________ assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.a. Confidentialityb. System Integrityc. Availabilityd. Data Integrity

Answers

Answer 1

Answer: b)System Integrity

Explanation: System integrity is the function that assure that with the change or alteration in the system , the functioning does not gets interrupted. It does not let the unauthorized access to happen which will effect the system function with insecurity .

Other options are incorrect because confidentiality is the maintaining the security , availability is the presence of the function or data and data integrity is no change in the data security while unauthorized access.Thus, the correct option is option(b).


Related Questions

What is the correct term for a set of established guidelines for actions (which may be designated by individuals, teams, functions, or capabilities) under various specified conditions?

Answers

Answer: Protocol

Explanation: Protocol is the standard that is used in the communication and electronic devices for the communication. Through the mean of the these guidelines the communication is done by the sending and receiving of the data.

This works for the both wired networking and wireless communication which functions under the certain conditions.Examples-TCP(Transmission control protocol), FTP(File transfer protocol) etc.

A blog is Group of answer choices a character in Lineage,
a popular on-line game.
a personal journal kept on the Web.
a person who assumes a false identity in a chat room.
a special symbol visible on displays that show Unicode characters.
the Web version of a "couch potato."

Answers

Answer: A personal journal kept on the Web.

Explanation:

 A blog is another type of journal or diary, however it is one that is advanced and on the Internet. These are frequently alluded to as online journals/diaries or individual sites. They may record our everyday encounters or even social discourse.

A blog is basically known as the online personal journal which contain the different views of the authors and also reflections on the similar topics that all kept on web.

Consider the following code snippet in Java 6 or later: String[] data = { "abc", "def", "ghi", "jkl" }; String[] data2 = Arrays.copyOf(data, data.length - 1); What does the last element of data2 contain?

Answers

Answer:

The last element of data2 is ghi.

Explanation:

In this code Arrays.copyOf() function copies the data of string data array into string data2 array by length-1 .Here string data array has 4 element in it but according to code  i.e  Arrays.copyOf(data, data.length - 1);  string data2  will contains only 3 element.

So the last element is "ghi"  ,second last element is "def" and first element is "abc:  in data2 array.

Get user input as a boolean and store it in the variable tallEnough. Also, get user input as a boolean and store it in the variable oldEnough. Then, use the two boolean variables to decide whether the user is able to ride the rollercoaster. The only time the user can ride the rollercoaster is if the responses to both answers is true. Use a logical operator to decide whether the user is eligible to ride. Print true or false depending on whether the user can or can’t ride the rollercoaster.

Answers

Answer:

I will code in JAVA.

import java.util.Scanner;

public class Main {

public static void main(String[] args) {

 

boolean tallEnough;

boolean oldEnough;

Scanner input = new Scanner(System.in);

tallEnough = input.nextBoolean(); //wait the input for tallEnough

oldEnough = input.nextBoolean(); //wait the input for OldEnough

   if(tallEnough && oldEnough){

   System.out.print(true);

   } else {

   System.out.print(false);

   }

}

}

Explanation:

First, to accept user inputs you have to import the class Scanner. Then declare both variables before allowing the user to set input values for both boolean variables.

In the if-else statement checks if both variables are true, then prints true. Another case prints always false.

Define a method printfeetinchshort, with int parameters numfeet and numinches, that prints using ' and " shorthand. Ex: printfeetinchshort(5, 8) prints:

Answers

Answer:

Following is printfeetinchshort method in Java:

 void printfeetinchshort (int numfeet, int numinches)

 {

   System.out.println (numfeet + "\'"+numinches+"\"");

 }

Explanation:

In the above method escape character (\) is used to print single inverted comma (') and double inverted comma (") using \' and \".

Following is the Java program to implement the above method:

public class Main

{

 public static void main (String[]args)

 {

   printfeetinchshort(5,8);

 }

 public static void printfeetinchshort (int numfeet, int numinches)

 {

   System.out.println (numfeet + "\'"+numinches+"\"");

 }

}

Following will be the output of above program:

5'8"

In the above program the method printfeetinchshort() is made as static so that it can called be by Main method directly and not through any object instantiation.

Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time?
a. presentation Layerb. transport Layerc. physical Layerd. session Layere. application Layer

Answers

Answer: B) Transport layer

Explanation:

 The transport layer is basically responsible for the flow control and detecting the error recovery between the system.

In the open system interconnection, the transport layer are responsible for transferring of data independently along with the congestion control, flow control, segmentation and error control.

And the presentation layer, session layer, physical layer and application layer in the OSI model are nor responsible for the flow control in the network system.

Therefore, option (B) is correct option.

You have been studying processors. Your instructor has asked you to help prepare a lecture for introductory students learning about processors. You explain that when payroll software determines which employees should receive overtime based on hours worked, it is a result of a(n) ______ operation.

Answers

Answer:

The correct answer is a comparison operation.

Explanation:

In computing, we can see that the processors have two main functions which are to do arithmetic operations and comparison operations. The comparison operations are those that have binary results such as true or false. In the exercise, the processor has to determine if one person receives overtime based on hours worked (True) or if that person does not receive it (false).

If you misspell a word in your Java program, it may be true thatI. the program will not compileII. the program may compile but not runIII. the program may compile and run, but still have a logic errorA. I and II onlyB. I and III onlyC. II and III onlyD. I, II and III

Answers

Answer:

The correct answer is D. I, II, and III.

Explanation:

Java is a strongly typed language, this means that it's case-sensitive and each variable needs to be defined. Furthermore, Java has a set of reserved words. If you misspell a word, depending on the error:

If you import a package and misspell the package reserved word, it won't compile. If you misspell the main function, it will compile but not run. If you misspell a function assigned for a variable, it may compile and run but when the program passes through the line of the code, it would throw a logic error.

Two routers, R1 and R2, connect using an Ethernet over MPLS service The service provides point-to-point service between these two routers only, as Layer 2 Ethernet service. Which of the following are most likely to be true about this WAN? (choose two)a) R1 will connect to a physical Ethernet link, with the other end of the cable connected to R2.b) R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at the WAN service provider point of presence.c) R1 will forward data link frames to R2 using an HDLC header/trailer.d) R1 will forward data link frames to R2 using an Ethernet header/trailer.

Answers

Answer: b) R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at the WAN service provider point of presence.

.d) R1 will forward data link frames to R2 using an Ethernet header/trailer.

Explanation:

Here we have to understand what is MLPS. MLPS is a protocol which identifies the shortest route for the transfer of messages between routers instead of the longest route.

Here we are given a WAN which is a wide area network. Using layer 2 Ethernet service the frames are transmitted across the routers within the WAN.

Option A is incorrect as as connecting the other end of the cable to the R2 would reduce the functionality of the WAN.  Option C is incorrect as HDLC header trailer has no effect.

Option B and D are correct as Ethernet header/ trailer has the same size every frame and to maintain the functionality of the WAN one end must be connected to point of presence(PoP).  

A technician is building a thick client workstation that would be used to run a database and wants to ensure the best protection against errors. What type of memory would be best suited for this?

Answers

Answer: ECC memory

Explanation:Error-correcting code(ECC) memory is used for the detection as well as correction of the internal storage data in the operating system. It is the memory code that cannot tolerated any type of the corruption in the data storage.

The ECC memory is usually found in the fields like financial computing, scientific etc.It is a reliable memory and provides high protection.Thus the technician should put the ECC memory in the workstation.

The function of ______ is to transfer control to a user command-line interpreter, which gives access to any program available on the system with the privileges of the attacked program.

Answers

Answer:

The answer to this question is Shell code.

Explanation:

It is the function of shell code(a code that starts a command shell) to transfer the control to user command-line interpreter,that gives access to any program that is present in the system the privileges of the program that is attacked.

Hence we conclude that the answer to this question is Shell code.

"Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a protocol that uses secure, ncrypted connection
A. 20
B. 22
C. 23
D. 80 "

Answers

Answer:

B.22

Explanation:

I know this because 22 is normally a port that hosts a protocol with an encrypted connection

A company has developed a business-critical system for its core automation process with a software vendor. Which of the following can provide access to the source code if the licensor declares bankruptcy?a. Software escrowb. Software code reviewc. Software change controld. Software configuration management

Answers

Answer:

d. Software Configuration Management

Explanation:

A company has developed a business-critical system for its core automation process with a software vendor. Therefore, the Software Configuration Management can provide access to the source code if the licensor declares bankruptcy.

You have been approached by the network administrator of the company whose office is adjacent to yours. He has advised you to move your wireless router. What would be the reason for such a request?

Answers

Final answer:

The network administrator may request moving the router to prevent interference with their own wireless network, which could affect network performance and security. The proximity of routers operating on similar frequencies is the main cause of this issue.

Explanation:

The network administrator from the adjacent office might ask you to move your wireless router because of potential interference between your Wi-Fi network and their networks or equipment. Wireless routers typically operate on certain frequencies (2.4 GHz or 5 GHz bands), which are part of Wi-Fi technology, standardized as IEEE 802.11 a,b,g,n. If both offices are using routers that operate on similar frequencies, this can lead to network interference, where the overlapping signals can cause a reduction in network performance for both parties.

Interference can affect devices' ability to connect to the Internet, reduce connection speeds, and even cause disconnections. This is akin to the way mobile phones are required to be switched off in certain environments, such as airplanes or hospitals, to avoid interference with essential communication or medical equipment. Additionally, the proximity of multiple wireless routers could lead to security concerns, such as the risk of eavesdropping on communications.

Therefore, moving the router could help to minimize these interference issues and improve network performance, security, and stability for both your own office and the adjacent company's network.

Data are made anonymous by Destroying all identifiers connected to the data. Requiring all members of the research team to sign confidentiality agreements. Reporting data in aggregate form in publications resulting from the research. Keeping the key linking names to responses in a secure location

Answers

Answer:

Destroying all identifiers connected to the data.

Explanation:

Identifiers are your virtual location when navigating, if you destroy your 'Virtual ID', nobody could identify you. Also, you could hide your identifiers, in this case, there's a small risk.

While building a high-end gaming system, you are attempting to install the EVGA GeForce GTX 1080 graphics card and discover there is not enough clearance above the motherboard for the card. What is your best solution?

a) Use a different case that allows for the height of the expansion card.
b) Use a riser card to install the card parallel to the motherboard.
c) Use an onboard component rather than the graphics card.
d) Use a conventional PCI graphics card that fits the motherboard and case.

Answers

Answer:

I will use a riser card to install the card parallel to the motherboard.

Explanation:

If you attempted to install a GPU like this and it stands tall, then this means that you do not have enough room for the card. Instead of purchasing a new case that will allow the GPU to seat comfortably, you can buy a riser card. A riser card seats at a right angular position and is built to extend a motherboard slot. I expect a motherboard that supports an EVGA GeForce GTX 1080 graphics card to support a riser card because not all boards support a riser card. Once it is installed, the card will rest on the motherboard and will rotate the GPU to seat parallel with the motherboard.

THE BEST Answer:

b) Use a riser card to install the card parallel to the motherboard.

Second Answer:

a) Use a different case that allows for the height of the expansion card.

B. Is the Easiest and best way!

What term is used to describe the process or mechanism of granting or denying use of a resource, typically applied to users or generic network traffic?

Answers

Answer: Access control

Explanation: Access control is the control unit that permits about the usage  of the computer environment and its resources.It acts as the security feature that helps in the granting permission or denying the permission in a operating system.

The accessing of the service or resource by the permitted user decreases the risk of the organizations, companies etc.There are three types of the access control named as  MAC(mandatory access control),DAC(discretionary access control ) and RBAC(role-based access control).

Today we solved a series of problems with a limited set of commands (only 4). Give at least one reason Why is it useful to learn how to solve and program solutions with a limited set of commands?

a. It’s easier this way

b. Humans can only learn a limited number of commands

c. There isn’t a command to do every little thing

d. It’s more efficient this way

e. No answer is correct

Answers

Answer:b)Humans can only learn a limited number of commands

Explanation: Programming problem are solved with various types of statement, commands, datatypes etc. In accordance with the human being , it is not easy for them to memorize complex and lengthy commands.

Due to numerous commands ,limited set of commands are used so that the user can be familiar with the command type and number of instruction .This will help them to learn the commands easily and find the solution for the programming problem.Thus, the correct option is option(b).

Answer:

e. No answer is correct.

Explanation:

When there are limited number of commands in this case we have only 4 it is useful to learn how to program solutions and solve the problem with a limited set of commands because in this way it is easier to learn how to solve and program solutions having limited set of commands.

Hence the answer to this question is option e among the given options.

Which of the following statements is true?A)Implicit data type conversion is performed when you mix values of different data types in an expression.B)Every data type can be implicitly converted to every other data type.C)Values are implicitly converted from the data type with higher precedence to the data type with lower precedence.D)You can convert a data type implicitly by using either the CAST or the CONVERT function

Answers

Answer:  A) Implicit data type conversion is performed when you mix values of different data types in an expression.

Explanation: Implicit data type conversion is the conversion done by mixing up of different types of data types which don't lose their actual significance. The originality remains same  while changing the datatype.It is also known as implicit type casting.

Other options are incorrect because implicit data type cannot be implemented on every data type,significance values don't get change while changing data type and implicit casting occur when difference in data types is present.Thus the correct option is option(A).

Implicit type casting means conversion of data types without losing its original meaning. This type of typecasting is essential when you want to change data types without changing the significance of the values stored inside the variable.

What is a type of machine-to-human communication?
A.
biofeedback
B.
Talking face to face
C.
Typing on a computer
D.
Your computer communicating with a server

*I will give brainliest to the first answer*

Answers

A. Biofeedback

Its where your body is read by a machine and you read the machine

Answer:

A. Biofeedback

Explanation:

(did this so other person could get brainliest)

What will be displayed if this algorithm is executed?

Set count to 0
REPEAT
call in the next student
ask the student their GPA
IF the GPA is greater than 3.2
Congratulate the student
UNTIL all students have been called
Display count

Answers

Answer:

The correct answer for the given question is 0.

Explanation:

In this algorithm initially the count variable is initialized by 0 after that next instruction is executed and user take the input for their GPA .After that check the condition if GPA>3.2 it print " Congratulate the student" and finally printing the value  count .it means the value of count is 0 because their are no increment in the value of  count.

Your supervisor has asked you to configure a server with a RAID utilizing disk striping with two sets of parity bits for additional fault tolerance, so that up to two hard disk failures can occur without data loss. What type of RAID is your supervisor describing?
a. RAID3
b. RAID1
c. RAID5
d. RAID6

Answers

Answer:

d. RAID 6

Explanation:

Given: Your supervisor has asked you to configure a server with a RAID utilizing disk striping with two sets of parity bits for additional fault tolerance, so that up to two hard disk failures can occur without data loss.

The requirement can be accomplished using RAID 6 configuration which stands for Redundant Array of Independent Disks - Level 6.It makes use of 2 parity disks to handle two potential failures.

Hello, may I please get some help with this assignment?

Make a small speech saying why MP4 player is the best amongst other similar formats. Cite the sources you used to make this argument. Think of this like a campaign ad or advertisement for your format.

You must also include a list of other formats you’d specifically like to target when comparing MP4 to other audio formats
List three key points you’d like to make about MP4 audio format explaining the benefits of the format.

Answers

MP4 is useful and better to use than other systems

Suppose that the code below is the body of some loop. Given variables x and y write some code that reads a value into the variables, respectively, then prints out the value of x divided by y. Use a continue statement to make sure that nothing is written to court when y is 0.

Answers

Answer:

I will code in JAVA.

import java.util.Scanner;

public class Main {

public static void main(String[] args) {

     float x;

     float y;

     float result;

     Scanner input = new Scanner(System.in);

     while(true){ //this is an infinite loop

       x = input.nextFloat(); //wait the input for x

       y = input.nextFloat(); //wait the input for y

       if(y == 0) {

         continue; //next iteration without print.

       } else{

         result = x/y;

         System.out.print(result); //print the result.

       }

     }

 }

}

Explanation:

To get the numbers, you need to import Scanner class, and use the method nextFloat() to admit floats and integers.

If y is 0 then, executes the continue statement, if not prints the division between x and y.

Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs.
Andrea advises Dean to remove unnecessary programs from his computer by using a(n) ____ utility.

Answers

Answer: Uninstall utility

Explanation:

From given case/scenario, we can state that Andrea advises Dean to delete unnecessary programs and application from his PC using an uninstall utility. An uninstaller also known as a de-installer, is referred to as a sort of utility software designed in order to remove software or section of it. It is known as opposite of installer. These are mostly useful when components are being downloaded in several directories.

When the computer begins to run a program
1.the program is moved from secondary storage to memory.
2.the program is moved from secondary storage to the network controller.
3.the program is moved from the CPU to memory.
4.the program is moved from the CPU to secondary storage.

Answers

Answer:

1.the program is moved from secondary storage to memory.

Explanation:

Secondary storage media generally have greater storage capacity than RAM (random access memory), for this reason the data and program are stored there.

but ram memories are much faster, for example, a solid state disk (SSD) with SATA III connection can have read and write speeds of approximately 500 MB/s, while a DDR III RAM can have speeds between 12 and 18 GB/S, that is, more than 20 times faster.

 So that the flow of data at the time of running a program is optimal, the data from the secondary storage unit is copied to the RAM and this ensures that the speed at which the programs run is at least 20 times faster, and our processes run better.

In computers, when the print command is executed, a cable carries this signal from the computer to the printer. In comparing a computer to a neuron, the cable that carries the signal between the computer and the printer would be equivalent to

a) axon
b) dendrites
c) cell body
d) terminal buttons

Answers

Answer:

a) axon

Explanation:

In computers, when the print command is executed, a cable carries this signal from the computer to the printer. In comparing a computer to a neuron, the cable that carries the signal between the computer and the printer would be equivalent to an axon which is used to communicate messages to external cells.

Dendrites is not relevant because it represents the termination components of axon.

The IT department sent out a memo stating that it will start delivering desktop computer interfaces through the IT data center via a web browser interface. What technology is the IT department using?
a. Public cloud computingb. Server clusteringc. Directory serverd. Virtual desktop infrastructure

Answers

Answer: Virtual desktop infrastructure

Explanation:

The virtual desktop infrastructure is the virtualization technology in which the host desktop OS (operating system)  is in the centralized server of the data center. The virtual desktop infrastructure is also known as server based computing as it include the variation in the computing model such as client - server model.

The example of the virtual desktop infrastructure is wallpapers, toolbars, window and folder is the stored in the server remotely.

All the other options does not involve with this technology so that is why option (D) is correct.

Declare and initialize the following variables: monthOfYear, initialized to the value 11 companyRevenue, initialized to the value 5666777 firstClassTicketPrice, initialized to the value 6000 totalPopulation, initialized to the value 1222333

Answers

Answer:

int monthOfYear=11;

long companyRevenue=5666777;

int firstClassTicketPrice=6000;

long totalPopulation=1222333;

Explanation:

Here we have declared four variable   monthOfYear ,  companyRevenue,   firstClassTicketPrice ,  totalPopulation as int ,long, int and long type .We have declared companyRevenue,totalPopulation as long type because it exceed the range of integer.

Following are the program in c language

#include <stdio.h> // header file

int main() // main function

{

int monthOfYear=11; // variable

long companyRevenue=5666777; //variable

int firstClassTicketPrice=6000;//variable

long totalPopulation=1222333;//variable

printf("%d\n%ld\n%d\n%ld",monthOfYear,companyRevenue,firstClassTicketPrice,totalPopulation); // display value

   return 0;

}

Output:

11

5666777

6000

1222333

Final answer:

In programming, variables are initialized by selecting appropriate data types and assigning values. The variables monthOfYear, companyRevenue, firstClassTicketPrice, and totalPopulation would be initialized with the data types int, double, and long, to correspond with their expected value ranges.

Explanation:

Variable Initialization in Programming

To initialize the given variables in programming, you would select the appropriate data types and assign the provided values. Here's how you can declare and initialize the variables:

int monthOfYear = 11; // Assuming months are integer values from 1 to 12

double companyRevenue = 5666777; // Revenue is usually a large number with the potential for decimal points, hence 'double'

double firstClassTicketPrice = 6000; // Similar to revenue, the price could potentially have decimals

long totalPopulation = 1222333; // Population can be a large number, therefore 'long' might be used for larger range

Note that the data types chosen (such as int, double, long) are based on the usual conventions and the expected ranges of the values. For example, 'int' is typically used for whole numbers without decimals, 'double' for numbers with a significant range and potential decimals, and 'long' for very large numbers.

Write a sequence of statements that finds the first comma in the string line, and assigns to the variable clause the portion of line up to, but not including the comma. You may assume that an int variable pos, as well as the variables line and clause, have already been declared.

Answers

Answer:

I will code in Javascript;

function findFirstComma() {

var pos;

var line = 'Thi,s is a t,est';

var clause;

pos = line.indexOf(','); //set pos in 3.

clause= line.slice(0,pos);  // saves in clause the value 'Thi'.

}

Explanation:

The slice(start, end) method extract a part of a string then returns a new string with the extracted part.  The end parameter indicates where to end the extraction(up to, but not including).

The includes(value) method determines if a string contains the characters on a specified string, if it doesn't match then returns -1.

Other Questions
A mechanics shop has a 16,500 N car sitting on a large car lift of 125 cm^2 piston. How much force is needed to be applied to the small piston of area 4.51 cm^2 to lift it? What is the circumference of a circle with a diameter of 3.4 cm?Use 3.14 for pi.Enter your answer as a decimal in the box. 38.4 mol of krypton is in a rigid box of volume 64 cm^3 and is initially at temperature 512.88C. The gas then undergoes isobaric heating to a temperature of 935.9C. (a) What is the final volume of the gas?(in cm^3 ) (b) It is then isothermally compressed to a volume 29.3cm^3; what is its final pressure?(in Pa ) HELPPPP!! In an experiment, temperature and the amount of NaCL dissolved in water were studied.Researchers changed the temperature of the water to see its effects in the amount of.They conducted two test, one changing the temperature and another without changing the temperature.The temperature change affect the amount of NaCL dissolved .In this experiment the dependent variable is?A. The sample without a temperature changeB. The number of testC. The amount of NaCI dissolved D. The number of researchers E. The temperature Which of the following would increase the government purchases component of U.S. GDP? A. The U.S. federal government pays $3 billion in pensions to government workers. B. The U.S. federal government pays $3 billion in interest on the national debt. C. The U.S. federal government pays $3 billion in salaries to soldiers in the military. D. The U.S. federal government pays $3 billion in interest to foreign holders of U.S. government bonds. Which of the following pieces of information could be deleted from a 15-second Public Service Announcement on drinking water safety? A. The city water supply is contaminated. B. Paul Lining has been named Director of Public Works. C. The "boil water" edict is in force until further notice. D. Water should be boiled before it is used or consumed. Molteni Motors Inc. recently reported $3 million of net income. Its EBIT was $6.75 million, and its tax rate was 40%. What was its interest expense? (Hint: Write out the headings for an income statement and then fill in the known values. Then divide $3 million net income by 1 T = 0.6 to find the pre-tax income. The difference between EBIT and taxable income must be the interest expense.) Round your answer to the nearest dollar. Enter your answer in dollars. For example, an answer of $1.2 million should be entered as 1,200,000. Darley and Latan observed that most university students failed to help a person having an epileptic seizure when they thought there were four other witnesses to the emergency. The students' failure to help is best explained in terms of: A)the ingroup bias. B)a failure to interpret the incident as an emergency. C)indifference and apathy. D)their feelings of limitedresponsibility. E)emergency preparedness Papa Roach Exterminators, Inc., has sales of $699,000, costs of $385,000, depreciation expense of $47,000, interest expense of $25,000, and a tax rate of 30 percent. If the firm paid out $80,000 in cash dividends. What is the addition to retained earnings? What is efficiency?................. What was the fifth state to ratify to the constitution in 1788 The eustachian tube connects the middle ear with the: a. trachea. b. nose. c. nasopharynx. d. oropharynx. Lily's car used 2 gallons of gas to drive 52 miles. At what rate does her car use gas in miles per gallon? Express your answer in simplest form.Question 7 options:A) -26 miles per gallonB) 104 miles per gallonC) 52 miles per gallonD) 26 miles per gallon A standard 1 kilogram weight is a cylinder 48.0 mm in height and 55.0 mm in diameter. What is the density of the material? S is the set of ordered pairs of integers and (x1, x2) R(y1, y2) means that x1= y1and x2 y2Demonstrate whether R exhibits the reflexive property or not.Demonstrate whether R exhibits the symmetric property or not.Demonstrate whether R exhibits the transitive property or not. Which services are provided by the United States government to all citizens? consumer goods, such as cars and televisions food and shelter highways and bridges vocational training and full-time jobs Today it is not known who will be chosen as a party's presidential candidate until after the national convention.Question 16 options:TrueFalse -7y+11y+9=-3 what does y equal Enter your answer in the provided box. The balanced equation for the combustion of ethanol (ethyl alcohol) is: C2H5OH() + 3O2(g) 2CO2(g) + 3H2O(g) How many g of CO2 will be produced by the combustion of 4 mol of ethanol? g CO2 An airplane descended 4,000 feet before landing. The integer that represents how many feet the airplane was above the ground before its descent is ?