someone from the outside world (10.1.2.3) attempts to open a connection from port 5150 on a remote host to the web proxy server on port 8080 on one of your local hosts (172.16.3.4) in order to carry out an attack. will the attack succeed? which rules in the rule set will be applied? give details

Answers

Answer 1

The attack could succeed because in the original filter set, rules B and D allow all connections.

What is proxy server ? How does it work ?

An proxy server is a framework or switch that gives an entryway among clients and the web. Hence, it keeps digital assailants from entering a confidential organization. It is a server, alluded to as an "mediator" since it goes between end-clients and the site pages they visit on the web.

At the point when a PC interfaces with the web, it utilizes an IP address. This is like your home's road address, let approaching information know where to go and stamping active information with a return address for different gadgets to confirm. An intermediary server is basically a PC on the web that has its very own IP address.

To learn more about Proxy Servers , refer :

https://brainly.com/question/20602197

#SPJ4


Related Questions

a motherboard failed on a desktop pc with an intel core i5-10600k processor. when you are looking for a replacement motherboard, which cpu socket does it need to have?

Answers

You'll need a motherboard with an LGA 1200 socket and a suitable 400-series or 500-series chipset for Intel's 10th generation Core i5 10600K processor.

What is motherboard?The circuit board determines the kinds of storage devices, memory modules, and graphics cards (among other expansion cards) that can connect to your PC. It also distributes electricity from your power supply and links all of your hardware to your processor.The motherboard serves as a platform linking all of the computer's components, and the CPU handles the actual data processing and computing. Both the motherboard and CPU carry out activities essential to the operation of the computer's operating system and programs.The typical sign of a failing motherboard is an entirely dead system because the motherboard is what makes the computer work. If the motherboard is dead, fans, disks, and other peripherals may spin up, but more frequently nothing occurs at all when you turn on the power.

To learn more about motherboard refer to :

https://brainly.com/question/12795887

#SPJ4

in the decision making proccess, after you have choose the right solution what is the nest step

Answers

In the decision-making process, after you have chosen the right solution, the next step is option A: act on your decision.

Why is making decisions important?

Making decisions is crucial since it allows you to select from a variety of possibilities. It is important to gather all relevant information and consider the advantages and disadvantages of it before making a decision. It is vital to concentrate on actions that can assist in making the best judgments.

The most crucial step is evaluating options because this is when each choice is genuinely examined and taken into account. To genuinely make a decision, this step must be taken. The most crucial step is making a choice since it brings all the other options together.

Note that the phase before making a formal decision is evaluation. Making better decisions may be aided by the decision-maker learning from the results and as such, acting on all decision made will go a long way in your growth.

Learn more about decision-making process from

https://brainly.com/question/1999317

#SPJ1

See full question below

In the decision-making process, after you have chosen the right solution, what is the next step?

A act on your decision

B Reflect on your decision.

C gathering information

D identify the problem

what is the best way to create a pseudocode plan within your program? responses use comments in a file. use comments in a file. use a flowchart in idle. use a flowchart in idle. use comments in idle. use comments in idle. use a flowchart in a file.

Answers

Use comments in a file the  best way to create a pseudocode plan within  the programme. Pseudocode is a made-up, informal language that aids in the creation of algorithms by programmers.

What is pseudocode?

Literally translated as "false code," pseudocode. It is a casual and artificial approach of developing programs where you convey the series of instructions and commands (also known as algorithms) in a way that is simple for people to grasp.

Pseudocode, which is employed in computer science, is straightforward language representation of an algorithm or the operations of another system. Although pseudocode frequently employs standard programming language structure rules, it is written for human rather than automated comprehension.

Pseudocode is a made-up, informal language that aids in the creation of algorithms by programmers. A "text-based" detail (algorithmic) design tool is pseudocode. The Pseudocode rules are not too complicated. Statements that demonstrate "dependency" must all be indented. Some of these are while, do, for, if, and switch.

To learn more about Pseudocode refer to:

https://brainly.com/question/24953880

#SPJ4

The Microsoft PC game Hover! features various mazes, such as a medieval castle and a sewer, that the players must run through to take the flags of the opposite team without being caught. What type of game mode does Hover! use? A.
turn-based game mode

B.
King of the Hill game mode

C.
capture the flag game mode

D.
movement game mode

Answers

Since the Microsoft PC game Hover features various mazes, the type of game mode that Hover! use is option C. capture the flag game mode.

Hover app: What is it?

This is known to be a very vibrant community exists on the social media platform Hover. Users can interact with you in a variety of ways, including by leaving comments on your blog entries, subscribing to your twitch channel, viewing your material, chatting with you, and connecting with you on Discord.

It is seen as futuristic 3D Open World is the setting for the frantic single-player and multiplayer Parkour game Hover. Enjoy the thrills of a challenging single-player and multiplayer Parkour game. Join the rebellion and call the police a tyrannical anti-leisure regime. Face the numerous obstacles in a futuristic open world.

Therefore, In the video game Hover!, elements from bumper cars and capture the flag are combined. Versions of Microsoft Windows 95 on CD-ROM contained it.

Learn more about game mode from

https://brainly.com/question/12828012
#SPJ1


Selah is organizing all of the folders on her computer so she can find everything faster. She decides to make a "Work" folder, which she puts inside a "2021" folder, which she puts inside a "Budget" folder. Which method of organization is she using?

Answers

Answer:

Explanation:

 Use Subdirectories

The simplest and most obvious advice. Whichever organization system you choose, you'll have to create folders to put your files in. Get in the habit of creating new directories constantly.

C://Budget/2021/Work

myra does not want a worksheet of sensitive data to be available to other users, but she does want to use its data in formulas in other worksheets. what can she do?

Answers

The correct answer is that myra can Hide the worksheet.

The term Worksheet used in Excel documents is a collection of cells organized in rows and columns. It is the working surface you interact with to enter data. Each worksheet contains 1048576 rows and 16384 columns and serves as a giant table that allows you to organize information.

To learn more about Worksheet click the link below:

brainly.com/question/13129393

#SPJ4

[SPECIAL]>>>WRITE THIS TEXT IN BINARY CODE

Answers

Answer:

in binary

01000110 01010010 01000101 01000101 00100000 01010000 01001111 01001001 01001110 01010100 01010011

THX:

01010100 01001000 01000001 01001110 01001011 00100000 01011001 01001111 01010101

Answer:

01000110 01010010 01000101 01000101 00100000 01010000 01001111 01001001 01001110 01010100 01010011

When creating a scope on a dhcp server, what is the purpose of specifying an exclusion?.

Answers

A DHCP exclusion range is a specified range of IP addresses found in the DHCP range. Use exceptions to prevent the DHCP server from assigning certain UP addresses within the range specified in the scope.

Moreover,  You can identify IP addresses in a range that are excluded from assignment, such as an address statically assigned to a server or router. A DHCP exclusion range is a specified range of IP addresses found in the DHCP range. An exclusion range is defined as a start/end pair of IP addresses within an ipam/range object and is considered a sub-object within a regular DHCP scope. The ip dhcp exclusive-address command can be used to reserve addresses that are statically assigned to key hosts. A DHCP server can configure much more than just an IP address. Additional IP configuration values ​​can be set from DHCP configuration mode.

You can learn more about this through link below:

https://brainly.com/question/6054505#SPJ4

your organization plans to deploy its three-tier line-of-business (lob) web application to azure. you need to recommend an iaas solution that allows all virtual machines (vms) to communicate with each other by default. what should you do?

Answers

In this scenario, you should require to connect Linux to Windows in order to use a custom handler in which the first step is to create a function in Azure for it to call.

What are Virtual machines?

Virtual machines may be characterized as virtualized circumstances of a computer that can be able to perform almost all of the identical functions as a computer. It includes running applications and other operating systems.

Azure virtual machines are Infrastructure as a Service (IaaS). Infrastructure as a Service is the most flexible category of cloud services. They are allowed to deploy its three-tier line-of-business (lob) web application to azure where you need to connect Linux to Windows in order to use a custom handler in which the first step is to create a function in Azure for it to call.

To learn more about Virtual machines, refer to the link:

https://brainly.com/question/28322407

#SPJ1

question 2 a data analyst uses the sum function to add together numbers from a spreadsheet. however, after getting a zero result, they realize the numbers are actually text. what function can they use to convert the text to a numeric value?

Answers

It is necessary to utilize the VALUE Function to transform the text into a numeric value .

What is VALUE function?The value of the  text that represents a number is provided via Excel's VALUE function. As in the sentence $5, it is a format for numbers in a text. Consequently, we will get 5 when applying the VALUE algorithm to this data. So, it is clear how this function allows us to obtain the numerical value that an Excel text represents.The four main types of data in Microsoft Excel are known as Excel data types. Text, number, logical, and error data are the four categories of data. Each type can be used for a variety of tasks, so knowing which to be using and when to utilize it is crucial.

To learn more about VALUE function refer to :

https://brainly.com/question/25879801

#SPJ4

what command can you utilize to display tcp/ip configuration information for each network adapter installed?

Answers

The command that can you utilize to display tcp/ip configuration information for each network adapter installed is ipconfig command.

(Internet Protocol CONFIGuration) A command-line tool used to view and control the machine's allocated IP address. The current IP, subnet mask, and default gateway addresses of the computer are shown in Windows when you type ipconfig without any other options.

Ipconfig is a DOS tool that displays the current network parameters allocated and provided by a network and may be used from the MS-DOS and Windows command line. You can use this command to check your network settings and network connectivity.

displays all of the TCP/IP network configuration values that are currently in effect and updates the DHCP and DNS settings. Internet Protocol version 4 (IPv4) and IPv6 addresses, subnet masks, and default gateway are shown for all adapters when ipconfig is used without any parameters.

To know more about ipconfig command click here:

https://brainly.com/question/10017959

#SPJ4

List four tasks that humans perform frequently, but which may be difficult for a computerized agent to accomplish. Describe the PEAS specification for the environment suggested by these tasks.

Answers

The four tasks that humans perform frequently, but which may be difficult for a computerized agent to accomplish are:

Critical ThinkingStrategic Thinking creativityEmpathy and communication skills

Numerous items are included in the PEAS specification for the environment recommended by this assignment. Speed, safety, duration behind the wheel, and comfort level of the drive would all be considered as part of the performance.

What are the skills about?

The development of artificial intelligence (AI) over the past few decades has caused widespread concern. The widespread fear is that as robots and computers finally take the place of workers, there will be a tremendous loss of jobs.

Note that the worry is not without merit; after all, robots and computers have already shown they are capable of performing some activities far better than people.

Learn more about PEAS specification from

https://brainly.com/question/27356994
#SPJ1

Which command removes a selection from its original location so it can be moved to another location?
Cut
Copy
Undo
Redo

Answers

Cut removes a selection from its original location so it can be moved

Answer:

Explanation:

Cut - Copy

consider the switch shown below. suppose that all datagrams have the same fixed length, that the switch operates in a slotted, synchronous manner, and that in one time slot a datagram can be transferred from an input port to an output port. the switch fabric is a crossbar so that at most one datagram can be transferred to a given output port in a time slot, but different output ports can receive datagrams from different input ports in a single time slot. what is the minimal number of time slots needed to transfer the packets shown from input ports to their output ports?

Answers

3  is the minimal number of time slots needed to transfer the packets shown from input ports to their output ports.

What is Input and output port?

Input port can refer to any of the following: Input device, a general word for any device that gives input to a system. A parallel port is a type of computer hardware interface. A serial port is a type of computer hardware interface. A computer hardware interface known as the Universal Serial Bus.

Like input ports, output ports are defined in terms of port sets. A port set is a group of ports that share the same configuration. This sharing prevents the same configuration from being repeated for different ports. When a port set is open, it can have zero or more ports with the same configuration.

To learn more about Input and output port refer to:

https://brainly.com/question/26409104

#SPJ4

Identify some possible delivery systems for video programs

Answers

Some possible delivery systems for video programs are:

Radio broadcast frequencyCoaxial cableSatelliteOptic fiberWhich program delivery methods work the best?

The first technologies for distributing videos to the general public were historically terrestrial broadcast TV systems. Following these systems naturally and with great success were cable and DTH (direct to home) satellite technologies.

In the past, these systems have been installed on-site using hardware, networks, and other links that were especially created for the purpose of transmitting video feeds between various facilities and entities in the supply chain.

Therefore, These are the five different ways that learning is delivered: face-to-face instruction, virtual classrooms, online learning, blended learning, and mobile learning.

Learn more about delivery systems from

https://brainly.com/question/28420229

#SPJ1

which of the statements below best defines an embedded audit module? multiple choice question. a programmed module added to the system so that the auditors can monitor and collect data over online transactions. a test data technique that enables test data to be continually evaluated during the normal operation of a system. a parallel simulation module that uses a set of input data to validate system integrity. a module in which the auditors create fictitious situations and perform a wide variety of tests over the system.

Answers

A programmed module added to the system so that the auditors can monitor and collect data over online transactions.

When transactions satisfy specific requirements, an embedded audit module inserts code into an application program that generates notifications. An embedded audit module's goal is to alert auditors in real time to transactions that may be mistaken or have characteristics that call for additional investigation. This information is helpful for identifying instances of potentially fraudulent transactions as well as for creating more effective internal controls.

Embedded audit modules (EAM) are sections of code incorporated into application programs that continuously record data with audit significance. INGRESS, a relational database management system, is used to demonstrate the implementation of EAMs. A database access interface that allows the auditor to access auditors-related data is also provided.

To know more about auditors click here:

https://brainly.com/question/28409489

#SPJ4

you are building a new computer from both new and used parts. the video card is a pcie video card that requires an 8-pin power connector. however, your power supply doesn't have an 8-pin pcie power connector. which solution would be the least expensive option for your system?

Answers

Use an adapter cable to connect two 4-pin Molex connectors to the 8-pin PCIe connector.

What is adapter cable?

A connector, which is another name for an adaptor cable, is a mechanical accessory. Two connectors are joined by a connector. A connector that changes different voltages to the proper voltages is known as an adaptor cable. Signals are converted into various voltages at the junction.

What is 4-pin Molex connectors ?

The 4-pin Molex connector is a popular choice for disk drives, computer peripherals, and similar devices. It also works well as a general-purpose power connector. This is a good, tidy way to connect it if you're using a computer power source to power your project.

What is 8 pin PCIe?

Extra 12 volt power is delivered to PCI Express expansion cards via this socket. The 6 pin PCI Express power line was developed because many video cards need substantially more power than the 75 watts allowed by the motherboard slot.

Learn more about 8 pin PCIe click here:

https://brainly.com/question/28929597

#SPJ4

Trade secrets _____.

protect owners for 20 years
protect owners for 20 years

are secret company names
are secret company names

give a competitive edge
give a competitive edge

are products that generate profit

Answers

Answer:

gives a competitive edge

Explanation:

chad is a network engineer. he is tasked with selecting a virtual private network (vpn) platform for his company. he chooses a solution that is inexpensive and runs on unix, although it is less scalable and less stable than other solutions. what has he chosen?

Answers

He has choosen LAN security and firewalls. A firewall helps protect your computer and data by regulating network traffic.

A firewall helps protect your computer and data by regulating network traffic. It accomplishes this by blocking unwanted and unsolicited inbound network traffic. A firewall authenticates access by checking this incoming traffic for any unauthorized stuff, such as hackers and viruses that could harm your computer.

Through a firewall, a network security device, incoming and outgoing network traffic is monitored and filtered based on previously established security policies for the company. At its most basic level, a firewall is essentially the barrier that sits between a private internal network and the public Internet. A firewall's primary job is to let safe traffic through while blocking hazardous traffic.

To know more about firewall click here:

https://brainly.com/question/13098598

#SPJ4

He has selected firewalls and Local Area Network (LAN) security.

The most widely used technique by administrators for securing a local area network is to install a firewall resource behind a single access point, such as an initial wireless router.

A firewall helps protect your computer and data by regulating network traffic. It accomplishes this by preventing unwanted and unsolicited inbound network traffic. A firewall authenticates access by checking this incoming traffic for any unwanted content, such as hackers and viruses that could harm your computer.

Through a firewall, a network security device, incoming and outgoing network traffic is monitored and filtered based on previously established security policies for the organisation. At its most basic level, a firewall is essentially the barrier that stands between a private internal network and the public Internet. A firewall's primary job is to let safe traffic through while blocking harmful traffic.

To know more about firewall click here:

brainly.com/question/13098598

#ADT1

assume you have a data stream (a collection of bits arriving to your machine). the machine will read a bit incorrectly with probability 0.01. if 10 bits were sent to you, what is the probability that this machine exactly one will be read incorrectly? what is the probability that at least 1 bit will be read incorrectly?

Answers

Less than or equal to is the definition of the word at least. Mean the lowest value that should appear once a random event occurs in probability.

The complement of the event never occurring will be used to determine the likelihood that an event will occur at least once. This means that the odds of the event never happening and the odds that it will happen at least once will both be equal to one, or a 100% chance. Prior to transmission, a probability estimate is made; following transmission, an error rate is recorded. An absolute upper limit on error rate exists for error correcting techniques. More types of errors than just single-bit ones are covered by probability of error.

Learn more about transmission here-

https://brainly.com/question/14725358

#SPJ4

This is a graded practice activity. This is not an actual quiz.
Question 1
Which of the following correctly prints the following calculation if x is 27 and y is 5?
Difference is: 22
O print Difference is: "+x-y)
O print Difference is " + (x-yl)
O print Difference is:" +strix-yll
O print Difference is:" +intix-yl
1 pts

Answers

Answer:

0

Explanation:

x=27

y=5

22+(27-5)

22+(22)

0

Automation can be of key importance for any organization and administrator. knowing how to set up automated processes can allow for more focus to specialized and important activities which take more of a manual engagement level. choose the best option for an automated process used to backup files. group of answer choices son backup system protection grandfather backup differential backup

Answers

Since Automation can be of key importance for any organization and administrator. Automation process used to backup files is option D: differential backup.

Why is automation crucial for a company?

By automating business processes, bottlenecks that waste time and money are removed. Every aspect of the firm benefited from the increases in productivity and compliance, which also led to enhanced customer service and performance.

Therefore, Higher productivity, dependability, availability, improved performance, and lower operating costs are all advantages of automated processes. Automation in industrial settings improves production reliability while reducing costs.

Learn more about Automation from

https://brainly.com/question/11211656
#SPJ1

3. what is computerized short-term scheduling that overcomes the disadvantage of rule-based systems by providing the user with graphical interactive computing? 1. lpt 2. css 3. fcfs 4. fcs 5. tgi

Answers

fcs (Finite Capacity Scheduling) is the short-term scheduling that overcomes the disadvantage of rule-based systems by providing the user with graphical interactive computing.

What is Finite Capacity Scheduling?Finite capacity scheduling is a technique used in manufacturing operations to determine how much work can be completed in a given amount of time and to assign resources to jobs in the most effective sequence taking into account all constraints.The start and end dates for the operations in the order are determined by finite scheduling.It is a thorough technique for scheduling orders and operations while taking into consideration the demand on the available resources.A resource overflow is impossible.A never-ending schedule.Make the best possible use of the available resources, taking into account labor capacity, work center uptime, and material limits.As materials are only ordered when they are required, your inventory levels will be lower and your production costs will be lower.

To learn more about  Finite capacity scheduling  refer,

https://brainly.com/question/13484626

#SPJ4

Emma’s project team has to create an application within a short period of time. after a few considerations, the team decided to go ahead with the rad model. how does the rad model decrease development time? a. by using automated tools and reusing existing code b. by gathering all requirements in the first phase of the project c. by testing at the end of the life cycle d. by producing detailed documentation

Answers

Answer is A, by using automated tools and reusing existing code

Because RAD uses reusable components, the amount of time and effort necessary for testing is decreased.

You can learn more about at:
brainly.com/question/16969631#SPJ4

what happened when the fbi asked apple to create a new version of the ios operating system was would allow the fbi to gain access to the locked iphone of syed rizwan farook?

Answers

Apple rejected the demand and decided to take the FBI to court. According to the individual.

The F.B.I. was not requesting that Apple develop a so-called backdoor or other technological workaround to Apple's encryption that would have to be made available to the government. The official claimed that the government is actually interested in the data on the two phones. The FBI replied by successfully requesting a court order from Sheri Pym, a United States magistrate judge, requiring Apple to produce and release the required software. The order was issued under the All Writs Act of 1789 and was not a subpoena. The most recent iPhone models are compatible with these gadgets, and Cellebrite claims to be able to unlock any iPhone for law enforcement.

Learn more about software here-

https://brainly.com/question/985406

#SPJ4

you are setting up an active directory environment for a business that has three locations and 300 users. you want the users to be easily found in active directory based on the location and department they work in. what feature of active directory should you use?

Answers

The Active Directory (AD) database and services link users to the network resources they require to complete their tasks.

What is the importance of active directory?

Administrators and users can easily locate and use the information that Active Directory holds about network objects.

Based on a structured data store, Active Directory arranges directory data logically and hierarchically.

Therefore,  The database (or directory) holds crucial details about your environment, such as how many computers and users there are, as well as who has access to them.

Learn more active directory here:

https://brainly.com/question/14469917

#SPJ1

you have just configured the password policy and set the minimum password age to 10. what is the effect of this configuration?

Answers

You recently set the minimum password age to 10 while configuring the password policy. What impact will this setup have? For ten days, the user cannot change their password.

As long as the legitimate user is granted access, a compromised password can be used by the malicious user, posing a serious security risk if the Maximum password age policy setting is set to 0. This prevents users from ever being obliged to update their passwords. The amount of time (measured in days) that a password must be used before the user can change it is determined by the Minimum password age policy setting. You can choose a figure between 1 and 998 days, or by setting the number of days to 0, you can accept password changes right away.

Learn more about password here-

https://brainly.com/question/14580131

#SPJ4

Represent 7:30 am in Binary Code ? *
An alarm has been set for 07:30. Two 8-bit registers, C and D, are used to represent the
hours and minutes of the alarm time.
Show how 07:30 would be represented by these two registers.

Answers

Answer is 00000111:00011110 by using 8-bit binary numbers to represent decimal numbers.

C  :  D  =  00000111  : 00011110 = Hours  :  Minutes

22 + 21 + 20 = 4 + 2 + 1 = 7 (Hour)  :  

24 + 23 + 22 + 21 + 20 = 16 +5 + 4 +2 = 30 (Minutes)

Decimal to Binary Conversion -

When we convert a number from the decimal number system to the binary number system, we are using decimal to binary conversion. The total number of digits used in the number system determines the base of all number systems.

The binary number system, for example, has a base of two because it only uses two digits to represent a number. Similarly, the decimal number system has a base of ten because a number is represented by ten digits. Let us first understand the decimal and binary number systems before moving on to the decimal to binary conversion.

To know more about Decimal to binary conversion, visit: https://brainly.com/question/7978210

#SPJ13

the operating system performs the tasks that enable a computer to operate. it is comprised of system utilities and programs that: multiple select question. control the flow of multiprogramming. it is the main function in managing a database. ensure the integrity of the system. allocate computer resources to users and applications.

Answers

The operating system performs the tasks and comprised of system utilities and programs  of options A, C and D:

allocate computer resources to users and applications.control the flow of multiprogramming.ensure the integrity of the system.How vital is the operating system?

The most significant program that runs on a computer is the operating system. Memory, processes, and all other software and hardware are all under its control. Normally, a number of computer programs run concurrently, requiring access to the CPU, memory, and storage of the computer.

Therefore, Every piece of hardware and software on a computer is controlled by the operating system (OS). The most crucial system software is that which enables a computer to function. It does this by carrying out fundamental tasks like managing files, memory, etc.

Learn more about operating system fromhttps://brainly.com/question/22811693
#SPJ1

what do you call the process of creating and deleting indexes, minimizing the complexity of each view to only what is needed, and changing the table design?

Answers

The system software used to create and administer databases is referred to as a database management system (DBMS). End users can create, protect, read, update, and remove data in a database with the help of a DBMS.What is DBMS?Essentially, a database management system (or DBMS) is just a computerized data-keeping system. Users of the system are provided with the ability to carry out a variety of actions on such a system for either managing the database structure itself or manipulating the data in the database.A database schema specifies the logical restrictions, including table names, fields, data types, and the connections between these entities, that govern how data is arranged in a relational database.Open the table in Datasheet View and the form in Form View. On the Home tab's Records group, click New or New (blank) record, or press Ctrl+Plus Sign (+). Find the record marked with an asterisk in the record selector, and change it.

To learn more about DBMS refer to:

https://brainly.com/question/24027204

#SPJ4

Other Questions
Can anyone write the equation of this graph? The theater director recorded the number of seats occupied at past performances and the total revenue per performance. After plotting her results, the director noticed that the relationship between the two variables was fairly linear, so she used the data to calculate the following least squares regression equation for predicting the total revenue, in dollars, from the number of seats occupied. = -325 + 143 What is the residual of a performance with a revenue of $700 and 70 seats occupied ? Need help im so confusedplease and thank you Caractersticas accidentales de una comoutadora Elijah read his book from 4:30pm until 6:00pm. He read 1 chapter every 10 minutes.How many chapters total did Elijah read? number 1 write down the meaning of the words in capital letter prefixes in the following words 1.1 REcycle 1.2 POST-consumer Israel was engaged in battle at Rephidim by the Amalekites (descendants of Esau).O TrueO False one traditional explanation for why hominins develop bipedalism is that is helped them to see prey and avoid predators in the high savanna grass. what is one major problem with this idea? if you were directing high noon, and still had the visual goal zinnemann did, how could you employ shot choices, lenses, camera angles, and camera movement/stillness to achieve it? Huckleberry Finn controversial due to its portrayal of African Americans. True False show your work using standard athgorithm Warren has 40 coins (all nickels, dimes, and quarters) worth $4.05. He has 7 more nickels than dimes. How many quarters does Warren have? Please provide a detailed explanation and steps on how to do Rebecca wants to buy a new phone. She has already saved $110 and received a gift of $50 from her grandmother that she added to her savings. She plans to earn the rest by selling necklaces for $5 each. The phone she wants to purchase costs $485. Write an equation that represents how many necklaces Rebecca will need to sell in order to have enough money to get her phone. understand the different types of pricing objectives and how pricing affects each one:] a. survival b. profit c. return on investment d. market share e. cash flow f. status quo g. product quality here are the first 5 terms of an arithmetic sequence, 2,6,10,14,18... is 86 a term in this sequence, you must give a reason for your answer you are a group cash manager interested in the north american business market. what are the personalization options available to you in sap fiori? there are 2 correct answers to this question. 5x + y = 82x + y = 5 marguerite wants to sell her motorcycle, and ryan is looking for a used motorcycle to buy. ryan takes it for a test drive. marguerite knows that the clutch is going out on her motorcycle, the fuel filter is leaking, and the tires will need to be replaced soon. if she does not disclose this information to ryan and he cannot tell from his test drive, this is an example of an external cost. a public good. an external benefit. asymmetric information. What is the possible chemical formula formed between Hydrogen ion and Nitrateion?HNO3HNO3H3NO2HNO3 What is greater 1 1/2 or 1.456