Please give correct answer ASAP,I'll upvote Which of the following assets and vulnerabilities should be dealt with first? a. An asset with a value of 60 and 2 vulnerabilities; Vulnerability 1 has a likelihood of 0.3 and vulnerability 2 has a likelihood of 0.6. The asset has a security control that mitigates 50% of the risk associated with vulnerability 1 but no controls for vulnerability 2. b. An asset with a value of 80 and 1 vulnerability with a likelihood of 1.0; A security control mitigates the risk by 25%. c. An asset with a value of 40 and 3 vulnerabilities; Vulnerability 1 has a likelihood of 0.8 of occurring, vulnerability 2 a likelihood of 0.4 and vulnerability 3 has a likelihood of 0.9. There is a control that mitigates the risk associated with vulnerability 3 by 50% d. An asset with a value of 90 and no vulnerabilities.

Answers

Answer 1

Option b should be dealt with first.

b. An asset with a value of 80 and 1 vulnerability with a likelihood of 1.0; A security control mitigates the risk by 25%

How to explain this

The asset has a value of 80 and a vulnerability with a likelihood of 1.0, meaning it's almost certain to be exploited. Even though there is a security control that mitigates the risk by 25%, 75% of the risk still remains, which is substantial given the high value of the asset.

Options a and c have assets with lower values and vulnerabilities with lower likelihoods, and option d has an asset with a higher value but no vulnerabilities. Addressing the asset in option b first will reduce the overall risk in the most effective way.

Read more about assets here:

https://brainly.com/question/27972503

#SPJ1


Related Questions

Do all careers or professions need computer science? Why or why not?

Answers

Answer:

Most careers or professions need computer science

Explanation:

As humanity is improving technological wise most jobs will be replaced and other jobs would come into play and in order for individuals to become employed in jobs that will be available in the future to come they will have to have a degree in computer science or know how to operate computers.

Answer:

No not all careers and professions require computer science

Explanation:

There are so many careers, many in which you may not sit in front of a computer. If you become a farmer, janitor, teacher or more you may not need computer science skills.

Language modeling incorporates rules of __. Select all that apply.

A. story structure

B. grammar

C. dictionary definitions

D. pronunciation patterns

Answers

Language modeling incorporates rules of grammar and pronunciation patterns

Language modeling  is simply known to use rules of grammar, known pronunciations, and other patternsIt seeks to know the given probability distribution of all linguistic units such as words, sentences.  is main work is to predict the next word that is to come in a document.It makes use of grammar principles and the various forms of pronunciation in its task.

Conclusively, we can say that Language modeling incorporates rules of grammar and pronunciation patterns

Learn more from

https://brainly.com/question/6214562

Yehonathan posts an article about web development each day using wordpress. he is _____.

Answers

You can host and create websites with the help of the content management system (CMS) WordPress. You may alter any website to meet your company, blog, portfolio, or online store thanks to WordPress's template system and plugin architecture.

Better than WordPress, is Squarespace?

Squarespace tops the list of these two platforms for usability, receiving a score of 4 out of 5 during our user testing. WordPress involves code, whereas you can quickly change your design. Due to the ease of adding features to your pages by dragging them there, Squarespace is now lot more user-friendly for beginners.

What distinguishes WordPress and Wix from one another?

Wix offers web hosting and is a website builder, whereas WordPress is an open-source CMS with more customization options. This is the fundamental distinction between the two.

To know more about wordpress visit;

https://brainly.com/question/29825393

#SPJ4

Argue whether we can infer anything about a candidate's ability to work in a professional environment based on his or her resume's formatting. Compare how you would address a resume with wacky fonts to how you would respond to grammatical errors in a resume.

Answers

Answer:

Candidates resume shows his way of presenting and organizing.

Explanation:

Resume formatting is an important part of a candidate's ability to work. In any professional environment, it's necessary to have a properly formatted resume.  The resume formatting should be up to date with the latest information and data. The formatting involves the borders, headings, grammar, and spelling or typo errors, etc.  But these mistakes can be easily avoided such as proofreading and removing unnecessary details and sloppy fronts.

Considering the existence of polluted air, deforestation, depleted fisheries, species extinction, poverty and global warming, do you believe that the Earth’s carrying capacity has already been reached?​

Answers

Answer:

The carrying capacity of an ecosystem, for example the Earth system, is the ability of an ecosystem to provide biological species for their existence; that is, the living environment is able to provide them with a habitat, sufficient food, water and other necessities for a longer period of time.

When the populations of different species living in an ecosystem increase, the pressure on the environment increases, partly due to intensive use. The population size decreases again when the population exceeds the carrying capacity, so that a natural equilibrium is maintained. This is due to a number of factors, depending on the species involved. Examples are insufficient space, sunlight and food.

Thus, given the current conditions of pollution, extinction of species and other environmental damage caused by humans on Earth, it can be said that we are about to exceed the limit of carrying capacity of the Earth, which would imply that this, through different natural forces, would seek to stabilize said overpopulation to return the environmental environment to a state of equilibrium.

What does this say in morse code?
-. . ...- . .-. / --. --- -. -. .- / --. .. ...- . / -.-- --- ..- / ..- .--.

Answers

Answer:

That it is time for lunch?

Explanation:

Answer:

Never gonna give you up

Explanation:

can't believe I fell for that

why is preserving the integrity of data, information, and systems an important cybersecurity goal?

Answers

Preserving the integrity of data, information, and systems is an important cybersecurity goal because it ensures that data, information, and systems are accurate, consistent, and reliable.

What is cybersecurity ?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Cybersecurity involves technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.

It also helps to protect data, information, and systems from unauthorized access, manipulation, and malicious attacks. Furthermore, preserving data, information, and systems integrity ensures that the data and information remain secure and accessible only to authorized users.

To learn more about cybersecurity
https://brainly.com/question/28004913
#SPJ4

the post office protocol (pop) provides support for multipurpose internet mail extensions (mime). question 14 options: true false

Answers

True: The post office protocol (pop) enables multifunctional internet mail extensions. The most often used message request protocol in the Internet world for moving messages from an e-mail server to an e-mail client is the post office protocol (POP). With POP3, the e-mail client asks the server for new messages, and the server "pops" all new messages to the client.

POP is a computer networking and Internet standard protocol that extracts and retrieves email from a distant mail server for access by the host system. POP is an application layer protocol in the OSI model that allows end users to get and send email. POP stands for Point of Presence Or Post Office Protocol. POP is a point at which several devices share a connection and communicate with one another. POP refers to high-speed communication equipment and systems. The Secure Post Office Protocol (POP3S) is an encrypted protocol that e-mail clients utilize to get messages from a distant server. The secure IMAP mail protocol is far more common these days, although the POP3S protocol is still in use.

Learn more about computer networking from here;

https://brainly.com/question/14276789

#SPJ4

What is the purpose of a web server? What is the purpose of a web browser?

Answers

Answer: the purpose of a web browser is to help answer and needed questions, and to get to sites.

Explanation:

What ipv4 address class has the ip address 221. 1. 2. 3?

Answers

The IPv4 address class of 221.1.2.3 is Class C. The IPv4 protocol uses address classes to define the size of the network portion of the address and the number of hosts that can be assigned to it.

The first octet of the IP address determines the address class. Class C addresses have their first three bits set to 110 and the fourth bit set to 0, which allows for 24 bits to be used to define the network portion of the address. This means that Class C networks can support up to 256 (2^8) hosts per network and are commonly used in small to medium-sized businesses.In computer networking, an IPv4 address is a unique identifier assigned to devices on a network using the Internet Protocol version 4. IPv4 addresses are 32-bit binary numbers that are typically represented in human-readable format as a series of four decimal numbers separated by periods. Each of these decimal numbers represents a byte of the binary number, with values ranging from 0 to 255. IPv4 addresses are divided into classes based on the range of values in the first byte, with Class A addresses having a range from 1 to 126, Class B addresses from 128 to 191, and Class C addresses from 192 to 223. The remaining address ranges are reserved for special purposes, such as multicast or private networks.

Find out more about ipv4 address class

brainly.com/question/10983284

#SPJ4

Use nested for-loops to have the turtle draw a snowflake of polygons. Use the variable turnamount to turn after each shape and the variable n for the sides of the polygon

Answers

An interlocking loop is referred to as nested loop . These are frequently utilized while working in two dimensions, such as when printing stars in rows and columns.

How do two for loops that are nested work?

An inner loop encloses the body of an outer loop, creating a nested loop. In order for this to operate, the inner loop must be triggered by the outer loop's initial pass in order to begin working. The inner loop is then reactivated during the second transit of the outer loop.

The for loop may be nested, right?

For loops that are nested are placed inside of one another. With each outer loop iteration, the inner loop is repeated.

To know more about nested for-loops visit :-

https://brainly.com/question/13971698

#SPJ4

What is the purpose of using a computer to do a simulation and what is a popular example of a computer simulation?

Answers

Answer:

To represent a real object,actions,situations or characteristics of another system.

An example is; a plane or car crush testing is done through simulating model that attempts to represent the real or Physical crrash

Explanation:

Simulation refers to virtual or computerised representation of a real object, actions, situations or characteristics of another system

Which of the following code snippets will select all tags on a page and give them a height of 200 pixels?

tag="img" {
height: 200px;
}
img {
height: 200px;
}
{
height: 200px;
}

Answers

The code snippet that will select all tags on a page and give them a height of 200 pixels is:

**img {

height: 200px;

}**

In CSS, the "img" selector targets all `<img>` tags in the HTML markup. By specifying the desired height of 200 pixels using the "height" property and the unit "px" (pixels), this snippet will apply the height styling to all image tags on the page.

The other two code snippets you provided are not valid CSS syntax. The first snippet ("tag="img" { height: 200px; }") is incorrect because the "tag" part is not a valid CSS selector. The second snippet ("{ height: 200px; }") is also invalid because it lacks a selector to specify which elements to target.

Lean more about CSS here :

https://brainly.com/question/14152823

#SPJ11

Select the correct answer.
Which example sets a constraint to validate user input?

Select the correct answer.Which example sets a constraint to validate user input?

Answers

Answer:

Address field should be less than 30 characters

Explanation:

Answer:email field accepts only numbers

Explanation:

What is the memory limitation with the 32-bit operating system?.

Answers

Answer:

4 gigs

Explanation:

briefly explain why it is important to define a dreamweaver site file.

Answers

It is critical to define an indesign web file since doing so allows you to transfer your computer's data to the cloud services server, change or modify files inside your site, and build linkages between Web pages.

What purpose does Dreamweaver serve?

Using the help of software that recognizes HTML, CSS, JavaScript, and other languages, you may create websites with Adobe Dreamweaver nearly everywhere. From amateurs to seasoned experts, Dreamweaver is helpful for a range of site designers.

What does the name Dreamweaver mean?

These developers used Lynch's 19 Dreams paper as a guide, and by 1997 they had succeeded in creating software that truly addressed all nineteen. They dubbed the editor Dreamweaver after being prompted more by list that had brought it about.

To know more about Dreamweaver visit:

https://brainly.com/question/30353793

#SPJ4

Write 4 sentences about who advances the computer evolution

Write 4 sentences about who advances the computer evolution

Answers

Answer: The first generation of computers took place from 1940 to 1956 and was extremely large in size.

The second generation (from 1956 to 1963) of computers managed to do away with vacuum tubes in lieu of transistors.

From 1964 to 1971 computers went through a significant change in terms of speed, courtesy of integrated circuits. Integrated circuits, or semiconductor chips, were large numbers of miniature transistors packed on silicon chips.

The changes with the greatest impact occurred in the years from 1971 to 2010. During this time technology developed to a point where manufacturers could place millions of transistors on a single circuit chip.

Explanation:

What naming scheme identifies the columns of a worksheet?

Answers

Answer:

It is name as ABC

Explanation:

A is for 1

B is for 2

C is for 3

What form of note taking would be MOST beneficial for a visual learner who needs to see the connections between ideas?


Think link


Formal outline


Time lines


Guided notes

Answers

Answer:

Think link

Explanation:

which of the following not an example of written communication?

Answers

A conversation between co-workers is not an example of written communication as it involves verbal communication. The correct option is D.

What is written communication?

The exchange of information or messages via written words is referred to as written communication. All spoken and written communications fall under this category.

Emails, memos, letters, reports, notes, social media posts, and text messages are all examples of written communication.

Because spoken words are involved, a conversation between coworkers would not qualify as a written communication example.

Thus, the correct option is D.

For more details regarding written communication, visit:

https://brainly.com/question/10664960

#SPJ9

Your question seems incomplete, the probable complete question is:

Which of the following is NOT an example of written communication?

Tweets

Blogs

Emails

A conversation between co-workers

codehs python 4.7.6 Powers of Two
it says I'm wrong because I need

codehs python 4.7.6 Powers of Two it says I'm wrong because I need
codehs python 4.7.6 Powers of Two it says I'm wrong because I need

Answers

\(\huge\fbox\orange{A} \huge\fbox\red{N}\huge\fbox\blue{S}\huge\fbox\green{W}\huge\fbox\gray{E}\huge\fbox\purple{R}\)

\(\huge\underline\mathtt\colorbox{cyan}{in attachment}\)

codehs python 4.7.6 Powers of Two it says I'm wrong because I need

Following are the program to calculate the power of two:

Program Explanation:

Defining an integer variable "i" that hold an integer value.Defining a for loop that checks "i" value in between 20, inside this it calculates power of two.At the last use print method to print its value.

Program:

i=1#holding integer value in i

for i in range(20):#defining a for that starts 1 to 20    

   i = 2 ** i#calculate power of 2 in i variable

   print(i)#print value

Output:

Please find the attached file.  

Learn more:

brainly.com/question/23170807

codehs python 4.7.6 Powers of Two it says I'm wrong because I need

CALCULATE THE MECHANICAL ADVANTAGE (MA).

DATA: F= 135 kg; b= 4*a; L=15 m

Answers

The mechanical advantage (MA) of the lever system in this scenario can be calculated by dividing the length of the longer arm by the length of the shorter arm, resulting in an MA of 4.

To calculate the mechanical advantage (MA) of the lever system, we need to compare the lengths of the two arms. Let's denote the length of the shorter arm as 'a' and the length of the longer arm as 'b'.

Given that the longer arm is four times the length of the shorter arm, we can express it as b = 4a

The mechanical advantage of a lever system is calculated by dividing the length of the longer arm by the length of the shorter arm: MA = b / a.

Now, substituting the value of b in terms of a, we have: MA = (4a) / a.

Simplifying further, we get: MA = 4.

Therefore, the mechanical advantage of this lever system is 4. This means that for every unit of effort applied to the shorter arm, the lever system can lift a load that is four times heavier on the longer arm.

For more such question on system

https://brainly.com/question/12947584

#SPJ8

The complete question may be like:

A lever system is used to lift a load with a weight of 135 kg. The lever consists of two arms, with the length of one arm being four times the length of the other arm. The distance between the fulcrum and the shorter arm is 15 meters.
What is the mechanical advantage (MA) of this lever system?

In this scenario, the mechanical advantage of the lever system can be calculated by comparing the lengths of the two arms. The longer arm (b) is four times the length of the shorter arm (a), and the distance between the fulcrum and the shorter arm is given as 15 meters. By applying the appropriate formula for lever systems, the mechanical advantage (MA) can be determined.


I’m building a pc name some good parts I need some help on some parts? And prices plz

Answers

Answer:$25

Explanation:

When working on a selection sort method, what are the things you need to remember about the three methods you need to code?
element in an array from a given element n to the end of the array.
First, you need a method that finds the position of the
Second, you need a method that
the contents of two elements in an array. Third, you need a method that uses the above two
methods to perform the sort.

When working on a selection sort method, what are the things you need to remember about the three methods

Answers

First, you need a method that finds the position of the smallest element in an array from a given element n to the end of the array. Second, you need a method that swaps the contents of two elements in an array. Third, you need a method that uses the above two methods to perform the sort.

What is the array  about?

When working on a selection sort method, you need to remember the following about the three methods you need to code:

The first method should be a method that finds the position of the smallest element in an array from a given element n to the end of the array. This method should iterate through the array starting from the given element n and compare each element to the current minimum value. If an element is smaller than the current minimum value, it should update the minimum value and its position.

The second method should be a method that swaps the contents of two elements in an array. This method should take in the array and the positions of the two elements to be swapped as inputs, and should use a temporary variable to store the value of one element before swapping the values of the two elements.

Learn more about array from

https://brainly.com/question/28061186
#SPJ1

What is true about Electronic Business Cards in Outlook 2016? Check all that apply.
They are a way to share contact information with other users.
You can choose what is included on the business card.
You can create multiple electronic business cards.
They can be shared only with users in the organization.
You cannot send electronic business cards by email.

Answers

Answer:

A. B. C.

Explanation:

They are a way to share contact information with other users and You can choose what is included on the business card.

What is Electronic business cards?

Information exchange in the modern era is done through digital business cards.

Digital business cards, also referred to as virtual or electronic cards, are more interactive, economical, and environmentally friendly than traditional cards.

The ability to distribute digital business cards with anybody, everywhere is a big advantage. You can design your own digital business cards with  on a computer, an iOS device, or an Android device.

Therefore, They are a way to share contact information with other users and You can choose what is included on the business card.

To learn more about Business card, refer to the link:

https://brainly.com/question/28850206

#SPJ2

Focusing on the career cluster "Arts, Audio/Video Technology & Communications", which of the following careers is NOT part of this cluster? (Choose all that apply.)

Landscaper
News Reporter
CEO
Actress
Graphic Design Artist
I will give brainliest to right answer

Answers

Answer:

Landscaper

CEO

Explanation:

Arts, Audio/Video Technology & Communications:

Careers including performing arts, acting, dance, visual arts such as animation and graphic design. Includes audio and video careers, such as news reporters, television technicians, and film editors.

33. import pandas as pd
import numpy as np
kvs = [10,11,12]
jtp = pd.Series (kvs)
print(itp)
#What will be output of prog?
A) 0 10
111
2 12
B) [10,11,12]
C)-1 10
2 11
3 12
D) Error

Answers

Answer:

dono entien

jsjdeExplanatio7n:

what is the set of protocols for transmitting data over the internet?

Answers

The set of protocols for transmitting data over the internet includes:

-TCP/IP (Transmission Control Protocol/Internet Protocol)

-HTTP (Hypertext Transfer Protocol)

-FTP (File Transfer Protocol)

-SMTP (Simple Mail Transfer Protocol)

-IMAP (Internet Message Access Protocol)

-POP3 (Post Office Protocol)

What is protocol?

Protocol is a set of rules that govern communications between different devices over a network. It is a standard of communication that defines the syntax, semantics, and synchronization of communication, and error detection and correction capabilities. Protocols allow devices to communicate regardless of the underlying hardware. Common protocols include TCP/IP, HTTP, FTP, SMTP, and SSH. They are designed to ensure that all devices are able to communicate with each other in a reliable and secure manner. Protocols also ensure that data is transferred efficiently and without any loss or corruption.

To learn more about protocol
https://brainly.com/question/17820678
#SPJ4

Given a set of 10 letters { I, D, S, A, # of 10 leters ( 1, CO, D, S, A, E, T, C, G, M, W }, answer the following:
a) With the given letters above, we can construct a binary search tree (based on alphabetical ordering) and the sequence < C, D, A, G, M, I, W, T, S, E > is obtained by post-order traversing this tree. Construct and draw such a tree. NO steps of construction required.

Answers

A binary search tree based on alphabetical ordering with post-order traversal can be constructed with the given letters. The following is the binary search tree:The sequence < C, D, A, G, M, I, W, T, S, E > is obtained by post-order traversing this tree.

The following is the post-order traversal of the binary search tree:< C, A, G, E, S, T, W, I, M, D >The post-order traversal can be obtained by visiting the left subtree, then the right subtree, and finally the root. Therefore, starting from the root of the binary search tree, we visit the left subtree and then the right subtree.

We continue this process until we reach the leaf nodes of the binary search tree. After we visit the left and right subtrees of the binary search tree, we visit the root of the binary search tree. This process continues until all the nodes of the binary search tree have been visited.The construction steps for the binary search tree have not been asked, therefore they are not given.

To know more about alphabetical visit:

https://brainly.com/question/30928341

#SPJ11

Write an LC-3 assembly language program that divides a positive number X by another positive number Y. The program stores the integer part of the result in R3, i.e., R3 = int (X/Y), and the reminder in R4, i.e., R4=X%Y. Your code should use an iterative construct. The value of X should be stored in 0x3100 and the value of Y should be stored in 0x3101. Also, let X = 0x005A and Y = 0x0007 when running the simulation to validate the program's function. Your program should start at 0x3000.

Answers

The LC-3 assembly language program for dividing a positive number X by another positive number Y and storing the integer part of the result in R3 and the remainder in R4 is given below:ORIG x3000LD R1, DIV ;Load DIV function's address in R1LD R0, X ;Load X's value in R0LD R2, Y ;Load Y's value in R2 ;

Reset R3 and R4 with zerosLEA R3, ZEROLEA R4, ZEROLOOP ADD R4, R4, R2 ;Add Y to R4ADD R3, R3, #1 ;Increment R3BRp LOOP ;Continue until R4 is positiveBRzp DONE ;Skip if R4 is zeroNOT R4, R4 ;R4 = -R4ADD R3, R3, #-1 ;Decrement R3BRnzp LOOP ;Continue until R4 is zeroDONE ST R3, INT_RESULT ;Store the integer part of the result in R3ST R4, REM_RESULT ;Store the remainder in R4HALT ;Stop the programDIV ADD R5, R5, #-1 ;Decrement quotient counterBRn DONE ;Finish if counter is zeroADD R4, R4, R2 ;Add divisor to remainderADD R5, R5, R5 ;Shift quotient left by 1BRp DIV ;Continue if remainder is positive;When done, quotient is in R5, remainder is in R4;Address of variablesLD R1, X ;Load X's address in R1LD R2, Y ;Load Y's address in R2 ;Zero-value registerLEA R0, ZERO ;Load ZERO in R0LD R3, ZERO ;Load ZERO in R3LD R4, ZERO ;Load ZERO in R4 ;Address of resultsLEA R3, INT_RESULT ;Load the address of R3 in R3LEA R4, REM_RESULT ;Load the address of R4 in R4 ;Initial values for X and YLD R0, 0 ;X = 0LD R1, x005A ;X = 0x005ALD R2, x0007 ;Y = 0x0007 ;Address of programORIG x3000 ;Start the program here;Address of the resultsINT_RESULT .FILL x0000 ;The integer part of the resultREM_RESULT .FILL x0000 ;The remainder of the result;Address of helper dataZERO .FILL x0000 ;

To know more about language visit:

https://brainly.com/question/30914930

#SPJ11

Other Questions
I need help, I dont know how to convert ratios into decimals and percentages [EX: write the ratio 5 to 8 in a decimal/percent] Ammonium perchlorate (NH4CIO4) is a powerful solid rocket fuel, used in the Space Shuttle boosters. It decomposes into nitrogen (N) gas, chlorine (C1) gas, oxygen (O) gas and water vapor, releasing a great deal of energy. Calculate the moles of water produced by the reaction of 0.065 mol of ammonium perchlorate. Be sure your answer has a unit symbol, if necessary, and round it to 2 significant digits.10100 0.0X S?FEEDolo84 what is the best title of this poem ??I have amazed enough wealth, but not bestowed with good health.I have fine body and healthy mind ,permanent weakness with diseases of all kinds.I try to look reasonable as far as possible,something forces me, not to be accessible.Possible so much wealth stops me to be free?Like so many heavy fruits laden on tree. Read the passage.Misty sat down at the table and grabbed her sisters soda without asking. Today she was in no mood to wait in the lunch line. Her sister raised her eyebrows and looked at her strangely, but didnt say anything. Misty secretly wished someone would ask her what was wrong.Which point of view is used in the passage?limited third-personfirst-personthird-person omniscient The recipe calls for 3 cups of ketchup for every 1/2 cups of mustard. What is the rate in cups of ketchup per mustard B= { x/x even numbers less than 5} Here is a write up of an experiment on heat transfer. The independent variable in this experiment is the _________ of the container. What one word completes the sentence?. Explain the doppler effect in terms of frequency, wavelength, and speed. Which situation can be represented by this inequality? 120 12 k + 29 what were the various push-pull factors that caused English and french settlers to move to north america? Can you please help me Public opinion on dr. laumann's research on aids and sexual behavior resulted in __________. A +6.33 uC charge q1 is attracted by a force of 0.115 N to a second charge q2 that is 1.44 m away. What is the value of q2? 1. Which word group is a sentence fragment?A. Field biologists often conduct research in faraway locations.B. For months at a time.C. Researchers in India are studying the social structures of macaque monkeys. HELP ME OUT PLS!!!! The radius of a sphere is 7 cm. What is the sphere's volume? Round to the nearest tenth, and use 3.14 for pi. O 723,2 cm O 1868.2 cm O 1436,0 cm O 2052,5 cm Can you please write a poem about madam C.J Walker a Haiku or free verse one it doesnt matter Tin, Sn, is a soft white metal. It has a low melting point compared with other metals. Tin is widely used as a coating for cans of food. Which statement accurately describes atoms of tin? the police man said i caught a thief this morning into indirect speech Question 2 of 10Which of the following best describes the slope of the line below?A. NegativeOB. ZeroC. Undefinedo D. Positive The purpose of an egg yolk is to A. feed the growing embryo. B. keep the embryo wet. C. protect the growing embryo. D. grow into a second embryo.