you've just installed the dns service on a windows server. which port must be opened

Answers

Answer 1

When installing the DNS service on a Windows server, you need to open port 53. Port 53 is the standard port used for DNS (Domain Name System) communication.

When installing the DNS service on a Windows server, it is essential to open port 53. Port 53 is the standard port for DNS communication, responsible for handling DNS queries and responses. By opening this port, the server can send and receive DNS traffic, allowing it to function as a DNS server. Opening port 53 ensures that the server can respond to DNS queries from other devices on the network, enabling proper DNS functionality and name resolution.

Learn more about DNS service here:

https://brainly.com/question/32105992

#SPJ11


Related Questions

you are configuring a router for a small office network. the network users should be able to access regular and secure websites and send and receive email. those are the only connections allowed to the internet. which security feature should you configure to prevent additional traffic from coming through the router? group of answer choices port forwarding/mapping mac filtering port security/disabling unused ports content filtering

Answers

To prevent additional traffic from coming through the router and only allowing the specified connections, you should configure content filtering.

Describe router?

It connects multiple devices on a home or office network, allowing them to communicate with each other and with the Internet. Routers use routing tables to determine the best path for forwarding the packets, and they use network address translation (NAT) to share a single Internet connection among multiple devices. They also typically include built-in firewall functionality to protect the network from unauthorized access.

Content filtering is a security feature that controls access to specific types of internet content, such as websites and email. It can be used to block or allow access to specific websites, email addresses, and IP addresses. This can be configured to only allow regular and secure websites, and email traffic, while blocking other types of traffic.

Port forwarding and mapping, MAC filtering, and port security/disabling unused ports are all important security features, but they are not directly related to controlling access to specific types of internet content.

Port forwarding allows incoming traffic to be directed to a specific device on the network based on the destination port, it is useful when you need to allow incoming traffic to access a specific service or application on a device on your network.

MAC filtering allows you to specify which devices are allowed to connect to your network based on their MAC address.

Port security/disabling unused ports, it helps to prevent unauthorized devices from connecting to the network by disabling unused ports or limiting the number of devices that can connect to a specific port.

To know more network visit:;

https://brainly.com/question/13105401

#SPJ4

Fill in the Blank
Complete the code.
from random import randint
# Generate and save a random number.
correct = randint(1,10)
# Initialize the variable to count the number of guesses.
attempts = 0
# Create a loop that continues until the user guesses the number.
keepGoing = True
_______________ keepGoing:
# Get a guess from the user and update the number of guesses.
guess = input("Guess an integer from 1 to 10: ")
guess = int(guess)
attempts = attempts + 1
# Compare the guess to the correct answer.
if guess == correct:
# Tell the user the guess was correct.
print("You were correct!")
keepGoing = False
else:
if guess < correct:
print("Guess higher.")
else:
print("Guess lower.")

Answers

while

Explanation:

I just did this question

Answer: while

Explanation:

from random import randint

# Generate and save a random number.

correct = randint(1,10)

# Initialize the variable to count the number of guesses.

attempts = 0

# Create a loop that continues until the user guesses the number.

keepGoing = True

while keepGoing:

# Get a guess from the user and update the number of guesses.

guess = input("Guess an integer from 1 to 10: ")

guess = int(guess)

attempts = attempts + 1

# Compare the guess to the correct answer.

if guess == correct:

# Tell the user the guess was correct.

print("You were correct!")

keepGoing = False

else:

print("You were wrong.")

# Continue the loop until the user is correct.

# Tell the user how many guesses were required.

print("You guessed the number in",attempts,"attempts.")

You modified the program to give the user a hint by changing the "else" part of the if block.

​ if guess == correct:

# Tell the user the guess was correct.

print("You were correct!")

keepGoing = False

else:

if guess < correct:

print("Guess higher.")

else:

print("Guess lower.")

While not common, some compressors are configured to use the pressure increase across the unit operation as one of the dependent variables. Modify the control scheme of figure 3.10 to show how this would be accomplished. the figure is in the textbook of "Designing Controls for the Process Industries"

Answers

Determine which variables are necessary to represent the pressure increase across the compressor. This may include the inlet pressure, outlet pressure, and the pressure difference.

Integrate the pressure increase variable into the existing control scheme. This can be done by adding new measurements, calculations, and control actions. Install appropriate pressure sensors at the inlet and outlet of the compressor to measure the respective pressures accurately.

Use the calculated pressure increase as a feedback variable in the control scheme. Depending on the control objective, you can adjust setpoints, manipulate valve positions, or control other relevant parameters to maintain the desired pressure increase across the compressor.

Learn more about control scheme https://brainly.com/question/29668695

#SPJ11

five different procedures to automate a office?

Answers

Answer :

The practice of seeing data flow around on its own without human interference, inaccuracies, or errors is known as office automation. It is the process of creating, collecting, storing, analyzing, and sharing sensitive office data using an automated technology in order to successfully complete basic day-to-day regular activities and operations.

1. Workflow designer that is simple

Hard-core system developers used to be the only ones who could create processes. As workflow software progressed, it assumed that the individuals who used it were also programmers.

However, a modern office automation system should start with the business user in mind, not the coder.

When you sit down to trial an office automation tool, start off by making your own workflows. How easy is it? Can you intuitively create the sequence of tasks needed to finish a process? If you can’t figure it out within the first five minutes, you need to move on to the next option.

Your business's activities should not be dictated by a piece of software. Instead, it should assist your employees in improving their current procedures.

2. Compatibility with mobile devices

Your office should be mobile, and so should all of your tools. Whether you have remote workers or just want to check in while waiting for a flight, the office automation solution you pick should perform just as well on a phone in China as it does on a PC in the office.

Your marketing strategy can't be postponed for a day simply because Greg is returning from his vacation in Machu Picchu.

You should be able to conduct your essential operations from a secure cloud and never have to worry about your data's location or security. If you use an office automation platform like Kissflow Workflow, Greg may review the marketing strategy on his phone while in the Peruvian hotel lobby and give his approval before going on to shoot pictures with the llamas.

3. Integration with other applications

You're not the only one using office automation software. You already have an internal database, a CRM, a marketing automation tool, and finance software, to name a few. You need a tool that doesn't just stay to itself when you're relying on so many systems.

Office automation software should be the easiest to combine with your other tools out of all the software available. If it doesn't, you'll be trapped moving data from one system to the next.

When evaluating office automation software, look for pre-integrations or check whether it takes use of linking to a platform like Zapier to gain access to hundreds of other cloud apps.

4. Analytics and reports

How can you tell whether your workplace automation is working? You can't judge the success of a procedure only on how pleased your employees are. Data is the ultimate decision-maker, and it's critical for your company to compare the history of a process, its speed, the quality of the product, and so on.

It's inconvenient and time-consuming to switch to another program to track your workflow data. Why not create a single piece of software that has reporting and analytics capabilities? The greatest office automation systems now include this capability as part of their core functionality.

5. Options for access control

You should assign access privileges to all of your business workflows the same way you limit admittance to your workplace.

Access control is an important component of a good workflow automation system because it recognizes this sensitive necessity. When looking for office automation software for your company, don't forget about this feature.

Although there are specific rules for furniture placement that should generally be followed, sometimes you will need to bend the rules a little bit. When might it be acceptable to bend the rules for furniture spacing?

Answers

However, it might be acceptable to bend the rules for furniture spacing in certain situations such as:

1. Limited space: If you have a small room, you may need to move furniture closer together than recommended to make the most of the available space.

2. Personal preferences: If you prefer a certain arrangement that may not follow the standard rules, it is acceptable to adjust the spacing to suit your taste and style.

3. Unique room layout: Sometimes, the shape and layout of a room may require you to adjust the furniture spacing to fit the space properly.

4. Multifunctional spaces: If a room serves multiple purposes, such as a living room that also serves as a home office, you may need to modify the furniture placement to accommodate the different functions.

Regardless of the situation, it's crucial to ensure that the furniture arrangement still provides a comfortable and functional space.

Which device is able to stop activity that is considered to be suspicious based on historical traffic patterns?

Answers

Answer:

network security tools.

Network Intrusion Detecting system NIDS.

Four-year colleges typically require
admission.
years of foreign-language study for
a. o
b. 1
c. 2
d. 3

Answers

The answer is option C: 2 years of foreign-language study is typically required for admission to four-year colleges.

Most four-year colleges in the United States require two years of foreign-language study for admission.

This is because colleges want their students to be well-rounded and have exposure to different cultures and languages. Additionally, studying a foreign language can improve cognitive abilities and problem-solving skills, which are valuable in any field of study.

While some colleges may require more or less than two years of foreign-language study, it is a common requirement across many institutions. It is important for students to check the specific admission requirements for the colleges they are interested in to ensure they meet all requirements.

For more questions like Skill click the link below:

https://brainly.com/question/22072038

#SPJ11

Decomposition is
O a list of steps to complete a task.
O a set of steps that follow one another in order.
O breaking a problem into smaller parts
O a design flaw in the program.

Answers

Answer:

breaking a problem into smaller parts

Explanation:

In language of computer science, decomposition is the process in which complex problems are divided into simpler parts. These simpler parts helps in the solving of the complex problems. They are made easier and comprehensible for the user to understand. Each simple part is further analyzed separately and the solution of the complex issues are derived.  The process becomes lengthy but the solution is found.

Does white space have visual weight? Yes or No

Answers

Answer:

no. (more info below)

Explanation:

white space appears to have no visual weight because it's seen as empty. Every body put in the room will appear to be heavier because of the volume surrounding it.

hope this helped!

Answer:

no

Explanation:

it's because it appears to be empty.

What number will this code return?
Math.max(7, 5, 9);

Answers

9

JavaScript’s Math module has a max method that finds the max of the given arguments.

I’m not sure how I can be any clearer
I’ve attached a screenshot if you still have no clue
What number will this code return?Math.max(7, 5, 9);

active directory rights management services are available on which windows server 2012 r2 edition?

Answers

Active Directory Rights Management Services (AD RMS) are available on the Windows Server 2012 R2 Datacenter and Standard editions.

AD RMS is a server role that provides organizations with the ability to create and manage information rights policies for their digital content. These policies can be applied to documents, email messages, and other types of content to control access, usage, and distribution. The Datacenter and Standard editions of Windows Server 2012 R2 both include AD RMS as a server role, allowing organizations to deploy it on their own infrastructure. AD RMS can also be used with Microsoft Azure Information Protection for cloud-based protection of sensitive data.

learn more about Windows Server here:

https://brainly.com/question/30478285

#SPJ11

What is a benefit of the Name Manager feature?
A) add, edit, filter names you have created
B) add, edit, filter predetermined names for cells
C) create a name from a selection
D) rename a worksheet or a workbook

ANSWER: A

Answers

Answer:Its A

Explanation: edge2020

The benefit of the Name Manager feature is to add, edit, and filter names you have created. The correct option is A.

What is the Name Manager feature?

The name manager feature is present in the ribbon present in the window of the tab. To open this, open click the formula tab. For instance, we sometimes utilize names rather than cell references when working with formulas in Excel.

The Name Manager allows us to add new references, update existing references, and delete references as well.

To interact with all declared names and table names in a worksheet, use the Name Manager dialog box. You could want to check for names with mistakes, confirm the reference and value of a name, see or update the descriptive comments, or figure out the scope, for instance.

Therefore, the correct option is A) add, edit, and filter the names you have created.

To learn more about the Name Manager feature, refer to the link:

https://brainly.com/question/27817373

#SPJ2

Conditional iteration requires that a condition be tested within the loop to determine whether the loop should continue. Group of answer choices True False

Answers

Conditional iteration requires testing a condition within the loop to determine if it should continue.

Conditional iteration refers to the process of repeating a block of code until a specific condition is no longer true. In this case, the condition is evaluated within the loop itself. The loop will continue executing as long as the condition remains true, and it will terminate once the condition evaluates to false. This allows for dynamic control over the loop's execution, as the condition can depend on various factors that may change during the loop's execution.

By evaluating the condition within the loop, the program can respond to changing circumstances and adapt its behavior accordingly. For example, a loop could iterate through a list of numbers and perform a specific action on each number, but only if the number meets a certain criteria. The condition is checked before each iteration, and if the criteria are not met, the loop will exit. This flexibility in controlling the loop's behavior based on dynamic conditions is essential in many programming scenarios, enabling efficient and targeted processing of data or actions. Therefore, it can be concluded that conditional iteration requires testing a condition within the loop to determine if it should continue.

learn more about Conditional iteration here:

https://brainly.com/question/28541937

#SPJ11

Which is not a good security precaution to take while using online or mobile banking apps?
Use public Wi-Fi with a secure password

Answers

Your information may be at danger since Wi-Fi broadcasts data to anybody within range. 1 If you conduct online banking using Wi-Fi, that is very dangerous. It is unrealistic to completely avoid Wi-Fi.

Why is disabling Wi-Fi a good idea when using a mobile banking app?

It's best to limit your network activity when it involves sensitive data when it's unsecured or public. Turn off your Wi-Fi and use another financial app or your mobile banking if you need to do so.

What problems does online banking have with security?

Malware or phishing schemes that are used to intercept or steal consumers' financial and personal information are some of the largest security risks with internet banking. Internet banking is secure.

To know more about Wi-Fi broadcasts visit :-

brainly.com/question/13267388

#SPJ4

Declare a two-dimensional array named aryFinal large enough to hold the following table of numbers NJIT WTNE BJKL RYNT O Dim aryFinal(4,4) As Integer DimaryFinal(3.3) As String O ReDim aryFinal(3.3) As String O Dim aryFinal(3,3) As Integer Question 5 2 pts Select the keyword used to refer to a namespace in VB.NET. © Using O Package Imports None of the above D Question 6 2 pts When you plan a Visual Basic program, you follow a three-step process that should end with Setting the properties Writing the BASIC code O Coding all of the remark statements O Defining the user interface

Answers

Question 1: Declare a two-dimensional array named aryFinal large enough to hold the following table of numbers NJIT WTNE BJKL RYNT ODim aryFinal(4,4) As Integer is the correct answer.

The above statement is a declaration of a two-dimensional array named aryFinal, which is large enough to store the given table of numbers. The 4,4 parameter specifies the size of the array as a two-dimensional integer array. The elements of the array can be accessed by the array name and their indices.

Question 5: Select the keyword used to refer to a namespace in VB.NET.The keyword used to refer to a namespace in VB.NET is Using. A namespace is a container that holds related objects, such as classes, structures, interfaces, and enumerations. It is used to organize code and to avoid naming conflicts.

Question 6: When you plan a Visual Basic program, you follow a three-step process that should end with Setting the properties. The three-step process of planning a Visual Basic program consists of the following steps:

To know more about dimensional visit:

https://brainly.com/question/14481294

#SPJ11

which access feature is used to divide an access database into two files: one file contains the tables of the database and the other file contains the queries, forms, reports, and other database objects.

Answers

To split an Access database into two files, utilize the Split Database functionality. The database's tables are contained in the first file, while the second file houses the queries, forms, reporting, and database queries.

Describe a database.

A database is a collection of data organized for quick access, management, and update. In computer databases, information including such sales transactions, customer information, financial data, and product information are often stored as collections of collected data or files. Databases can be used to hold, organize, and access any kind of data. They gather data on people, places, or objects. To enable observation, that information is compiled in one location. Databases can be seen as a well-organized collection of data.

To know more about database
https://brainly.com/question/29412324
#SPJ1

can someone helppp!!!!

send the answers!

20 points for u!

can someone helppp!!!! send the answers! 20 points for u!

Answers

Answer: You can use thisWhat is internet?the Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.What dangers can we find on the internet?On the Internet, cyberbullying takes various forms. Cyberbullying includes sending hateful messages or even death threats to children, spreading lies about them online, making nasty comments on their social networking profiles, or creating a website to bash their looks or reputation.The online world opens the door for trusting young people to interact with virtual strangers - even people they'd normally cross the street to avoid in real life. About 1 in 7 kids have been sexually solicited online.Software filters aren't a perfect solution; some nasty sites can slip through, while educational or family-rated sites may be blocked. So while some parents may wonder whether monitoring means they're spying on their kids, the safety factor often wins out.How do we stay safe on the internet?Follow the family rules, and those set by the Internet service provider. Never post or trade personal pictures. Never reveal personal information, such as address, phone number, or school name or location. Use only a screen name and don't share passwords (other than with parents).
Definitely you can use it

what are the three primary models that a b2c can use to operate?

Answers

The three primary models that a B2C (business-to-consumer) can use to operate are :

DTC modelMarketplace modelSubscription model

There are three primary models that a B2C (business-to-consumer) can use to operate. They are :

1. Direct-to-consumer (DTC) model: In this model, the business sells its products or services directly to the end consumers without any intermediaries. The DTC model allows the business to have more control over the customer experience and enables them to collect valuable customer data.

2. Marketplace model: In this model, the business acts as an intermediary between the buyers and sellers. The business provides a platform for the sellers to list their products or services, and the buyers can purchase from multiple sellers on the same platform. The marketplace model allows for a wider variety of products and services to be offered, and the business can generate revenue through commissions or fees.

3. Subscription model: In this model, the business charges customers a recurring fee for access to its products or services. The subscription model is often used for services such as streaming platforms or software applications. The subscription model provides a predictable revenue stream for the business and allows them to build long-term relationships with their customers.

To learn more about a B2C (business-to-consumer) visit : https://brainly.com/question/29649674

#SPJ11

you are troubleshooting a problem in which several users have called the help desk to report problems connecting to parts of the wan. they were able to access the entire wan earlier in the day, but when they returned from their lunch breaks they were not able to access parts of the wan. you have been able to gather information about the problem, duplicate the problem, question the users, and adequately establish the symptoms of the problem. what should you do next?

Answers

After gathering information, duplicating, and establishing symptoms of the problem, the next step in troubleshooting the issue of users not being able to access parts of the WAN after lunch break is to investigate the root cause by checking the network infrastructure and verifying if any changes were made during lunchtime.

Since the problem occurred after the lunch break, it is possible that someone made changes to the network infrastructure, such as reconfiguring the router or adding a new device. It is important to investigate and verify any changes made during lunchtime, as they could be the cause of the issue. Additionally, it is important to check the network infrastructure, including the routers, switches, and cabling, to ensure that they are functioning correctly and that there are no hardware issues. It may also be helpful to analyze network traffic to identify any anomalies or issues that could be causing the problem. Finally, it is important to communicate with the affected users and provide regular updates on the status of the investigation and resolution of the issue.

Learn more about WAN here:

https://brainly.com/question/31115335

#SPJ11

is it just me or do people delete other peoples questions and it shows up in my inbox staying its mine

Answers

Answer:

yessss same bru.h

Explanation:

Answer:

ive had that happen before i dont know why it happens

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

After a programmer plans the logic of a program, the next step is to __________

Answers

Following the planning of a program's logic by a programmer, the program is coded. Programming enables users to create computer code, apps, and websites. Programming is defined as the process of writing instructions for computers using computer languages.

Computer code is used to code the websites, apps, and other technologies with which we interact daily.Many of the finest tech jobs necessitate the ability to code.

Therefore, the final answer is "Coding the Program ".

Learn more:

brainly.com/question/735555

An operation that copies a value into a variable is called a(n) ________ operation.
a. equals
b. copy
c. declaration
d. cout
e. assignment

Answers

Answer:

e

Explanation:

Your school is hosting a diving contest, and they need a programmer to work on the scoreboard! Your job is to calculate each diver's total after the three judges hold up their individual scores. Write the function calculate_score which takes a tuple of three numbers from 0 to 10 and calculates the sum. A perfect dive is worth 30 points, a belly flop is worth 0. For example: calculate_score((10, 10, 10)) # => 30 calculate_score((9, 9, 6)) # => 24

Answers

Answer:

def calculate_score(setss):

    num1, num2, num3= setss

    if num1 >= 0 and num1 <=10 and num2>= 0 and num2<=10 and num3>= 0 and num3<=10:

         print(num1+ num2+num3)

    else:

         print("Out of range")

Explanation:

I've added the full source code as an attachment, where I used comments as explanation

kristin's position in it focuses on using antivirus, anti-spyware, and vulnerability software patch management in order to maintain security and integrity. which it infrastructure domain is she protecting?

Answers

She is protecting LAN-to-WAN domain data link. The technical framework that joins a LAN and a wide area network in an organization is known as the LAN-to-WAN Domain (WAN).

The technical framework that links a company's local area network to its wide area network is referred to as the LAN-to-WAN domain (WAN). Controlling network traffic between the private network, or LAN, and the public network, or WAN, is the key issue. For many enterprises, the LAN-to-WAN domain designates their connection to the Internet. There is a big risk associated with this link. The configuration of devices in LAN-to-WAN security standards is frequently centered on preserving message and transaction integrity. Securing point-to-point connections is a crucial aspect of connectivity over the Internet.

The technical framework that joins a LAN and a wide area network in an organization is known as the LAN-to-WAN Domain (WAN). Controlling network traffic between the private network, or LAN, and the public network, or WAN, is the key concern. For many enterprises, the LAN-to-WAN Domain designates their connection to the Internet. There is a big risk associated with this link.

To know more about  LAN-to-WAN click on the link:

https://brainly.com/question/13718390

#SPJ4

Please please please help I beg I'll give brainiest. :(

A digital egg timer uses an input, process and output. (a) Suggest an appropriate input component. (b) Suggest an appropriate output component (c) Circle the most appropriate device below to be used for the timing process. Monostable or Astable

Answers

Answer:

A) toggle switch B) Push to Make switch C) Monostable

Explanation:

toggle because it needs to go off when the timer ends and not when u press a button

Push to make because you turn the timer off manually

Monostable because it needs to go off once not repeatedly

Determining which computer platform (operating system) would be best for a particular student often depends on what the student wants to study and in which industry she or he wants to enter after graduation. Students who plan to study graphic design or want to focus on photo production or publishing should strongly consider the __ platform since it is generally considered the industry standard in those fields.

Answers

Answer: Window OS

Explanation:

Based on the information given, it should be noted that the students who plan to study graphic design should consider the Window OS platform since it is considered to be the industry standard in those fields.

Microsoft Windows, also refered to as the Windows OS, is a computer operating system that's developed by Microsoft to run personal computers. It has the first graphical user interface and also, the Windows OS dominates the personal computer market.

true or false? when internet technology connects two networks with separate link layers together, each individual network is called a subnet.

Answers

If internet technology connects two networks with separate link layers together, each individual network is called a subnet is a true statement.

A subnet, what is it?

An individual IP (Internet Protocol) address is given to each device that connects to the Internet, allowing data sent over the network to find the correct device among the billions of devices that are linked to it. IP addresses are typically written as a string of alphanumeric characters even though computers read them as binary code (a series of 1s and 0s).

Hence, Networks inside other networks are known as subnetworks or subnetworks. Networks gain efficiency thanks to subnets. Network traffic can travel farther without stopping at pointless routers by using subnetting, which allows it to travel a shorter distance.

Learn more about subnet from

https://brainly.com/question/29039092

#SPJ1

True

k12 career quiz 2.10

Where does Reiner take eren after they have a fight?

Answers

Answer:

So Reiner And Bertoldt wanted to take Eren and Ymir to Marley, a nation on the other side of the ocean so they can be devoured and there power can be given to a warrior canidate.

Answer:

what season tho?

Explanation:

Reiner took eren to the Forest

lin installed a time-management utility that she downloaded from the internet. now several applications are not responding to normal commands. what type of malware did she likely encounter?

Answers

Lin likely encountered a Trojan horse malware.

Trojan horse is the type of malware that Lin likely encountered. Trojan horse is a type of malware that is disguised as a legitimate software or application. It tricks the user into downloading and installing it on their computer, and then it performs malicious actions in the background without the user's knowledge. These actions may include stealing sensitive data, damaging the computer, or giving unauthorized access to the attacker.

Therefore, Lin needs to immediately remove the infected software from her computer and run a virus scan to ensure that her computer is free from any other malware or virus.

Learn more about  Trojan horse malware:https://brainly.com/question/14393920

#SPJ11

Your question is incomplete, but probably the complete question is :

Lin installed a time-management utility that she downloaded from the Internet. Now several applications are not responding to normal commands. What type of malware did she likely encounter?

Trojan horse

Worm

Virus

Ransomware

Other Questions
The Joint Pruf of bivariete (x, y) is given by Pxy (x, y) = P(X= some politicians argue that eliminating u.s. tariffs and quotas would help the u.s. economy only if other countries eliminated their tariffs and quotas in exchange. what does clucked at him like hens mean What is the charge on an electron?-10+1+2 HELP ASAP WILL MARK BRAINLIEST After agincourt in 1415, england seemed to be on the verge of complete victory in the hundred years' war becaus:_____ Which expression is equivalent to (5^3)-2 Samples of a cast aluminum part are classified on the basis of surface finish (in microinches) and edge finish. The results of 100 parts are summarized as follows:Edge Finish Excellent Good Surface Excellent 80 2 Finish Good 10 8 Let A denote the event that a sample has excellent surface finish, and let B denote the event that a sample has excellent edge finish. If a part is selected at random, determine the following probabilities: a) P(A) b) P(B) c) P(A') d) P(A B) e) P(A B) f) P(A' B) Is chamber was the right choice in valorant? please helppp:(((((((( compared to canada, australia, japan, sweden, france, and the united kingdom, the united states has lower rates of chronic disease and early death among adults. a child who is of preschool age is diagnosed as having severe autism. the most effective therapy involves which intervention? Please help fast?!? Which is NOT a protective device for archery?finger tabshooting glovearmguardwrist guard Select all that apply.In another question in this lesson, you are asked if any or all of the following graphics would be useful in an instruction manual for putting together a basketball hoop. Why are any or all of these three graphics inappropriate for that technical manual?a picture of a father and his daughters happily playing basketball using the new hoopa line drawing showing all of the parts and pieces of the hoop and how each connectsa picture of a famous basketball player such as Michael Jordan or Tim DuncanA.)One or more than one of them do not inform the reader about the product.B,)One or more than one of them do not help to explain a process.C.)One or more than one of them provide something to hook the reader and thus are appropriate.D.)All three of the graphics listed are appropriate for the technical manual. A spherical shell has inner radius Rin and outer radius Rout. The shell contains total charge Q, uniformly distributed. The interior of the shell is empty of charge and matter.Part AFind the electric field strength outside the shell, rRout.Express your answer in terms of some or all of the variables r, Rin, Rout, Q, 0, and the constant of .Part BFind the electric field strength in the interior of the shell, rRin.Express your answer in terms of some or all of the variables r, Rin, Rout, Q, 0, and the constant of .Part CFind the electric field strength within the shell, RinrRout.Express your answer in terms of some or all of the variables r, Rin, Rout, Q, 0, and the constant of . Write the equivalent percent for each fraction.72 %41,000 %1025 %38 % Can someone help me with this? What are things you can learn about the shape of earth surface from contour lines Ill give brainliest What is the best way to change this sentence from passive voice to active voice?The multitalented guitarist, Francisco, was chosen by the band to be their lead singer