To reduce costs and the environmental impact of commuting, your company decides to close a number of offices and to provide support for staff to work from home. However, the senior management who introduce the policy are unaware that software is developed using Scrum.
Explain how you could use technology to support Scrum in a distributed ­environment to make this possible.
What problems are you likely to encounter using this approach?

Answers

Answer 1

Answer:

Using services such as GitHub and Skype

Disorganization and Communication Problems

Explanation:

Scrum is a framework for projects that are almost exclusively about programming and coding. Which means that there is always group work involved and one of the most important elements of group work is efficient communication.

The company's decision of providing the employees the opportunity to work from their homes greatly interferes with this concept and most likely there will be issues.

Using Scrum in the development process while working from different locations forces the team to use different ways to communicate and collaborate effectively which i believe can be done by using services such as Skype and GitHub.

Using this approach does not eliminate all possibility of problems mentioned above. There can be miscommunication and desynchronization in terms of the coding process which can result in bugs in the code and delay of the final product.

I hope this answer helps.


Related Questions

Yolanda is making a banner for a school pep rally. She cuts fabric in the shape of a parallelogram. The angle at the bottom left corner measures 80°. what The measure of the angle at the top left corner must measure?

Answers

Answer:

100° angle is the correct answer to the following question

Explanation:

In the following statement, a lady who is creating a banner for the school but that lady cuts the sheet of the fabric in parallelogram whose opposite sides are always parallel and the opposite angles also. Then, the angle of the bottoms is 80°. So, that's why the 100° is the angle that is the top left corner.

Answer:

100 (100% sure)

Explanation:

ThIS IS CoRrEcT

To lock down security settings on an individual system on a network, what would you use?

Answers

Answer:

The answer is "LSS(Local Security Settings)".

Explanation:

The LSS stands for Local Security Settings, it is a set of information about the security of a local computer. LSS allows a feature, that the information on the protection of a local computer is a local safety policy of a device.

This option is available on windows. The local security policy information includes the domains, that trust login attempts to be authenticated.

 

________ (RFID) tags include an antenna, a decoder to interpret data, and the tag that includes information. The antenna sends signals. When the tag detects the signal, it sends back information. The tags can be used to keep track of anything including medications

Answers

Answer: Radio-frequency identification (RFID)

Explanation:

Radio-frequency identification (RFID) tags are defined as components that  are used for tracking of items. This device is based on technology of radio-frequency along with antenna and RFID(Radio-frequency identification) reader.

These tags are induced with electronically filled information in them and they tend to transmit and receive that information with help of antenna and IC(Integrated circuit) respectively . Detection of signal for sending and receiving of data is done by the tags that are linked with the object.It can detect pets, vehicles etc.

Match the term to its correct defintion
View Base tables
CREATE VIEW statement
DROP VIEW statement
A. Virtual table based on a SELECT query
B. Tables on which the view is based
C. Data definition command that removes the query specification in the data dictionary
D. Data definition command that stores the query specification in the data dictionary

Answers

Answer:

View Base tables: Virtual table based on a SELECT query

CREATE VIEW statement: Data definition command that stores the query specification in the data dictionary

DROP VIEW statement: Data definition command that removes the query specification in the data dictionary

Explanation:

Views are virtual tables, which can be created by select queries using the real database tables.

Creating and dropping views can be done by the CREATE VIEW and DROP VIEW statements.

CREATE VIEW syntax:

CREATE VIEW view_name AS

SELECT column1, column2, ...

FROM table_name

WHERE condition;

DROP VIEW syntax:

DROP VIEW view_name;

You can add exceptions to your firewall rules so that anybody who uses your home computer can visit any web site except a chosen few web sites. True or false?

Answers

The answer would be true. Firewall rules define what kind of Internet traffic is allowed or blocked. ... A firewall rule consists of firewall services , which specify the type of traffic and the ports that this type of traffic uses. For example, a rule called Web browsing has a service called HTTP, which uses the TCP and port number 80.

Which two peripherals are more likely to be external installations on a laptop rather than internal installations?
(a)Hard drive
(b)Microphone
(c)Webcam
(d)Wireless card

Answers

Webcam and wireless card, are the two peripherals that are more likely to be external installations on a laptop rather than internal installations are webcam and wireless cards.

(c)Webcam

(d)Wireless card

Explanation:

Some laptops come equipped with webcams as well. Wireless cards provide certain capabilities to a laptop depending upon their purpose. Hard drives and microphones are generally internally installed in almost all the laptops.

Most current board PCs presently accompany incorporated webcams incorporated with the showcase. While these inherent models are progressively advantageous to utilize, outer webcam models do have a few points of interest.

Consider the following recursive method. public static void whatsItDo(String str) { int len = str.length(); if(len > 1) { String temp = str.substring(0, len – 1); whatsItDo(temp); System.out.println(temp); } } What is printed as a result of the call whatsItDo("WATCH")?

(A) WATC
WAT
WA
W
(B)WATCH
WATC
WAT
WA
(C)W
WA
WAT
WATC
(D)W
WA
WAT
WATC
WATCH
(E)WATCH
WATC
WAT
WA
W
WA
WAT
WATC
WATCH

Answers

Answer:

The answer is C.

W

WA

WAT

WATC

Explanation:

When the recursive method is called using whatsItDo("WATCH"), it works like this:

First the length of the argument is gotten and assigned to len.

Next if the length is greater than 1, execution enter the defined block

Inside the block, a substring is created from the beginning to less than 1 the end (0 to len - 1) and it is assigned to temp.

Then, the method is called again with whatsItDo("WATC").

The iteration continue and the next called method is whatsItDo("WAT"), followed by whatsItDo("WA"), followed by whatsItDo("W").

When whatsItDo("W") is called the condition will fail. So, the execution will pick up from:

whatsItDo("WA") where "W" will be displayed, then

whatsItDo("WAT") where "WA" will be displayed, then

whatsItDo("WATC") where "WAT" will be displayed, then

whatsItDo("WATCH") where "WATC" will be displayed.

And the program will finished execution.

Final answer:

The recursive method whatsItDo prints each substring of "WATCH" after each recursive call, resulting in 'WATC', 'WAT', 'WA', and 'W' being printed in that order, corresponding to option (A).

Explanation:

The recursive method described in the question prints a series of progressively shorter substrings of the original string "WATCH". This is because each recursive call to whatsItDo removes the last character from the string and prints the substring after making the recursive call. The method stops making recursive calls once it reaches a substring with a length of 1, and as the recursive calls return, it prints each of the substrings starting from the shortest to the second longest.

Thus, when whatsItDo("WATCH") is called, the output will be a series of substrings without the last character:

WATCWATWAW

This corresponds to option (A) as follows:

WATC
WAT
WA
W

The number of semi skilled workers in an industry find themselves out of work, when improvements in technology render their jobs obsolete these workers experience?

Answers

Answer:

Structural unemployment is the correct answer.

Explanation:

Because there is a large amount of the semi-skilled labors or workers in the industries and they find ourselves out of work because of the new technologies that execute their jobs by which those workers become obsolete. So, that's why these workers face the experience of structural unemployment which creates a higher rate of natural unemployment.

Amazon Web Services and Microsoft Azure are some of the most widely used _______.

Answers

Answer:

Cloud computing platforms

Explanation:

The popular cloud computing platforms are used to provide storage, database, or integration services. with cloud computing you worry less about the technicalities involved in running cloud applications instead you will pay for the service and just do a little/fraction of the work and the cloud service provider will handle the rest for you.

If a firm's pages are not near the top of query results, customers may never discover its website. This has led to _____ becoming a critical function for many marketing organizations.
a. last mile access
b. geotargeting
c. outsourcing content
d. adjacency
e. search engine optimization

Answers

Answer:

e. search engine optimization

Explanation:

Search Engine Optimisatization (SEO) is the process of improving the visibility of a website with on the web. By providing high quality and relevant content for a website organic/unpaid traffic can be increased as the website will appear at the top of the query results of a web search engine. SEO involves the use of keywords that are likely to be used by clients when they query a search engine such as Google. These keywords help a website to improve its rankings and appear at the top of the search results. This is a critical function in marketing organizations as it directs the target customers to the website.

The muscle cells and nerve cells in a mouse look very different and serve very different functions in the mouse's body. These differences exist because the muscle cells and nerve cells in the mouse: have different genes. have different ribosomes. copy different genes. express different genes. have different chromosomes. use different genetic codes.

Answers

Answer:

Express different genes

Explanation:

Basically DNA is written into RNA which is later converted into proteins, gene expression involves the heritable data in a gene and DNA arrangement being made into a gene product like Protein. the cells in the muscle and nerves have different way of gene expression.

Assume you are a network consultant for a company that is designing a private WAN to communicate between five locations spread throughout a city. You want to tell the company president that this WAN will use a design for maximum uptime to all locations. Which of the designs should you use

Answers

Answer:

A  mesh network design

Explanation:

In designing local area networks, we can follow one of several network topologies, some of these are; bus, star, ring, star-ring hybrid, mesh, etc. In a mesh topology,  all the PCs are inter-connected to each other such that the computers do not send signals, they also act as signal relay to others within the network, considering that in this question scenario the goal is to acheive maximum uptime at all locations, a mesh design will be the best.

Final answer:

For a private WAN with maximum uptime, a mesh topology should be used due to its redundancy, with a full mesh offering the highest resilience. However, due to potential high costs, a partial mesh might be deployed, prioritizing critical connections and possibly using Quality of Service features for additional reliability.

Explanation:

If you are consulting for a company that needs a private Wide Area Network (WAN) with maximum uptime between its five locations spread throughout a city, the most robust design you should recommend is a mesh topology. A mesh topology provides each location with a direct connection to every other location. This redundancy means that if any single connection fails, the network communication can still proceed uninterrupted via alternative routes. For even greater resilience, you could consider a full mesh design, where each node has a direct connection to each other node, ensuring the highest level of redundancy and uptimes.

However, full mesh networks can be costly due to the high number of links and networking equipment required. An alternative with a balance of cost and resilience would be a partial mesh network, where not all systems are directly connected, but there are still enough interconnections to maintain communication in case one or a few links go down. It is essential to evaluate the criticality of each site to determine which connections are most necessary. Additionally, implementing Quality of Service (QoS) features and having backup links for the most critical connections will further enhance the network's robustness.

Which string displayed using the ls –l command in a Linux terminal indicates that group permissions are set to read and modify?

Answers

Answer:

The answer is -rw-rw-r--

Explanation:

This is a permission string which refers to read and write (modify) permissions to owner and group only and read only permission for all others.

There are three types of permissions: read (r), write(w), and execute(x).

In the above string, r stands for read and w stands for write permissions. Read (r) permission allows the contents of the file to be viewed.

Write (w) permission allows modification of the contents of that file. It gives permission to edit (e.g. add and remove) files.

The first dash "-" refers to the type of file. The next rw- define the owner’s permission to the file. so the owner has permission to read and write a file only. The next rw- refers to the group permission. The members of the same group have permission to read and write a file only just as the owner. The last r-- means that all other users can only read/ view the file. In the first rw- the "-" means to remove or deny access. This means owner is granted permission read and write the file only but he cannot execute (x) the file contents. 2nd rw- means the same but for group and lastly there are two "--" after r. The first "-" denies write access and second one denies execute access.

When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process called?a. SAML
b. LDAPS
c. TACACS
d. SDML

Answers

C TACACS hope this helps

"When analyzing the IDS logs, the system administrator notices connections from outside of the LAN have been sending packets where the Source IP address and Destination IP address are the same. There have been no alerts sent via email or logged in the IDS. Which type of an alert is this?

Answers

This is false negative. To be marked for alert.

Explanation:

The network administrator or network engineer when he or she is analyzing IDS logs and founded the ip address is same on source and destination both in outside side.

So the either TCPIP address has to change to be scanned across the network. Since same IP address is same pinging rate will high and pinging the same workstation or desktop or laptop.

Alert will not generate because both tcpip address same and if pinging is success.  Ids logs generates based true negative, true positive and false positive will not generate any alert.

A user saves a password on a website the user logs into from a desktop. Under which circumstances will the password be saved on other devices?
(a)Same browser
(b)Same encryption certificate
(c)Same Internet provider
(d)Same operating system

Answers

Answer:

Same Browser

Explanation:

If we access some password for some website in from some computer. It will be saved in the browser of the computer. Whenever we access the website from some other computer and we want to login we need the same browser.

In this process, browser is sync by using our mailing address. Whenever we want to access the pasword of different website from some other device, we need to sync that device browser with the same mailing address.

In this process all password that are saved on other device may access from any device.

An IPv4-to-IPv6 transition mechanism with native support for Network Address Translation (NAT) is called:__________.

Answers

Answer:

The answer is "Teredo".

Explanation:

Teredo is a technology for the transfer of the complete IPv6-enabled hosts, that are IPv4-based but, have no native IPv6 network connections. Teredo is an Internet switch, it was confusing because there is no reputation-based explanation.

It is a temporary measure, the Long-term use of native Internet connectivity should be made for all IPv6 hosts. It is also known as a network protocol, that is used to establish client/server communication, and it facilitates connectivity between devices that are behind NAT routers.

Jason needs to renew the certificate for his company’s web server. Which of the following is recommended to be submitted to the CA?A) CSRB) Key escrowC) CRLD) OCSP

Answers

Answer:

A. CSR

Explanation:

CSR, (certificate signing request also known as certification request, CR) are messages sent by an applicant to a certificate authority to acquire a digital identification certificate or renew an already existing one. It contains information of the client or applicant like domain name, public key etc.

Keyescrow, CRLD and OCSP are not recommended or required for renewing digital certificate as they commands or settings for shortcuts and commands.

When saving messages as drafts, it’s important to remember that your draft will not go live unless _______. Choose only ONE best answer. A. you have admin permissions or higher B. you have scheduled it or clicked Publish C. you have unlocked the draft for editing D. you have approval from a super-admin

Answers

Answer:

Option (b) is the correct answer.

Explanation:

"Drafts" is a folder of messaging software or mail software whose works are to save the message until the user does not want to send it. So to send the message from drafts, the user needs to edit the message first then he can able to send that message. The above question asks that how a user can send the draft message. Option b suggests that a user needs to click send to send the draft message.

Hence it is a right option while the reason behind the other option is invalid are as follows--

Option a suggests that a user needs admin permission to send this but if that is his account then no need for admin permission.Option c suggests to unlock the draft but the draft folder is not locked.Option d suggests to take permission from a superuser but that is not required.

Which of the following is the single best rule to enforce when designing complex passwords?
A. Maximum password age
B. Longer passwords
C. Force use of all four types of characters (uppercase, lowercase, numbers, symbols)
D. Computer generated passwords

Answers

Answer:

B. Longer passwords

Explanation:

If the password is longer, it requires more incorrect attempts to find it, so the system could identify a potential hacker attempt. Smaller but more complex passwords could be identified by mistype or forgotten passwords.

________ is defined as how we form impressions of and make inferences about other people. Attribution theory Social perception Social inference Social encoding

Answers

Answer:

Social Perception is defined as how we form impressions of and make inferences about other people.

Explanation:

Attribution theory is such theory in psychology which tells us that people determine the behavior of others with the help of their attitude, feelings or belief. For example, if he is not smiling today then he is sad.Social perception is defined as the way of forming impression about others so this is true in our case.Social inference tell us about the reasoning behind the social behavior of people on the basis of some facts.Social encoding is simply the translation of behavior or any other things into our thoughts or beliefs.

What FAA-approved document gives the leveling means to be used when weighing an aircraft?

Answers

Answer: Type Certificate Day Sheet (TCDS)

Explanation:

Type Certificate Day Sheet (TCDS) is a document of the Federal Aviation Administration popularly called FAA that documents the certification type and data of a product, which includes engine installation, wing loading, information about dimension, weight and balance, operating limitations, that is meant to also be available in the flight or maintenance manual as directed by FAA.

Case-Based Critical Thinking Questions​Case 1: Tony’s Pizza & Pasta​Tony’s Pizza & Pasta restaurant uses an application to update and display menu items and the related price information.Which of the following statements assigns the daily special of lasagna to Tuesday? a.
strSpecial(5) = "rigatoni"

b.
strSpecial(6) = rigatoni

c.
strSpecial(5) = rigatoni

d.
strSpecial(6) = "rigatoni"

Answers

Final answer:

None of the provided options directly answers the question due to a misunderstanding or a potential typo since they involve assigning "rigatoni" instead of "lasagna" and none select Tuesday correctly based on zero-based indexing for days of the week in programming.

Explanation:

The question involves assigning the daily special of lasagna to Tuesday in a programming context, likely using an array to manage menu items by day of the week. Arrays in programming are zero-based, meaning the first element is at index 0. Therefore, Tuesday, being the second day of the week under conventional standards starting with Monday, would be at index 1 in the array. However, none of the given options directly mention "lasagna" or Tuesday explicitly, so we must infer based on standard array indexing and typical syntax for assigning values in programming languages like Python or Java.

Given the options, however, none correctly assigns "lasagna" to Tuesday due to the mix-up in the days and the item mentioned. The correct approach to assign "lasagna" to Tuesday would look something like strSpecial[1] = "lasagna", considering a hypothetical array strSpecial where days of the week are mapped to menu items. Since this option is not available, it points to a possible typo or error in the question's formatting.

How you would implement controls to secure guest-to-host interaction between the virtualized operating systems and their hypervisors.

Answers

Answer:

Guest to host interaction means that, virtualized operating system is guest and computer system is host. The virtualized operating system is making interaction with computer by using its hardware resources such as storage and CPU, it is also known as host.

Explanation

To make sure the interaction between virtualized operating system and their hyper visors, following steps would be needed.

up to date software and security patches.Use host based firewallsInstall antivirusdisable unused virtual HardwareDisable unnecessary file sharing

It is also necessary to monitor the activities between guest and host.

Kevin created an app with Firebase that links the inventory of his business to his online store, which he is promoting on Google Ads. He wants to track sales from the app and needs to link his Firebase and Google Ads accounts.Which permissions will Kevin’s Google Account need to link Firebase to Google Ads?

Answers

Answer:

The permission that Kevin's Google account will need to link Firebase to google Ads is "Owner Role" in firebase

Explanation:

There are three primitive roles on IAM for firebase. They are; Owner, editor and viewer.

The viewer Role is for read-only actions

The editor role has all the viewer role permissions plus permission to change state and resources

The Owner role has all editor permissions plus the permissions below;

1) Manage roles and permissions for a project and all resources within the project.

2)Set up billing for a project.

3) Delete or restore a project.

When a structure must be passed to a function, we can use pointers to constant data to get the performance of a call by __________ and the protection of a call by __________. Group of answer choices value, value reference, value value, reference reference, reference

Answers

Answer:

Reference value.

Explanation:

An office manager must choose a five-digit lock code for the office door. The first and last digits of the code must be odd, and no repetition of digits is allowed. How many different lock codes are possible?

Answers

Answer:

6720 lock codes

Explanation:

The numbers to be chosen from are:

0 1 2 3 4 5 6 7 8 9

The odd numbers are five in number which are: 1 3 5 7 9

The even numbers are five in number which are: 0 2 4 6 8

If the first number is odd, therefore, it can be chosen in five ways

After the first number is chosen, there are 4 left odd numbers so the last number can be chosen in four ways.

There are 8 left numbers after they are chosen, so the second number can be chosen in eight ways

Third number can be chosen similarly, in seven ways

Fourth number can be chosen in six ways

Hence, the number of different combinations are:

5*4*8*7*6 = 6720 combinations

Your organization is planning to deploy wireless access points across their campus network, and you have been tasked with securing the installation. Currently, the design calls for a wireless network with many APs that are controlled by a single device, to allow centralized management. What type of APs will you be securing?

Answers

Answer:

Controller APs is the correct answer to the following question.

Explanation:

Because controller APs is the type of APs you can secure your wireless access point of the campus and any other organization. This is one of the better ways to protect or secure your AP that can be controlled by the individual device which permit the centralized management.

So, that's why the following option is correct.

When the ____ property of an object is set to False, the object will not appear on the form when the program starts.

Answers

Answer:

Enabled

Explanation:

the enabled property is found in visual basic integrated development environment, it determines whether the object or form element either appears or not when the program starts.

What can be used to restrict the driver packages installed by specific client computers, based on factors such as the BIOS, manufacturer, model, or OS edition used by the device?​

Answers

Answer:

Driver group

Explanation:

Driver group can be used to restrict the driver packages installed by specific client computers, based on factors such as the BIOS, manufacturer, model, or OS edition used by the device.

Other Questions
How does assessment of structural damage during sizeup affect search and rescue operations? A. The CERT mission changes, depending on whether the damage is light, moderate, or heavy B. CERTs are not allowed to enter either moderately or heavily damaged structures C. CERT members need to use additional protective equipment before entering a heavily damaged structure D. Depending on the type of damage, emergency medical personnel may have to accompany a CERT when the team goes inside the structure Determine whether the given equation has one solution, no solution, or infinitely many solutions. 2/3x = 9 - 2(-1/3x + 3)infinitely many solutionsno solutioncannot be determinedone solutionPlease show me how you get your answer so I can answer the rest of these questions, thanks. xx Carlo is a director of Desserts Italiano, Inc. Carlo opposes a tender offer that is in the company's best interest because its acceptance would cost his position as a director. Carlo is most likely liable for a breach of Select one: a. the duty of loyalty. b. none of the choices. c. the business judgment rule. d. the duty of care. if a company files a civil suit against the internal revenue service, which court would most likely hear the case There is a 15 percent probability the economy will boom; otherwise, it will be normal. Stock G should return 15 percent in a boom and 8 percent in a normal economy. Stock H should return 9 percent in a boom and 6 percent otherwise. What is the variance of a portfolio consisting of $3,500 in Stock G and $6,500 in Stock H?A) .000209B) .000247C) .002098D) .037026E) .073600 A 68-year old patient with Alzheimer disease was brought to the emergency room by the staff of a local nursing home. He presented as lethargic with a sallow complexion. He had an admission temperature of 102.4F and a respiratory rate of 33/minute. During respiration, the right side of his chest moved better than the left. He showed dense consolidation of the lower lobe of the left lung on physical exam. A sputum sample revealed blood and a greenish color. A chest x-ray showed tight consolidation of the left lung with evidence of formation of cavities in the lung tissue from cytotoxic damage. The patient complained of chills in the exam room, combined with his fever. A smear of his sputum demonstrated no acid-fast bacteria.Requried:Diagnose this case study. 3(5j+2)=2(3j-6)(if there is no solution,type in ''no solution'')j= Answer PLEASE HELP WILL MARK BRAINLIEST I would like to take this opportunity to inform you that the changes to your account will post soon.1) I am taking this opportunity to inform you that changes to your account will post on Tuesday.2) As per your verbal instruction, changes to your account will post on Tuesday.3) The changes to your account will post on Tuesday. parental cultural belief systems are also known as:a.Parental ethnotheories.b. Parental psychotheories.c.Parental developmental constructsd.Parental dominating constructs. Write a SELECT statement that returns an XML document that contains all of the invoices in the Invoices table that have more than one line item. This document should include one element for each of the following columns:InvoiceNumberInvoiceDateInvoiceTotalInvoiceLineItemDescriptionInvoiceLineItemAmountHint: Below is the SQL part of the query that you should use so that all you have to add is the XML partSELECT InvoiceNumber, InvoiceDate, InvoiceTotal, InvoiceLineItemDescription AS ItemDescription, InvoiceLineItemAmount AS ItemAmountFROM Invoices AS Invoice JOIN InvoiceLineItems AS LineItemON Invoice.InvoiceID = LineItem.InvoiceIDWHERE Invoice.InvoiceID IN (SELECT InvoiceIDFROM InvoiceLineItemsGROUP BY InvoiceID HAVING COUNT(*) > 1)ORDER BY InvoiceDateSave the XML document that is returned in a file named MultipleLineItems.xmlGenerate an XML schema for the file and save it in a file named MultipleLineItems.xsd The graph of y = 3x2 + 12x + 11 is shown.Use the graph to solve the equation 3x2 + 12x + 11 = 2 Match the computer discipline with its description? Focuses on developing software that is reliable, efficient, affordable, user-friendly, and scalable. Focuses on the design of the computer hardware and peripheral devices, often at the chip level. More of a business career that focuses in applying computers to business problems. Focuses on computer architecture and how to program computers to make them work effectively and efficiently. Focuses on computer equipment and software used by businesses and how they work, are secured, upgraded, maintained and replaced. 1. Computer Engineering 2. Computer Science 3. Information Systems 4. Information Technology 5. Software Engineering Solve the following system of equations: (2 points) 5x + y = 9 3x + 2y = 4 Which of the following statements are true regarding the use of index funds as investment vehiciles for asset classes? 418 N force to move a 56 kg mass, at what rate does the object accelerate? What is the best time to start revising a piece of writing ?A.after you finish each paragraph ,revise it right away B.Revising can be done at the same time as your draft your writing C. Revising should be done right after you finish the draft D.begin revising after not reading your draft for a day or two One of the nutrient cycles moves from an atmospheric gaseous form to the soil through both abiotic and biotic processes, moves through the food web, then is returned to the soil or to the atmosphere. Which cycle fits this description?A) NitrogenB) CarbonC) PhosphorusD) Water How did the United States acquire the Panama Canal?It acquired the isthmus during the Spanish-American War.It purchased the territory from neighboring Nicaragua.It supported Panamanian independence from Colombia.It annexed Panama as a territory of the United States. Some IOS commands store passwords as clear text, but you can then encrypt the passwords with the service password-encryption global command. By comparison, other commands store a computed hash of the password, rather than storing the password. Comparing the two options, which one answer is the most accurate about why one method is better than the other?A. Using hashes is preferred because encrypted IOS passwords can be easily decrypted.B. Using hashes is preferred because of the large CPU effort required for encryption.C. Using encryption is preferred because it provides stronger password protection.D. Using encryption is preferred because of the large CPU effort required for hashes. Steam Workshop Downloader