You want to manage your passwords for different accounts to optimally secure passwords from compromise. which of the following password management methods should you use?

Answers

Answer 1

We use the password key password management method to manage your passwords for different accounts to optimally secure passwords from compromise.

What is a password key?

Passwords are replaced by password keys, also known as Passkeys. They are quicker to sign in with, simpler to use, and far safer. Passkeys are password-free sign-in methods that are both more convenient and safe than traditional passwords for websites and mobile apps.

Anyone who does not possess both your password and your physical security key will not be able to access your data. Password keys are an exclusive access point. A USB security key is a clever small gadget that can identify websites and will prevent you from submitting information to a phishing website that wants to steal your passwords because it does so.

To learn more about a password key, use the link given
https://brainly.com/question/28234360
#SPJ4


Related Questions

Insertion sort in java code. I need java program to output this print out exact, please. The output comparisons: 7 is what I am having issue with it is printing the wrong amount.
When the input is:

6 3 2 1 5 9 8

the output is:

3 2 1 5 9 8

2 3 1 5 9 8
1 2 3 5 9 8
1 2 3 5 9 8
1 2 3 5 9 8
1 2 3 5 8 9

comparisons: 7
swaps: 4
Here are the steps that are need in order to accomplish this.
The program has four steps:

1 Read the size of an integer array, followed by the elements of the array (no duplicates).
2 Output the array.
3 Perform an insertion sort on the array.
4 Output the number of comparisons and swaps performed.
main() performs steps 1 and 2.

Implement step 3 based on the insertion sort algorithm in the book. Modify insertionSort() to:

Count the number of comparisons performed.
Count the number of swaps performed.
Output the array during each iteration of the outside loop.
Complete main() to perform step 4, according to the format shown in the example below.

Hints: In order to count comparisons and swaps, modify the while loop in insertionSort(). Use static variables for comparisons and swaps.

The program provides three helper methods:

// Read and return an array of integers.
// The first integer read is number of integers that follow.
int[] readNums()

// Print the numbers in the array, separated by spaces
// (No space or newline before the first number or after the last.)
void printNums(int[] nums)

// Exchange nums[j] and nums[k].
void swap(int[] nums, int j, int k)

Answers

Answer:

Explanation:

public class InsertionSort {

   static int numComparisons;

   static int numSwaps;

   public static void insertionSort(int[] nums) {

       for (int i = 1; i < nums.length; i++) {

           int j = i;

           while (j > 0 && nums[j] < nums[j - 1]) {

               swap(nums, j, j - 1);

               j--;

           }

           numComparisons++;

           printNums(nums);

       }

   }

   public static void main(String[] args) {

       int[] nums = readNums();

       printNums(nums);

       insertionSort(nums);

       System.out.println("comparisons: " + numComparisons);

       System.out.println("swaps: " + numSwaps);

   }

   public static int[] readNums() {

       Scanner scanner = new Scanner(System.in);

       int count = scanner.nextInt();

       int[] nums = new int[count];

       for (int i = 0; i < count; i++) {

           nums[i] = scanner.nextInt();

       }

       scanner.close();

       return nums;

   }

   public static void printNums(int[] nums) {

       for (int i = 0; i < nums.length; i++) {

           System.out.print(nums[i]);

           if (i < nums.length - 1) {

               System.out.print(" ");

           }

       }

       System.out.println();

   }

   public static void swap(int[] nums, int j, int k) {

       int temp = nums[j];

       nums[j] = nums[k];

       nums[k] = temp;

       numSwaps++;

   }

}

Even if you are not a programmer or a database designer, you still should take a(n) ________ in the systems development process.

Answers

Even if you are not a programmer or a database designer, you still should take an active role in the systems development process. Thus option D is correct.

What is a database?

A database is a well-organized group of information that is technologically accessible and preserved. Large databases are housed on parallel computing or cloud services, whilst small databases can indeed be kept on system files.

The specifics of the data modeling must be specified by the database designer. The conflict amongst users and programmers in the syste perspectives can be diminished or even eliminated by customer involvement.

Therefore, option D is the correct option.

Learn more about the database, Here:

https://brainly.com/question/6447559

#SPJ1

The question is incomplete, the complete question will be :

a.

interest

b.

matter of fact attitude

c.

positive outlook

d.

active role

Design a pseudo code that determines if a given number is even or odd number

Answers

0. Start
1. Print "Enter Any Number to Check, Even or Odd"
2. Read input of a number
3. If number mod = 0
4. Print "Number is Even"
5. Else
6. Print "Number is Odd"
7. End

The pseudocode determines if a given number is even or odd by checking if it's divisible by 2 and then prints the respective result.

Here's a simple pseudocode to determine if a given number is even or odd:

Input: number

Output: "Even" if the number is even, "Odd" if the number is odd

if number is divisible by 2 with no remainder then

   Print "Even"

else

   Print "Odd"

end if

This pseudocode checks whether the given number is divisible by 2. If it is, it prints "Even" since even numbers are divisible by 2. Otherwise, it prints "Odd" since odd numbers are not divisible by 2.

Learn more about pseudocode here:

https://brainly.com/question/17102236

#SPJ7

What is a common practice that enterprise organizations will implement to ensure the users of a network and a Mobile Device Management solution will comply with?

Answers

Answer:

Acceptable use policy.

Explanation:

An acceptable use policy also known as fair use policy can be defined as a set of rules and guidelines defined by the original owner or administrator in charge of a service, website, web resources or network in order to regulate privileges, control the way the resources are used and to prevent any unauthorized access or usage by others.

Hence, an acceptable use policy is a common practice that enterprise organizations will implement to ensure the users of a network and a Mobile Device Management solution will comply with.

Generally, acceptable use policy are used in various organizations, schools, public spaces to ensure every users comply with it.

In Coral Code Language - A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-life of about 6 hours in humans. Given the caffeine amount (in mg) as input, output the caffeine level after 6, 12, and 18 hours.

Ex: If the input is 100, the output is:

After 6 hours: 50.0 mg
After 12 hours: 25.0 mg
After 18 hours: 12.5 mg
Note: A cup of coffee has about 100 mg. A soda has about 40 mg. An "energy" drink (a misnomer) has between 100 mg and 200 mg.

Answers

To calculate the caffeine level after 6, 12, and 18 hours using the half-life of 6 hours, you can use the formula:

Caffeine level = Initial caffeine amount * (0.5 ^ (time elapsed / half-life))

Here's the Coral Code to calculate the caffeine level:

function calculateCaffeineLevel(initialCaffeineAmount) {

 const halfLife = 6; // Half-life of caffeine in hours

 const levelAfter6Hours = initialCaffeineAmount * Math.pow(0.5, 6 / halfLife);

 const levelAfter12Hours = initialCaffeineAmount * Math.pow(0.5, 12 / halfLife);

 const levelAfter18Hours = initialCaffeineAmount * Math.pow(0.5, 18/ halfLife);

 return {

   'After 6 hours': levelAfter6Hours.toFixed(1),

   'After 12 hours': levelAfter12Hours.toFixed(1),

   'After 18 hours': levelAfter18Hours.toFixed(1)

 };

}

// Example usage:

const initialCaffeineAmount = 100;

const caffeineLevels = calculateCaffeineLevel(initialCaffeineAmount);

console.log('After 6 hours:', caffeineLevels['After 6 hours'], 'mg');

console.log('After 12 hours:', caffeineLevels['After 12 hours'], 'mg');

console.log('After 18 hours:', caffeineLevels['After 18 hours'], 'mg');

When you run this code with an initial caffeine amount of 100 mg, it will output the caffeine levels after 6, 12, and 18 hours:

After 6 hours: 50.0 mg

After 12 hours: 25.0 mg

After 18 hours: 12.5 mg

You can replace the initialCaffeineAmount variable with any other value to calculate the caffeine levels for different initial amounts.

for similar questions on Coral Code Language.

https://brainly.com/question/31161819

#SPJ8

Social media marketing began in the mid
1970s
1980s
1990s
2000s

Answers

Answer:

1990's i think

Explanation:

Consider the following code segment, where num is an integer variable.

int [][] arr = {{11, 13, 14 ,15},
{12, 18, 17, 26},
{13, 21, 26, 29},
{14, 17, 22, 28}};
for (int j = 0; j < arr.length; j++)
{
for (int k = 0; k < arr[0].length; k++)
{ if (arr[j][k] == num){System.out.print(j + k + arr[j][k] + " ");
}
}
}

What is printed when num has the value 14?

Answers

Answer:

Following are the complete code to the given question:

public class Main//main class

{

public static void main(String[] args) //main method

{

    int [][] arr = {{11, 13, 14 ,15},{12, 18, 17, 26},{13, 21, 26, 29},{14, 17, 22, 28}};//defining a 2D array

    int num=14;//defining an integer variable that holds a value 14

       for (int j = 0; j < arr.length; j++)//defining for loop to hold row value

       {

       for (int k = 0; k < arr[0].length; k++)//defining for loop to hold column value

       {

           if (arr[j][k] == num)//defining if block that checks num value

           {

               System.out.print(j + k + arr[j][k] + " ");//print value

           }

       }

       }

}

}

Output:

16 17

Explanation:

In the question, we use the "length" function that is used to finds the number of rows in the array. In this, the array has the 4 rows when j=0 and k=2 it found the value and add with its index value that is 0+2+14= 16.similarly when j=3 and k=0 then it found and adds the value which is equal to 3+0+14=17.So, the output is "16,17".  

In terms of Pseudo-Code: Which of the following statements is NOT correct

Question 10 options:

A set of instruction that have to use a specific syntax

No strict set of standard notations

Is not a programming language

Easy to understand, and clear

Answers

A pseudocode is simply a false code that is used as a prototype for an actual program

The incorrect statement is option (a)

Take for instance, the following pseudocode to add two numbers

input a

input b

c = a + b

display c

Using the above pseudocode as a guide, we have the following observations

It is clear and can be easily understoodThere is no standard notation; I can decide to replace "input" with "accept", and the pseudocode will still have the same meaning

From the definition of pseudocode, I stated that it is a prototype for an actual program.

This means that, it is not a programming language

From the above explanation, we can conclude that the correct option is (a).

This is so, because a pseudocode does not have a syntax

Read more about pseudocodes at:

https://brainly.com/question/18875548

Best answer brainliest :)
ridiculous answers just for points will be reported

thank you!
When is Internet Control Message Protocol most often used?


when Internet Protocol does not apply

when a receiver or sender cannot be located

when one needs to reassemble data sent via UDP

in the Network Access Layer

Answers

Answer:

d

Explanation:

because I did this before

Answer:

d

Explanation:

Thanks for ur time :)

let be a continuous random variable with probability density function (pdf) . does the value of always lie withint the interval ? (recall is the interval of real numbers between and including the end point and .)

Answers

No, the continuous random variable X's value might or might not fall within the range [a, b]. The definite integral of the probability density function f(x) over the interval [a, b] yields the likelihood that X takes on a value in the range [a, b].

A mathematical notion called a continuous random variable is used to simulate events with a continuous range of probable outcomes. Continuous random variables can take on any value within a range, in contrast to discrete random variables, which can only take on distinct, isolated values. A probability density function (PDF), which depicts the relative possibility of witnessing a specific result within the range of potential values, is often used to explain continuous random variables. The following are some instances of continuous random variables: height, weight, and temperature. The idea of continuous random variables is crucial to probability theory and statistics, and it has applications in disciplines like finance, engineering, and physics.

Learn more about continuous random variable here:

https://brainly.com/question/19338975

#SPJ4

Match each term to its definition.

parameter
return value
function

a value that can be passed from a function back to the calling part of a program.

a value that can be passed to a function

a group of instructions that can be used to organize a program or perform a repeated task

Answers

Answer:

Parameter - A value that can be passed to a function

Return Value - A value that can be passed form a function back to the calling part of a program

Function - A group of instructions that can be used to organize a program or perform a reapeated task.

Plz help, will guve brainliest to best answer (if i can)

Plz help, will guve brainliest to best answer (if i can)

Answers

Answer:

Online text:1,3,4

not online text:2,5

What are some options available in the Write & Insert Fields group? Check all that apply.
O Start Mail Merge
O Highlight Merge Fields
O Edit Recipient List
O Address Block
O Greeting Line
O Rules

Answers

Answer:

Highlight Merge Fields

Address Block

Greeting Line

Rules

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

A Mail Merge is a Microsoft Word feature that avails end users the ability to import data from other Microsoft applications such as Microsoft Access and Excel. Thus, an end user can use Mail Merge to create multiple documents (personalized letters and e-mails) at once and send to all individuals in a database query or table.

Hence, Mail Merge is a Microsoft Word feature that avails users the ability to insert fields from a Microsoft Access database into multiple copies of a Word document.

Some of the options available in the Write & Insert Fields group of Mail Merge are;

I. Highlight Merge Fields.

II. Address Block.

III. Greeting Line.

IV. Rules.

LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be developed that would allow customers to virtually try on colored lenses to find out what best suits them. Which of these features should the app have
Hey it should be a portable app so that it is quick to use B it should have responsive design so that it is easy to use on mobile devices see it should be a part of a productivity Suite so uterus can multitask or D is should be a local app so that users are installed

Answers

Of the options provided, the feature that the app should have to allow customers to virtually try on colored lenses is:

B) It should have responsive design so that it is easy to use on mobile devices.

Explanation:

The app should be easy to use on mobile devices since it is likely that many customers will use the app on their smartphones or tablets. A responsive design would allow the app to adapt to different screen sizes and orientations, making it user-friendly for customers regardless of the device they are using. This feature is directly related to the specific requirement of allowing customers to virtually try on colored lenses.

what is lenses ?

Lenses are optical devices that are used to bend and focus light. They are typically made of transparent materials, such as glass or plastic, and can be used in a wide range of applications, from eyeglasses and camera lenses to telescopes and microscopes.

To know more about LensForAll, visit:

https://brainly.com/question/25288296

#SPJ9

Which of the following types of requirements would be used to specify security controls for a database server? Nonfunctional Requirements Solution Requirements Stakeholder Requirements Transition Requirements

Answers

Nonfunctional requirements would be used to specify security controls for a database server. Nonfunctional requirements specify the constraints and characteristics that a system must possess, but are not related to the specific functions it provides.

In the context of a database server, nonfunctional requirements would encompass security controls such as authentication and access controls, data encryption, and backup and disaster recovery procedures. These requirements are important to ensure that sensitive information stored in the database is protected from unauthorized access and that data can be recovered in the event of a system failure or breach.

Learn more about security: https://brainly.com/question/28070333

#SPJ4

A technique that uses data that is labeled to train or teach a machine.
Reinforcement
Unsupervised
Supervised

Answers

Answer:

computer.

Explanation:

it uses data that is labeled to train.

2. Which of these Is NOT part of the definition of Electricity?

A. Ability to do work

B. Closed Circuit

C. Power Supply

D. Movement of electrons

Answers

Answer:

B. closed circuit

Explanation:

please follow me

hope it helps you

Which devices are most likely to communicate with the internet? Select 3 options.
A. iron
B. calculator
C. smart TV
D. printer
E. cash register

Answers

Answer:smart TV, printer, and cash register

Explanation:Just put it

Answer:

- smart TV

- printer

- cash register

Explanation:

All of these devices are capable of operating digitally, and can be used to communicate with the internet.

I hope this helped!

Good luck <3

Write an application that prompts the user for a password that contains at least two uppercase letters, at least three lowercase letters, and at least one digit. Continuously reprompt the user until a valid password is entered. Display a message indicating whether the password is valid; if not, display the reason the password is not valid. Save the file as ValidatePassword.java.

Answers

Answer:

Here's an example Java application that prompts the user for a password that contains at least two uppercase letters, at least three lowercase letters, and at least one digit. The program continuously reprompts the user until a valid password is entered, and displays a message indicating whether the password is valid or not, along with the reason why it's not valid:

import java.util.Scanner;

public class ValidatePassword {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       String password;

       boolean hasUppercase = false;

       boolean hasLowercase = false;

       boolean hasDigit = false;

       do {

           System.out.print("Enter a password that contains at least 2 uppercase letters, 3 lowercase letters, and 1 digit: ");

           password = input.nextLine();

           for (int i = 0; i < password.length(); i++) {

               if (Character.isUpperCase(password.charAt(i))) {

                   hasUppercase = true;

               } else if (Character.isLowerCase(password.charAt(i))) {

                   hasLowercase = true;

               } else if (Character.isDigit(password.charAt(i))) {

                   hasDigit = true;

               }

           }

           if (password.length() < 6) {

               System.out.println("The password is too short.");

           } else if (!hasUppercase) {

               System.out.println("The password must contain at least 2 uppercase letters.");

           } else if (!hasLowercase) {

               System.out.println("The password must contain at least 3 lowercase letters.");

           } else if (!hasDigit) {

               System.out.println("The password must contain at least 1 digit.");

           }

           hasUppercase = false;

           hasLowercase = false;

           hasDigit = false;

       } while (password.length() < 6 || !hasUppercase || !hasLowercase || !hasDigit);

       System.out.println("The password is valid.");

   }

}

When you run this program, it will prompt the user to enter a password that meets the specified criteria. If the password is not valid, the program will display a message indicating the reason why it's not valid and prompt the user to enter a new password. The program will continue to reprompt the user until a valid password is entered. Once a valid password is entered, the program will display a message indicating that the password is valid.

I hope this helps!

Explanation:

Select the correct answer.
What aspect of mobile apps makes them attractive for communication?
OA.
They can be used on smartphones only.
OB. They facilitate fast texting between e-readers.
OC. They allow communication across platforms and networks.
OD. They allow easy access to social media even without Internet access.
Reset
flext

Answers

Answer:

it is for sure not-D.They allow easy access to social media even without Internet access.

so i would go with C.They allow communication across platforms and networks

Explanation:

TRUST ME

The statement 'they allow communication across platforms and networks' BEST describes the aspect of mobile apps that makes them attractive for communication.

A mobile application (i.e., an app) is an application software developed to run on a smartphone or tablet.

Mobile applications generally share similar characteristics to those observed when accessing through a personal computer (PC).

Mobile apps communicate by using different pathways and platforms such as email, in-app notices, and/or notifications.

In conclusion, the statement 'they allow communication across platforms and networks' BEST describes the aspect of mobile apps that makes them attractive for communication.

Learn more in:

https://brainly.com/question/13877104

Similarities between the primary memory and the secondary memory​

Answers

Answer:

Primary and secondary

Explanation:

Primary storage refers to the main storage of the computer or main memory which is the random access memory or RAM. Secondary storage, on the other hand, refers to the external storage devices used to store data on a long-term basis.

The reason for prioritizing your work is to get the
a. Most important jobs done
b. Smallest jobs done
c. Quickest jobs done
d. Least important jobs done

Answers

Answer:

a

Explanation:

Answer:

a. Most important jobs done

Explanation:

The DNS converts ____ into an IP address.

Answers

Answer:

DNS converts human readable domain names to an IP adress.

Explanation:

Which of the following best describes the ribbon?

Answers

In computer science, a ribbon refers to a graphical user interface (GUI) element used in software applications to provide access to various functions and features.

What is the Ribbon?

The ribbon is typically a horizontal strip located at the top of the application window and contains tabs and groups of commands organized by functionality.

Users can click on a tab to display a group of related commands, and then select the desired command to perform a specific task. The ribbon was introduced in Microsoft Office 2007 and has since been adopted by many other software applications as a modern and user-friendly interface for organizing and accessing program features.

Read more about graphics here:

https://brainly.com/question/18068928

#SPJ1

What characteristics are common among operating systems

Answers

The characteristics are common among operating systems are User Interface,Memory Management,File System,Process Management,Device Management,Security and Networking.

Operating systems share several common characteristics regardless of their specific implementation or purpose. These characteristics are fundamental to their functionality and enable them to manage computer hardware and software effectively.

1. User Interface: Operating systems provide a user interface that allows users to interact with the computer system. This can be in the form of a command line interface (CLI) or a graphical user interface (GUI).

2. Memory Management: Operating systems handle memory allocation and deallocation to ensure efficient utilization of system resources. They manage virtual memory, cache, and provide memory protection to prevent unauthorized access.

3. File System: Operating systems organize and manage files and directories on storage devices. They provide methods for file creation, deletion, and manipulation, as well as file access control and security.

4. Process Management: Operating systems handle the execution and scheduling of processes or tasks. They allocate system resources, such as CPU time and memory, and ensure fair and efficient utilization among different processes.

5. Device Management: Operating systems control and manage peripheral devices such as printers, keyboards, and network interfaces. They provide device drivers and protocols for communication between the hardware and software.

6. Security: Operating systems implement security measures to protect the system and user data from unauthorized access, viruses, and other threats.

This includes user authentication, access control mechanisms, and encryption.

7. Networking: Operating systems facilitate network communication by providing networking protocols and services. They enable applications to connect and exchange data over local and wide-area networks.

These characteristics form the foundation of operating systems and enable them to provide a stable and efficient environment for users and applications to run on a computer system.

For more such questions characteristics,click on

https://brainly.com/question/30995425

#SPJ8


Georgia is using a specific type of encryption method that only codes a certain section of the files on her hard drive. What type of
encryption is Georgia using?
A device encryption
B. private key encryption
C. volume encryption
D.
half encryption

Answers

I think it’s d but I’m not sure

In which document view type is it impossible to edit the document in Word 2019?
Read Mode
View Mode
Print Mode
Drift Layout

Answers

Answer:

Read Mode

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;

I. View Mode

II. Print Mode

III. Drift Layout

Hence, the document view type in which it is impossible to edit the document in Word 2019 is the Read Mode. Basically, the Read Mode is a view type that only allows the user to read the word document.

spreadsheet formula for total 91?​

Answers

Answer:

Go to any blank cell. Enter the number 91.

Select the cell that contains 91. Press Ctrl+C to copy.

Select your range the contains numbers.

Press Ctrl+Alt+V to open the Paste Special dialog.

In the top of the Paste Special dialog, choose Values. In the Operation section, choose Add. Click OK.

Explanation:

Computers are because they can perform many operations on their own with the few commands given to them

Answers

Computers are programmable because they can perform a wide range of operations on their own with just a few commands given to them. They are designed to carry out different functions through the execution of programs or software, which comprises a sequence of instructions that a computer can perform.

The instructions are expressed in programming languages, and they control the computer's behavior by manipulating its various components like the processor, memory, and input/output devices. Through these instructions, the computer can perform basic operations like arithmetic and logic calculations, data storage and retrieval, and data transfer between different devices.

Additionally, computers can also run complex applications that require multiple operations to be performed simultaneously, such as video editing, gaming, and data analysis. Computers can carry out their functions without any human intervention once the instructions are entered into the system.

This makes them highly efficient and reliable tools that can perform a wide range of tasks quickly and accurately. They have become an essential part of modern life, and their use has revolutionized various industries like healthcare, education, finance, and entertainment.

For more questions on Computers, click on:

https://brainly.com/question/24540334

#SPJ8

true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.​

Answers

Answer:

False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.

Other Questions
Which is NOT true of the cell theory?All living organisms are composed of cellsAll living organisms are composed of cellsAll cells have a nucleus, which acts like the brain of the cellAll cells have a nucleus, which acts like the brain of the cellAll cells come from preexisting living cellsAll cells come from preexisting living cellsthe cells is the most basic part of a living organism The diameter of a circle is 10cm find the circumference to the nearest tenthAnswer c= Cm Steven has deposited $6,646 in 13.0% p.a. simple interest rate for 4 months. Hov much is his outstanding balance at the end of 4 months? Your Answer: Answer Question 5 (1 point) If you save $8,132 now and the account pays 11.9% per annum, compounding monthly, how much is the outstanding balance at the end of year 3 ? Your Answer: Answer Question 6 (1 point) How much would you need to deposit today into an account earning 4.0\% p.a. compounding quarterly, to have $5,947 at the end of year 6 ? Your Answer: What is the present value of a 2 -year annuity due with annual payments of $1,817? Assume interest rate is 6.8% p.a. compounded annually. Your Answer: Answer Question 8 (1 point) Jack will receive $34,513 at the end of each year until infinity. If the interest rate is 13% p.a, how much is the present value of this income stream? Your Answer: William expects to live for another 25 years after retirement. During those 25 years, William plans to withdraw $4,000 living expense from his superannuation fund at the beginning of each month. How much is the minimum superannuation balance William needs when he retires? Assume his superannuation fund delivers 11.6% p.a. rate of return, compounded monthly. Your Answer: Answer Question 10 (1 point) You are planning your retirement and you come to the conclusion that you need to have saved $1.54 million in 29 years. You can invest into a superannuation that guarantees you a 5.3\% p.a. return compounded monthly. To achieve your retirement saving goal, how much is the monthly contribution if it is made at the beginning of each month? Your Answer: F(x)=2(5x+7) find f(-2) 1. (10 Pts) A hospital wishes to maintain database of all the doctors and the patients in the hospital. For each doctor, the hospital is required to store the following information: 1. Name of the doctor 2. ID of the doctor 3. Telephone number of the doctor Also, for each patient, the hospital is required to maintain the following information: 1. Name of the patient 2. Ward number in which the patient is admitted 3. Fees charged to the patient 4. ID of the doctor who is treating the patient Write a C++ program that will create necessary classes to store this data. 2. (10Pts) Create a class to represent a dimension of a line segment that is specified in terms of centimeters and millimeters. The program should read the dimensions of two-line segments and calculate a resultant dimension, which is the addition of two dimensions. For example, if the two dimensions are d1= 10 cm and 5 mm d2 = 15 cm 7 mm, then the resultant dimension should be calculated as: 26 cm and 2 mm. Mr. President, I am writing you a letterwhich maybe youll read if you have the time.I have just received my army recruitment papersto report for duty in the war*by Wednesday evening.Mr. President, I do not want to do that;I was not put on this earth to kill wretched people living far away.I must tell youits not to make you madbut Ive made my decision: I am going to desert....I will hit the road and beg for my lifeall over Franceand I will call out to the people:Refuse to obey! Refuse to do it!Dont go to fight in the war! Just say no!If someones blood must be shed,Then shed yours, Mr. President! Lead by example!And if you decide to hunt me down, warn your policethat I will be unarmed, and that they can go ahead and shoot.*a reference to the war in French Vietnam~Boris Vian, French poet, The Deserter, 1954Which of the following aspects of the political context of the 1950s best explains the authors view of colonial wars expressed in the poem? aThe intensification of anticommunist sentiment in the context of the Cold War bThe beginning of European economic and political integration cThe influence of United States mass media dThe memory of the destructive total wars of the early twentieth century PLEASE HELP! I'LL MARK YOU AS THE BRAINIEST AND I'LL GIVE YOU A LOT OF POINTS! Item 3Read these lines from "The Rainy Day."Be still, sad heart! and cease repining;Behind the clouds is the sun still shining;Thy fate is the common fate of all,Into each life some rain must fall,Some days must be dark and dreary.What does the phrase "Into each life some rain must fall" mean?All lives eventually come to an end.Everyone faces times of unhappiness.Sometimes it's good to be unhappy.It is foolish to be unhappy. ACTIVITY 4Directions: Answer the crossword puzzlePlease answer this I really need this please 2.2. THE RESPONS IBILITY OF THE VARIOUS LEVELS OF THE GOVERNMENT. A. List the roles of the different levels of the government. (3x1) (3) B. Name the environmental legislation/ regulations/ mechanisms (applicable to South Africa) that exercised by the different levels of government C. Environmental laws of various countries or continents are subject to the provisions of the Sustainable Development Goals (SDGs). Name at least two environmentally aligned SDGs. D. Personal values have a direct impact on how people treat personal and environmnental health. Explain this statement. (3x1) (3) (2x) (2) (Ix2) (2) E. Critically evaluate how the different levels of the government perform their environmental responsibilities. (3x2) (6) [16} the main reason that reits exist is to: ch21 a. create a tax loophole for wealthy investors b. allow shopping center owners to sell their properties in a down market c. make life complicated d. encourage capital formation within the real estate industry e. allow stock promoters to sell a real estate product with high commissions Look at the picture cuz that's what I have to do and I don't get it Which transformation creates an image that is similar but not congruent? Clockwise rotation of 15oand translation by 2 units toward the rightBTranslation by 5 units up, reflection along the y-axis, and dilation with a scale factor of 1.5CDilation with a scale factor of 2 and then dilation with a scale factor of 0.5DReflection along the x-axis and the counterclockwise rotation of 90o What is 2+2 plzzzzz help Im only 83 Find the second component of the point of intersection of the following two lines (x, y) = (2, -3) + s(0,1), (x, y) = (7,11) + t(1,2). A -8 B -5 C 4D 1 E 2 Berts age plus twice Ernies age is 30. Berts age plus 8 times Ernies age is 108. How old are Bert and Ernie? Write a short news article about finding and solving the mystery of a strange animal. What clues were important? What clues were confusing? Which principle of government helped spur the development of new government systems based on laws and not on the opinions of individuals?-separation of church and state-balance of power-rule of law-natural law what is the major disadvantage of using the naive approach for prediction? group of answer choices 3 QUESTIONS! I'LL GIVE BRAINLIEST! 1. Which infographic is the best mix of text and visuals?What Do Colors Mean?Obesity in AmericaThe People of the United States2. Which infographic is mainly visuals, with a small amount of information?The People of the United StatesWhat Do Colors Mean?Obesity in America3.Andrea needs to create an infographic to help her learn new words for a social studies quiz. What type of information should she present?dates and stagessimilarities and differencesvocabularydata