After noticing that many users were using insecure spreadsheets to keep track of passwords, your team wants your organization to adopt an open-source password management solution. You are drafting the Request for Change (RFC). In which section do you write about the end-user training plan

Answers

Answer 1

End-user acceptance plan, to guarantee the best possible balance between performance and risk.

Which device supplies sufficient power at the system level to allow for a graceful shutdown of the system?

When the utility power fails, the UPS can be thought of as a device that supplies backup power, allowing the system to shut down gracefully, preventing any data loss, and, most importantly, sustaining electrical power long enough to keep the necessary loads operational until the generator is back online.

Which gadget is used to provide a brief power outage?

When incoming power is interrupted, a computer can continue to function for at least a short while thanks to an uninterruptible power supply (UPS).

to know more about password management here:

brainly.com/question/29836274

#SPJ4


Related Questions

data science is a growing career field because __________________.

Answers

Answer:

because of the data of computer

Data science is a growing career field because of several reasons, including increasing demand, explosion of data, advancement, etc.

What is data science?

Data science is the study of data with the goal of gaining important business insights.

It is a multidisciplinary method for analyzing massive volumes of data that integrates ideas and techniques from the domains of mathematics, statistics, artificial intelligence, and computer engineering.

Data science is a career sector that is expanding for a number of reasons, including:

Demand for data-driven insights is rising.Data explosion.innovations in technology.advantage over rivals.Good salary and high demand.

Overall, the explosion of data, technological improvements, the competitive edge it offers, and the high demand and decent compensation for the discipline are all factors that have contributed to the expansion of data science as a career field.

Thus, data science is a growing career field.

For more details regarding data science, visit:

https://brainly.com/question/30142316

#SPJ2

________ is a set of function and call programs that allow clients and servers to intercommunicate.

Answers

Answer:

A protocol is a set of function and call programs that allow clients and servers to intercommunicate.

Pinterest is an example of​ a(n) _______________.A. research and content managerB. media curation siteC desktop search engineD.bookmarking siteE.enterprise search engine

Answers

Pinterest is an example of​ a media curation site. The correct option is B.

What is media curation site?

Finding and gathering internet content, then selecting the best parts to present in a systematic way, is the process of content curation.

Curation does not entail producing your own material, as contrast to content marketing.

Pinterest is an American social media platform and image-sharing platform that lets users create pinboards using photographs, videos, and, to a lesser extent, animated GIFs to save and organize information online.

Thus, the correct option is B.

For more details regarding curation site, visit:

https://brainly.com/question/14422996

#SPJ1

53.8% complete question which redundant array of independent disks (raid) combines mirroring and striping and improves performance or redundancy?

Answers

RAID 1+0, also known as RAID 10, combines mirroring and striping to improve both performance and redundancy.

What exactly is RAID?

RAID (Redundant Array of Independent Disks) is a technology that uses multiple physical disk drives to create a single logical storage unit. It provides improved data integrity and performance by distributing data across multiple disks, and can also provide data redundancy in the event of a disk failure.

There are several different RAID levels, each with its own set of advantages and disadvantages, such as RAID 0, RAID 1, RAID 5, RAID 6, RAID 10 etc.

To know more about RAID, visit: https://brainly.com/question/26070725

#SPJ4

like shapes, you can rotate or ____ pictures using the rotate handle or the rotate button.

Answers

The correct answer is like shapes, you can rotate or flip pictures using the rotate handle or the rotate button.

You can flip, rotate, or resize PowerPoint objects including text boxes, shapes, and images. The item you wish to rotate is tapped. Choose the rotation handle at the object's top, then move it in the desired direction. Choose Arrange > Rotate > Flip Vertical or Flip Horizontal to flip an item. From the Draw menu on the Drawing toolbar, select Rotate or Flip. A submenu of available actions is displayed by Word. Select Flip Vertical or Flip Horizontal by clicking. Word rotates the thing in the desired direction.

To learn more about flip pictures click the link below:

brainly.com/question/14780891

#SPJ4

Technician a says low fluid level in the master cylinder reservoir indicates a leak in the system.

Answers

Technician A says the low fluid level in the master cylinder reservoir indicates a leak in the system. Technician B says for both drum and disc brakes, the friction material rotates with the wheel. Both A and B are correct.

Who is a technician?

A technician is a person who knows the technicality of machines and other things, They can repair these things.

These rubber rings prevent hydraulic fluid from escaping and keep it free of moisture and impurities. They also cause the piston to return to its off position, allowing the brake pads to disengage correctly when the brake pedal is released.

Therefore, the correct option is c, Both A and B.

To learn more about technicians, refer to the link:

brainly.com/question/19796461

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Technician B says for both drum and disc brakes, the friction material rotates with the wheel.

Who is right?

Select the correct option and click NEXT

O A only

B only

Both A and B

Neither A nor B

The computer stores currently used programs and data in

O a ROM
O b USB
O c CPU
O d RAM

Answers

The correct answer is d RAM computer stores currently used programs and data.

Random-access memory is what it's called, but what does it actually mean? In essence, the RAM in your computer serves as short-term memory, storing information when the CPU requests it. Contrast this with persistent data, which is kept on your hard drive and is accessible even when your computer is off. There are no moving parts with RAM. A chip is all that memory is. The data kept in RAM is physically read by an electrical signal. It operates at the same rate as electricity, which is also the same rate as light.

To learn more about RAM click the link below:

brainly.com/question/28282099

#SPJ4

Francis has recently started an advertising campaign that includes numerous advertisements across various media formats. Since the campaign began, sales are up 20%. He wants to increase his investment in the advertisements that have been most effective, but he doesn't know which ones to do. What has he failed to include in his advertisement planning?.

Answers

Francis has failed to include any form of tracking or analytics in his advertisement planning. Without tracking and analytics, it is impossible to determine which advertisements are most effective and which ones should be increased in investment. Tracking and analytics can provide valuable insights into which advertisements are driving the most sales and which ones should be optimized or removed.

a(n) ____ is a network tool that collects copies of packets from the network and analyzes them.

Answers

There are two primary components to a packet sniffer, often known as a packet analyzer. The sniffer must first be connected to the current network using a network adapter. Second, software that enables logging, viewing, or analysis of the data gathered by the device

The process of detecting and observing packet data as it flows over a network is known as packet sniffing. While hackers may use comparable tools for illicit objectives, network administrators utilise packet sniffing tools to monitor and verify network traffic. Data packets carrying sensitive information, such as passwords and account details, are captured by attackers using sniffers. Sniffers may be placed as hardware or software in the system. A hostile hacker can record and examine all network traffic by installing a packet sniffer in promiscuous mode on a network.

To learn more about packet sniffer click the link below:

brainly.com/question/15862936

#SPJ4

which type of control frame does a station send to let the ap know is can transmit buffered frames?

Answers

"PS-Poll" is the type of control frame that a station sends to inform the ap that it is capable of transmitting buffered frames.

Define the term frame buffer?

A framebuffer is a section of random-access memory (RAM) that houses a bitmap that powers a video display. It is also referred to as a frame buffer or framestore.

It is a memory buffer that stores information that represents every pixel in an entire video frame. Framebuffer circuitry is a core component of modern video cards.Picture definition is stored in a memory space known as a refresh buffer or frame buffer. The intensity values for each screen point are stored in this memory area. Frame buffer is used to restore stored intensity values, which are then painted on the screen one row at a time. Pixels are the name for a single screen point.frame buffer capacity. means the rate at which a discrete GPU processes data, measured in gigabytes per second (GB/s). Ecma International Standard ECMA-383 is used in the calculation.The Default Framebuffer in OpenGL is provided by the OpenGL Context, and user-created framebuffers known as Framebuffer Objects (FBOs).

Thus, "PS-Poll" is the type of control frame that a station sends to inform the ap that it is capable of transmitting buffered frames.

To know more about the frame buffer, here

https://brainly.com/question/24097378

#SPJ4

Both DNS poisoning and ARP poisoning involvesO Distributed O DoS O Spoofing O Replaying O Eavedropping

Answers

According to the given information Both DNS poisoning and ARP poisoning involves Spoofing.

What is DNS and ARP poisoning?

ARP poisoning spoofs physical addresses (MAC addresses) inside the same network segment, in contrast to DNS poisoning, which spoofs IP addresses of genuine websites and can spread across many networks and servers (subnet).

Although the phrases DNS spoofing and DNS poisoning are frequently used interchangeably, they have different meanings. Attackers employ a technique called DNS Poisoning to compromise DNS servers and replace legitimate data with a malicious redirect. Users are then sent to the malicious website via a poisoned cache as a result of DNS spoofing.

To know more about DNS and ARP poisoning, refer:

brainly.com/question/13120197

#SPJ4

What concerns are there about open source programs? A Programmers will add functionality and sell their versions B. Programmers will enhance the code faster than the computer hardware can keep up. C. Programmers will hide the code enabling them to control and profit from the programs. D. Programmers will add malicious code to damage a user's system

Answers

D. Programmers will add malicious code to damage a user's system is the one of the concerns about  open source programs. One concern with open source programs is that some programmers may add malicious code to the software in order to damage a user's system.

This can be done for various reasons, such as to steal personal information, to disrupt or damage the system, or to spread malware to other systems. The problem with open source software is that it is accessible to anyone, and anyone can modify the code and distribute it. This creates a higher risk for malicious code to be added and spread, as there is no centralized control or oversight of the codebase. However, it is important to note that open source software also has many benefits and is widely used in many applications. To mitigate this risk, it is important to download open-source software from trusted sources and keep an eye on the community discussion and updates, to ensure that any malicious code is detected and removed quickly.

Learn more about open source program, here https://brainly.com/question/13381970

#SPJ4

the ________ approach is the classical process used to develop information systems.

Answers

The standard development procedure for information systems is called as systems development life cycle (SDLC) approach.

Define the term systems development life cycle (SDLC)?

A conceptual model for project management known as the systems development life cycle (SDLC) details the phases of an information system development project, first from early phase of a feasibility study to the ongoing maintenance of the finished application.

The entire process of creating software or information systems is known as the Systems Development Lifecycle (SDLC). Planning, Analysis, Designing, Development, Tests, Implementation, and Maintenance are the seven primary phases of the SDLC.An SDLC methodology's main goal is to give IT project managers the tools they need to assure the effective implementation new systems that meet the strategic and operational goals of the university.The most important phase of the SDLC is requirements analysis and gathering. No development team can produce a customer-appreciated solution without comprehending the needs.

Thus, the standard development procedure for information systems is called as systems development life cycle (SDLC) approach.

To know more about the systems development life cycle (SDLC), here

https://brainly.com/question/15696694

#SPJ4

the requirement to keep information private or secret is the definition of __________.

Answers

Answer:

Confidentiality

Explanation:

when you keep something a secret, it is confidential

_______ is a technique for harnessing the power of thousands of computers working in parallel.
a. Granularity
b. RFM analysis
c. Reposition
d. MapReduce

Answers

A method for utilizing the power of numerous computers running in parallel is called map reduce.

What do you mean utilizing?

Use, employ, and utilize all refer to placing into service, particularly to achieve a purpose. Use refers to making use of something as a tool or a means to an end. eager to employ any strategy to further her goals. Employ implies making use of something or someone who is on hand but not using it.

Use, employ, and utilize all mean to put to use, particularly to achieve a goal.

Using something as a tool or a means to an end is implied by the verb USE.

Know more about   running in parallel Visit:

https://brainly.com/question/27409605

#SPJ4

who is responsible for information security at Infosys?

Answers

The information security council is responsible for information security at Infosys.

Where can you find the Infosys information security policy?

It is accessible by all employees and can be accessed in InfyMe Web under the 'Policy' section within the Information Systems (IS) portal (InfyMe web - > World of Infosys - > Business Units and Subsidiaries - > Information Systems - > Repository - > Policies).

The Information Security Council (ISC) is the governing body at Infosys that focuses on establishing, directing, and monitoring our information security governance framework.

Therefore, the information security council is responsible for information security at Infosys.

To learn more about the Security council, refer to the link:

https://brainly.com/question/97111

#SPJ1

Critical Thinking Challenge: Tasks Page Chapter 6: Object Modeling Note to Students: After you complete the Practice Tasks, click here to view the sample answers and check your work. Your answers might vary from these examples and still be correct. The intent is to give you a sample to guide you and serve as a reference. When you complete the Practice Tasks and review the sample answers, please return to this page and complete the Challenge Tasks. Background The IT team at Game Technology prepared DFDs for the new C system. You will help the team develop a set of object models. The system model will include use cases that represent various business processes. The customer and sales rep entities will be actors, with these methods: Entity Customer Methods • Request product information • Place order • Respond to Web promotion • Sign up on game blog • Initiate sales call to customer • Respond to customer inquiry • Follow up after prior order • Follow up after prior information request Sales Rep You also learned that customer categories are based on specific conditions, as shown: Category Potential Active Preferred Former Conditions Has not placed an order in the last 24 months, but has responded to a Web promotion or requested product information or signed up on our game blog Has placed at least one order in the last 24 months Has placed at least three orders in the last 24 months An Active or Preferred customer with no orders in the last 24 months Practice Tasks Task 1. Draw a use case diagram that includes the entities and the use cases. Task 2. Draw a state transition diagram that shows the customer categories and the conditions for each category. Challenge Tasks After you complete the Practice Tasks, you learn about new developments at Game Technology. The marketing group added a new data analyst position to provide IT support. The new person will track customer response times, prepare contact management plans for sales reps, and develop customer satisfaction surveys. Marketing also decided to update customer categories. Challenge Questions The Potential and former categories are not affected. The new categories are Silver, which replaces the Active category; Gold, which replaces the Preferred category, and Platinum, which includes any customer whose orders total at least $1,000 in the last 24 months. Task 1. Draw a new version of the use case diagram that adds the new marketing technician. Task 2. Draw a state transition diagram that shows the new customer categories and the conditions for each category. Please answer challenge tasks Critical Thinking Challenge: Sample Answers Page Chapter 6: Object Modeling Note to Students: After you complete the Practice Tasks and review the sample answers, please click here to return to the Tasks page and complete the Challenge Tasks. Background The IT team at Game Technology prepared DFDs for the new C system. You will help the team develop a set of object models. The system model will include use cases that represent various business processes. The customer and sales rep entities will be actors, with these methods: Entity Customer Methods • Request product information • Place order • Respond to Web promotion • Sign up on game blog • Initiate sales call to customer • Respond to customer inquiry • Follow up after prior order • Follow up after prior information request Sales Rep You also learned that customer categories are based on specific conditions, as shown: Category Conditions Potential Has not placed an order in the last 24 months, but has responded to a Web promotion or requested product information or signed up on our game blog Active Has placed at least one order in the last 24 months Preferred Has placed at least three orders in the last 24 months Former An Active or Preferred customer with no orders in the last 24 months Sample Answers Task 1. Draw a use case diagram that includes the entities and the use cases. Request product info > Follow up prior info request Place order Respond to customer inquiry Initiates initiates Customer Respond to Web promotion Follow up prior order Sales Rep ccuses>> Sign up on game blog Initiate customer sales call Task 2. Draw a state transition diagram that shows the customer categories and the conditions for each category. Placed at least one order in last 24 months Active No orders in last 24 months No Orders in last 24 Months but has • Responded to Web promo, or • Requested product Info, or Signed up on Game Blog Potential Former Former O No orders in last 24 months Preferred Placed at least three orders in last 24 months

Answers

The process of drawing the Object Modeling are:

Task 1:

In the new version of the use case diagram, you would add the new marketing technician as an actor and include their methods, such as tracking customer response times, preparing contact management plans for sales reps, and developing customer satisfaction surveys.You would also include the existing actors, such as the customer and sales rep, and their existing methods, such as requesting product information, placing orders, responding to web promotions, and so on.The use cases would show the interactions and relationships between the actors and the methods they perform.

What is the other task about?

In Task 2:

In the new state transition diagram, you would include the new customer categories, such as Silver, Gold, and Platinum, and the conditions for each category.Silver category would be for customers who have placed at least one order in the last 24 monthsGold category would be for customers who have placed at least three orders in the last 24 monthsPlatinum category would be for any customer whose orders total at least $1,000 in the last 24 monthsThe diagram would show the transitions between the categories based on the conditions, such as a customer moving from Potential to Silver if they place an order, or from Active to Former if they have no orders in the last 24 months.

Please note that the above explanation is just an example of how you can solve the task, and you might have a different approach to solve it.

Learn more about Critical Thinking  from

https://brainly.com/question/3021226

#SPJ1

the shaded space between the first and second pages of a document indicates a ____ break.
a. line
b. paragraph
c. page
d. document

Answers

A line break is indicated by the shaded area between the first and second pages of a document. As you enter text into a document, Word paginates it automatically. if a paragraph is too long for a page.

What is indicated example?

Indicated is described as having demonstrated, highlighted, or demonstrated the need for. To have pointed out the parkway to a lost traveller is an example of having indicated. YourDictionary. Simple past tense and indicate's past tense. When you point to something or indicate something to someone, you are essentially showing them where it is. He pointed to a chair. There is a 3,000-foot depth here, according to our records. The location of the hidden treasure is shown on the map. Nothing suggests a connection between the two incidents. His hefty bid shows how keen he is to purchase the house.

Know more about paragraph Visit:

https://brainly.com/question/24460908

#SPJ4

Select the correct answer.Anne is creating a website where she can share music that her band created. She needs to make sure that the file size is small enough to allow her fans to stream the audio over the Internet. Which format should she use to save her audio

Answers

Anne should use B: MP3 format to save her audio files.

MP3 is a standard technology and format for compressing an audio sequence into a very small file - about one-twelfth the size of the original file - while preserving the original level of audio quality when it is played. It means that the MP3 format is only for audio files and can reduce the size of audio files substantially while barely affecting the quality of the audio.

So in the given scenario where Anne wants to share music created by her band on her website. Further, she wants to ensure that the audio file size is small enough to permit her fans to stream the music over the Internet. The appropriate file format would be MP3.

"

Complete question:

Select the correct answer.Anne is creating a website where she can share music that her band created. She needs to make sure that the file size is small enough to allow her fans to stream the audio over the Internet. Which format should she use to save her audio

A. WMV

B. MP3

C. JPEG

D. MP4.

"

You can learn more about MP3 format at

https://brainly.com/question/29194231

#SPJ4

is a set of commands used to update and query a database. DDL DML DPL DCL The SQL

Answers

DCL is used to add new records to the database. The data specification language defines a database table (DDL). The data mapping language is used to maintain and query a database (DML).

What do commands for upgrading databases entail?

An existing table's data can be updated using the UPDATE command in SQL. According to our needs, we may use the UPDATE statement to update both single and many columns. AMEND table name SET row1 = value1, row2 = value2, etc.

Is a database defined by a series of commands?

The database is defined using instructions in the Data Definition Language (DDL). Data Manipulation Language (DML) — Contains instructions for changing the data in the database.

To know more about database visit:-

https://brainly.com/question/6447559

#SPJ4

A variable defined inside a method is referred to as ________.
a. a global variable
b. a method variable
c. a block variable
d. a local variable

Answers

The correct answer is a. a global variable. A variable defined inside a method is referred.

Global variables are those that have been declared outside of the specified function. These are not restricted to a particular function, therefore any available function can be used to access and alter global variables. Global variables are variables that may be accessed across the whole programme and are defined outside of any individual functions or blocks. Any software function that is present can access it. A global variable is one that may be accessed from anywhere. Temporary variables used in a single function declaration are examples of local variables since they are only available inside the current scope.

To learn more about global variable click the link below:

brainly.com/question/29607031

#SPJ4

you manage the worksheet shown below. you want the building number in column b to be edited by anyone who has access to the sheet. you do not want any other information to be edited by others. how can you configure the worksheet to achieve this protection?

Answers

You will lock the cells in all columns except column B and generate a password to protect the worksheet to configure the worksheet and to achieve the protection from other information being edited by others.

What does a computer Excel spreadsheet do?

The most popular spreadsheet program and a potent tool for data analysis and visualization is Microsoft Excel. A excel spreadsheet is a computer application that can record, display, and manipulate data set up in rows and columns. One of the most widely used tools for personal computers is spreadsheets.

Users of Microsoft Excel can locate trends and classify data into useful groups. In order to help organizations better understand the composition and activities of their workforce, Excel also handles human resources operations including categorizing hours worked and managing employee profiles and expenses.

To learn more about excel spreadsheet, visit:

https://brainly.com/question/30029447

#SPJ4

How do you handle data in analytics to gain greater insights into our audience's behaviour?.

Answers

You manage data in analytics by employing the segment approach to learn more about the behavior of our audience.

In data analytics, what exactly is data?

In order to identify trends and make inferences about the information they contain, data sets are examined using data analytics (DA), a process.

                    More often than not, specialist hardware and software are used to perform data analytics.

What steps make up the data analytics process?

Data analytics refers to the procedure of gathering, purifying, classifying, and analyzing unstructured data in order to derive useful and pertinent information for enterprises.

                      The customer experience, retention, targeting, operational cost reduction, and problem-solving techniques can all be enhanced by having a thorough understanding of data.

Learn more about Data Analytics

brainly.com/question/29109220

#SPJ4

a(n) ____ field is a field that can be computed from other fields.

Answers

A field that can be determined from other fields is referred to as a calculated field.

What is a field in a data type?

Think of a field's data type as a set of properties that are applicable to each and every value that is put in the field. For instance, only letters, integers, and a limited amount of punctuation characters are permitted in text field data, and a text field can carry a maximum of 255 characters.

Do fields count as database columns?

In a table, a column is a row of cells stacked vertically. A field is an element that, like the receiving field, only holds one piece of data. A table's columns typically contain the values for a single field.

To know more about calculated  field visit:-

brainly.com/question/13668122

#SPJ4

in order to make effective use of a new or upgraded technology, a user may require ____.

Answers

Answer: A driver or software

Explanation:

an expert system is not a good choice when a lot of human expertise is needed to tackle a problem.

Answers

(False) When several human experts are required but one individual cannot solve a problem alone, an expert system should be utilized.

What are the issues with the expert system?

Three issues are frequent: (1) The knowledge representation language lacks sufficient granularity. (2) The knowledge representation language is unnecessarily extensive. (3) The expert's knowledge is incompatible with the knowledge representation language.

What one of the following is true about expert systems' drawbacks?

Absence of common sense Since all decisions are based on the system-set inference rules, it lacks the common sense necessary for some decisions. Additionally, it is not capable of coming up with novel solutions in novel situations like human specialists could.

To know more about expert system visit :-

https://brainly.com/question/29978704

#SPJ4

if two borders have the same width but different styles, ____ borders have the highest priority.

Answers

if two borders have the same width but different styles, ame width borders have the highest priority.

What two types or borders are there?

Physical borders & political borders are two different types of geographic boundaries.Geographical boundaries can be either natural or man-made.Political boundaries by definition include borders, which divide nations, states, provinces, county, cities, and towns.

Is border included in width?

The margin is not included in the width and height attributes, but they do also include content, padding, and border.Keep in mind that the box will have padding and a border.

To know more about borders visit:

https://brainly.com/question/22914830

#SPJ4

The name of the ____ is always the same as the name of the class whose objects it constructs.a. variableb. constructorc. argumentd. method

Answers

b) constructor

The name of the constructor is always the same as the name of the class whose objects it constructs.

For Questions 1-4, consider the following code:
def mystery(w, n):

if (n>5):

return w.upper()

else:
return w.lower()

The following line of code will output the string in lower case.

print(mystery("Zip Code",5))

- true
- false

Answers

Using the knowledge in computational language in python it is possible to write a code that  following line of code will output the string in lower case.

Writting the code:

string = "this should be uppercase!"

print(string.upper())

# string with numbers

# all alphabets should be lowercase

string = ""

print(string.upper())

# first string

firstString = "python is awesome!"

# second string

secondString = ""

if(firstString.upper() == secondString.upper()):

   print("The strings are same.")

else:

   print("The strings are not same.")

See more about python at brainly.com/question/15872044

#SPJ1

4. A user reports that there is a loud clicking noise when she tries to save a file. What should be your first troubleshooting step

Answers

The first troubleshooting step should be to determine whether a data backup has been made. If not, try to make one.

The term "backup" describes the process of copying physical or virtual files or databases to a different location for preservation in the event of a catastrophe or equipment failure. Data backup is essential to a successful disaster recovery strategy.

The process of determining what data will be backed up, the methods and tools for doing so, the frequency of backups, and the recovery process is known as data backup planning (s).

Full backups, differential backups, and incremental backups are the three different kinds of backups.

To learn more about  backup

https://brainly.com/question/29590057

#SPJ4

Other Questions
Which of the following is a good practice to protect classified information?Power off any mobile devices when entering a secure area. Not correct. Store classified data in a locked desk drawer when not in use Maybe Transmit classified information via fax machine only Not correct Dont assume open storage in a secure facility is authorized Maybe What are the 4 types of external factors? The following two-way frequency table shows information collected from a survey of attendees at a neighborhood meeting regarding how many people have a dog and how many people take walks in the neighborhood.What is the probability that a randomly selected person does not take walks in the neighborhood but has a dog?Write your answer as a fraction in simplest form, formatted like this: 2/7 The equation M = 1,800 (1.02) models the number ofmembers, M, of a gym t years after the gym opens. Which statement is false. The membership rates are increasing 20% each year. 1,800 members joined the gym when it first opened. This model shows exponential growth. The gym would have about 1,910 members after 3 years. Type the words that end in the noun suffixes -sion or -tion (one is plural). Put your answers in alphabetical order. The average age of an automobile on American streets and roads has risen to __________ years, indicating the extent which overall domestic quality has risen. In communications and information processing, code is a system of rules to convert information such as a letter, word, sound, image, or gesture into another form or, sometimes shortened or secret, for communication through a communication channel or storage in a storage medium. How is this similar to your DNA? The scatter plot shows the relationship between the amount of time students in a mathematics class studied for an exam and their score on the exam.scatter plot titled mathematics class, with the x axis labeled time studying in minutes and the y axis labeled score on exam with points at 0 comma 30, 10 comma 35, 30 comma 37, 40 comma 37, 50 comma 40, 60 comma 45, 70 comma 55, 75 comma 60, 80 comma 70, 85 comma 78, 90 comma 83, 95 comma 90, 100 comma 95, and 105 comma 100Which of the following describes the pattern of association for the graph? There is a negative linear association. There is a negative nonlinear association. There is a positive linear association. There is a positive nonlinear association. a(n) ______ is an example of a chordate that is not a vertebrate. Based on the forces of inertia and momentum, ________ varies according to speed, weight, and the distance between impact and stop. Pooled resources and skills are ________________. a. one advantage of working as individuals b. one reason to avoid group work c. one advantage of working as a group d. difficult to achieve Please select the best answer from the choices provided A B C D What workers were considered part of the state? They couldn't own land, and they had little or no control over their lives. KnightsVassalsKingsPeasants Should young children be allowed to use social media? If the range of X is the set {0,1,2,3,4,5,6,7,8} and P(X=x) as defined in the following table:x012345678P(X=x)0.065280.38700.030620.09680.069130.09680.048460.012520.1935Determine the mean and variance of the random variable.(a) mean(b) variance What property of triangle congruence states that if a B then B A? Buying art supplies. Isabella is an artist who normally purchases her spray fixative in 6 2/3 ounce cans. If the economy size contains 1 2/5 as much spray, how many ounces will it contain? ACTIVE LEARNING TEMPLATE: System Disorder STUDENT NAME DISORDER/DISEASE PROCESS Cystic fibrosis REVIEW MODULE CHAPTE Pathophysiology Related to Client Problem Health Promotion and Disease Prevention ASSESSMENT Risk Factors Expected Findings Laboratory Tests Diagnostic Procedures SAFETY CONSIDERATIONS Complications ACTIVE LEARNING TEMPLATES The graph of y=- square root of x is shifted 2 units up and 5 units left. Which equation represents the new graph? the payroll department of a manufacturing company is most likely to be a(n) ________. (02.07) a particular plant root grows 1.5 inches per month. how many centimeters is the plant root growing per month? (1 inch = 2.54 centimeters). (2 points) group of answer choices 0.59 centimeters 1.69 centimeters 3.81 centimeters 4.04 centimeters