__________ software aids architects, engineers, and many others who need to create a digital model of an object.

Answers

Answer 1

CAD software aids architects, engineers, and many others who need to create a digital model of an object.

What is CAD software used for?

CAD design is  known to be a kind of a software that is often used by architects, construction managers, as well as engineers and it is one that has said to have taken over manual drafting.

Note that it is said to be a tool that helps its users to be able to make designs in 2D as well as in 3D form.

Therefore, CAD software aids architects, engineers, and many others who need to create a digital model of an object.

Learn more about CAD software from

https://brainly.com/question/14350050

#SPJ1


Related Questions

What is the output of the following snippet?
my_list =
[[0, 1, 2, 3] for i in range (2) ]
print (my_list [2] [0])

Answers

Answer:

Explanation is being shown in the file that takes you to the link

Help me pls!!!!
What is wrong with my code? It says error on line 11

Help me pls!!!!What is wrong with my code? It says error on line 11

Answers

Create your code. Look over the error list. Analyze your code. To refactor or fix code, use Quick Actions. Activate Code Cleanup. Run code testing on it. Conduct unit tests. as well

What is the nature of the code error?

Error is a user-committed unlawful conduct that makes the application function improperly. Many times, programming errors go undetected until the program is compiled or launched. A number of the errors make it impossible to build or run the software. Browsers transmit "Script error" to the onerror callback whenever a JavaScript problem arises from a file delivered from a different origin (different domain, port, or protocol). Even though an issue is occurring, you are unable to identify it or the offending code, which makes it painful. When creating programs, there are three basic types of errors that could occur: errors in syntax. Logic runtime errors.

To learn more about code error refer to

https://brainly.com/question/18719463

#SPJ1

The Excel file "Coco Cola Retum and Beta" shows monthly returns of Coca Cola and S8.P500 index over past 60 months. The arithmetic mean of Coca Cola's monthly return is \( \% \) (in 3 decimal places).

Answers

The arithmetic mean of Coca Cola's monthly return is approximately 0.982%.

Based on the provided data, let's calculate the arithmetic mean of Coca Cola's monthly return.

Month      | Coca Cola

------------------------

1/31/20    | 5.364%

12/31/19   | 3.587%

11/30/19   | -1.910%

10/31/19   | -0.018%

9/30/19    | -1.096%

8/31/19    | 4.477%

7/31/19    | 3.303%

6/30/19    | 3.579%

5/31/19    | 0.143%

4/30/19    | 4.588%

3/31/19    | 3.297%

2/28/19    | -5.972%

1/31/19    | 1.634%

12/31/18   | -6.242%

11/30/18   | 5.129%

10/31/18   | 3.593%

9/30/18    | 3.570%

8/31/18    | -4.518%

7/31/18    | 6.124%

6/30/18    | 1.980%

5/31/18    | -0.487%

4/30/18    | -0.508%

3/31/18    | 0.485%

2/28/18    | -9.632%

1/31/18    | 3.659%

12/31/17   | 0.240%

11/30/17   | -0.458%

10/31/17   | 2.132%

9/30/17    | -1.193%

8/31/17    | -0.635%

7/31/17    | 2.183%

6/30/17    | -1.373%

5/31/17    | 5.237%

4/30/17    | 1.659%

3/31/17    | 1.137%

2/28/17    | 0.934%

1/31/17    | 0.265%

12/31/16   | 2.714%

11/30/16   | -4.956%

10/31/16   | 0.189%

9/30/16    | -2.589%

8/31/16    | -0.459%

7/31/16    | -3.822%

6/30/16    | 1.624%

5/31/16    | -0.447%

4/30/16    | -3.488%

3/31/16    | 7.287%

2/29/16    | 0.488%

1/31/16    | -0.093%

12/31/15   | 0.795%

11/30/15   | 0.636%

10/31/15   | 5.409%

9/30/15    | 2.014%

8/31/15    | -4.379%

7/31/15    | 4.608%

6/30/15    | -4.315%

5/31/15    | 0.981%

4/30/15    | 0.025%

3/31/15    | -6.562%

2/28/15    | 5.044%

To calculate the arithmetic mean, we sum up all the monthly returns and divide by the number of months:

Arithmetic Mean of Coca Cola's Monthly Return = (5.364 + 3.587 - 1.910 - 0.018 - 1.096 + 4.477 + 3.303 + 3.579 + 0.143 + 4.588 + 3.297 - 5.972 + 1.634 - 6.242 + 5.129 + 3.593 + 3.570 - 4.518 + 6.124 + 1.980 - 0.487 - 0.508 + 0.485 - 9.632 + 3.659 + 0.240 - 0.458 + 2.132 - 1.193 - 0.635 + 2.183 - 1.373 + 5.237 + 1.659 + 1.137 + 0.934 + 0.265 + 2.714 - 4.956 + 0.189 - 2.589 - 0.459 - 3.822 + 1.624 - 0.447 - 3.488 + 7.287 + 0.488 - 0.093 + 0.795 + 0.636 + 5.409 + 2.014 - 4.379 + 4.608 - 4.315 + 0.981 + 0.025 - 6.562 + 5.044) / 60

Calculating the above expression, we find that the arithmetic mean of Coca Cola's monthly return is approximately 0.982% (rounded to three decimal places).

Learn more about data here:

https://brainly.com/question/32203721

#SPJ11

Social networking sites are usually ________________ during work hours unless the activity is work-related. Responses

Answers

Explanation:

Social networking sites are usually restricted during work hours unless the activity is work-related.

What are the first letters of each of the 3 main colors in javaScript? (seperate with commas)

Answers

Answer:

R, G, B

Explanation:

Red, Green, Blue

PLEASE FULLY HELP WITH JAVA CODING ASSIGNMENT
Also please try to make the screenshots readable

PLEASE FULLY HELP WITH JAVA CODING ASSIGNMENT Also please try to make the screenshots readable

Answers

The code defines a BankAccount class with private variables balance and name. The constructor initializes the name and sets the balance to 1000.0.

The Program

public class BankAccount {

   private double balance;

  private String name;

   public BankAccount(String name) {

       this.name = name;

       this.balance = 1000.0;

   }

   public double getBalance() {

       return balance;

   }

  public static void main(String[] args) {

       BankAccount account = new BankAccount("John Doe");

       System.out.println("Balance for " + account.name + ": $" + account.getBalance());

   }

}

Output:

Balance for John Doe: $1000.0

The code defines a BankAccount class with private variables balance and name. The constructor initializes name and sets balance to 1000.0.

The getBalance() method returns balance. In the main method, a BankAccount object is created with the name "John Doe" and printed using System.out.println(). The output displays the account name and balance.

Read more about Java programs here:

https://brainly.com/question/26789430

#SPJ1


To use the mouse properly, you will need to know how to ___
and click.
Zoom
Drag
Point
Scroll

Answers

Answer:

To use the mouse properly, you will need to know how to drag and click.

Hope I'm right.

To use the mouse properly, you will need to know how to point and click. When you click, you are telling the computer what to do, like clicking "Send" on an email.

Laura is the first person in her SDLC team to detect and predict security vulnerabilities in the software. In which phase is Laura involved?
A.
analysis
B.
design
C.
development
D.
testing
E.
implementation

Answers

Answer:

answer is c

if my answer is wrong than sorry

Where is the Appearance and Personalization option found?
A.in the troubleshooting section
B.in the performance monitor section
C.in the safe mode section
D. in the remote desktop section

Answers

Answer:

A.in the troubleshooting section

Explanation:

Appearance and personalization is a category or set of tools which is found in the control panel in the start menu of windows.

Appearance and personalization allow the user to use various tools like customization of windows, change the theme, screen savers, file explorer options, navigation buttons, ease of access centre, change fonts etc.

The appearance and personalization category is present as the sixth panel of the control panel. The troubleshooting section allows the user to open the control panel from which appearance and personalization category can be opened.

Thus, Option-A is the correct answer.

When the core components of the linux operating system are packaged together with other open source software, it is called a:________

Answers

Answer:

Linux distribution

Explanation:

For questions 1-3, consider the following code:
x = int (input ("Enter a number: "))
if x 1 = 7:
print("A")
if x >= 10:
print("B")
if x < 10:
print("C")
if x % 2 == 0:
print("D")

For questions 1-3, consider the following code:x = int (input ("Enter a number: "))if x 1 = 7:print("A")if

Answers

Answer:

A

Explanation:

x = 100
if x > 0:
x -= 1
print(x)

Answers

Answer:

Explanation:

Program  and Reault:

x = 100if x &gt; 0: x -= 1print(x)

Using more than one array to store related data is called _____________ arrays.

Answers

Answer:

Using more than one array to store related data is called parallel arrays.

Explanation:

I just did it and got 100% on the quiz

Using more than one array to store related data is called parallel arrays.

What is array?

An array is a type of data structure used in computer science that holds a set of elements that are all uniquely recognised by at least one array index or key.

An array is stored in a way that allows a mathematical formula to determine each element's position given its index tuple.

In parallel arrays, a collection of data is represented by two or more arrays, where each corresponding array index represents a field that matches a particular record.

For instance, the array items at names and ages would explain the name and age of the third person if there were two arrays, one for names and one for ages.

Thus, the answer is parallel array.

For more details regarding parallel array, visit:

https://brainly.com/question/27041014

#SPJ6

James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?
a) Unexpected cloud downtime
b) Insufficient storage capacity
c) Inadequate data security
d) Inflexible pricing structure

Answers

Unexpected cloud downtime  is the most likely to face as a result.

Thus, A disruption in cloud-based services is known as cloud downtime. The migration of more businesses to the cloud means that any disruption in cloud services might be expensive.

According to Gartner, the average cost of cloud downtime is $300,000 per hour. Major cloud service companies appear to routinely report disruptions. These interruptions can endure for a few hours or several days. Three outages affected AWS in a single month in 2021.

An outage of any length can have a negative impact on the bottom line for businesses that are still working to incorporate cloud technology into their business strategy.

Thus, Unexpected cloud downtime  is the most likely to face as a result.

Learn more about Downtime, refer to the link:

https://brainly.com/question/28334501

#SPJ4

A favorably adjudicated background investigation is required for access to classified information

a. True
b. False

Answers

A favorably adjudicated background investigation is required for access to classified information: A. True.

What is a classified source material?

In Computer technology, a classified source material is sometimes referred to as classified information and it  can be defined as an information source that comprises very important, restricted, and sensitive information that must only be shared and disseminated secretly with authorized persons.

What is an adjudicative process?

In Computer technology, an adjudicative process can be defined as a strategic process which typically involves an examination and background investigation of a sufficient period of the life of a person, in order to make an affirmative determination that he or she is eligible for a security clearance and access to a classified source material or classified information.  

Read more on classified source material here: brainly.com/question/15346759

#SPJ1

What is the MOST likely reason for Karla to set an alarm on her work computer for 50 minutes past the hour every hour?

Question 2 options:

It reminds her to stand up for a few minutes each hour.


It signals that it's meal time.


It wakes her up in case she falls asleep.


It reminds her to readjust the position of her monitor.

Answers

The most likely reason for Karla to set an alarm on her work computer for 50 minutes past the hour every hour is option C: It wakes her up in case she falls asleep.

How were people on time for work before alarm clocks?

Ancient Greeks as well as Egyptians created sundials and colossal obelisks that would serve as time markers by casting a shadow that changed with the position of the sun.

Humans created hourglasses, water clocks, as well as oil lamps that measured the passage of time by the movements of sand, water, and oil as early as 1500 B.C.

Therefore, An alarm clock, or simply an alarm, is a type of clock used to warn a person or group of people at a certain time. These clocks' main purpose is to wake people up after a night's sleep or a little nap; however, they can also serve as reminders for other things.

Learn more about alarm clock from

https://brainly.com/question/16452153
#SPJ1

How do we explain the difference between fake news and facts​

Answers

Answer: it depends if the news is on the news and someone rights an article about it and says some mislead details that's how u know its fake  

Explanation:

mobile users tend to give much more attention to top search results that desktop users. True or False

Answers

Mobile users tend to give much more attention to top search results that desktop users.

The given statement is False.

There is no evidence to suggest that mobile users tend to give more attention to top search results than desktop users.

Both mobile and desktop users typically focus on the top results of their search query, although the specific behavior may vary depending on the context and user intent.

Additionally, factors such as the size of the screen and the ease of scrolling may play a role in how users interact with search results on mobile devices compared to desktop computers.

For similar question on desktop users.

https://brainly.com/question/29921100

#SPJ11

besides protecting a computer from under-voltages, a typical ups also performs which other actions?(select two.)

Answers

The other actions a typical ups performs, besides protecting a computer from low voltages, is:

Protects from over-voltagesConditions the power signal

In addition to protecting a computer from low voltages, a typical Uninterruptible Power Supply (UPS) can also protect against over-voltages, brownouts, blackouts, and power surges. It also conditions the power signal by filtering out any noise or spikes in the power signal before it reaches the computer.

The UPS also helps to provide a consistent stream of clean power to the computer, which can help to improve its performance and reliability.

Learn more about computers:

https://brainly.com/question/24540334

#SPJ4

Besides protecting a computer from under- voltages, a typical UPS also performs which two actions? (Select two.)

A. Prevents electric shock

B. Prevents ESD

C. Protects from over-voltages

D. Conditions the power signal

E. Protects network cabling from EMI

Checking account a charges a mouthly service fee $23 and wire transfer fee of $7.50 while checking account b charges a monthly service fee of $14 and wire transfer fee of $9.50 which checking account is the better deal if four wire transfers are made per month

Answers

Answer:

Checking account b is the better deal, because the total monthly fees amount to $52, while those for checking account a amount to $53.

Explanation:

Given:

monthly service fee of checking account a = $23

wire transfer fee of a = $7.50

monthly service fee of checking account b = $14

wire transfer fee of b = $9.50

To find:

which checking account is the better deal if four wire transfers are made per month?

Solution:

If four wire transfers are made per month then total monthly fees of both accounts is computed as follows:

Account a:

service fee of a + four wire transfers fee of a

23 + 4(7.50) = 23 + 30 = $ 53

Account b:

service fee of b + four wire transfers fee of b

14 + 4 (9.50) = 14 + 38 = $ 52

From the above results checking account b is the better deal because the total monthly fees amount to $52 while total monthly fees for checking account a amount to $53.

Which of these lines of code will increment a variable?

A.
print(variable)

B.
count(variable)

C.
inc(variable)

D.
variable = variable + 1

Answers

Answer:

D

Explanation:

Answer:

D.

Explanation:

I got it right on the test.

true or false: stix is an application that has been developed by the community to provide cyber threat information.

Answers

STIX (Structured Threat Information Expression) is a standardized language for describing cyber threat intelligence (CTI). It is an XML-based format that enables organizations to share cyber threat data in a consistent, machine-readable format.

What is the purpose of STIX?

The purpose of STIX is to improve cyber threat intelligence sharing capabilities and enable more efficient automated threat intelligence processing. STIX can provide details on cyber threat actors, their capabilities, and their attack methods, as well as information about targeted assets and the time frame of an attack.STIX is not an application, rather it is a language for expressing and exchanging cyber threat intelligence between different applications or organizations. STIX is an open-source initiative developed by the Mitre Corporation, a nonprofit that operates research and development centers for the federal government.

So, the given statement "stix is an application that has been developed by the community to provide cyber threat information" is false.

To know more about Mitre Corporation visit:

https://brainly.com/question/30746123

#SPJ11

Your manager has asked you to set up four independent APs and configure them with the same SSID, channel, and IP subnet. What should you enable to accomplish this

Answers

In order to accomplish this task, you should enable roaming on the access points (APs).

What is roaming?

In Computer technology, roaming can be defined as a technology which is designed and developed to make it possible for mobile subscribers to automatically to engage in an active communication over a broadband, especially when they're outside the geographical coverage area of their home network.

In this scenario, you should enable roaming on the access points (APs), when setting up four independent access points (APs) and configuring them with the same SSID, channel, and IP subnet.

Read more on SSID here: https://brainly.com/question/14362942

#SPJ2

10.14 lab: pet information (derived classes) the base class pet has protected fields petname, and petage. the derived class dog extends the pet class and includes a private field for dogbreed. complete main() to: create a generic pet and print information using printinfo(). create a dog pet, use printinfo() to print information, and add a statement to print the dog's breed using the getbreed() method. ex. if the input is: dobby 2 kreacher 3 german schnauzer the output is: pet information: name: dobby age: 2 pet information: name: kreacher age: 3 breed: german schnauzer

Answers

Import the necessary classes and libraries .Create a generic pet object by instantiating the Pet class. Set the pet's name and age using the setter methods from the Pet class.

Print the pet's information using the printInfo() method from the Pet class.
Create a dog object by instantiating the Dog class.Set the dog's name, age, and breed using the setter methods from the Dog class.

Print the dog's information using the printInfo() method from the Dog class. Print the dog's breed using the get Breed() method from the Dog class.I hope this helps! Let me know if you have any further questions.

To know more about generic visit:

https://brainly.com/question/33891182

#SPJ11

BE CAREFUL OF SCAM LINKS HERE
check attached bcuz brainly freak block this

also i love u grammarly

BE CAREFUL OF SCAM LINKS HEREcheck attached bcuz brainly freak block thisalso i love u grammarly

Answers

Answer:

I know what the scam links look like and to be careful. Thanks for warning us though. Have a awesome day!

Explanation:

Answer:

have u watched euphoria

Explanation:

lol

what feature of windows server 2016 allows you to run command on a virtual machine directly from the host server?

Answers

Answer:

Powershell Direct

Explanation:

Powershell Direct

Mark me brainliest!

Proportional spacing replaced what other kind of spacing? question 2 options: parallel spacing monospacing one-to-one spacing fixed spacing

Answers

According to the statement, Proportional spacing replaced monospacing.

Describe monospacing.

A monospaced font is one in which each letter and character takes up the same amount of horizontal space. It is also known as a fixed-pitch, fixed-width, or non-proportional font. Variable-width fonts, in contrast, feature letters and spacing that are all the same width.

Monospace fonts have their uses.

Practicality: On all screen sizes, monospaced typefaces are exceptionally simple to read. This means that your clients can quickly and easily locate what they're looking for on any device, greatly enhancing the user experience. Your users may become clients more frequently as a result.

To know more about monospace visit :

https://brainly.com/question/17824852

#SPJ4

Will MARK BRAINLIEST TO WHOEVER GETS THIS CORRECT, PLS HELP!! PLS WRITE CODE IN PYTHON. CHECK THE IMAGE I PUT THERE.

Will MARK BRAINLIEST TO WHOEVER GETS THIS CORRECT, PLS HELP!! PLS WRITE CODE IN PYTHON. CHECK THE IMAGE

Answers

Answer:

def findLastBinary(s):

 binaryString = ""

 for c in s:

   binaryString += bin(ord(c))[2:].zfill(8)

 n = 0

 while(bin(n)[2:] in binaryString):

     n = n + 1

 return n-1

s = input("Enter a string: ")

n = findLastBinary(s)

print("The highest binary string found is", bin(n)[2:])

Explanation:

bin(n) converts an integer to binary

the [2:] index is to skip the "0b" prefix that is otherwise prepended.

zfill(8) left fills the ASCII number with zeros

Write the code to input a number and print the square root. Use the absolute value function to make sure that if the user enters a negative number, the program does not crash. Sample Run Enter a number: -16 Sample Output 4.0 Hint: Remember that you will need to import the math module at the beginning of your program.

Answers

Answer:

Program in Java:

import java.lang.Math;

import java.util.Scanner;

public class MyClass {

   public static void main(String args[]) {

     Scanner input = new Scanner(System.in);

     double num;

     System.out.print("Enter any number: ");

     num = input.nextDouble();

     num = Math.abs(num);

     System.out.print("Square root: "+Math.sqrt(num));

   }

}

Explanation:

This line imports the math library

import java.lang.Math;

This line imports the scanner library

import java.util.Scanner;

public class MyClass {

   public static void main(String args[]) {

     Scanner input = new Scanner(System.in);

This line declares num as double

     double num;

This line prompts user for input of number

     System.out.print("Enter any number: ");

This line gets the input from the user

     num = input.nextDouble();

This line calculates the absolute value of the number input by the user

     num = Math.abs(num);

This line calculates and prints the square root of the number inputted

     System.out.print("Square root: "+Math.sqrt(num));

   }

}

Write a program that inputs a text file. The program should print the unique words in the file in alphabetical order. Uppercase words should take precedence over lowercase words. For example, 'Z' comes before 'a'. I am stuck on this python assignment. Don't need the answer asap, just some explaining of how to write code to do that. I know about the built in sort function

Answers

Answer:

Read the file and save it to a variable as a string, split the string variable and cast it to a set object using the set function to get the unique words in the file. Then use the max function with the key attribute to use regular expression module "re" to compare the first letter of each item to return in a list comprehension or append to a list.

Explanation:

The open function is used to import a file in python, the split string method splits the string to a list of items and the set function removes any duplicates of a word or item.

Using the for loop statement, iterate over the items and compare and return the items in alphabetical order with the 're' search method getting the item with uppercase letters with higher precedence than lowercase.

Other Questions
What was one of Headlees most valuable lessons in listening ? What kind of appeal does she make ? (2) Let the infection rate alpha equal 0.3 and let R zero equal to 3. Suppose on day 30 of the pandemic, a vaccine becomes available. Suppose 30% of those who haven't ever been infected get vaccinated on day 30. Suppose the vaccine instantly gives 100% immunity. What is the highest percentage of thepopulation that is infected on any given day before the vaccine is available (up to day 29)? What is the highest percentage of the population that is infected on any given day when the vaccine is available (starting from day 30)? Explain how you derived the answer. Libor is generally _______________ the fed funds rate because foreign bank deposits are generally ________________ than domestic bank deposits. Que es el desarrollo compartido???help estoy en examne There are 27 more green cars than black cars in the parking lot what percentage of the cars are green and what percent of the cars are black what's the answer to 2.4(-3.3-0.9+1.2) Which function is equivalent to y = 4(1 2)? +10? Oy=412 - 40 + 14 Oy=4.62 - 160 +26 Oy=42+ 14 Oy=412 - 161 +56 lines 1-5: paraphrase or state in your own words what bradford is trying to communicate in the first sentence. When the Preimage and image are congruent the transformation is called an isometry? Lori often takes a taxi instead of taking the bus. On average she takes 3 taxis a weekat a cost of $25. The bus would cost her only $6 a week. How much money wouldshe save in one week?One year? Liquid Measurements Water Isopropyl Alcohol Mass A Graduated Cylinder (9) 17.83 18.07 Volume (mL) 5 5 Mass B: Graduated Cylinder with Liquid (9) 23.54 23.9 Mass B-A Liquid (9) 5.71 5.83 Density (g/mL) 3.56 3.61 Percent Error (%) Select the correct answer. Which sentence contains an error in spelling? A. The movie theater frequently held special events to mark the opening of new movies. B. Aparna and her aunt went to visit the local museum late Sunday afternoon. C. Volunteers immediatly showed up to help run the local blood drive. D. Eric and Owen worked diligently on their science proje Each country had its own goals in negotiating the Treaty of Versailles. What was the goal of the British prime minister,David Lloyd George?He advocated a moderate approach and wanted Germany's colonies.He wanted to punish Germany for starting the war.He shared much of Wilson's vision of "peace without victory."He did not want to negotiate; he wanted to keep fighting.Mark this and returnSave and ExitSubmit Find the measure of the missing angle. Children of school age should not be working at all. They should be focused on their school work and helpful to their parents. Working for money comes later. Write the text for a speech to be given at a school debate in which you argue for or against this statement. Luke melts 200 grams of dark chocolate that contains 60% cocoa and mixes it with 200 grams of milk chocolate that contains 30% cocoa. At a certain factory, when K thousand dollars is invested in the plant, the production Q is changing at a rate given by Q'(K) = 227K-2/3 units per thousand dollars invested. When $9000 is invested the level of production is 6000 units. a. Find a formula for the level of production to be expected when K thousand dollars is invested. ANSWER: b. How many units will be produced when 30000 is invested? ANSWER: c. What capital investment K is required to produce 8000 units? ANSWER: thousand dollars. The Green Monster baseball team has recently assigned a long-time employee Mr. Ortiz to the grounds crew. One of Mr. Ortizs responsibilities is ordering the fertilizer needed to keep the grass playing field in top condition. The grounds crew uses fertilizer at a steady rate 48 pounds per week. The fertilizer costs $12 per pound, and the supplier charges a fixed fee of $100 per order. Green Monsters inventory holding cost is 0.5% per week.If Mr. Ortiz chooses an order quantity of 150 pounds, what is their weekly ordering and inventory holding cost? You are the Information Security Director for a medium sized... You are the Information Security Director for a medium sized company. You recently experienced a ransom-ware attack that cost the company $500,000.00. After the attack your CEO held a meeting and informed you and the other IT professionals that it "WILL" not happen again. Write a Directive to the employees of the company summarizing the requirement for all personnel to adopt the new 2-factor authentication for IT equipment access. Include a 30-day timeline to adopt, and the consequences of not adhering to the new policy. Instructions: Write a 400-500 word policy Your essay should include an introductory paragraph and a conclusion. There are many stories about sea journeys and adventures. Choose one book from the following list and do a web search for the book and its author. Find at least one credible source and answer the following questions about the story: Who are the main characters? What is the story about? Where does it take place? When does it take place? Does it sound interesting? Why or why not? Here is a list of titles to choose from: Two Years Before the Mast by Richard Henry Dana The Old Man and the Sea by Ernest Hemingway The Sea Wolf by Jack London Moby D by Herman Melville Twenty Thousand Leagues Under the Sea by Jules Verne Kidnapped by Robert Louis Stevenson Be sure to use credible sources. Remember, Wikipedia is not considered a credible source. PLEASE HELP