In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for attempted logon retries.A) True B) False

Answers

Answer 1

Answer:

B, False.

Explanation:

Remote access is the ability of a device in a network to achieve a remote connection and control of another system. Its connection is not physical but uses telecommunication or the internet to access systems that cannot be accessed physically.

The RDP or remote desktop protocol is an example of protocols used to remotely access other computers in a network. It connects to the graphical interface of the other computer. When private data is compromised in a remote access, automatic blocking cannot be used to cancel an already established connection, but the system should be shutdown to prevent further exposure.


Related Questions

Brenda's working on improving a Google Search Ads quality score so it potentially gets a better ad rank and performs better in the ad auction. What change to Brenda's ad might improve the Ad Rank?

Answers

Answer:

use Search terms as keywords

Explanation:

Based on the information provided within the question it can be said that one of the best ways that Brenda can improve her Ad Rank would be to use Search terms as keywords. Using terms that are searched extremely frequently by the world drastically increases the amount of visitors that your ad can receive and thus boosts your Ad Rank.

A(n) ________ is a special value that cannot be mistaken as a member of a list of data items and signals that there are no more data items to be processed.

Answers

Answer:

A Sentinel is a special value that cannot be mistaken as a member of a list of data items and signals that there are no more data items to be processed.

Explanation:

The sentinel value is a form of  data (in-band) to identify the end of the data when there is no out-of-bound data provided.

The value should picked in a way that is different and unique from all legal data values.

Arpanet was developed by the united states so that there was a communication network that would survive a nuclear war. True or False

Answers

Answer:

False

Explanation:

The Advanced Research Projects Agency (ARPA), an arm of the U.S. Defense Department, funded the development of the Advanced Research Projects Agency Network (ARPANET) in the late 1960s. Its initial purpose was to link computers at Pentagon-funded research institutions over telephone lines.

Answer:

the miltary

Explanation:

edge 2022

Which of the following refers to applications and technologies that are used to gather, provide access to, and analyze data and information to support decision-making efforts?

Answers

Answer:

Business Intelligence

Explanation:

Business Intelligence  refers to the processes or technologies which are used to collect, analyse and present data and business information. The main goal of BI is to take cost effective and productive business decisions, making the decision making process efficient and better. It is the set of services that transform the data into useful information.The information gathered using this technology can be accessed quickly which helps to make fast business decisions. The organized data can be used to generate reports from the data quickly  and it is easy to find or detect the flaws or certain areas that require attention . BI provides timely and information and dashboards to assess whether the business goals are being achieved.BI also provides with automatic and predictive data analysis methods that helps the decision makers to make productive business decisions.

What will be the value of x after the following code is executed? int x = 10; do { x *= 20; } while (x < 5); A. 10 B. 200 C. This is an infinite loop. D. The loop will not be executed, the initial value of x > 5.

Answers

Answer:

Option B is the correct answer.

Explanation:

In the above code, the loop will execute only one time because the loop condition is false and it is the Do-While loop and the property of the Do-while loop is to execute on a single time if the loop condition is false.Then the statement "x*=20;" will execute one and gives the result 200 for x variable because this statement means "x=x*20".SO the 200 is the answer for the X variable which is described above and it is stated from option B. Hence it is the correct option while the other is not because--Option A states that the value is 10 but the value is 200.Option C states that this is an infinite loop but the loop is executed one time.Option D states that the loop will not be executed but the loop is executed one time

Computer processing work that is split between a desktop computer and a more powerful computer that processes and stores shared​ data, serves up web​ pages, or manages network activities is called​ ________ .

Answers

Answer:

Client-server is the correct answer for the above question.

Explanation:

Client-server is a model in which the server gives services and the client takes services. This model comes in the concept of the internet which is the connection of multiple computers to share the information. The client stands for the host computer which is connected to the network and takes the service from the server.The server is called that computer which gives services to many host computers.This model splits the work between a powerful computer (server) and a desktop computer (clients). The powerful computers process the data, store the data and give services to desktop computers.The above question-statement asked about that model which is the powerful computer and give services and the other is to take the services then the answer is the client-server model. Hence the answer is the client-server model.

The idea that innovations in transportation and communication technologies has changed the way we think about distance and time is the central argument of __________________________ theory.

Answers

Answer:

Innovations in transportation and communication technologies has actually changed the way we think about distance and time

Explanation:

Transportation and communication were part of the major challenges humanity was facing in time past, the distance between places was seen as a barrier, it delayed many things, communication inclusive because of the lengthy time involved in sending messages, goods and services from one place to another, this gave birth to invention of various means of getting these major activities (that man can not do without) done without wasting much time. Ever since then man has began to see distance and time from a completely different angle, things that will take months to get done because of the great distance in time past can actually be carried out today in a couple of seconds.

Write multiple if statements. If car_year is 1969 or earlier, print "Few safety features." If 1970 or later, print "Probably has seat belts." If 1990 or later, print "Probably has antilock brakes." If 2000 or later, print "Probably has airbags." End each phrase with a period and a newline. Sample output for input: 1995 Probably has seat belts. Probably has antilock brakes.

Answers

Answer:

import java.util.Scanner;

public class Hggg {

       public static void main (String [] args) {

           System.out.println("Enter the car make year");

           Scanner in = new Scanner(System.in);

           int car_year = in.nextInt();

           if (car_year<1969){

            System.out.println("Few safety features.");

           }

           else if (car_year>=1970 && car_year<1990){

               System.out.println("Probably has seat belts.");

           }

           else if (car_year>=1990 && car_year<2000){

               System.out.println("Probably has seat belts.");

               System.out.println("Probably has antilock brakes.");

           }

           else if (car_year>=2000){

               System.out.println("Probably has seat belts.");

               System.out.println("Probably has antilock brakes.");

               System.out.println("Probably has airbags.");

           }

       }

   }

Explanation:

In this solution, multiple if statements have been used to accomplish each step. Observe that there are more than one print statements when year is greater than 1990 because the condition applied to year greater than 1970 holds true for every year greater than 1970 (1990, 2000 etc)

An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:1) package manager
2) DBMS
3) tarball
4) router

Answers

Answer:

Option 3 is the correct answer for the above question.

Explanation:

A tarball is a software which is used to encrypt the other software or hide the other software and make it small. It again makes the original software program from the encrypted ones.It is used to make the file sort and can use for the transfer which takes some amount of memory.The above question asked about that technology which is used to make encrypted software from the original software and use it with the help of some script. Then the answer is tarball which is referred to from option 3. Hence Option 3 is the correct answer for the above question while the other is not because--Option 1 states about the package manager which is used to manage the library only.Option 2 states about the DBMS which is used to manage the database.Option 4 states about the router which is used for the internet.

The correct option is (3) tarball. An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a tarball.

A tarball is a term used in computing to describe a collection of files that have been packaged together using the tar command on Unix-based systems. The files are combined into a single archive file, typically compressed to save space. This often includes installation scripts or compiled code that can be easily transported and deployed. This differs from a package manager, which is a tool that automates the process of installing, upgrading, configuring, and removing software packages for a computer's operating system in a consistent manner. A DBMS (Database Management System) is software for creating and managing databases. A router is a network device that routes data from one network to another.

This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.1. do-while2. while3. for4. infinite5. None of these

Answers

Answer:

Option 3 is the correct answer.

Explanation:

In c, c++ or Java programming language, The for loop takes three parameters in which first is an initialization, second is condition check and the third is an increment. None of the other loop (except for loop) takes three parameters. The other loop takes only one parameter and that is the condition check.So when a user knows about the times of iteration then it is a good choice to use the for loop but when the person does not know about the times of iteration if the loop. It means the iteration of the loop is based on the condition then it is a good choice to chose while or Do-while loop.The above question wants to ask which loop for a user can best if he familiar with the iteration of the loop then the answer is for loop which is started from option 3. Hence Option 3 is the correct answer while the other is not because--Option 1 states about the do-while loop which takes condition only.Option 2 states about the while loop which also takes condition only.Option 4 states about the infinite loop which is not any loop.Option 5 states about none of these which is not correct because option 3 is the correct answer.

Final answer:

A for-loop is the ideal choice when the number of iterations is known before entering the loop because it allows you to set the exact number of iterations in advance.

Explanation:

The loop that is a good choice when you know how many times you want the loop to iterate in advance of entering the loop is the for-loop. For-loops are structured to repeat a block of code a specific number of times, and this is established by setting the conditions of the loop before it starts running. In contrast, while-loops execute based on the truthfulness of a condition and are better suited when the number of iterations is not known beforehand. Do-while loops are similar to while-loops but will always execute at least once, even if the condition is false from the start. An infinite loop is a loop that does not have a condition that evaluates to false, thereby running indefinitely, which is usually not desired. For-loops in most programming languages are defined using the keywords for ... in and an iterator variable.

Astrid's computer screen suddenly says that all files are now locked until money is transferred to a specific account, at which time she will receive a means to unlock the files. What type of malware has infected her computer?

Answers

Answer:

Ransomware

Explanation:

Ransomware is a special case of malware. It is a malicious program that infects a computer system by locking its screen and encrypting all its files and data and a certain amount of money (ransom) is requested from the owner of the system. Until the money is paid the screen remain locked and the files and data remain encrypted.

It is a very dangerous malware targeted towards organizations and even individuals. So systems that don't have strong security around them are easily attacked by this ransomware.

Note: A special type of ransomware is crypto malware or cryptojacking.

Which of the following attacks seeks to introduce erroneous or malicious entries into a server's hostname-to-IP address cache or zone file?

Answers

Answer:

DNS poisoning or DNS cache poisoning                                              

Explanation:

It is also called spoofing. It is a type of cyber attack in which the Domain Name System server data is modified. This modified and corrupted data is entered in DNS cache as a result of this, the internet traffic is redirected to some fake and fraud servers. These fake servers is controlled by the attacker. DNS basically coverts the domain names to IP addresses. Domain name (such as iamthebest.com) is understandable by humans so DNS translates it to IP address which is readable by computer. So when the computer gets a domain name, as domain name is readable by humans, so a computer will reach a DNS server to request the translation. The DNS server responds to this request by providing the IP address where the computer can locate that domain name. So the DNS server has a cache which stores the frequently requested translations so that it does not have to look up to other servers every time for the same request. If an incorrect translation has been entered into the DNS cache, it is said to be poisoned. Lets say some attacker modifies or corrupts some data in the DNS server as a result of which the web server directs the user to the wrong IP address of the attacker which might contain a malicious website. As the Internet Service Provider caches data from other DNS servers so the DNS poisoning can spread as the affected DNS server's information can be cached to other ISPs as they keep on storing false translations.As a result of DNS poisoning the users are diverted from the target website to a website that belongs to an attacker and contain viruses or a phishing website which can take personal information from the user such as credit card information.

The details of _____ vary from state to state, but generally create personal jurisdiction over nonresidents who transact business or commit tortious acts in the state.

a. forum selection.
b. long-arm statutes.
c. statewide jurisdiction.
d. subject-matter jurisdiction.
e. long-arm statutes

Answers

Answer: B. LONG-ARM STATUTES

Explanation: long-arm statute is the jurisdiction that gives a court the authority to prosecute a case involving an out of state defendant or resident based on certain acts committed by the out of state defendant or resident with the premise that the out of state defendant or resident has a minimum connection with the state.

Which means the out of state defendant or resident must have a systematic and constant activity within the Jurisdiction of the Court and a cause of action that came up from that activity.

Answer:

Correct answer is (b). long-arm statutes

Explanation:

Long-arm statutes is a statutes that allow local court to have jurisdiction over foreign defendant. It varies from state to state but have unique objective of exercising jurisdiction over non resident of the state it is being applied.

Marisol is using a software program to perform statistical tests on her experimental data to determine if her hypothesis is supported. With respect to the steps of the scientific method, Marisol is:

Answers

Answer: Drawing conclusion

Explanation:

Marisol must have been using a software program to analyze his data and draw conclusions through his analysis. This is done by organizing the data, simplify it so that it can be easily understood.

Marisol could also make use of some tools like graphs, drawing a charts(s), determining mean median mode, variance, etc as required by his experiment.

Lucy wants to develop a web page to display her profile. She wants to just start with a basic page that lists her accomplishments, her work history, and the different computer courses she has taken. She would like each section to be clearly identified.​Which type of list would work best for listing Lucy's accomplishments?​1. unordered list​2. header list​3. legends list​4. definition list

Answers

Answer:

1. Unordered list.

Explanation:

Web development is the creation of web pages. A web page can be a portfolio or personal website, an e-store etc. The web page comprises of a header, body and a footer component.

The header is the introduction of the web page, it holds the brand name, logo and other introductory elements.

The body is the main content of the web page. It uses other elements like the list to hold a group of data. There two types of list, they are ordered and unordered list. The ordered list are numbered while the unordered list are dotted not numbered.

Lucy would use the unordered list to outline are accomplishments and certification in details.

Final answer:

The best type of list for listing Lucy's accomplishments on a web page is an unordered list, as it presents each item with equal importance and enhances readability. Proper introduction and conclusion around the unordered list further improve the content's clarity and accessibility. The correct answer is option (1)

Explanation:

For displaying Lucy's accomplishments on a web page, an unordered list would be the most appropriate choice. An unordered list ensures that each accomplishment is given equal importance, avoiding any implication of ranking or sequence that a numbered list might suggest. Furthermore, unordered lists are commonly used for listing items like hobbies, interests, and personal achievements on web pages, making them familiar and easily readable by visitors.

When using an unordered list to showcase accomplishments, it is good practice to introduce the list with a brief explanation of its contents. This practice aids the reader in understanding the context of the list. After detailing the list of accomplishments, it is also helpful to provide a follow-up comment or summary to conclude the section effectively.

A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

Answers

Answer:

DSL

Explanation:

Digital subscriber line (DSL) is a family of technologies used for fast digital data transfer over telephone lines. DSL is widely known in telecommunications marketing as meaning asymmetric digital subscriber cable, Internet access is the most frequently deployed DSL infrastructure.

A(n) system resource is any part of the computer system, including memory, storage devices, and the microprocessor. _________________________

Answers

Answer:

The above statement is TRUE

which of the following is the term used for a set of programs that acts as an interface between the applications that are running on a computer and the computer's hardware?

Answers

Answer:

Operating System

Explanation:

Operating System is a software program which acts as an mediator between computer hardware and user program applications and allows interaction between the user and computer/hardware. OS is used to manage both the hardware and software related tasks. OS is used to manage memory. It allocates  memory to various processes and manages the primary memory by monitoring what portion of it is in use and what portion is not in usage.OS is used to manage processes by allocating and deallocating resources to processes which is also called process scheduling.It also provide security by preventing unauthorized access to data and computer. This is done via passwords which identify who is authorized to use a computer programs or manipulate data.Operating system also communicates with hardware devices via device drivers and also monitors the devices through I/O controller.OS allows communication between user and computer. User cannot understand computer language therefore assemblers, compilers, interpreters are provided by the OS to the user to interact with computer and computer programs.OS also controls and manages file system, it checks the status of the files, manages the directories and files and keeps information about  where the data is stored.

If you are signed into a Microsoft account and need to sign into another one, click ____ on the list arrow next to Your Name in the top-right corner of the Word window.

Answers

Answer:

left

Explanation:

If you are signed into a Microsoft account and need to sign into another one, click left on the list arrow next to Your Name in the top-right corner of the Word window.

Multiple Microsoft accounts can be opened at one time in different tabs of your computer. They can be used simultaneously as well. It helps the user to work efficiently rather than logging in or logging out from his accounts which hinders effective and efficient output.

To switch to another Microsoft account in Word, click 'Sign out' or 'Switch accounts' next to your name in the top-right corner. Account management options are usually found under the File tab. The exact wording may differ slightly depending on your version of Office.

If you are signed into a Microsoft account and need to sign into another one, click 'Sign out' or possibly 'Switch accounts' on the list arrow next to Your Name in the top-right corner of the Word window. The procedure for switching accounts may vary slightly depending on the version of Microsoft Office you're using, but generally, there should be an option to manage your account or switch accounts when you click on your name or user icon. For example, in some versions, after you click on your name, you might see an option to sign out, which you must do before signing in with a different account. Or, there might be a 'Switch accounts' option directly in the menu, allowing you to exchange one account for another without signing out first.

In Microsoft Office programs, such as Word or Excel, account management options can typically be found by clicking on the File tab which leads you to the Account or Office Account section. Here you can add services or sign in with different credentials depending on your needs.

A BufferedReader has a constructor that takes a single InputStreamReader parameter. InputStreamReader has a constructor that takes a single InputStream parameter. Suppose there is a class Widget InputStream that is a subclass of InputStream and suppose there is a variable, wis, that refers to a Widget InputStream object. Write an expression whose value is a reference to a newly created BufferedReader that is based on the WidgetInputStream object wis refers to.

Answers

Final answer:

To create a BufferedReader based on a WidgetInputStream object, you would use the expression 'new BufferedReader(new InputStreamReader(wis))', which chains the streams together.

Explanation:

The question asks how to create a BufferedReader that is based on an existing WidgetInputStream object. The WidgetInputStream is a subclass of InputStream, meaning it can be passed to the constructor of an InputStreamReader, which in turn can be used to create a new BufferedReader.

The expression to create the BufferedReader based on the WidgetInputStream object referred to by wis is:

new BufferedReader(new InputStreamReader(wis))

This will wrap the WidgetInputStream in an InputStreamReader, and then wrap that in a BufferedReader, effectively chaining these streams for efficient reading of characters, arrays, and lines.

Something is wrong with the logic in the program above. For which values of time will the greeting "Good Morning!" be displayed? var time = promptNum("What hour is it (on a 24 hour clock)?"); var greeting = ""; if (time < 6) { greeting = "It is too early!"; } else if (time < 20) { greeting = "Good Day!"; } else if (time < 10) { greeting = "Good Morning!"; } else { greeting = "Good Evening!"; } console.log(greeting);

Answers

Answer:

There is logic problem in condition of elseif statement that is (time<20).

Explanation:

elseif(time<20) will be true for time<10 that means program will never greet good morning as to make logic correct either change condition from elseif(time<20) to elseif(time<20&& time>=10). Or change the order of condition like check first for elseif(time<10)

solution 1

if (time < 6) { greeting = "It is too early!"; }

else if (time < 20 && time>=10) { greeting = "Good Day!"; }

else if (time < 10) { greeting = "Good Morning!"; }

else { greeting = "Good Evening!"; }

console.log(greeting);

solution 2

if (time < 6) { greeting = "It is too early!"; }

else if (time < 10) { greeting = "Good Morning!"; }

else if (time < 20 ) { greeting = "Good Day!"; }

else { greeting = "Good Evening!"; }

console.log(greeting);

"Application programs can help users write their own programs in a form the computer can understand using a programming language such as Visual Basic, COBOL, C or __________.

Answers

Answer: Python

Explanation:

Python is an interpreted high level programming language that allows an individual to focus on core functionality of the application by taking care of common programming tasks.

You have been asked to implement file-level system security on your Microsoft-based network. What method will you use to accomplish this?

Answers

Answer:

Access Control Lists

Explanation:

Access Control Lists are network traffic filters that can control incoming or outgoing traffic that is hat watches it and compares it with a set of defined statements to either permit the data to flow or prohibit it.

ACLs are used on Microsoft-based networks to achieve file level system security because they provide protection on high speed interfaces and they are not complex.

What is the main purpose of a DNS server?
Assign IP addresses to devices
Filter IP traffic on devices
Resolve hostnames to IP addresses
Run directory services

Answers

Answer:

C

Explanation:

Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.

Explain the significance of the loss of direct, hands-on access to business data that end users experienced with the advent of computerized data repositories.

Answers

Final answer:

The shift to computerized data repositories reduced direct access to business data, leading to efficiency gains but also risks such as system failures and data breaches. Dependence on technology has widened the digital divide and had societal impacts such as job loss.

Explanation:

The emergence of computerized data repositories marked a significant shift in the way end users interacted with business data. With computerization, direct, hands-on access to data decreased, which led to a reliance on digital systems to process and interpret information. This transformation has had profound impacts on businesses and employees. In the era before widespread computer use, businesses used tools like the Farmer's Almanac and Weather Bureau data; by contrast, today's business decisions are informed by data from global positioning systems, historical rainfall patterns, and other complex services.

The move away from direct data interaction meant that businesses became more efficient at data analysis and decision-making but also became dependent on technology. This dependence carries risks like system failures, data breaches, and the loss of personal data privacy. Furthermore, the digital divide has widened as technology becomes more central to operations. The societal and economic changes accompanying technological shifts, such as automations in manufacturing and mining, have profound repercussions, including job losses and the restructuring of whole communities.

Final answer:

The loss of direct, hands-on access to business data that end users experienced with the advent of computerized data repositories has both advantages and disadvantages. While physical access allows for manual verification and manipulation of data, computerized data repositories provide efficient storage, organization, and accessibility of data.

Explanation:

The significance of the loss of direct, hands-on access to business data that end users experienced with the advent of computerized data repositories is that it has both advantages and disadvantages. While computerized data repositories provide efficient storage, organization, and accessibility of data, end users lost the ability to physically interact with the data. This loss of physical access can affect the ability to manually verify and manipulate information, potentially leading to errors or limitations in data analysis.

For example, in the past, end users might have been able to physically hold and review paper documents, allowing them to manually check for any discrepancies or inconsistencies. With computerized data repositories, end users typically only have digital access to the data, which limits their ability to perform hands-on verification.

However, the advantages of computerized data repositories often outweigh the disadvantages. These repositories provide fast and efficient access to vast amounts of data, enabling end users to analyze and make informed decisions more quickly. They also offer features like searchability, data security, and data backups that can enhance data management and protection.

The information gathering technique that enables the analyst to collect facts and opinions from a wide range of geographically dispersed people quickly and with the least expense is the___________.

a. document analysis
b. interview
c. JAD session
d. observation
e. questionnaire

Answers

Answer:

E. Questionnaire.

Explanation:

Information gathering is a technique or mechanism for collecting a large data for data analysis.

Questionnaires are paper documents with a well-thought list of questions meant for a large group of people to answer individually. They are faster and cheaper to implement.

Document analysis requires for an acquired document to be assessed or graded for analysis. Interviews are established between the information seeker and individuals directly. Observation is a long process of monitoring a sampled group for data collection. The JAD is a more complicated and effective way of data collection, it requires collection of data from different perspectives and locations. It is time consuming and expensive.

True or False:Authorization is the process of granting rights to use an organization's IT assets, systems, applications, and data to a specific user.

Answers

True.................

During the software planning process, Rick, a project manager, finds that his team has made an incorrect estimation of funds. What kind of risk has Rick identified? Rick has identified a _________ risk.

Answers

Final answer:

Rick has identified a financial risk during the software planning process due to an incorrect estimation of funds.

Explanation:

During the software planning process, Rick, a project manager, finds that his team has made an incorrect estimation of funds. The kind of risk Rick has identified is a financial risk. Financial risks are associated with the management and estimation of funds in a project and include the possibility that the company may not have adequate funds or may allocate too much, leading to financial issues. It's important for project managers like Rick to carefully assess financial risks to make informed decisions that will protect the company's financial health and ensure the project's success.

What type of spyware silently captures and stores each keystroke that a user types on the computer's keyboard?

Answers

Answer:

The correct answer to the following question will be "Key logger".

Explanation:

Key loggers are a type of spyware, where clients are incapable of recording their actions. They could be used for a wide range of applications; hackers can using them to manipulate the personal information purposefully, and employees can are using them to track workplace practices.It can secretly record and store any keystroke a client inputs on the keyboard on the machine.

Therefore, Key logger is the right answer.

Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?A. Email addressB. Phone numberC. Mother’s maiden nameD. Last name

Answers

Final answer:

The most sensitive PII among the given options is the mother’s maiden name, as it's commonly used in security questions and identity verification.

Explanation:

The most sensitive Personally Identifiable Information (PII) that should be shared cautiously and only with trusted resources among the options provided is C. Mother’s maiden name. This piece of information is often used as a security question for various accounts and can be used for identity verification. Consequently, it can provide access to someone’s personal and financial details if it falls into the wrong hands. While an email address, phone number, and last name are unique to individuals and are considered PII, the mother’s maiden name holds a higher risk and sensitivity due to its common use in security settings.

Other Questions
Mary Morgan has just been brought into the emergency room of City General Hospital. She is perspiring profusely and is breathing rapidly and irregularly. Her breath smells like acetone (sweet and fruity), and her blood glucose tests out at 650 mg/100 ml of blood. She is in acidosis. Which hormone drug should be administered, and why? How many sets per exercise should be performed by a client in the resistance portion of the Stabilization Endurance Level of training? Write a short statement identifying 5 social statuses that you currently occupy and describe the social roles associated with each status. The Rockwells have driven 180 miles, which is 2/3 of the way to their family reunion. How far is the total distance to their family reunion Which action best Illustrates the process of making an interpretation?OA. A historian writes a textbook designed to teach college studentsabout the duties of a professional historian.OB. A historian publishes a popular article about the women's rightsmovement but does not cite any sources,OC. A historian reviews economic data from the 1930s to draw aconclusion about the effects of the Great Depression,OD. A historian whose father served in the Korean War accuses acolleague of making an invalid interpretation about that conflict.SUBMITPREVIOUS Two charges (q1 = 3.8*10-6C, q2 = 3.2*10-6C) are separated by a distance of d = 3.25 m. Consider q1 to be located at the origin. 2) What is the distance in meters? My cells have walls and I get my food through photosynthesis. Which kingdom do I belong in? plantae animalia fungi bacteria A dominant gene (W) produces wire-haired texture in dogs; its recessive allele (w) produces smooth hair. A group of heterozygous wire-haired individuals are crossed and their F1 progeny are then test-crossed. Determine the expected genotypic and phenotypic ratios among the test cross progeny: a guy wire for a tree is 20 ft long, making a 21 angle with the ground. How far is the base of the tree from a stake anchoring the wire? Explain Pascal's Law. A father feeds his child green beans for lunch. After taking a bite, the child frowns, spits the beans out, and pushes the next spoonful of beans away. This child is____________. A primary concern regarding a sound academic approach to the study of world religions involves the fact that it arose within an intellectual culture that Why is Chris s Heart Broken Suppose a farmer is a price taker for soybean sales with cost functions given by TC = .1q2 + 2q + 30 MC = 2q + 2 If P= 6, the profit-maximizing level of output is a. 10 b. 20 c. 40 d. 80 What are three (3) key points to include in family teaching for a child prescribed methlyphenidate for ADHD. A species is a group of organisms capable of mating and producing offspring, and speciation is the process of forming a new species.One way a new species may form is by geographic isolation. This occurs when members of a population are physically separated, for example, by a river, or a desert.After the separation the two populations, responding to different conditions, will adapt differently, and so their evolutionary paths will The coordinate grid below shows triangle ABC and its image after translation, triangle A'B'C': Triangles ABC and A prime, B prime, C prime are shown. A is located at negative 6, 2. B is located at negative 5, 5. C is locat Which of the following completes the rule for this translation, (x, y) (x + 6, ___)? (5 points) y 6 y + 6 y 8 y + 8 An artist paints a painting in which the sky is blue and the grass is grenn this is.A) solid colorB)local color C)rebelliousD) noisy color Arlene makes earrings in the shape of the mascot of a local university. Last year Arlene made 250 pairs of earrings, which she sold to the university bookstore for $10 each. Arlene works out of her home, so her only cost is $3 per pair for materials and $85 for tax help. If Arlene didn't produce earrings, she would spend her time babysitting her nephews and make about $500 per year. a. Arlene's economic profit is $1,665. b. Arlene's accounting profit is $1,165 c. Arlene's total costs are $835. d. Arlene's total revenue is $2500. The Indian National Congress was founded in 1988 to Steam Workshop Downloader