Describe the attacks in wireless networks that are more serious com pared to wired network

Answers

Answer 1

Answer:

Both types of attacks can be devastating.

Explanation:

Attacks Wireless Networks are sometimes considered more serious because they can be attacked from remote locations. One of the more serious attacks would be against commercial airplanes. A wireless hack and system shutdown of a commercial aircraft can be catastrophic, and can all be done wireless. While a Wired Network attack can cause catastrophic events they need to be attacked from within the location of the network which is usually guarded by security personnel as well as system firewalls.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.


Related Questions

True / False
In the structure of a conventional processor, the computational engine is generally known as the arithmetic-logic unit.

Answers

Answer:

True

Explanation:

The arithmetic and logic unit (ALU) in a microprocessor is the digital electronic component which carries out arithmetic and logic operations on the provided operands. It is typically integrated as part of the microprocessor chip though standalone ICs are also available.

Some examples of the operations performed by ALU in common microprocessors include:

AddSubtractIncrementDecrementANDOR XOR

What is the command to display the user name with which youhave logged in?

Answers

Answer:

echo %username%

whoami

Explanation:

In windows the command used to display user name which you have logged in is echo %username%.Note that it is only for windows platform only .It works on all released windows platforms.

There is another command whoami it tells the domain name also along with the username.

You have to write all these commands on the command prompt.

When trying to identify the sorted column in a table, you would look for the column where

A. an arrow is displayed in the field name.
B. data is in alphabetical order.
C. only a few records appear.
D. data is presented from low to high.

Answers

Answer:

d

Explanation:

provides guidelines for planning a desktop database. You will learn how to decide what information you need, how to divide that information into the appropriate tables and columns, and how those tables relate to each other. You should read this article before you create your first desktop database.

suppose we have a dictionary called grades as shown below:

grades = {“John”: [87,90,86.8], “Mary”: [78, 81.5, 88.6], …}

The keys are names of students (assume that the names are unique) and the value associated with each is a list of three exam scores. Write a program that prints a report card in the following format:

John 87.93 B

Mary 82.70 B

Assume that an average of 90 and above is an “A”, 80 to 89.999 is a “B”, 70 to 79.9999 is a “C” and so on. Anything below 60 is an “F”

Answers

Answer:

import statistics as st # importing statistics package to calculate mean as st.

grades = {"John": [87,90,86.8], "Mary": [78, 81.5, 88.6],"Susan":[45,67,76]}

for key,value in grades.items():#iterating over the dictionary

   average_score=st.mean(value)#calculating the mean of every student

   gr="" empty string to store the grades

   if average_score>=90: # nested if else if and statements for the grades in gr

       gr="A"

   elif average_score>=80.0 and average_score<90.0:

       gr="B"

   elif average_score>=70.0 and average_score<80.0:

       gr="C"

   elif average_score>=60.0 and average_score<70.0:

       gr="D"

   else :

       gr="F"

       

   print(str(key)+" "+str(average_score)+" "+str(gr)) #printing grades of every student.

Output:-Mary 82.7 B

John 87.93333333333334 B

Susan 62.666666666666664 D

Explanation:

1.In this program we are iterating over the dictionary grades.

2.Storing and calculating the mean of the scores of every student us statistics package.

3.Storing the grade in string gr and updating the gr according to the mean score

4.After that printing the grade of the student with their name and mean score.

Draw an FA over {0, 1}which represent binaries of Integers only divisible by 3. Allleading 0’s are permissible. [10]

Answers

Answer:

As we need to design the FA for the numbers divisible by 3, so we have to take the states as the remainders when we divide the numbers by 3.

Any number when divided by 3, gives remainder either 0 or 1 or 2. And the number gives remainder 0 is divisible by 3.

Let’s take

state 0 for remainder 0. state 1 for remainder 1. state 2 for remainder 2.

So now lets count from 0:

Binary 0 = decimal 0 %3 = 0, so goes to state 0.

Binary 1 =decimal 1 %3 = 1, goes to state 1.

Binary 10 = decimal 2 %3 =2, goes to state 2.

Bianary 11 = decimal 3 %3 =0, goes to state 0.

Bianary 100 = decimal 4 %3 =1, goes to state 1.

Bianary 101 = decimal 5 %3 =2, goes to state 2.

And so on.  

So here the state 0 will be the start state and also the final state.

Explanation:

So the FA is {{0,1,2}, {0,1}, δ, 0, {0}}

where δ(0, 0) = 0

           δ(0, 1) = 1

           δ(1, 0) = 2

           δ(1, 1) = 0

           δ(2, 0) = 1

           δ(2, 1) = 2

2.Use loops to create a 4X6 matrix in which the value of each element is two times its row number minus three times its column number. For example, the value of element (2,5) is 2x2-3x5=-11.

Answers

Answer:

for(i=0; i<4; i++)

{

      for(j=0;j<6;j++)

      {

               A[ i ][ j ] = 2* i - 3*j;

      }

}

Explanation:

In this loop for each i = 0,1,2,3 we fill the the corresponding column values. and then move to next i value i.e. row.

A noted computer security expert has said that without integrity, no system can provide confidentiality.

a. Do you agree? Justify your answer

Answers

Answer: Yes, without the integrity factor there would be no possibility of confidentiality

Explanation: Integrity is the factor that determines that there has been no manipulation or unauthorized access being done int the data . It is a sort of assurance factor that helps us to know the data present is the actual correct data. So, if there is no integrity then confidentiality factor will be a waste . Confidentiality of data is maintained when there is chances of unauthorized access which can only be know id there is integrity present .

a. No we don't agree with the given statement.

Integrity without confidentiality:

The system can't provide integrity without confidentiality. Here confidentiality means it should be concerned with the assets. In the case when confidentiality should be comprised so here we permit non-authorized access to the resource which might result in the modification of the document. And, if this can be done so the motive of integrity should be lost.

Learn more about security here: https://brainly.com/question/12840405

what is daemontools pakage in qmail?

Answers

Answer: Daemon-tools package is a group of tools which are present for the observation of the UNIX  service in qmail. The services and saving of the error messages to logs are monitored by these tools. It helps in simplification of the management and makes the process easy.It has data or information of the errors which occur when setting up or execution of daemon-tools on a particular system.

Group Policy Objects enable a system administrator to manage multiple users and computers all at once by setting and enforcing key security policies at the __________ level. individual department Active Directory Forest, Domain, and Organizational Unit executive

Answers

Answer:

Group policy object can be applied on the OU level.

Explanation:

This whole question is ambiguous  to say the least. Group Policies can be applied the the OU (Lowest level - if you create the OU or group), the Domain and the AD Forest as long as you link the ou to the root of the AD Forest. In other words, if you wish to create a Group Policy, you also need to create an OU that you can lik it to. i.e, you want all managers to bypass the proxy settings, you create the OU, drop all the Managers in there and create the GP and apply it to the OU or group.

Final answer:

Group Policy Objects enable a system administrator to manage multiple users and computers all at once by setting and enforcing key security policies at the Active Directory Forest, Domain, and Organizational Unit level.

Explanation:

Group Policy Objects enable a system administrator to manage multiple users and computers all at once by setting and enforcing key security policies at the Active Directory Forest, Domain, and Organizational Unit level. Active Directory is a directory service provided by Microsoft that allows administrators to manage and organize their network resources, including user accounts and computer systems. Group Policy Objects (GPOs) are used to define and configure various settings and restrictions that apply to users or computers within a specific Active Directory container, such as a domain or organizational unit.

Write a C program to compute the roots of a quadratic equation . The roots can be calculated using the following formuls

X1=(-b+(b^2 - 4ac))/2a X2=(-b-(b^2-4ac))/2a



Write aprogram that is to prompt the user to enter the constants (a, b, c). Then it should display the roots based on the following rules:

Answers

Answer:

#include <stdio.h>

#include <math.h>

int main()

{

   float a,b,c;

  printf("Enter the value of constants (a,b,c): ");

  scanf("%f%f%f",&a,&b,&c);

  float x1 = (-b+sqrt(pow(b,2)-4*a*c))/2*a;

  float x2 = (-b-sqrt(pow(b,2)-4*a*c))/2*a;

  printf("The root are x1 = %f and x2 = %f",x1,x2);

}

Explanation:

First include the library stdio.h for input/output and math.h for using the pow(), sqrt() function which is used o find the power and square root values.

pow(2,3) means 3 is the power of 2.

sqrt(4) means square root of 4.

create the main function and declare the variables.

after that, use the formula and calculate the root and store in the variables.

Finally, print the result on the screen.

NOTE:  All variables is float but you can use the integer values as well.

What is the fastest way to locate a record for updating?

A. Review the data in Form view.
B. Use the Report view.
C. Review the data in Table view.
D. Use the search box.

Answers

Answer:

B. Use the Report view.

Explanation:

The fastest way to locate a record for updating is to use the report view.

Answer:

This is the correct answer!!! D. Use the search box.

Explanation:

What are the advantages and disadvantages of the various collision resolution strategies for hashes?

Answers

Linear probing

It does a linear search for an empty slot when a collision is identified

Advantages

Easy to implement

It always finds a location if there is one

Disadvantages

When clusters and keys fill most of the array after forming in adjacent slots of the table, the performance deteriorates

Double probing/hashing

The idea here is to make the offset to the next position probed depending on the key value. This is so it can be different for different keys.

Advantages

Good for double number generation

Smaller hash tables can be used.

Disadvantages

As the table fills up, the performance degrades.

Quadratic probing

It is used to resolve collisions in hash tables. It is an open addressing scheme in computer programming.

Advantage

It is more efficient for a closed hash table.

Disadvantage

Has secondary clustering. Two keys have same probe sequence when they hash to the same location.

Answer:

Vector: each vector position holds one

information. If the hashing function applied to a

set of elements determine the information I1,

I2, ..., In, so the vector V [1 ... n] is used to

represent the hash table.

! Vector + Chain List: Vector contains

pointers to lists that represent the

information.

Hashing Function

! The Hashing Function is responsible for generating a

index from a given key.

! Ideally, the function should provide unique indexes for the

set of possible input keys.

! Hashing function is extremely important,

because she is responsible for distributing the information through

Hash table.

Explanation:

Hope this helps :) -Mark Brainiest Please :)

If you're doing a relational comparison, which filter would be available?

A. Date
B. Text
C. Number
D. Currency

Answers

Answer:

C. Number

Explanation:

If you're doing a relational comparison, a number filter would be available.

Write an iterative C function that inputs a nonnegative integer n and returns the nth Fibonacci number. 2. Write a recursive C function that inputs a nonnegative integer n and returns the nth Fibonacci number. 3. Compare the number of operations and time taken to compute Fibonacci numbers recursively versus that needed to compute them iteratively. 4. Use the above functions to write a C program for solving each of the following computational problems. I. Find the exact value of f100, f500, and f1000, where fn is the nth Fibonacci number. What are times taken to find out the exact values

Answers

C bsfvxcbhhrcbjjdcvb

Write a function PrintShampooInstructions(), with int parameter numCycles, and void return type. If numCycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N: Lather and rinse." numCycles times, where N is the cycle number, followed by "Done.". End with a newline. Example output with input 2: 1: Lather and rinse. 2: Lather and rinse. Done. Hint: Declare and use a loop variable.

Answers

// Writing a C++ function

void PrintShampooInstructions(int numCycles){

if(numCycles < 1) // if  condition stands

cout<< "To few";

else if(numCycles >4)

cour<<"Too Many";

else{

// looping the variable for desired out put

for(int i=0;i<numCycles;i++)

cout<<i<<":"<<" Lather and rinse."<<endl;

}

}

Answer:

public static void printShampooInstructions(int numOfCycles){

    if(numOfCycles < 1){

       System.out.println("Too few.");

     }

     else if(numOfCycles > 4){

        System.out.println("Too many.");

     }

     else {

        for(int index = 0; index < numOfCycles; ++index){

        System.out.println((index + 1) + ": Lather and rinse.");

     }

     System.out.println("Done.");

    }

  }

Explanation:

In Java an abstract class cannot be sub-classed

?? True

?? False

Answers

Answer:

False

Explanation:

An abstract class is a class declared abstract — it may or may not include abstract techniques. It is not possible to instantiate abstract classes, but they can be sub-classed.

Abstract method declaration

             

         abstract void moveTo(double X, double Y);

Usually the subclass offers solutions for all of the abstract techniques in its parent class when an abstract class is sub-classed. If not, however, the subclass must be declared abstract as well.

Example

public abstract class GraphicObject {

  // declaring fields

  // declaring non-abstract methods

  abstract void draw();

}

When an object of one class is a data field within another class, they are related by ____.

a.
composition

b.
extension

c.
is-a

d.
scope

Answers

Answer:

a. composition

Explanation:

When an object of one class is a data field in another class, the two classes are related by composition. In particular the containing class is composed using the contained class. For example:

class container {

    contained  c;

    int a;

}

class contained {

    int b;

}

Here the container class is containing an instance of contained class creating a composition relation.

__________ Power is directed at helpingothers.

a. Socialized

b. Expert

c. Referent

d. Personalized

Answers

Answer:

A - Socialized

Explanation:

Individuals who use socialized power are motivated to have a positive influence on others and provide a helping hand. These leaders concern themselves with expanding their networks, cooperating with others and trying to working with subordinates rather than controlling them.

Create a static method called negToZero, which takes an integer array, and returns a new integer array in which all negative entries in the input array have been changed to zero. The non-negative entries should remain unchanged. Example: theArray:{0,4,-6,-5,3} ==> {0,4,0,0,3} public static int [ ] negToZero (int [ ] theArray) {

Answers

Answer:

public static int[] negToZero(int [] theArray){

        int[] newArray = new int[theArray.length];

        for(int i=0;i<theArray.length;i++){

           if(theArray[i]>=0){

               newArray[i]=theArray[i];

           }else{

              newArray[i]=0;

           }

        }

        return newArray;

    }

Explanation:

The function is a block of the statement which performs the special task.

To return the array from the function, you have to define the function with return type array.

like, int[] name(parameter){

}

Then declare the new array with the same size.

Take the for loop for traversing in the array and check the condition for positive numbers by using if-else statement, if the value is positive store in the new array as it is. Otherwise, store the zero in the new array with the same position.

This process repeated until the condition in the for loop is true.

and finally, return the array.

Which function grows faster: N log N or N1+ε/ log N, ε > 0?

Answers

Answer:

N logN grows faster.

Explanation:

In N1+∈/N logN  logN is the denominator. So this term is constantly getting divided by  logN while in N logN there is no term in the division and for N > 2 log N will be > 1. So N logN will gorw faster. Since ∈ is greater than 0 So the numerator will be greater than N but it will not grow as fast as N logN.

Final answer:

N[tex]^(1+ε)[/tex] / log N grows faster than N log N because exponential growth surpasses logarithmic growth as N increases.

Explanation:

The question asks which function grows faster: N log N or N1+ε / log N, where ε > 0. To determine this, we need to analyze the growth rate of both functions as N becomes very large. In general, any function that includes a term with N raised to a power (in this case N1+ε) will grow faster than a function that involves N multiplied by a logarithmic function (in this case N log N). The reason is that exponential growth (which includes polynomials) surpasses logarithmic growth as N increases. Therefore, N1+ε / log N grows faster than N log N for any ε > 0.

What is the function of a clock for a CPU?

Answers

Answer: Clock in CPU(central processing unit) is the indication device that describes about the processing of the instruction in a computer.

Explanation: Clock rate in the CPU gives the knowledge about the instruction processing in the computer is fast , slow or moderate.The higher rate of clock cycle , the better execution of instruction in the CPU. The rate or cycle of clock is measured in terms of megahertz(MHz) or   gigahertz(GHz). The range of the clock speed ranges from 3.5 GHz to GHz, which is considered as normal speed for the execution of instruction.  

What will be the value of “sumtotal” when this code is executed?
int n1 = 3, n2 = 6, n3 = 2, sumtotal = 4;

if (n1 ! = 4)

sumtotal -= n3;

else if (n3 <= 5)

sumtotal = ++n2;

else sumtotal += n1;

Answers

Answer:

2

Explanation:

if-else is the statement that is used for checking the condition and if the condition is True, then execute the statement otherwise not executed.

initially, the value of n1 = 3, n2 = 6, n3 = 2, sumtotal = 4.

after that, if statement checks for the condition.

3 != 4

condition is TRUE, then the statement sumtotal -= n3; will be executed.

write the statement in simple form:

sumtotal = sumtotal - n3;

so, sumtotal = 4-2 = 2.

after that, the program does not check the further and exit the if-else statement.

Therefore, the answer is 2.

You just purchased a new router from Cisco and now are in the process of installing it. Upon boot up the router enters the setup mode. You are prompted to enter the enable password and the enable secret password. What is the difference between the two passwords?

Answers

Answer:

1.Enable secret encrypts the password while enable does not

2.The enable password can be seen with a command while the enable secret password cannot

3.The enable secret password can still be cracked with the right tools

Explanation:

On Cisco devices, there are a number of ways that you can protect resources with the use of passwords. Two common ways to achieve this is via the enable password command and enable secret password command. The main difference between enable and enable secret is encryption. With enable, the password that you give is stored in a plain text format and is not encrypted. With enable secret password, the password is actually encrypted with MD5. In the simplest sense, enable secret is the more secure way.

With Cisco, it is possible to view the stored passwords as they are a part of the configuration file. When you view them, you will see the actual password that you need to enter with enable password. The same will also reveal the password made by enable secret. But, it will be in its encrypted form and cannot be entered as the password in its current state.

Although using enable secret is relatively safer than using enable password, it is not uncrackable. Actually, it is relatively easy to crack the encrypted password of enable secret by searching for tutorials and tools online. It’s just a matter of knowing what you are doing and having the right resources to execute it. So, for a capable person, both enable and enable secret cannot block access, but just add a small amount of delay.

There are cases where enable and enable secret are good enough in limiting access to your devices. But in cases where you really do not want to block access, it is best to use another command ‘service password-encryption’ as it provides better security. It still encrypts the password that you enter, but with a more complex algorithm that is virtually impossible to crack with tools and computing power that is commonly available nowadays.

Summary:

1.Enable secret encrypts the password while enable does not

2.The enable password can be seen with a command while the enable secret password cannot

3.The enable secret password can still be cracked with the right tools

The enable password on a Cisco router is less secure as it is stored in plain text, whereas the enable secret password is encrypted, offering better protection. The enable secret takes precedence if both are set, and it is important for network security to keep the router and security patches up-to-date.

When configuring a new Cisco router, you might be required to set both an enable password and an enable secret password. The main difference between the two lies in their level of security. The enable password is the older, less secure option, as it stores passwords in plain text in the router's configuration file, making it susceptible to anyone with access to the router's files. Conversely, the enable secret password is encrypted using MD5 hash by default, providing a higher level of security against potential attackers. It's important to note that if both passwords are set, the enable secret password will take precedence when trying to enter privileged EXEC mode.

Creating secure passwords and regularly updating them are critical practices for maintaining network security. In addition, ensure the router's firmware is up-to-date and all necessary security patches are applied. Remember that when entering passwords on Cisco devices, the characters will not be displayed on the screen, adding an extra layer of security.

When applying strict “Private access” level to a component. Which services should the designer provide in its class to allow the object to communicate with the outside world? What should be the access level of these services?

Answers

Answer:

public accessor methods

Explanation:

When applying strict “Private access” level to a component the designer should provide public accessor methods in its class to allow the object to communicate with the outside world. The access level of these services must be public so that they can be accessed by other classes and objects of the outside world.

Below is an example of such a class design in java :-

class MyClass {

private int num; //private class component

 

public int getNum(){ //public accessor method to allow the object to        communicate with the outside world

 return num;

}

}

How many base cases are in the functionabove?

a. 0

b. 1

c. 2

d. 3

int func2(int m, int n) {

if (n == 0)

return 0;

else

return m + func2(m, n-1);

}

Answers

Answer:

The answer is (b). 1.

Explanation:

In the code there is only 1 base case .

the base case is as following:-

if(n==0)

return 0;

this is the base case.

Base case is the most important statement in the function that uses recursion because without base case the recursion calls will keep on going and we will get a run time error.

Please conduct some research and find an article on Security Threats and please provide link of the article.

Answers

Answer:

There are Security Threats happening every other day in the world. Some are minor while others can catastrophic.

Explanation:

There are also many types of Security Threats, Breaches, and Hacks in the world of IT. Each with their own Security Measures. Below are two links about this topic. The first link is an article about 5 of the worst corporate Security Breaches/Hacks to have taken place. While the second link is an article about the Top 10 Network Security Threats.

https://abcnews.go.com/Technology/marriotts-data-breach-large-largest-worst-corporate-hacks/story?id=59520391

https://securitytrails.com/blog/top-10-common-network-security-threats-explained

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

Which ofthe following is not a guided medium?

1 TwistedPair

2 Fiber OpticCable

3 CoaxialCable

4Atmosphere

Answers

Answer: 4. Atmosphere.

Explanation:

All the other 3 options Twisted pair, Fiber Optic Cable,Coaxial Cable comes under guided media also known as bounded media.While Atmosphere doesn't come under this category.It is an unbounded media.The signal is not bounded in atmosphere while in other 3 options the signal is being transmitted through a wire.

Name and discuss theprogramming languages suitable for the following fields:
i) Science and Engineering field
ii) Education
iii) InformationSystem
iv) System andNetworks

Answers

Answer:

For Science and Engineering Field :- FORTRAN.

Eduction purpose:- GWBASIC .

Information System :- COBOL

System and Network :- C, C++

Explanation:

FORTAN (formula translation) is best fit for the Science and Engineering Field.

GWBASIC is a basic programming language developed by Microsoft is best fit for educational purpose.

COBOL(Common Business Oriented Language) is best fit for the Information System

C and C++ are the best languages for Networking purposes.

There are a variety of common user interfaces. How would you decide which interface to use and on what should this decision be based?

Answers

Answer: There are many different types of user interfaces. To decide on the user interface depends entirely on the requirement of the client.

Explanation:

There are different types of interfaces such as command line user interface, graphical user interface, menu based, form based. Therefore to choose among them it depend on the requirement specified by a client. Mostly nowadays GUI is used. to maintain records form based is preferred. For system software CUI is better due to decrease its pressure on the processor. Networking is also both GUI and CUI. So it depend mainly on the type of application developed , client requirements, power consumption based on its dependence on processor power.

Is bit stuffing necessary in the control or address field in theHDLC protocol? why?

Answers

Answer:

Many network and communication protocols require bit stuffing for the following purposes: to avoid the interpretation of data as control information. For example, with six consecutive 1 bits, X.25 uses the bit stuffing,signal the beginning and end of a frame.

High-level Data link control (HDLC) is a bit-oriented protocol for point-to-point and multi-point communication.P/F bits are present in HDLC control field.

So,Yes bit stuffing is necessary in control field.

Other Questions
Find the area and the circumference of a circle with radius 3 m. Use the value 3.14 for , and do not round your answers. Be sure to include the correct units in your answers. What is a key problem with counties in Texas? Many of them are too small and underpopulated to function well. County laws were made in the twentieth century, making them too old-fashioned. The lack of diversity when it comes to counties. Too often the county seats cannot be reached in a days drive. one line segment is 5 cm more than four times the length of another the difference in their lengths is 35cm how long are they PLEASE I NEED IT TITE NOW HURRY PLEASE!! 24 Points!!Read the excerpts from Does My Head Look Big in This? and Persepolis.Excerpt from Does My Head Look Big in This?:My best friends, Leila Okulgen and Yasmeen Khan, moved on to a public high school close to Coburg, where they live. I begged my parents to let me go with them but Mom and Dad insisted that I go to a private school. I tried everything. At first I sucked up to them big time, making them coffee after dinner, offering to set the table before Mom had a chance to ask me, letting them watch PBS documentaries when I wanted to watch Big Brother. That didnt work. So I turned political, ranting about them perpetuating the snobby bourgeoisie power trip of our educational system which forges aristocratic divisions between social classes (I got that from a PBS documentary). Talk about having no compassion or social conscience. They just laughed at me and gave me a pile of literature about the school.Excerpt from Persepolis:Which statement is true about the narrators different perspectives?A) Amal is worried about how the political situation will affect her education, while Marjane is concerned with helping people who are suffering.B) Amal is concerned about the suffering of people around her, while Marjane is concerned only with her own suffering.C) Amal and Marjane are both dedicated to learning about the political landscape and using their knowledge to help others.D) Amal and Marjane are both interested in taking what they have learned about politics and social class and applying it to their own situation. How is an interpreter different from a compiler?a: An interpreter translates and executes code line by line, while a compiler translates all code at once so that it is ready to be executed at any time.b: An interpreter translates all code at once so that it is ready to be executed at any time, while a compiler translates and executes code line by line.c: An interpreter translates programming code into binary language, while a compiler does not.d: An interpreter translates binary language into programming language, while a compiler translates programming language into binary language. For a sequence an=3/n(n+1) what is the value of a 10 - A ship's total weight is equal to the weight of the water it displaces. If you want to calculate theship's weight, you must first knowa. the volume of water in the lake or ocean in which the ship is floating.b. the volume of the entire ship.c. the volume of the part of the ship that lies below the water's surface.d. All of the above The procedure for making homemade lemonade is quite easy. First, combine one cup of sugar with one cup of water. To make a simple syrup, heat the mixture until the sugar has completely dissolved. Next, juice eight lemons. Then, combine the simple syrup, the lemon juice, and four cups of cold water in a pitcher. Enjoy your lemonade! Which words in the passage are signal words? Check all that apply. procedure First simple mixture Next ThenAnswers: Procedure, First, Next, Then Tristan records the number of customers who visit the store each hour on a Saturday. His data representing the first seven hours are 15, 23, 12, 28, 20, 18, and 23. How many customers visited the store during the eighth hour if the median number of customers per hour did not change?Show all your work and explain how you arrived at your answer. A vertical spring (ignore its mass), whose spring constant is 594-N/m, is attached to a table and is compressed down by 0.196-m. What upward speed (in m/s) can it give to a 0.477-kg ball when released? Junction between a motor neuron and a skeletal muscle fiber 1) sarcoplasmic reticulum 2) junction 3) motor end plate 4) axon terminal someone please help Please select the correct definition for the given word. Black Shirts Nathaniel writes the general form of the equation gm = cm + rg for when the equation is solved for m. He uses the general form to solve the equation 3m = 4m 15 for m. Which expression shows what Nathaniel will actually evaluate? 4 + 15 3 4 15 + 3 15 Martas parents want her to become a doctor, but she would like to be an artist. Which approach to personality would suggest that Martas personal growth is associated with following her dream of becoming an artist? Aluminum reacts with chlorine gas to form aluminum chloride via the following reaction: 2Al(s)+3Cl2(g)2AlCl3(s) What is the maximum mass of aluminum chloride that can be formed when reacting 15.0 g of aluminum with 20.0 g of chlorine? Express your answer to three significant figures and include the appropriate units. The problem of consciousness is the main challenge against...none of the abovephysicalism.dualism.idealism. You are off duty at a popular local establishment in a relatively prosperous and secure neighborhood, but notice several things that bother you. First, this is the only building on the block with bars on the windows. Second, you notice that female staff are being transported to and from work by managers who appear to be monitoring them closely. Third, these women rarely converse with customers and seem nervous, looking around for their managers whenever interacting with customers. You get the strong impression they are being employed under coercive circumstances. What should you do? Evaluate the line integral, where C is the given curve. C (x + yz) dx + 2x dy + xyz dz, C consists of line segments (1, 0, 1) to (2, 4, 1) and from (2, 4, 1) to (2, 6, 4) At a carnival, you can try to ring a bell by striking a target with a 8.91-kg hammer. In response, a 0.411-kg metal piece is sent upward toward the bell, which is 3.88 m above. Suppose that 21.9 percent of the hammer's kinetic energy is used to do the work of sending the metal piece upward. How fast must the hammer be moving when it strikes the target so that the bell just barely rings?