File encryption protects data on a computer against the following except:A. Trojan cryptoB. hostile usersC. theftD. Trojans

Answers

Answer 1

File encryption protects data on a computer against Trojan crypto, hostile users, and theft, but it does not provide complete protection against Trojans.

File encryption is a security measure that converts readable data into an unreadable format using cryptographic algorithms. It provides protection for sensitive data by ensuring that only authorized individuals with the appropriate decryption key can access the encrypted files. File encryption is effective in safeguarding data against various threats, including Trojan crypto, hostile users, and theft. Trojan crypto refers to malware that encrypts files on a victim's computer, holding them hostage until a ransom is paid. File encryption can prevent such attacks by ensuring that files are already encrypted and inaccessible to unauthorized individuals.

Hostile users, who may try to gain unauthorized access to sensitive data, are also unable to decipher encrypted files without the encryption key. Additionally, encryption adds an extra layer of protection against theft since even if the data is stolen, it remains encrypted and unusable without the decryption key. However, it's important to note that file encryption does not provide complete protection against Trojans. Sophisticated Trojans can potentially intercept data before encryption or compromise the encryption process itself, bypassing the protection provided by file encryption. Therefore, it's crucial to employ additional security measures, such as anti-malware software and secure computing practices, to mitigate the risk of Trojans and ensure comprehensive data protection.

Learn more about  encryption here: https://brainly.com/question/28283722

#SPJ11


Related Questions

một số được gọi là thác đổ nếu phần tử biểu diễn thập phân của nó nhiều hơn một chữ số đồng thời theo chiều từ trái qua phải chữ số đứng trước lớn hơn chữ số đứng sau
dữ liệu vào tệp THACDO.INP gồm nhiều dòng,mỗi dòng chứa số nguyên N
kết quả ra tệp THACDO.OUT gồm nhiều dòng thông báo,mỗi dòng ghi "CO" nếu N là thác đổ và ngược lại thông báo "KHONG" nếu N không phải

Answers

I don’t understand this

Which of the following statements about an inner class is true? An inner class is used for a utility class that should be visible elsewhere in the program. An inner class that is defined inside a method is publicly accessible. An inner class that is defined inside a method is not publicly accessible. An inner class that is defined inside an enclosing class but outside of its methods is not available to all methods of the enclosing class.

Answers

Answer:

(c) An inner class that is defined inside a method is not publicly accessible.

Explanation:

In programming languages such as Java, inner class (also called nested class) basically means a class inside another class or interface. The following are a few things to note about an inner class

i. Inner classes are used to group classes logically so that they are easy to use and maintained.

ii. An inner class defined inside a method of an enclosing class is not publicly accessible. They are called method local inner class

iii. An inner class that is defined inside an enclosing class but outside of its methods are available to all methods of the enclosing class

iv. An inner class has access to members, including private members, of its enclosing class.

Required information Chapter 12: Applying Excel (Algo) [LO12-3] The Chapter 12 Form worksheet is to be used to create your own worksheet version of the Review Problem example in the text. Chapter 12: Applying Excel: Excel Worksheet (Part 1 of 2) Requirement 1: Download the Applying Excel form and enter formulas in all cells that contain question marks. Verify that your worksheet matches the Review Problem in the text. Check your worksheet by changing the wait time in cell B4 to 5.8 hours and the queue time in cell 88 to 8.6 hours. The throughput time should now be 15.8 hours. The manufacturing cycle efficiency (MCE) should now be 0.14, and the delivery cycle time should now be 21.6 hours. If you do not get these answers, find the errors in your worksheet and correct them. Save your completed Applying Excel form to your computer and then upload it here by clicking "Browse." Next, click "Save." You will use this worksheet to answer the questions in Part 2.

Answers

Chapter 12: Applying Excel: Excel Worksheet (Part 1 of 2) Requirement 1:
To complete this requirement, download the Applying Excel form and enter formulas in all cells that contain question marks. Verify that your worksheet matches the Review Problem in the text.

Then, check your worksheet by changing the wait time in cell B4 to 5.8 hours and the queue time in cell 88 to 8.6 hours.
The throughput time should now be 15.8 hours, the manufacturing cycle efficiency (MCE) should now be 0.14, and the delivery cycle time should now be 21.6 hours.
If you do not get these answers, find the errors in your worksheet and correct them.
Then, save your completed Applying Excel form to your computer and upload it here by clicking "Browse." Finally, click "Save." You will use this worksheet to answer the questions in Part 2.
In summary, to complete Requirement 1 of Chapter 12: Applying Excel (Algo) [LO12-3], you need to download the Applying Excel form, enter formulas in cells with question marks, verify that the worksheet matches the Review Problem in the text.

Learn more about manufacturing cycle efficiency (MCE) here,
https://brainly.com/question/33497686

#SPJ11

lewis must create a code for his locker. it must be 3 characters long. for each character, he may choose from all ten digits (0-9), and he may not repeat digits. how many different codes can he create?

Answers

, Lewis can create 720 different codes for his locker.

To calculate the number of different codes Lewis can create for his locker, we can use the concept of permutations. Since he has 10 digits to choose from (0-9) for each of the three characters, and he cannot repeat digits, the number of different codes can be calculated as follows:
For the first character, he can choose from 10 digits (0-9).
For the second character, since he cannot repeat digits, he can choose from 9 remaining digits.
For the third character, he can choose from 8 remaining digits.
To calculate the total number of different codes, we multiply these choices together:
10 (choices for the first character) * 9 (choices for the second character) * 8 (choices for the third character) = 720.

To know more about codes visit:

brainly.com/question/29405280

#SPJ11

It is a good idea to maintain duplicate records in different locations for ease of access.

Answers

It can be advantageous to keep duplicate documents in several places since it guarantees that there will always be a backup in the event of an emergency or power loss.

What do you mean by duplicate record?

Multiple records from the same original source system that reflect the same person or thing is called duplicate record.

What is the power?

The quantity of energy moved or transformed per unit of time is known as power in physics. The World System of Units uses the watt, also known as one joule per second, as its unit of power. In earlier works, power is sometimes known as activity. A power is a scalar quantity. The power needed to move a land vehicle, for example, is equal to the product of the vehicle's velocity, traction force on its tires, and aerodynamic drag.

So, the ability to always have a backup in the event of an emergency or power outage can be a benefit of maintaining duplicate papers in various locations.

To learn more about duplicate record, visit:

https://brainly.com/question/30004848?referrer=searchResults

#SPJ4

str1=”Good” str2=”Evening” Does the concatenation of the above two strings give back a new string or does it concatenate on the string str1? How do you prove your point?

Answers

Answer:

It gives a new string

Explanation:

In programming; when two or more strings are concatenated by a concatenating operator, the result is always a new string.

From the question, we have that

str1 = "Good

str2 = "Evening"

Let's assume that + is the concatenating operator;

str1 + str2 = "Good" + "Evening" = "GoodEvening"

The result of concatenating str1 and str2 is a new string "GoodEvening" while str1 and str2 still maintain their original string value of "Good" and "Evening"

what is the ionic directive that can be used for creating a tab bar?

Answers

Answer:

Explanation:

The Ionic framework provides the ion-tabs directive for creating a tab bar.

The ion-tabs directive is used to create a tab bar component in Ionic applications. It allows you to define multiple tabs and their corresponding content areas. Each tab is represented by an ion-tab component, which contains the tab's label, icon, and associated content.

Here's an example of how the ion-tabs directive can be used in an Ionic application:

<ion-tabs>

 <ion-tab-bar slot="bottom">

   <ion-tab-button tab="tab1">

     <ion-icon name="home"></ion-icon>

     <ion-label>Home</ion-label>

   </ion-tab-button>

   <ion-tab-button tab="tab2">

     <ion-icon name="search"></ion-icon>

     <ion-label>Search</ion-label>

   </ion-tab-button>

   <ion-tab-button tab="tab3">

     <ion-icon name="person"></ion-icon>

     <ion-label>Profile</ion-label>

   </ion-tab-button>

 </ion-tab-bar>

 <ion-tab tab="tab1">

   <!-- Tab 1 content here -->

 </ion-tab>

 <ion-tab tab="tab2">

   <!-- Tab 2 content here -->

 </ion-tab>

 <ion-tab tab="tab3">

   <!-- Tab 3 content here -->

 </ion-tab>

</ion-tabs>

In the above example, the ion-tabs directive creates a tab bar component with three tabs: Home, Search, and Profile. Each tab is associated with a specific content area defined within ion-tab components.

By utilizing the ion-tabs directive, developers can easily create tab-based navigation in Ionic applications, providing users with a seamless and intuitive way to switch between different sections or functionalities.

Learn more about the ion-tabs directive and other Ionic components to enhance your skills in developing feature-rich mobile applications.

https://brainly.in/question/8587323

#SPJ11

team_id INT NOT NULL AUTO_INCREMENT,

team_name VARCHAR(50),

team_rank INT NOT NULL DEFAULT 0

Refer to code example 5-1.) What are the values of the team_id, team_name, and team_rank columns after the following statement is executed, assuming that the Teams table has one row in it with a team_id of 1?

Answers

After executing the given statement, the values in the columns would be as follows: team_id = 2, team_name = NULL, team_rank = 0.

The statement mentioned does not provide any explicit values for the columns team_name and team_rank. Therefore, the default values will be assigned. For the team_id column, the AUTO_INCREMENT attribute is set, which means it will automatically generate a new unique value for each new row inserted.

Since the Teams table already has one row with a team_id of 1, executing the statement will insert a new row. The team_id column, being AUTO_INCREMENT, will generate the next unique value, which is 2. So, team_id will be 2 for the new row.

As for team_name, no value is provided in the statement, so it will be set to NULL by default.

Similarly, team_rank column does not have a value specified in the statement, and it has a DEFAULT constraint set to 0. Hence, the team_rank will be assigned the default value of 0.

In conclusion, after executing the statement, the values in the columns will be: team_id = 2, team_name = NULL, and team_rank = 0.

learn more about statement here:

https://brainly.com/question/17238106

#SPJ11

before entering the title, which tool should janise choose from the design tab on the ribbon?

Answers

Janise should choose the "Page Setup" tool from the Design tab on the ribbon before entering the title.

The Page Setup tool allows her to customize the size, orientation, margins, and background of her document or page. By selecting this tool, she can ensure that the layout of her document is appropriate for the content she plans to include, and that it looks visually appealing and professional. Additionally, she can choose to add a watermark or page borders to her document using this tool. It's important to consider the design and layout of a document before entering the title, as this can impact the readability and effectiveness of the overall document. By utilizing the Design tab on the ribbon, Janise can create a well-designed and visually appealing document that effectively communicates her message.

To Learn more about ribbon:

https://brainly.com/question/618639

#SPJ11

Shane is debugging code and found a line reading Favorite Snack = "blueberry muffins". How should the line look after it’s been debugged?
Favorite_Snack = "blueberry muffins"
favorite snack = "blueberry muffins"
Favorite Snack is "blueberry muffins"
Favorite Snack = "blueberry_muffins"

Answers

Answer:

Favorite_Snack = "blueberry muffins"

Explanation:

Variable names cannot have spaces in them

Database file maintenance typically involves _____. Select all that apply

Answers

The maintenance of a database file typically involves:

A. using log files to recover data.

C. compacting the database.

D. defragmenting the database index.

What is a database?

A database is an organized and structured collection of data that're stored on a computer system as a backup and they're usually accessed electronically.

In database management system (DBMS), the maintenance of a database file typically involves:

The use of log files to recover data.Compacting the database.Defragmenting the database index.

Read more on database here: brainly.com/question/13179611

#SPJ1

Complete Question:

Database file maintenance typically involves _____. Select all that apply

A. using log files to recover data

B. writing new database client software.

C. compacting the database

D. defragmenting the database index.

Which is a correctly formatted Python tuple? [12, "circle", "square"] {"n":12, "shape1": "circle", "shape2": "square"} (12, "circle", "square") 12 circle square

Answers

Answer:

(12, "circle”, “square")  

Explanation:

Python is a computer programming language that is used to write programs. In the python programming language, the Tuple is a data type that can be defined inside a parentheses "()". It is of immutable kind which means the elements inside the parentheses cannot be changed once the elements are inserted inside the tuple. It is also defined by "()" or by predefined function, tuple().

In the context, the correct format of python tuple is : (12, "circle”, “square").

Answer:

(12, "circle”, “square")

Explanation:

       

The program that is BEST suited
for managing large amounts of
data is
a Microsoft Publisher
b. Microsoft Word
c. Microsoft PowerPoint
d. Microsoft Access​

Answers

Answer:

everything

Explanation:

cuz I use everything and they all work good

hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me ​

Answers

Answer:

a pseu code is a is an artificial and informal language that helps programmers develop algorithms.

Explanation:

Select a PC operating system. Attempts Remaining Which OS is optimized for web apps? B. Chrome OS D. macOS Select a PC operating system. Attempts Remaining Which OS is optimized for web apps? A Linux OO B Chrome OS C Windows Dmacos

Answers

Recommended for a web application. A different operating system created by Giogle is called Chrome OS, and it is built on the Linux kernel. because it was derived from the open-source Chromium OS.

The benefits of Chrome OS over Windows

Being lightweight, Chromebooks are simple to handle and transport. low hardware support requirements. Virus defense mechanism built-in; hence, more secure than Windows. Better battery life comes with less functions.

Why would someone use Chrome OS?

Giogle The open-source, portable operating system known as Chrome OS (OS). It is designed for netbooks or tablet PCs that access Web-based apps and stored data from remote servers and needs 1/60th the amount of hard drive space as Windows 7.

To know more about web application visit :-

https://brainly.com/question/8307503

#SPJ4

The PC operating system that is optimized for web apps is Chrome OS. The correct option is B.

Gogle purposely created Chrome OS to function with web applications without any hiccups. The Gogle Chrome web browser serves as its primary interface for this lightweight operating system.

When performing web-based tasks like browsing the internet, utilising web apps, and accessing cloud-based services, Chrome OS offers a quick, safe, and streamlined experience.

It makes use of the Chrome web store, which enables users to discover and download a huge selection of web apps and extensions.

The Gogle suite of web-based tools and services is tightly integrated with Chrome OS, which is renowned for its speed, simplicity, and integration.

Thus, the correct option is B.

For more details regarding operating system, visit:

https://brainly.com/question/29532405

#SPJ6

Dr. Spicer sent out two different emails to students. One was about a new assignment and the other was about an upcoming discussion. Why should Dr. Spicer include a clear subject line in each email?

A.
to ensure the students know the content of each one

B.
to personalize the email and make it appear friendlier

C.
to spice up the communication and initiate interest

D.
to include additional information not needed in the message

Answers

Answer:

what is this it's very easy if you need answer go to my profile

true false paging may suffer from internal fragmentation but no external fragmentation.

Answers

The statement given "paging may suffer from internal fragmentation but no external fragmentation" is false because paging may suffer from both internal fragmentation and external fragmentation.

Paging is a memory management technique used in operating systems where memory is divided into fixed-size blocks called pages. Each process's memory is divided into pages, and these pages are allocated in non-contiguous physical memory locations. Internal fragmentation occurs when a page is not fully utilized, leading to wasted memory within the page itself. This can happen when a process's memory requirements are smaller than the page size.

Additionally, external fragmentation can occur in paging when there are free memory blocks scattered throughout the system that are individually too small to accommodate a process's memory allocation. This fragmentation can limit the available contiguous memory space for new processes, resulting in inefficient memory utilization.

Therefore, paging can suffer from both internal fragmentation and external fragmentation, affecting memory utilization in the system.

You can learn more about paging at

https://brainly.com/question/31322987

#SPJ11

The shortcut key __________ opens a search box that allows users locate information on a webpage.

Answers

The shortcut key ctrl+f opens a search box that allows users locate information on a webpage.

Use Search to locate a shortcut in this article quickly. After pressing Ctrl+F, type your search terms. You can record a macro to add a shortcut key for an action that you perform frequently if it doesn't already have one.

A common keyboard shortcut for opening a find box to look for a certain character, word, or phrase in a document or web page is Ctrl+F, also known as Ctrl+f, f, and C-f.

Your operating system or browser's keyboard shortcut for swiftly finding words or phrases is Ctrl-F.

Simply press the control key while holding down the F key, and a window inquiring whether there is a word or phrase you need to discover will appear.

To know more about ctrl+f click on the link:

https://brainly.com/question/10059190

#SPJ4

What is the primary purpose of the destination address?
Choose 1 answer:
It helps the router know where to send the packet.
B
It helps the receiving computer reassemble the packets.
It tells the router where the packet came from.
D
It helps the sending computer know how long to wait before retrying.
It prevents the packet from being intercepted by cybercriminals.

Answers

Answer:

The answer to this question is given below is the explanation section.

Explanation:

"A" option is correct

    It helps the router know where to send the packet.

Which of the following statements is true regarding the relationship of engineers and technology? O a. None of these statements is true O b. Engineers must adopt the technological pessimism view Oc. Engineers must adopt a critical attitude toward technology O d. Engineers must adopt the technological optimism view

Answers

Technology read-ahead, technology free-ahead Sequential access is the process of accessing a collection of items in a predetermined, ordered manner, such as data stored on magnetic tape, in a disk file, or in a memory array.

None of the aforementioned technologies can optimize sequential access. It is the opposite of random access, which makes it possible to access any part of a sequence at any time and from any location with the same ease and efficiency.

For instance, sequential access may be the only means of accessing the data when it is stored on a tape. It could likewise be the favored admittance procedure, for example, assuming everything necessary is the deliberate handling of a progression of information pieces.

To know more about sequential access:

brainly.com/question/12950694

#SPJ4

anyone know how to translate this 1100111111110100000110 pls n ty!4!:$;

Answers

Answer:

1100111111110100000110 = �

Binary -> UTF-16

3,407,110 in decimal form

Additionally, it also translates to the color green in hexadecimal.

Not really sure what you are trying to translate this in to though.

anyone know how to translate this 1100111111110100000110 pls n ty!4!:$;
yeah sure no problem that says

Define the term Project brief? why is it important to do planning?

Answers

Answer: the project brief is a document that provides an overview of the project.

Explanation: It says exactly what the designer, architect, and contractor needs to do to exceed your expectations and to keep the project on track with your goals and your budget.

how do these ideas connect?

how do these ideas connect?

Answers

Answer:they are connecting because they are showing adult good of either men or women

Explanation:

What does RoHS stand for and why is RoHS compliance important?

Answers

Answer:

It stands for Restriction of Certain Hazardous Substances.

Web search says it is important because,

RoHS compliance dovetails into WEEE by reducing the amount of hazardous chemicals used in electronic manufacture. Put another way, RoHS regulates the hazardous substances used in electrical and electronic equipment, while WEEE regulates the disposal of this same equipment.

Explanation:

HELP PLEASEE!!
True or False. The POP is a bank of switches that allows many users to connect to the ISP at the same time.

Answers

Answer:

yes it is true. the pop is a bank of switches that allows many users to connect to the ISP at the same time.

Choose the best answer by writing the item number (1, 2, 3, or 4) in the blank box. What is the fundamental security hypothesis of a digital certification hierarchy?
The data formats must be specified in Abstract Syntax Notation One (ASN.1).
All certificates that were revoked but have not yet expired are entirely contained in the CRL.
Certification path constraints must never refer to cross certification.
The root CA certificate is obtained through an extra-cryptographically secure, trusted channel by all interested parties.

Answers

The fundamental security hypothesis of a digital certification hierarchy is that the root CA certificate is obtained through an extra-cryptographically secure, trusted channel by all interested parties. (Answer: 4)

The root CA (Certificate Authority) certificate plays a critical role in a digital certification hierarchy. It is the highest level of authority and serves as the trust anchor for the entire certification chain. The fundamental security hypothesis is based on the assumption that the root CA certificate is securely distributed to all parties involved in the system.

The root CA certificate needs to be obtained through an extra-cryptographically secure and trusted channel. This means that the process of distributing the root CA certificate should not rely solely on cryptographic methods that can be compromised. Instead, it requires a separate, trusted mechanism to ensure the authenticity and integrity of the root CA certificate.

By obtaining the root CA certificate through an extra-cryptographically secure and trusted channel, the digital certification hierarchy establishes a foundation of trust. This ensures that all subsequent certificates issued by intermediate CAs (Certificate Authorities) and end-entity certificates can be validated and trusted. The secure distribution of the root CA certificate helps prevent malicious actors from tampering with the certification chain and protects against attacks such as certificate spoofing or man-in-the-middle attacks.

In conclusion, the fundamental security hypothesis of a digital certification hierarchy is that the root CA certificate is obtained through an extra-cryptographically secure, trusted channel. This hypothesis emphasizes the importance of establishing a trusted foundation for the entire certification chain, ensuring the integrity and authenticity of the certificates issued within the system.

Learn more about man-in-the-middle attacks here:

https://brainly.com/question/28446676

#SPJ11

To use an outline for writing a formal business document, what should you do
after entering your bottom-line statement?
OA. Move the bottom-line statement to the end of the document.
OB. Write a topic sentence for every detail.
C. Enter each supporting detail from the outline on a separate line.
D. Enter each major point from the outline on a separate line.

Answers

To enter your bottom-line statement you

C. Enter each supporting detail from the outline on a separate line.

How to add bottom-line statement

After entering your bottom-line statement in an outline for writing a formal business document, you should enter each major point from the outline on a separate line This means that you should write down the key ideas that support your bottom-line statement and each idea should be placed on its own line to clearly differentiate them These major points will become the topic sentences for each section of your document

Once you have entered each major point on a separate line you can then enter each supporting detail from the outline on a separate line under its corresponding major point This helps to organize the information in a logical manner and allows you to expand on each major point in a structured and cohesive way

Learn more about bottom-line statement at

https://brainly.com/question/8630249

#SPJ1

(a) Explain the difference between a web browser and a search engine.​

Answers

Answer: a browser is your access to the internet, and a search engine allows you to search the internet once you have access.

Explanation:

how long it takes for a software package to respond to user's requests is called: a. activation time. b. lag time. c. response time. d. recurrent time. e. run time.

Answers

The term for the duration it takes for a software package to respond to user requests is response time. The correct answer is c. response time.

Response time refers to the duration it takes for a software package or system to respond to a user's request or input. It measures the time from when the user initiates a command or action to when the system completes the processing and provides a response.

Response time is an important performance metric that directly impacts user experience and satisfaction. It is influenced by various factors, including the complexity of the software, system resources, network latency, and the efficiency of underlying algorithms and processes.

Activation time (option a) typically refers to the time it takes to start or initialize a software package or system, rather than specifically addressing user requests.

Lag time (option b) generally refers to delays or gaps in data transmission or processing. While it can be related to response time, it is a broader term that encompasses delays beyond user interactions.

Recurrent time (option d) and run time (option e) are not specifically related to the time taken for a software package to respond to user requests. Recurrent time may refer to the time between repeated occurrences of an event, while run time generally refers to the duration of program execution.

In summary, response time is the term used to describe the duration it takes for a software package or system to respond to user requests.

So, option c is correct.

Learn more about software:

https://brainly.com/question/28224061

#SPJ11

All the following statements are true EXCEPT: A) Both SUMIF and SUMIFS Functions consider the conditions first. B) SUMIFS allows SUMRANGE first whereas SUMIF allows sum range last. C) SUMIFS considers conditions last whereas SUMIF considers conditions first D) SUMIFS allows multiple conditions a. A b. B c. C d. D

Answers

All the following statements are true EXCEPT for the statement "Both SUMIF and SUMIFS Functions consider the conditions first."

What is the difference between SUMIF and SUMIFS functions?

SUMIF and SUMIFS are two different functions that are used in Excel. Both functions are used to add up the values in a range of cells that meet specific conditions. But, there is a difference between these two functions. The primary difference is that SUMIF only allows one condition to be checked. While SUMIFS allows multiple conditions to be checked.

For example: SUMIF: =SUMIF(A1:A5, "Apples", B1:B5) - This formula will only sum the values in column B if the corresponding cell in column A is "Apples".SUMIFS: =SUMIFS(B1:B5, A1:A5, "Apples", C1:C5, ">0") - This formula will sum the values in column B if the corresponding cell in column A is "Apples" AND the corresponding cell in column C is greater than 0.

Another difference is that in SUMIFS, the sum_range comes first, while in SUMIF, it comes last. In other words, SUMIFS allows sum_range first, whereas SUMIF allows sum_range last.

All the other options that are mentioned in the question are true. Option A) Both SUMIF and SUMIFS Functions consider the conditions first. Option C) SUMIFS considers conditions last whereas SUMIF considers conditions first Option D) SUMIFS allows multiple conditions to be true.

To learn about the SUMIF function here:

https://brainly.com/question/29848364

#SPJ11

Other Questions
John's dog slept for 3 hours. If the dog snored every 13 1 3 13 1 3 of an hour, how many times did he snore? Play media comment. Group of answer choices 9 times 1 time 12 times Describe the transformation thats shows figure A is similar to figure B A chocolate pastry cost Rs.26 and a fruit pastry cost Rs.18 Jenny buys both these pastries together for Rs. 500 how many of each did she buy ? Calculate the acceleration of a bottle rocket that is traveling at a speed of 74 m/s, and then descends at a speed of 89 m/s. It takes the rocket 5 seconds to change its speed. a) 1 m/s/sb) 2 m/s/sc) 3 m/s/sd) 4 m/s/s A large company recently embarked on an effort to increase coordination and cooperation within the company. During the process, the managers of the organization reviewed and specified job responsibilities, grouped jobs into work units, and reallocated resources within the company. The managers were exercising the management function of question 1 according to the author in the video, what does dark horse analytics state are the 3 best practices for creating a visual? some elements in the body depend on minerals to exist or function. which mineral enhances the action of insulin? How did the leaders of the age of enlightenment think about the relationship between peace and justice and the monarchy? transparent materials allow electromagnetic waves to be while trapping thermal energy1. transmitted2. reflected 3. absorbed pls help !!!which of the following best describes the second law passed under the morrill act? Pls helpFind the measurements of those Volume of cylinder & cone ... Help me please Critically examine how age operates as a powerful system ofclassification in organisations. Draw on research from criticalmanagement studies to support your answer. PLEASE HELP QUICKLY: (FIRST ANSWER GETS BRAINLIEST)THE QUESTION IS DOWN BELOW IN THE PHOTOGRAPHSection ASection BSection C Read the following excerpt from Endgame by Samuel Beckett:HAMM:You feel normal?CLOV (irritably)I tell you I don't complain.HAMM:I feel a little strange.(Pause.)Clov!CLOV:Yes.HAMM:Have you not had enough?CLOV:Yes!(Pause.)Of what?HAMM:Of this... this... thing.CLOV:I always had.(Pause.)Not you?HAMM (gloomily)Then there's no reason for it to change.CLOV:It may end.(Pause.)All life long the same questions, the same answers.Describe how the elements of dramatic writing (dialogue, stage directions, conflict, etc.) work togetherto develop a theme in the passage. Be sure to use specific details to support your answer. (SHORT RESPONSE) 16. Which Indian king brought Buddhist principles to much of India and other parts of the world?GandhiSampratiAsokaChandragupta a nurse suspects that a client who is receiving a cephalosporin and has ingested alcohol may be experiencing a disulfiram-like reaction based on assessment of which sign? select all that apply.] the length of a puppy on a scale is drawing is 6cm if the scale is 1:9 what is the actual length of the puppy PLEASE HELP!!! What do most Americans believe that we need to solve our problems? A patient's tumor is being treated with proton-beam therapy. The protons are accelerated through a potential difference of 62 MV.What is the speed of the protons? (Note: The speed is high enough that, in principle, we should use a relativistic calculation--something you'll learn about further--but for this problem you should use the formulas you are already familiar with.)