during a review of an outsourced network operations center (noc), an is auditor concludes that procedures to monitor remote network administration activities by the outsourced agency are inadequate. during the management discussion, the chief information officer (cio) justifies this issue as a help desk activity, covered by help desk procedures, and points out that intrusion detection system (ids) logs are activated and firewall rules are monitored. what is the best course of action for the is auditor to take?

Answers

Answer 1

The best course of action which is suitable for the is auditor to take is to Document the identified finding in the audit report.

Who is auditor?The client who is the subject of the audit engages an objective party termed as an external auditor or statutory auditor to render an opinion on whether the company's financial statements are free from material misstatements, including those brought on by fraud or error. For publicly traded firms, external auditors may also be required to render a judgment on the effectiveness of internal controls over financial reporting. External auditors may also perform other predetermined tasks that are linked to or unrelated to financial reporting. Most importantly, despite being employed and paid by the company they audit, external auditors should be regarded as objective.

To learn more about auditor refer to:

https://brainly.com/question/26048609

#SPJ4


Related Questions

which of the following is an html-supported kind of path?

Answers

An html-supported kind of path is D.Both A and B (absolute, and relative).

What is HTML, and what purposes does it serve?

The language used to describe the organization of Web pages is called HTML. Authors can publish online documents containing headings, text, tables, lists, images, etc. thanks to HTML. Click a button to quickly access internet content using hypertext links.

The set of markup symbols or codes entered into a file intended for display on the Internet is known as HyperText Markup Language (HTML). The markup instructs web browsers on how to display the text and pictures on a web page.

Learn more about html at;

https://brainly.com/question/17959015

#SPJ1

complete question;

which of the following is an html-supported kind of path?

A.absolute

B.relative

C.interpreted

D.Both A and B

An office building has two floors. A computer program is used to control an elevator that travels between the two floors. Physical sensors are used to set the following Boolean variables.
The elevator moves when the door is closed and the elevator is called to the floor that it is not currently on.
Which of the following Boolean expressions can be used in a selection statement to cause the elevator to move?

answer choices
(onFloor1 AND callTo2) AND (onFloor2 AND callTo1)
(onFloor1 AND callTo2) OR (onFloor2 AND callTo1)
(onFloor1 OR callTo2) AND (onFloor2 OR callTo1)
(onFloor1 OR callTo2) OR (onFloor2 OR callTo1)

Answers

The following Boolean expressions, "onFloor1 AND callTo2" or "onFloor2 AND callTo1," can be used in a selection statement to move the elevator.

The commands to move the lift may be simply determined based on the other commands designed to be provided and received by the lift, which indicate what operation it is engaged in.

When the elevator is on the first floor and has to be taken to the second floor, the order "onFloor1 AND callTo2" can be used. The order "onFloor2 AND callTo1" would serve as the reverse of the previously given instruction and cause the lift to operate in the exact opposite manner.

To know more about elevator visit:-

https://brainly.com/question/2168570

#SPJ4

PLEASEEE HELP HURRY

PLEASEEE HELP HURRY

Answers

To start searching for a scholarly article on G. o. ogle Scholar, you should:

"Type the title of the article or keywords associated with it." (Option A)

What is the rationale for the above response?

Here are the steps you can follow:

Go to Go. o. gle Scholar website In the search box, type the title of the article or relevant keywords associated with it.Click the "Search" button.Browse through the search results to find the article you are looking for.Click on the title of the article to view the abstract and other details.If the article is available for free, you can download or access it directly from the search results page. If not, you may need to purchase or access it through a library or other academic institution.

Note that you can also use advanced search options and filters available on Go. ogle Scholar to narrow down your search results based on various criteria, such as publication date, author, and journal.

Learn more about G. o. ogle at:

https://brainly.com/question/28727776

#SPJ1

What is the main responsibility of the executive?

Answers

The President picks the leaders of all government agencies, including the Cabinet, in order to carry out and enforce the laws passed by Congress. The Vice President is also part of the Executive Branch.

What are the executive's primary duties? The President picks the leaders of all government agencies, including the Cabinet, in order to carry out and enforce the laws passed by Congress.The Vice President is a member of the Executive Branch and is prepared to take over as President if necessary.An executive manages operational activities for their company or organization and is typically in charge of developing policies and strategies to achieve organizational objectives.Executives frequently travel to conferences, meetings, and local, regional, national, and worldwide offices.Traveling executives frequently visit regional, local, national, and worldwide workplaces in addition to attending meetings and conferences.The executive branch is headed by the president, whose constitutional duties include acting as head of state, commander in chief of the armed forces, treaty negotiator, federal judge (including members of the Supreme Court), ambassador, and cabinet official.

To learn more about  executive branch refer

https://brainly.com/question/20658746

#SPJ4

Which technical skill is most necessary for careers with network systems?

A.
website design
B.
programming languages
C.
information technology security
D.
graphics-related software

Answers

Answer:

programming languages

Answer:

B. programming languages

Explanation:

The most necessary technical skill for network systems careers is programming languages (B). Programming languages are vital for developing, maintaining, and troubleshooting network infrastructure, protocols, and applications. Proficiency in programming enables automation, scripting for network configuration, and customized software solutions. While other skills like website design, IT security, and graphics software may have some relevance, programming languages are fundamental for effective network management.

Jennie's folder windows look a little different than the folder windows on her brother's laptop. Why might this be? A. Jennie's brother doesn't have his folder windows turned on. B. The address bar is turned off on one of the computers. C. The folder window viewing options are set differently on the two computers. D. Jennie and her brother don't share files.

Answers

Answer:

C

Explanation:

A is just contradictory to the question, it says they look different but A says its because his folder window isn't on which is unrelated.

The address bar being off doesn't make a big difference like one of the other options

This must be correct as its the most major difference as in the different viewing types the folder windows look significant different and are layed out differently

Them not sharing files is irrelevant to the question

The answer is C

when grouping data in a query, how do you restrict the output to only those groups satisfying some condition?

Answers

By using the HAVING clause, you can restrict the output to only those groups that satisfy a specific condition, allowing you to further refine your results.

Now, To restrict the output to only those groups satisfying some condition when grouping data in a query, you can use the HAVING clause along with the GROUP BY clause.

The GROUP BY clause is used to group the data based on one or more columns in the table, and the HAVING clause is used to filter those groups based on a specific condition.

Here's an example query:

SELECT column1, SUM(column2)

FROM table1

GROUP BY column1

HAVING SUM(column2) > 100

In this query, we are grouping the data by column1 and then using the SUM function to calculate the total value of column2 for each group.

The HAVING clause then filters the groups and only selects those with a total value of column2 greater than 100.

By using the HAVING clause, you can restrict the output to only those groups that satisfy a specific condition, allowing you to further refine your results.

Learn more on standard deviation here:

https://brainly.com/question/475676

#SPJ4

______ creates a unique and fixed-length signature for a set of data. It involves converting a numerical input into another compressed numerical output.

Answers

Answer: Hashing

Explanation:

Hashing creates a unique and fixed length signature. Once hashing is performed, it is not possible to reverse the message. Hashing is used with authentication. This ensures that the given message cannot be modified.

is a term used to describe how one control loop controls or overrides the instructions of another control loop in order to achieve a desired set point.

Answers

Cascade control is a term used to describe how one control loop controls or overrides the instructions of another control loop in order to achieve a desired set point.

What is a control loop?

For industrial control systems, a control loop serves as the basic building block. It has all the physical parts and control mechanisms required to automatically change a measured process variable's (PV) value to match a desired set-point value (SP). It includes the process sensor, controller function, and final control element (FCE) that are all necessary for automatic control.

The basic building block of industrial control systems is a control loop. It is made up of all the physical parts and control mechanisms required to automatically change the value of a measured process variable (PV) until it is equal to the value of a desired set-point (SP). It contains the process sensor, controller functionality, and final control element (FCE), all of which are necessary for automatic control.

Learn more about control loop

https://brainly.com/question/7423735

#SPJ4

(Will give Brainliest.) Very important. Summarize the entire episode of "Escape from Cluster Prime" from the Nickelodeon TV show: "My Life as a Teenage Robot.". Must be at least 4 sentences or more.

Answers

A summary of the episode should explain that the queen of a certain robot community invited a robot named Jenny to her part of the world. While Jenny was happy to be there, this queen had an ulterior motive.

What is a summary of the episode?

The episode tells of a queen named Vexus who invited Jenny, a robot to her part of the world known as Cluster Prime. Jenny was very happy to be there but unknown to her, the wicked queen wanted to use her to strengthen a bad weapon.

When Jenny learned of this, she fought the Queen off and successfully retired to her homeland. So, Jenny won the battle against evil.

Learn more about robots here:

https://brainly.com/question/13515748

#SPJ1

remove the last element, then add a 2 to the end of the array.

Answers

Removing the last element and adding 2 to the end of an array can be done using various programming languages. However, regardless of the programming language, the basic procedure to remove the last element of an array is to identify the last element using its index and then delete it.

Here is how you can remove the last element and add 2 to the end of the array in Python using some example code: ``` python #creating an array arr = [1, 2, 3, 4, 5] #removing the last element del arr[-1] #adding 2 to the end of the array arr.append(2) #printing the updated array print(arr) ```The output of the above code will be: `[1, 2, 3, 4, 2]`This code first creates an array `arr` and initializes it with values 1, 2, 3, 4, and 5.

Then, the last element of the array is removed using the `del` statement and the `arr[-1]` expression. Finally, the number 2 is added to the end of the array using the `append()` method.

To know more about Removing visit:

https://brainly.com/question/27125411

#SPJ11

A(n) ____________ is a licensed person who leads a team in the planning and design of a building or house.

Answers

Question: A(n) ____________ is a licensed person who leads a team in the planning and design of a building or house.

Answer: Architect

an attack has been detected in your network system by one of the network engineers. analyzing the attack, you come to know that the system was accessed through one of the switches where the hacker fed his own vlan traffic into the port and accessed the network. what kind of an attack have has been experienced in this scenario?

Answers

The kind of attack that has been experienced in this scenario is called switch spoofing.

What is switch spoofing?
Switch
spoofing occurs when an attacker attempts to negotiate a trunk with a switch by sending Cisco's Dynamic Trunking Protocol (DTP) packets. The dynamic auto or dynamic desirable default switch modes are the only ones that make it possible. When a trunk is attached to the computer, the attacker has access to every VLAN.

By connecting a malicious switch to an interface set up in "dynamic desirable," "dynamic auto," or "trunk" modes, Switch Spoofing can also be accomplished. The attacker can obtain traffic from every VLAN once the trunk link has been established. Now that the VLANs are all open, the attacker can sniff their traffic.

To learn more about switch spoofing, use the link given
https://brainly.com/question/14725094
#SPJ1

Ưu nhược điểm của cuộn cảm

Answers

Answer:

yvhchfjfhvjvbjbhkhihihigivjbib

What is the Array.prototype.indexOf( searchElement, fromIndex ) syntax used in JavaScript?

Answers

The Array.prototype.indexOf(searchElement, fromIndex) is a JavaScript method used to find the position of a specific element within an array.

Understanding Array.prototype.indexOf

The Array.prototype.indexOf( searchElement, fromIndex ) syntax is a built-in JavaScript function that allows you to search for a specific element in an array and return the index at which it is found.

The searchElement parameter specifies the element that you want to find in the array. The fromIndex parameter is optional and specifies the starting index from which the search should begin. If not specified, the search starts from index 0.

The function returns the index of the first occurrence of the searchElement in the array, or -1 if it is not found. It is important to note that this function uses strict equality (===) to compare the searchElement with each element in the array.

This method is useful when you need to check if a certain value exists in an array or to find the first occurrence of a specific value in the array. It is commonly used in combination with other array methods to manipulate and extract data from arrays in JavaScript.

Learn more about JavaScript at

https://brainly.com/question/30529587

#SPJ11

Consider the following scenario. As you troubleshoot the problem, what motherboard device would be the first to check? A user reports that his computer fails the POST upon startup. ROM CMOS RAM Power supply Processor

Answers

Answer:

The correct answer Power Supply

Explanation:

Which of the following is the best definition of the
word aptitude?
personal interest
potential skill level

success factor
actual skill level

Answers

Answer: For the definition of aptitude the answer is B-potential skill level . For the definition of ability the answer is D -actual skill level

Explanation: I did the assessment:)!

The best definition of the word aptitude will be actual skill level. Then the correct option is D.

What do you mean by the word aptitude?

A component of the ability to perform a certain sort of task at a specific level is aptitude. Exceptional aptitude may be deemed to possess the skill. The capacity to carry out particular tasks, whether physical or cerebral but rather whether developed or underdeveloped, is referred to as aptitude. When compared to talents and abilities, which are acquired via training, the ability is frequently contrasted.

Both capability and IQ are terms that refer to a person's mental capacity. Unlike the basic concept of intelligence (IQ), aptitude frequently refers to any of a variety of diverse traits that can exist independently of one another, such as the ability for programming language, military flying, or air traffic control.

The term "aptitude" is best defined as real skill level. Then the correct option is D.

More about the word aptitude link is given below.

https://brainly.com/question/20372641

#SPJ2

you have hired ten new temporary employees to be with the company for three months.how can you make sure that these users can only log on during regular business hours?answerconfigure day/time restrictions in user accountsconfigure account expiration in user accountsconfigure account policies in group policyconfigure account lockout in group policy

Answers

To ensure that the ten new temporary employees can only log on during regular business hours, you should configure day/time restrictions in user accounts. This will allow you to set specific time frames during which the employees will have access to the system, thus restricting their logon hours to regular business hours.

To ensure that your new temporary employees can only log on during regular business hours, you can use a few different methods. Here are a few options:
1. Configure day/time restrictions in user accounts: You can set up specific days and times during which the user account is allowed to log on. This can be done by going to the user account properties in Active Directory, selecting the "Logon Hours" tab, and specifying the allowed logon times. This will prevent the user from logging on outside of these hours.
2. Configure account expiration in user accounts: Another option is to set an expiration date on the user account. This can be done in the same location as the logon hours settings. By setting an expiration date that falls before the end of the three-month period, you can ensure that the user account is no longer valid after the end of their temporary employment.
3. Configure account policies in group policy: You can also use group policy to configure account policies that limit logon hours. This can be done by going to the "Account Policies" section of group policy and selecting "Logon Hours." Here, you can specify the days and times during which users are allowed to log on.
4. Configure account lockout in group policy: Finally, you can configure account lockout settings in group policy to prevent users from repeatedly attempting to log on outside of allowed hours. This can be done by going to the "Account Lockout Policy" section of group policy and specifying the number of failed logon attempts that will result in the account being locked out.

To know more about employees visit :-

https://brainly.com/question/21847040

#SPJ11

I am getting two expected errors on this code for the bottom two “public static void” lines. Can someone tell me how I can fix it? Thanks

I am getting two expected errors on this code for the bottom two public static void lines. Can someone

Answers

Answer:

Declare variable b in both lines

i.e. int b

Explanation:

In the given code, the parameters of both functions were not properly declared.

When listing the parameters, the data type must be clearly stated for all parameters (individually)

In the declaration of both functions, only variable a is declared as integer while b is undeclared.

So, the correction is to declare b as integer

The area that we can see just after windows is started is subject​

Answers

Answer:

The area that we can see just after windows is started is desktop or working area.


Jamie is constructing his first robot. Help him choose a microcontroller from the list.

A.
chip only
B.
chip with starter board
C.
chip with starter board and add-ons
D.
starter board
E.
breadboard

Robotics

Answers

C,chip with starter board and addonsa
Answer c

Explanation

Python String Functions: Create a new Python Program called StringPractice. Prompt the user to input their name, then complete the following:
Length
• Print: “The length of your name is: [insert length here]”
Equals
• Test to see if the user typed in your name. If so, print an appropriate message

Really appreciate the help.

Answers

#Swap this value by your name. Mine is Hamza :)

my_name = "Hamza"

#Get input from user.

inp = input("What's your name?: ")

#Print the length of his/her name.

print("The length of your name is",len(inp),"characters.")

#Check if the input matches with my name?

#Using lower() method due to the case insensitive. Much important!!

if(inp.lower()==my_name.lower()):

   print("My name is",my_name,"too! Nice to meet you then.")

Lc-3
Your task is to write a program in binary LC-3 machine language. Your program will compute the sum of positive numbers among a set of ten numbers represented in 2's complement format and will store the result in register R5. Your program will begin at memory location x3100. The ten 16-bit binary numbers to analyze will be stored in memory starting from address x3132.
Suggested Algorithm/Decomposition
If you're not sure how to get started with this lab assignment, we've provided a simple systematic decomposition that you can build on to develop your algorithm and your program. You are not required to use this decomposition; we provide it only as a reference to get you started. Note that we use generic action terms here like "load" and "compare" – these are an important part of the algorithm, but it is up to you to figure out how to accomplish these actions.
Basic Algorithm
1.Initialize Registers
A. Initialize a register, say R3, to be used as a pointer to point to the location of the numbers in memory that are being analyzed, starting from address x3132.
B. Initialize a register, say R4, to the value 10. This will be used as a counter.
C. Initialize Register 5 to 0, this will be your final sum.
2. Set up your loop
A.Load in from memory (using R3 to tell you where) one of the ten binary numbers.
B. Check if the loaded number is positive.
C. If the number is positive, add it to the value stored in R5.
D. If the new number is negative, ignore it.
E. Increment pointer and decrement counter.
F. Repeat steps 2.a - 2.c until all 10 numbers have been examined.
3. Halt the program.

Answers

The suggested algorithm involves initializing registers R3, R4, and R5, setting up a loop to load numbers from memory, check if they are positive, and add them to the sum stored in R5, and halting the program once all numbers have been examined.

What is the suggested algorithm for writing a program in binary LC-3 machine language ?

To write a program in binary LC-3 machine language that computes the sum of positive numbers among a set of ten numbers represented in 2's complement format and stores the result in register R5, you can follow the suggested algorithm below:

Initialize Registers:
Initialize register R3 to point to the location x3132 where the numbers are stored in memory.
Initialize register R4 to the value 10 to be used as a counter.
Initialize register R5 to 0 for the final sum.
Set up your loop:
Load a number from memory using R3 as a pointer.
  Check if the loaded number is positive.
If the number is positive, add it to the value stored in R5.
If the number is negative, ignore it.
Increment pointer (R3) and decrement counter (R4).
Repeat steps 2.A to 2.E until all 10 numbers have been examined.
Halt the program.

By following this algorithm, you will create a program in binary LC-3 machine language that computes the sum of positive numbers among the given set of numbers and stores the result in register R5.

Learn more about suggested algorithm

brainly.com/question/14882500

#SPJ11

seven characteristics of non-impact printers​

Answers

Answer:

*It prints faster than the impact printer and takes less time.

*They do not physically touch; you need the help of ink or other substances to print and without physically feel to print.

*Good quality printable material printing.

*They are quieter than impact printers while printing.

*Prints a page in minimal time.

*It also prints a graphic image precisely as it is.

*They need less maintenance or repairs than impact printers.

Explanation:

sana maka tulong

What is DCID 6/3, and why would you use DCID 6/3 as opposed to DIACAP for certification and accreditation of a system

Answers

DCID 6/3 (Director of Central Intelligence Directive 6/3) is a security manual used in the U.S. government to guide the certification and accreditation process for intelligence systems.

DCID 6/3 is an older standard than DIACAP, which is now being phased out in favor of the new Risk Management Framework (RMF). DCID 6/3 was designed for sensitive compartmented information systems (SCIs) used by the intelligence community. DCID 6/3 and its predecessor DCID 1/16 are focused more on security requirements and less on the documentation and assessment process. DCID 6/3 covers a wider range of controls than DIACAP. DCID 6/3 is used for the certification and accreditation of intelligence systems in the U.S. government. It is more focused on security requirements than DIACAP and covers a wider range of controls. However, DCID 6/3 is an older standard and is being phased out in favor of the new Risk Management Framework (RMF).

To learn more about intelligence systems, visit:

https://brainly.com/question/13263818

#SPJ11

Femke went to a computer lab and connected her laptop to the WiFi network. She later received an email from the lab administrator warning that the WiFi network was in fact a rogue access point.
Which of the following could have occurred while she was connected to the rogue access point?

Answers

Femke may have experienced several consequences while connected to the rogue access point.

Could Femke have encountered any issues while connected to the rogue access point?

When Femke connected her laptop to the rogue access point in the computer lab, she exposed herself to potential security risks. Rogue access points are unauthorized and can be set up by malicious actors to deceive users into connecting to them. Once connected, the attacker can intercept network traffic, steal sensitive information, and even launch various attacks on the connected devices.

The dangers of rogue access points, which can lead to unauthorized access and compromise the security of users and their devices. Attackers can eavesdrop on communications, perform man-in-the-middle attacks, and distribute malware. It is crucial to be vigilant when connecting to Wi-Fi networks and ensure they are authorized and secure.

Learn more about access point

brainly.com/question/29346507

#SPJ11

Write down the situations in which you think primary key will be helpful?

Answers

Answer:

The SQL PRIMARY KEY is a column in a table that must contain a unique value that can be used to identify each and every row of a table uniquely. Functionally, it is the same as the UNIQUE constraint, except that only one PRIMARY KEY can be defined for a given table.

In one word, what is the most difficult aspect of the climate
system to model?

Answers

Uncertainty is the most difficult aspect of the climate system to model

Challenges of modelling climate system

The most difficult aspect of the climate system to model is the inherent uncertainty associated with the complex interactions and feedback mechanisms within the system.

Climate is influenced by numerous factors, including atmospheric composition, ocean currents, land surface processes, solar radiation, and human activities. These factors interact in intricate ways, leading to non-linear responses and amplifying or dampening effects.

Climate models attempt to simulate these interactions by representing the physical, chemical, and biological processes that drive climate dynamics. However, due to the inherent complexity of the system, there are limitations and uncertainties in our understanding of these processes, as well as in the data used to initialize and validate the models.

Learn more about Climate models at

https://brainly.com/question/29680511

#SPJ1

What is the problem with my python code?

What is the problem with my python code?

Answers

Girl I don’t know figure it out

import math

class TripleAndHalve:

   def __init__(self, number):

       self.__number = number

   def triple(self):

       return self.__number * 3

   def halve(self):

       return self.__number / 2

   def print_number(self):

       return self.__number

t1 = TripleAndHalve(4)

print(t1.triple())

print(t1.halve())

print(t1.print_number())

What is not a way to lower your risk of drowsy driving?

Answers

Answer:

Taking a night time medicince (such as benedryl), or drinking alcohol beofre drviving.

Explanation:

Brainliest please :)

Other Questions
When I hear the phrase hip hop, I instantly think of...Please complete the sentence. What material property does the Charpy test determine? (a) Yield strength (b) Fracture strength (c) Young's modulus (d) Toughness (e) Ductility The question is in the picture I know it's solved but I'm not sure how to solve it One molecule of glucose can release a total of _____ molecules of atp during its breakdown. 7 , 1 , 5 , 3 , multiple choice quiz is on apex Select all the true statements about the graph of this quadratic equation.y = 2(x+3) -5please helpp The radiographer's radiation monitor report must include which of the following information?1. Lifetime dose equivalent2. Quarterly dose equivalent3. Inception dateA. 1 onlyB. 1 and 2 onlyC. 2 and 3 onlyD. 1, 2, and 3 If anyone solves this question, I'll give 10pts.THE QUESTION:-Which no. is equivalent to3/3 ?OPTIONS:-A. 2B. 9C. 81D. 728 solve the inequality. Express your answer using set notation and interval notation. graph the solution set.-3(+2) can someone please help me with these questions Which of the following types of specialized cells are only found in plants? A:Phloem B:Glandular C: Muscle D: Nerve What is the political philosophy that focuses on elevating ones' countries above others and developing theirculture above the needs of other groups?Libertariancivil rightspatriotismO nationalism help pls !!! how many days would it take for a tiger to eat a boar When you use acidic phenol for RNA extraction, what happens? Select All that apply.A. RNA and DNA precipitateB. Proteins precipitateC. DNA becomes positively charged what statement about the elongation of the lagging strand is correct?A. it only occurs in prokaryotesB. it requires multiple RNA primers to completely replicateC. It is synthesized in the 3'-5' directionD. it requires one RNA primer to completely replicateE. in synthesized continously hey so what 3x/3 = ? if your really smart u should all know . in division from at the acquisition date, july 2, 20x1, reporting unit r has a fair value of $370,000 and a carrying amount (including goodwill of $100,000) of $470,000. on december 31, 20x1, the fair value of the assets and liabilities assigned to reporting unit r is $330,000, and the fair value of r is $400,000. the goodwill impairment loss reportable is: is a decoupled canonical form displaying the n distinct system poles on the diagonal of the state variable representation A matrix. 1 A single-loop control system with the closed-loop transfer function of the system is Y(s) T(s) = 25 +8s +6 +165 + U(s) The state differential equation is and the output is Then, abe 1 2 points 2 points +:+ b 3(0)16 8 What did you consider when you were writing youranswer? Check all that apply.what others said about SteveO how others acted toward Stevewhat Steve saidhow Steve acted Help me ASAP please Im being timed