Kareem is working on a project for his manager. He has a few questions for a co-worker who he knows is knowledgeable on the subject. As they're discussing some of the topics, he gives the co-worker permissions to the resources so they can look at the information on their own. Which of the following access control methods does Kareem's company use?

a. DAC
b. RBAC
c. MAC
d. TSAC

Answers

Answer 1

Answer: RBAC

Explanation:

The access control methods that Kareem's company uses us the role based access control.

The Role-based access control (RBAC) simply means assigning permissions to users based on the role that such individual plays within an organization.

RBAC is a simple approach to access management and is typically less prone to error than in a scenario whereby permissions are assigned to users individually. Access rights are given to the workers based on what their job entails and what is needed and other information which isn't needed won't be accessible to them.


Related Questions

A business should choose the platform as a service (PaaS) cloud model when: a. it designs its own applications but doesn't customize the operating system b. it doesn't need any operating system c. it doesn't design its own applications and doesn't customize the operating system d. it designs its own applications and customizes the operating system e. it doesn't design its own applications but customizes the operating syste

Answers

Answer:

a. it designs its own applications but doesn't customize the operating system.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Infrastructure as a Service (IaaS).

2. Software as a Service (SaaS).

3. Platform as a Service (PaaS).

Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.

The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.

Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).

Some of the advantages of Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.

Basically, platform as a Service (PaaS) providers (vendors) usually provide their clients (software developers) with server and data storage, operating system, data center, networking resources, etc., while the software developers design, deploy and manage their software applications.

Hence, a business should choose the platform as a service (PaaS) cloud model when it designs its own applications but doesn't customize the operating system.

H0: Protype design has at most 37mpg vs. HA: prototype design has greater than 37mpg. If H0 is rejected, the action will be move the protype deisgn to prpduction. What kind of test is required

Answers

Answer:

A one-tailed test with upper reject region

Explanation:

H0 : μ ≤ 37

H1 : μ > 37

This is a right tailed tailed test as indicated by the greater than symbol on the hypothesis defined. Hence, the critical region will lie to the right of the area under the curve.

Critical region which lies to the right of the curve is called the upper rejection region.

Rejecting the Null, H0 means that ; the value of the test statistic exceeds the critical value;

When the hypothesis is declared with the less than sign, rejection region lies to the left or lower region.

While a two tailed test has rejection region shares between each tail.

Write a C++ program that takes a single character and prints the corresponding digit on the old-style dial or touchtone telephone keypad, if it exists, or a message stating that the character does not correspond to a digit on the keypad.

Answers

Ok thanks Ianswer: c++

What type of address do computers use to find something on a network?

Answers

An Internet Protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions host or network interface identification and location addressing which can help you a lot.

Given the snippet of code: int x = 5; int bar(int j) { int *k = 0, m = 5; k = &m; return (j+m); } void main(void) { static int i =0; i++; i = bar(i) + x; } Which variables obtain their memory from the stack? A. iB. jC. kD. mE. x

Answers

Answer:

Variables j , k , m will be stored in the stack.

Explanation:

Variable x will not be in stack as is it a global variable.

Variable i will not be in stack as is it a static variable.

Variable j will be in stack as is it a local variable in the function.

Variable m will be in stack as is it a local variable in the function.

Variable k , a pointer will be in stack as it is in the function bar locally.

In the revised version of the library system with Book and Periodical, Question 16 options: a) Book is a subclass of Periodical b) Periodical is a subclass of Book c) Book and Periodical are subclasses of LoanableItem d) Book and Periodical implement LoanableItem

Answers

Answer:

c. Book and Periodical are subclasses of LoanableItem

Explanation:

Books are kept in library in a periodical manner. Both classes are not superior, they are subclasses of LoanableItem. Library uses common guide which makes it easy to find a book.

(4 marks)
(d) Outline the steps involved in inserting a picture from a file in a word processing document using
copy and past

Answers

Answer:

HELLO IAM LOKESH IAM NEW PLEASE SUPPORT ME

In PyCharm, write a program that prompts the user for their name and age. Your program should then tell the user the year they were born. Here is a sample execution of the program with the user input in bold:What is your name? AmandaHow old are you? 15Hello Amanda! You were born in 2005.

Answers

Answer:

def main():

   name = input("What is your name? ")

   if not name == "" or "":

       age = int(input("What is your age? "))

       print("Hello " + name + "! You were born in " + str(2021 - age))

main()

Explanation:

Self explanatory

Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.a. System.b. Satisfaction.c. Speedy.d. Subscriber.e. Switch.

Answers

Answer:

D. Subscriber

Explanation:

Digital Subscriber Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.

The high speed data transmission property helps to transmit data in a fast and timely manner between two or more points or people during calls, texts and other activities.

Implementing HTML best practices and writing code to match the original intentions of each element is known as __________ HTML. standard attribute-based industry semantic

Answers

Answer:

semantic

Explanation:

The description provided is describing the practice known as semantic HTML. This is basically code that provides both the user and the developer a description on what the code was originally supposed to do. For example, a method that calculates the total cost of a set of prices could be called calculateTotal(). By doing so you are describing the intention of the method clearly so that the individual using the method does not need to look at anything else to know what it does.

Implementing HTML best practices and writing code to match the original intentions of each element is known as __________ HTML.

Semantic

Based on the knowledge of semantics HTML which is a programming language used to write codes for the building blocks of any website, it gives the user and programmer the details of what the code is supposed to perform.

Furthermore, this helps them to match the original intentions of the code which helps in understanding of the code which also helps with debugging.

Therefore, the correct answer is semantic

Read more about HTML practises here:

https://brainly.com/question/19117781

When considering the mobility aspect of cloud-based enterprise systems, it's important to consider that with a cloud-based system, employee can access information from _____.

Answers

Answer:

anywhere in the world

Explanation:

Employee can access information from anywhere in the world. That is the main upside of using cloud-based enterprise system. They run completely remote and are accessible from anywhere as long as you have an internet connection and authorized access to the system. This increased accesibility is crucial for companies that have employees that move from place to place solving problems and solves many of the problems with on-site systems.

rules used in naming variables in object oriented programming​

Answers

Answer:

Explanation: Name your variables based on the terms of the subject area, so that the variable name clearly describes its purpose.

15) Three primary activities of a program are: A) Variables, Operators, and Key Words B) Lines, Statements, and Punctuation C) Input, Processing, and Output D) Integer, Floating-point and Character E) None of the above​

Answers

Answer:

yes sir

Explanation:

1) Declare an ArrayList named numberList that stores objects of Integer type. Write a loop to assign first 11 elements values: 1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1024. Do not use Math.pow method. Assign first element value 1. Determine each next element from the previous one in the number List. Print number List by using for-each loop.

Answers

Answer:

Explanation:

The following is written in Java and uses a for loop to add 10 elements to the ArrayList since the first element is manually added as 1. Then it calculates each element by multiplying the previous element (saved in count) by 2. The program works perfectly and without bugs. A test output can be seen in the attached image below.

import java.util.ArrayList;

class Brainly {

   public static void main(String[] args) {

       ArrayList<Integer> numberList = new ArrayList<>();

       numberList.add(0, 1);

       int count = 1;

       for (int i = 1; i < 11; i++) {

           numberList.add(i, (count * 2));

           count = count * 2;

       }

       for (Integer i : numberList) {

           System.out.println(i);

       }

   }

}

1. What does the word “processing” in data pro- cessing mean?
2. Give three examples in which raw data also serves as useful information.
3. Give three business examples (not mentioned in the text) of data that must be processed to provide useful information.
4. Give three examples of subsystems not operat- ing in the context of IT. Why are these consid- ered subsystems and not systems?
5. How do TPSs and DSSs differ?
6. What is a problem? Give an example of a busi- ness problem and discuss how a computer- based information system could solve it.
7. What is synergy? How is synergy accomplished when a person uses a computer? Explain the connection between synergy and increased productivity.
8. “An information system consists of hardware and software.” Why is this statement inadequate?
9. In which situations does one need to make a decision? Give three examples not mentioned in the chapter.
10. How can a DSS help make decisions?
11. Note the word “support” in decision support systems. Why are these applications not called decision-making systems?
12. Who is considered a knowledge worker? Will you have a career as a knowledge worker? Explain.
13. What is the most prevalent type of information system? Why is this type of IS so ubiquitous?
14. TPSs are usually used at the boundaries of the organization. What are boundaries in this context? Give three examples of boundaries.
15. Among IT professionals, the greatest demand is for network administrators and analysts. Why?

Answers

Answer:

Word processing is the process of creating and editing documents on a computer. It allows a user to create documents that mimic the format and style of a typical typewriter. It requires a computer and word processing software. A printer may also be used to create a physical copy of the document.

Explanation:

1. Processing means any action that produces information from data, such as finding totals, averages, ratios, and. trends.
2. Names, addresses, and educational experience of employment candidates, consumers, and members of
professional organizations are some examples. They are data, but are also used as information, because they are
often needed as is, without processing.
5. A TPS merely records transactions and channels them into files and databases. It does not analyze the data nor
create any information. A DSS contains software that help make decisions. It provides useful information gleaned and manipulated from raw data.

When a Select Case statement executes, the value of the test expression is compared with the values that follow each of the _______ keywords.

Answers

Answer:

Case

Explanation:

In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited.

Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.

For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function. Therefore, when you create variables in a function, you can can set the values for their parameters.

A Select Case statement can be defined as a conditional statement that avails software developers or programmers the ability to test a variable by comparing it with a list of values.

In a Select Case statement, each variable is referred to as a Case.

Generally, when a Select Case statement executes, the value of the test expression is compared with the values that follow each of the Case keywords.

Gimme Shelter Roofers maintains a file of past customers, including a customer number, name, address, date of job, and price of job. It also maintains a file of estimates given for jobs not yet performed; this file contains a customer number, name, address, proposed date of job, and proposed price. Each file is in customer number order.

Required:
Design the logic that merges the two files to produce one combined file of all customers whether past or proposed with no duplicates; when a customer who has been given an estimate is also a past customer, use the proposed data.

Answers

Answer:

Hre the complete implementation of python code that reads two files and merges them together.

def merge_file(past_file_path,proposed_file_path, merged_file_path):

   past_file_contents=load_file(past_file_path)

   proposed_file_contents=load_file(proposed_file_path)

   proposed_customer_name = []

   for row in proposed_file_contents:

       proposed_customer_name.append(row[1])

   with open(merged_file_path,'w') as outputf:

       outputf.write("Customer Number, Customer Name, Address\r\n")

       for row in proposed_file_contents:

           line = str(row[0]) +", " + str(row[1]) + ", " + str(row[2]) +"\r\n"

           outputf.write(line)

       for row in past_file_contents:

           if row[1] in proposed_customer_name:

               continue

           else:

               line = str(row[0]) + ", " + str(row[1]) + ", " + str(row[2]) + "\r\n"

               outputf.write(line)

       print("Files merged successfully!")

# reads the file and returns the content as 2D lists

def load_file(path):

   file_contents = []

   with open(path, 'r') as pastf:

       for line in pastf:

           cells = line.split(",")

           row = []

           for cell in cells:

               if(cell.lower().strip()=="customer number"):

                   break

               else:

                   row.append(cell.strip())

           if  len(row)>0:

               file_contents.append(row)

   return file_contents

past_file_path="F:\\Past Customer.txt"

proposed_file_path="F:\\Proposed Customer.txt"

merged_file_path="F:\\Merged File.txt"

merge_file(past_file_path,proposed_file_path,merged_file_path)

Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the array. Then, fill the array with values using the pointer (Note: Do NOT use the array name.). Enhance the program by prompting the user for the values, again using the pointer, not the array name. Use pointer subscript notation to reference the values in the array.

Answers

Answer:

#include<iostream>

using namespace std;

int main()

{

  int a[20],n;

  int *p;

  cout<<"\n enter how many values do you want to enter:";

  cin>>n;

  for(int i=0;i<n;i++)

  {

      cout<<"\n Enter the "<<i+1 <<"th value :";

      cin>>*(p+i);

      //reading the values into the array using pointer

  }

  cout<<"\n The values in the array using pointer is:\n";

  for(int i=0;i<n;i++)

  {

      cout<<"\n (p+"<<i<<"): "<<*(p+i);

      //here we can use both *(p+i) or p[i] both are pointer subscript notations

  }

}

Output:

describe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on another network. You can assume that the two networks are both connected to the same router.

Answers

Answer:

Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.

What does the AVERAGE function calculate? the total sum of a list of values the arithmetic mean of a list of values the total number of values in a list the percentage of values in a list

Answers

Answer:

B) the arithmetic mean of a list of values

Explanation:

on Edge

The Average function calculates the arithmetic mean of a list of values. Therefore, option B is the correct option.

What is the average?

In its most general definition, an average can be considered as the representative number or figure from the whole list. The average of a list containing multiple values is obtained by adding all the values and dividing them up by the total number of values.

The ultimate objective of calculating the average is to discover the value that represents the whole list. Average is also known as mean, and it works as a central value in the list, which is comprehensive in nature. It works as an approximate or rough estimate, which helps us in making decisions in daily life.

Thus, the average function calculates the arithmetic mean of a list of values. Therefore, option B is the correct option.

To learn more about the average, visit the link below:

https://brainly.com/question/11265533

#SPJ2

A small e-commerce company uses a series of Robotic Process Automation solutions to manage the backup of data from individual workstations to an on-premise server. However, the company is opening another office and would like to more easily share data between locations, along with better protecting the data from loss.
Which technology could be combined with their current automated processes to do this?

Answers

Answer:

Cloud.

Explanation:

Cloud computing can be defined as a form of data computing which requires the use of shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offer individuals and businesses a fast, secured, effective and efficient way of providing services over the internet.

Basically, cloud computing comprises three (3) service models and these include;

1. Platform as a Service (PaaS).

2. Software as a Service (SaaS).

3. Infrastructure as a Service (IaaS).

Additionally, the two (2) main characteristics of cloud computing are;

I. Measured service: it allows cloud service providers to monitor and measure the level of service used by various clients with respect to subscriptions.

II. Resource pooling: this allows cloud service providers to serve multiple customers or clients with services that are scalable and provisional.

For example, the provisioning of On-demand computing resources such as storage, network, virtual machines (VMs), etc., so as to enable the end users install various software applications, database and servers.

Hence, the technology that could be combined by the small e-commerce company with its current automated processes is cloud storage.

There are different tools used in data sharing. The technology that could be combined with their current automated processes to do this is blockchain.

Blockchain is known to use different kinds of distributed ledger that is often shared across networked devices. Through this, people on the network can share files and values securely and even on a peer-to-peer basis. This is no need any middlemen.

Data protected in blockchain is very vital.  All records on a blockchain are known too be secured through the act of cryptography. Here, Network people do have their own private keys that are given to them for any  transactions they make.

Learn more about Blockchain from

https://brainly.com/question/25700270

In cell K8, create a formula using the SUM function that calculates the total of the range D17:D20 and subtracts it from the value in cell J8.

Answers

Answer:

so like what are you asking for so i can help u just tell me what u need and i will help u :)

Explanation:

What should businesses do in order to remain competitive under the current Cloud
landscape?

Answers

Answer:

Cloud Landscape

They must evangelize the benefits of cloud computing to company executives in order to assist them in developing and extracting business benefits that will give them a competitive advantage and increase profits

Explanation:

The most successful organisations carefully plan out a multiyear effort to improve their cloud adoption, focusing on multiple streams of work across several stages of maturity.

Cloud computing governance is difficult even when only one cloud provider is involved, and it becomes even more difficult as organisations move toward multi cloud.

Continuous workload placement analysis involves reassessing workloads at a regular cadence, evaluating whether the current execution venue sufficiently meets the organization’s needs and if migrating to an alternative model provides higher value without adding significant risk to the organization’s operations

They must evangelize the benefits of cloud computing to company executives in order to assist them in developing and extracting business benefits that will give them a competitive advantage and increase profits.

In this question, the response is "Cloud Landscape" which can be defined as follows:

The organizations should adopt these new technologies to benefit from the digital transformation offered by the cloud.New enterprises were embracing cloud computing management strategies, placing established companies at risk.In the multi-year efforts for improving cloud security were meticulously planned by even the most successful enterprises. In several contributing to higher at various maturity levels are addressed.The multi-cloud plan enables governance of cloud computing increasingly challenging, even and there is only one cloud service provider involved in the agreement.  

Learn more:

cloud computing: brainly.com/question/16026308

Write a program using a dictionary that reads in a single positive digit number [0 - 9] from the user at the keyboard. Your program will then be able to look up the digit key in the dictionary and print the digit value spelled out. If the user types in a number that is either more than one digit, negative, or a non int value, re-prompt the user for valid input. First, before demonstrating your test cases, print out a display copy of the key:value pairs in your dictionary in sorted order. Deliverable: yournameLab4.py Your source code solution and a copy of the run pasted into your source submission file. Be sure to comment out your run so that your .py file will still run in the grader test bed. Validate user input is a single positive digit [0 - 9].

Answers

Answer:

The program in Python is as follows:

dict = {0:"Zero",1:"One",2:"Two",3:"Three",4:"Four",5:"Five",6:"Six",7:"Seven",8:"Eight",9:"Nine"}

num = input("Number: ")

while(num.isdigit() == False or int(num)<0 or int(num)>9):

   num = input("Number: ")

print(dict)    

print(dict[int(num)])

Explanation:

#This initializes the dictionary

dict = {0:"Zero",1:"One",2:"Two",3:"Three",4:"Four",5:"Five",6:"Six",7:"Seven",8:"Eight",9:"Nine"}

#This gets input from the user

num = input("Number: ")

#This loop is repeated until the user enters a valid input

while(num.isdigit() == False or int(num)<0 or int(num)>9):

   num = input("Number: ")

#This prints the dictionary

print(dict)    

#This prints the value of the key

print(dict[int(num)])

See attachment for sample run

Wilh the aid of the the diagram using an algorithm to calculate table 2 of multiplication​

Answers

Answer:

See attachment for algorithm (flowchart)

Explanation:

The interpretation of the question is to design a flowchart for times 2 multiplication table (see attachment for the flowchart)

The explanation:

1. Start ---> Start the algorithm

2. num = 1 ---> Initializes num to 1

3. while num [tex]\le[/tex] 12 ---> The following loop is repeated while num is less than 12

 3.1 print 2 * num ----> Print the current times 2 element

 3.2 num++ ---> Increment num by 1

4. Stop ---> End the algorithm

The Fourth Amendment does not allow police to randomly test people for drunk driving. True or False

Answers

Answer:

False

Explanation:

Write a program that asks a user to enter a date in month day year format (for example 10 12 2016) and displays the day of the week for that date, in this case, Wednesday.

Answers

Answer and Explanation:

Using javascript:

function dayof_theweek(){

var TodayDate = window. prompt("enter today's date in the format 'year, month, day' ");

var Datenow=new date(TodayDate);

var Dayofweek=Datenow.getday();

var Days=["monday","Tuesday", "Wednesday", "Thursday", "Friday", "Saturday", "Sunday"];

if(Dayofweek==indexOf(Days[Dayofweek]))

{

document.createTextnode(Days[Dayofweek]);

}

}

The program above uses a date object which uses the method getday to get the day of the week(get day returns an integer from 0 to 6).we then use a comparison operator == to test the condition that returned value Dayoftheweek is same with the index of the array Days and then print to a html document. The program may need improvements such as the fact that errors may arise when proper input isn't given, and therefore must be handled.

Write a method rearrange that takes a queue of integers as a parameter and rearranges the order of the values so that all of the even values appear before the odd values and that otherwise preserves the original order of the list. For example, suppose a queue called q stores this sequence of values: front [3, 5, 4, 17, 6, 83, 1, 84, 16, 37] back Then the call of rearrange(q); should rearrange the queue to store the following sequence of values: front [4, 6, 84, 16, 3, 5, 17, 83, 1, 37] back Notice that all of the evens appear at the front of the queue followed by the odds and that the order of the evens is the same as in the original list and the order of the odds is the same as in the original list. You may use one stack as auxiliary storage.

Answers

Answer:

i got the answer

Explanation:

hope you can too

The Marietta Country Club has asked you to write a program to gather, then display the results of the golf tournament played at the end of March. The Club president Mr. Martin has asked you to write two programs.
The first program will input each player's first name, last name, handicap and golf score and then save these records in a file named golf.txt (each record will have a field for the first name, last name, handicap and golf score).
The second program will read the records from the golf.txt file and display them with appropriate headings above the data being displayed.
If the score is = Par, then display 'Made Par'
If the score is < Par, then display 'Under Par'
If the score is > Par, then display 'Over Par'
There are 16 players in the tournament. Par for the course is 80. The data is as follows:
Andrew Marks 11.2 72
Betty Franks 12.8 89
Connie William 14.6 92
Donny Ventura 9.9 78
Ernie Turner 10.1 81
Fred Smythe 8.1 75
Greg Tucker 7.2 72
Henry Zebulon 8.3 83
Ian Fleming 4.2 72
Jan Holden 7.7 84
Kit Possum 7.9 79
Landy Bern 10.3 93
Mona Docker 11.3 98
Kevin Niles 7.1 80
Pam Stiles 10.9 87
Russ Hunt 5.6 73

Answers

Answer:

Explanation:

The following program is written in Python. It creates two functions, one for writting the players and their scores to the file, and another function for reading the file and outputting whether or not they made Par. The functions can be called as many times that you want and the writeFile function allows for 16 inputs to be made when called. A test case has been provided with all of the players mentioned in the question. The output can be seen in the attached image below.

def writeFile():

   file = open('output.txt', 'w')

   for x in range(16):

       firstName = input("Enter First Name:")

       lastName = input("Enter Last Name:")

       handicap = input("Handicap:")

       score = input("Score:")

       file.write(str(firstName) + " " + str(lastName) + " " + str(handicap) + " " + str(score) + "\n")

   file.close()

def readFile():

   file = open('output.txt', 'r')

   for line in file:

       lineArray = line.split(" ")

       if int(lineArray[-1]) < 80:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Under Par" )

       elif int(lineArray[-1]) == 80:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Made Par")

       else:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Over Par")

   file.close()

writeFile()

readFile()

ITING THE ANSWER
1. According to Turner and Wilson (2018), Information Literacy consists of
tasks EXCEPT...
A applying previous knowledge.
C. finding appropriate information
B. determining information need.
2. Outlining your problem, developing research questions, selecting keywords a
developing concept charts are activities during...
D. using information ethically
A. communicating information.
B. determining information need.
C. evaluating search results.
D. finding appropriate resources,
3. Asking questions such as what, why, where and how is an effective way to
A. craft your research questions.
B. develop good keywords
C. find good information
D. understand your topic,
4. In asking "what" questions, you intend to find...
A. answers and solutions.​

Answers

Answer:

Answer my first question

Other Questions
Imagine if you had been in Paul Robeson's shoes. How might you have felt?Why? Which of these organelles is NOT in animal cells?RibosomeEndoplasmic ReticulumCell Wall A plank 6m long leans against a vertical wall so that the foot of the plank is 4m away from the wall. A lizard climbs 2m up the plank. Calculate the horizontal distance between the lizard and the wall. A group is considered monophyletic if A. all members of the group share a common ancestor that is included in the group. B. all members share homoplastic traits. C. the group does not contain the most recent common ancestor. D. not all descendants of the common ancestor are included. E. it is the most parsimonious grouping. If two numbers differ by 9 the same of their squares is 653. What are the numbers? Triangle ABC is a right triangle.Triangle A B C. Angle A is x degrees, B is 90 degrees, C is (x minus 10) degrees. The exterior angle to angle C is (2 x + 40) degrees.Which equations can be used to find the value of x? Check all that apply.x + 90 + (x minus 10) = 180x + 90 + (2 x + 40) = 1802 x + 80 = 180x + 90 = 2 x + 40(x minus 10) + 90 = 2 x + 40 #What is the value of the discriminant for the quadratic equation 3 = x2 + 2x?Discriminant = b2 4ac84816 On a job interview, Mary is asked to describe herself. She begins to talk about her earliest memories and the favorite places she visited as a child. Although this is a description of herself, this type of _____ is probably NOT what the interviewers were looking to hear. Company J must choose between two alternate business expenditures. Expenditure 1 would require a $80,000 cash outlay and Expenditure 2 requires a $60,000 cash outlay. a. Determine the marginal tax rate at which the after-tax cash flows from the two expenditures are equal assuming that Expenditure 1 is fully deductible and Expenditure 2 is nondeductible. b. Determine the marginal tax rate at which the after-tax cash flows from the two expenditures are equal assuming that Expenditure 1 is 50% deductible and Expenditure 2 is nondeductible. Read the following excerpt from The Gift of the Magi and answer the question. For there lay The Combs--the set of combs, side and back, that Della had worshipped long in a Broadway window. Beautiful combs, pure tortoise shell, with jewelled rims--just the shade to wear in the beautiful vanished hair. They were expensive combs, she knew, and her heart had simply craved and yearned over them without the least hope of possession. And now, they were hers, but the tresses that should have adorned the coveted adornments were gone. But she hugged them to her bosom, and at length she was able to look up with dim eyes and a smile and say: "My hair grows so fast, Jim! And them Della leaped up like a little singed cat and cried, "Oh, oh!" Jim had not yet seen his beautiful present. She held it out to him eagerly upon her open palm. The dull precious metal seemed to flash with a reflection of her bright and ardent spirit."Isn't it a dandy, Jim? I hunted all over town to find it. You'll have to look at the time a hundred times a day now. Give me your watch. I want to see how it looks on it." Instead of obeying, Jim tumbled down on the couch and put his hands under the back of his head and smiled."Della," said he, "let's put our Christmas presents away and keep 'em a while. They're too nice to use just at present. I sold the watch to get the money to buy your combs. And now suppose you put the chops on." The magi, as you know, were wise men--wonderfully wise men--who brought gifts to the Babe in the manger. They invented the art of giving Christmas presents. Being wise, their gifts were no doubt wise ones, possibly bearing the privilege of exchange in case of duplication. And here I have lamely related to you the uneventful chronicle of two foolish children in a flat who most unwisely sacrificed for each other the greatest treasures of their house. But in a last word to the wise of these days let it be said that of all who give gifts these two were the wisest. O all who give and receive gifts, such as they are wisest. Ev using appropriate properties , find 7/5 5/12 3/12 7/5 1/15 Monica makes tomato sauce with the plants she grows in her garden. She uses 3 basil leaves in her sauce for every 8 tomatoes. She is making a big batch of sauce with 32 tomatoes from her garden. Which statement describes the motion of the sun? The sun rotates more slowly at its equator. The sun rotates faster at its equator. The sun rotates faster at its poles. The sun does not rotate at its poles. what was the last sen state occupied by prithvi Narayan Shah? What medication would you anticipate administering to a six month old having an active tonic-clonic seizure? QUESTION 4Which action is the best method for assessing fluid balance?O a. Ask the client what his daily fluid intake usually is?O b. As the client to describe his daily elimination patterns.O c. Compare the amount of a client's fluid intake with fluid output.d. Summarize the client's daily diet and analyse his fluid needs. The problem-solving interpersonal style of conflict has: High cooperation and low assertiveness low assertiveness and low coooperation high cooperation and high assertiveness none of the above Martha, Lee, Nancy, Paul, and Armando have all been invited to a dinner party. They arrive randomly, and each person arrives at a different time. a. In how many ways can they arrive? b. In how many ways can Martha arrive first and Armando last? c. Find the probability that Martha will arrive first and Armando last.Show your work What role do themes play in historians' efforts to organize information about the past? A. They help historians focus on the effects of one important idea on different societies over time. B. They help historians decide whether or not a primary source is credible. C. They allow historians to better understand how earlier historians interpreted past events. D. They make it possible for historians to gain a deep understanding of a particular region. You order CDs for $14.25 each and the website charges $4.50 for each shipment.The expression $14.25p + $4.50 represents the cost of p CDs. Find the total cost forordering 4 CDs.