a typical iot device is secured when purchased from vendors.

Answers

Answer 1

When it comes to the security of IoT devices, it is important to understand that not all devices are created equal. While some vendors may prioritize security in their products, others may not invest the same amount of resources into securing their devices.



In general, a typical IoT device may have some basic security measures in place when it is purchased from a vendor. This may include features like password protection and encryption for data transmission. However, these measures may not be sufficient to protect the device from more advanced threats, such as malware or hacking attempts.

Furthermore, even if a device is initially secure when purchased, this does not mean that it will remain secure over time. As new vulnerabilities are discovered and new attack methods are developed, vendors may need to release updates and patches to address these issues. However, not all vendors are equally diligent about providing these updates, and some may even stop supporting older devices altogether, leaving them vulnerable to attack.


Therefore, while it is true that a typical IoT device may have some level of security when it is purchased from a vendor, it is important to take additional steps to secure the device and protect it from potential threats. This may include things like regularly updating firmware, using strong passwords, and configuring the device to limit its exposure to external networks. By taking these steps, users can help ensure that their IoT devices are as secure as possible and less vulnerable to attack.

To know more about IoT devices visit:-

https://brainly.com/question/31172264

#SPJ11


Related Questions

your company plans to migrate all its data an resources to azure the omapnys migration plan states that the only platform as a service (paas) solutions must be used to azure you need to deploy an azure envirment that meets the company migration plan soulution you create an azure app serive and azure storage accounts will this work?

Answers

Whenever you create an Azure app service and Azure storage account, it will really function. According to the company's migration strategy, Azure can only be utilized for a service platform (PaaS) solutions.

By data, what do you mean?

Data is information that's been transformed into a format that is useful for transfer or processing in computers. Data is information that has been transformed into binary digitally for use with modern computers and communication mediums.

What are an example and data?

Text, observations, figures, photographs, statistics, graphs, and symbols are just a few examples of the many diverse ways that data can be presented. For instance, data may include precise prices, weights, names, names, ages, climates, dates, or lengths. Data on its own is a raw type of knowledge.

To know more about Data visit :

https://brainly.com/question/11941925

#SPJ4

Why is it important to look for key details in an article?

Answers

It is important to look for key details in an article because meant to give you the evidence for a wider idea.

Why is it important to identify key details?

The main topic or key idea of a text is known to be that which tells you or give you the key details that can be used to describe a text.

Note that Supporting details help us to know better the main idea and as such, It is important to look for key details in an article because meant to give you the evidence for a wider idea.

Learn more about article from

https://brainly.com/question/1070116

#SPJ1

In cell J9, use the CORREL function to test for a correlation between sales data and milestones reached.

Answers

To use the CORREL function to test for a correlation between sales data and milestones reached in cell J9, follow these steps:

1. Gather your sales data in a range of cells, for example A1:A10.
2. Gather your milestones data in another range of cells, for example B1:B10.
3. Click on cell J9 to make it the active cell.
4. Enter the CORREL function: =CORREL(A1:A10, B1:B10).
5. Press Enter.

In cell J9, the CORREL function will now calculate the correlation between the sales data in the range A1:A10 and the milestones reached in the range B1:B10. The resulting value will indicate the strength and direction of the correlation.

This will calculate the correlation coefficient between the two data sets, which will indicate the strength and direction of the relationship between sales and milestones reached. The result will be a value between -1 and 1, where -1 indicates a perfect negative correlation, 1 indicates a perfect positive correlation, and 0 indicates no correlation.

To know more about correlation function visit:

https://brainly.com/question/31546990

#SPJ11

To use the CORREL function to test for a correlation between sales data and milestones reached in cell J9, follow these : Gather your sales data in a range of cells, for example A1:A10.

In cell J9, the CORREL function will now calculate the correlation between the sales data in the range A1:A10 and the milestones reached in the range B1:B10. The resulting value will indicate the strength and direction of the correlation. This will calculate the correlation coefficient between the two data sets, which will indicate the strength and direction of the relationship between sales and milestones reached. The result will be a value between -1 and 1, where -1 indicates a perfect negative correlation, 1 indicates a perfect positive correlation, and 0 indicates no correlation.

Learn more about correlation function visit:

https://brainly.in/question/40546464

#SPJ11

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

How to do the for loop in python

Answers

Answer:

To loop through a set of code a specified number of times, we can use the range() function, The range() function returns a sequence of numbers, starting from 0 by default, and increments by 1 (by default), and ends at a specified number.

Explanation:

hope this helps

Choose the word that matches each definition.
a company that provides Internet access to customers for a fee
a protocol (a set of rules) for how web content should be sent and received by a web browser
✓the address of a webpage or website, such as www.microsoft.com/homepage.htm
the options are in the pic

 Choose the word that matches each definition.a company that provides Internet access to customers for

Answers

The definitions are ISP, HTTP and URL

How to define the words

Here are the word matches for each definition:

A company that provides Internet access to customers for a fee: Internet Service Provider (ISP)

A protocol (a set of rules) for how web content should be sent and received by a web browser: Hypertext Transfer Protocol (HTTP)

The address of a webpage or website, such as www.micro.soft.com/homepage.htm: Uniform Resource Locator (URL)

Read more on webpage here:https://brainly.com/question/13171394

#SPJ1

a cyber technician has completed implementing actions on a computer and is ensuring that it is capable of meeting the user's computing needs. from the comptia a troubleshooting model, which step did the technician consider when performing this task? group of answer choices test the theory to determine the cause. verify full system functionality and, if applicable, implement preventive measures. identify the problem. document the findings, actions, and outcomes.

Answers

The cyber technician considered the step "verify full system functionality and, if applicable, implement preventive measures" from the CompTIA A troubleshooting model .

when ensuring that the computer is capable of meeting the user's computing needs. This step involves checking if the computer is functioning properly and taking any necessary measures to prevent future issues. full system functionality and, if applicable, implement preventive measures."

This step is important in ensuring that the computer meets the user's needs. In this step, the technician tests the computer to make sure it is working as expected. They check if all the hardware components and software applications are functioning properly. If any issues are found, they take appropriate actions to fix them. Additionally, the technician may implement preventive measures to avoid future problems, such as installing security software or updating the system regularly.  

To know more about cyber technician visit:

https://brainly.com/question/33094310

#SPJ11

The office of personnel management (opm) requires that federal agencies provide the training suggested by the national institute of standards and technology (nist) guidelines.
a. True
b. False

Answers

The office of personnel management (OPM) requires that federal agencies provide the training suggested by the national institute of standards and technology (NIST) guidelines. (True)

What is federal agency?

Federal agencies are unique government entities created for a specific function, such as resource management, financial regulation of certain sectors, or issues relating to national security. These organizations are typically established by legislative action, though they could also be initially established by presidential order. Usually, the president appoints the directors of these organizations.

The government establishes federal agencies to control businesses or procedures that demand specialized knowledge or close monitoring. Some organizations, including the Federal Deposit Insurance Corporation (FDIC) and the Government National Mortgage Association (GNMA), have the U.S. explicitly support their operations. Treasury.

Only an implicit guarantee from the United States is given to other organizations like Fannie Mae, Freddie Mac, and Sallie Mae. Treasury.

Learn more about federal agency

https://brainly.com/question/29709961

#SPJ4

When people fail to respond to a survey, the data collection process may suffer from nonresponse bias.(True/false)

Answers

When people fail to respond to a survey, it can lead to nonresponse bias is True.

Nonresponse bias

Nonresponse bias occurs when a significant portion of the survey participants do not respond, leading to a potentially unrepresentative sample of the population. This can affect the accuracy and reliability of the survey results. The data collected may not accurately represent the population being surveyed. This can happen when certain groups of people are less likely to respond to the survey, leading to an over or under-representation of certain demographics in the data. It is important to take steps to minimize nonresponse bias, such as using multiple methods of data collection and ensuring that the survey is easy to understand and complete.

To know more about data collection visit:

https://brainly.com/question/21605027

#SPJ11

Which of these sentences correctly shows how youngsters use the Internet?
A.
Youngsters listen to FM radio programs on the Internet.
B.
Youngsters exchange emails with business organizations.
C.
Youngsters plan their study time and read textbooks online.
D.
Youngsters interact with each other with the help of the Internet.

Answers

Answer:

D

Explanation:

This is the only possible answer lol please give brainliest and good luck :)

ou want to configure the NTP daemon to receive time from pool.ntp.org. What entry should you place in the /etc/ntp.conf file?

Answers

Answer:

server pool.ntp.org

Explanation:

1. Write a piece of code that will set the squared root of 70 into integer num1.
Answer:

Answers

The piece of code that will set the squared root of 70 into integer num1 can be seen in the explanation part.

What is programming?

Making a set of instructions that instruct a computer how to carry out a task is the process of programming. Computer programming languages like JavaScript, Python, and C++ can all be used for programming.

Here's an example code in Python that sets the square root of 70 to an integer variable num1:

import math

num1 = int(math.sqrt(70))

Thus, the code imports the math module, which contains the sqrt function to calculate the square root of a number.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ9

Kate saves her work on a secondary storage device that is fairly new, and uses flash technology instead of disks.
Kate is using a(n) __________ drive.

CD/DVD-ROM
SSD
hard disk
optical disk

Answers

Kate saves her work on a secondary storage device that is fairly new and uses flash technology instead of disks. Kate is using an SSD drive. Thus the correct answer is B.

What is a secondary storage device?

The devices that store the information of the user in a protected way outside of the computer with the help of external devices are called secondary storage devices. This includes Hard disk, optical disk, CD disk, and so on.

SSD is an acronym for Solid State Storage Devices. They are silicon-based devices that use non-moving flash memory to store information digitally. These include USB flash drives, SIM cards, SD cards, and pen drives.

SSD will be used to enhance the performance of the computer as they help to provide quick access to information as compared to regular hard drives used due to the latest technology.

Therefore, option B SSD is appropriate.

Learn more about secondary storage devices, here:

https://brainly.com/question/11599772

#SPJ5

Envisioning our family members represented in a mobile, with photos of each member suspended by a thread and connected to bars containing images of other members, may help us better understand the idea that:

Answers

Answer:

Families are systems

Explanation:

first of all a system can be defined as a set of interconnected networks. Family is regarded as a system because it is made up of people who are interrelated and share certain behaviors. This question paints a mental image of a family tree. each of the members are linked related and linked. This goes to show that families are systems based on the definition of a system.


T.L.E

LEARNING ACTIVITY: TRUE OR FALSE
Direction: Tell whether the following sentences are acceptable secting
position while using the computer. Write frue if yes or false if not.
1. Using the preferred keying posture, depending on the style of
keying used
2. The head and neck are in a forward facing and midine
position
3. Having knees at a height higher with the hips
4. Sitting with the body close to the desk
5. Having feet flat on the floor or footrest​

Answers

Having the head and neck forward facing is true

every cell in a relation can hold only a single value. t/f

Answers

True. In a relation, each cell can hold only a single value.

In a relational database, a relation is represented as a table with rows and columns. Each cell in a relation can hold only a single value. This is because the relational model follows the principles of atomicity and data integrity.

Atomicity means that each value in a relation is indivisible and cannot be further divided into smaller components. For example, if we have a relation called 'Students' with columns like 'Name', 'Age', and 'Grade', each cell in the 'Name' column can hold only one student's name, and each cell in the 'Age' column can hold only one age value.

Data integrity ensures that the data in a relation is accurate, consistent, and reliable. By allowing each cell to hold only a single value, the relational model helps maintain data integrity by preventing data duplication or mixing of different types of data within a single cell.

Learn more:

About relation here:

https://brainly.com/question/31111483

#SPJ11

The statement "every cell in a relationship can hold only a single value" is true (T) because, in the field of databases, a relation is referred to as a table.

A table, on the other hand, is made up of rows and columns. Each row is a record, and each column is a field. The table's content is determined by the values of the fields in the table's records. In a relational database, each cell can hold only one value. For example, consider the table below:`ID` | `Name` | `Age`1 | John | 252 | Mary | 303 | James | 28Each cell in the `ID` column contains a single ID value, and no cell in that column can hold two ID values.

Similarly, the `Name` column can only contain a single name-value per cell, and the `Age` column can only contain a single age value per cell. Therefore, it is correct to say that every cell in a relation can hold only a single value.

You can learn more about databases at: brainly.com/question/30163202

#SPJ11

what buttons can be found in page set up group

Answers

The Margins and the Orientation Size, among other commands, are part of the Page Setup group. The buttons for printing the print area, breaks, background, and titles are next.

What is page set up?

The presentation and layout of a printed page are controlled by a set of particular parameters called page setup.

Many contemporary word processors and other document processing programs, such as Microsoft Office programs, include this kind of resource.

There are four tabs in the Page Setup dialog box: Page, Margins, Header/Footer, and Sheet.

The Page Setup group includes several commands, including the Margins and the Orientation Size. The following set of buttons allows you to print the print area, breaks, backdrop, and titles.

Thus, these buttons can be found in page setup group.

For more details regarding page setup, visit:

https://brainly.com/question/16026502

#SPJ9

The most widely used input devices are monitors, printers, and keyboards.
A. False
B. True

Answers

Because monitors and printers are typically output devices rather than input devices, the statement is false.

What exactly are input and output devices?

The hardware components that allow a computer system to interact with users and other devices are known as input and output devices. Keyboards, mice, scanners, microphones, and other input devices send data or commands to the computer for processing.

Keyboards, mice, scanners, microphones, and other input devices allow users to enter data or commands into a computer system.

Monitors, printers, speakers, headphones, and other output devices display or reproduce the processed data. Input and output devices communicate with one another by exchanging signals via cables or wireless connections.

For more information on input devices, go to brainly.com/question/13014455.

#SPJ1

What is the author's purpose for writing this article? A to persuade readers to consider a career in aerospace engineering and at NASA B to caution readers about the difficulties that aerospace engineers encounter C to highlight the experiences of Tiera Fletcher growing up and as an aerospace engineer D to promote Tiera Fletcher's book and her nonprofit organization, Rocket With The Fletchers

Answers

Answer:

C to highlight the experiences of Tiera Fletcher growing up and as an aerospace engineer

Explanation:

Dream Jobs: Rocket Designer, a Newsela article by Rebecca Wilkins was written with the intent of informing the readers of how Tiera Fletcher developed a love for mathematics at an early age and further developed a desire to be a Space Engineer which she succeeded at. She highlighted the different steps she took before she realized her goal. Some of these steps included working as an intern in several space establishments and performing research.

Today, she is very successful in her career and hopes  that young ones can pursue a career in any STEM careers of their choice.

Answer:

c on newsella

Explanation:

Out of 270 racers who started the marathon, 240 completed the race, 21 gave up, and 9 were disqualified. What percentage did not complete the marathon?

Answers

Approximately 11.11% of the racers did not complete the marathon.

To calculate the percentage of racers who did not complete the marathon, we need to find the total number of racers who did not finish the race. This includes both those who gave up and those who were disqualified.

Total number of racers who did not complete the marathon = Number who gave up + Number who were disqualified = 21 + 9 = 30.

Now, we can calculate the percentage using the following formula:

Percentage = (Number who did not complete / Total number of racers) * 100

Percentage = (30 / 270) * 100 = 11.11%.

Learn more about marathon here:

https://brainly.com/question/14845060

#SPJ11

What is output by the following code? Select all that apply.

c = 2




while (c < 12):

print (c)
c = c + 3
Group of answer choices

3

4

6

7

9

2

10

5

12

8

1

11

Answers

Answer:

output:

2

5

8

11

Explanation:

first round: 2

second round: 2+3 = 5

third round: 5+3 = 8

fourth round: 8+3 = 11

fifth round: 11+3 > 12 then stop

What are Vector, Hashtable, LinkedList and Enumeration?

Answers

Vector, Hashtable, LinkedList, and Enumeration are all data structures in programming. A Vector is an ordered collection of elements that can grow or shrink dynamically. It is similar to an array, but it can be resized automatically.

A Hashtable is a collection that stores key-value pairs. It uses a hash function to map keys to values and provides constant-time operations for adding, removing, and retrieving elements.
A LinkedList is a collection of nodes that are linked to each other through pointers or references. Each node contains data and a reference to the next node in the list. LinkedLists can be used to implement dynamic data structures such as stacks, queues, and graphs.
Enumeration is an interface in Java that allows you to iterate over a collection of elements. It defines methods for accessing the next element in a sequence and checking if there are more elements left. It is commonly used with Vector and Hashtable to iterate over their elements.
Vector, Hashtable, LinkedList, and Enumeration are data structures and interfaces in the Java programming language.
1. Vector: A dynamic array that can grow or shrink in size. It stores elements in a contiguous memory location and allows access to elements using an index.
2. Hashtable: A data structure that uses key-value pairs for storing and organizing data. It implements the Map interface and provides quick access to values based on their unique keys.
3. LinkedList: A linear data structure consisting of nodes, where each node contains a data element and a reference to the next node in the sequence. It is useful for efficient insertion and deletion of elements.
4. Enumeration: An interface in Java that allows for traversing through a collection of elements one at a time. It is commonly used with Vector and Hashtable to iterate through their elements.

To learn more about Hashtable Here:

https://brainly.com/question/31311474

#SPJ11

What is this N mean????? In java

What is this N mean????? In java

Answers

Answer:

\n is an escape character for strings that are replaced with the new line object. Writing \n in a string that prints out will print out a new line instead of the \n. Java Escape Characters

Explanation:

If that what you meant. But n most of the time is either a string character or no special meaning such as integer that you defined.

N can also mean null

import java.util.Scanner;

import edhesive.testing.Math;

public U2_L8_Activity_One{

   public static void main(String[] args) {

       Scanner myObj = new Scanner(System.in);

       System.out.println("Enter a number.");

       int n = myObj.nextInt();

       for (int i = 0; i < 10; i++){

           System.out.println((int) (Math.random()*n));

       }

   }

}

I hope this helps!

Select the correct answer.
Which option should you select to accept a tracked change?
O A.
Accept
Reject
O C. Review
OB.
O D. Delete

Answers

Answer:

Explanation:

Which option should you select to accept a tracked change?

A.  Accept

Which descriptions apply to data tables? Select all that apply.
A. have rows and columns
B. are only used for quantitative data
) C. are used to organize data

Answers

Data tables are a popular way of presenting data in a clear and organized format. They typically have rows and columns, making it easy to read and compare data values. One of the key benefits of data tables is that they can be used to organize all types of data, whether it's quantitative or qualitative.

This makes them a versatile tool for analyzing and presenting information in a way that is easy to understand. While it is true that data tables are often used for quantitative data, they can also be used for qualitative data, such as descriptions or categories. Therefore, the correct descriptions that apply to data tables are that they have rows and columns, and are used to organize data.


Data tables have rows and columns .Data tables are used to organize data The long answer is that data tables are a way to display information in a structured format with rows and columns, which makes it easier to organize and analyze data. They can be used for both quantitative and qualitative data.

To know more about data visit:

https://brainly.com/question/30051017

#SPJ11

Select the correct answer. Frank works for an organization that wishes to install a software program on a single server with multiple users connected. Which of these computing services should Frank consider to make the software available to multiple users connected to the server? A. cloud computing B. mobile computing C. digital computing D. end-user computing

Answers

Answer:

A. cloud computing

Explanation:

Frank's organization wishes to install a program that can connect multiple users on a single server. They can achieve this through cloud computing. Cloud computing is a description of data centers which are available to many or multiple users all over the internet. Through cloud computing services, users can check their emails from any computer system. Also cloud services such as Dropbox, Google drive, are available for users to store files.

What is the function of this logical comparator! =?

Answers

Answer:

See explanation

Explanation:

!= means not equal

The given operator is not a logical operator but rather a comparison operator.

It compares two expressions, values or variables and returns true if the items being compared are not equal.

What is the term for the use of the same network to deliver multiple types of communication services such as video, voice, and fax

Answers

the term is known as convergence

Describe each of the principal factors risk factors in
information systems projects (20 marks)

Answers

The principal risk factors in information systems projects encompass various aspects such as project complexity, technology challenges, organizational factors, and external influences.

These factors contribute to the potential risks and uncertainties associated with the successful implementation of information systems projects.

Project Complexity: Information systems projects can be inherently complex due to factors such as scope, scale, and the integration of multiple components. The complexity may arise from intricate business processes, diverse stakeholder requirements, or the need for extensive data management. Complex projects pose risks in terms of project management, resource allocation, and potential delays or cost overruns.

Technology Challenges: Information systems projects often involve implementing new technologies, software systems, or infrastructure. Technological risks include compatibility issues, scalability limitations, security vulnerabilities, and the need for specialized expertise. These challenges may impact the project timeline, functionality, and long-term viability of the system.

Organizational Factors: The success of an information systems project depends on organizational factors such as leadership, communication, and stakeholder engagement. Risks in this domain include lack of management support, insufficient user involvement, resistance to change, inadequate training, and poor project governance. Failure to address these factors can lead to user dissatisfaction, low adoption rates, and project failure.

External Influences: External factors, such as changes in regulatory requirements, market dynamics, or economic conditions, can introduce risks to information systems projects. These factors may necessitate modifications to project scope, increased compliance efforts, or adjustments to business strategies. Failure to anticipate and adapt to external influences can disrupt project timelines and impact the project's overall success.

Understanding and managing these principal risk factors is crucial for effective project planning, risk mitigation, and successful implementation of information systems projects. Proper risk assessment, contingency planning, stakeholder involvement, and ongoing monitoring are essential to minimize the impact of these risks and ensure project success.

Learn more about  information systems here:

https://brainly.com/question/13081794

#SPJ11

How do i copy a canvas course from old class to new course.

Answers

Answer:

Open Settings. In Course Navigation, click the Settings link.Copy Course Content. Click the Copy this Course link.Create Course Details. ...Select Migration Content. ...Adjust Events and Due Dates. ...Create Course.

Explanation:

Follow The Steps

That's it

Other Questions
The colony of bacteria grows according to the law of inhibited growth of a function N(t)=100e^0.045t where N is measured in grams and t is measured in days. Determine the initial amount of bacteria. What is president Jacksons purpose in writing the Cherokee nation about the benefits of voluntary removal QUESTION 1 The Nagha Railway Company (NRC) is the only rail freight transport company in Nagha with the sole purpose of movement of passengers and freight such as manganese, bauxite, cocoa and timber from the hinterland to the ports for export and the movement of finished products such as cement and flour from the manufacturing enclave in the south of the country to the hinterland. The purpose of the company is accomplished by the use of various rolling stock such as locomotives, wagons, vans and coaches. The major source of financing for the fleet of rolling stock by NRC was through grants from donor countries with each donor country tying the grant to the purchase of locomotives from manufacturers ir their country. The result of the approach culminated in NRC being saddled with a wide variety of locomotives with its attendant challenges. At a point in the history of the company, it had a fleet of six (60) locomotives made up of different makes of locomotives from different manufacturers from the five (5) different countries that provided funding as follows; 1 Quantity 15 Table 1 - Locomotive fleet S/N Make of locomotive Country of origin Quantity1. Henschel 2-stroke - Germany 152. Caterpillar 4-stroke France 153. General Motors 2-stroke 4 Canada 154 .Brush 4-stroke United Kingdom 85. Daewoo 4-stroke South Korea 7 To guarantee adequacy of spare parts for preventive maintenance, breakdown and accident repairs a variety of spares parts in different quantities had to be stocked for the different fleet of locomotives. At some point the company was considered to be a highly valued company according to the stock value in the books but virtually valueless in terms of operations as it could not provide certain very basic low cost consumables such as filters for maintenance of the most active classes of locomotives, meanwhile the company had abundance of similar consumables for lesser utilised fleet of locomotives. Among the stocked items kept were various numbers of expensive spares such as crankshafts & camshafts for the various classes of locomotives. Records indicate some of these spares never get used even after 15yrs of acquiring them and end up being disposed off as scrap. 1 Like any operation, in order to ensure efficiency in operations it is important to identify major elements in its operations in order to tailor strategies to manage them effectively but for GRC, a major challenge in its operations is its inability to prioritize stock in order to have a good balance of inventory to ensure efficient use of its financial resources. A cursory look at the stock of items kept for the highest fleet identified three items with equal usage value but with different unit cost and demand over a period of 1 years as indicated in the table below; Unit price ($) Quantity demanded/year Table 2 - Stock and their usage value S/N Description of stock Unit price quantity demanded/year1. Camshaft 8,000 10 2. 2 Injectors 500 100 3. Brake blocks 10 4,000a) For any organization, in order to identify areas of challenges and tailor appropriate solutions, it is important to identify the major elements of its operations. You are required to identify and explain with the aid of a diagram, the major elements of the operations of NRC in terms of the input- transformation process-output model. (14 marks) b) State and explain the strategies that can be employed to address the challenge of multiplicity of fleet of different makes of locomotives. (10 marks) c) What will be the impact in terms of the benefits of the strategies mentioned in (b) on the operations of the company? (8 marks)d) Explain usage value, how it is used to control inventory (8 marks)Previous question A parallelogram has an area of x2 + 9x - 36.a. What are expressions for the length and width of the parallelogram?b. If x is an integer, what is the least possible value of x for a parallelogramto exist? Explain. PLEASE ANSWER LIKE THISBefore:During:After:Explain in detail what happens to particles before, during, and after vaporization.Thank you i will give brainlyiest Why was Stephen Douglas determined to get the Kansas and Nebraska territories organized? what is the constant of proportionality to 6y=8x? which of the following denotes a personality dimension of a manager, not a leader? a. avoids solitary work activity, preferring to work with others b. believes goals arise from desire c. seeks high-risk positions the _____ is a credit card-sized device with an embedded microchip to provide electronic memory and processing capability. Answer the following. I will give brainiest to the person whos Answer is correct Use the reaction to answer the question.CH4 + 202 CO2 + 2H2O+H-C: 412 kJ/molO=O: 496 kJ/molC=O: 743 kJ/mol0-H: 463 kJ/molWhat is the total energy of the reaction? Construct a 135 AngleNow, provide the step - by - step instructions that you devised to create your own construction.*WILL GIVE BRAINLIEST* This passage is most probably excerpted from an article about Franklin in a business journal Answer A: an article about Franklin in a business journal A a work of cultural criticism attacking Franklin for the decay of traditional values Answer B: a work of cultural criticism attacking Franklin for the decay of traditional values B a book about Franklin's scientific research Answer C: a book about Franklin's scientific research C a biography of Franklin intended for a general audience Answer D: a biography of Franklin intended for a general audience D Exercise 1 Write a personal pronoun that agrees with the indefinite pronoun antecedent in the sentence. Underline the antecedent. Anything you can do will be appreciated. _______________ is more than will be done otherwise. Cruz and Eva have a 7-year-old son. He is in the second grade and is extremely obedient. He has many friends, most of whom are on a baseball team with him. What advice might each of the researchers below give to Cruz and Eva about their sons development?Jean Piaget (cognitive development) Harry and Margaret Harlow (attachment) Lawrence Kohlberg (moral levels of thinking)Albert Bandura (social learning theory) Erik Erikson (psychosocial development) Diana Baumrind (parenting styles) Lev Vygotsky (scaffolding) Select all of the following that describe the characteristics of a debit card.A. The money use to make purchases is directly withdrawn from your bank account.B. A monthly interest rate is charged for any unpaid balance.C. It requires the amount needed to make a purchase to be in your bank account.D. It allows you the flexibility to keep less cash in your wallet. What do Amazon and Tesla motors have in common MovieMania, an online movie rental website charges a one-time fee of $6. 85 and $2. 99 Per movie rental. Let m represent the number of movies you watch and let C represent the total cost to watch the movies. Write an equation that relates the total cost to the numbers of movies you watch from MovieMania HURRY!!DJ Herc is credited with starting hip hop. He played a type of music using soul, R&B, and Jazz called ___? Hello someone just help me with this put it didn't save so I can go back to review again. can you help me please