What term is used to describe the process or mechanism of granting or denying use of a resource, typically applied to users or generic network traffic?

Answers

Answer 1

Answer: Access control

Explanation: Access control is the control unit that permits about the usage  of the computer environment and its resources.It acts as the security feature that helps in the granting permission or denying the permission in a operating system.

The accessing of the service or resource by the permitted user decreases the risk of the organizations, companies etc.There are three types of the access control named as  MAC(mandatory access control),DAC(discretionary access control ) and RBAC(role-based access control).


Related Questions

In Python Calculate the BMI of a person using the formula BMI = ( Weight in Pounds / ( ( Height in inches ) x ( Height in inches ) ) ) x 703 and assign the value to the variable bmi. Assume the value of the weight in pounds has already been assigned to the variable w and the value of the height in inches has been assigned to the variable h. Take care to use floating-point division.

Answers

Answer:

weight_pounds=float(input("Enter the weight in pounds:\n"))#taking input of weight.

height_inches=float(input("Enter the height in inches:\n"))#taking input of thye height.

bmi=(weight_pounds/(height_inches**2))*703#calculating the bmi.

print('The body mass index is '+str(bmi))#printing the result.

Ouput:-

Enter the weight in pounds:

207.8

Enter the height in inches :

72

The body mass index is 28.163395061728398

Explanation:

The above written program is in python.First I have taken input from the user of the weight in pounds then taking input of the height in inches.Then calculating the bmi and storing it in the variable bmi.Then printing the bmi in the end.

Final answer:

To calculate the Body Mass Index (BMI) in Python, the formula (w / (h ** 2)) * 703 is used, where 'w' represents weight in pounds and 'h' represents height in inches, ensuring the use of floating-point division for precise calculation.

Explanation:

The question you've posed relates to calculating the Body Mass Index (BMI) using Python programming. To calculate BMI using the given formula, you first ensure that the division is floating-point to accurately reflect the BMI calculation. The given formula is BMI = ( Weight in Pounds / ( ( Height in inches ) x ( Height in inches ) ) ) x 703. Given that the weight in pounds is stored in the variable w, and the height in inches is stored in the variable h, the Python code snippet to calculate the BMI would look like this:

bmi = (w / (h ** 2)) * 703

This code snippet assumes that both w and h have already been assigned their respective values. It calculates the BMI by dividing the weight by the square of the height (using floating-point division), and then multiplying the result by 703 to convert it according to the provided formula.

What is the function of the kernel of an operating system? It is an application that allows the initial configuration of a Cisco device. It provides a user interface that allows users to request a specific task. The kernel provisions hardware resources to meet software requirements. The kernel links the hardware drivers with the underlying electronics of a computer. Navigation Bar

Answers

Final answer:

The kernel of an operating system manages resources and facilitates communication between hardware and software, provisioning hardware resources, and handling drivers for the underlying electronics.

Explanation:

The function of the kernel in an operating system is not to provide a user interface or to be an application for device configuration, but rather to serve as the core component of the operating system. Its primary role is to manage the system's resources and to facilitate communication between hardware and software. The kernel is responsible for provisioning hardware resources to meet software requirements by performing tasks such as memory management, process scheduling, and handling input/output operations.

In this context, the kernel acts as a bridge, making sure that various hardware components and the software applications that need to use them can work together efficiently. This includes managing hardware drivers which are the software components that know how to communicate with the underlying electronics of the computer. Moreover, many kernel operations require high levels of privilege on the system because they interact closely with the hardware.

Suppose Host A sends Host B a TCP segment encapsulated in an IP datagram. When Host B receives the datagram, how does the network layer in Host B know it should pass the segment (that is, the payload of the datagram) to TCP rather than to UDP or to something else?

Answers

Answer: Looking into IP header, for a specific field, that identifies TCP as the transport protocol to be used.

Explanation:

In the IP Header, there is a field (of 8 bits wide) , called Protocol in the IPv4 version, and Next header in IPv6, that contains a hexadecimal number that identifies the transport protocol to be used.

For instance, if the segment should be passed to TCP, the Protocol Field must be filled with  0x06 = 00000110.

Final answer:

Host B's network layer checks the Protocol field in the IP header to determine which transport layer protocol (TCP or UDP) should receive the datagram. For TCP, the Protocol field contains the number 6, guiding the network layer to forward the payload to TCP.

Explanation:

When Host B receives an IP datagram, the network layer identifies which transport layer protocol should receive the payload by examining the Protocol field in the IP header. This field, also known as the Next Header field in IPv6, contains a number that represents the transport layer protocol used for the segment or datagram. In the case of TCP, this number is 6. Conversely, if the payload were to be passed to UDP, the number would be 17. The network layer uses this number to correctly forward the payload to the designated protocol, ensuring that the TCP segment is passed to the TCP layer and not to UDP or any other protocol.

A network administrator is using packet tracer to mock up a network that includes iot devices. What can the administrator do from the physical tab of any iot device?

Answers

Answer:

give some instructions for iot device

Explanation:

on how to go about something that you would be able to control physically

What is the first step of inventory management?
Interview users.
Back up network data.
List an administrative account's username and password for each device on a network.
List all components on the network.

Answers

Answer:

List all components on the network.

Explanation:

Inventory Management: It involves supervising inventory and stock items.It is a part of Supply chain management.It supervises the flow of goods from the manufacture to the warehouse.

The first step in Inventory management is to List all of the components on the network.Then after that other things are done.

Sam has installed a new CPU in a client’s computer, but nothing happens when he pushes the power button on the case. The LED on the motherboard is lit up, so he knows the system has power. What could the problem be?a) She forgot to disconnect the CPU fan
b) She forgot to apply thermal paste between the CPU and the heat-sink and fan assembly
c) She used an AMD CPU in an Intel motherboard
d) She used an Intel CPU in an AMD motherboard

Answers

The answer would be b) She forgot your apply thermal paste between the CPU and the heat-sink and fan assembly

The problem is b) She forgot to apply thermal paste between the CPU and the heat-sink and fan assembly

What could the problem be?

Thermal paste is important  to make sure the CPU and heat sink can transfer heat correctly. If the CPU doesn't have thermal paste, it can get too hot and make the computer stop working properly, even if it has power.

The LED on the motherboard shows that the power supply is working, but the problem is probably because the system is getting too hot and shutting down to protect itself.

Read more about CPU  here:

https://brainly.com/question/474553

#SPJ2

A(n) ___________ is an organization that delivers communications services over a typically large geographic area and provides, maintains, and manages network equipment and networks.
A) Application service provider
B) Content provider
C) Network provider
D) Application provider

Answers

Answer:

C) Network provider

Explanation:

According to my research on information technology, I can say that based on the information provided within the question the term being described is called a Network Provider. This is a business or organization that sells bandwidth or network access (communication services) by providing direct access to internet service providers and usually access to its network access points. Like mentioned in the question they cover a large geographical area and maintain all the network equipment running efficiently.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

Answer:

C) Network provider

Explanation:

A(n) Network provider is an organization that delivers communications services over a typically large geographic area and provides, maintains, and manages network equipment and networks.

A new company will have 40 workstations in one building sharing a single network. All users must be able to share ¬les and printers with each other. Access to shared information must be secure and simple to administer. The best technology for this system is ___________________.a. Workgroupsb. Windows Peer-to-Peer Networkingc. People to Peopled. Domain Networking

Answers

Answer:

Domain Networking.

Explanation:

A domain in networking refers to any group of workstation,users,printers devices ,database servers and computers which share different type of data via resources of network.

Hence domain networking will be the best option for the company having 40 workstation in a single building sharing a single network.

At the beginning of Section 5.2, it is stated that multiprogramming and multiprocessing present the same problems, with respect to concurrency. This is true as far as it goes. However, cite two differences in terms of concurrency between multiprogramming and multiprocessing.

Answers

Answer:

By definition, multiprocessing refers to the processing of multiple processes at the same time by multiple CPUs.

By definition, multiprogramming keeps programs in main memory at the same time and execute them concurrently utilizing a single CPU doing a context switch.

The first difference is that multiprocessing uses multiple CPUs and multiprogramming to utilize context switch to do concurrency in one CPU. Another difference is that multiprocessing is more expensive but more efficient than multiprogramming due that it allows parallel processing.

A user has been given Full Control permission to a shared folder. The user has been given Modify permission at the NTFS level to that folder and its contents. What is that user’s effective permissions to that folder when they access it through the shared folder from another computer?

Answers

Answer:

Full control

Explanation:

Full control permission enables users to access, compose, alter, and  remove documents and sub-folders.

Additionally, for all documents and  sub-directories, users can alter permissions settings.

Users are able to modify permissions and take file possession.

The clear emergence of a leader and the development of group norms and cohesiveness are the key indicators of the ________ stage of group development. A. norming B. performing C. forming D. storming

Answers

Answer: A)Norming

Explanation: Norming is the behavioral factor shown by the people in which they take effort to the solve a particular issues and difference for the maintenance of harmony and healthy environment. This is a level of the group development where the main aim is creating bond and improving norms in a group.

Other options are incorrect because performing is doing task to achieve goal,forming is producing of well and polite environment is the level where the members push their boundaries and fail in development of group.Thus the correct option is option(A).

What series of println statements would produce the following output? This is a test of your knowledge of "quotes" used in 'string literals.' You're bound to "get it right" if you read the section on ''quotes.''

Answers

Answer: Here we will show how to generate the answers based on java language. We will use System.out.println().

Explanation:

The System.out.println statement is used in java to print statements.

The following lines show how to generate those statements. The statements are enclosed within double quotes.

System.out.println("This is a test of your");

System.out.println("knowledge of \"quotes\" used");

System.out.println("in 'string literals.'");

System.out.println("You're bound to \"get it right\"");

System.out.println("if you read the section on");

System.out.print("''quotes.''");

Which of the following are considered transactions in an information system?
1) money deposited in a bank account
2) student recording her answer to a question in an online test
3) customer adding an item to the online shopping cart

Select one:
a) 1 and 3 only
b) 1 only
c) All of them
d) None of them

Answers

Answer: (C) All of them.

Explanation:

 All the given options are example of the transaction in the information system.

As, the money deposited in the bank account is the process that take place computerized for transaction purpose. Now a days we can easily done transaction through wire transfer at anywhere and anytime by using the information system technology.  

Students can easily study online and also record their answers in the online test by using the information system technology.  

Customers can also doing shopping online by adding various products and items in the online shopping cart by using various e-commerce websites like amazon, flip-cart etc.  

Your company runs a commercial website that enables your business partners to purchase products and manage their accounts. You want to increase the site's security by issuing certificates to business partners to augment logon security and protect data transmissions with encryption. What should you install?

Answers

Answer: Online standalone CA

Explanation: Standalone CA is the utilized for the extranet or external services .It does not persist active directory and does not need to be domain member either. Because of absence of domain there is no need of domain controller. Due to less layering ,standalone CA becomes more reliable.

The security level on the standalone CA is maintained due to the fact that their is no requirement of domain.The hacker or attacker can only attack the CA panel and cannot access data present on domain.Thus, installation of the online standalone CA should be done as it protect the site.

CODE EXAMPLE 3-1 SELECT vendorName, invoiceNumber, invoiceDate, invoiceTotal FROM vendors INNER JOIN invoices ON vendors .vendorID = invoices.vendorID WHERE invoiceTotal >= 500 ORDER BY vendorName DESC How many columns will the result set have?

Answers

Answer:

The correct answer for the given question is 4

Explanation:

In the given code it select the vendorName, invoiceNumber, invoiceDate, invoiceTotal from vendors ,invoices table. when required condition is fullfill i.e vendors .vendorID = invoices.vendorID and invoiceTotal >= 500 .

So their are 4 column in the result set i.e vendorName, invoiceNumber, invoiceDate, invoiceTotal .

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connected. Which of the following commands will confirm your suspicions?A. net useB. ipconfigC. tracertD. nslookup

Answers

Answer: (A) Net use

Explanation:

 The "Net Use" command is basically used for confirmation that whether the user currently connecting with the shred folder or not connect.

The net use direction is a Command Prompt order that is utilized to interface with, expel, and design associations with shared assets, as mapped drives and system printers. The net use direction is one of many net directions like net send, net time, net client, net view.

On the other hand, all the other options are not used to check the device connection. Therefore, Option (A) is correct.

What type of data is not defined and does not follow a specified format and is typically free-form text such as emails, Twitter tweets, and text messages?

Answers

Answer: Unstructured data

Explanation:

 The unstructured data are not properly defined with the specific format and it is also typically does not have a pre-defined structure and free from all the text format like text messages, twitter tweets etc.

Unstructured data does not contain any type of specific data format and it also include the text and some multimedia content. like audios ,images and text messages. The unstructured data are most written without any structure and also using short forms language to make the data short and precise.

To get the most accurate results on the security posture of a system, which of the following actions should the security analyst do prior to scanning?

A) Log all users out of the system
B) Patch the scanner
C) Reboot the target host
D) Update the plugins

Answers

Answer:

B) Patch the scanner.

Explanation:

To get the most accurate results in the security posture of  a system the security analyst should first patch the scanner before scanning.

Patch is the set of changes the program or the data to update,improve or fix it.

In our case we are going to use a scanner.

Hence the answer to this question is option B.

Assume that name is a variable of type String that has been assigned a value. Write an expression whose value is the first character of the value of name.

Answers

Answer:

name.charAt(0);

Explanation:

Given: 'name' is a variable of type String that has been assigned a value.

To determine: an expression whose value is the first character of the value of name.

Let us assume nae is assigned the value "test". So our expression should return the first character , that is 't'.

In order to do this, we can use the charAt method of String object.

String name="test";

char c = name.charAt(0);

Here 0 corresponds to the index of the character we are interested in.

How many output values are indicated in the following requirement?

REQUIREMENT: Write a program that asks the user for the current temperature and wind speed. The program must calculate the wind chill temperature, and display a chart showing the temperature, wind speed, and wind chill.

a) 0
b) 1
c) 2
d) 3

Answers

Answer:

Hi!

The correct answer is d) 3.

Explanation:

The program asks for input:

current temperature.wind speed.

With these values, the program will do some computations to calculate the wind chill temperature and show a chart with:

temperature.wind speed.wind chill.

After trying multiple times, a coworker is not able to fit a motherboard in a computer case, and is having difficulty aligning screw holes in the motherboard to standoffs on the bottom of the case. Which is most likely the source of the problem?

Answers

The most likely source of the problem is the form factors of both the case and the motherboard. They do not match. The type of motherboard describes its general shape and the kind of case it can use. For instance, you cannot have a full ATX motherboard fit inside a baby AT case. These two variants differ in width and will most likely cause overlap while installing. Sometimes, some system cases are not drilled to support all the mounting holes on various motherboard factors. This also causes significant issues while installing

As Kaydence reads a chapter in her anthropology text, she draws a network diagramming the relationships among the concepts described in the book. In this example, Kaydence is BEST described as capitalizing on ______________ encoding.

Answers

Answer:

visual encoding

Explanation:

According to my research on the three types of encoding methods, I can say that based on the information provided within the question Kaydence is best described as capitalizing on visual encoding. Which is the act of associating a certain something with a picture in order to store it into memory, as opposed of associating it with sound or words. In this situation Kaydence is associating it with a networking diagram she drew.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You are replacing a processor on an older motherboard and see that the board has the LGA1155 socket. You have three processors on hand: Intel Core i3-2100, Intel Core i5-8400, and Intel Core i5-6500. Which of these three processors will most likely fit the board? Why?

Answers

Answer:

Core i3-2100

Explanation:

The LGA1155 socket is used in CPUs based on Sandy Bridge 2nd generation and Ivy Bridge 3rd generation microarchitectures. It was introduced in 2011 along with 2nd generation CPUs. It was succeeded by LGA 1150, and the LGA 1156 was its predecessor. The LGA1155 have been out of production for a long while now. Since the LGA1155 is used in 2nd and 3rd generation CPUs, it is safe to say that the core i3-2100 is the only one 2nd generation CPU from the choices given above that supports the computer. The others belong to the 8th and 6th generation respectively.

You have just purchased a server with Windows Server 2016 Datacenter Edition installed. The server has 4 GB RAM, a 200 GB hard disk, and an Intel 1.6 GHz Xeon processor with Intel-VT. You plan to install the Hyper-V server role on this server and run two Windows Server 2016 VMs, each with a 2 GB RAM allocation. You have discovered that this server does not work for this purpose. What should you do?
a.Install more RAM.b.Install a bigger hard disk.c.Install Standard Edition.d.Upgrade the processor.

Answers

Answer:

a. Install more RAM

Explanation:

According to my research on information technology, I can say that based on the information provided within the question this server will not work for you purpose unless you install more RAM. This is because Hyper-V server's have a minimum requirement of 4gb, therefore if you want to run 2 servers you can divide all the resources you have since they are enough but not the RAM since you only have the bare minimum for one server. You need to add atleast 4 gb more of RAM.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

Which of the following involves making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources you have

a) Abstract reasoning
b) Systems thinking
c) Collaboration
d) Ability to experiment

Answers

Answer:

b) Systems thinking

Explanation:

When answering multimple choices questions, it is important to rule out options which simply doest make sense to be the right answer. Let's discard the c) (collaboration) because the question never states anything related to teamwork, not even a small suggestion about cooperation. option d)  looks good but it is important to keep in mind that experemintations does not always consider the steps described on the questions. Experimentation can be performed without rigorous reasoned analysis, on the other hand, abstract reasoning and systems thinking do involve reasoned analysis to envision possible solutions.  Why choosing b) and not a) then? This is because abstract reasoning, as the same concept states, it i focused on analysis and interpretations of problems and other  cases like understanding the behaviour of natural phenomena for example, while it is not necesaryly linked to implmenting solutions based on a certain set of resources, while, on the other hand, systems thiking does take them into account. Systems thinking is the complete process of  evaluation, proposition of solutions and execution from the idea to reality in a sensible way.  

Assume that the population of Mexico is 114 million and that the population increases 1.01 percent annually. Assume that the population of the United States is 312 million and that the population is reduced 0.15 percent annually. Write an application that displays the populations for the two countries every year until the population of Mexico excceds that of the United States, and display the number of years it took. Save file as Population.java.***NOTE**** This is my first class of java the program that I have to write has to be of what we have learned in the last 6 chapters it cannot have stuff that is way more advanced than the first 6 chapters.

Answers

Answer:

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

   double mexico = 114;

   double usa = 312;

   double mexicoRate = .0101;

   double usaRate = .0015;

// calculate population after every year until mexico population exceed the usa populationn

   while (usa>mexico)

   {

// print the population

       cout<<"Mexico's population ::"<<mexico<<" million."<<endl;

       cout<<"USA's population ::"<<usa<<" million."<<endl;

// update the population

       mexico+=mexico*mexicoRate;

       usa-=usa*usaRate;

   }

return 0;

}

Explanation:

Declare and initialize mexico and usa with their initial population.Also declare and initial their increase and decrease rate.Find the population of both the  country each year until mexico population exceeds the usa population.

Output:

Mexico's population ::114 million.                                                                                          

USA's population ::312 million.                                                                                            

Mexico's population ::115.151 million.                                                                                      

USA's population ::311.532 million.

.

.

.

Mexico's population ::270.546million.                                                                                      

USA's population ::274.213 million.                                                                                        

Mexico's population ::273.278million.                                                                                      

USA's population ::273.802 million.

Final answer:

A Java program will simulate the annual population changes of Mexico and the United States and output the populations each year until Mexico's population exceeds that of the United States. The provided code includes a growth rate calculation and displays results annually in a loop.

Explanation:

To predict when the population of Mexico will exceed that of the United States, we will create a simple Java application that calculates the populations annually based on the given growth rates. The population of Mexico starts at 114 million with an annual increase rate of 1.01%, whereas the United States starts with a population of 312 million and experiences an annual decrease of 0.15%. Using a loop, we can simulate each year's population change until Mexico's population exceeds the United States' population. The code will display the population of each country per year alongside the number of years it took for the population of Mexico to surpass that of the United States.

Here's a basic outline of the Java code:

public class Population {
   public static void main(String[] args) {
       double populationMexico = 114e6;
       double populationUSA = 312e6;
       int years = 0;
       while (populationMexico <= populationUSA) {
           // Calculate the new populations
           populationMexico *= 1.0101;
           populationUSA *= 0.9985;
           years++;
           // Output the current year's populations
           System.out.println("Year " + years + ":");
           System.out.println("Mexico: " + (int)populationMexico + " people");
           System.out.println("USA: " + (int)populationUSA + " people");
       }
       System.out.println("It took " + years + " years for the population of Mexico to exceed that of the United States.");
   }
}

This program is within the scope of the first six chapters of most introductory programming textbooks, as it uses basic Java syntax, arithmetic operations, loops, and conditional statements.

Which of the following code is correct?
A. print("Programming is fun") print("Python is fun")
B. print("Programming is fun") print("Python is fun")
C. print("Programming is fun) print("Python is fun")
D. print("Programming is fun) print("Python is fun")

Answers

Answer:

The options A and B are correct (as they are the same), assuming that each print function is in different lines.

Explanation:

It is assumed that this code is in Python language.

It is important to note that the options A and B are the same because they are equally written. In the same way, the options C and D are the same.

The options C and D are incorrect because the character (") is missing in the first print function. Let's take a look:

print("Programming is fun) <------- The " is missing

If you execute this code, python will generate a "SyntaxError".

On the other hand, the options A and B could be correct or incorrect.

It is incorrect if the code is in a single line. If you want to write this code in a single line, you should separate each print function with a semicolon as it follows:

print("Programming is fun"); print("Python is fun")

It is CORRECT if the code is in two different lines as follows:

print("Programming is fun")

print("Python is fun")

Thus, the options A and B are correct (as they are the same), assuming that each print function is in different lines.

Answer:

a and b

Explanation:

Which of the following kinds of software is a sophisticated type of application software that assists a professional user in creating engineering, architectural, and scientific designs?A.CADB.DTPC.CBTD.WBT

Answers

Answer:

The answer is A. CAD which means Computer-Aided Design.

Explanation:

CAD is used for creating different designs, simulations and scientific diagrams, some examples of CAD software include AutoCAD and Solidworks.

For reference the other acronyms mean:

Desktop publishing (DTP)

Computer-based training (CBT)

Web-based training (WBT)

Which of the following is controlled by a computer operating system? a. System hardware (CPU, memory, storage, I/O devices) b. Application software (games, browser, office productivity, etc.) c. Both a and b d. Neither a nor b

Answers

Answer:

c. Both a and b

Explanation:

When we define an Operating System we say that it is a software that allows you to control the basic processes of a computer and allow the operation of other programs, that is, its function is to manage the physical resources of the computer so that they optimally execute other programs.

For example, when we open a program that is on the desktop, we click with the mouse (which is an input device) on an icon that we see on the monitor (which is an output device), and the program opens, which we see on the screen, and this program is executed by writing and reading operations in both secondary storage units and RAM, processing information through the CPU.

The previous example shows the task of the Operating System, which is nothing more than managing all the resources of the computer according to the own requirements or of other programs installed in the computer, managing the services that these require. also, the operating system can limit or enable functions of any software on the computer, they could not run without the existence of the OS. This is why the Operating System is the most important software of any computer.

You’re writing a script that will be called by other scripts. You want to signal abnormal termination of your script by passing a value of 8 to the external script under some circumstances. What command can you use in your own script to do this?

Answers

Final answer:

Use the exit command with the value 8 to signal abnormal termination in a script. The exit status can be used by the calling script to determine further action.

Explanation:

When writing a script in many programming environments, particularly in Unix-based systems like Linux or in languages like Bash, you can use the exit command to terminate a script and return a value to the calling script. To signal an abnormal termination and return a value of 8, you would include the line exit 8 at the appropriate place in your script. This exit status can then be checked by the calling script to determine how to proceed. Exit statuses are a conventional way to communicate the outcome of a script where typically a zero value indicates success and any non-zero value indicates an error or abnormal termination.

Other Questions
How many neutrons in an atom of 30p? O a. 17 O b. 30.974 O c. 15 O d. 14 O e. 16 Create a class Book with two private int fields, numPages and currentPage. Supply a constructor that takes one parameter and sets numPages to that value and currentPage to 1. Provide accessor methods for both fields. Also provide a method nextPage that increments currentPage by 1, but only if currentPage is less than numPages. When an object is thrown vertically upward from the surface of the Earth: What is the instantaneous velocity in the point of maximum height?What is the acceleration in the point of maximum height? A piecewise function is shown below g(x) = { -3x^2 -2x+8 for -4 x < 1 -2x+7p for 1 x 5(a) for what value of p will the function be continuous (b) Because one piece stops and the next piece starts at the point identified in part a, the pieces can be set equal to each other to find p. Fine p. Show your work. If you did everything on a calculator, explain the steps you took and include screenshots of each step. In Python Calculate the BMI of a person using the formula BMI = ( Weight in Pounds / ( ( Height in inches ) x ( Height in inches ) ) ) x 703 and assign the value to the variable bmi. Assume the value of the weight in pounds has already been assigned to the variable w and the value of the height in inches has been assigned to the variable h. Take care to use floating-point division. Which tool is most likely to be used to produce a clear image of very tiny structures inside a cell? a light microscope b electron microscope c magnetic resonance imaging d computer model 5. On December 5, CWM paid the $230 telephone bill accrued for November. 6. On December 11, CWM purchased two computers from Dell Inc. for $4,900 each. CWM paid $400 down with a check; the remaining balance is due in 30 days (n/30). Each computer has an estimated life of two years and a salvage value of $50 each. What are the correct journal entries for these transactions? Lisa writes the following list of numbers.5.737737773..., 26,45 squared 0,9Question 1.a. Which numbers are rational?Question 2b. Which numbers are irrational? In the AD partnership, Allen's capital is $140,000 and Daniel's is $40,000 and they share income in a 3:1 ratio, respectively. They decide to admit David to the partnership. Each of the following questions is independent of the others. Refer to the information provided above. Allen and Daniel agree that some of the inventory is obsolete. The inventory account is decreased before David is admitted. David invests $40,000 for a one-fifth interest. What are the capital balances of Allen and Daniel after David is admitted into the partnership? Allen Daniel A) 140000 40000 B) 125000 35000 C) 120000 36000 D) 137000 39000 A. Option A B. Option B C. Option C D. Option D Who should you not ask for a letter of recommendation? Your teacher your guidence counselor your parents your coach County managers are elected officials.Question 5 options:TrueFalse What is the focus on the biological organization levels for ecology? C=2ar for r Helppppp idk what to do tbh How did French explorer Robert de La Salle impact the development of Louisiana?He paved the way for later explorers who were the first to reach Louisiana.He drove the Spanish out of the area by attacking Spanish missions.He claimed the territory for France after reaching the mouth of the Mississippi River.He established the city of New Orleans to create a permanent French presence. Assume that you are the manager of a firm. You are concerned about a potential increase in interestrates because it would reduce the demand for your products. Currently, economic growth is high, butannual inflation has increased from 3 percent to 5 percent within the last six months. The unemployment rate is very low and cannot go higher. The Federal Reserve (Fed) is meeting next week to assess economic conditions and set monetary policy.(a) Given the current economic situation, should the Fed adjust or not adjust economic policy? If so, how? If not, why?(b) Recently, the Fed has allowed the money supply to expand beyond its long-term target range. Does this affect your expectation of what the Fed will decide at its upcoming meeting? There are four steps in the manufacturing process of a stuffed toy: cutting, stuffing, sealing, and packaging. There are two employees each for cutting and stuffing but one each for sealing and packaging. The processing times of cutting, stuffing, sealing, and packaging are 8, 5, 3, and 2 seconds per toy. What is the capacity in toys per minute at the resource "stuffing"? Jane is a middle-aged woman fond of EpidermaNow's skincare products. These products are produced and marketed globally. EpidermaNow recently released a sun-screen lotion. Despite the lotion's high price and unproven effectiveness, Jane bought the lotion on the day of its release in the market. Given this information, Jane belongs to the segment of _____. a. global citizens b. global dreamers c. antiglobals d. global agnostics Early English literature was written in Old English, which is vastly different from Modern English. Often, these texts are translated into more accessible language for modern readers. When reading these older forms of English, it can be difficult to understand the meaning, even if the language has been modified. In your opinion, what makes this literature so difficult to read? Is it the vocabulary, the characters, the type of storytelling, the density of the language, or something else? As you progressed through Old English texts to Middle English to Modern English, how did your understanding of the literature change? Can you explain what caused the change? . The _____________ is the responsibility of the CISO, and is designed to reduce incidence of accidental security breaches by organization members. If a body travels half its total path in the last 1.10 s of its fall from rest, find the total time of its fall (in seconds).