A ______ provides a private point-to-point connection across the internet.

A) personal area network
B) campus area network
C) virtual area network
D) metropolitan area network

Answers

Answer 1

Answer: A: personal area network

Explanation: hope this helps

Answer 2

Answer:

A) personal area network

Explanation:

I took the test and got it right


Related Questions

can
you do keyword analysis and strategy for contiki app.

Answers

Yes, keyword analysis and strategy can be done for the Contiki app. Keyword analysis is a crucial part of search engine optimization (SEO) that enables the optimization of web content for various search engines.

Keyword analysis and strategy involve conducting research to identify the most relevant keywords to target and how to use them. The analysis and strategy help in making sure that the keywords used are relevant to the content on the Contiki app. The keywords can be used on different aspects of the Contiki app, such as its title, descriptions, app content, and app screenshots.An effective keyword analysis and strategy for the Contiki app involves researching various keywords and choosing the most relevant ones to use.

The keywords chosen should have a high search volume and low competition. The keyword strategy should also include the use of long-tail keywords to enhance the app's visibility.The keyword analysis and strategy for the Contiki app should also involve monitoring and analyzing the performance of the keywords. This will help in identifying any changes or trends in user behavior and updating the keyword strategy accordingly.In summary, keyword analysis and strategy are essential for optimizing the Contiki app for search engines. By choosing the most relevant keywords and using them effectively, the app can increase its visibility and attract more downloads.

To know more about search engines visit:

https://brainly.com/question/32419720

#SPJ11

Play a text-based adventure game (10 points)

The game must ask the user to make 3 choices at least twice.

It must use at least one loop and one randomizing element

The game must have at least 2 different ending depending on the user’s choice


Python

Answers

Using the knowledge in computational language in python it is possible to write a code that must use at least one loop and one randomizing element and must have at least 2 different ending depending on the user’s choice.

Writting the code:

print("\nMovement commands : North, South, East, or West")

print("Add to inventory: Get item\n")

introduction() # I just cut my long-winded intro. it works.

rooms = {

   'House': {'north': 'Drug Store', 'south': 'Clinic', 'east': 'Kitchen', 'west': 'Craft Store'},

   'Drug Store': {'south': 'House', 'east': 'Electronics Store', 'item': 'Hand Sanitizer'},

   'Electronics Store': {'west': 'Drug Store', 'item': 'ANC Headphones'},

   'Craft Store': {'east': 'House', 'item': 'A Mask'},

   'Clinic': {'north': 'House', 'east': 'CDC', 'item': 'A Vaccine'},

   'CDC': {'west': 'Clinic', 'item': 'Dr Fauci Candle'},

   'Kitchen': {'west': 'House', 'north': 'State of Florida', 'item': 'Anti-viral Spray'},

   'State of Florida': {'item': 'COVID-19'}  # VILLAIN, final room

}

current_room = 'House'  # location variable that will change as player moves

inventory = []  # empty list that will fill as you collect items

directions = ('north', 'south', 'east', 'west')  # possible movements

item = ('hand sanitizer', 'anc headphones', 'a mask', 'a vaccine', 'dr fauci candle',

       'anti-viral spray', 'covid-19')

while True:

   print('\nYou are in the {}'.format(current_room)) # current game status

   print('Inventory: {}'.format(inventory))

   if 'item' not in rooms[current_room]:

       pass

   else:

       print('You see {}'.format(rooms[current_room]['item']))

   print('-' * 25)

   command = input('Enter your move:\n').lower().strip()

if command in directions:

   if command in rooms[current_room]:

       current_room = rooms[current_room][command]

       if current_room in ['State of Florida']:

           if len(inventory) == 6:

               print('You have contracted COVID-19! G A M E  O V E R')

           else:

               print('You have defeated COVID-19!')

               print('Thank you for protecting your fellow teammates.')

           break

See more about python at brainly.com/question/12975450

#SPJ1

Play a text-based adventure game (10 points)The game must ask the user to make 3 choices at least twice.It

The range of positive integers possible in an 8-bit two's complement system is: A) 1 to 256. B) 1 to 127. C) 1 to 255. D) 1 to 128.

Answers

Answer:

The correct answer is B) 1 to 127.

Explanation:

In an 8-bit two's complement system, the range of positive integers possible is from 0 to (2^8)-1 = 255. However, since the two's complement system allocates the most significant bit (MSB) to represent the sign of the number, the range of positive integers would be halved. Therefore, the range of positive integers in an 8-bit two's complement system is from 1 to 127.

which device combines multiple security features, such as anti-spam, load-balancing, and antivirus, into a single network appliance?

Answers

UTM systems integrate several security functions into a single hardware or software package. This can be helpful because there are five main dangers that businesses need to guard against: malware, phishing, social engineering, and data breaches.

Unified threat management (UTM) – what is it?A system of information security (infosec) known as unified threat management (UTM) offers a single point of defense against threats such as viruses, worms, spyware, other malware, and network attacks. It makes it simpler for administrators to administer networks by combining security, performance, management, and compliance capabilities into a single installation.A UTM system, unlike antivirus software, guards more than only servers and personal computers (PCs). By scanning all network traffic, filtering out potentially harmful content, and preventing intrusions, it safeguards an entire network as well as individual users. Many small and medium-sized organizations (SMBs) have embraced UTM systems because they believe that managing their information security with a single system, as opposed to multiple smaller ones, is easier.

To Learn more about UTM systems refer to:

https://brainly.com/question/6957939

#SPJ4

stop errors happen when which type of processes encounter an error?

Answers

The stated assertion claims that errors happen when processes are executing in kernel mode.

What do computer program faults entail?

Errors are issues or flaws in the software that cause it to behave abnormally. Even skilled developers are capable of making these flaws. Debugging is the process of eradicating flaws, which are sometimes referred to as faults or bugs in programming.

How many different error kinds are there?

Use of a high precision device for measurement can lower the least count error, which has to be corrected. (2) Random mistakes - In addition to personal! error by the observer, random errors can also result from unexpected and random changes in experimental settings like pressure, temperature, voltage supply, etc.

To know more about Errors visit:

https://brainly.com/question/29453137

#SPJ4

what is typically the smallest addressable unit of memory on a computer system?

Answers

The smallest addressable unit of memory on a computer system is typically a byte.

A byte is a unit of digital information that consists of 8 bits. Each bit can represent either a 0 or a 1, which allows for a total of 256 possible values (2 to the power of 8). Bytes are used to represent various types of data, such as characters, numbers, and instructions.

In modern computer systems, bytes are usually grouped together into larger units of memory, such as kilobytes (KB), megabytes (MB), and gigabytes (GB). These larger units are used to measure the amount of memory available in a computer system and are important for understanding how much data can be stored and accessed.

It's worth noting that some computer systems may use different sizes of memory units, such as words or doublewords, depending on the architecture of the processor and the design of the system. However, in most cases, a byte remains the smallest addressable unit of memory that can be accessed by a computer system.

Learn more about byte:https://brainly.com/question/14927057

#SPJ11

which two parts are components of an ipv4 address? (choose two.)

Answers

The two components of an IPv4 address are a network address and a host address.

Explanation:
The two components of an IPv4 address are:

Network address: This is the part of the IPv4 address that identifies the network on which the device is located. It is used by routers to route packets to their destination.

Host address: This is the part of the IPv4 address that identifies the specific device on the network. It is used by routers to forward packets to the correct device on the network.

Both the network address and host address are represented as 32-bit binary numbers, which are usually expressed in dotted decimal notation (four decimal numbers separated by periods) for human readability. For example, an IPv4 address of 192.0.2.1 has a network address of 192.0.2 and a host address of 1.

To know more about IPv4 address click here:

https://brainly.com/question/28565967

#SPJ11

Please select the word from the list that best fits the definition. The gap between those with access to new technologies and those without.
a. the great divide
c. the knowledge-gap hypothesis
b. the digital divide
d. the spiral of silence

Answers

The gap between those with access to new technologies and those without is referred to as B: 'the digital divided'.

The gap between those people in a society who are computer literate and have access to information technology resources such as the Internet and those who do not are referred to as the 'digital divided'. In the term, 'digital divided' the word digital means information technology and the word divide means gap, differences, or disparity. Therefore, it is fine to state that the 'digital divided' refers to the socioeconomic differences between individuals in their access to technological resources.

You can learn more about digital divided at

https://brainly.com/question/7478471

#SPJ4

what is the meaning of .net in computer​

Answers

Answer:

.net is a top-level domain, also known as a TLD. Derived from the word network, it was originally developed for companies involved in networking technology. Today .net is one of the most popular domain names used by companies all over the world to launch their business online.

Why do games usually have rules?

A.
to make them less fun

B.
to provide structure so that the game objective can be achieved

C.
so that they can be broken

D.
because it’s easier to program rules into a game

Answers

Answer:

B

Explanation:

Part B

we have a baseband channel with a i-mhz bandwidth. what is the data rate for this channel if we use 2b1q line coding scheme?

Answers

There is an i-mhz bandwidth baseband channel available. If the 2b1q line coding method is used, the data rate for this channel will be NRZ-L.

How wide a band does the baseband signal have?

A baseband bandwidth is defined as the highest frequency of a system or signal, or an upper bound on such frequencies, such as the upper cut-off frequency of a low-pass filter. Passband bandwidth, on the other hand, is the distance between the highest frequency and the lowest frequency that is not zero.

When you say baseband Ethernet, what do you mean?

describing a telecommunication system where data is transmitted digitally across a single, unmultiplexed signal channel over the transmission medium. A baseband network, such as Ethernet or token ring local area networks, are covered by this usage.

To know more about bandwidth visit :-

https://brainly.com/question/28436786

#SPJ4

threadless is an online store that sells shirts with user-submitted designs. anyone can register and submit a design, then community members score the designs submitted each week, and threadless picks the top designs to sell in their store each week. designers receive royalties for every shirt sold. here's one example of a submitted user design: a screenshot of a threadless shirt design submission, of a dandelion riding a motorcycle, a username of the designer, and 1-5 scoring buttons. what situation would be least likely to threaten the success of the threadless crowdsourcing model? choose 1 answer: choose 1 answer: (choice a) if a large number of new designers suddenly join the community and submit double the number of designs. a if a large number of new designers suddenly join the community and submit double the number of designs. (choice b) if designers discover a new site with higher royalties for winning designs and only submit their designs on the new site. b if designers discover a new site with higher royalties for winning designs and only submit their designs on the new site. (choice c) if designers submit designs that aren't attractive to the threadless community and public at large. c if designers submit designs that aren't attractive to the threadless community and public at large. (choice d) if community members all decide to vote for shirts that they have no interest in owning. d if community members all decide to vote for shirts that they have no interest in owning.

Answers

Conciseness is also important and irrelevant parts of the question or typos should be ignored.The situation that would be least likely to threaten the success of the Thread less crowdsourcing model is if community members all decide to vote for shirts that they have no interest in owning.option b is correct

Thread less is an online store that sells shirts with user-submitted designs. Anyone can register and submit a design, then community members score the designs submitted each week, and Thread less picks the top designs to sell in their store each week. Designers receive royalties for every shirt sold.One example of a submitted user design is a screenshot of a Thread less shirt design submission, of a dandelion riding a motorcycle, a username of the designer, and 1-5 scoring buttons. The design has to appeal to the Thread less community and the public at large for it to sell.If a large number of new designers suddenly join the community and submit double the number of designs, it may be a good thing for the store. More designs could mean more choices for customers and potentially more sales. If designers discover a new site with higher royalties for winning designs and only submit their designs on the new site, this could be a threat to the Thread less crowdsourcing model. However, this situation is not the least likely to threaten the success of the model, as it involves the designers who submit designs.The situation that would be least likely to threaten the success of the Thread less crowdsourcing model is if community members all decide to vote for shirts that they have no interest in owning. This could lead to the selection of designs that are not attractive to the public and may not sell well. Therefore, it is important for the Thread less community members to be honest and vote for designs that appeal to them and are likely to be successful.

For such more question on crowdsourcing

https://brainly.com/question/28360136

#SPJ11

Internal combustion engines use hot expanding gasses to produce the engine's power. Technician A says that some engines use spark to ignite the gasses. Technician B says some engines use compression to ignite the gasses. Who is correct?

Answers

Answer:

Explanation:

Both are right.

Engines are divided into:

1) Internal combustion engines

2) Diesels

What steps will change an existing macro? Use the drop-down menu to complete the steps.
1. Go to the
tab on the ribbon.
2. In the Macros group, click
3. Click
, which will open the VBA editor.
4. Find and change the code and Save and Close.

What steps will change an existing macro? Use the drop-down menu to complete the steps.1. Go to thetab

Answers

Answer:

1. View

2. View macros

3. Edit

Explanation: completed on edge

1. a data model is a: a) the mathematical model of formulas and logic used in a system b) the abstract creating of an ideal system transformation c) the model that is produced by extreme programming d) the expanded, thoroughly balanced and normalized use case for a system e) a formal way of representing the data that are used and created by a business system

Answers

A data model is a: E) a formal way of representing the data that are used and created by a business system.

What is data?

In Computer programming and technology, data can be defined as any representation of factual instructions or information in a formalized and structured manner, especially as a series of binary digits (bits), symbols, characters, quantities, or strings that are used on computer systems in a company.

What is a data model?

In Computer technology and Business management, a data model can be defined as a formal way that is typically used for the representation of all of the data that are generated, used, and created by any business system.

Some examples include places, people, or things about which information can be captured and how they are inter-related to each other.

Read more on data here: brainly.com/question/26207955

#SPJ1

what command would you use to install a software package on a redhat (or its derivatives) system?

Answers

To install a software package on a Red Hat (or its derivatives) system, you can use the `yum` command.

`yum` is the package management utility for Red Hat-based Linux distributions, such as Red Hat Enterprise Linux (RHEL), CentOS, and Fedora. Here's how you would use it to install a software package:

1. Open a terminal or log in to your Red Hat system.

2. Make sure you have administrative privileges or use the `sudo` command to run commands as the root user.

3. Use the following syntax to install a package with `yum`:

```

sudo yum install <package_name>

```

Replace `<package_name>` with the name of the software package you want to install. For example, if you want to install the Apache web server, the command would be:

```

sudo yum install httpd

```

4. Press Enter to execute the command.

5. `yum` will resolve dependencies, download the necessary files, and install the package and its dependencies.

After the installation completes, you should be able to use the software package on your Red Hat system. Keep in mind that the actual package name may vary depending on the software you want to install, so it's important to check the correct package name beforehand.

Additionally, Red Hat 8 and its derivatives use the `dnf` command, which is a successor to `yum` but provides similar functionality.

Learn more about software:

https://brainly.com/question/28224061

#SPJ11

Language: JAVA
Given the following method:

public void call(int k)
{
if (k > 1)
{
call(k - 2);
call(k - 1);
System.out.print(k);
}
}

What will be the output by the command call(5);?

a) 3 4 5
b) 2 2 3 4 5
c) 2 3 2 3 4 5
d) 2 3 2 2 3 4 5
e) 2 3 2 3 2 3 4 5

Please explain this if possible--thanks in advance!

Answers

Answer:

B

Explanation:

I believe that would be the answer from the algorithm you used in the call function.

Correct me if I am wrong

Type the correct answer in the box.

Use numerals instead of words.
If necessary, use / for the fraction bar.

In which year did the government decommission ARPANET?

The government decommissioned ARPANET in

Answers

The government decommissioned ARPANET in 1990, and the government did that because the newer version of the internet came into play, so the ARPANET, which was the older one, got decommissioned.

What is ARPANET?

This was the early internet that was controlled and regulated by the United States defense sector, and it used the packet switching technology by which the messages are sent and the communication is done, but later, when the new and advanced version of the internet came into play, the government decommissioned it in 1990.

Hence, the government decommissioned ARPANET in 1990, and the government did that because the newer version of the internet came into play, so the ARPANET, which was the older one, got decommissioned.

Learn more about ARPANET here.

https://brainly.com/question/28577400

#SPJ1

What is Current interrupt register

Answers

Answer: An interrupt control register, or ICR, is a hardware register in a computer chip used to configure the chip to generate interrupts—to raise a signal on an interrupt line—in response to some event occurring within the chip or a circuit connected to the chip.

Explanation:

Complete the sentence.

When all the food chains are brought together, they appear like a

ASAP because it's a quiz and time limit

Answers

When all the food chains are brought together, they appear like a web.

What is a good first step to understanding any kind of text?

A. Create meaning
B. Find the main idea
C. Take some notes
D. Focus on details​

Answers

Answer:

thanks , that's really useful

Answer:
D. Focus on details

Explanation:
Another Brainly post has the answer

ques.3
Consider a comma-separated file containing details of all the employees of an organization. Each line in the file contains employee Id, department Id, leaves taken this year and the gender of the empl

Answers

The AWK script below can be used to achieve the desired output:

The AWK script

BEGIN {

   FS = ", "

  MIN_LEAVES = 31

}

{

   department = $2

   leaves = $3

   

   if (leaves < MIN_LEAVES) {

      MIN_LEAVES = leaves

   }

   

   if (department in min_leaves_department) {

       if (leaves < min_leaves_department[department]) {

           min_leaves_department[department] = leaves

       }

   } else {

       min_leaves_department[department] = leaves

   }

}

END {

   print MIN_LEAVES

   

   for (department in min_leaves_department) {

      print department "_" min_leaves_department[department]

   }

}

The script starts by setting the field separator (FS) to ", " and initializing the variable MIN_LEAVES to 31 (a maximum value to ensure it gets updated in the loop). In the main block, it reads each line from the input file and stores the department and leaves taken in variables.

Read more about programs here:

https://brainly.com/question/25458754

#SPJ4

The Complete Question

Consider a comma-separated file containing details of all the employees of an organization. Each line in the file contains employee Id, department Id, leaves taken this year and the gender of the employee in the format, employee_ID department ID leaves taken,gender employee_iD and department_iD are alphanumeric values, leaves_taken is an integer and gender can have only two values male or female. Write an AWK script to print the minimum number of leaves taken by employees in the organization as described below. In your output: The first line should be a number that denotes the minimum number of leaves taken by any employee in the whole organization. Followed by N lines of output, where N is the number of departments denoted by a unique department_ iD. Each of these N lines should be in the format department_ID_MIN_LEAVES_TAKEN Where department_ID is a unique department Id, MIN_LEAVES_TAKEN is the minimum number of leaves taken by any employee in the department denoted by department iD. . Sample Input C89707250,C, 13, male A8825622,A,17, male C2366741,C,12, male B67143992,B,15, male B45126668,B,5,female Sample Output The below sample output shows that the minimum leaves taken by any employee in the whole organization is 5 . There are three departments in the organization so the following three lines give the minimum leaves of employees in each department. 5 A: 17 B:5 C.12 Note: The number of leaves taken by any employee is less than 31. Hint: Use length(var) =0, to check is a variable is null or not set. This assignment has public test cases. Please click on Test Run" button to see the status of public test cases. Assignment will be evaluated only after submitting using "Submit" button below. If you only test run the program, your assignment will not be graded and you will not see your score after the deadline. Sample Test Cases Test Case 1 . Input \begin{tabular}{ll} C89707250,C,13,male & 5 \\ A8825622, A.17,male & A.17 \\ C2366741,C,12,male & B:5 \\ B67143992,B,15, male & C.12 \\ \hline B45126563,B,5, female & \end{tabular} Test Case 2 Input Expected 5 A:5 B:15 C.11 Actual Output B45126668,B,5,female Expected A.17 B:5 C.12 C21332435,C,11,male B95329333,B,15,male C4275631,C,18,female A9844210,A11,female A332797, A,5, male B21149330,B,18,female Actual Output Test Case 3 Input B27402569,8,14,female A28414284, ,10, male A97754832, 2, male A7534075,A20, male A326785, 18,female B5257990,B,17, male

maria is writing a policy that defines her organization's data classification standard. the policy designates the it assets that are critical to the organization's mission and defines the organization's systems, uses, and data priorities. it also identifies assets within the seven domains of a typical it infrastructure. which policy is maria writing?

Answers

Based on the above description, the policy that maria is known to have been writing is said to be Asset classification policy.

What is the meaning of Asset classification policy?

The term known as Asset classification policy is known to be a kind of a policy that is said to be used to state out all of a firm or an organization's data classification standard.

Note that it is one that often informs us what the information Technology  assets are as they are known to be critical to the organization's mission.

The use of policy is one that helps in guiding the day to day running of any business.

Therefore, It helps us to be able to state the organization's systems, uses, as well as data priorities and as such, based on the above description, the policy that maria is known to have been writing is said to be Asset classification policy.

Learn more about Asset classification policy from

https://brainly.com/question/5581152
#SPJ1

What equipment allows a computer to connect to the internet.

Answers

Answer:

To connect to the Internet and other computers on a network, a computer must have a NIC (network interface card) installed

Explanation:

An expert system used on a medical website accepts an input illness from the user and produces a list of possible symptoms. What type of function is the interface engine performing?
A.
backward chaining
B.
production unit
C.
production rule
D.
forward chaining
E.
knowledge base

Answers

The answer is froward chaining

Answer:

The correct answer would be:

D.

forward chaining

#PLATOFAM

Have a nice day!

why is it important to avoid digging into the agar with the loop?

Answers

The bacteria can grow in the gouge preventing the bacteria from growing into distinct colonies.

How do bacteria contaminate the agar plates?

Even when researchers use adequate sterile methods, contamination frequently happens when pouring or inoculating agar plates. Freshly poured plates may become useless due to bacterial and fungal spores in the air and on surfaces, or inoculated plates may provide inconsistent findings.

Be on the lookout for microbial contamination indicators. The existence of any bacterial colonies implies contamination if the plate has not been inoculated. Look for colonies on an inoculation plate that have a morphology that differs from what you would anticipate from the kind of bacteria that were used to inoculate the plate.

Place a group of plates in an incubator heated to 37 degrees Celsius or another warm area overnight if you think the contamination may have occurred during pouring as a result of poor sterile technique, and then check for contamination as directed above.

To know more about bacteria, check out:

https://brainly.com/question/6941760

#SPJ1

Line spacing refers to the amount of space between each line in a paragraph

Answers

Answer:

yes sir, its just the format of the paragraphs

A typical day in programming and software development would involve

monitoring network connections.

figuring out why a computer will not turn on.

using an image-editing program.

writing code for a software program.

Answers

Answer:

writing code for a software program.

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

Some of the models used in the software development life cycle (SDLC) are; waterfall model, incremental model, spiral model, agile model, big bang model, and V-shaped model.

The five (5) standard stages of development in software development are;

I. Analysis.

II. Design.

III. Implementation (coding).

IV. Testing.

V. Maintenance.

A typical day in programming and software development would involve writing code for a software program.

Generally, software applications or programs require a code containing series of sequential instruction to perform specific tasks, commands and processes. These sets of code are typically written by a software developer (programmer).

Consider each step in the selling process. Which steps
could be conducted through technology (Internet, webinars, etc.)?
Which are most important to handle "face-to-face"?

Answers

In the selling process, there are several steps that can be conducted through technology, leveraging the internet, webinars, and other digital tools.

These steps include:

1. Prospecting: Technology can play a crucial role in identifying and reaching potential customers. Through online platforms, social media, and digital advertising, salespeople can effectively prospect and generate leads without the need for face-to-face interactions.

2. Initial contact and communication: The initial contact with prospects can be established through various digital means, such as email, online chat, or video conferencing. Salespeople can leverage these channels to introduce themselves, initiate conversations, and gather initial information about the prospect's needs and interests.

3. Presentations and demonstrations: Technology enables salespeople to conduct presentations and product demonstrations remotely through webinars, virtual meetings, or video conferences. These platforms allow for effective visual and audio communication, showcasing the features and benefits of the product or service to potential customers.

4. Proposal and negotiation: The process of creating and sharing proposals with prospects can be handled through technology. Salespeople can use email or online document-sharing platforms to send proposals, pricing details, and negotiate terms remotely.

5. Closing the sale: Depending on the complexity of the sale, closing can be facilitated through technology. Contracts and agreements can be signed electronically using e-signature tools, and online payment systems can be utilized for secure and efficient transactions.

Learn more about internet :

https://brainly.com/question/31546125

#SPJ11

how telecommunications works?​

Answers

Answer:

Telecommunications are the means of electronic transmission of information over distances. The information may be in the form of voice telephone calls, data, text, images, or video. Today, telecommunications are used to organize more or less remote computer systems into telecommunications networks.

Explanation:

Other Questions
(1 point) If F =(3x2+5y4)F=(3x2+5y4), find CF dr CFdr where CC is the quarter of the circle x2+y2=9x2+y2=9 in the first quadrant, oriented counterclockwise.CF dr = the organs from a single cadaver can be used for only one living person. Was the Long Island serial killer found? describe the extracellular and intracellular flui how do those compartments relate to the internal and external environment if 4.2 g of methane reacts with excess oxygen gas to form carbon dioxide and water in the following chemical equation, how much water is produced in the reaction? A bias that occurs when the order of the questions, or of the closed-end responses to a particular question, influences the answer given is called what must a fire department's health and safety program address Which is an example of when hector's somatic sensory system is in control? The best reason to pay above market is:A. to attract better workers and enhance our employment brandB. to take advantage of tax incentivesC. to keep the unemployment rates downD. to invest in workforce development opportunitiesE. to avoid negligent hires help plzzzz 10 points A block exerts a force of 84 Newtons on a table.The pressure on the table is 30 N/m.Work out the area of the box that is in contact with the table.Total for question 5 is 2 marks)pressure =forcearea the bank of garland has $1 million in deposits and $500,000 in reserves. if excess reserves are equal to $150,000, the required reserve ratio is: a) 15%. b) 20%. c) 35%. d) 65% Company SamsungFor this project case study, you are required to choose a company that values or appears to value sustainability and ethical practices, conduct online research on that company, and then prepare a report that includes the following information:1. An overview of the companys values and practices as they pertain to sustainability and ethical practices2. A detailed description of the companys:a. Sustainable sourcing strategies. This can be an existing strategy or one that is in the process of implementation.b. Sustainable product and/or packaging design. Be sure to include specific examples.c. Using Table 4.1 on page 116 of the textbook, describe any of The Ethical Trading Initiatives Base Code clauses the company may currently use. If the company does not practice any of these clauses, choose 2 or 3 of the clauses that you believe the company should practice and why youve chosen those particular clauses. 50 points!! Can someone please help me?? Random answers will be reported! I will mark brainliest to the correct answer :) Which installation method is most likely to put your computer at risk of downloading a virus?. what does phone mobile mean ? What was Karl Marx property called? After reading "How to change your oil and filter" How do these instructions address common mistakes or pitfalls to avoid during the process? Angle pair relationships name complementary linear pair vertical adjacent or supplementary number 1) 3. Which Enlightenment ideals did French revolutionaries want to accomplish?A liberty, fraternity and civilian leadershipB truth, liberty, the pursuit of happinessC liberty, equality, and fraternityD liberty and economic stability