A personal firewall software can block processes from accessing a network connection as well as applying filtering rules. A personal firewall protects the local host only, while a network firewall filters traffic for all hosts on the segment behind the firewall. Group of answer choices True False

Answers

Answer 1

The statement that a personal firewall software can block processes from accessing a network connection as well as applying filtering rules, and that a personal firewall protects the local host only, while a network firewall filters traffic for all hosts on the segment behind the firewall is true.

A personal firewall is a piece of software that is used to protect a personal computer from unwanted access and interference from unauthorized networks and traffic. A personal firewall protects only the computer on which it is installed, and it does this by stopping any unauthorized access that attempts to pass through its system.

Personal firewalls, which are also known as desktop firewalls, monitor all of the traffic that flows in and out of your computer. The firewall examines all incoming and outgoing packets and compares them to preconfigured sets of rules to determine whether or not they should be allowed to pass through.

Learn more about Firewall: https://brainly.com/question/31753709

#SPJ11


Related Questions

how was bluetooth invented just curious

Answers

Answer:

Hope this helps

Explanation:

Have a great day ahead

how was bluetooth invented just curious

typically provide students with a general understanding of information technology, including computer platform technologies, data management systems, and basic programming. A Master Degree programs B Cisco degree programs C Associate degree programs D CertaPort degree programs​

Answers

Answer:

the correct answer is ''associate degree programs"

Explanation:

because i took the test and got this answer right. hope this helps :)

Examples of 15 viruses in computer
Examples of 15 antiviruses in computer
Please fast​

Answers

Computer Viruses:

Morris Worm
Nimda
ILOVEYOU
SQL Slammer
Stuxnet
CryptoLocker
Conficker
Tinba
Welchia
Shlayer

Anti-viruses:

Esafe
Avast
Avira AntiVirus
e Trust Antivirus
Dr Web by
NOD32
F-Secure Antivirus
AVG Anti-virus
.Kaspersky Antivirus
McAfee Antivirus
eScan
PC-Cillin
Symantec Antivirus

Design an application for the Sublime Sandwich Shop. The user makes sandwich order choices from list boxes, and the application displays the price. The user can choose from three main sandwich ingredients: chicken at $6. 99, beef at $7. 99, tuna at $8. 99. The user also can choose from three different bread types: white, rye, whole wheat at no change in cost

Answers

import javax.swing.*;

import java.awt.*;

import java.awt.event.*;

public class JSandwich extends JFrame implements ItemListener {

 FlowLayout flow = new FlowLayout();

 JLabel companyName = new JLabel("Sublime Sandwich");

 JComboBox<String> mainBox = new JComboBox<String>();

 JLabel mainList = new JLabel("Main ingredient");

 JComboBox<String> breadBox = new JComboBox<String>();

 JLabel breadList = new JLabel("Breads");

 JTextField totPrice = new JTextField(10);

 int mainNum, breadNum;

 double[] mainPrices = {6.99, 7.99, 8.99};

 double sumPrice = mainPrices[0];

 double breadPrice = 0;

 double mainPrice = mainPrices[0];

 double[] breadPrices = {0, 0, 0};

 String output;

 public JSandwich() {

   // code here

 }

 public static void main(String[] arguments) {

   JSandwich sandframe = new JSandwich();

   sandframe.setSize(240, 200);

   sandframe.setVisible(true);

 }

 public void itemStateChanged(ItemEvent list) {

   //

 }

}

Which attackers grant themselves a higher access level such as administrator, allowing the attacker to perform illegal actions such as running unauthorized code or deleting data

Answers

Attackers who grant themselves a higher access level, such as administrator, are commonly known as privilege escalation attackers. Privilege escalation refers to the act of gaining elevated privileges on a computer system or network.

This allows the attacker to perform illegal actions, such as running unauthorized code or deleting data. There are various techniques that privilege escalation attackers may employ, including exploiting vulnerabilities in the operating system, misconfigurations, or weak user credentials.

Once the attacker gains administrative access, they have full control over the targeted system and can carry out their malicious activities. It is important for organizations to implement strong security measures, such as regular patching and updates, strong user authentication, and proper access controls, to mitigate the risk of privilege escalation attacks.

To know more about Attackers visit:

https://brainly.com/question/33329734

#SPJ11

Hello,
I need help with (MATLAB) programs because I want to create a task to simulate the probability of getting the following hands on a given:
•Couple
•Two pairs
•Triss
•Quad number
•Cook
•Ladder
Note that if the deal contains four identical cards, it only counts as a four and not also a pair or three.
The statistics should be plotted as a bar chart where the height of the bars indicates
the probability in percent. The program that simulates the statistics must receive
one argument, the number of rolls to base the statistics on.

Answers

To simulate the probability of getting specific hands in a card game using MATLAB, you can create a program that takes the number of rolls as an input and generates statistics. The statistics can be plotted as a bar chart, where the height of the bars represents the probability in percentage.

To create the MATLAB program, you would start by defining the rules of the card game and the conditions for each hand (e.g., couple, two pairs, triss, quad number, cook, ladder). Then, you can implement a loop that performs the desired number of rolls, randomly generating card combinations and keeping track of the occurrence of each hand.
Within the loop, you would check if the current combination matches any of the defined hands. If a match is found, you increment the corresponding counter. After the loop completes, you calculate the probabilities by dividing the frequency of each hand by the total number of rolls and multiplying by 100 to get the percentage.
Finally, you can use the bar chart function in MATLAB to plot the statistics, where each hand corresponds to a bar, and the height of the bar represents the probability of obtaining that hand.
By executing this program with different numbers of rolls, you can observe how the probabilities of getting specific hands vary and gain insights into the dynamics of the card game.

learn more about MATLAB here

https://brainly.com/question/30760537



#SPJ11

6.3.6: Create your own Encoding on codehs be confusing.

6.3.6: Create your own Encoding on codehs be confusing.
6.3.6: Create your own Encoding on codehs be confusing.

Answers

A general example of an encoding scheme that contains A-Z and space is given below.

How to illustrate the information

In this example, we can assign the following binary codes to each character:

A: 00

B: 01

C: 10

...

Z: 10101

Space: 10110

Using this encoding scheme, the phrase "HELLO WORLD" would be represented as:

00010101100101100110000010101011001010000001101

As you can see, this encoding scheme requires a varying number of bits to represent each character, with shorter codes assigned to more commonly used letters and longer codes assigned to less commonly used letters. This can help to minimize the total number of bits required to encode a message.

Learn more about encoding on

https://brainly.com/question/3926211

#SPJ1

You are designing a simple calculator program for young children to use. Right now, if they do something that the program didn’t expect, a message appears that reads, “User input deemed invalid.” What changes could you make so that the message would be more suitable for this audience?

Answers

The change you could make to make the message more suitable for this audience would be to identify a suitable message so that the children understand that they made a mistake using the program. For example: You made a mistake, try again.

What is a user input?

A user input is a term that refers to the action performed by a user of a digital system or a specific program. This message has been standardized to indicate to the user that he has made a mistake in pressing buttons or in handling a program.

How to modify the message?

To modify the message we must edit the base font of the program so that the message that we want to appear on the screen is different. On the other hand, we must identify a message that is simple and direct so that the children understand that they made a mistake when using the program.

What message can we put for the children?

The right message for children should clearly communicate to them what has happened without discouraging them. So a suitable example of a message would be:

You've made a mistake, try again.

Learn more about user input in: https://brainly.com/question/8789964

#SPJ1

A hacker is trying to gain remote access to a company computer by trying brute force password attacks using a few common passwords in conjunction with multiple usernames. what specific type of password attack is the hacker most likely performing?

Answers

Maybe A Birthday password some times befor the hacker hacks a company computer they get the worker information so if they get your information they could see your passwords and try to do that because if the workers all share the same password becsuse the company computer so they need the same password the hacker could just use that password because the owner/boss is most likely gonna use the same password that’s a 80% chance

Answer: Password Spraying Attack

Explanation:  A password spraying attack happens in two steps. An attacker acquires a list of usernames, then attempts logins across all usernames using the same password. The attacker repeats the process with new passwords until the attack breaches the target authentication system to gain account and systems access.

Why is it important to take precautions such as turning off a computer and discharging electricity before
opening the case on a computer?
O The case requires battery operation only when being opened.
O The case is locked until the computer is unplugged.
/
O Memory will be lost if the case is removed while connected to electricity.
O The internal components are static sensitive.

Answers

The reason why is it important to take precautions such as turning off a computer and discharging electricity before opening the case on a computer is: "The internal components are static sensitive." (Option D)

What is the rationale for the above response?  

It is important to take precautions such as turning off a computer and discharging electricity before opening the case on a computer because the internal components of a computer are sensitive to static electricity.

Static electricity can build up in the body or in clothing and can cause a discharge of electricity when in contact with sensitive electronic components. This discharge can damage or destroy the components, leading to the malfunctioning or failure of the computer.

By turning off the computer and discharging any residual electricity, the risk of a static discharge is minimized.

Learn more about static sensitive at:

https://brainly.com/question/18354578

#SPJ1

What term refers to a person using a computer to perform routine tasks other than systems administration

Answers

Answer:

end user

Explanation:

An end user refers to a person using a computer system to perform routine tasks such as listening to music, formatting a document, creating graphic designs, surfing the web, etc., rather than perform systems administration. Thus, an end user is the individual for whom a software application or computer system is created for, especially to perform basic or routine tasks.

For example, a network or system administrator is saddled with the responsibility of implementing changes on an end user's network and network devices in order to get an optimum level of performance.

i think it is a or c is it right?

i think it is a or c is it right?

Answers

C
She is emailing her boss that something is wrong.

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

5. The image file format most suited for photographs is what? *


Answers

Answer:

TIFF

Explanation:

My mom was a photographer. This is a Tagged image file format. This is where you store images..

Answer:

JPG/JPEG (Joint Photographic Experts Group)

The most common one used is JPG or JPEG (they're the same thing). It's a bit rarer, but PNG also works well.

If you look up an image on the internet, they're most likely to be in one of these formats. These formats are used because they tend to be the most versatile and have the fewest restrictions in terms of computer.

Which term defines and describes data and its relationship?

data requirements

project modeling

project infrastructure

data modeling

Answers

Answer:

data modeling

Explanation:

Data model. A formal method of describing data and data relationships. Entity-relationship (ER) modeling. A conceptual database design method that describes relationships between entities.

Rate these 3 fnaf characters from 1-3 tell me who you find the scariest as well
MICHEAL AFTON CIRCUS BABY GOLDEN FREDDY

Answers

Answer:

Golden Freddy is the scariest in my opinion

Answer:

Micheal Afton=3/3

Circus Baby=3-3

Golden Freddy=2/3

In my opinion, I'd say Circus Baby because of how her voice sounds like.

What icon indicated video mode?
Av
Tv
The video camera icon

Answers

The video camera icon indicated video mode.

The video camera icon is a universally recognized symbol that indicates video mode on electronic devices such as cameras, smartphones, and video recorders. This icon usually appears on the interface of the device, usually on the screen or as a button that you can press, when you are in video mode, and it allows you to record videos.

AV and TV icons are related to audio-video and television, but they are not used specifically to indicate video mode. AV icon can be used for different purposes such as indicating the audio-video input/output of a device or indicating an audio-video format. The TV icon is used to indicate the television mode, which typically refers to the display mode of a device.

You have been on the phone with a user in a remote office for 30 minutes troubleshooting their minor desktop problem. No matter how many times you explain the solution to them, they do not understand what you are saying. What should you do?

A. Go to the user's site
B. Suggest they call back tomorrow
C. Suggest they call another technician
D. Suggest you talk to their manager

Answers

Answer:

D

Explanation:

First when you are troubleshooting a client your main goal is to solve their issue, you dont want to say hey call later i cant help you or say call someone else because picture this you need help and someone hangs up on you or says (B.) or (C.) it comes off as rude i would say. Regarding (A.) im not 100% sure what exactly do you mean by user's site? But asking for their manager (D.) or someone else (preferably higher up) seems to be the right action to be taken.

The phone with a user in a remote office for 30 minutes troubleshooting their minor desktop problem.  D. Suggest you talk to their manager

How do you resolve troubleshooting problems?

To run a troubleshooter:

Select Start > Settings > Update & Security > Troubleshoot, or select the Find troubleshooters shortcut at the end of this topic.

Select the type of troubleshooting you want to do, then select Run the troubleshooter.

Allow the troubleshooter to run and then answer any questions on the screen.

To learn more about troubleshooting desktop problem, refer

https://brainly.com/question/15714846

#SPJ2

the word item referred to as a: A.value B.label C.Formula​

Answers

I think it’s C If wrong I’m sorry

Convert any argument that is actually a number, from its string form into an integer using sscanf(). as a small hint, look at the return type of sscanf(), notice that if it makes a match, you get the

Answers

A  program written in C Language is given below to convert an argument that is actually a number, from its string form into an integer using sscanf():

#include <stdio.h>

int main() {

   char str[50]; // string containing the number

   int num; // integer to store the converted value

   printf("Enter a number: ");

   scanf("%s", str);

   if (sscanf(str, "%d", &num) == 1) {

       printf("The number is: %d\n", num);

   } else {

       printf("Invalid input\n");

   }

   return 0;

}

Explanation:
In this code, a character array "str" is declared to store the input string, and an integer num to store the converted value. The scanf() is used to read the input string from the user. sscanf()  is used to attempt to convert the input string to an integer. The %d format specifier tells sscanf() to look for a decimal integer, and the &num argument specifies the memory address where the converted value should be stored. sscanf() returns the number of successfully converted items. In this case, we expect it to return 1 if the conversion was successful. If it returns 0 or any other value, it means that the input was not a valid integer. The return value of sscanf() is checked. If it is 1,  the converted integer value is printed on the screen otherwise, an error message is printed to indicate that the input was invalid.

To know more about C Language  click here:

https://brainly.com/question/13566127

#SPJ11

what is the internet revolution

Answers

Answer:

Down below

Explanation:

The Internet age began in the 1960s, when computer specialists in Europe began to exchange information from a main computer to a remote terminal by breaking down data into small packets of information that could be reassembled at the receiving end. ... The system was called packet-switching

Answer:

I think it was when the internet was on the come up like the .com boom that happened and ended up making people lose a lot of money

Explanation:

yup

Which of the following describes an action that serves a goal of equity

Answers

Answer:

Please complete your sentence for me to answer.

Enter a function in cell H12, based on the payment and loan details, that calculates the amount of cumulative principal paid on the first payment. Be sure to use the appropriate absolute, relative, or mixed cell references.
Facility Amortization Table 4 Loan Details Payment Details 6 Payment 7 APR 8 Years 9 Pmts per Year 10 $4,972.00 3.25% Loan Periodic Rate # of Payments $275,000.00 0.271% 60 12 Beginning Payment Principal RemainingCumulative Cumulative Payment Number Interest Principal Balance Amount Interest PaidRepayment Balance $275,000.00 $4,972.00 ($89.89) 12 13 14 15 16 17 18 19 20 21 4 6 10 23 24 25 26 27 28 12 13 14 15 16 17

Answers

In order to execute the above task successfully on Microsoft Excel, that is, calculating the Cumulative Principal paid, you must use the CUMPRINC function in excel which is given as: =CUMPRINC(rate, nper, pv, start_period, end_period, type)

How does the CUMPRINC function work?

It is to be noted that the CUMPRINC function employs the following logic:

Rate (necessary argument) - The interest rate per period.NPER (necessary argument) - The total number of payment periods required to repay the loan or investment.PV (mandatory parameter) - This is the loan/present investment's current value.Start_period (mandatory parameter) - The number of the beginning period to compute interest over. It must be an integer between 1 and the NPER given.End_period (mandatory parameter) - The final period over which interest should be calculated. It must be an integer ranging from 1 to the given NPER. Type (Mandatory parameter) -  This defines when the payment will be made. It might be either 0 or 1. It is an integer that indicates whether the payment is made at the beginning of the period (0) or at the end of the period (1).

In the above case,

Rate = 3.25%

NPER = 17
PV = $275,000
Start_Period = 1
End_Period is 60
Type = 0

Learn more about Microsoft Excel Functions:
https://brainly.com/question/17960032
#SPJ1

A leading pharmaceutical company is launching a major transformation of its entire Cloud operations in order to more quickly and efficiently perform research and conduct clinical trials.How can a Cloud-first strategy help this client?

Answers

This is a great move for the Pharmaceutical company for a number of reasons.

The first and perhaps most important advantage is to the company is that costs relating to Information and Technology (IT) Infrastructure will be reduced to the barest minimum. As a start-up, it is important to keep costs as low as possible. Costs are kept low because the organization will not need to pay the added energy and personnel-related costs of maintaining an elaborate IT infrastructure.

The advantage of scalability. Scalability in this sense simply means the ability to take on additional workload or adjust to market demand. As the company grows and attracts more clients, it would need to expand beyond the capacity that it had at the onset. Opting for Cloud as a Service (CaaS) gives them this advantage.

Another way CaaS can help the client is that they enjoy the advantage of Business Continuity. Business Continuity is the ability to remain in business regardless of disruptions to the business itself at one location. This is because CaaS providers are structured in such a way that they are able to keep their subscribers in operation regardless of any disasters.

Other advantages to this client are:

Ease and access of automatic updates to the system;Ease of collaboration between internal and external users of the same system.

Learn more about the merits of Cloud as a Service here:

https://brainly.com/question/24705780

A leading pharmaceutical company is launching a major transformation of its entire Cloud operations in


Solution of higher Differential Equations.
1. (D4+6D3+17D2+22D+13) y = 0
when :
y(0) = 1,
y'(0) = - 2,
y''(0) = 0, and
y'''(o) = 3
2. D2(D-1)y =
3ex+sinx
3. y'' - 3y'- 4y = 30e4x

Answers

The general solution of the differential equation is: y(x) = y_h(x) + y_p(x) = c1e^(4x) + c2e^(-x) + (10/3)e^(4x).

1. To solve the differential equation (D^4 + 6D^3 + 17D^2 + 22D + 13)y = 0, we can use the characteristic equation method. Let's denote D as the differentiation operator d/dx.

The characteristic equation is obtained by substituting y = e^(rx) into the differential equation:

r^4 + 6r^3 + 17r^2 + 22r + 13 = 0

Factoring the equation, we find that r = -1, -1, -2 ± i

Therefore, the general solution of the differential equation is given by:

y(x) = c1e^(-x) + c2xe^(-x) + c3e^(-2x) cos(x) + c4e^(-2x) sin(x)

To find the specific solution satisfying the initial conditions, we substitute the given values of y(0), y'(0), y''(0), and y'''(0) into the general solution and solve for the constants c1, c2, c3, and c4.

2. To solve the differential equation D^2(D-1)y = 3e^x + sin(x), we can use the method of undetermined coefficients.

First, we solve the homogeneous equation D^2(D-1)y = 0. The characteristic equation is r^3 - r^2 = 0, which has roots r = 0 and r = 1 with multiplicity 2.

The homogeneous solution is given by,  y_h(x) = c1 + c2x + c3e^x

Next, we find a particular solution for the non-homogeneous equation D^2(D-1)y = 3e^x + sin(x). Since the right-hand side contains both an exponential and trigonometric function, we assume a particular solution of the form y_p(x) = Ae^x + Bx + Csin(x) + Dcos(x), where A, B, C, and D are constants.

Differentiating y_p(x), we obtain y_p'(x) = Ae^x + B + Ccos(x) - Dsin(x) and y_p''(x) = Ae^x - Csin(x) - Dcos(x).

Substituting these derivatives into the differential equation, we equate the coefficients of the terms:

A - C = 0 (from e^x terms)

B - D = 0 (from x terms)

A + C = 0 (from sin(x) terms)

B + D = 3 (from cos(x) terms)

Solving these equations, we find A = -3/2, B = 3/2, C = 3/2, and D = 3/2.

Therefore, the general solution of the differential equation is:

y(x) = y_h(x) + y_p(x) = c1 + c2x + c3e^x - (3/2)e^x + (3/2)x + (3/2)sin(x) + (3/2)cos(x)

3. To solve the differential equation y'' - 3y' - 4y = 30e^(4x), we can use the method of undetermined coefficients.

First, we solve the associated homogeneous equation y'' - 3y' - 4y = 0. The characteristic equation is r^2 - 3r - 4 = 0, which factors as (r - 4)(r + 1) = 0. The roots are r = 4 and r = -1.

The homogeneous solution is

given by: y_h(x) = c1e^(4x) + c2e^(-x)

Next, we find a particular solution for the non-homogeneous equation y'' - 3y' - 4y = 30e^(4x). Since the right-hand side contains an exponential function, we assume a particular solution of the form y_p(x) = Ae^(4x), where A is a constant.

Differentiating y_p(x), we obtain y_p'(x) = 4Ae^(4x) and y_p''(x) = 16Ae^(4x).

Substituting these derivatives into the differential equation, we have:

16Ae^(4x) - 3(4Ae^(4x)) - 4(Ae^(4x)) = 30e^(4x)

Simplifying, we get 9Ae^(4x) = 30e^(4x), which implies 9A = 30. Solving for A, we find A = 10/3.

Therefore, the general solution of the differential equation is:

y(x) = y_h(x) + y_p(x) = c1e^(4x) + c2e^(-x) + (10/3)e^(4x)

In conclusion, we have obtained the solutions to the given higher-order differential equations and determined the specific solutions satisfying the given initial conditions or non-homogeneous terms.

To know more about Differential Equation, visit

https://brainly.com/question/25731911

#SPJ11

The GPS device in an automobile uses which communication channel?

A) Infrared

C) Microwave

B) Radio Frequency (RF)

D) Satellite

Answers

It is to be noted that the GPS device in an automobile uses the communication channel described as a "satellite communication channel" (Option D).

What is a satellite communication channel?

The path the signal follows from the earth station is defined as a satellite communication channel. Satellite-earth station (transmitter) (receiver). The signal is sent from the ground by powerful transmitters, then strengthened inside the satellite and relayed back to the earth.

A communication satellite is a man-made spacecraft that sends a signal via a transponder by establishing a channel between the and the receiver at separate Earth locations. Satellite communications are used in telephone, radio, television, internet, and military applications.

Learn more about satellite communication channels:
https://brainly.com/question/14930739
#SPJ1

See if you can figure out what these tricky brain teasers are trying to say. *
THAN life

Answers

“THAN life”,, I’m pretty sure it means Bigger than Life. But If i’m wrong.. I’m sorry!

To work in a field like mining or drilling, a person must be which of the following?

Answers

To work in a field like mining or drilling, a person must be: able to handle physical work.

What the person must be able to do

To work in a field like mining or drilling, it is very important that the individual be physically fit to take up that responsibility.

The reason is that the ob often involves tilling the ground and going into depths in order to find the precious item that they seek. This could be gold, oil, or other items.

Learn more about mining here:

https://brainly.com/question/1278689

#SPJ1

lewis must create a code for his locker. it must be 3 characters long. for each character, he may choose from all ten digits (0-9), and he may not repeat digits. how many different codes can he create?

Answers

, Lewis can create 720 different codes for his locker.

To calculate the number of different codes Lewis can create for his locker, we can use the concept of permutations. Since he has 10 digits to choose from (0-9) for each of the three characters, and he cannot repeat digits, the number of different codes can be calculated as follows:
For the first character, he can choose from 10 digits (0-9).
For the second character, since he cannot repeat digits, he can choose from 9 remaining digits.
For the third character, he can choose from 8 remaining digits.
To calculate the total number of different codes, we multiply these choices together:
10 (choices for the first character) * 9 (choices for the second character) * 8 (choices for the third character) = 720.

To know more about codes visit:

brainly.com/question/29405280

#SPJ11

What is the place value position of the 7 in the number below?

1,376

A ones) b tens) c hundreds) d thousands)

Answers

Tens hope that helps
The answer is b tens
Other Questions
A drive for a punch press requires 40 hp with the pinion speed of 800 rpm and the gear speed of 200 rpm. Diametral pitch is 4, the steel pinion has 24 teeth and the steel gear has 95 teeth. Gear teeth are 20, full-depth, involute shape. Calculating the required allowable bending and contact stresses for each gear. Also, select the suitable steel for the pinion and gear and specify it. Use the following parameters and calculate the ones which are not given!Km = 1.22Ks = 1.05 Ko= 1.75KB = 1.00Av = 10SF = 1.25KR = 1.25F = 3.00 inNcp=1.35 10 cycles NCG-3.41 10 cycles Convert the rational expression to radical form.x^{4/3}y^{1/3}z^{2/5}Plz help find the reduced racial form of each expression: 1: 3^4/9m^2 ?2:63-700112 ?3: (a^2b^8/a^1/3)^3/4 ? 4: ^41024x^9y^12 ? 5:4^381 - 2^372 - ^324 ? 6: ^52pq^6 2 2p^3q ?HELP PLEASE ILL DO ANYTHING. (show explanation pls) the number of electrons in the outer energy level of a neutral atom of boron (atomic number 5) is group of answer choices 5. 3. 8. 2. 10. 19y+36=150 solve the equation A fair coin is tossed 3 times. Whatis the probability of getting 2heads in a row, given that exactly2 heads occur? Please help!! Here are Stages 1-4. What stage will have closest to 1,000,000,000 circles? Use a calculator if it helps you with your thinking. Determine whether the relationship is linear, quadratic, or neither by completing each table. Be sure to givea reason for your choice. Essential College Supplies (ECS) is a store on the campus on a large Midwestern university. The store has both an apparel section (t-shirts with the school logo) and a convenience section. ECS reports revenues for the apparel section separately from the convenience section. Requirement Classify each cost item (A-H) as follows: a. Direct or indirect (D or I) costs of the total number of t-shirts sold. b. Variable or fixed (V or F) costs of how the total costs of the apparel section change as the total number of t-shirts sold changes. (If in doubt, select on the basis of whether the total costs will change substantially if there is a large change in the total number of t-shirts sold.) Requirement a. Classify each cost item (A-H) as direct or indirect (D or I) costs of the total number of t-shirts sold. Cost Item D or A. Annual fee for licensing the school logo b. Cost of store manager's salary c. Costs of t-shirts purchased for sale to customers d. Subscription to College Apparel Trends magazine e. Leasing of computer software used for financial budgeting at the ECS store f. Cost of coffee provided free to all customers of the ECS store g. Cost of cleaning the store every night after closing h. Freight-in costs of t-shirts purchased by ECS A survey found that the ratio of students who play intruments to those who do not was 7/20 of the students do not play an instrument 440 surveyd how many students surveyd play an instument A grab-bag contains 30 packages worth $. 65 each, 10 packages $. 60 cents each, and 15 packages worth $. 30 each. How much should the game owner charge to make it a fair game?$0. 55$0. 40$0. 60$0. 30 . Which situation can be represented by the equation 2.c + 150 = 5x? There is a claim from the 1960s that 35% of women had college educations in the 60s. To prove it had increased in the 70s, we randomly pulled education records of 395 women and found that 161 had college educations. Running a hypothesis test, we found a p-value of 0.0088. The interpretation of the p-value is___. factorise 14^2-x-3 please helppp Draw three possible monohalogenation products for this reaction. A Brz (1 equiv) hv 1 1 1 . 1 . . Draw a 3 Product Select to Draw 10 Product + Work Screen Bry (1 equiv) hv 1 1 1 . Draw a 3 Product + Select to Draw zoaleri Product 1 1 1 1 1 1 . . Draw a 2 Product . the elements in a column of the periodic table Question Completion Status? Ithmaar Holding B.S.C. (Bahrain Bourse, #THMRS) is considering two independent projects that have the following cash flows. Year Project A Project B $ 22,000 $ 55,000 17,000 15,000 2 6.000 25.000 3 7.000 35,000 10% 9% Discount rate a) Calculate the Net Present Value (NPV) methods and explain which project is better. (1.5 marks) b) Calculate the Internal Rate of Return (IRR) of the two projects and explain which project is better. (1.5 marks) c) Calculate the Profitability Index (Pl) of the two projects and explain which project is better. (1.5 mark) Note: You are allowed to use Financial Calculator For the toolbar nace ALT+F10 (PCL or ALT+FN510/Mack hou All Angers to save all answers, See Al Ans Save and Submit why is cellular respiration necessary for living organisms? why is fermentation less effective than respiration? what is the purpose of glycolysis? how many atp molecules are produced in aerobic respiration? how many atp molecules are produced during fermentation and glycolysis? Which is the best slogan for a public service announcement?Children Who Exercise Are HealthyExercise: It Gets Your Heart PumpingIf You Dont Exercise, You Might Get SickExercise: Physical Exertion for Health do all planets move in the same way and the same speed