what term describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization?

Answers

Answer 1

A terminology which describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization is an extranet.

What is an extranet?

An extranet can be defined as an external company or organizational network which is designed and developed to be used by individuals who work for a different organization. This ultimately implies that, an extranet is typically used for providing the employees of different organizations with easy access to data or information.

In Computer networking, the end users of an extranet have the ability to access a company's or organization's entire internet resource.

Read more on extranet here: https://brainly.com/question/15420829

#SPJ1

Complete Question:

What term describes a network owned by one organization that provides safe and secure access to individuals who work for a different organization?

extranet

cloud

BYOD

quality of service


Related Questions

PLZZZ HELPPPP
Which list can be sorted with a bubble sort?



(4, 5, 6, 7)


('dog', 'cat', 'fish')


['dog', 'cat', 'fish', 'bird']


[2, 5, 'dog', 'cat']

Answers

Answer:

dog cat fish bird

Explanation:

Answer:

dog cat fish bird

Explanation:

i got it right

_______________________ includes programs such as the operating system, video games, and word processors.

Answers

Software includes programs such as the operating system, video games, and word processors. It refers to computer programs that perform specific tasks on a computer system. Software comes in different types, including system software, application software, and programming software.

System software is a type of software that is responsible for managing computer resources and providing a platform for application software to run. It includes the operating system, device drivers, utility programs, and programming language interpreters. Operating systems, such as Windows, macOS, and Linux, are examples of system software that enable computer hardware and software to work together. Application software, on the other hand, refers to programs that are designed for specific tasks such as word processing, graphics designing, and video editing.

Examples of application software include Microsoft Office Suite, Adobe Creative Suite, and CorelDRAW. Graphics software, video games, antivirus programs, and web browsers are all application software types. Programming software includes compilers, interpreters, and text editors that are used to develop computer programs.

To know more about Software visit:

https://brainly.com/question/32393976

#SPJ11

I need help, please and thank you.
Flashcards should be

a.

Used several times a day

c.

Moved into a “Know” stack when the information is learned.

b.

Repeated until the information is learned

d.

All of the above



Please select the best answer from the choices provided


A

B

C

D

Answers

Answer: D

Explanation: you should use them several times,move them into a know stack,and repeat the info.

Flashcards should be Used several times a day, Moved into a “Know” stack when the information is learned, and Repeated until the information is learned.

Thus, option D is correct.

What is a Flashcard?

A flashcard, also known as a flash card, is a deck with information across both sides that are designed to aid in remembering. Across one side of each flashcard is a doubt and on the other is an ultimate solution.

Flash cards are just an iconic type of research method for a legitimate reason: they encourage studying thru the following cases, which is one of the better methods for our minds to discover.

Flashcards ought to be utilized several twice per day, relocated to a "Know" stack once the info has been learned, but rather replicated till it knowledge has been understood. Therefore, option D (All of the above) is correct.

Learn more about Flashcard, here:

https://brainly.com/question/29771614

#SPJ6

Edhesive 4.2 question 2 answers

Answers

Answer:

total=0

pet=input("what pet do you have? ")

while pet!= "rock":

   total=total+1

   print("you have a "+pet+" with a total of "+ str(total)+ " pet(s)")

   pet=input("What pet do you have? ")

Explanation: Just copy and paste above again just copy and paste this will get you a 100 percent i made another account just to give yall edhesive answers if yall need help with any edhesive just comment below

what is game development​

Answers

video game development is the process of developing a video game

Explanation:

the effort undertaken by the developer ranging from single person to an entire team

Answer:

Game Development is about creating games. It describes about the design, and how it was developed and released. It may involve concept generation, design, build, test and release. While you create a game, it is important to think about the game mechanics, rewards, player engagement and level design.

before the advent of computer software to facilitate qualitative analysis, the main procedure for managing qualitative data relied on the creation of:

Answers

Prior to the development of computer technologies that facilitated qualitative analysis, feedback production was the primary method for managing qualitative data.

What is qualitative analysis?Action research, case study research, ethnography, and grounded theory are examples of qualitative approaches. Observation as well as participant observation (fieldwork), interviews, questionnaires, texts and documents, as well as the researcher's feelings and reactions, are all examples of sources for qualitative data.A method of inquiry known as qualitative research examines the information that is communicated in natural situations through language and behavior. It is used to record expressive information about views, values, sentiments, and motivations that underpin behaviors that is not expressed in quantitative data.The notion that almost all qualitative research has to be: trustworthy, analyzable, transparent, and valuable is fundamental to the quality framework. The quality framework's capacity to direct researchers in structuring their qualitative research investigations depends on these four elements, or criteria.

To learn more about qualitative analysis refer to :

https://brainly.com/question/1779681

#SPJ4

please help me with Educational Technology pt.3

please help me with Educational Technology pt.3

Answers

Answer:

D

Explanation:

you need to block all unsecured web traffic using its default port from a specific network segment of the enterprise network. which port would you block to achieve this?

Answers

Port 80 would allow me to accomplish this if you needed to ban all unsecured web traffic using its default port from a certain network segment of the company network.

Hypertext Transfer Technology, a widely used internet communication protocol, is assigned port number 80. (HTTP). Uncoded web pages are transmitted and received on this network port by default.

What is the difference between port 80 and port 443?

While Port 443 supports HTTPS protocol, meaning all data traveling or between server and browser remains encoded, Port 80 supports HTTP protocol, meaning data traveling between the browser and server stays in text format.

To know more about browser click here

brainly.com/question/28504444

#SPJ4

Carly is part of a community of developers. In her free time, she works on code to improve this open-source operating system. The OS she's working on is most likely _____.


Linux

Windows Vista

Mac OS X

MS-DOS

Answers

Answer: MS-DOS

Explanation:

a technician is configuring rights and permissions in windows 7. which tool will the technician use?

Answers

The Windows Memory Diagnostic Tool is used to check the defect in the Memory RAM which is by default installed in the latest version.

What is Windows 7 and its uses?Mdsched is used to check the defected RAM which we need to repair otherwise our windows will be crashed, freeze and will start facing the BSOD (Blue Screen Of Death).  For using this tool, we need to search mdsched and select Restart now and check for problems and after restarting the system the tool will automatically start detecting the memory and fix the problem.  Based on the information provided within the question it can be said that the technician would most likely want to use mmc.exe . This is a Microsoft Management Console application which allows the user to display various different management plug-ins and tools that are found within the control panel of the operating system. This can be customized and sent to others as the technician wants to accomplish in this scenario. Windows 7 is an operating system that Microsoft has produced for use on personal computers. It is the follow-up to the Windows Vista Operating System, which was released in 2006. An operating system allows your computer to manage software and perform essential tasks.

To learn more about windows 7 refer to:

https://brainly.com/question/14103767

#SPJ4

Good things to keep track of about people in your Career Network include: a. contact information, including how to spell their name. b. how you came to know them (introduced by a friend, at a career fair, search on LinkedIn, etc.). c. notes about your last interaction and plans for your next interaction. d. only a and b above e. all of the above

Answers

Answer:

mi pareceres que es la B

Explanation:

Write a program in Python which prints your name, surname and class.

Answers

Answer:

print(name + "\n" + surname + "\n" + class)

Explanation:

not enough information is given but this will print those three variables with a newline between each.

exercise 2. (spell checker ) implement a program called spell that accepts f ilename (string) as command-line argument, which is the name of a file containing common misspellings (a line-oriented file with each comma-separated line containing a misspelled word and the correct spelling); reads text from standard input; and writes to standard output the misspelled words in the text, the line numbers where they occurred, and their corrections.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that containing common misspellings a line-oriented file with each comma-separated line.

Writting the code:

import java.util.*;

import java.io.*;

public class Spell {

   public static void main(String []args) throws IOException {

       try {

           File file = new             file.createNewFile();

           FileWriter writer = new FileWriter(file);

           writer.flush();

           writer.close();

           FileReader fileread = new FileReader(file);

           int output = fileread.read();

           String str = "";

           while (output != -1) {

               str += (char) output;

               output = fileread.read();

           }

           int counter = 1;

           Map<String, String> st = new HashMap<String, String>();

           String arr[] = str.("[\n,]");

           for (int i = 0; i < arr.length - 1; i = i + 2) {

               st.put(arr[i], arr[i + 1]);

           }

           String s = "";

           for(int i=0;i< args.length;i++)

           {

               s=s+args[i];

           }

           System.out.println("The command line argument is :"+s);

           String arr1[]=s.split(",");

           for( int j=0;j<arr1.length;j++)

           {

               for(Map.Entry<String,String> ch:st.entrySet())

               {

                   if(ch.getValue().equals(arr1[j]))

                   {

                       System.out.println(arr1[j]+" : "+ Math.abs(ch.getKey().hashCode())+" --> "+ch.getKey());

                       break;

                   }

               }

           }

       }

       catch (Exception e)

       {

           System.out.println(e);

       }

       } catch (Exception e) {

           System.out.println(e);

       }

   }}

See more about JAVA at brainly.com/question/12975450

#SPJ1

exercise 2. (spell checker ) implement a program called spell that accepts f ilename (string) as command-line

in this problem, we will compare the performance of a vector processor with a hybrid system that contains a scalar processor and a gpu-based coprocessor. in the hybrid system, the host processor has superior scalar performance to the gpu, so in this case all scalar code is executed on the host processor while all vector code is executed on the gpu. we will refer to the first system as the vector computer and the second system as the hybrid computer. assume that your target application contains a vector kernel with an arithmetic intensity of 0.5 flops per dram byte accessed; however, the application also has a scalar component that must be performed before and after the kernel in order to prepare the input vectors and output vectors, respectively. for a sample dataset, the scalar portion of the code requires 400 ms of execution time on both the vector processor and the host processor in the hybrid system. the kernel reads input vectors consisting of 200 mb of data and has output data consisting of 100 mb of data. the vector processor has a peak memory bandwidth of 30 gb/s and the gpu has a peak memory bandwidth of 150 gb/s. the hybrid system has an additional overhead that requires all input vectors to be transferred between the host memory and gpu local memory before and after the kernel is invoked. the hybrid system has a direct memory access (dma) bandwidth of 10 gb/s and an average latency of 10 ms. assume that both the vector processor and gpu are performance bound by memory bandwidth. compute the execution time required by both computers for this application.

Answers

The vector processor is faster in this case because it is not bound by the memory bandwidth between the host and GPU, which is a bottleneck in the hybrid system.

What is the execution time required for the vector kernel on the vector processor and the hybrid computer, and which one is faster in this case?

To compute the execution time required by both computers, we need to calculate the time required for each component of the application, including the scalar portion and the vector kernel. We'll start with the vector kernel:

The kernel reads 200 MB of input data and produces 100 MB of output data, with an arithmetic intensity of 0.5 flops per byte. This means that the kernel performs 100 million floating-point operations.

On the vector processor, the peak memory bandwidth is 30 GB/s, so the time required to read 200 MB of input data is:

200 MB / 30 GB/s = 0.00667 s

Similarly, the time required to write 100 MB of output data is:

100 MB / 30 GB/s = 0.00333 s

The time required to perform the 100 million floating-point operations is:

100 million flops / (0.5 flops per byte * 200 MB) = 1 s

Therefore, the total time required to execute the vector kernel on the vector processor is:

0.00667 s + 1 s + 0.00333 s = 1.01 s

On the hybrid computer, the input data must be transferred from host memory to GPU local memory before the kernel is executed, and the output data must be transferred back to host memory after the kernel is executed. The DMA bandwidth between the host and GPU is 10 GB/s, and the latency is 10 ms, so the time required to transfer 200 MB of input data is:

200 MB / 10 GB/s + 10 ms = 0.02 s

Similarly, the time required to transfer 100 MB of output data is:

100 MB / 10 GB/s + 10 ms = 0.01 s

Since the scalar portion of the code takes 400 ms on both computers, the total time required to execute the scalar portion and the vector kernel on the hybrid computer is:

0.4 s + 0.02 s + 1 s + 0.01 s + 0.4 s = 1.82 s

Therefore, the execution time required by the vector processor is 1.01 s, and the execution time required by the hybrid computer is 1.82 s. The vector processor is faster in this case because it is not bound by the memory bandwidth between the host and GPU, which is a bottleneck in the hybrid system.

Learn more about vector processor

brainly.com/question/31503102

#SPJ11

Project manager Kevin has to create a project team organizational chart. Which activity should he perform before creating this chart?

Project manager Kevin has to create a project team organizational chart. Which activity should he perform

Answers

Answer: C

Explanation: Allocating roles to project team members.

PLEASE ANSWRR ALL ASAP

ILL GIVE BRAINLY PLEASE HELP

PLEASE ANSWRR ALL ASAPILL GIVE BRAINLY PLEASE HELP

Answers

Answer:

2D from hexadecimal to denary is 13 + 2*16 = 45

68 from hexadecimal to denary, using the same logic as above, is 104.

AB from hexadecimal to denary, using the same logic as above, is 171.

Lastly, F9 from hexadecimal to denary is 249.

31 from denary to hexadecimal is 1F (notice that it is one less than 32, which is 2*16).

73 from denary to hexadecimal is 49.

184 from denary to hexadecimal is B8

Lastly, 255 is FF (notice that it is one less than 256, which is 16*16)

Microcomputer other device on the network that requests and utilizes network resources Hub Switch Client Server

Answers

Answer:

Client.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

A client can be defined as a microcomputer or other device on the network that requests and utilizes network resources.

These network resources that are being requested by the client (client computer) are typically made available by a dedicated computer on the network known as a server.

THIS IS ACTUALLY FOR HISTORY!!!!!
PLEASE HURRY!!! I WILL MARK BRAINLIEST!!!

When the 1905 Sequoyah Convention ratified their state constitution and submitted it to Congress, Congress chose to ignore it. Do you feel this was the right decision? If you had been a member of Congress in 1905, would you have voted to ratify the Sequoyah Constitution, voted against it, or tried to have it tabled? Defend your choice.

Answers

Answer:

it was certainly a debatable decision, mainly because it was based primarily on political - and not on legal or social - views. since the congress at that time was led by members of the republican party, and the territory that the tribes wanted to turn into an exclusively indian state was predominantly democratic, the proposal (as expressed in the constitution) did not succeed, but the constitution itself proved to be of crucial importance in the creation of the state of oklahoma, and, most importantly, it guaranteed the involvement of representatives of the indian tribes in the government of the future joint state.

as a member of congress, i would have voted to ratify the constitution, or at least to have it tabled. ignoring it was an interested and partial decision.

2- Discuss a virus and related examples of malware, also include definitions of the term payload, and a discussion of how a virus delivers a payload in your answer. Explain a common way through which computers and mobile devices become infected with viruses, and list common types of malware. a

Answers

Answer:

A computer virus is a program that, when executed, replicates itself by modifying other computer programs and inserting its own code. A payload  is the part of transmitted data that is the actual intended message. In this example, the intended message is a malicious executable. Computers and phones often get infected with viruses through a tactic called phishing Phishing emulates actual services through social engineering and tricks a user into installing a payload. A common type of malware and probably most known today is ransomware, which locks down devices files until a payment ransom is met. This payment is often in BitCoin.  

Explanation:

A computer virus refers to a malicious code that's designed to damage or steal data on the computer system.

Malware is a collective name for malicious software variants and these include ransomware, spyware, and viruses. Malware consists of the code that is developed by cyberattackers. An example of malware is Trojan.

A common way through which computers and mobile devices become infected with viruses is when there is a link or file that requires a person to click open the file or click the link.

Once the person opens the file or clicks the link, vital data can be stolen.

Read related link on:

https://brainly.com/question/24760870

The letters below are jumbled. Figure out what the word is and write it on the blank line provide
1.ADTA
2.RNIRPTET
3.BYOMSL
4.MDAIGAR
5.NIGS​

Answers

1. DATA
2. PRINTER ? Not sure, because there’s another T in your question
3. SYMBOL
4. DIAGRAM
5. SIGN

Data, Printer, Symbol, Diagram, Sign

Plz I need the answer ASAP. I’ll mark brainliest

Plz I need the answer ASAP. Ill mark brainliest

Answers

Answer:

A string containing all lowercase letters and numerals and ending with a- Or D

Chatbots are primarily responsible for _______.

thinking outside the box with customers

using instant messaging to collect email addresses and provide information about the company’s products

conducting all customer service interactions for the company

identifying customer requests so that a live agent can respond at a later time

Answers

Chat bots are primarily responsible for conducting all customer service interactions for the company. They use artificial intelligence to understand and respond to customer queries, providing efficient and effective customer support.

Chat bots are programmed to engage in conversations with customers through various communication channels, such as websites or messaging apps. When a customer interacts with a chat bot, it uses artificial intelligence and natural language processing to understand the customer's query or request.

Chat bots can handle a large volume of customer interactions simultaneously, making them efficient and scalable for companies with a high volume of customer inquiries.If the chat bot cannot resolve a customer's issue, it can escalate the conversation to a live agent for further assistance.In summary, chat bots are primarily responsible for conducting customer service interactions for a company.

To know more about interactions visit:

https://brainly.com/question/31385713

#SPJ11

do you think it is important for the teacher and your peers to know things about you? why or why not

Answers

Answer:

yes only certain thing lile how old are u where your from and ECT. just don't go in to detail so yes I agree they should

Answer:

Yes for sure.

Explanation:

When you walk into a classroom or join a class online people should know who you are. You will be with them all year most likely and they might seem like strangers now but soon they wont and it is very important for them to know about you. That does not mean that you have to tell them everything but just the most interesting or special things you are willing to share with them.

Explain any TWO (2) data information that shall be covered under "Safety Data Sheet" and elaborate why do you think the information is needed

Answers

Safety data sheets include details about chemical items that assist users in evaluating the risks. They outline the risks the chemical poses and include details on handling, storage, and emergency procedures in the event of an accident.

The properties of each chemical, its physical, health and environmental properties, protective measures, and precautions for handling, storage and transportation of the chemical are contained in a safety data sheet (formerly called safety data sheet).

Provides recommendations for each individual chemical on topics such as:

PPE, or personal protective equipmentfirst aid techniquescleanup procedures for spills

To learn more on Safety Data Sheets, here:

https://brainly.com/question/28244620

#SPJ4

If you want to display a portion of all three worksheets in a workbook, what should you do? (a) Open
If you want to display a portion of all three worksheets in a workbook, what should you do?
(a) Open two new workbook windows, arrange windows, and then click a different worksheet tab in each window.
(b) Use the Freeze Panes option and cascade the title bars of all open workbooks.
(c) Double-click the split boxes to display four window panes, click within each pane, and then click the worksheet tab to display its content.
(d) Use the Split, Freeze Panes, and Arrange All commands at the same time.

Answers

To display a portion of all three worksheets in a workbook, you can use the Split, Freeze Panes, and Arrange All commands at the same time.

So, the correct answer is D.

This will allow you to divide your worksheet into multiple panes, freeze the rows or columns you want to keep visible while scrolling, and arrange all the panes in a way that suits your needs.

Alternatively, you can open two new workbook windows, arrange them, and then click a different worksheet tab in each window. Another option is to use the Freeze Panes option and cascade the title bars of all open workbooks.

Double-clicking the split boxes can also be used to display four window panes, and then you can click within each pane to display the worksheet content.

Hence the answer of the question is D.

Learn more about worksheet at https://brainly.com/question/30331806

#SPJ11

Write a program to:
• It will collect and output some basic data about the user such as name, and gender which will be
displayed with an accompanying welcome message [3]
• Use appropriate data structures to store the item code, description and price information for
the mobile devices, SIM cards and accessories [2]
• Allow the customer to choose a specific phone or tablet [3]
• Allow phone customers to choose whether the phone will be SIM Free or Pay As You Go [2]
• Calculate the total price of this transaction [4]
• Output a list of the items purchased and the total price. [3]
• Any other choice outside of these three categories would give out appropriate message to the
user and requesting the user to make a new choice. [2]

Answers

According to the question, a program using appropriate data structures are given below:

#include <iostream>

#include <string>

#include <vector>

#include <map>

using namespace std;

int main() {

   string name;

   string gender;

   cout << "Please enter your name: ";

   cin >> name;

   cout << "Please enter your gender (male/female): ";

   cin >> gender;

   cout << "Welcome " << name << ", you are a " << gender << ".\n\n";

   map<string, vector<string>> items;

   items["mobile"] = {"iphone11", "1000", "samsungs20", "800"};

   items["sim"] = {"sim1", "30", "sim2", "40"};

   items["accessories"] = {"charger", "20", "headphone", "30"};

   string choice;

   cout << "Please choose a device (mobile/sim/accessories): ";

   cin >> choice;

   string phone;

   if (choice == "mobile") {

       cout << "Which phone do you want to buy (iphone11/samsungs20) ? ";

       cin >> phone;

       cout << "Do you want to buy a SIM Free or Pay As You Go ? ";

       cin >> choice;

   }

   int totalPrice = 0;

   for (auto item : items[choice]) {

       totalPrice += stoi(item);

   }

   cout << "You have chosen " << phone << " (SIM Free/Pay As You Go) and your total price is: " << totalPrice << endl;

   if (choice != "mobile" && choice != "sim" && choice != "accessories") {

       cout << "Please choose a valid item from the list (mobile/sim/accessories)." << endl;

   }

   return 0;

}

What is data structures?

Data structures are the way in which data is organized and stored in a computer system. Data structures provide a means to manage large amounts of data efficiently, such as large databases and internet indexing services. Data structures are used in almost every program or software system. They are essential in providing an efficient way to store and retrieve data. Data structures are divided into two categories: linear and non-linear. Linear structures include arrays, linked lists, stacks, and queues.

To learn more about data structures

https://brainly.com/question/24268720

#SPJ9

Tonya is photographing an old photo with her digital camera. What can she use to avoid reflections

Answers

Answer:

Indirect lighting conditions

Explanation:

By doing this, there will be no glare

Create a timeline of the evolution of computers and their impact on society

Answers

While the conceptual idea after a computer was developed in the 19th century, the first electronic computer was created in the 1940s.

How does the evolution of computers impacts the society?

Computers have transformed the way people relate to one another and their living environment, as well as how humans manage their work, their communities, and their time. Society, in turn, has affected the development of computers via the needs people have for processing data.

What are the evolution of computers?

The first modern computer was built in the 1930s and was called the Z1, which was followed by large machinery that took up whole rooms. In the '60s, computers evolved from professional use to private use, as the first personal computer was presented to the public.

To learn more about computers, refer

https://brainly.com/question/24540334

#SPJ9

Create a timeline of the evolution of computers and their impact on society

First, read in an input value for variable valCount. Then, read valCount integers from input and output each integer on a newline followed by the string" reports.".

Ex: If the input is 3 70 65 75, the output is:

70 reports.
65 reports.
75 reports.​

Answers

Answer:

The program in Python is as follows:

valCount = int(input())

reports = []

for i in range(valCount):

   num = int(input())

   reports.append(num)

   

for i in reports:

   print(i,"reports.")

Explanation:

This gets input for valCount

valCount = int(input())

This creates an empty list

reports = []

This gets valCount integer from the user

for i in range(valCount):

   num = int(input())

Each input is appended to the report list

   reports.append(num)

This iterates through the report list

for i in reports:

This prints each element of the report list followed by "reports."

   print(i,"reports.")

Jamie has an online project-related policy meeting to attend today, however returning from lunch he seems to have a problem with laptop’s bitlocker and he’s currently waiting for the Technology Support Team to fix the issue. Jamie doesn't want to miss this meeting and he decides to use personal mobile device to attend the session. Is this aligned with the policy?

Answers

Without knowing the specific policy in place, it's difficult to determine whether Jamie using his personal mobile device to attend the policy meeting is aligned with the policy. However, there are a few things to consider:

Does the policy allow for the use of personal devices for work-related activities?Are there any security concerns with using a personal device, such as potential data breaches or unauthorized access?Does the meeting platform used for the policy meeting support mobile devices?Is Jamie able to access the meeting materials and participate fully in the meeting using his personal device?If the policy allows for the use of personal devices and there are no security concerns, and Jamie is able to fully participate in the meeting using his personal device, then it may be aligned with the policy. However, it's important for Jamie to confirm with his supervisor or IT department to ensure that he is in compliance with the policy.

To learn more about mobile device click on the link below:

brainly.com/question/4673326

#SPJ4

Other Questions
One cause behind the push for a new federalism was a perceived increase in ____, where the federal government required states to do something without giving them the money to implement it. In the photo animals by steve mccurry what are some photo techniques used (composition or any of the elements or principles of art) Imagine a rubber band stretched to its limits; sooner or later it will break.Which type of figurative language does the author use in this sentence? julie is cleaning items contaminated with pseudomonas. she should ___ Which vaccine would the nurse administer to a pregnant patient to protect the newborn? brainliest for correct answer please help me with this question thanks Jorge was excited about teaching his sister how to ride a bicycle. He was fond of his little sister, and if you have a loveable sibling you would feel the same thing yourself. Zara, Jorge's sister, was only 5, but she loved trying out new things. She had learned to play the piano in one month, and was that not a great accomplishment? Zara even excelled at learning Italian from her Aunt Margarita. Anyone loved teaching Zara a new skill because she was such an eager learner. That sunny Sunday afternoon, Jorge got his camera ready before he started his bicycle riding lesson. "Be sure to grab the handles firmly, and a helmet should always be worn," he advised his beloved sister. "If you were to sit more comfortably, you will not fall off." "Stay near me, and I might do a good job if you could help," Zara shared her eagerness. Which of these corrects the inappropriate shift in mood in the following sentence? "Stay near me, and I might do a good job if you could help," Zara shared her eagerness. A. "Stay near me, and I wish you helped me do a good job," Zara shared her eagerness. B. "Stay near me, and I will do a good job with your help," Zara shared her eagerness. C. "Stay near me and help me do a good job," Zara shared her eagerness. D. "Stay near me and might I do a good job if you could help?" Zara shared her eagerness. Consider the information about the economy of Pakistan. Note that the currency of Pakistan is the rupee. The government purchases: 3.30 trillions of rupees. Individuals consume: 12.00 trillions of rupees Individuals save: 4.98 trillions of rupees. Businesses invest: 1.30 trillions of rupees. Foreigners spend: 0.64 trillions of Rupees to purchase Pakistani firms. Pakistan imports: 2.23 trillions of rupees Pakistan exports: 1.35 trillions of rupees Calculate Pakistan's GDP. Assume that the values are all current and no conversions need to be made. Pakistan's GDP: trillions of rupees What are common potential problems associated with group decision making? a production process is checked periodically by a quality control inspector. the inspector selects simple random samples of finished products and computes the sample mean product weight . if test results over a long period of time show that of the values are over pounds and are under pounds, what are the mean Roger was so nervous about his first speech that he practiced it again and again. He could have given the speech in his sleep. He had some great examples, and his instructor had praised his outline. But as he gave his speech, he saw his classmates tuning out. What might he have done wrong, and how could he have rescued his speech?NEED advice or solution Please A mail-order company business has six telephone lines. Let X denote the number of lines in use at a specified time. Suppose the pmf of X is as given in the accompanying table.x0123456p(x)0.100.150.200.250.200.050.05Calculate the probability of each of the following events.(a) {at most three lines are in use}(b) {fewer than three lines are in use}(c) {at least three lines are in use}(d) {between two and five lines, inclusive, are in use}(e) {between two and four lines, inclusive, are not in use}(f) {at least four lines are not in use} Lamonte and Fwam own competing taxicab companies. Both cab companies charge a one-time pickup fee for every ride, as well as a charge for each mile traveled. The equation y=2.2x+2.5y=2.2x+2.5 represents what Lamonte's company charges. Fwam charges a $4 pickup fee and $2.80 per mile.Use the dropdown menu and answer-blank below to form a true statement.Fwam's company charges $more per mile than Lamonte's. a machine fills 24-ounce (according to the label) boxes with cereal. the amount deposited into the box is normally distributed with a mean of 24.8 ounces. what does the standard deviation have to be in order for 96% of the boxes to contain 24 ounces or more? which of the following transactions would be reported under investing activities in the statement of cash flows? (check all that apply.) multiple select question. cash dividends to shareholders cash paid for interest on long-term notes cash paid to purchase plant assets cash paid to purchase short-term investments Which strategies that the local government could put in place to ensure that ethical and safety principles will apply when providing high quality? Thanks to his ability to change strategies, the CEO, Mr. Panjwani, was able to turn the company around by focusing on __________ rather than on the product. Given: MPN is a right angle, NP is a perpendicular bisector to MO Prove: MNP ONP which of the following statements is false? group of answer choices the apr can be referred to as a promised annual percentage rate. although an apr is quoted on an annual basis, interest can be paid quarterly. although an apr is quoted on an annual basis, interest can be paid monthly but never daily. the period in which interest is applied or the frequency of times interest is added to an account each year is called the compounding period or compounding periods per year. which statements below are true regarding permanent and temporary accounts? (check all that apply.) multiple select question. A. temporary accounts have a balance for one period only. B. temporary accounts are reported on the income statement. C. retained earnings is a permanent account, but dividends is a temporary account. D. permanent accounts will appear on a post-closing trial balance. E. permanent accounts are reported on the balance sheet. F. temporary accounts will appear on a post-closing trial balance. Which economic system is based on free trade and competition