when a program tries to reverse-calculate passwords, this is known as a brute force spoof

Answers

Answer 1

When a program tries to reverse-calculate passwords, this is known as a brute force attack. A brute force attack is a common attack that involves trying all possible combinations of letters, numbers, and symbols until the correct password is found.

A brute force attack is a hacking technique that involves attempting every possible combination of letters, numbers, and symbols until the correct password is found. These attacks are typically automated and can be carried out by software designed to probe for passwords in web applications, networks, or other systems. Once a password is discovered, the attacker can gain unauthorized access to the system and extract sensitive data or compromise the system's security.

Reverse calculating a password is a common technique used in brute force attacks. This technique involves taking a hash of the password and then using specialized software to try different combinations of characters to try and recreate the original password. Once the correct password is found, it can be used to gain unauthorized access to the system.

More on brute force cracking: https://brainly.com/question/17277433

#SPJ11


Related Questions

If you are assignod "A", complele thrs fr your post-lis asiignment, dve 9/14 Graphing Data Set A Name: Lab Section: Most everyone has heard of "pi" but what is it exactly? Pi (π) is the ratio of the circumference of a circle to its diameter. The value of this ratio is a constant regardless of the size the circle; thus pi is a universal physical constant. The diameter and circumference of several circles were measured by CHEM 1114 students, each using a different ruler. 1. Inspect the data below and calculate the value of pi using two pairs of the data: 2. Prepare a hand-drawn plot of the two variables on the reverse side of this worksheet. Estimate the circumference of a circle with a diameter of 4.50 cm : Estimate the diameter of a circle with a circumference of 3.94 inches: 3. Prepare a plot using a software graphing program. Include the equation of the best-fit line and the R
2
value on the graph. Re-write the equation of the best-fit line substituting "Diameter" for x and "Circumference" for y directly on the graph. Attach the fully labeled graph to this worksheet. 4. What is the value of pi based on the equation for the best-fit line? Include units if applicable. Determine the percent error using the definition of percent error: Use a value of 3.142 for the actual value of pi. % error =




Actual
∣ Actual-Experimental





×100 \% Error = 6. Using your computer-generated graph, a. visually estimate the circumference of a circle when the diameter is 4.50 cm : b. calculate the circumference for d=4.50 cm using the equation of the best fit line: Inspect the graph to ensure that this value is reasonable. c. compare the calculated circumference to the two visually interpolated values (Steps 2 and 6a ). Comment on any discrepancies. 7. Using your computer-generated graph, a. visually estimate the diameter of a circle with a circumference of 3.94 inches: b. calculate the diameter using the equation of the line: Inspect the graph to ensure that this value is reasonable. c. compare the calculated diameter to the two visually interpolated values (Steps 2 and 7 a). Comment on any discrepancies.

Answers

The value of pi (π) is the ratio of the circumference of a circle to its diameter. It is a universal physical constant that remains constant regardless of the size of the circle. In this experiment, the diameter and circumference of several circles were measured using different rulers. The value of pi can be calculated using the data and a best-fit line equation. The percent error can also be determined by comparing the calculated value of pi to the actual value.

Pi (π) is a fundamental mathematical constant that represents the relationship between the circumference and diameter of a circle. It is an irrational number approximately equal to 3.14159. In this experiment, the CHEM 1114 students measured the diameter and circumference of various circles using different rulers. By analyzing the data, it is possible to calculate the value of pi.

To calculate pi, two pairs of data can be used. The diameter and circumference values are plotted on a graph using a software graphing program. The best-fit line equation is determined, and its equation is rewritten with "Diameter" as x and "Circumference" as y. This equation represents the relationship between the diameter and circumference of the circles measured.

Using the equation of the best-fit line, the value of pi can be determined. By substituting the actual value of pi (3.142) into the equation, the calculated value of pi can be obtained. The percent error can then be calculated by comparing the actual value to the experimental value.

To visually estimate the circumference of a circle with a diameter of 4.50 cm, one can refer to the computer-generated graph. The graph provides a visual representation of the relationship between the diameter and circumference. Additionally, the circumference can be calculated using the equation of the best-fit line, ensuring that the calculated value is reasonable.

Similarly, to estimate the diameter of a circle with a circumference of 3.94 inches, the computer-generated graph can be used. The graph helps in visually estimating the diameter. Additionally, the diameter can be calculated using the equation of the line to ensure the calculated value aligns with the visually interpolated values.

Learn more about Circumference

brainly.com/question/28757341

#SPJ11

Write Python code for the following flowcharts

Write Python code for the following flowcharts

Answers

print("Enter a number")

number = input()

if number >= 1000: print("Bigger or equal to 1000")

else: print("Smaller than 1000")

An instance variable refers to the data value that :

Answers

An instance variable refers to the data value that is associated with a specific instance of a class.


In object-oriented programming, a class is a blueprint or template for creating objects, which are instances of that class. Each instance of a class can have its own set of instance variables, which are used to store data specific to that instance.

For example, consider a class called "Car" with instance variables for "make", "model", and "year". Each instance of the Car class would have its own values for these instance variables. One instance might have a make of "Honda", a model of "Civic", and a year of "2010", while another instance might have a make of "Toyota", a model of "Camry", and a year of "2015".

Instance variables are typically declared at the top of a class and are usually private, meaning they can only be accessed by methods within the same class. They are also usually initialized in the constructor of the class.

Here is an example of a class with instance variables in Java:

```
public class Car {
 private String make;
 private String model;
 private int year;
 
 public Car(String make, String model, int year) {
   this.make = make;
   this.model = model;
   this.year = year;
 }
 
 // getter and setter methods for instance variables
}
```

In this example, the instance variables "make", "model", and "year" are declared at the top of the class and are initialized in the constructor. The class also includes getter and setter methods for accessing and modifying the values of the instance variables.

Learn more about instance variable here:

https://brainly.com/question/28265939

#SPJ11

Takes a 3-letter String parameter. Returns true if the second and
third characters are “ix”

Python and using function

Answers

Answer:

def ix(s):

   return s[1:3]=="ix"

Explanation:

Review the items below to make sure that your Python project file is complete. After you have finished reviewing your turtle_says_hello.py assignment, upload it to your instructor.

1. Make sure your turtle_says_hello.py program does these things, in this order:

Shows correct syntax in the drawL() function definition. The first 20 lines of the program should match the example code.

Answers

Code defines the drawL() function with the correct syntax and includes the required documentation string. The function takes a turtle object 't' as an argument, and draws an L shape using turtle graphics.

Define the term syntax.

In computer programming, syntax refers to the set of rules that dictate the correct structure and format of code written in a particular programming language. These rules define how instructions and expressions must be written in order to be recognized and executed by the computer.

Syntax encompasses a wide range of elements, including keywords, operators, punctuation, identifiers, and data types, among others. It specifies how these elements can be combined to form valid statements and expressions, and how they must be separated and formatted within the code.

To ensure that your turtle_says_hello.py program meets the requirement of having correct syntax in the drawL() function definition, you can use the following code as an example:

import turtle

def drawL(t):

   """

   Draws an L shape using turtle graphics.

   t: Turtle object

   """

   t.forward(100)

   t.left(90)

   t.forward(50)

   t.right(90)

   t.forward(100)

To ensure that your turtle_says_hello.py program is complete and correct.

1. Make sure that your program runs without errors. You can do this by running your program and verifying that it executes as expected.

2. Check that your program follows the instructions provided in the assignment. Your program should start by importing the turtle module, creating a turtle object, and define the drawL() function.

3. Verify that your drawL() function works as expected. The function should draw an "L" shape using turtle graphics. You can test this by calling the function and verifying that it draws the expected shape.

4. Ensure that your program ends by calling the turtle.done() function. This will keep the turtle window open until you manually close it.

5. Make sure that your code is properly formatted and indented. This will make it easier for others to read and understand your code.

6. Finally, ensure that your program meets any other requirements specified in the assignment. This might include things like adding comments or following a specific naming convention.

Therefore, Once you have verified that your program meets all of these requirements, you can upload it to your instructor for review.

To learn more about syntax click here

https://brainly.com/question/18362095

#SPJ1

i was scripting for my game design clas and i was just creating a story based game. its not really a question but could you guys (meaning fellow users) give it a go? not done yet tho..

file:///C:/Users/Gamer_x9/Downloads/A%20New%20Beginning.html

its not an adobe link that pulls another tab dw i would never

Answers

Answer: sure thing

Explanation:

Write a Python script to input time in minutes , convert and print into hours and minutes.

Answers

Answer:

Following are the Python program to this question:  t=float(input("Enter time value in seconds: "))#input time in seconds by user

d = t // (24 * 3600) #calculate day and store in d variable  t= t % (24 * 3600)#calculate time and store in t variable  h = t // 3600#calculate hour and store in h variable  t %= 3600#calculate time and store in t variable  m=t // 60#calculate minutes and store in m variable  t%= 60#calculate time and store in t variable  s = t#calculate second and store in s variable  print("day:hour:minute:second= %d:%d:%d:%d" % (d,h,m,s))#print calculated value

Output:

Enter time value in seconds: 1239876

day:hour:minute:second= 14:8:24:36

Explanation:

Description of the above can be defined as follows:

In the above Python program code an input variable "t" is declared, which uses the input method to input value from the user end.In the next step, "d, m, and s" is declared that calculates and stores values in its variable and at the last print, the method is used to print its value.

what symbol is used when you are using the truncation method of searching and how does it effect the results of the search I'll give 50 point I need help quick!​

Answers

Answer: Truncation

Explanation:

— a symbol added to the end of the root of a word to instruct the database to search for all forms of a word. The asterisk (*) is used in many databases for truncation.

state five benefits of digitizing data​

Answers

Answer:

Ahorro de espacio físico. ...

Protección de los datos. ...

Gestión del tiempo en la consulta de datos. ...

Mejora de la productividad. ...

Responsabilidad social corporativa. ...

Acceso a la información a través de distintos dispositivos tecnológicos.

Explanation:

Answer:

Save money.

Save time.

Enhance collaboration.

Explanation:

from within the dataset on the books sheet, create a pivottable to add the data to the data model.

Answers

To create a PivotTable and add the data to the data model from within the dataset on the "Books" sheet, you can follow these steps:

1. Select the range of data you want to include in the PivotTable, including the column headers.

2. Go to the "Insert" tab in Excel's ribbon.

3. Click on the "PivotTable" button. A dialog box will appear.

4. In the dialog box, make sure the "Select a table or range" option is selected.

5. Verify that the "Table/Range" field displays the correct range of data.

6. Choose the location where you want to place the PivotTable. You can either select an existing worksheet or create a new worksheet.

7. Click "OK" to create the PivotTable.

The PivotTable will be inserted into the specified location, and you can now start analyzing and summarizing your data using various fields and calculations.

When you add the data to the data model while creating the PivotTable, you are essentially leveraging Excel's Power Pivot feature. The data model allows you to establish relationships between multiple tables, create calculated columns and measures, and perform more advanced analysis.

By incorporating the data into the data model, you gain additional flexibility and capabilities in your analysis. You can combine data from different sheets or external sources, create complex calculations using DAX (Data Analysis Expressions), and utilize advanced features such as slicers, timelines, and hierarchies.

The data model enhances the functionality and performance of your PivotTable by enabling faster calculations, improved data organization, and the ability to handle larger datasets. It provides a comprehensive framework for working with multiple tables and unleashing the full power of Excel's analytical capabilities.

In summary, by adding the data to the data model while creating a PivotTable, you can leverage Excel's Power Pivot feature, establish relationships between tables, perform advanced calculations, and enhance the overall analysis and reporting capabilities of your data.

Learn more about PivotTable here:

brainly.com/question/27813971

#SPJ11

what is the network number of address 165.34.45.14 with a subnet mask of 255.255.240.0?

Answers

The network number of the IP address 165.34.45.14 with a subnet mask of 255.255.240.0 is 165.34.32.0.

To determine the network number of the IP address 165.34.45.14 with a subnet mask of 255.255.240.0, we can perform a bitwise logical AND operation between the IP address and the subnet mask. This will yield the network address.

Here are the steps to perform this operation:

Convert the IP address and subnet mask from dotted decimal notation to binary notation:

IP address: 10100101.00100010.00101101.00001110

Subnet mask: 11111111.11111111.11110000.00000000

Perform a bitwise logical AND operation between the IP address and the subnet mask:

10100101.00100010.00101101.00001110 (IP address)

11111111.11111111.11110000.00000000 (Subnet mask)

10100101.00100010.00100000.00000000 (Network address)

Convert the binary network address back to dotted decimal notation:

Network address: 165.34.32.0

Therefore, the network number  is 165.34.32.0.

Learn more about network number here:

https://brainly.com/question/28218464

#SPJ11

PLEASE ANSWER CORRECTLY
Which type of loop is best in each situation?


for or while ? : You know ahead of time how many passes you wish to make through a loop.

for or while ? : You do not know ahead of time how many passes you wish to make through a loop.

Answers

Answer:

a

Explanation:

E

Answer:

1:for

2:while

Explanation:

bookmark question for later a map of a database that shows tables and relationships is called what? erp erm relational mapping form schema

Answers

A map of a database that shows tables and relationships is called Schema.

What is database?

A database is a structured collection of related data that has been systematically organized and is kept in a way that makes it simple to manage and update. It serves as the central repository for all data, comparable to a library's collection of books spanning a variety of genres. Imagine data as a library.

The data can be set up in a database in the form of a table with rows and columns. The data can be easily located and retrieved whenever necessary by indexing it. With the aid of databases, a large number of websites on the Internet are operated. Database handlers are used to build databases that allow users to access the data using just one set of software applications.

Learn more about database

https://brainly.com/question/518894

#SPJ4

PLEASE HELP!!!

If you try to ______
PowerPoint while there are unsaved changes, you will be
asked whether you want to save them.
fill in the blank.

Answers

leave (i'm pretty sure this is the answer)

If you try to close PowerPoint while there are unsaved changes, you will be asked whether you want to save them.

What is a PowerPoint presentation?

You may create projects, write text, and create presentations online using the software called PowerPoint Presentation. Slides may be created, transitions can be included, and ideas can be presented to friends or professors.

A businessman can present what he thinks or has to say by using a PowerPoint to keep his thoughts and ideas organized. Yes, I am aware. PowerPoint is something I've been using for a while now.

Basically, you press the home button in the upper-left corner of your screen, and an option that says "create a new slide" should appear there.

Therefore, if you attempt to close PowerPoint with modifications that have not been saved, you will be prompted to do so.

To learn more about PowerPoint presentations, refer to the link:

https://brainly.com/question/14498361

#SPJ5

To say that A functionally determines B (A->B) is to say that for every distinct value of A there is a single value of B. for every distinct value of A there are multiple values of B. for every distinct value of B there is exactly one value of A for every distinct value of B there are multiple values of A

Answers

When we say that A functionally determines B, denoted as A->B, we are making a statement about the relationship between these two variables. Specifically, we are saying that for every distinct value of A, there is a single corresponding value of B. In other words, A uniquely determines B.

This is an important concept in many fields, including mathematics, computer science, and philosophy. It allows us to reason about the relationship between different variables and to make predictions about their behavior. For example, if we know that A functionally determines B, we can use this information to make inferences about the values of B based on the values of A.It's worth noting that the reverse relationship, B->A, does not necessarily hold. It is possible for there to be multiple values of A that correspond to a single value of B. However, we can still say that B is a function of A if there is some rule or pattern that determines the values of A for each value of B.In summary, when we say that A functionally determines B, we are saying that for every distinct value of A, there is a unique corresponding value of B. This allows us to reason about the relationship between these two variables and make predictions about their behavior.

For such more question on variables

https://brainly.com/question/28248724

#SPJ11

To say that A functionally determines B (A->B) is to say that for every distinct value of A there is a single value of B.

This means that if two tuples in a relation have the same value for the attribute(s) in A, then they must have the same value for the attribute(s) in B as well. In other words, there is a one-to-one mapping between the values of A and the values of B.

For example, suppose we have a relation R with attributes A and B, and the following tuples:

A B

1 2

2 3

3 4

If we say that A->B, this means that for every distinct value of A (1, 2, and 3), there is a single value of B that corresponds to it (2, 3, and 4, respectively). There are no tuples in the relation where two distinct values of B correspond to the same value of A.

Therefore, the correct answer to the question is "for every distinct value of A there is a single value of B."

Learn more about distinct value here:

https://brainly.com/question/863460

#SPJ11

why over the course of time have more programming language been developed​

Answers

technology and being able to communicate?

Grades are numbers or ________ that show how a student performed in a course.

Answers

It’s either letters or percentages

An expert system used on a medical website accepts an input illness from the user and produces a list of possible symptoms. What type of function is the interface engine performing?
A.
backward chaining
B.
production unit
C.
production rule
D.
forward chaining
E.
knowledge base

Answers

The answer is froward chaining

Answer:

The correct answer would be:

D.

forward chaining

#PLATOFAM

Have a nice day!

can you fart and burp at the same time?

Answers

Answer:

Yes you can

Explanation:

Although farting and burping at the same time is a very rare phenomenon, it’s very possible. When this happens at the same time it is usually called a Furp.

This occurrence usually happens when there’s a lot of intake of foods which have a large percentage of gas . These gases often need to be expelled through processes such as burping and farting.

how do i get virus off my pc

Answers

Answer:

1. dont get a virus in the first place

2. call a computer company, dont try to get it off by yourself, itll make it SIGNIFICANTLY worse

Answer:

go to the page where you can uninstall programs on task manager and look for the file name (the file and virus should have the same name) than right click on it and press uninstall than do the uninstallation process and restart you device

Explanation:

An analog video is a video signal transmitted by an analog signal, captured on a (blank)

Answers

Answer:Analog component signals are comprised of three signals, analog R′G′B′ or YPbPr. Referred to as 480i (since there are typically 480 active scan lines per frame and they are interlaced), the frame rate is usually 29.97 Hz (30/1.001) for compatibility with (M) NTSC timing.

Explanation:

____44.Antivirus programs look for a specific pattern of virus code. What is this pattern called?a.virus mapc.virus indexb.virus signatured.virus identifier

Answers

b. Virus signature is an antivirus programs look for a specific pattern of virus code. Antivirus programs use virus signatures to identify known viruses.

A virus signature is a unique pattern of code that is specific to a particular virus. Antivirus software scans incoming files and compares them against its database of virus signatures to determine if a file is infected. If a match is found, the antivirus software will alert the user and take action to remove the virus or quarantine the infected file. In this way, antivirus programs use virus signatures to detect and prevent the spread of viruses on a computer or network.

Learn more about antivirus: https://brainly.com/question/14313403

#SPJ4

Choose the correct item. Check your answers in the text.
3​

Answers

Answer:

You should do that

Explanation:

You didnt say anything

Which statement is true about the CSMA/CD access method that is used in Ethernet?A. When a device hears a carrier signal and transmits, a collision cannot occur.B. All network devices must listen before transmitting.C. A jamming signal causes only devices that caused the collision to execute a backoff algorithm.D. Devices involved in a collision get priority to transmit after the backoff period.

Answers

The statement which is true about the CSMA/CD access method that is used in Ethernet is that all network devices must listen before transmitting. Thus, the correct option for this question is B.

What is Ethernet?

Ethernet may be characterized as one of the traditional technology that is used for connecting devices in a wired local area network (LAN) or wide area network (WAN).

This traditional technology typically enables devices in order to communicate with each other via a protocol, which is a set of rules or common network language.

Coaxial cables, Twisted Pair cables, Fiber optic cables, etc. are some of the types of ethernet. When it comes to CSMA/CD access method, all sorts of network devices must listen before transmitting.

Therefore, the correct option for this question is B.

To learn more about Ethernet, refer to the link:

https://brainly.com/question/1637942

#SPJ1

Interactive sites where users write about personal topics and comment to a threaded discussion are called?
A. chat rooms.
B. networking sites.
C. forums
D. messaging sites.

Answers

Answer:

C. forums

Explanation:

Forums are internet sites where users can meet to discuss different topics through the use of messages thereby forming chat rooms. An internet forum can be in form of a question and answer site. Most websites have internet forums where users can meet and discuss or ask questions. Sometimes there may be moderators that ensure that the posted messages are acceptable based on guidelines.

when setting up a home network make sure each node

Answers

When setting up a home network, make sure each node has a unique name and IP address.

A home network is a computer network that connects devices within a home.

It enables the sharing of resources such as printers, scanners, and files, as well as Internet access.

The devices are linked together using wired or wireless connections.

Here are some tips to ensure that each node has a unique name and IP address: Make sure each device has a unique name:

When connecting devices to a home network, it's essential to assign each device a unique name.

This is particularly important when sharing resources across the network, such as printers and files.

Each device's name should be unique to prevent confusion and make it easier to identify the device in the network.

Know more about network here:

https://brainly.com/question/1326000

#SPJ11

How is UGT different than other learning theories?

Answers

UGT believes that audiences are responsible for selecting media to satisfy their desires and needs.

What is UGT?In contrast to other media theories, UGT focuses on the media consumer rather than the media or the messages it conveys. Other theories see people as passive recipients of media messages, whereas UGT sees people as active media consumers who are aware of why they choose to consume media.UGT discusses how users purposefully select media to meet specific needs such as knowledge enhancement, relaxation, social interactions/companionship, diversion, or escape. UGT assumes that audience members are not passive media consumers.UGT discusses how users purposefully select media to meet specific needs such as knowledge enhancement, relaxation, social interactions/companionship, diversion, or escape. It is assumed that audience members are not passive media consumers.

To learn more about UGT refer to :

https://brainly.com/question/30488631

#SPJ4

What is the name for the dynamic memory space that, unlike the stack, doesn't rely on

sequential ordering or organization?

A. Pointer

B. Heap

C. Pile

D. Load

Answers

The name for the dynamic memory space that, unlike the stack, doesn't rely on sequential ordering or organization is Heap. The Heap is a data structure that allows dynamic memory allocation.

The management of that memory is known as the Heap memory. It is also known as the dynamic memory allocation method. When the program execution begins, some memory is assigned to the program by the operating system, which is known as Stack Memory.

The Heap Memory is very flexible and allows the memory to be used whenever required and is less efficient than the Stack Memory. It takes a little more time for Heap Memory to locate the memory blocks and to allocate and deallocate memory. It is not sequential in nature, so the data allocation is not sequential.  

To know more about dynamic visit:

https://brainly.com/question/29216876

#SPJ11

While working in a group of two the members are not getting along. You bring the two members together so they can discuss this issue. The issue is that neither member wants to work on the actual research they both just want to create the presentation. They work together through the steps of conflict resolution and agree to share the research and work together on creating the presentation

What step of the conflict resolution process is this?

A) agree upon the problem
B) brainstorm possible solutions
C) identify the issue
D) negotiate a solution

Answers

Answer:

D)

Explanation:

At first the two members just want to create the presentation but work together and agree to share the research and work together on creating the presentation.

The conflict resolution is more than agree upon problem, identify issue or brainstorm solutions. The answer is D) negotiate a solution.

Answer:

D) negotiate a solution

write an assembly program that will take in a string from the user and a number and print the character at that number location in the string.

Answers

Save input number into BL MOV AH, 2; carriage return MOV DL, 0DH; MODEL SMALL.STACK 100H.CODE MAIN PROC MOV AH, 1; read a number INT 21H MOV BL, AL;

By converting combinations of mnemonics and syntax for operations and addressing modes into their numerical representations, an assembler program generates object code. This representation typically consists of data, various control bits, and an operation code (or "op code"). The usage of symbolic input references is an important feature of assemblers, avoiding lengthy calculations and requiring manual address updates after program modifications.

The assembler also generates constant expressions and resolves symbolic names for memory regions and other things. The majority of assemblers also have macro features for textual substitution, such as the ability to input frequent short instruction sequences as inline rather than as so-called subroutines.

Some assemblers might also be able to carry out some straightforward optimizations that are particular to an instruction set.

To know more about input click here:

https://brainly.com/question/20343830

#SPJ4

Other Questions
Read the passage from Act I, Scene ii carefully and then choose the correctanswer."Beware the ides of March!"What is the soothsayer warning Caesar to beware?O the middle of March (March 15th)O the weather of Marchthe ideas of MarchO the weekends of March What skill do you think HR managers and line managers need to develop in order to deal with conflict in the workplace ?A. Attempt to ensure fair rewardB. Careful recruitment and selectionC. Allowing employee voiceD. Use appropriate managerial style and frame of referenceE. All of abo Find dy/dx by implicit differentiation. x - 6 In(y2 - 3), (0, 2) dy dx Find the slope of the graph at the given point. dy W dx -Find the integral. (Use C for the constant of integration.) dx when an investor sells or trades stock or securities at a loss and within 30 days either before or after the day of sale buys substantially identical stocks or securities a(n) examples and non examples of a electron 2. Rebecca left her dad's store to go home at twenty to seven in the evening. Forty minutes later,she was home. What time was it when she arrived home?! I Can anyone pls help me with these questions? I need them by tonight! 4 disadvantages of animal identification nose printing (agriculture) Mendel found that yellow pea pod color (G) was dominant to green pea pod color (g), and that round seeds (W) were dominant to wrinkled seeds (w) what percentage or each orthe phenotypes below are expected from the following cross? Ggww x ggwwYellow and roundYellow and wrinkledGreen and roundGreen and wrinkledA. 0%B. 25%C. 33%50%D.E.66%F. 75%G. 100% How many atoms of Na are in the following formula: 3Na(SO4)21) 32) 63) 24) 4 On a piece paper, graph f(x)=2 x (0.5)^x. Then determine which answer choice matches the graph you drew. Which event came first? a. The Marqus De Rub Report. b. France and England go to war over the Ohio Valley. c. Texas becomes and independent province of Spain. d. The Spanish peace treaty with the Comanches. Which of the following would weather forecasters be concerned about predicting in the event that certain geographic area received an excessive amount of rain in a short period of time?A - FloodingB - TyphoonsC - Hurricanes D - tidal Waves Little 3-year-old Sally has decided to throw a temper tantrum and has chosen to hold her breath and stomp her feet. However, it is known that she can only hold her breath for a limited period of time before Sally will involuntarily begin to breathe again. Describe the feedback mechanism and anatomical structure that initiates involuntary breathing. Make sure to include how an increased level of CO2 affects this mechanism. What is sustainable building? Why is it important? What is the role of sustainable building rating systems in developing high performance buildings? For a ski trip a girl sells 300 DVDs for 2 pound each she sells 250 DVDs for 2 pound and then reduces the price by 1/3 rest of the DVDs are sold for 6 pounds each What is the profit? PLEASE HELP!!!!!!!! A cardboard box is 32 centimeters long, 15 centimeters wide, and 6 centimeters tall. The box does not have a top. How much cardboard was used to make the box? 1. How did the Mandate of Heaven affect the people of the Zhou dynasty? Find the area of the parallelogram shown below. 7 3 8 square units Who was Justinian and what was the known tone