you are the server managert for your company you hae just installed a new windows server you need to design a backup and recovery strategy for the server that meets the following requirements you will use windows tools for the backups backups are to be taken to an offsiet location for storage aftrer they are performed backups should only save data changed since the lasty backup you need to be able to recover invidual files and folders whaty should you do

Answers

Answer 1

Answer:

We should use the Windows Server Backups options to create a scheduled backup to the drives or the removable hard disk.

Explanation:

WSB(Windows Server Backup)is referred to as it is one of the best features or options of the Windows server by which we can create backups of our data and recover that data when we have lost them.

This option provides you the full security of your files, if you create a backup of those files then you have recover them when the file will be corrupted or you lose those file


Related Questions

Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first acknowledgement is lost, but the second acknowledgement arrives before the timer for the first segment expires. True or False.

Answers

Over a TCP connection, suppose host A sends two segments to host B, host B sends an acknowledgement for each segment, the first acknowledgement is lost, but the second acknowledgement arrives before the timer for the first segment expires is True.

True

Explanation:

In network packet loss is considered as connectivity loss. In this scenario host A send two segment to host B and acknowledgement from host B Is awaiting at host A.

Since first acknowledgement is lost it is marked as packet lost. Since in network packet waiting for acknowledgement is keep continues process and waiting or trying to accept acknowledgement for certain period of time, once period limits cross then it is declared as packet loss.

Meanwhile second comes acknowledged is success. For end user assumes second segments comes first before first segment. But any how first segment expires.

Developers work together with customers and useras to define requirements and specify what the proposed system will do. If once it is built, the system works according to specification but harms someone physicall or financially, who is responsible?

Answers

Financially would be responsible

_____ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.

Answers

Answer:

The anwer is Code of Ethics

Explanation:

Code of Ethics states the principles and core values that are essential to a set of people and that, therefore, govern these people's behavior.

Answer:

Code of ethics

Explanation:

A code of ethic is a group of rules that establish the way in which people should behave according to the values, principles and standards that they think are important. These rules determine the way in which a person will behave as this person will evaluate a course of action in terms of the principles that he/she considers that are right. Because of that, the answer is code of ethics.

5.Consider the following code snippet:ArrayList arrList = new ArrayList();for (int i = 0; i < arrList.size(); i++){ arrList.add(i + 3);}What value is stored in the element of the array list at index 0? Think carefully about this.A. 0B. 3C. 6D. None

Answers

Answer:

The answer to this question is the option "D".

Explanation:

In the given question code we use the array list that does not store any value in the index 0, because for adding elements in the list, we use add function. In this function parameter, we pass the value that is "i+3". Which means the value of i is increased by 3. In option A, B and C we do not assign any value in the add function. so, it not correct.  

That's why the correct answer to this question is the option "D".  

Gal runs a music store. He has a desktop computer in the back room that acts as a server. He has a point-of-sale terminal that connects to the desktop. He also has a notebook (using in-store wireless access to the Internet) that can be carried around the store to look up current items in stock, or to search for items from one of his suppliers for special orders. The Web site for the store is www.GalsTunes.net. Which of the following is true?


a. Gal must not be selling on his Web site because the top-level domain is a .net and not a .com
b. The notebook computer must be connected to the Internet in order to transfer data to the desktop computer
c. The point-of-sale terminal cannot connect directly to the Internet.
d. The desktop computer must be connected to the Internet since the notebook can access data from it
e. Gal must be hosting his Web site on his own desktop computer based on its URL

Answers

Answer:

The answer is letter C. The letter C is the true statement.

Explanation:

The true statement is The point-of-sale terminal cannot connect directly to the Internet.

As the design phase of an SDLC begins, programming languages, development tools, and application software needed for the new information system are purchased, installed, and tested to ensure that they work correctly.
A. TRUE
B. FALSE.

Answers

Answer:

FALSE

Explanation:

In the design phase of SDLC  we design the document which are used in the implementation phase. In this phase the SRS document is converted into the logical view structure that holds the whole specification.

Their are following points about Design phase of SDLC

After the analysis phase the designing phase is implemented .In the beginning it does not need programming languages, development tools etc .

So the given statement which is mention in question is FALSE

Which of the following characteristics of an e-mail header should cause suspicion?A. Multiple recipientsB. No subject lineC. Unknown Sender

Answers

Final answer:

Suspicion may arise from an e-mail header if there is no subject line, the e-mail has multiple recipients, or it originates from an unknown sender, as these could indicate a spam or a phishing attempt.

Explanation:

In evaluating which characteristics of an e-mail header should cause suspicion, there are several tell-tale signs to consider. An e-mail header that flags suspicion may include characteristics such as a lack of a subject line, which leaves recipients clueless about the content without opening the e-mail, potentially indicating a lack of specificity or that the sender is trying to avoid detection by spam filters. .

Additionally, multiple recipients can be a red flag, especially if the email is sent to recipients en masse without a clear reason. Furthermore, an e-mail from an unknown sender should always be approached with caution, as it can be a common tactic used in phishing attacks or spam. It is essential to critically evaluate these characteristics to ensure your cybersecurity.

What is the formula to find the sum of cells a1 a2 and a3

Answers

Answer:

=sum(a1,a2,a3)

Explanation:

starting with the equality sign, followed by the sum function for adding the cells, and then the cells containing the data.

During side show mode, hitting the B key will do which one of these?

A) End the presentation
B) Blank the screen with black screen
C)Move one page back
D) Move to the first page of your presentation

Answers

Answer:

B) Blank the screen with black screen

Explanation:

The answer is letter B. During the slideshow, if you press B in your keyboard, it will display a black screen. When you press W, it will display white screen while when you press B again, you will be directed to a last display slide on the presentation.

The variety of theatre introduced in the 1960s that denotes semi-professional or even amateur theatre in the New York/Manhattan area, often in locations such as church basements, YMCAs, and coffeehouses, is commonly known as off-off-Broadway.
a. True.
b. False

Answers

Answer:

The answer is letter A. TRUE

Explanation:

The variety of theatre introduced in the 1960s that denotes semi-professional or even amateur theatre in the New York/Manhattan area, often in locations such as church basements, YMCAs, and coffeehouses, is commonly known as off-off-Broadway.  This statement is true.

Word processing and spreadsheet software are examples of _____, which are used broadly across large and small businesses.
a. operating system software
b. utility programs
c. horizontal applications software
d. vertical applications software

Answers

Answer:

Word processing and spreadsheet software are an example of Horizontal application software, which are used broadly across large and small businesses.

Explanation:                                              

Horizontal Application software is a type of software which needs the support of system software to work properly. Application software is used to perform some specific works. This Application software is not by default in the system, it needs to be installed manually.

                                                                                                                                                 

You are developing a Website using a GUI editor. You are curious as to whether your pages will look or function any differently after you publish them to the Web. Which of the following is true?This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A) Most GUI editors make it easy to preview your pages using built-in code validators or validation sites.
B) The WYSIWYG environment displays pages exactly as they will appear and work on the Web.
C) You can proof your pages after you publish them to the Web, make any changes, then republish them.
D) Most GUI editors allow you to easily preview and test your pages in the browser(s) of your choice.

Answers

Answer:

D) Most GUI editors allow you to easily preview and test your pages in the browser(s) of your choice.

Explanation:

A) You would need an additional tool for test with built-in code validators or validation sites.

B) WYSIWYG allows content to be edited in a form that resembles its appearance, not exactly as they will appear and work on the Web

C) It is not convenient to publish pages to the Web,then make change and republish them.

This morning you modified five large data files in your home folder in Linux, and now you want to find and delete the files because you no longer need them. Which of the following commands can you use to list and sort files based on the time they were modified

Answers

Answer:

ls -t

Explanation:

"ls" command in Linux is used very often. It lists the directory contents. The "ls" utility is part of the core utilities and installed in all Linux distributions.

When ls command is used with "-t" , "ls -t" sorts files/directories list by date created or modified.

More advanced version is "ls -lt", where it sorts by date and shows info about directory, size, modified date and time, file or folder name and owner of file and its permission.

Tommy is repeating a series of digits in the order in which he heard an experimenter read them. The experimenter is testing the capacity of Tommy's ________ memory. Tommy should be able to repeat about ________ digits correctly.
a. short-term; 4b. short-term; 7c. sensory; 4d. sensory; 7

Answers

Answer:

short-term

7

Explanation:

Short-term memory is the capacity for holding, but not manipulating, a small amount of information in mind in an active, readily available state for a short period of time.

The human brain can only hold about seven pieces of information for less than 30 seconds.

As an example:

Tommy is repeating a series of digits in the order in which he heard an experimenter read them. The experimenter is testing the capacity of Tommy's short term memory. Tommy should be able to repeat about 7 digits correctly.

Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value is considered a CONSECUTIVE DUPLICATE. In this example, there are three such consecutive duplicates: the 2nd and 3rd 5s and the second 6. Note that the last 3 is not a consecutive duplicate because it was preceded by a 7.

Write some code that uses a loop to read such a sequence of non-negative integers , terminated by a negative number. When the code exits the loop it should print the number of consecutive duplicates encountered. In the above case, that value would be 3.

Answers

Answer:

Following is the source code required:

int entry_1 ,entry_2 = -1, consecutive_duplicates = 0;

do {

cin >> entry_1;

if ( entry_2 == -1)

{

entry_2 = entry_1;

}else

{

if ( entry_2  == entry_1 )

consecutive_duplicates++;

else

entry_2  = entry_1;

}

}

while(entry_1 > 0 );

cout << consecutive_duplicates;

Explanation:

Following is the explanation for given code:

3 integers are declared as entry_1, entry_2  and consecutive_duplicates.entry_2 = -1 (it will tell that the integers are non-zero)user will enter the value for entry_1The loop will be applied which will check for the value of entry_2. If entry_2 = -1, the value of entry_1 will be stored in entry_2 else it the value of entry_2 is already equal to entry_1, the integer consecutive_duplicate in increased by one.Now the value of entry_1 is stored in entry_2 , so that next entity might be checked.In the end, while the entry_1 is greater than zero (unless the last (negative)element of array is reached), print the integer consecutive_duplicates.

i hope it will help you!

The final answer to the problem is that the code, when executed, should print the number 3. This represents the number of consecutive duplicates within the given sequence of integers.

In this scenario, we are required to write a piece of code that analyzes a sequence of integers and identifies consecutive duplicates - values that are immediately repeated in the sequence. To accomplish this, we need a loop to read through each number in the sequence and compare it with the previous value. If a number is the same as its predecessor, we increment a counter. We continue this process until we reach a negative number, which is the termination point for the data sequence. The number of duplicates can be tracked using a variable that increments each time a duplicate is found. Python pseudocode for this would initially set a previous number to 'None', compare each new number to the previous one, and if they are the same (and not the first number), increment a duplicates counter. The loop ends when a negative number occurs, and the script returns the value of the duplicates counter as the result.

____________ is group of commands that enable s you to bring data from an access database, from the web, from a text file, from an xml file, and from many other sources, into excel in a manner that lets you transform.

Answers

Answer:

Get External Data

Explanation:

Power Query is a group of commands that enable s you to bring data from an access database, from the web, from a text file, from an XML file, and from many other sources, into Excel in a manner that lets you transform.

The group of commands that enables you to bring data from various sources, such as an Access database, the web, a text file, an XML file, and many others, into Excel in a way that allows you to transform it is called "Power Query".

Power Query is a powerful tool that helps you extract, transform, and load data into Excel, making it easier to work with and analyze.

With Power Query, you can perform tasks like combining multiple data sources, cleaning and shaping data, and creating custom data transformations.

To learn more about database visit:

https://brainly.com/question/6447559

#SPJ4

_____ was just a sophomore when he began building computers in his dorm room at the University of Texas. His firm would one day claim the top spot among PC manufacturers worldwide.A. Bill GatesB. Steve JobsC. Michael DellD. Shawn FanningE. Mark Zuckerberg

Answers

Answer: C) Michael Dell

Explanation:

Michael S. Dell is the founder of Dell technology and has produced a huge technological infrastructure named as Dell Inc and also became it's CEO.He started to develop computers in University of Texas's room when he was a college student Other options are incorrect because Steve Jobs studied in Reed college. Mark Zuckerberg studied in Harvard university and Bill Gates also did his college studies from Harvard University. Thus , the correct option is option(C).

You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy of all data is available with a single set of media. However, it should take minimal time to restore data. Which of the following would be the ____

Answers

Answer:

Full

Explanation:

You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy of all data is available with a single set of media. However, it should take minimal time to restore data. Which of the following would be the Full .

What is a group of statements that exists within a program for the purpose of performing a specific task?"

Answers

Answer:

This is called a "Function"

Explanation:

The basic business system that serves the operational level (analysts) and assists in making structured decisions; an example is an operational accounting system such as payroll or an order-entry system

Answers

Answer:

Transaction processing system

Explanation:

A transaction processing system or TPS can be defined as a system that is used to observe the transaction ongoing is a database system. It overcomes the problem of the online booking system.

The transaction processing system also helps in processing the order, keeping the records of the employee, maintaining the payroll systems, also to keep observation on accounts of receivables and payables.

In JAVA,
Given:
1-an int variable k,
2-an int array currentMembers that has been declared and initialized,
3-an int variable memberID that has been initialized,
4-and an boolean variable isAMember,
write a code that assigns true to isAMember if the value of memberID can be found in currentMembers, and that assigns false to isAMember otherwise. Use only k, currentMembers, memberID, and isAMember.

Answers

Answer:

The program to this question as follows:

Program:

public class Main //define class main

{

public static void main(String[] args)  //define main method

{

boolean isAMember = false; //define boolean variable isAMember

int currentMembers[]={1,72,36,43,51,61,72,80}; //declare and initialized array.

int memberID=72; //define integer variable memberID.

for(int k = 0; k < currentMembers.length; k++) //loop.

{

if(currentMembers[k] == memberID) //conditional statement.

{

isAMember = true; //assign value true.

break;

}

System.out.print("true"); //print value.

}

}

}

Output:

true

Explanation:

The above java program to this question can be described as:

In java program we define a class that is "Main" inside this class we define a main method in the main method we define variables that are "k, memberID, isAMember, currentMembers". The variable k and memberID is an integer variable that is used in the loop and use for match condition. and currentMembers is an integer array that is declared and initialized. and isAMember is a boolean variable that returns only true or false value.Then we define a (for) loop in this loop we check condition we use if block. In if block, we check that currentMembers array value is equal to memberID. if this condition is true so we assign value true in "isAMember" variable and print its value.

Given the char * variables name1, name2, and name3, write a fragment of code that assigns the largest value to the variable max (assume all three have already been declared and have been assigned values).

Answers

Answer:

The following code as follows:

Code:

max=name1;   //define variable max that holds name1 variable value.

if (strcmp(name2, max)>0)  //if block.

{

   max=name2;  //assign value to max.

}

if (strcmp(name3,max)>0)   //if block.

{

  max=name3; //assign value to max.

}

Explanation:

In the above code, we define a variable that is max. The data type of max variable is the same as variables "name1, name2, and name3" that is "char". In the max variable, we assign the value of the name1 variable and use if block statement two times. In if block, we use strcmp() function that can be defined as:

In first if block we pass two variables in strcmp() function that is "name2 and max" that compare string value. If the name2 variable is greater then max variable value so, the max variable value is change by name2 variable that is "max=name2". In second if block we pass two variables in strcmp() function that is "name3 and max" that compare string value. If the name3 variable is greater then max variable value so, the max variable value is change by name3 variable that is "max=name3".

The following code accomplishes which of the tasks written below? Assume list is an int array that stores positive int values only.int foo = list[0];for (int j =1 ; j < list.length; j++) if (list[j] > foo) foo = list[j];

Answers

Answer:

The code mention in question will find "Largest Number in list"

Explanation:

In first line of code

first element of array will be move in "foo" variable

then loop will start from 2nd value and ends at last value of array

in next step

2nd value of array compares with 1st value

If 2nd value is greater than 1st then greater value move into "foo" variable.

This process continues till the end of array.

after completion largest element of array will be present in "foo".

The introduction of new information technology has a: A. dampening effect on the discourse of business ethics. B. waterfall effect in raising ever more complex ethical issues. C. beneficial effect for society as a whole, while raising dilemmas for consumers. D. ripple effect raising new ethical, social, and political issues.

Answers

Answer:

The answer is Letter D.

Explanation:

The introduction of new information technology has a ripple effect raising new ethical, social, and political issues. There are five main moral dimensions that tie together ethical, social, and political issues in an information society.

What will be the value of bonus after the following code is executed?

int bonus, sales = 6000;
if (sales < 5000);
bonus = 200;
else if (sales < 7500);
bonus = 500;
else if (sales < 10000);
bonus = 750;
else if (sales < 20000);
bonus = 1000;
else;
bonus = 1250;

A. 200
B. 500
C. 750
D. 1000

Answers

Answer:

Option (B) i.e., 500 is the correct option to the following question.

Explanation:

The following option is correct because here, firstly they defined two integer data type variable i.e., "bonus" and "sales" and assign value to the variable "sales" i.e., 6000 then, the set the if-else if statements to check the "bonus" and pass conditions is if the sales is less than 5000 then bonus is equal to 200 otherwise if the sales is less the 7500 then bonus is equal to 500 otherwise if the sales is less the 10000 then bonus is equal to 750 otherwise if the sales is less the 2000 then bonus is equal to 1000 otherwise bonus is equal to 1250.

So, according to the following conditions sales is less than 7500 because sales is equal to the 6000 that's why the following option is correct.

Ajax Inc. is one of the customers of a well-known linen manufacturing company. Ajax has not ordered linen in some time, but when it did order in the past it ordered frequenly, and its orders were of the highest monetary value. Under the given circumstances, Ajax's RFM score is most likely
A) 155
B) 511
C) 555
D) 151

Answers

Answer:

The answer is letter B

Explanation:

Under the given's circumstances, Ajax's RFM score is most likely 511.

You are installing an updated driver for a hardware device on your system. A dialog box displays indicating that Microsoft has digitally signed the driver you are installing. What benefits does driver signing provide? (Select TWO).

Answers

Answer:

It means the driver has been tested by Microsoft, and its an unaltered file.

Explanation:

A signed driver ensures that comes directly from Microsoft, it hasn't been modified by any other group or otherwise would lose the signature,  the driver is associated with a digital certificate that allows Windows to test its authenticity.

Since drivers work at very high-security levels on Windows OS, installing unsigned drivers it's a considerable risk.

HELP PLS TIME LIMIT HERE
When should you contact your instructor if you experience problems or questions with your online course?

A.After you talk to the lab instructor

B.At the end of the day

C.When you receive an email from the teacher

D.Immediately

Answers

I do it immediately, so it don’t effect my assignments or grades.

Answer:

D. immediately

Explanation:

To implement virtualization, a special type of management software known as a _____ must be installed. It manages access to the CPU, storage devices, network interfaces, and RAM for all VMs running on that system

Answers

Answer:

Vmware

Explanation:

You start a new job. You want to install some fun software on your laptop and get an error message which indicates that the software is not on the ________________ list so it cannot be installed.

Answers

Answer:

The software is not on the allowed list so it cannot be installed.

Explanation:

This is one of Windows features that allows administrators to prevent their users from installing unwanted software. Your IT or administrator probably wants you to use the laptop for work purposes only. To undo this, you must have the administrator privileges (with admin log in credentials and rights). You can check if you are using the admin access from your laptop. Simply follow the steps below:

1. Click / Press Start Menu at the bottom of your screen.

2. Typed in timedate.cpl and wait for the Date and Time prompt / dialogue box to appear.

3. Click on change date and time settings.

4. If your APPLY button is disabled, therefore, you do not have the admin access or account.  

Second reason, you have used a corrupted installer. This is a normal error for installers that have been downloaded from the internet and copied to a removable media but the copying did not happened correctly. To fix this error, you might want to UNINSTALL and RE INSTALL the software. This time used a complete and uncorrupted installer. To uninstall the software simply go to Control Panel and look for Add / Remove Programs.  

Other Questions
33% of college students say they use credit cards because of the rewards program. You randomly select 10 college students and ask each to name the reason he or she uses credit cards. Find the probability that the number of college students who say they use credit cards because of the rewards program is (a) exactly two, (b) more than two, and (c) between two and five inclusive. If convenient, use technology to find the probabilities. the equations below are. parallel perpendicular or neither A 24 kg child slides down a 3.3-m-high playground slide. She starts from rest, and her speed at the bottom is 3.0 m/s.a. What energy transfers and transformation occurs during the slide?b.What is the total change in the thermal energy of the slide and the seat of her pants? Express the ratio of the area of the circle to the area of the square Dora is conducting a performance appraisal for Sue, one of her employees. The company's performance appraisal form asks her to rate Sue's performance on various items like "Submits reports on time with minimal errors" on a scale from 1 to 5. There are 1/35 of the students in the school that are allergic to seafood. there are 1/15 of the students in school that are allegic to peanuts? Are there more students allergic to seafood or peanuts? hat are the wavelengths of peak intensity and the corresponding spectral regions for radiating objects at (a) normal human body temperature of 37C, (b) the temperature of the filament in an incandescent lamp, 1500C, and (c) the temperature of the surface of the sun, 5800 K? Think of something in your home or community that could be described as a proportional relationship. List at least three examples.Answer in 3 complete sentences. A variable declared to be of one class can later reference an extended class of that class. This variable is known as_________.a. publicb. derivablec. cloneabled. polymorphice. none of the above, a variable declared to be of one class can never reference any other type of class, even an extended class What occurs when you call a method on a reference variable that contains null? Select one: a. An ArrayIndexOutOfBoundsException error b. An ArithmeticException error c. A NullPointerException error d. A ClassCastException error All the following are true of the movement of Earth's atmosphere except :a.cool air is denser than warm air so it tends to sink toward the Earth's surface.b.the movement of air within the atmospheric convection cells generates the Earth's major wind belts.c.a column of cool, dense air produces high pressure at the Earth's surface. a column of warm, less dense air produces low pressure at the Earth's surface.d.warm air is less dense than cool air so it tends to sink toward the Earth's surface. You work in the customer care division at Flannery Electronics. Mr. Gallegos, a longtime customer, is experiencing a problem with his home theater system and has submitted a letter requesting that Flannery Electronics either fix or replace his system at no cost. Unfortunately, Mr. Gallegoss customer service and factory warranties expired three months ago. You must write to Mr. Gallegos and inform him that Flannery will be unable to honor his request. Should the tone for this message be formal or informal? Formal Informal A Loyola University student decided to depart from Earth after her graduation to find work on Mars. Before building a shuttle, she conducted careful calculations. A model for the velocity of the shuttle, from liftoff at t = 0 s until the solid rocket boosters were jettisoned at t = 74 s, is given by v(t)= 0.001490833t^3-.08389t^2+23.52t+7.3(in feet per second). Using this model, estimate the global maximum value and global minimum value of the ACCELERATION of the shuttle between liftoff and the jettisoning of the boosters. An object is in simple harmonic motion with amplitude a and period 2/. Find an equation that models the displacement y at time t under the given condition. y = 0 at time t = 0 The specific heat capacity of methane gas is 2.20 j/g-k. How many joules of heat are needed to raise the temperature of 5.00 g of methane from 36.0c to 75.0c? The ratio of quarters to dimes in a coin collection is 5:3. You add the same number of new quarters as dimesto the collection. Is the ratio of quarters to dimes still 5 : 3 If Electrocomp decides that at least 20 air conditioners should be produced but no more than 80 fans should be produced, the optimal production mix of air conditioners and fans is __________. (The first number is for air conditioners and the second for fans.) Stutz, Inc. designs and builds basketball gymnasiums. Each gymnasium is custom-built to individual customers specifications. Stutz uses job-order costing to keep track of its costs. In February it worked on three jobs. Data for these jobs are as follows: Job 175 Job 178 Job 179 Balance 2/1 $13,790 $ 0 $ 0 Direct Materials 16,200 8,500 30,500 Direct Labor Cost 23,300 7,600 45,000 Machine Hours 400 hrs. 300 hrs. 2,000 hrs. Overhead is applied to jobs at the rate of $25 per machine hour. By February 28, Job 178 is the only one unfinished. The balance of Finished Goods on February 1 is $94,000 (consisting of Job 177). Jobs 177 and 179 are sold during February. Stutz sells its product at cost plus 40%. Refer to Figure 5-6. What is sales revenue for February? Maria was assaulted but cannot recall the experience itself and also cannot recall anything taht happened in the two weeks following the event. She remembers everything leading up to the event. Maria is suffering from: euben's Coffee Shop makes a blend that is a mixture of two types of coffee. Type A coffee costs Reuben $5.70 per pound, and type B coffee costs $4.30 per pound. This month, Reuben made 167 pounds of the blend, for a total cost of $820.30. How many pounds of type A coffee did he use?