Your boss wants you to suggest a secure way to connect to the corporate network from home. You will have to connect through the Internet. What is a possible solution?

Answers

Answer 1

Answer:

Using SSH on port 22

Explanation:

When you want to remotely connect to a corporate network and at the same securely.  SSH protocol connection is your best shot. There are few clients software that can help you achieve that. Example include Putty, SecureCRT etc


Related Questions

Each device with a NIC contains a unique identifier, known as a(n) ___ address, which distinguishes it from any other network-connected device in the world.

Answers

Answer:

Media Access Control (MAC)

Explanation:

Every device that has a network interface card (NIC) contains a unique identifier called MAC address which differentiates it from other networking devices all over the world. It is also called a physical or hardware address. MAC addresses are integrated into the NIC of networking devices.

MAC addresses are a 12-digit hexadecimal number usually separated by a colon.

Note that a 12-digit hexadecimal implies also that it is a 6-byte (or 48-bit) number.

An example of a MAC address (in hexadecimal) is as follows;

00:0A:D8:12:E5:13

Final answer:

Each device with a NIC has a unique MAC address which is a hardware identifier that ensures correct data packet delivery. It is distinct from other identifiers such as IP addresses, which can change; the MAC address usually remains constant.

Explanation:

Each device with a Network Interface Card (NIC) contains a unique identifier, known as a MAC address, which distinguishes it from any other network-connected device in the world. The MAC address, which stands for Media Access Control address, is a hardware identifier that uniquely identifies each device on a network. MAC addresses are used for various network technologies, including Ethernet and WiFi.

When a device, such as a computer, smartphone, or printer, attempts to connect to a network, its NIC provides the MAC address to the network to establish the connection. The unicity of the MAC address ensures that each device's data packets are delivered correctly in the midst of network traffic. Internet Protocol (IP) addresses are often discussed in conjunction with MAC addresses, but while IP addresses can change, for example when a device moves between networks, the MAC address typically remains the same unless it is spoofed or altered by the user.

Email security, both within the corporate network and for users who need to access their corporate email remotely. Which protocols can you use to accomplish this?

Answers

Answer:

TCP and SMTP Protocol

Explanation:

In corporate network as well as remote access to corporate email, both TCP (Transmission Control Protocol) and SMTP(Simple Mail Transfer Protocol) can be used to achieve the email security.

Below is an image from Google Trends that plots Cats and Dogs. It shows a line that is higher for dogs than cats. Choose the most accurate description of what this data is actually showing based on what you know about how Google Trends works?
A. People like dogs more than cats.
B. People search for "dogs" more frequently than "cats".
C. There was a sharp increase in the dog population sometime between 2014 and 2015.
D. The popularity of dogs as pets is slightly increasing over time, while the popularity of cats is relatively flat.

Answers

Answer:

People search for "dogs" more frequently than "cats"

Explanation:

Though the image you spoke about in the question is not given but Google Trends is a search trends feature that shows how often Google's search engine is queried using a given word or phrase in relation to the site's total search volume over a given period of time. So if a particular trend(A) plots higher than another(B) it shows that people are searching for "A" more frequently than "B". So option B is the likely answer without showing the image you speak of.

What is the term for the intentional search for information about others' feelings to help explain the meaning of uncertain circumstances and events?

Answers

Answer: Social referencing.

Explanation:

Social referencing is the process whereby infants use affective display of an adult to regulate their behaviors.

Most likely occurs when a situation breeds uncertainty. For instance, If a child receives conflicting messages from their mother and father, the child becomes quite upset.

Final answer:

The term for intentionally seeking information about others' feelings to understand uncertain situations is called social referencing. It is a key component of social cognition and often involves using emotional cues from others to guide one's behavior in uncertain scenarios.

Explanation:

The term for the intentional search for information about others' feelings to help explain the meaning of uncertain circumstances and events is known as social referencing. This concept refers to the process by which individuals look for information from others to clarify a situation. People often use the emotional expressions of others as a source of information to make decisions about their own behavior when they are faced with ambiguous or uncertain circumstances. This dynamic becomes even more complex during social interactions because individuals are simultaneously seeking and providing cues to one another, which can be influenced by variables such as social group stereotypes or personal simulation of reactions in similar situations.

Social referencing is part of social cognition, a field in social psychology that focuses on how we think about others and the social world. This can involve processes like simulation, where we imagine what we would feel in another person's situation, or projection, where we assume others share our thoughts and emotions. However, relying too much on projection can lead to egocentrism and inaccuracies in social perception, as we may overestimate the similarity of other people's mental states to our own.

A group known as ""Takedown"" hacked into your political action committee website and defaced it. Which type of threat actor is likely responsible for the attack?

Answers

Answer:Hacktivist group is most likely to responsible for this.Explanation:

Hacktivism is defined as an action in which a computer or a network is targeted so that it could be misused in order to achieve a goal against any social or political action.

Hacktivists are the persons who perform hacktivism in order to seek attention on a specific thing or issue they want, from all the people.

In the given scenario, the hacking attack is hactivism as it is done to pull the company down.

Hacktivist can be a single person as well as a group of people working together. However they try to work anonymously so that they could not be traced.

I hope it will help you!

Question 8 :You are currently editing a Web document in a GUI HTML editor. You want to specify a background color for the page. To do this in a GUI editor, what should you do first?

Answers

Answer:

Create the html tag container and then create CSS file with the value of the html and body background attribute specified.

Explanation:

Web development is the creation of web pages. It requires standard web development tools like HTML, CSS and JavaScript.

The web page is made up of the header, the body and footer, which are all inside a html file. On the header, body and footer tags must be contained within a html opening and closing tags.

The CSS file styles the markup language tags. To give a background color to the entire page, the html and body elements are referenced and given a background color value.

ListenListen with ReadSpeakerAn administrator working on a Windows Server 2016 Server Core installation needs to disable DHCP on all interfaces on the server. What PowerShell command should be used?

Answers

Answer:- Set-Netipinterface is used in window server 2016 Server core installation to disable DHCP on all interface on the server.

Explanation:

This is because Set-NetIPInterface cmdlet modifies an IP interface, including Dynamic Host Configuration Protocol DHCP etc, On LAN (WOL) settings.

Supplemental security software (such as anti-virus [anti-malware]) is: Generally considered essential for all desktops and laptops. An optional addition. Already included by the manufacturer on all computers. Generally considered essential for personally-owned devices only.

Answers

Answer:

Explanation:

With an anti-virus, we can search, detect, and delete malware like spyware, worms, Trojans, rootkits, pseudoviruses, etc.

An anti-virus can detect virus with several methods like:

Digital signatureHeuristic detectionBehavior detectionSandbox detection

Is necessary for personal laptops and desktops, even in companies hardware.

Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization through a set of organizational guidelines?

A. Planning
B. Policy
C. Programs
D. People

Answers

Answer:

The correct answer to the following question will be Option B (Policy).

Explanation:

The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.Policies are usually implemented by the governing body throughout the corporation.It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.

Therefore, Option B is the right answer.

Final answer:

The Information Security Management function that employs organizational guidelines to dictate behavior is B. Policy.

Explanation:

Policies are the formal statements that provide guidance on how an organization's members should behave and the principles they must adhere to. These policies are crucial for ensuring compliance with legal requirements and for providing a safe and secure environment for both the data and the people within the organization.

Within the broader context of Institutional & Corporate Management, policies serve as a cornerstone for expected behavior and strategic planning. They can reflect the overarching goals of the organization, which might include safeguarding privacy, ensuring ethical communication, and adhering to professional standards of security, particularly in an age where information technology is deeply integrated into everyday operations.

Social networks allow users to share vast amounts of private information about their lives. A security concern of this technology is that this publicly available data may enable stalkers or other criminals to identify potential targets.

Answers

Answer:

The statement is TRUE

If your main supplier was late in delivering goods, which type of system would you use to update your production schedule?

A) ESS
B) TPS
C) MIS
D) DSS

Answers

Answer:B. TPS

Explanation:TPS(Transaction processing system) is a computer based data management system for handling information. It can be used in supply chain management to ensure proper tracking and control of the delivery and supply of materials. It is used in various Transactions like BOOKING OF AIR OR TRAIN TICKETS, EMPLOYEE RECORDS, UPDATE OF PRODUCTION SCHEDULE, UPDATE OF INVENTORIES etc.

Final answer:

To update a production schedule after a main supplier's late delivery, a Decision Support System (DSS) would be the most appropriate tool as it aids decision-making in dynamic and uncertain conditions. The correct answer is option (D).

Explanation:

If your main supplier was late in delivering goods and you needed to update your production schedule accordingly, the correct type of system to use would be a Decision Support System (DSS). A DSS is designed to assist with making decisions based on the analysis of data; it is especially useful for situations that are not structured beforehand, such as unexpected delays from a supplier.

In contrast, an Executive Support System (ESS) is used for high-level strategic decision making, a Transaction Processing System (TPS) is employed for the collection and processing of transaction data, and a Management Information System (MIS) is utilized for regular structured decision-making based on the processing of data into information.

The coherent application of methodical investigatory techniques to collect, preserve, and present evidence of crimes in a court or court-like setting is known as _________.

Answers

Answer:

The correct answer to the following question will be "Forensics ".

Explanation:

Forensic would be the application of science to criminal law, especially on the civil side in the course of criminal investigations, following the legal standards of admissible evidence and criminal law.The consistent use of methodological methods for collecting, preserving and presenting evidence of a crime in court or jury-like settings is recognized as Forensics.In the course of an investigation, forensic scientists accumulate, maintain and evaluate scientific proof. Although some forensic experts go to the crime scene to retrieve the items themselves, some assume a laboratory function, examining artifacts given to them by other people.

Therefore, Forensics is the right answer.

What has occurred if you see the message, "Chassis Intruded! System has halted." the next time you start your computer?

Answers

Answer:

The case has been opened.

Explanation:

Chassis Intruded! Fatal Error … System halted:

Due to some technical hardware issue this problem arises. most of the situations, you need to put the jumper back on the motherboard with the pin labeled chassis signal and ground.

how to get rid of this problem:

To avoid this problem you need to disable Chassis intrusion feature completely to get rid of this error message.

Database management software allows you to create illustrations, diagrams, graphs, and charts that can be projected before a group, printed out for quick reference, or transmitted to remote computers.

Answers

Answer:

The above statement is FALSE

Choose all items that represent characteristics of an HTML element. used to include additional information in an attribute consists of a start tag, an end tag, and the contents they surround may sometimes contain nested elements consists of a keyword followed by an equals sign and additional information in quotes sometimes has required attributes

Answers

Answer:

its was B,C,E

Explanation:

i know becase i took it

Final answer:

An HTML element is characterized by its start and end tags, the contents it surrounds, the ability to contain nested elements, and the use of attributes which include a keyword and additional information in quotes. Attributes can sometimes be required for the element's proper functionality and accessibility.

Explanation:

The characteristics that represent an HTML element include start tag, end tag, and the contents they surround. HTML elements can also include nested elements within themselves to create complex structures. Additionally, elements feature attributes, which are used to provide additional information about the element. An attribute in HTML consists of a keyword followed by an equals sign and additional information enclosed in quotes. Some HTML elements may have certain required attributes that need to be included for the element to function correctly or convey the desired property.

For example, the <a> tag for creating links requires the 'href' attribute to specify the URL, like <a href="https://example.com">Visit Example</a>. The 'alt' attribute for <img> tags, which provides alternative text for an image, is another example of a required attribute. Such attributes play a crucial role in accessibility and proper functionality of web content.

Generally, websites ending in .edu, .gov, and .org are less likely to be biased, or to show preference toward a certain financial product, than those ending in , .net, or .biz.A. TrueB. False

Answers

Answer:

True

Explanation:

Domain extensions always appear at the end of a website's address.

It's a means to categorise websites.

.edu domains are used for educational purposes

.gov are restricted to by government entities

.org is largely used by nonprofit websites.

While

.net is derived from the word network, indicating it was originally intended for organizations involved in networking technologies, such as Internet service providers and other infrastructure companies

.biz is intended for registration of domains to be used by businesses

The right domain extension adds credibility and memorability to your website by aligning it with a specific brand purpose.

Which Windows Server 2016 feature allows a user to utilize a software environment in which an application can run but is isolated from much of the rest of the operating system and other applications?

Answers

Answer:

Windows containers is the correct answer.

Explanation:

Windows containers provide permission to the users to make use of a software or an application environment with that they individually execute because of the many other operating system and other applications. Windows containers is also the feature of the Windows server operating system. That's why the following answer is correct.

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?

Answers

Answer:

Active Directory (AD)

Explanation:

The centralized directory database that contains user account information and security for the entire group of computers in a network.

The service that manages the process of allowing a user to sign on to the network from any computer and access resources is authentication, involving account policies and possibly VPNs.

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by authentication, account policies, and often involves the use of a Virtual Private Network (VPN).

These services ensure that users are authenticated first and then given access to the organizational resources which they are authorized to access, while maintaining the security of their devices and credentials.

In the context of Microsoft Windows, the account policies can include Password Policies, Account Lockout Policies, and Kerberos Policies, which are a subset of the domain's security policy stored in the Active Directory.

______ has gained widespread acceptance, as it allows for representing characters and scripts beyond the Latin alphabet, including Chinese, Cyrillic, Hebrew, and Arabic

Answers

Answer:

Unicode

Explanation:

Unicode is a character set  for the consistent encoding of the most major living languages in the world.

It also covers scientific symbols. Unicode is created by a consortium which consists of Apple, Microsoft, IBM, HP and Digital in 1993. It has become a computing industry standard to encode text.

The most recent version of Unicode 12.1 contains 137994 characters that cover 150 modern and historic scripts and also emoji.

What is an objective of state-sponsored attackers?
1.To sell vulnerabilities to the highest bidder
2.To spy on citizens
3.To amass fortune over of fame
4.To right a perceived wrong

Answers

Answer:

The correct answer is 2. To Spy on citizens

Explanation:

State-sponsored attackers have particular objectives aligned with either the political, commercial or military interests of their country of origin. Investigation shows that “the reality is that if a determined, state-sponsored adversary wants your data, they’re going to get it unless another state-sponsored entity helps you defend it.”

Technician A says that front and rear U-joints on a RWD axle should operate at different angles to prevent vibration. Technician B says that front and rear U-joints on a RWD axle should operate at equal angles to prevent vibration. Which technician is correct?

Answers

Answer:

Technician B is correct only

Explanation:

The actions of technician b helps to eliminate uneven rotating speed which causes vibrations.

.doc What is the difference between a skilled hacker and an unskilled hacker, other than skill levels? How does the protection against each differ?

Answers

Answer/Explanation:

Skilled hacker knows what do to and how to do. He makes his own scripts and codes which he uses for hacking. He knows where to exploit the script and where to attack whereas, an unskilled hacker isn't an expert in programming languages, codes, etc.A skilled hacker is a pro in programming languages, codes etc. whereas, an unskilled hacker doesn't know what to do.An unskilled hacker uses the scripts and codes of skilled hacker. He has to face failure more often then a skilled hacker.

is the abstraction of web-based computers, resources, and services that system developers can utilize to implement complex web-based systems

Answers

Answer:

Cloud computing

Explanation:

Cloud computing is a network of resource servers on the internet, used by individuals or a corporation to store and access data. This platform helps reduce the cost of installing and managing a data center, but allows the use of the resources based on subscription if the organization. It promotes a central access of resources, since all the data are stored in a place.

System developers take advantage of cloud computing with all it's resources to expand the services within managed networks.

Final answer:

The question pertains to the strategies and methodologies used by developers to build complex web-based systems, specifically through the use of web services, virtual servers, and Service-Oriented Architecture (SOA). These abstractions enable the scalable and efficient development of web applications.

Explanation:

The abstraction of web-based computers, resources, and services that system developers can utilize to implement complex web-based systems refers to a collection of strategies and methodologies that allow for the efficient development, deployment, and maintenance of web applications and services. This includes the use of web services, virtual servers, and architectures like Service-Oriented Architecture (SOA) to facilitate the interaction between disparate services over the internet. Developers leverage these abstractions to build scalable, robust applications that can interact seamlessly with other web services, manage resources dynamically, and adapt to changing demands without the need for constant redesign.

Specifically, web services enable applications to offer their APIs over the web, allowing for the integration of various services such as booking systems, payment processing, and content delivery. Virtual servers abstract physical hardware resources, allowing multiple virtual systems to operate independently on a single physical server, which optimizes resource utilization and can reduce costs. SOA, on the other hand, provides a framework for building applications that can easily communicate with each other, making it easier to integrate new features or services without significant disruptions to existing systems.

Between which zones and a DMZ should firewalls be placed? Choose two answers.
Remote
Segregated
Internal
External

Answers

Answer:

DMZ is placed between Internal and External separated by firewalls.

Explanation:

DMZ is demilitarized Zone, that is used to enhance the security feature of the local area network of the organization of firm from other networks exist on the internet. Few organizations need more security from the users that tries to access the resources and information from outside the organization. These users may steal some confidential information or tries to hack the network.

There are three major zones in these types of network, Internal, DMZ and External zones. Internal Zones is separated by DMZ with the help of firewall. The traffic that tries to access the internal network from DMZ checked through this security firewall. The external zone is also separated through a firewall from DMZ, used to monitor the external traffic tries to access the the network.

_____ programs calculate and display the number of hops between computers and the time it takes to traverse the entire one-way path between machines.benchmarking.link checker.route-tracing.indexing.

Answers

Answer:

Route-tracking.

Explanation:

Benchmarking in computer networking is used to track the network stock and comparing it to the cost, security and performance of the network. It is used to determine the effectiveness of the network.

Link checker are third party applications used to check and fix bad or incorrect links on a web page.

The Route-tracking is a command or program that is used to track the path and time taken from one computer to the other.

What will be the output of the following code snippet? boolean token1 = true; while (token1) { for (int i = 0; i < 10; i++) { System.out.println("Hello"); } token1 = false; }

Answers

Answer:

The output of the code snippet will be ten “Hello” messages

Explanation:

while token = true

i = 0 sends “Hello” to the screen

i = 1 sends “Hello” to the screen

i = 2 sends “Hello” to the screen

i = 3 sends “Hello” to the screen

i = 4 sends “Hello” to the screen

i = 5 sends “Hello” to the screen

i = 6 sends “Hello” to the screen

i = 7 sends “Hello” to the screen

i = 8 sends “Hello” to the screen

i = 9 sends “Hello” to the screen

 

Discuss the textbook's recommendations for improving business-IT communication. Provide examples from your own experience to support your ideas.

Answers

Answer:

Make the importance of effective communicationWork with HR to develop new Skills  expectations and rolesMaking Oral ReportsUsing the TelephoneGive Direction and Feedback

Explanation:

Good communication skill is the most important skill for having a good relationship with business and that is why nowadays companies are making it must-have skill for every IT employee. They are also including it into performance appraisals so that way employees are giving it a topmost priorityCompanies are creating the jobs having titles such as "technology relationship manager", "IT Business Analyst" and "business technology specialist" where the titles suggest that the main focus of such titles is IT-Business relationship. One another way companies are trying to adopt is moving IT employees temporary for some time in business so that they can learn the business and enhance the relationship with them. You will need to make oral reports to other staff, such as the executive chef or restaurant manager. For example, you might have to report on the condition of some equipment or explain your actions regarding a problem with a restaurant supplier. You will also need to make oral reports to people who work under you, such as apprentices or salad preparation staff. For example, you might have to explain the preparation of a new menu item. An effective oral report has the same parts as an effective written report, namely an introduction, a body (or explanation), and a conclusion. Communicating on the telephone can be more difficult than speaking in person because many of the non-verbal cues are missing. When dealing with guests and other outsiders, it is particularly important to create a good first impression of your business. This first impression is created almost solely by your voice. For example, if you pick up the phone and bark “Yo” into the receiver, the caller is likely to be put off by your offhand manner and tone of voice. The caller may wonder whether he or she has reached the right number.A form of oral report that you will have to make if you supervise other people feedback on others’ performance. Feedback can be constructive or destructive. As these words imply, only constructive feedback serves any useful purpose. Take an example where the apprentice under your supervision is making pastries. Destructive feedback would be, “Are you stupid or something? The oven needs to be preheated before you put the pastries in to bake!” Do not use blaming words or indulge in name calling (“You are so…”). When people feel blamed, they often tune out of the discussion and do not hear your positive suggestions for improvement.

What do reservations do?
Connect users to the Internet
Keep a spot open for specific individuals using a device
Set aside IP addresses so that they are assigned to specific devices
Connect devices to modems

Answers

Answer:

Reservations Set aside IP addresses so that they are assigned to specific devices.

Option C is correct answer.

Explanation:

Reservation is one of the efficient features granted by the protocol called DHCP (Dynamic host control Protocol). A device following reservation feature gets its IP address reserved every time a router gets started. This is done by the router that it sets aside the very first IP address from the pool of addresses or the device(s) who are reserved.

I hope it will help you!

A certain disk can store 600 megabytes of information. If an average word requires 9.0 bytes of storage, how many words can be stored on one disk?

Answers

Answer:

69,905,067 (approximate).

Explanation:

1 MB is equal to 1024 KB.

1 KB is equal to 1024 bytes.

So 1 MB is equal to 1024 x 1024 = 1,048,576 bytes.

600 MB is equal to 600 x 1,048,576 = 629,145,600‬ bytes

If an average word is of size 9 bytes then 600 MB size disk can store,

approximately 629,145,600 / 9 = 69,905,067 words.

Which security control is most helpful in protecting against eavesdropping on wireless LAN (WLAN) data transmissions that would jeopardize confidentiality? a. Securing wiring closets b. Applying patches promptly c. Implementing LAN configuration standards d. Applying strong encryption

Answers

Answer:

D. Applying strong encryption

Explanation:

Strong cryptography or cryptographic-ally strong are general terms applied to cryptographic systems or components that are considered highly resistant to cryptanalysis.One cryptographic cipher has been mathematically proven to be unbreakable when it is used correctly, but it is only very rarely used.

Other Questions
When an object is moved from rest at point A to rest at point B in a gravitational field, the net work done by the field depends on the mass of the object and1. the nature of the external force moving the object from A to B.2. the velocity of the object as it moves between A and B.3. both the positions of A and B and the path taken between them.4. the path taken between A and B only.5. the positions of A and B only. If an annuitant, whose annuity starting date was January 1, 2008, dies before recovering his or her investment in the annuity, any unrecovered investment is recognized as a miscellaneous itemized deduction on the annuitant's tax return for the year of death. True or false? If an item is 40% off, and then you take another 30% off, what is the total price you will pay? What are the formulas for Calculating Kinetic Energy and Potential Energy? what plus 3/4 equals 1 1/2 which strategies have the potential to prevent the spread of disease select the three correct answersa=earlier interventionb=closing water purification plants.c=education through social mediad=the development of new vaccines. What is a specific, but limited, time (usually in children's lives) during which the child is particularly susceptible to environmental influences relating to some specific facet of development? One of the most important applications of ratio analysis is to compare a company's performance with that of other players in the industry or to compare its own performance over a period of time. Such analyses are referred to as a comparative analysis and trend analysis, respectively The analysis that involves calculating the growth rates of all items from the balance sheet and income statement relative to a base year is called a: A. Common size balance sheet analysis B. Cash flow change analysis C. Percentage change analysis D. Common size income statement analysis 5 points2.) Rose opens her software application and gets a message stating thatshe has only 16 more uses of the product available. Given this scenario,what is her best course of action to use it more than 16 additional times?Activate the software.Register the software.ONo longer close the application.OUninstall and reinstall the software. A regression line was calculated as = -3.2x + 9.7. Determine the slope of this line. Type a numerical answer in the provided space. Do not type spaces in your answer. Cancer is the product of a mutation thatA) causes the uncontrollable growth of cellsB) changes the structure of hemoglobin in the blood C) brings out stunted growth and severe painD) causes a translocation in a pair of chromosomes You are the chief speaker in a debate on the topic "The youths of today are more interested in the pursuit of pleasure than in academic work".Write for or against the motion 50 points !! I need help asap.......Consider a 2-kg bowling ball sits on top of a building that is 40 meters tall. It falls to the ground. Think about the amounts of potential and kinetic energy the bowling ball has:as it sits on top of a building that is 40 meters tall. as it is half way through a fall off a building that is 40 meters tall and travelling 19.8 meters per second.as it is just about to hit the ground from a fall off a building that is 40 meters tall and travelling 28 meters per second.1.Does the bowling ball have more potential energy or kinetic energy as it sit on top of the building? Why?Answer: 2.Does the bowling ball have more potential energy or kinetic energy as it is half way through its fall? Why?Answer: 3.Does the bowling ball have more potential energy or kinetic energy just before it hits the ground? Why?Answer: 4.What is the potential energy of the bowling ball as it sits on top of the building? Answer:5.What is the potential energy of the ball as it is half way through the fall, 20 meters high? Answer:6.What is the kinetic energy of the ball as it is half way through the fall? Answer:7.What is the kinetic energy of the ball just before it hits the ground? Answer: What was a drawback of the Columblan Exchange?A.It led to the spread of diseases in the Americas, killing thousands of Native Americans.B. It led to the loss of funding for future explorations because the westward route to Asla was not found.C. It led to the destruction of the traditional economy and barter system of Native Americans.OD.It led to a rivalry between England, Spain, and France in their race to claim American land. Demand is in elastic if elasticity is?Less than 1?Equal to 1?Greater than1?Equal to 0? Which of the following best describe(s) the slope of a linear function?Select all that apply.o rise over runo run over riseO average rate of changeo intersection with the y-axisNEXT QUESTIONASK FOR HELP In the first paragraph, use three examples of Davids life to describe his personal character. Compare and contrast David's life with the lives of Israels first king, Saul, and its third king, Solomon. Use specific examples to describe how the characters are similar but different, and how they related with God. In the second paragraph, describe two events that illuminate what Davids relationship with God was like. Use one event from 1 Samuel and one from 2 Samuel. Consider his whole life, not just the early years, and how his faith was reflected in family as well as national events. In the third paragraph, present a brief case for why you think David was a good or a bad leader, especially in light of how closely he ruled under Gods "executive" authority. Use examples from both 1 Samuel and 2 Samuel. How do concepts like confession and forgiveness fit into Davids life (see the David and Bathsheba story and its connection with Psalm 51)? which expression is equivalent to 2+y+y+y+y+y+3 ? Which project type creates a competitive advantage that enables the organization to earn a greater than normal return on investment than its competitors? Suppose as a computer programmer, you have been assigned a task to develop a program to store the sorted data in ascending order. Initially you have used linked list data structure to store the data but search operation was time consuming then you decided to use BST (Binary Search Tree) but retrieval efficiency is not improved. In such situation, How can you improve the efficiency of search operation for BST? Justify your answer with solid reason. Steam Workshop Downloader