you have been given logs for a system that was identified as having unusual network activity. after analyzing the logs, you determined that there were many failed login attempts by multiple usernames, most of which were invalid accounts. there were no log entries for successful logins from external addresses, and the system integrity logs indicate that no files were tampered with. which incident type best describes this situation?

Answers

Answer 1

Brute Force Attack is the incident type best describes this situation.

What is  Brute Force Attack? A Brute Force Attack is a type of cyberattack that involves attempting to gain access to a secure system by trying every possible combination of characters and/or words until the correct one is discovered. This attack is often used to gain access to an account or to decrypt an encrypted message. The attacker usually uses automated software to launch the attack and can try thousands of combinations in a short amount of time. The attack can be successful if the attacker knows some information about the target system such as the type of encryption used or the length of the password. Brute Force Attack can be difficult to protect against since the attacker has access to a wide range of possible combinations. The best way to protect against a Brute Force attack is to use strong passwords, limit the number of failed login attempts, and employ two-factor authentication.    

To learn more about force attack refer to:

https://brainly.com/question/17277433

#SPJ4


Related Questions

Early opera was originally designed to reflect the manner in which seventeenth-century aristocrats sung their conversations to each other on a daily basis. True or false?.

Answers

False because you can’t I already sloved it

who invented the computer?
when was it made?
can u tell me the name of the oldest computer?
when did the first laptop come out?

Answers

The computer was invented by Charles Babbage 15 February 1946Antikythera Mechanism it came out in 1981

Hope it helps you

pls mark my answer as brainliest

Answer:

1 and 2: Charles Babbage invented the computer (he was an English mechanical engineer and polymath) Charles Babbage was deemed the "father of the computer", he thought up and created the very first mechanical computer at the beginning of the 19th century.

3: the first computer was named the ubiquitous x86-powered workhorse of desktop and portable computing. All latest PCs are descendants of the earliest from IBM, the original model 5150 which made its first appearence in August 1981.

4: The first laptop computer available to the public was the Osborne. the Osborne Computer Corporation issued this exact model to the public in the year 1981. It ran at a large price of $1795. At the time of discharge, the screen was about five inches long and the keyboard was on the cover of the computer.

i did a lot of research for this, lol. hope it helps.

(i promise i did not plagerise)

a technician wishes to deploy windows 10 pro to multiple pcs through the remote network installation process. the technician begins by connecting the new pcs to the network and booting them up. however, the deployment fails because the target pcs are unable to communicate with the deployment server. what is the possible cause?

Answers

Answer:

There are several possible causes for the deployment failure in this scenario:

Network connectivity issues: One possible cause is that there are network connectivity issues preventing the target PCs from communicating with the deployment server. The technician should check the network cables and switches, as well as the network settings on the target PCs and the deployment server, to ensure that they are properly configured and functioning correctly.Firewall or security software: Another possible cause is that the firewall or security software on the target PCs or the deployment server is blocking the communication. The technician should check the firewall settings and any security software on both the target PCs and the deployment server, and ensure that they are properly configured to allow communication.Incorrect deployment server configuration: It is also possible that the deployment server is not properly configured for the deployment. The technician should check the deployment server settings and ensure that it is set up correctly for the remote installation process.Hardware or software issues: Finally, hardware or software issues on the target PCs or the deployment server could also cause the deployment failure. The technician should check for any hardware or software issues on both the target PCs and the deployment server, and resolve any issues that are found.

By identifying and addressing the root cause of the communication failure, the technician should be able to successfully deploy Windows 10 Pro to the target PCs through the remote network installation process.

Explanation:

A technician wishes to deploy Windows 10 Pro to multiple pcs through the remote network installation process. The possible cause is the NIC cards on the new PCs are not PXE-enabled.

What is a deployment failing?

Network connectivity problems: One potential reason is that the target PCs are unable to connect to the deployment server due to network connectivity problems. The network cables, switches, target PCs, and deployment server settings should all be examined by the expert to make sure everything is configured and working properly.

Firewall or security software: The firewall or security software on the target computers or the deployment server could also be the issue. On both the target PCs and the deployment server, the technician should examine the firewall configurations and any security software to make sure they are set up correctly to allow communication.

Therefore, a technician wants to use the remote network installation technique to distribute Windows 10 Pro to several computers. The new PCs' NIC cards not supporting PXE could be the issue.

To learn more about technician, refer to the link:

https://brainly.com/question/13194741

#SPJ2

Working with text in presentation programs is very ____
using text in other applications.

a) similar to

b)different from

Working with text in presentation programs is very ____using text in other applications.a) similar tob)different

Answers

Answer:

a) similar to

Explanation:

Answer: it is A

Explanation: Your inquiry states that "Working with text in presentation programs is very ____ using text in other applications." Working in presentation software such as Microsoft PowerPoint and Microsoft Word, is very different. Microsoft PowerPoint allows you to do so much more on the visuals, Microsoft PowerPoint and other presentation software also has capabilities to present information than displaying it in a text-editor.

pls make me branliest

Assuming that the baseband digital binary unipolar communication system is received 1001000 sequence of bits. The receiver is designed to sample the received waveform at t-iTb but there is a timing error of At = 5µsec. Find the value of ISI term at the fourth bit in case of this timing error and if the received pulse shape is p(t) = A sinc(R₁t), with A = 1mv and Rb = 64kbps

Answers

The value of the Inter-Symbol Interference (ISI) term at the fourth bit, considering a timing error of At = 5µsec and a received pulse shape p(t) = A sinc(R₁t), with A = 1mv and Rb = 64kbps, is X µV.

When there is a timing error in a digital communication system, it can lead to Inter-Symbol Interference (ISI). In this case, the received waveform is sampled at t-iTb, where t represents the timing instant, i denotes the bit number, and Tb is the bit duration. The timing error At = 5µsec means that the receiver is sampling the waveform 5µsec later than intended.

To calculate the ISI term at the fourth bit, we need to consider the timing error and the received pulse shape. The received pulse shape is given by p(t) = A sinc(R₁t), where A = 1mv represents the amplitude and R₁ = 1/Tb = 64kbps is the bit rate.

Since the timing error is 5µsec, the receiver is sampling the waveform at t-(4*Tb)-At. Substituting the values, we have t-(4*1/64kbps)-5µsec. Simplifying this expression, we can determine the timing instant at which the receiver samples the waveform.

Once we have the timing instant, we can calculate the ISI term by evaluating the received pulse shape at that particular instant. This will give us the amplitude of the ISI term at the fourth bit.

Remember to convert the result to the appropriate unit, which is mentioned as X µV in the question.

Learn more about Inter-Symbol Interference (ISI)

brainly.com/question/33338556

#SPJ11


Isabela wants to add an image to her presentation. Which tab should she use?

Answers

The “add image” tab ??

Answer:Insert

Explanation:

Edg. 2021

An important part of the development of transport is safety. how can you, when you get around in different ways, contribute to making it safer on the roads

Answers

Answer:

I need help I don't get a this questions please asap?

Explanation:    Head-on collisions. Some simple solutions can help to reduce the risk of head-on crashes. ...

   Run-off road crashes. This is when a vehicle collides with a stationary object, such as a sign or lamppost, after leaving the road. ...

   Intersection crashes. ...

   Vulnerable road users. ...

   Much work to be done.

Aug 31, 2018

Furthermore, advanced techniques like _____ _____ can analyze language usage, faces, locations, and other items to match a unique individual

Answers

One advanced technique that can be used to analyze language usage, faces, locations, and other items to match a unique individual is called biometric identification.

This technique uses various physical and behavioral characteristics of an individual, such as fingerprints, facial features, and speech patterns, to identify and verify their identity. With the help of sophisticated algorithms and advanced technologies, biometric identification can accurately match individuals even in complex situations. This technique is widely used in security systems, border control, and other industries where accurate identification and authentication are critical. Overall, biometric identification is a powerful tool that can help to improve security, reduce fraud, and streamline various processes.

learn more about biometric identification.  here:

https://brainly.com/question/30320941

#SPJ11

________________ is to Chaiken & Eagly's HSM model, what _________________ is to Petty & Cacioppo's ELM model.
systematic processing, central processing

Answers

Systematic processing is to Chaiken & Eagly's HSM model, what central processing is to Petty & Cacioppo's ELM model.

Chaiken's model is known as the Heuristic-Systematic Model of Persuasion. It's a social psychology theory that suggests that people use one of two methods to process information: the systematic route or the heuristic route. The systematic processing pathway is the one where people evaluate the content of the communication and draw logical conclusions based on it. Pretty and Cacioppo's Elaboration Likelihood Model (ELM) is a dual-process theory of attitude change, as mentioned in the question. The Elaboration Likelihood Model (ELM) is a model of persuasion that describes how attitudes are formed and modified, rather than a model of cognition that describes how beliefs are formed and modified. Systematic processing and central processing: These terms refer to two methods that individuals use to process information. Systematic processing is the method used by an individual to evaluate and comprehend the information presented and draw a logical conclusion from it. Central processing is a cognitive process that occurs when a person is highly involved in a message. It entails using mental effort to examine information and messages thoroughly and logically. Therefore, systematic processing is to Chaiken & Eagly's HSM model, what central processing is to Petty & Cacioppo's ELM model.

Learn more about ELM:https://brainly.com/question/15827409

#SPJ11

Who plays patchy the pirate in SpongeBob SquarePants

Answers

Patchy the Pirate in SpongeBob SquarePants is played by Tom Kenny.

question 30some microphones are directional, meaning that they are only effective when you speak directly into them.truefalse

Answers

True. some microphones are directional, meaning that they are only effective when you speak directly into them.

Some microphones are directional, which means they are designed to pick up sound primarily from a specific direction or angle. These microphones are most effective when the sound source, such as the speaker's voice, is directed straight into the microphone. They are designed to minimize background noise and capture sound primarily from the desired direction, resulting in clearer audio recordings or transmissions.

Some microphones are designed to be directional, meaning they are more sensitive to sound coming from a specific direction or angle. These microphones are often referred to as "unidirectional" or "directional" microphones.

Directional microphones are commonly used in situations where it is important to isolate the desired sound source and reduce background noise or unwanted sounds. By focusing their sensitivity in a specific direction, they can capture audio more effectively from that direction while minimizing sound from other directions.

Learn more about microphones are directional from

https://brainly.com/question/32150145

#SPJ11

you have a windows 10 machine that needs to have a static tcp/ip address. you assign the ip address to the machine and you now want to register the computer with dns (domain name service). how can you do this from the windows 10 machine?

Answers

Select the Wi-Fi network you're connected to by choosing Start > Settings > Network & internet > Wi-Fi. Search for your IP address next to IPv4 address under Properties.

For users at the beginning to advanced network, this manual covers a wide range of DNS-related topics. It gives instructions on numerous installation and configuration methods, as well as some advanced strategies that can assist prevent future troubles in the future, starting with the fundamentals that every newcomer needs to know.

Use the table of contents to skip to the relevant section below if you're troubleshooting a specific topic or problem. However, if your objective is simply to get more knowledge about DNS in general, this book will provide you a better understanding as well as some practical advice.

Know more about DNS here:

https://brainly.com/question/17163861

#SPJ4

You are configuring a wireless LAN (WLAN) with three wireless access points having overlapping coverage areas. The wireless access points are using the 2.4 GHz frequency band, and are located in the United States. What three non-overlapping channels in the 2.4 GHz band should you select?

Answers

In the 2.4 GHz frequency band, there are only three non-overlapping channels available for use in the United States. These channels are 1, 6, and 11.

When configuring your WLAN with three wireless access points, it is recommended to select these non-overlapping channels to minimize interference between the access points. Assigning each access point to one of these channels will help ensure optimal performance and reduce signal overlap.

Here is an example configuration:

Access Point 1: Channel 1

Access Point 2: Channel 6

Access Point 3: Channel 11

By selecting these non-overlapping channels, you can effectively utilize the 2.4 GHz frequency band for your WLAN deployment.

Know more about frequency band here:

https://brainly.com/question/29782718

#SPJ11

MARIE includes 4096 bytes of memory. If Marie memory is divided in four memory banks, how much is each memory bank? O 2K Bytes O 1K Bytes 4K Bytes Question 31 (X+Y)Z+W+ 1 results in 1 as the output. O True O False

Answers

Marie includes 4096 bytes of memory. If Marie memory is divided into four memory banks, The amount of memory in each memory bank is determined by dividing the total amount of memory by the number of memory banks.

As a result, each memory bank of 4096 bytes memory will have a size of 4096/4 = 1024 bytes.So, the answer to your question is 1K Bytes.Each memory bank will have a capacity of 1K Bytes.Note: (X + Y) Z + W + 1 results in 1 as the output has a False output. The given equation can be written as:XZ + YZ + W + 1 = 1XZ + YZ + W = 0The expression on the left-hand side of the equation cannot be equal to zero. So, the output is false.

Based on the given content, MARIE includes 4096 bytes of memory. If this memory is divided into four memory banks, each memory bank would have 4096 divided by 4, which is equal to 1024 bytes or 1K byte.

As for the second part, it seems to be a multiple-choice question with the expression (X+Y)Z+W+1 resulting in 1 as the output. Without further context or values assigned to the variables, it is not possible to determine whether the statement is true or false.

To know more about memory banks visit:

https://brainly.com/question/31567696

#SPJ11

As a __________, I will create the Sprint goal so that the entire team understands the reason for the prioritization of the stories in the Sprint. Select one. - Scrum Master
- Product Owner - Team Member (developer/tester)

Answers

As a Product Owner, I will create the Sprint goal so that the entire team understands the reason for the prioritization of the stories in Sprint.

What is a Sprint Goal?

The Sprint Goal is an aim that is shared by the team throughout the Sprint.

It helps to align the team's focus on Sprint's goal and purpose, allowing them to collaborate and work effectively. It establishes a clear goal that the team can work together to accomplish. A Sprint Goal is a shared objective that serves as a guide for the development team's focus during the Sprint. It is critical for ensuring that Sprint is aligned with the overall product vision and that the team is working towards a common goal.

What are the responsibilities of a product owner in a sprint?

A Product Owner's responsibility is to create and prioritize product backlogs.

The product backlog is a list of user stories that the development team works on throughout Sprint. The Product Owner is responsible for ensuring that the team works on the highest-priority stories that deliver the most business value.The Product Owner, in consultation with the development team, establishes the Sprint Goal. The Sprint Goal sets the focus for the team's work during the Sprint. It is critical for ensuring that the team is working towards a common goal and that Sprint's work is aligned with the overall product vision.

Learn more about Sprint Goal:https://brainly.com/question/30089560

#SPJ11

I need help!

A standard is a:

A. normal way of addressing business letters.
B. level of quality or performance that people accept as normal.
C. a document with specific rules and regulations.
D. set unit of measurement for a particular purpose.

Answers

Explanation:

The answer is B. level of quality or performance that people accept as normal

Answer:

A standard is a: level of quality or performance that people accept as normal.

Explanation:

Just did this and got it correct.

pls help quick... will mark brainliest...

pls help quick... will mark brainliest...

Answers

Answer:

the answer is c

Explanation:

define a procedure that takes three numbers as arguments and returns the sum of the squares of the two larger numbers.

Answers

This procedure takes copy  three numbers as arguments and then returns the sum of the squares of the two larger numbers amongst them.

This procedure takes three numbers as arguments and then returns the sum of the squares of the two larger numbers amongst them. This procedure compares the three numbers and finds the two that are larger. It then squares each of these two larger numbers and adds the two squared values together to give the result. This is done regardless of the order in which the numbers are given. For example, if the three numbers given are 4, 5, and 6, then the two larger numbers are 5 and 6. The procedure thus squares each of the two numbers and adds the two squared values together, giving the result 61, which is 5^2 + 6^2. The procedure thus returns the sum of the squares of the two larger numbers amongst the three given numbers.

Learn more about copy here-

https://brainly.com/question/29316467

#SPJ4

PLSS HELP I WILL GIVE BRAINLIEST!!​

PLSS HELP I WILL GIVE BRAINLIEST!!

Answers

Answer:

1.1000 megabyte

Explanation:

Can you please explain me with jupyter notebook using Python for below steps.. 2) Select graph then histogram then simple 3) Select the column in which the data is entered and click OK. After running the above steps we get the following output-

Answers

Jupyter Notebook using Python to select graph then histogram then simple and select the column in which the data is entered and click OK.Step 1: Open Jupyter Notebook on your computer.

Click on New Notebook on the top right corner.Step 2: To begin with, you must import the pandas module using the following code. pandas is a Python library that is used to manipulate data in various ways, including creating, updating, and deleting data in tables. `import pandas as pd`Step 3: Create a data frame that will be used to draw a histogram. The following code may be used to accomplish this: ```data = {'A': [1, 2, 3, 4, 5], 'B': [10, 20, 10, 30, 40], 'C': [25, 20, 15, 10, 5]} df = pd.DataFrame(data) df````output:-``````A B C0 1 10 250 2 20 203 3 10 154 4 30 105 5 40 5```

Step 4: To create a histogram in Jupyter Notebook, we'll use the following code:```df.hist()```Step 5: After you've run the above code, you'll see the graph menu. To choose the histogram, click the Graph button. To make a simple histogram, choose Simple, and then pick the column in which the data is entered. Click OK afterwards.After following these above steps, the following output will be produced:![image](https://qph.fs.quoracdn.net/main-qimg-fb1d9f146e13bc9e500c4e5a9ec33ab1)In the histogram above, the x-axis shows the different values in the "A" column of the data frame, while the y-axis displays the count of each value.

To know more about Python visit:

https://brainly.com/question/32166954

#SPJ11

Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside of the tolerance ranges defined a kpi metric?.

Answers

The answer to the assertion whose performance falls outside of the tolerance ranges defined a kpi metric made is an exception.

Does metric correspond to KPI?

Metrics are often operational or tactical, whereas KPIs are strategic. Metrics are less complex indications that are unique to a department, whereas KPIs can be reviewed by many departments that are working toward the same goal. KPIs assist you in making strategic decisions, whilst metrics give you a perspective on your business activity.

What is a KPI measurement?

The metrics you use to assess tasks, goals, or objectives that are essential to your business are known as key performance indicators, or KPIs. The use of the word "key" in the sentence denotes that the words have a unique or important meaning. KPIs serve as measurable benchmarks in relation to established targets.

To know more about KPI metric visit:

brainly.com/question/28455765

#SPJ4

Create an HTML document on the topic Circle v/s Rectangle v/s Triangle.
The web page should contain three frames

Answers

Answer:

Here is answer

Explanation:

<!DOCTYPE html>

<html>

<head>

<title>Circle vs Rectangle vs Triangle</title>

</head>

<body>

<h1>Circle vs Rectangle vs Triangle</h1>

<!-- Create three frames -->

<iframe src="circle.html" frameborder="0"></iframe>

<iframe src="rectangle.html" frameborder="0"></iframe>

<iframe src="triangle.html" frameborder="0"></iframe>

</body>

</html>

<h2>Circle</h2>

<p>A circle is a geometric shape with no sides or corners. It is defined as a set of points that are all the same distance from a central point, known as the center of the circle.</p>

<p>The distance from the center to the edge of the circle is known as the radius. The diameter of a circle is the distance across the circle, passing through the center. The circumference of a circle is the distance around the outside of the circle.</p>

<p>Circles are often used in math and geometry, and they have many practical applications in everyday life, such as in wheels, coins, and circular objects.</p>

What is the revenue attributable to each product category for 2014? your query shouild produce two columns, one named category and one named revenue. There should only be one row for each category

Answers

Assuming that the necessary tables are available, the following SQL query can be used to obtain the revenue attributable to each product category for 2014:

vbnet

SELECT Products.category, SUM(OrderItems.quantity * OrderItems.unit_price) AS revenue

FROM Products

JOIN OrderItems ON Products.id = OrderItems.product_id

JOIN Orders ON OrderItems.order_id = Orders.id

WHERE Orders.order_date BETWEEN '2014-01-01' AND '2014-12-31'

GROUP BY Products.category;

This query uses joins to obtain the necessary information from the Products, OrderItems, and Orders tables. The WHERE clause filters the results to only include orders from 2014. The SUM function is used to calculate the revenue for each category based on the quantity and unit price of the products ordered. The GROUP BY clause groups the results by category to ensure that there is only one row for each category. The resulting table will have two columns, one named category and one named revenue, and one row for each product category.

To know more about  SQL query click this link -

brainly.com/question/31663284

#SPJ11

size = input("Enter your shoe size: ") size = int(size) if size > 12: print(str(size) + " is too high.") elif size < 6: print(str(size) + " is too low.") else: print(str(size) + " is in stock.") What is the output from running the above code if the user enters ten?

Answers

Answer:

It will print that the shoe size is in stock when the user prints 10, too high when the user enters 12, and anything less than 6 would be too low. It's a python program describing how basic input data is interpreted.

which vpn type might feature the use of a clientless vpn solution? this task contains the radio buttons and checkboxes for options. press the enter key to select the option. option a site-to-site option b client-to-site option c client-to-client option d server-to-server

Answers

When users only wish to encrypt web traffic, they frequently utilize clientless SSL VPNs in kiosks, shared workstations, mobile devices, and other situations.

Client-based: The user uses a client to connect to the VPN terminating device (router, firewall, etc.). The Cisco AnyConnect Secure Mobility Client is a good illustration of a VPN client. End users can use an SSL-enabled Web browser to securely access corporate network resources from any location using a clientless SSL VPN. A Clientless SSL VPN gateway must first verify the user's identity before granting access to preconfigured network resources. A browser-based VPN called a clientless SSL VPN enables remote users to securely access corporate resources. They use HTTP over an SSL connection to access the resources from any location.

Learn more about browser here-

https://brainly.com/question/28504444

#SPJ4

what is an if then block and how does it work on code.org

Answers

Send more information this question doesn’t make any sense

what is a document you can create with word processing software________?

Answers

Answer:

I think like Microsoft Word, Google Docs/Slides, or maybe other Microsoft writing services.

Explanation:

hope this helps!

ayo which one is better genshin impact or fortnite, i personally prefer genshin impact since it's not boring and it has so many other things you could do when you're not doing a story quest or daily commissions

Answers

Answer:

Genshin Impact and you can fight me on it.

Explanation:

The game has way more to explore and offer with different fighting styles which include Magic and Swords fighting. It also has more story and I appreciate that!  

The side quests to get tedious though so the final rating  is 8.79//10.00

Answer:

genshin

Explanation:

Categorive the given websites based on their possible website structure
company website
bookstore website
computer-based
training modules
single product website
city library website
online in store website
Hierarchical
Sequential
Matrix
Hi

Categorive the given websites based on their possible website structurecompany websitebookstore websitecomputer-basedtraining

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

There are different website structures such as hierarchical, sequential, and matrix. These websites structure helps the designers to create a meaningful website.

In this question, it is asked to categories the given website into their website structure.

The given websites are:

company website bookstore website computer-based  training modules  single product website city library website online in-store website

Now, we will categorize these websites into their website structure:

Hierarchical website structure:

Bookstore website

city library website

online in-store website

Sequential website structure:

single product website

computer-based training module

Matrix website structure:

Company website.

Here are the categorizations of the given items based on their storyboarding techniques:

Computer-based training modules: Linear

School website: Webbed

Bookstore website: Webbed

Single-product website: Linear

County library website: Webbed

Online gift store website: Linear

Federal government website: Hierarchical

Can you please help me? I give you a brainlest
! ​

Can you please help me? I give you a brainlest !

Answers

1.
2.satin stitch
3.lazy daisy stitch (detached chain )
4.chain stitch
5. cross stitch
6. french knot
7.
8.split stitch
9.
10. back stitch
the others i can’t tell.
Other Questions
Solve for the missing distance 30m 39 What is the radius of 36 diameter? Halfway houses are residential facilities for various types of offenders to include:Paroled offenders, probation violators, pre-release offenders The roads that are located near your town are national highways. They need repair, with many potholes that are dangerous for drivers. In some places, there are only two lanes, which creates traffic jams. Write a letter to your representative in Congress in Washington, D.C. and explain how and why you believe money should be spent on road repair. whats the sum of g and -7 From what point of view is the story told? How does this contribute to the effectiveness of an oral story? Why did the spanish decide to move mission la bahia from the coast to along the guadalupe river. What's the full form of WHO? What book does Montag bring to Faber? Who is the longest-tenured commissioner in the four major mens professional team sports leagues in north america? Managers use the ______ rule when they evaluate how alternative courses of action distribute the benefits and harm to the people and groups affected. multiple choice question. a solid 40 mm diameter shaft is rotating at a speed of 560 rpm with a maximum shear stress of 85 mpa. determine the power in kw being delivered by the shaft. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Environmental scientists collect air samples so they can test the quality of the air. They start with rigid metal containers that are completely emptythe air has been pumped out of them. What happens to the pressure inside the container and the volume of the container as air enters it? Which answer best describes intensive pronouns? A They connect relative clauses to independent clauses. B They are the same words as reflexive pronouns but used differently. C They cannot be removed from a sentence without changing the meaning. D They include me, you, him, her, it, us, and them.PLS ANSWER!!:( Advertisements for an instructional video claim that the techniques will improve the ability of little league pitchers to throw strikes and that, after undergoing the training, players will be able to throw strikes on at least 60% of their pitches. To test this claim, we have 20 little leaguers throw 50 pitches each, and we record the number of strikes. After the players participate in the training program, we repeat the test. The table shows the number of strikes each player threw before and after the training.Before: 28, 29, 30, 32, 32, 32, 32, 32, 32, 33, 33, 33, 34, 34, 34, 35, 36, 36, 37, 37After: 35, 36, 32, 28, 30, 31, 32, 34, 35, 36, 33, 35, 32, 33, 33, 34, 37, 33, 35, 32A) Is there any evidence that after training, players can throw strikes more than 60% of the time? (Note that this is a one sample test and that the data are in counts, not percent, so you should not use .60, but rather 60% of 50=30 in your test calculations)B) Is there evidence that the training is effective in improving a player's ability to throw strikes? (Note that this is now a paired sample test) 1. A car accelerates uniformly from 12 m/s to 39 m/s in 12 seconds. What is the car's average acceleration2. A butterfly is flying at 4 m/s. It accelerates uniformly at 1.2 m/s for 6 seconds. How far does the butterfly travel during the period of acceleration? 18 candy canes were broken. this number is represented 15% of the total number a) Convert the elements in the circuit above from the currentdomain into impedances.b) Calculate the transfer function H(w) via KCL. if you are married with young children and make $75,000 per year, how much term life insurance should you have?