What was the type of attack affected Target? Do
you think the practices proposed/implemented after the breach are
enough to prevent any future incidents? Why or why not?

Answers

Answer 1

The type of attack that affected Target was a sophisticated cyberattack known as a "point-of-sale" (POS) malware attack. The attackers gained access to Target's network through a third-party vendor and installed malware on the company's POS systems, compromising credit and debit card information of millions of customers.

While the practices proposed and implemented by Target after the breach were aimed at enhancing security measures, it is difficult to definitively say whether they are enough to prevent future incidents. Cybersecurity is a continuously evolving field, and attackers constantly develop new techniques and vulnerabilities emerge. Implementing strong security practices, regular system audits, employee training, and collaboration with industry experts are essential steps, but organizations must remain vigilant, adapt to new threats, and continually update their security measures to stay ahead of potential attacks.

 To  learn  more  about attack click on:brainly.com/question/31521922

#SPJ11


Related Questions

Merle wants to change the formatting of all bold cells to be non-bolded. Shania wants to copy the cell color,
border, and font from cell E12 to all of column D. Which best describes what each person should do?

A. Merle should use Find and Replace, and Shania should use the Format Painter.

B.Merle should use the Rules Manager, and Shania should use Find and Replace.

C.Merle should use the Format Painter, and Shania should use the Rules Manager.

D. Merle should use the Format Painter, and Shania should use Find and Replace.

Answers

Answer:

Merle should use Find and Replace, and Shania should use the Format Painter.

Explanation:

It's the most logical to me.. And that's what I'm gonna do on my test. =) hope it helps.

time to throw poggers xqc time to throw pogchamp time to throw pogchamp time to throw pogchamp time to throw pogchamp time to throw houhouhouhou time to throw poogcham

Answers

yes thank you very much

Answer:

yep

Explanation:

What classes should I take in high-school for majoring in computer science?

Answers

Answer:

Computer science are the disciplines that study information, computing and the applications or ecosystems where they are developed. It is a science that comes from applied mathematics and has 3 branches that are quite well known. On the one hand we have software engineering, secondly theory as such (primary study of algorithms and data, etc.) and finally the application of the amalgam of the first two, which end up resulting in disciplines such as big data, cybersecurity or computer security, machine learning, artificial intelligence, etc. However, we are talking about a very broad science with various branches of work. Technological advances that have improved the scope of education, now allow us to develop in specific skills and computer science is one of the macro careers that have benefited the most thanks to the diversity of subjects it encompasses. This is where the on-demand courses available on the edX platform come in. Computer scientists are in one of the best times for their career advancement. We invite you to be part of the technological development and information and computing technologies through online courses.

Explanation:

design the following comparators for 32-bit numbers. sketch the schematics. (a) not equal (b) greater than (c) less than or equal to

Answers

Provided are schematic plans for the requested comparators with distinct functionalities.

The Schematic Plans

The first is a 'Not Equal Comparator' which utilizes an XOR gate to compare bit values between two numbers; if any vary, the XOR gate manifests an output of 1, indicating the comparison indicates nonequivalence.

Next, a 'Greater Than Comparator' suggests assessment begins by examining the most significant bit and then directionally decides which number holds supremacy according to comparisons stemming from AND/OR gates based on whether MSBs match or collide.

Lastly, there's the 'Less Than or Equal To Comparator,' concerning a circuit identical to that utilized by its "greater" counterpart except here, output inversions occur thanks to NOT-gate use, which transforms results so as to reflect inversely, satisfying requirements necessary for less-than-or-equal-to operations.

Read more about XOR gate here:
https://brainly.com/question/30403860

#SPJ1

Suppose you wish to run two different operating systems on one computer, you can accomplish it by using _______.
a. a multi-processor operating system
b. an embedded system
c. the system utilities
d. virtualization software

Answers

Suppose you wish to run two different operating systems on one computer, you can accomplish it by using option d. virtualization software.

What is software for virtualization?

To imitate hardware functions and build a virtual computer system, virtualization uses software.

Note that this makes it possible for IT companies to run different operating systems, applications, and virtual systems on a single server. Greater efficiency and scale economies are two advantages that follow.

Hence the use of virtualization software will help you better accomplish the task above.

Learn more about virtualization software from

https://brainly.com/question/14472242
#SPJ1




what is a microphone ​

Answers

Answer: It is a piece of tech that's used for recording audio

Explanation:

something you use that is a piece of tech to sound louder

4.2 Code Practice: Question 2
Instructions
Write a loop that continually asks the user what pets the user has until the user enters rock, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have a dog with a total of 1 pet(s) if they enter dog, and so on.
Sample Run
What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? rock
------------
Sample Output
You have a lemur with a total of 1 pet(s)
You have a parrot with a total of 2 pet(s)
You have a cat with a total of 3 pet(s)

Answers

Answer:

total = 0

while True:

  pet = input("What pet do you have? ")

  if pet == "rock":

      break

  total += 1

  print("You have a {} with a total of {} pet(s)".format(pet, total))

Hope this helps!

Brainliest and a like is much appreciated!

it is a collection of related fields that can be treated as a unit by some application program. this collection is called a .

Answers

it is a collection of related fields that can be treated as a unit by some application program. this collection is called is "database".

A database is a collection of related fields that can be treated as a unit by some application program. It is a structured set of data held in a computer, particularly one that is available in various ways for several users simultaneously.A database is a collection of data that is stored and arranged in a methodical manner. It is a computer program that helps people to organize data, creating it simple to store, retrieve, manage, and update data.A database is a collection of data that is managed and kept in a structured manner. It stores all of the essential data and offers access to it in a variety of formats. Any application program that has been designed to operate with a database can access and use this data.

Learn more about application program here:

https://brainly.com/question/13179516

#SPJ11

You do not have to move your fingers to click the top row reach keys.
1. True
2. False

Answers

False you have to move your fingers

5. Given that \( n=32, w=2,1 \) word \( =1 \) byte, and cache size \( =512 \) Bytes. Determine: a) Memory capacity b) Total number of blocks in memory c) Number of cache lines

Answers

a) The memory capacity is 64 bytes.

b) The total number of blocks in memory is 32.

c) The number of cache lines is 256.

In this scenario, the word size is given as 2.1 words per byte, meaning each word occupies 1 byte. The cache size is specified as 512 bytes. Therefore, the memory capacity can be calculated by multiplying the word size and the cache size, resulting in 2.1 words/byte * 512 bytes = 1075.2 words. Since the word size is given as an integer, the memory capacity is rounded down to the nearest integer, resulting in a capacity of 64 bytes.

To determine the total number of blocks in memory, we divide the memory capacity by the word size: 64 bytes / 2.1 words/byte = 30.47619 words. Again, since the word size is given as an integer, the number of blocks is rounded down to the nearest integer, resulting in 32 blocks.

The number of cache lines can be calculated by dividing the cache size by the word size: 512 bytes / 2.1 words/byte = 243.80952 words. Once again, rounding down to the nearest integer, we find that the number of cache lines is 256.

In summary, the memory capacity is 64 bytes, the total number of blocks in memory is 32, and the number of cache lines is 256.

Learn more about  memory capacity here :

https://brainly.com/question/10569701

#SPJ11

who is springtrap from five night at freddy 3

Answers

Answer:

Purple Guy (or William Afton).

Explanation:

(The man behind the slaughter.)

Answer:

well i believe that is william afton

Explanation: he killed the kids and then after that the crying childs scared him into the room with the spring bonnie costume then he put it on and then boom the gears killed him and springtrap was born

Import the NHIS data (comma-separated values) into R using the read.csv() function. The dataset ("NHIS_NONA_V2.csv") is available for download from the Module 2 content page.
The type of object created using the read.csv() function to import the NIHS data is a
Note: Insert ONE word only in each space.

Answers

The type of object created using the read.csv() function to import the NHIS data is a data frame. In R programming language, the read.csv() function is used to read the CSV (comma-separated values) files and import them as data frames into R.

Data frames are two-dimensional objects that contain rows and columns.

They are used to store tabular data in R, and each column can be of a different data type like character, numeric, or logical.

The NHIS data set ("NHIS_NONA_V2.csv") is a CSV file, so we can use the read.csv() function to import it into R as a data frame.

To do this, we first need to download the file from the Module 2 content page and save it to our working directory. We can then use the following code to import the NHIS data into R:# import the NHIS data as a data framedata <- read.csv("NHIS_NONA_V2.csv")

After running this code, a data frame named "data" will be created in R that contains all the data from the NHIS_NONA_V2.csv file.

We can then use this data frame to perform various data analysis and visualization tasks in R.

To know more about function visit;

brainly.com/question/30721594

#SPJ11

from which Menu option you can change page setup in MS Word​

Answers

page layout tab or the page setup dialog box

How do open online courses help with independent learning

Answers

Answer:

One of the most powerful benefits of online courses is that they enable students to learn at the time, place, and pace that best suits their individual learning style. ... If there is a class discussion, you can take time to gather your thoughts rather than be in a race to get the teacher's attention.

Explanation:

Answer:

you can take time to gather your thoughts

Explanation:

Title the document Fuel Analysis. In this document, write a paragraph explaining your observations about the data you have entered and analyzed. Include any observations about when fuels are most expensive to purchase as well as when it is the least expensive to buy. Describe how you can use this information to help make your road trip budget.

Answers

Answer:

Fuel Analysis

Introduction:

In this document, we will analyze the data related to fuel prices and draw observations from the analysis. Our objective is to identify trends in fuel pricing and determine when fuels are most expensive and least expensive to purchase. By understanding these patterns, we can make informed decisions to help manage our road trip budget more effectively.

Observations:

Upon analyzing the data, we have observed certain patterns regarding fuel prices. Firstly, fuel prices tend to be higher during peak travel seasons and holidays when there is an increased demand for fuel. This surge in demand leads to higher prices due to limited supply. Additionally, fuel prices may also be affected by geopolitical factors, such as disruptions in oil production or natural disasters, which can cause temporary price fluctuations. It is important to consider these external factors when planning a road trip and budgeting for fuel expenses.

Furthermore, we have identified that fuel prices often exhibit regional variations. Prices may differ between urban and rural areas, as well as across different states or countries. Factors such as transportation costs, taxes, and regional supply and demand dynamics can influence these variations. It is advisable to research fuel prices along your planned route to anticipate potential cost fluctuations and make informed decisions.

Utilizing the Information:

The observations from this fuel analysis can be highly valuable in budgeting for a road trip. By understanding when fuels are most expensive to purchase, such as during peak travel seasons, we can plan our journey accordingly. This may involve adjusting the timing of our trip to avoid periods of high fuel prices or choosing routes that pass through areas with relatively lower fuel costs. Additionally, being aware of regional variations allows us to make strategic decisions, such as refueling in areas where fuel prices are comparatively lower.

To optimize our road trip budget, we can leverage various resources to stay informed about fuel prices. Online platforms, mobile applications, or even local gas stations can provide real-time information on fuel prices along our route. Additionally, joining loyalty programs or utilizing fuel price comparison websites can help us identify cost-effective options for refueling.

In conclusion, analyzing the data and observing fuel pricing trends enables us to make informed decisions and effectively manage our road trip budget. By considering factors such as peak travel seasons, regional variations, and external influences on fuel prices, we can plan our journey strategically and minimize fuel expenses. This proactive approach will ensure a more enjoyable and financially sound road trip experience.

Fuel Analysis

After analyzing the data on fuel prices, several observations can be made. Firstly, fuel prices tend to be more expensive during peak travel seasons, such as summer or holiday periods, and during times of high demand, such as during major events or natural disasters. Additionally, fuel prices tend to be higher in urban areas compared to rural areas due to higher demand and operating costs.

On the other hand, fuel prices are generally lower during the winter months when there is less demand for travel and during times of economic recession when demand for fuel decreases. Furthermore, fuel prices may be lower in areas where there is more competition among fuel providers.

Knowing when and where fuel prices are likely to be higher or lower can be helpful in planning a road trip budget. By researching fuel prices along your planned route and considering the time of year, you can estimate the amount of money you will need to spend on fuel and adjust your travel plans accordingly. Additionally, you may be able to save money by filling up at gas stations in areas with lower fuel prices or by using fuel rewards programs offered by some providers.

if i told you a word started with 0x70 in hexadecimal, what would it start with in ascii?

Answers

Answer: p

Explanation:

0x70 in hexadecimal is 112 in decimal form

The ASCII character for 112 (decimal) is p

CALCULATE THE MECHANICAL ADVANTAGE (MA).

DATA: F= 135 kg; b= 4*a; L=15 m

Answers

The mechanical advantage (MA) of the lever system in this scenario can be calculated by dividing the length of the longer arm by the length of the shorter arm, resulting in an MA of 4.

To calculate the mechanical advantage (MA) of the lever system, we need to compare the lengths of the two arms. Let's denote the length of the shorter arm as 'a' and the length of the longer arm as 'b'.

Given that the longer arm is four times the length of the shorter arm, we can express it as b = 4a

The mechanical advantage of a lever system is calculated by dividing the length of the longer arm by the length of the shorter arm: MA = b / a.

Now, substituting the value of b in terms of a, we have: MA = (4a) / a.

Simplifying further, we get: MA = 4.

Therefore, the mechanical advantage of this lever system is 4. This means that for every unit of effort applied to the shorter arm, the lever system can lift a load that is four times heavier on the longer arm.

For more such question on system

https://brainly.com/question/12947584

#SPJ8

The complete question may be like:

A lever system is used to lift a load with a weight of 135 kg. The lever consists of two arms, with the length of one arm being four times the length of the other arm. The distance between the fulcrum and the shorter arm is 15 meters.
What is the mechanical advantage (MA) of this lever system?

In this scenario, the mechanical advantage of the lever system can be calculated by comparing the lengths of the two arms. The longer arm (b) is four times the length of the shorter arm (a), and the distance between the fulcrum and the shorter arm is given as 15 meters. By applying the appropriate formula for lever systems, the mechanical advantage (MA) can be determined.


The first computer available for commercial sale in the United States was made by Mauchly and Eckert in what year?
1974
1947
1940
1951

Answers

Answer:

1951

Explanation:

spam and i report
Maurice wants to create a variable to store the name of the second-best taco place. Maurice writes the line of code as 2ndtaco = "Tio Dan's" but gets an error message. What is the problem with Maurice’s code?

A.
There can’t be an apostrophe ' in a variable name.

B.
The equals sign should be a dash.

C.
The type of variable wasn’t specified.

D.
A variable name can’t begin with a number.

Answers

Answer:

option d is the correct answer

Answer:

For your other question I think it's true

Explanation:

C. Assessment Application
MATCHING TYPE
Directions: Match column A with column B. Write the letter of your
answer on the space provided.
А
B В
1. Disk Cleanup
A. Repairs and cleans the Windows Registry
2. ASC
3. Scandisk
B. Repairs registry errors, remove "junk" files,
and ensure your PC is fully protected
C. Creates and deletes disk partitions
D. Accesses various information's about your
computer
E. Tunes up and maintains your PC automatically
F. Optimizes use of space on a disk.
4. ASC Pro
5. Format
6. CPU-Z
7. Defrag
G. Tunes up and maintains your PC, with anti-
spyware, privacy protection, and system
cleaning functions
H. Prepares a hard drive prior to use.
I. Checks for physical errors on the disk surface
J. Removes unused files.
8. ARO 2013
9. Fdisk
10. RegDoctor
--00 End of the Module 00--​

Answers

Answer:

\(\begin{array}{lll}&A&B\\1&Disk \ cleanup& Removes \ unused \ files\\2&ASC&Tunes \ up \ and \ mantains \ your \ PC \ automatically\\3&Scan \ disk &Checks \ and \ removes \ errors \ on \ the \ disk \ surface\\4&ASC \ Pro& Tunes \ up \ and \ maintains \ your \ PC, \ with \ anti-spyware, \ privacy \ prot \\\\\end{array}\)\(\begin{array}{lll}\\5&Format&Prepares \ the \ hard\ drive\ prior \ to \ use\\6&CPU-Z&Accesses \ various \ informations \ about \ your \ computer\\7&De-frag&Optimizes \ use \ of \ space \ on \ disk\\8&ARO \ 2013& Repirs \ registry \ errors, \ removes \ "junk" \ files\\9&Fdisk&Creates \ and \ deletes \ disk \ partitions\\10&RegDoctor&Repair \ and \ cleans \ the \ windows \ registry \end{array}\right]\)

Explanation:

Tactic, technique, or procedure (TTP) is a generalized statement of adversary behavior. Which would prove TTP is found on an organization's network?

Answers

The presence of TTP on an organization's network can be determined by observing specific indicators or evidence of adversary behavior.

This can include detecting patterns, signatures, or activities that align with known TTPs used by adversaries. By analyzing network logs, system events, and security alerts, security analysts can identify TTPs such as specific attack methods, tools, or behaviors employed by threat actors. Additionally, threat intelligence and information sharing can help in identifying TTPs by comparing known adversary tactics with the observed activities on the network.

You can learn more about network at

https://brainly.com/question/28342757

#SPJ11

Nadia has inserted an image into a Word document and now would like to resize the image to fit the document better.

What is the quickest way to do this?

keyboard shortcut
sizing handles
context menu
sizing dialog box

Answers

Sizing handles but I’m not super sure

When you right-click a picture in a word processing program, which actions can you choose to perform on that image?
You can choose to
an image when you right-click the picture in the word processing program. You can also choose to
an image when you right-click the picture in the word processing program

Answers

Answer:

Lots to choose from such as "copy" or "crop"

When you right-click a picture in a word processing program, which actions can you choose to perform

Explain media streaming and buffering process (Include the buffering diagram)​

Answers

Media streaming is the process of delivering multimedia content, such as audio or video, over the internet. Buffering is the process of preloading a certain amount of data to prevent interruptions during playback. When you start streaming a video, the player will begin downloading the data and storing it in a temporary location, known as the buffer. Once enough data has been downloaded, the video will begin to play. The buffer will continue to fill up as the video plays, ensuring that there is always enough data available to prevent buffering. The buffering diagram shows the buffer level over time. When the buffer level drops to zero, buffering occurs.

the use of installed viruses, malware, or other vulnerabilities to copy the behaviors of humans by visiting websites associated with specific ads is known as:

Answers

The use of installed viruses, malware, or other vulnerabilities to copy the behaviors of humans by visiting websites associated with specific ads is commonly known as click fraud.

What is click fraud?

Click fraud involves fraudulent clicks on online advertisements, which are generated through automated means rather than genuine user interest.

The aim of click fraud is to generate ad revenue for the fraudster, without providing any real value to the advertiser.

Click fraud is a significant concern for online advertisers, as it can lead to wasted ad spend and a lower return on investment (ROI) for their campaigns.

Read more about click fraud at: https://brainly.com/question/28834400

#SPJ1

What's the biggest challenge for most businesses when going online? A Planning a budget B Developing a plan C Optimising a website D Defining a customer base

Answers

Djxkhfmd fix fbsnfbhjz diz cuz cuz CBC

Answer: B) Developing A Plan

What type of conditional statement is represented inthis code? (if, if/else, if/elif,
if/elif/else)
if a > b: print("a is greater than b")

Answers

It is one of the powerful conditional statement. If statement is responsible for modifying the flow of execution of a program. If statement is always used with a condition. The condition is evaluated first before executing any statement inside the body of If.

Write a program that repeatedly reads in integers until a negative integer is read. The program also keeps track of the largest integer that has been read so far and outputs the largest integer at the end.

Answers

For Python: Number = int("Enter number: ");, num = maxn, if num >= 0:, If num >= maxn, num = maxn, Number = int("Enter number: ");, "Largest:" print(str(maxn) + ".

A well-liked general-purpose programming language is Python. It is utilized in a variety of industries, including desktop applications, web development, and machine learning. Fortunately, Python features a straightforward, user-friendly syntax for beginners. Python is a fantastic language for beginners to learn because of this.

All of Python's core ideas will be covered in our tutorials. By the conclusion, you will feel confident using Python to create projects. Obtain user input

Number = int("Enter number: ");

Set the biggest as the first input.

num = maxn

Up until a negative input is recorded, this loop is repeated.

if num >= 0:

If the current input is bigger than the biggest before

If num >= maxn,

Set the current input to biggest.

num = maxn

Obtain further input from the user

Number = int("Enter number: ");

Print the biggest

"Largest:" print(str(maxn) + ".

To know more about python click on the link:

https://brainly.com/question/13437928

#SPJ4

When would you use database software instead of spreadsheet or word processing software?​

Answers

Answer: When I need to see table relationships and sort data by custom fields.

Explanation:

Answer: When I need to see table relationships and sort data by custom fields.

Explanation: took the quiz

Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?

Answers

Answer:

It stands for Parentheses, Exponents, Multiplication/Division, Addition/Subtraction.

Other Questions
what theme is most typical in a creation story Complete the conversation by selecting the correct direct object pronouns from thedrop-down list.DANIELA: Dnde estn las papas? Nolasveo.MARCOS: Mira, aqu estn. Mientras t compras papas, yo voy a buscar una piaporquelanecesito para hacer jugo.DANIELA: Buena idea. Qu tal estos tomates? Tambinlos An incident occurred at a walking trail which is often a hot spot for athleticenthusiasts, dog walkers, and families. Chris is a 16-year-old who wasallegedly with a group of high school students who approached a pair ofjoggers on a local trail, surrounded them, and demanded their cell phones.The joggers handed their phones to other members of the group and ranaway. The joggers quickly found someone else with a phone and reported theincident. The police found Chris with a group of high schoolers near the sceneand want to question Chris about his involvement. Under what circumstances can the police question Chris? Assume that Chris's parents are out of the country. Under what circumstancescan Chris beinterrogated, if any? What means gliding? Plz answer 2346What was a characteristic of the Shang dynasty?O It used a decentralized government to control the empire.It gave people an education in the regions where it ruled.It allowed leaders of different regions to be elected by the people.It used farming methods that created a food surplus to feed the people, Margo can purchase tile at a store for $0. 89 per tile and rent a tile saw for $24. At another store she can borrow the tile saw for free if she buys tiles there for $1. 19 per tile. How many tiles must she buy for the cost to be the same at both stores? Compare the two maps to answer the following question:Which countries have regions that were once part of the Inca Empire? Peru, Argentina, Chile Paraguay, Bolivia, Colombia Brazil, Venezuela, Peru Argentina, Colombia, Paraguay As part of the overall systems engineering process, there are a variety of software development methods, but the three most common at DoD are the Waterfall Approach, the Incremental Approach, and the ______________ Approach. 6) Cholesterol: meaning you are studying two traits in fruit flies: eye color where there are two colors, brown and red, and wing shape where there are straight and curled phenotypes. you mate two flies that are heterozygous for the genes that control both of these traits and get the following phenotypes in the following ratio: 9 red and straight; 3 red and curled; 3 brown and straight; 1 brown and curled. considering these traits, which alleles separated at which stages of meiosis? A. F(x) = -x2 - 3B. F(x) = 0.2x - 3C. F(x)=x-3D. F(x) = 2x - 3p Which text structure does the author use in " Bomb Craters?" can someone help me with this? 1. Identify 3 interest groups and give an example of a direct technique and an indirect technique that each group may use to influence Congress2. Should the Constitution be changed to create rules around how interest groups can function in our system, specifically how interest groups can spend money on campaigns, donate money to candidates, or lobby government? What are the advantages and disadvantages of addressing interest groups through the Constitution?3. Do you think the way that interest groups are categorized makes sense? For instance, is there a difference between economic groups and professional associations? (see p.248 in your book) What is name of the point indicated by point P in the diagram below The operation of all businesses and industries typically falls into these three sectors of production:A. Primary, secondary, and tertiary.B. Primary, secondary, and quaternary.C. Primary, secondary, and capital-intensive.D. Primary, secondary, and telecommunications. Sunland Co. has the following transactions related to notes receivable during the last 2 months of the year. The company does not make entries to accrue interest except at December 31. Nov. 1 Loaned $63,600 cash to C. Bohr on a 12-month, 9% note. Dec. 11 Sold goods to K. R. Pine, Inc., receiving a $5,400, 90-day, 8% note. 16 Received a $14,400, 180-day, 6% note to settle an open account from A. Murdock. 31 Accrued interest revenue on all notes receivable.Journalize the transactions for Sunland Co. (Omit cost of goods sold entries.) (Credit account titles are automatically indented when amount is entered. Do not indent manually. Record journal entries in the order presented in the problem. Use 360 days for calculation.)Date Account Titles and Explanation Debit from an economic standpoint, government intervention may be justified group of answer choices because the government can increase the level of market power of private businesses. if the market mechanism fails to achieve the optimal mix of output. when the private sector is larger than public sector. because the government can encourage the production of private goods. what is 8.4 divided by 12? Question 4Given f (20) = 5, find x if f(x) = -3x 4-3-19O 11O 12help