentioned above in order to meet the 6-week deadline.

Learn more about  total crash time here:

https://brainly.com/question/30199703

#SPJ11

!!!!!!!-------PLEASE HELP--------!!!!!!!
When writing a selection sort or insertion sort algorithm in a class, what type should the final main method be

Answers

Answer:

A cool little 40 Minutes Timer! Simple to use, no settings, just click start for a countdown timer of 40 Minutes. Try the Fullscreen button in classrooms and

Explanation:

write a python program to print the following series 3..10..31..94......n​

Pls answer fast..

Answers

I've included my code in the picture below. Best of luck

write a python program to print the following series 3..10..31..94......nPls answer fast..
write a python program to print the following series 3..10..31..94......nPls answer fast..

What is output by the following code?
C = 1
sum = 0
while (c< 10):
C=C+2
sum = sum + c
print (sum)

Answers

The output of the code is 17. The output is simply what happens once all of the code is completed, the end result. It is what is entered into the console after all of the calculations have been completed.

What is Python ?

Python is a general-purpose, high-level programming language. Its design philosophy prioritises code readability by employing significant indentation. Python is garbage-collected and dynamically typed. It is compatible with a variety of programming paradigms, including structured, object-oriented, and functional programming.

It is compatible with a variety of programming paradigms, including structured, object-oriented, and functional programming. Because of its extensive standard library, it is frequently referred to as a "batteries included" language.

Guido van Rossum began developing Python as a successor to the ABC programming language in the late 1980s, and it was first released in 1991 as Python 0.9.0.

To find out output let first write the question:

C=1

sum = 0

while(C<10):

C=C+3

sum=sum + C

print(sum)

Now Focus on

while(C<10):

C=C+2

sum=sum + C

The value of C is initially 1

C=1+2

Sum= 0+3

In second loop the value of C will become 3

c=3+3

sum=3+6

In third loop the value of C will be 6

c=6+2

sum=9+8

so the answer is 9+8 = 17

To learn more about Python refer :

https://brainly.com/question/26497128

#SPJ1

An audience member is worried about an upcoming exam and is unlikely to remember much of what the speaker says. This is a type of...
external noise
internal noise
physical noise
educational noise

Answers

The type of situation described, where an audience member is worried about an upcoming exam and is unlikely to remember much of what the speaker says, can be categorized as internal noise.

Internal noise refers to distractions or barriers that exist within an individual's mind or thoughts, which can interfere with effective communication or information processing. In this case, the individual's worries and preoccupation with the upcoming exam create mental noise, making it difficult for them to focus on and retain the speaker's message. It is an internal factor that affects their ability to receive and process information effectively. External noise, on the other hand, refers to physical or environmental factors that disrupt communication, such as loud noises, poor acoustics, or distractions in the surroundings. Physical noise relates to actual disturbances, such as a loud sound or interference, that impede communication. Educational noise is not a commonly used term in the context of communication and is not applicable to this scenario.

Learn more about external noise here:

https://brainly.com/question/10118252

#SPJ11

(ONLY ANSWER IF YOU KNOW) So I want to play call of duty MW on my my pc to my 4k 120hz tv using a hdmi cable, do i just need any type of hdmi cable or do i need to get a 4k 120hz hdmi cable? I don't know how I'd do that exactly. In other words, how do i use my TV as my MONITOR for my pc to play games. I'd assume that you use a hdmi cable like plugging in a xbox or playstation. thanks, Rodger! :)

Answers

hi mate, not an expert on this but you would need a standard hdmi cable 4k 120hz as then the right power supply would be going through because as i’m sure you know pcs and tvs work differently. sorry if that doesn’t make sense but i hope it does :)

Explain how work can impact
family life.

Answers

Answer:

Conflict due to tension between roles results when stress generated while performing one role affects the way a person fulfills the demands of other roles. For example, the effects of fatigue and stress experienced at work can affect family life at home, and vice versa.

Explanation:

The ________ protocol architecture is a result of protocol research and development conducted on the experimental packet switched network ARPANET.

Answers

The protocol architecture that resulted from the protocol research and development conducted on the experimental packet switched network ARPANET is the TCP/IP protocol architecture.

This protocol architecture is widely used in today's Internet and consists of two main protocols: the Transmission Control Protocol (TCP) and the Internet Protocol (IP). TCP provides reliable, ordered, and error-checked delivery of data between applications while IP is responsible for routing packets between network devices. The TCP/IP protocol architecture has become the foundation for the modern Internet and has enabled communication between millions of devices worldwide. It continues to evolve and improve to meet the demands of modern networking and communication technologies.

To know more about ARPANET visit:

https://brainly.com/question/28577400

#SPJ11


What are the
advantages and
main features of
Electronic Toll Collection (ETC) in Intelligent
Transportation Systems?

Answers

Electronic Toll Collection  is a system that enables the collection of tolls without the use of manual toll collection methods, which require cars to stop. In contrast, ETC automates the toll collection process by detecting the toll payment by scanning a radio frequency identification (RFID) tag installed in the vehicle, making the entire process more efficient and smoother.

What are the advantages and main features of Electronic Toll Collection (ETC) in Intelligent Transportation Systems Advantages of Electronic Toll Collection (ETC)The advantages of ETC include time-saving, reduced congestion, and greater traffic management.

They are as follows: Time-saving: By eliminating the need for drivers to stop to pay tolls, ETC systems can help reduce travel time. It enables a smooth flow of traffic, which reduces the time it takes for drivers to reach their destination. ETC systems feature automatic toll collection, RFID tags, and benefits for commuters.

To know more about system visit:

https://brainly.com/question/19843453

#SPJ11

explain plat data model​

Answers

Data models are a set of guidelines and/or constructs that are employed in computers to define and represent elements of the real world. There are two main data models.

Describe data models using an example.

There are two distinct but related notions that might be referred to as data models. It can also refer to an abstract formalization of the entities and connections present in a certain application domain, such as the clients, goods, and orders in a manufacturing company.

By data model, what do you mean?

Data models for an organization visually represent data elements and their interactions. Models help define and structure data within the context of relevant business activities, which aids in the development of effective information systems.

To know more about data model​ visit:-

https://brainly.com/question/29651109

#SPJ1

if register 0 contains the pattern 01101001 before executing the instruction a003 , what bit pattern will be in register 0 after the instruction is executed?

Answers

The bit pattern that will be in register 0 after the instruction is executed is:

00101101

What is instruction?

Instructions are a section of code that the computer processor must execute in order to carry out a task. It takes instructions for a computer to understand how to perform any task.

To draw a square, for instance, requires giving the computer a set of instructions on how to do so. By giving the computer the following set of instructions in Logo, a user could carry out this task.

A set of instructions or documentation that explains how to use, carry out, or otherwise maintain a specific piece of computer hardware or software are known as computer instructions. Before asking questions, it is advised to carefully read any manuals or online instructions that are provided with the software or hardware.

Learn more about instructions

https://brainly.com/question/14987002

#SPJ4

Which network protocol allows administrators to access a remote computer in a secure way?

Answers

SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.

What is Secure Shell ?

The Secure Shell Protocol (SSH) is a cryptographic network protocol that allows network services to be operated securely over an unsecured network. Remote login and command-line execution are two of its most notable applications. SSH applications use a client-server architecture to connect an SSH client to an SSH server.

SSH is a layered protocol suite that consists of three major hierarchical components: the transport layer provides server authentication, confidentiality, and integrity; the user authentication protocol validates the user to the server; and the connection protocol multiplexes the encrypted tunnel into multiple logical communication channels.

SSH was created on Unix-like operating systems to replace Telnet and unsecured remote Unix shell protocols like the Berkeley Remote Shell and the related rlogin and rexec protocols, which all use insecure, plaintext authentication token transmission.

To learn more about Secure Shell refer :

https://brainly.com/question/17465910

#SPJ1

The fireworks were a lantern in the sky

Answers

Answer:

So your saying thst when a firework blows then it is a big lantern in the sky???

1
Type the correct answer in the box. Spell all words correctly.
Which disadvantage affects web pages created using JavaScript?
Different
interpret JavaScript differently.
Reset
Next

1Type the correct answer in the box. Spell all words correctly.Which disadvantage affects web pages created

Answers

I don't know the exact answer to this question, but I will add a comment. Each browser (Chrome, Mozilla, etc.) has different features. Features that can be supported in some browsers may not be supported in others. Therefore, each browser may interpret JavaScript codes differently. Let me know if the answer is wrong. I wish you success.

Different browsers interpret JavaScript differently.

Before you could train as a physician, you first had to become _____.

Answers

Before you could train as a physician, you first have to become a scribe.

two hosting methods used in cloud environments are are called what? (where data resides) group of answer choices on-premises on a local computer off- premises on a server somewhere

Answers

The two hosting methods used in cloud environments are:

On-premises: This refers to hosting data and applications on a local computer or server that is owned and managed by the organization. This method involves maintaining physical hardware and software infrastructure on-site, which provides greater control and customization but requires more resources and expertise.

Off-premises: This refers to hosting data and applications on a server or servers that are located outside of the organization's premises, typically in a data center owned and operated by a cloud service provider. This method allows organizations to outsource infrastructure management and maintenance to a third-party provider, which can provide greater scalability, reliability, and security but may limit customization and control.

Learn more about hosting here:

brainly.com/question/32075281

#SPJ11

Question 14 of 25
A computer programmer will often use a
by other programmers.
, which includes code written

Answers

A computer programmer often uses a programming language to write code that other programmers can understand and utilize.

How is this so?

Programming languages provide a set of syntax and rules that allow programmers to create software and applications.

By using a standardized programming language, programmers can communicate their ideas effectively and share code with others.

This promotes collaboration,reusability, and efficiency in software development, as code can be easily understood, modified, and built upon by different programmers.

Learn more about computer programmer at:

https://brainly.com/question/29362725

#SPJ1

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

<BUTTON TYPE="BUTTON" VALUE="SUBMIT">SUBMIT YOUR FORM</BUTTON>
</FORM>
</BODY>
</HTML>
Write the question of this programming .​

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

This is an inference question. I mean that in this question, an answer is given, you have to generate the question.

The given code is :

BUTTON TYPE="BUTTON" VALUE="SUBMIT">SUBMIT YOUR FORM</BUTTON>

</FORM>

</BODY>

</HTML>

So, the answer (i.e. to write a question) is

Write a HTML code that displays a button in its body with the text "Submit Your Form ".

Question 201.5 pts
You do not need to evaluate secondary data as long as you know
who collected the data.
Group of answer choices
True
False
Flag question: Question 21
Question 211.5 pts
Mixed mode su

Answers

You do not need to evaluate secondary data as long as you know who collected the data.

It is not true that you do not need to evaluate secondary data as long as you know who collected the data. This statement is false because secondary data can come from different sources and there may be factors that can affect the validity, reliability, and credibility of the data. Thus, it is important to evaluate secondary data to ensure that it is appropriate and suitable for the research purpose and questions. Secondary data are data that have been collected by someone else for another purpose and then used for a different research question or objective.

Secondary data can be collected from various sources, such as government agencies, statistical bureaus, research institutions, academic journals, and commercial databases. Therefore, evaluating secondary data is important to ensure that the data are relevant, accurate, and reliable. Factors to consider when evaluating secondary data include the quality of the source, the representativeness of the sample, the reliability of the data, the validity of the measures, the currency of the data, and the compatibility of the data with the research question and purpose.

Furthermore, evaluating secondary data also involves assessing the limitations of the data and determining how the limitations may affect the findings and conclusions of the research. Therefore, evaluating secondary data is crucial for ensuring the quality and accuracy of the data and avoiding potential errors or biases that can undermine the validity and credibility of the research findings.

Learn more about data :

https://brainly.com/question/31680501

#SPJ11

Scenario: The Internet Explorer 8 browser is being used to display a web page with an audio player but the audio element displays nothing on the page. Read the following code snippet and select the reason for the incorrect display from the choices below.
width="160" height="150">


Sparky the Dog (.mov)

A. The controls attribute should be controls="yes"
B. There are too many source elements.
C. The file extension .ogg is incorrect.
D. The MIME type values are incorrect.

Answers

Answer:

nose

Explanation:

What is one indication that a Windows computer did not receive an IPv4 address from a DHCP server?

Answers

The existence of an Automatic Private IP Address (APIPA), often measured in the format of 169.254.x.x, is a telltale sign that a Windows computer has fallen short to procure an IPv4 address from a DHCP server.

What are the roles of APIPA addresses?

APIPA addresses are exclusively refined for communication within a localized network, posing no route on the internet as they are naively set up by the gadget.

Thus, if a Windows machine is given an APIPA, it implies that this device could not retrieve an IP address from a DHCP server.

Read more about IPv4 address here:

https://brainly.com/question/31446386

#SPJ1

Vani is trying to connect a microphone to her laptop. What are the two way she can connect the microphone?
1. through Bluetooth
2. through HDMI
3. through USB-C
4. through DisplayPort
5. through modem card

Answers

Correct answer is "Through Bluetooth" and "Through USB-C"

explanation: Plato correct answer

Vani can connect a microphone to her laptop using the following two ways Through USB-C and Through Bluetooth. The correct option is option (1) and (3).

Through USB-C: Many laptops nowadays come with USB-C ports that support audio input/output. Vani can connect a microphone directly to the USB-C port using a compatible USB-C to 3.5mm audio adapter or a USB-C microphone.

Through Bluetooth: If Vani's laptop supports Bluetooth connectivity and the microphone she wants to use is Bluetooth-enabled, she can pair the microphone with her laptop wirelessly. This allows her to connect and use the microphone without any physical cables.

Therefore, Vani can connect a microphone to her laptop using the following two ways Through USB-C and Through Bluetooth. The correct option is option (1) and (3).

To know more about Bluetooth:

https://brainly.com/question/31542177

#SPJ4

Other Questions
HELPP BUISNESS MATH Loan comparison Water is being poured into a cone that has a radius of 30 cm and a height of 50 cm and is tip down. The water is being poured into the cone at a rate of 10 cm3/min. How fast is the water level rising when the height of the water is 15 cm? what is adreno cortico trophic hormone? A student reads that a prominence is an arc-shaped outward extension of gases from the Suns surface that extends up to thousands of miles and can last for several months. When a prominence breaks down, what likely effect will occur?A. The prominence will eject materials that will lead to a meteor shower on Earths surface.B. The prominence will release large amounts of energy into space that can affect Earth.C. The prominence will release enormous amounts of heat and lead to longer summers on Earth.D. The prominence will eject particles that will eventually reach Earths surface and cause a cooling effect in the oceans. Jane computes the variance for a set of data and gets the correct answer of 16. What is the standard deviation for this same set of data Per the Harvard Business Case: Jean Claude Biver " The Reemergence of the Swiss Watch Industry:How would you assess Biver as a leader? Discuss his style, methods, behavior, personal traits, etc. citing specific examples from the case and your textbook to support your answer. Answer the question with the correct conjugation that should go in the blank space.Mi madre _ en Costa Rica.esestoyestsest most microbiology lessons require an average time of _____ to complete. Please help! What is the value of x? simplify the expression x(2y + z - 7) A long, fast moving line of thunderstorms that forms ahead of an advancing cold front is called aa. gust front b. mesoscale convective complex c. supercell d. squall line. What is transversal class 7? If the cost to fill the pool is $2.55 per cubic foot, how much will it cost to fill the pool? How does the absence of grading and standardization influenceagricultural marketing in India? Da De Los Muertos is a combination of which two cultures? Students often remember more information from a course that spans an entire semester than from a course that is completed in an intensive three-week learning period. This best illustrates the importance of What does congruent mean square? Hown below are the top 15 market research firms in the United States in 2014 according to the AMA Gold Top 50 Report. Compute the mean, median, P50, P40, P85, Q1, Q3, range, and the interquartile range on these data. Company Sales ($ millions) Nielson Holdings N.V. $3,194.3 Kantar 952.6 IMS Health Inc. 935.0Ipsos 574.1 Westat Inc. 563.7 Information Resources, Inc. 504.0 GfK USA 334.5 comScore Inc. 202.7 The NPD Group Inc. 202.3 Symphony Health Solutions 196.5 J.D. Power and Associates 172.9 ICF International Inc. 172.0 Abt SRBI Inc. 155.7 Maritz Research 138.9 dunnhumbyUSA LLC 121.5 The Henry's law constant for helium gas in water at 30 C is 3.7104M/atm; the constant for N2 at 30 C is 6.0104M/atm.a. If helium gas is present at 2.1 atm pressure, calculate the solubility of this gas.b. If N2 is present at 2.1 atm pressure, calculate the solubility of this gas. Let f(x) =x? -6x + 8 and g(x) =x-5. Find (f + g) (x) and (f-g) (x), (f+g)(-2) and (f-g)(-2)