a _____ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.

Answers

Answer 1

A security incursion is a security event that results in a security incident in which an unauthorized user gains access to a system.

What are an intruder and an intrusion?

Attackers who try to compromise a network's security are known as intruders. They launch an attack on the network to gain illegal access. There are three different categories of intruders: miscreants, masqueraders, and covert users.

What is in charge of figuring out whether an intrusion has happened?

The analyzer is in charge of figuring out whether an intrusion has taken place. This component's output serves as a notification of an intrusion. An IDS's user interface enables a user to monitor system output or modify the system's behavior.

To know more about security visit:-

https://brainly.com/question/28070333

#SPJ4


Related Questions

A ______ can hold a sequence of characters such as a name.

Answers

A string can hold a sequence of characters, such as a name.

What is a string?

A string is frequently implemented as an array data structure of bytes (or words) that records a sequence of elements, typically characters, using some character encoding. A string is typically thought of as a data type. Data types that are character strings are the most popular.

Any string of letters, numerals, punctuation, and other recognized characters can be stored in them. Mailing addresses, names, and descriptions are examples of common character strings.

Therefore, a string is capable of storing a group of characters, such as a name.

To learn more about string, refer to the link:

https://brainly.com/question/17091706

#SPJ9

Question 6 of 20:
Select the best answer for the question.
6. You can
to keep one area of a worksheet static while you scroll to a different area within the same worksheet.
A. freeze panes
O B. use the Zoom slider
O C. create a bookmark
O D. highlight a cell range

Answers

Answer:

A. freeze panes

Explanation:

Which of the following section does not exist in a slide layout?
A. Titles
B. Lists
C. Charts
D Animations​

Answers

Answer:

D

Explanation:

Use the drop-down menus to select the software term being described. The is what the user interacts with when operating a computer. The is the most important computer software. The is the software located within the hardware.

Answers

Answer:

1.)  A. application software

2.) C. operating system

3.) B. basic input/output system

Answer:

All of his are correct :)

Explanation:

What are the reasons you need a dedicated software development team?

Answers

Answer:

Having a dedicated software development team is essential for any modern organization. A specialized software development team can provide your company with the expertise needed to create quality and secure products or services that meet all of your requirements. Additionally, they can help you develop and maintain feature-rich applications that are tailored specifically to fit your business needs as well as stay ahead of market changes by allowing teams of developers to rapidly iterate on ideas and concepts quickly in order to deliver innovative solutions faster than ever before! Finally, having an experienced development team means creating customizations easily without needing external support, which makes for fewer problems over time.

Answer:

To successfully hire a dedicated development team, you must pick a business that can provide a wide collection of skill sets, such as designers, developers, and quality assurance professionals, all of whom can cooperate to create end-to-end service. All of these needs may be met as long as you clearly communicate about the scope and goals.

Explanation:

Let's explore the benefits of the dedicated development team at Nuvento

The advantages of hiring a dedicated development team at Nuvento is;

Cost-effective

Costs for office space, training and onboarding, and other legal charges are all part of the traditional manner of hiring a team of developers. Because dedicated development teams are hired remotely, these costs are reduced without affecting work quality.

Hiring a dedicated development team has the advantage of not needing you to spend time interviewing and hand-picking applicants to put together a team for your project. We will put up a group of experts that are well-suited for the assignment once the scope and criteria are given.

As a result, the pay scale can be adjusted based on the work requirements. It's an excellent way to simplify your spending and may save your firm a significant amount of cash over time.

Access to global talent

Access to a global talent pool opens up a world of possibilities by introducing a completely new dimension to your organisation. With their knowledge and skills, these individuals can improve the capabilities of your technology stack—often at a very low cost.

Hiring software development from India provides you a significant edge. Indian specialists are capable of providing high-tech solutions at reasonable costs. Furthermore, they may collaborate with your in-house IT staff to develop solutions.

Complete control

You have direct control of the selection, recruitment, and administration of your development team, which includes everyone from coders and designers to project managers and business analysts. Rather than simply deciding on a team schedule, you will need to create workflows, communicate, manage tasks, track progress, evaluate performance, and so forth.

In terms of control over the development process, hiring a team of developers is comparable to having an in-house team working from a remote office. However, if you want, a dedicated hiring model allows you to delegate micromanagement to your dedicated project manager.

Focused and dedicated approach

A development staff that is dedicated to your cause becomes an integral part of your company. Your preferred methods and management practises guide dedicated teams.

Our development staff is dedicated to your project and is driven to achieve your goals without distraction. With such a high degree of interaction, the team is able to better understand your company's demands and be more effective and productive.

Increase in productivity

In the rapidly changing software sector, productivity and speed of work are critical. These factors may be adjusted to provide your company a competitive advantage. Dedicated developers are used to dealing with outsourced companies, therefore there is no need for them to adjust.

Dedicated developer teams have a lot of expertise working together in an efficient, productive, and dynamic manner.

Flexibility

A dedicated web development team offers a significant amount of flexibility. They can dedicate their entire time to one project while you work on others.

Flexibility is important not only for startups but also for bigger enterprises. The additional level of control and team management provided to a corporation is a great asset. It also means that if you need changes made while the job is being done, you may call the team and they will meet your needs.

To know more about the benefits of hiring a dedicated development team visit this page;

https://nuvento.com/dedicated-software-development-teams/

Changing the color of the text in your document is an example of

Answers

Answer:

???????????uhhh text change..?

Explanation:

Answer:

being creative

Explanation:

cause y not?

Write the Holiday Date of the following holidays:
1. Bonifacio Day –
2. Christmas Day –
3. Rizal Day –
4. Day of Valor –
5. Labor Day –
6. Independence Day –
7. New Year’s Day –
8. People Power Day –
9. Ninoy Aquino Day –
10. All Saint’s Day –

Answers

Answer:

1. November 30

2. December 25

3. December 30

4. April 9

5. September 1

6. (depends)

7. January 1

8. February 25

9. August 21

10. November 1

Explanation:

Which of the following is NOT a legal variable name?

appointment_hour

grade3

%information

firstName

Answers

Answer:

grade3

Explanation:

0 grade3 is NOT because it’s not a variable name

How are centralized computing and cloud computing similar?

Answers

The centralized computing and cloud computing similar because Cloud as well as they other both operates a centralized management system.

What are the similarities between cloud computing and grid computing?

The Grid and Cloud are known to have similarities like both of them are known to be used to share recourses such as the computational power, storage, and others.

Hence, The centralized computing and cloud computing similar because Cloud as well as they other both operates a centralized management system.

Learn more about cloud computing from

https://brainly.com/question/19057393

#SPJ1

HELPPPP THESE STATEMENTS DESCRIBE DTP

HELPPPP THESE STATEMENTS DESCRIBE DTP

Answers

The correct statements that describe  DTP (Desktop Publishing) are:

DTP treats graphics and text boxes differently.

DTP lets you resize and rotate graphics.

DTP helps workers produce documents that improve communication.

What is the statements that describe DTP.

DTP  refers to the process of utilizing specialized operating system and finishes to create and design miscellaneous types of documents, in the way that brochures, flyers, newsletters, papers, books, and added printed fabrics.

DTP spreadsheet allows consumers to integrate text, representations, drawings, and other components to form visually attractive and professionally formatted documents.

Learn more about   Desktop Publishing from

https://brainly.com/question/7221406

#SPJ1

Question #2

Multiple Select

These statements describe DTP.

DTP treats graphics and text boxes differently.

DTP lets you resize and rotate graphics.

DTP helps workers produce documents that improve communication.

Many DTP features are included in WP programs.

WP and DTP are the same.

Which of the following could be considered an algorithm?


directions for assembling a bicycle


the pages in a book


a file system directory


an application
F

Answers

The best answer is an application

Finish and test the following two functions append and merge in the skeleton file:
(1) function int* append(int*,int,int*,int); which accepts two dynamic arrays and return a new array by appending the second array to the first array.
(2) function int* merge(int*,int,int*,int); which accepts two sorted arrays and returns a new merged sorted array.
#include
using namespace std;
int* append(int*,int,int*,int);
int* merge(int*,int,int*,int);
void print(int*,int);
int main()
{ int a[] = {11,33,55,77,99};
int b[] = {22,44,66,88};
print(a,5);
print(b,4);
int* c = append(a,5,b,4); // c points to the appended array=
print(c,9);
int* d = merge(a,5,b,4);
print(d,9);
}
void print(int* a, int n)
{ cout << "{" << a[0];
for (int i=1; i cout << "," << a[i];
cout << "}\n"; }
int* append(int* a, int m, int* b, int n)
{
// wru=ite your codes in the text fields
}
int* merge(int* a, int m, int* b, int n)
{
// wru=ite your codes in the text fields
}

Answers

Answer:

Explanation:

#include <iostream>

using namespace std;

int* append(int*,int,int*,int);

int* merge(int*,int,int*,int);

void print(int*,int);

int main()

{ int a[] = {11,33,55,77,99};

int b[] = {22,44,66,88};

print(a,5);

print(b,4);

int* c = append(a,5,b,4); // c points to the appended array=

print(c,9);

int* d = merge(a,5,b,4);

print(d,9);

}

void print(int* a, int n)

{ cout << "{" << a[0];

for (int i=1; i<n; i++)

cout << "," << a[i];

cout << "}\n";

}

int* append(int* a, int m, int* b, int n)

{

int * p= (int *)malloc(sizeof(int)*(m+n));

int i,index=0;

for(i=0;i<m;i++)

p[index++]=a[i];

for(i=0;i<n;i++)

p[index++]=b[i];

return p;

}

int* merge(int* a, int m, int* b, int n)

{

int i, j, k;

j = k = 0;

int *mergeRes = (int *)malloc(sizeof(int)*(m+n));

for (i = 0; i < m + n;) {

if (j < m && k < n) {

if (a[j] < b[k]) {

mergeRes[i] = a[j];

j++;

}

else {

mergeRes[i] = b[k];

k++;

}

i++;

}

// copying remaining elements from the b

else if (j == m) {

for (; i < m + n;) {

mergeRes[i] = b[k];

k++;

i++;

}

}

// copying remaining elements from the a

else {

for (; i < m + n;) {

mergeRes[i] = a[j];

j++;

i++;

}

}

}

return mergeRes;

}

Write a program that defines the following two lists:
names = ['Alice', 'Bob', 'Cathy', 'Dan', 'Ed', 'Frank','Gary', 'Helen', 'Irene', 'Jack',
'Kelly', 'Larry']
ages = [20, 21, 18, 18, 19, 20, 20, 19, 19, 19, 22, 19]
These lists match up, so Alice’s age is 20, Bob’s age is 21, and so on. Write a program
that asks the user to input the number of the person to retrieve the corresponding
data from the lists. For example, if the user inputs 1, this means the first person
whose data is stored in index 0 of these lists. Then, your program should combine
the chosen person’s data from these two lists into a dictionary. Then, print the
created dictionary.
Hint: Recall that the function input can retrieve a keyboard input from a user. The
signature of this function is as follows:
userInputValue = input("Your message to the user")
N.B.: userInputValue is of type String

Answers

Answer: I used colab, or use your favorite ide

def names_ages_dict():

 names = ['Alice', 'Bob', 'Cathy', 'Dan', 'Ed', 'Frank','Gary', 'Helen', 'Irene', 'Jack', 'Kelly', 'Larry']

 ages = [20, 21, 18, 18, 19, 20, 20, 19, 19, 19, 22, 19]

 # merging both lists

 names_ages = [list(x) for x in zip(names, ages)]

 index = []

 # creating index

 i = 0

 while i < len(names):

     index.append(i)

     i += 1

 # print("Resultant index is : " ,index)

 my_dict = dict(zip(index, names_ages))

 print('Input the index value:' )

 userInputValue  = int(input())

 print(f'data at index {userInputValue} is, '+ 'Name: ' + str(my_dict[input1][0] + '  Age: ' + str(my_dict[input1][1])))

 keys = []

 values = []

 keys.append(my_dict[input1][0])

 values.append(my_dict[input1][1])

 created_dict = dict(zip(keys, values))

 print('The created dictionary is ' + str(created_dict))

names_ages_dict()

Explanation: create the function and call the function later

Write a program that defines the following two lists:names = ['Alice', 'Bob', 'Cathy', 'Dan', 'Ed', 'Frank','Gary',

visit the transmission versus propagation delay interactive animation at the companion web site. among the rates, propagation delay, and packet sizes available, find a combination for which the sender finishes transmitting before the first bit of the packet reaches the receiver. find another combination for which the first bit of the packet reaches the receiver before the sender finishes transmitting.

Answers

The length of the packet will determine how long the transmission delay is, whereas the propagation delay is the amount of time required for a bit to travel to the other end of the network.

How are transmission and propagation delays determined?

Propagation delay is the amount of time it takes for a bit to get from the transmitter to the receiver end of the link. Mathematically, Distance between sender and receiver = Propagation delay. Transmission speed / propagation delay.

What does the applet for transmission versus propagation delay do?

The time it takes the router to push out the packet is known as the transmission delay. The propagation delay is the amount of time needed for a bit to move from one router to the next.

To know more about network visit:-

https://brainly.com/question/29350844

#SPJ1

What is a physician who specializes in arthritis and autoimmune issues called?
O internist
O dermatologist
O surgeon
O rheumatologist

Answers

Rheumatologists are a physician who specializes in arthritis and autoimmune issues.

Drag the tiles to the correct boxes to complete the pairs.

James is approachable
arrow --->
James is a good facilitator --->

James is confident --->

James is resourceful --->

Answers

Answer: James is all of the above

Explanation:

How to effectively keep and organize your study notes

Answers

Answer:

1. start by sorting out your notes into categories

2. label them in alphabetical order and category in a binder

3. I recommend using color labels like stickers or separators for a complete organization.

6.What does transgenic mean?​

Answers

answer:

transgenic means that one or more DNA sequences from another species have been introduced by artificial means.

explanation:

transgenic plants can be made by introducing foreign DNA into a variety of different tissuestransgenic mice are one of the most common animal models used

relating to or denoting an organism that contains genetic material into which DNA from an unrelated organism has been artificially introduced. being or used to produce an organism or cell of one species into which one or more genes of another species have been incorporated a transgenic mouse transgenic crops and produced by or consisting of transgenic plants or animals.

Academic writing focus on all of the following except?
1being specificand clear
2 answering readers questions
3 using 3 rd person instead of pronouns
4 using contractions to simplify words

Answers

Academic writing focus on all of the following except answering readers' questions. Thus, the correct option for this question is B.

What is the main objective of academic writing?

The main objective of academic writing is to frame the article or any piece of writing in a more clear and more precise manner with a direct style that moves logically from one idea to the next.

This significantly describes how you can structure sentences and paragraphs to achieve clarity and 'flow' in your writing. The third person also includes the use of one, everyone, and anyone. Most formal, academic writing uses the third person instead of pronouns. It also utilizes contractions to simplify words.

Therefore, academic writing focus on all of the following except answering readers' questions. Thus, the correct option for this question is B.

To learn more about Academic writing, refer to the link:

https://brainly.com/question/6187012

#SPJ9

Emanuel studies hard for hours on end until bedtime, yet his grades could be better. What can he do to improve his academic performance?

sleep less
take breaks
eat more
work longer

Answers

Emanuel needs to Take breaks

Answer:

Its B! I know I'm late but for the other people that might get the same question like me.

Multiple Choice: We have been assigned the task of developing a software testing tool (tester) that can assess reachability of statements in a program. Namely, given a program and a statement x in the program (line in the code), the tester should produce a sequence of inputs that demonstrates that the program can reach statement x, or declare that statement x is not reachable under any input sequence. What should we respond to the manager who assigned this task

Answers

Answer:

A. There is no algorithm to decide whether this can be done or not.

Explanation:

We should respond to the manager who assigned this task that there is no algorithm to decide whether this can be done or not. This is because there are many unknowns with the program that is provided. There are various programming languages and each one has its own structure and requirements in order to test them. Also, each function is created differently with different inputs that are necessary and different algorithms used. It is impossible to design a single algorithm that works to test every single provided program. That is why testers have to create custom test cases for each function.

1. If the document is something that is produced frequently, is there a template readily available which you could fill in with a minimum of effort? 2. If so, which template fits with company and industry requirements? 3. If a template is available, does it need to be tweaked to make it conform to your needs? 4. If a template is not available, can one be created and saved for future use? 5. Who needs to approve the template before it becomes a standard tool for the business? 6. What software should be used to create the template? Should it be proprietary software or free software?​

Answers

If the document is produced frequently, it is likely that there is a template readily available that can be used as a starting point for creating the document.

What is template?

A template is a pre-designed document or file that can be used to start new documents with a similar structure or format.

Templates, which provide a standardized framework for organizing and presenting information, can be used to save time and ensure consistency across documents.

To ensure that the template meets company and industry requirements, it's important to review and compare the template with the relevant standards, guidelines, and regulations.

If a template is available, it may need to be tweaked to make it conform to specific needs or preferences.

This can involve making changes to formatting, structure, or content to better reflect the specific requirements of the document.

If a suitable template is not available, it may be necessary to create one from scratch. Once created, the template can be saved and reused as needed for future documents.

Approval for a template may depend on the specific policies and procedures of the organization.

Thus, there are many software options available for creating templates, including proprietary software such as Microsoft Word or Adobe InDesign, as well as free software such as Docs or OpenOffice.

For more details regarding template, visit:

https://brainly.com/question/13566912

#SPJ9

A client has the right to receive ethically conducted research. Discuss this statement with examples.

Answers

A client has the right to receive ethically conducted research. This means that the researcher should adhere to the principles of scientific research, which includes honesty, objectivity, integrity, and respect for human subjects. In addition, the researcher should ensure that the research is conducted in a safe and responsible manner.

What is research?
Research is defined as "creative and methodical activity done to improve the body of knowledge." It entails the objective gathering, organising, and analysis of data in order to improve comprehension of a subject or issue. A research effort could build on prior contributions to the field. Research may duplicate portions of earlier projects or the project as a complete to verify the accuracy of instruments, processes, or experiments.

Documentation, discovery, interpretation, as well as the research and development (R&D) of methods & systems again for advancement of human knowledge are the main goals of basic research (as opposed to applied research). Research methodologies are based on epistemologies, which differ greatly within and between the humanities and sciences.

To learn more about research
https://brainly.com/question/25257437
#SPJ13

A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the following types of malware is MOST likely installed on the compromised host?
A. Keylogger
В. Spyware
C. Trojan
D. Backdoor
E. Rootkit

Answers

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

how to call a void method with no parameters IN JAVA?

Answers

Explanation:

SanfoundryMenu

Java Program to Illustrate a Method without Parameters and Without Return Type

« PrevNext »

This is a Java Program to Illustrate a Method without Parameters and Without Return Type.

We have made the method to calculate area. We call this method from main method and then enter the radius of the circle as input. Now we calculate area and print the output.

Here is the source code of the Java Program to Illustrate a Method without Parameters and Without Return Type. The Java program is successfully compiled and run on a Windows system. The program output is also shown below

By the 1970s, the acceleration of airplane travel led to fears that an epidemic would leapfrog the globe much faster than the pandemics of the Middle Ages, fears that were confirmed beginning in the 1970s by the worldwide spread of:________
a. the Zika virus.
b. the HIV infection
c. severe acute respiratory syndrome (SARS)
d. the Asian flu virus
e. Ebola

Answers

Answer:

b. the HIV infection.

Explanation:

Around the 1970s, an increase in the use of airplane travel led to fears that an epidemic would leapfrog the globe much faster than the pandemics such as tuberculosis, leprosy, smallpox, trachoma, anthrax, scabies, etc., that were evident during the Middle Ages, fears that were later confirmed by the worldwide spread of the HIV infection, beginning in the 1970s in the United States of America.

STD is an acronym for sexually transmitted disease and it can be defined as diseases that are easily transmissible or contractable from another person through sexual intercourse. Thus, STD spread from an infected person to an uninfected person while engaging in unprotected sexual intercourse. Some examples of STDs are gonorrhea, chlamydia, syphilis, HIV, etc.

HIV is an acronym for human immunodeficiency virus and it refers to a type of disease that destabilizes or destroy the immune system of a person, thus, making it impossible for antigens to effectively fight pathogens.

Generally, contracting STDs has a detrimental effect to a patient because it causes an opening (break) or sore in the body of the carrier (patient) and as such making them vulnerable to diseases that are spread through bodily fluids e.g human immunodeficiency virus (HIV), Hepatitis, staphylococcus, AIDS, etc.

What is a document?

a information about a computer file, distinct from the information it contains
a set of information gathered together
a two- to four-letter string set to the right of the dot in a filename; this designates the type of information in the file
a computer file representing a specific text item

Answers

Answer:

A document is a written, drawn, presented, or memorialized representation of thought, often the manifestation of non-fictional, as well as fictional, content. The word originates from the Latin Documentum, which denotes a "teaching" or "lesson": the verb doceō denotes "to teach" In general, a document (noun) is a record or the capturing of some event or thing so that the information will not be lost.  A document is a form of information. A document can be put into an electronic form and stored in a computer as one or more files. Often a single document becomes a single file.

When a program is adapted to run on multiple processors in a multiprocessor system, the execution time on each processor is comprised of computing time and the overhead time required for locked critical sections and/or to send data from one processor to another. Assume a program requires t = 100 s of execution time on one processor. When run p processors, each processor requires t/p s, as well as an additional 4 s of overhead, irrespective of the number of processors. Compute the per-processor execution time for 2, 4, 8, 16, 32, 64, and 128 processors. For each case, list the corresponding speedup relative to a single processor and the ratio between actual speedup versus ideal speedup (speedup if there was no overhead).

Answers

I only need points for my questions

Which statements are true about the OSI reference model? The OSI model developed in the 1970s and 1980s. OSI stands for Open Systems Interface. OSI developed as two independent projects. These projects merged in 1980. The OSI reference model consists of seven layers. The model numbers these layers from 0 to 6. A layer can communicate with the layer above and below it. However, any layer can communicate with any other layer on another device.

Answers

Regarding the OSI reference model, the following statements are accurate: The Open Systems Interconnection, not Open Systems Interface, concept was created in the 1970s and 1980s.

Which of the following statements on the differences between the TCP/IP reference model and the OSI reference model is true?

Transmission Control Protocol/IP (TCP/IP) and Open Systems Interconnection (OSI) are acronyms for different protocols. Whereas OSI takes a vertical approach, TCP/IP uses a horizontal approach.

Which of the following claims about the OSI model is true?

Application, Presentation, Session, Transport, Network, Data Link, and Physical Layer are the seven levels of the OSI reference model. Open System Interconnect, or OSI for short, is a generic model.

To know more about OSI visit:-

https://brainly.com/question/25404565

#SPJ1

Please have a look at the screenshot below

Please have a look at the screenshot below

Answers

C. Reliability

Because of the network and recovery time



Plz give brainliest
Other Questions
A car with a mass of 850kg is moving at a speed of 72km/h when colliding with a concrete wall until it stops. After the collision, the car travels 2.0m before stopping. Determine the resultant of the forces acting on the car. Describe how you think journalism will evolve in the future.Will these changes lead to an overall improvement in journalism?Why or why not? How has the past information expansion changed theenviron As Sales Manager for ISeeYou Productions, you are planning to review the prices you charge clients for television advertisement development. You currently charge each client a development fee of $7,200. With this pricing structure, ISeeYou is able to sign 6 contracts per month. This is down from 14 contracts, which was the figure last year when your company charged each client only $4,000. (a) Construct a linear function that yields the development fee p that ISeeYou should charge in order to sign q contracts per month (B) Find the total revenue R ISeeYou obtains by signing q contracts.(c) The costs to ISeeYou Productions are estimated as follows:Fixed costs: $16,000 per monthVariable costs: 800q dollars (when q contracts are signed)Express ISeeYou Productions' monthly cost as a function of the number q of contracts.C(q) = (d) Express ISeeYou Productions' monthly profit as a function of the number q of contracts.P(q) = .(e) How many contracts could ISeeYou sign to break even? (Enter the lower value first.)ISeeYou breaks even when they sign How many men did it take to capture Antigone?A:2B:5C:1D:7 I need help ASAP plz helppppppppp List the following particles in size order, from biggest to smallest?A Molecules, electrons, atoms incorrect answerB Atoms, molecules, electrons incorrect answerC Electrons, atoms, molecules incorrect answerD Molecules, atoms, electrons Louis bought 12 pounds of fish for $180 for a dinner party. He decided to buy 5 more pounds of fish. How much will it cost him? How might the development of spoken language have influenced the religious beliefs of Stone Age people? A. Spoken language would have made family groups more suspicious of outsiders. B. Spoken language would have allowed religious beliefs to spread more quickly. C. Spoken language would have created a new class of religious leaders. D. Spoken language would have encouraged humans to create religious cave paintings. in a regular expression, you can define two possible patterns for the same text string by joining different patterns using the _____ character. 13 Type the correct answer in the box. spell all words correctly. in which folder can you save an unfinished email (so that you can edit and send it later)? you can save an unfinished email (so that you can edit and send later) in the folder. Which change to the model would improve its accuracy? A. Move each neutron so it is next to a proton. B. Move the protons and neutrons to a small space in the center. C. Move the protons and electrons to a small space in the center. D. Move all of the particles so that they are evenly spaced. The ____________ surface of the teeth selectively absorbs acidic glycoproteins from saliva forming a membranous layer called the acquired enamel pellicle. This pellicle contains ions that confer a net ____________ charge to the tooth surface. Because most bacteria have a net negative charge, there is a natural ____________ between the tooth surface and bacteria. Help please , will mark Zelda has been a victim of cybersecurity attacks twice, losing considerable sums of money each time. How can she ensure that she does not become a victim to it again? Select all that apply.A. She must not open email attachments that she hasnt been expecting.B. She should try and carry her own WiFi, or create a hotspot using her phone, and avoid unprotected public WiFi networks.C. She should configure all her gadgets to download and install security updates automatically.D. She should absolutely not share passwords or account info with anyone. How can you determine if an inverse is a function? Why is the yield on 30-year treasury bonds important?. In a certain town, there are 30,000 registered voters, of whom 12,000 are Democrats. A survey organization is about to take a simple random sample of 1,000 registered voters.A)The expected value for the percentage of Democrats in the sample is_____ . The SE for the percentage of Democrats in the sample is_____.B)The percentage of Democrats in the sample is likely to be around_____, give or take____or so.C)Find the chance that between 39% and 41% of the registered voters in the sample are Democrats. a wireless network predicts that sales will increase 110% this upcoming year. if the sales are projected to be $16000 in the future, what are they in the past?A 1600B 7619C 14400 D 14545 SHOW WORK In terms of gender differences in adolescence and emerging adulthood, which of the following is the most accurate? For most characteristics, there is __________________ between genders.a. more difference than similarityb. no significant differencec. more similarity than differenced. limited means of determining differences who said "you have to learn the rules of the game. and then you have to play better than anyone else."