Which is NOT a concern when using cloud solutions for EHR? a. Ownership of EHR (who owns the patient data) b. Loss of network blocks access to EHR c. Privacy concerns d. Backup Strategy

Answers

Answer 1

The option that is NOT a concern when using cloud solutions for EHR is d. Backup Strategy.

What is EHR?

A digital version of a patient's paper chart is referred to as an Electronic Health Record (EHR). The medical history, diagnosis, prescriptions, treatment plans, vaccination dates, allergies, radiological pictures, and laboratory and test results are all included. EHRs are frequently designed to exchange patient health information with other healthcare providers, such as laboratories and specialists so that patients can receive better-coordinated care.

EHRs also provide a number of tools to assist healthcare practitioners in managing patient care, such as computerized physician order entry (CPOE) systems, which allow clinicians to enter prescription orders or other instructions directly into a patient's EHR.

Why are cloud solutions used for EHR?

Cloud solutions are used to provide EHRs with improved accessibility, usability, and management. Healthcare providers can use cloud EHR solutions to manage patient data without having to worry about maintaining servers, storage systems, and software upgrades in-house. Cloud EHR solutions can also reduce IT costs while also increasing the speed of access to patient data from different locations by different healthcare providers.

Thus, the option that is NOT a concern when using cloud solutions is d. Backup Strategy.

Learn more about EHR:

https://brainly.com/question/24191949

#SPJ11


Related Questions

when you build a relational database for an organization, what is a good starting point for identifying required user views? quizlt

Answers

collecting the organization's forms and reports indicates the  good starting point for identifying required user views,when building a relational database for an organization.

The process of designing databases is governed by a few principles. The first rule is that redundant data, sometimes referred to as duplicate data, should never be used because it wastes space and raises the possibility of mistakes and inconsistencies. The completeness and accuracy of the information are crucial, according to the second tenet. Any reports that draw data from your database will do so with inaccurate data if your database itself has any.

Hence, a good database design should:

Use subject-based tables to organize your data and cut down on duplication.

furnishes Access with the data it needs to link the data in the tables as necessary.

ensures the accuracy and integrity of your information while supporting it.

satisfies your reporting and data processing requirements.

learn more about  relational database here:

https://brainly.com/question/13262352

#SPJ1

How many bits do we have in the MAC address of an Ethernet card?

Answers

Answer: It is 6 bytes (48 bits) long

Detailed Explanation:

In a LAN, each node is assigned a physical address, also known as a MAC/Ethernet address. This address is unique to each of the nodes on the LAN and is 6 bytes (48 bits) long, which is burned on the Ethernet card (also known as the network interface card)

In the Python file, write a program to access the contents of the bucket coderbytechallengesandbox. In there there might be multiple files, but your program should find the file with the prefix __cb__, and then output the contents of that file. You should use the boto3 module to solve this challenge.

You do not need any access keys to access the bucket because it is public. This post might help you with how to access the bucket.

Example Output

contents of some file

Example Output with ChallengeToken

con_ent_ of_som_ fi_ep9_nzf_j1b_

Answers

The program to access the contents of the bucket coderbytechallengesandbox. In there there might be multiple files is explained below.

To access the contents of the bucket coderbytechallengesandbox and find the file with the prefix cb, you can use the following Python program using the boto3 module:

import boto3

s3 = boto3.resource('s3')

bucket_name = 'coderbytechallengesandbox'

prefix = '__cb__'

bucket = s3.Bucket(bucket_name)

# find the object with the specified prefix

for obj in bucket.objects.filter(Prefix=prefix):

   # get the contents of the object

   obj_content = obj.get()['Body'].read(). decode('utf-8')

   print(obj_content)

If a ChallengeToken is provided in the file, the output will be modified by replacing every 3rd, 6th and 9th character with an underscore, the program will be as:

import boto3

s3 = boto3.resource('s3')

bucket_name = 'coderbytechallengesandbox'

prefix = '__cb__'

challenge_token = 'ep9_nzf_j1b_'

bucket = s3.Bucket(bucket_name)

# find the object with the specified prefix

for obj in bucket.objects.filter(Prefix=prefix):

   # get the contents of the object

   obj_content = obj.get()['Body'].read(). decode('utf-8')

   if challenge_token:

       # modify the output with the ChallengeToken

       obj_content = ''.join('_' if (i+1) % 3 == 0 or (i+1) % 6 == 0 or (i+1) % 9 == 0 else c for i, c in enumerate(obj_content))

   print(obj_content)

Thus, this modified program adds a challenge_token variable to hold the ChallengeToken.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ1

What is a transition?

Answers

It’s a sentence you put at the end of each of your paragraphs in an essay to show that you are moving on to your next topic

Which of the following is not a characteristic of a large database?
a) Optstore items in a filing cabinet.
b) Stores items in a computer such as music.
c) stores large amounts of items such as an online store.
d) can be used as a small recipe book.​

Answers

C is the correct answer

illl give brainliest plzzzzzzzzzz

illl give brainliest plzzzzzzzzzz

Answers

The one paste symbol name is : paste settings

it consist of 'paste special' and 'set default paste if im not wrong'

Computers that communicate over a network must follow certain ___ to ensure that the transmission is sent properly and understood.

Answers

Computers that communicate over a network must follow certain protocols or rules, in order to ensure that data are transmitted properly and understood.

What is a protocol?

A protocol can be defined as a formatted blocks of data that have been designed and established to obey a set of standard rules (conventions) such as the Transmission Control Protocol and Internet Protocol (TCP/IP).

In Computer networking, all computers and other network devices that communicate over a network must follow certain protocols or rules, in order to ensure that data are transmitted properly and well understood by end users.

Read more on protocol here: https://brainly.com/question/17387945

print out the price with every output, so for veggie burger print Add 20 AED to 100 and print out the total No cheese print Subtract 10 AED from 100 and print out the total No alterations print out the full price as 100 AED

Answers

Answer:

Explanation:

Here's an example code using Python to achieve the desired output:

This code first initializes the price variable to 100. Then, it prompts the user to input the type of burger they want. If the user inputs "veggie burger", the code adds 20 to the price variable and prints out the updated price. If the user inputs "no cheese", the code subtracts 10 from the price variable and prints out the updated price. If the user inputs anything else, the code prints out the full price of 100 AED.

print out the price with every output, so for veggie burger print Add 20 AED to 100 and print out the

Help meeee pleasee brainleist

 Help meeee pleasee brainleist

Answers

Answer:

Explanation:

ATM stands for Automatic teller machine

VOIP means Voice over internet protocol so it would be false

And the last would be true

List the steps you can use to change a word document to a Pdf document.​

Answers

Answer:

This can be achieved using any of the following ways

1. Save As

2. Export

Explanation:

This can be achieved in any of the aforementioned ways.

# Save As

# Export

The breakdown step is as follows;

#Using Save As

- Open the word document

- Click the FILE tab

- Select Save As

- Browse file destination directory

- Enter file name

- Choose PDF in Select File type

- Click Save

#Using Export

- Open the word document

- Click the FILE tab

- Select Export

- Click Create PDF/XPS Document

- Browse file destination directory

- Enter file name

- Choose PDF in Select File type

- Click Save

write the algorithms for the problem How to post a letter ? you can put pictures for the steps ​

Answers

❖ Step 1: Start

❖ Step 2: Write a letter

❖ Step 3: Put in envelope

❖ Step 4: Paste stamp

❖ Step 5: Put it in the letter box

❖ Step 6: Stop

\(\frak{\fcolorbox{black}{pink}{Black Pink in your area$~$}}\) ~←(>▽<)ノ

Which of these hardware components can you use to store videos? A. External RAM B. Floppy disk. C. Hard drive. D. Motherboard..

Answers

The hard drive (hardware) is used to store videos.

What is the use of Hard Ware?

A computer's hard drive is a type of storage device used to keep data. It is in charge of maintaining your operating system data, documents, music, videos, photographs, and preference files. You risk losing all of your important data if the hard drive malfunctions or is damaged. Most individuals utilize a backup solution that maintains a separate document file of the originals to avoid a data loss situation.

An electromagnetic head is used to write and read data to and from the rotating platters. This head hovers just above the rotating platters and glides over them. Without removing the hard drive's cover, it is impossible to observe this process while it is in progress. However, if a hard drive's cover is taken off to reveal the platters, the drive gets corrupted and is soon rendered useless. Data recovery is therefore carried out in controlled settings that are free of dust and other impurities that could harm the platters.

To know more about Hardware, Check out:

https://brainly.com/question/24370161

#SPJ4

.

what should sara do when using publicly available internet such as hotel Wi-Fi?

Answers

When using publicly available internet such as hotel Wi-Fi, Sara should take the following precautions to ensure her online security and privacy that are mentioned below.

What is internet?

The internet is a global network of interconnected computer networks that communicate with each other using standard protocols. It allows people around the world to access and share information, communicate with each other, and conduct online transactions in real-time.

Use a virtual private network (VPN) to encrypt her internet traffic and protect her online identity.

Use strong passwords and two-factor authentication to secure her accounts and devices.

Avoid accessing sensitive information or logging into accounts that contain personal or financial data.

Keep her devices updated with the latest security patches and anti-virus software.

Use HTTPS whenever possible, especially when accessing sensitive websites like banking or email.

Log out of accounts and clear browser history and cache after each session.

By taking these precautions, Sara can help protect herself from cyber threats and enjoy a safer online experience.

To know more about cache visit:

https://brainly.com/question/14908895

#SPJ4

Final answer:

When using publicly available internet such as hotel Wi-Fi, Sara should use a VPN, avoid transmitting sensitive information, and keep her device secure.

Explanation:

When using publicly available internet such as hotel Wi-Fi, Sara should take certain precautions to ensure her online safety:

Use a virtual private network (VPN) to encrypt her internet connection and protect her sensitive data from potential hackers.Avoid accessing or transmitting sensitive information such as login credentials or banking details while connected to public Wi-Fi, as it can be intercepted by cybercriminals.Keep her device's software and antivirus programs up to date to minimize vulnerabilities that could be exploited by attackers.

Learn more about online safety here:

https://brainly.com/question/36027168



how has the splintering of sport media coverage not effected sport pr professionals?

Answers

Sport media coverage has changed over the years due to advancements in technology and consumer behavior. The increase of media coverage has caused a fragmentation of sports media, which refers to the division of sports coverage across various media channels, including newspapers, television, social media, podcasts, radio, and streaming services.

Sport PR professionals have not been immune to the effects of the fragmentation of sports media, as their job has become more complicated as they now have to navigate through the various media channels to promote their client's message or event. The splintering of sport media coverage has affected sports PR professionals by making their jobs more challenging and complex than before.The splintering of sport media coverage has led to the development of an increasing number of channels for sports fans to receive their sports news.

This has made it difficult for sports PR professionals to get their message across to fans due to the numerous options available to them.The rise of social media, for instance, has provided fans with access to real-time information, news, and commentary on sports. Sports PR professionals have had to create different messages for each media channel as each channel has its format, style, and tone, making it more challenging for them to get their message across to their target audience.Additionally, the fragmentation of sports media has led to a decrease in the ability of sports PR professionals to control the narrative about their clients. They have to work with various reporters, bloggers, and commentators, each with their biases and agendas. This has led to a situation where sports PR professionals have to work much harder to protect their client's image and reputation.Conclusively, the fragmentation of sport media coverage has affected the way sports PR professionals work, requiring them to be more innovative and strategic in their communication efforts to get their message across to their target audience.

To know more about television visit :

https://brainly.com/question/16925988

#SPJ11

Which of the components of the​ five-component model is easier to change compared to​ software?
A. People
B. Software
C. Procedures
D. Hardware
E. Data

Answers

Answer:

D. Hardware.

Explanation:

The five-component model of a computer system is a conceptual model that describes the five main components of a computer system: hardware, software, data, procedures, and people.

Hardware refers to the physical components of a computer system, including the central processing unit (CPU), memory, storage, and input/output devices. Hardware is the easiest component of the five-component model to change, as it can be upgraded or replaced as needed.

Software refers to the programs and applications that run on a computer system. Software is relatively more complex to change than hardware as it requires specialized skills and knowledge.

Procedures refer to the standard operating procedures and processes that are used to operate and maintain a computer system. Procedures are relatively more complex to change than hardware as it requires specialized skills and knowledge.

Data refers to the information that is stored on a computer system. Changing data requires a more complex process than changing hardware.

People refer to the users, operators, and administrators of a computer system. Changing people's behavior and knowledge is relatively more complex than changing hardware

Research your choice and how they match your requirement and priorities. This is
called______________.
a) Requirement
b) Option analysis
c) Prioritising

Answers

It’s C basically if you need explanation ask me

Normally, by the time teenagers have finished high school, they have formed their own identities and belief systems and have less
need for
against authority figures.

Answers

Answer:

The answer is rebellion

Explanation:

I took the test.

Answer:

rebellion

Explanation:

____________ software enables users to analyze data from various dimensions or angles, categorize them, and find correlations or patterns among fields in the data warehouse.

Answers

Business intelligence (BI) software enables users to analyze multidimensional data, categorize it, and identify correlations or patterns within a data warehouse.

Business intelligence software is designed to facilitate data analysis by providing users with tools and functionalities to explore data from different angles. It allows users to extract data from a data warehouse, manipulate it, and generate insights. By leveraging multidimensional analysis capabilities, BI software enables users to categorize data based on various dimensions, such as time, geography, product, or customer segment. This categorization helps users identify patterns and correlations between different fields or dimensions in the data. With the ability to drill down into specific data points and apply advanced analytical techniques, BI software empowers users to gain valuable insights that can drive informed decision-making and improve business performance.

Learn more about multidimensional here:

https://brainly.com/question/29809025

#SPJ11

importancia del sistema operativo

Answers

Answer:

Un sistema operativo es el software más importante de tu computador, ya que se encarga de gestionar el hardware, el acceso a la memoria, acceso a la CPU y controlar gran parte de las tareas que lleva a cabo tu computador.

Which of these is a small'plain text file that a website might place on your local drive? Choose the answer.

cookie

spam

virus

spoof

Answers

The answer would be cookie

Answer:

the is anwer is cookie i took the test i made sure is the right anwers

Explanation:

If Two Links To An Existing File Are Created In The Same Directory As The Original (Using The Link Syscall), How Many Inodes Are

Answers

If two links to an existing file are created in the same directory as the original using the link() syscall, then there are still only one inode and one copy of the file's data.

Each link is simply another name for the same file, and all links refer to the same inode number.

In other words, when a file is created in a Unix-like file system, it is assigned an inode, which contains information about the file's ownership, permissions, timestamps, and the location of the file's data on the disk. When a link to the file is created, a new directory entry is created that points to the same inode number as the original file. This means that changes made to the file through one link will be reflected in all other links, as they all point to the same inode.

Therefore, creating multiple links to the same file does not create additional inodes. Only the original file has an inode, and all links to that file simply reference the same inode.

Learn more about directory here:

https://brainly.com/question/7007432

#SPJ11

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

Answers

Scroll Down to See Answer ↓

∧-∧ But Read the Explanation to Make Sure ∧-∧

Answer/Explanation:

These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.

Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.

The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.

There seems to be an emerging requirement to specify cryptographic strength objectively  rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected  that U.S. Government (USG) and industry will soon require specific quantitative data to define the  point at which a cryptographic technology or product will satisfy user requirements.

Knowing that these 2 Choices Don't really look Right...

Because it our job = Wrong

Because encryption algorithm are always weak = Wrong

So It leads us to these...

To Prevent all Decryption = ?

To protect online Information = ?

But Base on the Information below:

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

I would say the Answer is To Protect Online Information.

You could Read the Explanation Above If you want to Check.

[RevyBreeze]

Which of the following does counter controlled repetition not require?
(a) an initial value
(b) a condition that tests for the final value
(c) an increment or decrement by which the control variable is modified each time through the loop
(d) counter controlled repetition requires all of the above

Answers

The correct answer is (d) counter controlled repetition requires all of the above.

Counter controlled repetition, also known as "for loop" or "loop with a control variable," typically requires the following components:

(a) An initial value: This is the starting value of the control variable, which is set before the loop begins.

(b) A condition that tests for the final value: This condition determines when the loop should terminate. It compares the control variable to a certain value or uses a logical expression to evaluate whether the loop should continue or not.

(c) An increment or decrement: This specifies how the control variable should be modified on each iteration of the loop. It can be an increment (e.g., increasing the control variable by 1) or a decrement (e.g., decreasing the control variable by 1).

All of these components are essential for counter controlled repetition to function correctly. Therefore, option (d) states the correct answer.

Learn more about controlled repetition here:

https://brainly.com/question/32178497

#SPJ11

Why should you open your door with your right hand when parked on a right-side curb?
A. They shouldn't. Opening the driver side door with your left hand is the safest.
B. So that you will be forced to look behind the car for an approaching bicyclist.
C. To make sure that you engage the parking brake with your left hand.
D. To stretch your back and spine in case you had poor sitting posture.

Answers

Answer:

B. So that you will be forced to look behind the car for an approaching bicyclist.

Explanation:

The main reason for opening with your right hand in this scenario is so you can look behind you for a bicyclist, etc. It's a good practice as you never know if someone is behind you or of the likes. Many people usually open the door with their left hand. The problem with this is that they're not forced to look behind them and can be oblivious to people, bicyclists, etc. behind them.

Hope this helps and have a nice day!

ning and e-Publishing: Mastery Test
1
Select the correct answer.
Which statement best describes desktop publishing?
O A.
a process to publish drawings and photographs on different media with a laser printer
B.
a process to design and produce publications, with text and images, on computers
OC.
a process to design logos and drawings with a graphics program
OD
a process to publish and distribute text and graphics digitally over various networks
Reset
Next​

Answers

Answer:

B

Explanation:

I dont no if it is right but B has the things you would use for desktop publishing

Answer:

the answer is B.

a process to design and produce publications, with text and images, on computers

Explanation:

Could someone please help?​

Could someone please help?

Answers

Answer:

it looks difficult

Explanation:

you can devotingly solve it

Falling If the user doesn't do anything, the player sprite should fall. Do This • Find the code comment // FALLING . • Use the counter pattern with the player sprite's velocityy to make the flyer fall. Test your code to make sure that it works. The sprite should fall faster as it goes down the . screen. Toolbox ♡ Workspace World Sprites 1 77 GAME SETUP Drawing Control 2 // create player, target, and obstacles Math Variables 3 var rock = createSprite(109 100) var sprite = createSpritex, 4 rock.scale = 0.5; sprite.setAnimation (label) 5 var player createSprite(200, 100) 1: player.setAnimation "fly_bot"); sprite.x 6​

Answers

sdcyecreat nobody cares because nobody asked nobody likes you I’m just kidding I love you so much have a great day

Puede pasar de un estado de bloqueo a un estado de conducción en ambos sentidos de polarización, aplicando un pulso de tensión en la puerta.

Answers

Answer:s

Explanation:n

consider the sdn openflow network shown in figure 4.30. suppose that the desired forwarding behavior for datagrams arriving at s2 is as follows: a) any datagrams arriving on input port 1 from hosts h5 or h6 that are destined to hosts h1 or h2 should be forwarded over output port 2; b) any datagrams arriving on input port 2 from hosts h1 or h2 that are destined to hosts h5 or h6 should be forwarded over output port 1; c) any arriving datagrams on input ports 1 or 2 and destined to hosts h3 or h4 should be delivered to the host specified; d) hosts h3 and h4 should be able to send datagrams to each other. specify the flow table entries in s2 that implement this forwarding behavior.

Answers

The flow table entries in s2 is given below as that implement this forwarding behavior.

What is flow table?

A method to assess the consistency of fresh concrete is the flow table test, also known as the slump-flow test. To determine the maximum transportable moisture limit for solid bulk cargoes, flow table testing is also used. Due to the fact that the concrete will not maintain its shape after the cone is removed, it is primarily used to evaluate concrete that is too fluid (workable) to be measured using the slump test.

S2 Flow Table

Match                                                                                         Action

Ingress Port = 1; IP Src = 10.3.*.*; IP Dst = 10.1.*.*                   Forward (2)

Ingress Port = 2; IP Src = 10.1.*.*; IP Dst = 10.3.*.*                  Forward (1)

Ingress Port = 1; IP Dst = 10.2.0.3                                           Forward (3)

Ingress Port = 2; IP Dst = 10.2.0.3                                          Forward (3)

Ingress Port = 1; IP Dst = 10.2.0.4                                           Forward (4)

Ingress Port = 2; IP Dst = 10.2.0.4                                          Forward (4)

Ingress Port = 4                                                                       Forward (3)

Ingress Port = 3                                                                       Forward (4)

Learn more about flow table

https://brainly.com/question/15580813

#SPJ1

Which of the following advancements in agriculture is most environmentally conscious?



robotics


aquaculture


genetic engineering


GPS-enabled tractors
pls help me anyone pls have the right answer im failing

Answers

aquaculture or genetic engineering!
Other Questions
What is the B-bit two's complement for the following integer? -63 a person going to a party was asked to bring 3 different bags of chips. going to the store, she finds 15 varieties. how many different selections can she make? Why does altitude have almost no effect on an animal's ability to rid itself of CO through gas exchange? QUESTION 4Which container type is used to store key-value pairsChoose one 2 pointsDictionaryLinked ListListArrayintstringQUESTION 14How could you make this code display "FruitBanana"?Choose one 2 pointsC#class Fruit{public void Show() { Console.Write ("Fruit"); }}class Banana : Fruit{public void Show() { base.Show(); Console.Write("Banana"); }} On the top of a hill stands a tower that is 50 feet tall. From a point that is on the samelevel as the base of the hill, the angle of elevation to the top of the tower is 56 and theangle to the bottom of the tower is 51. What is the distance from the given point to thebottom of the tower?a. 74 feetb. 321 feetc. 446 feetd. 47 feet The bacterial flagellum is driven to rotate by protons moving down a charge and ph gradient and the energy provided is called the? TRUE/FALSE. a chemist prepares a solution of calcium bromide by measuring out of calcium bromide into a volumetric flask and filling the flask to the mark with water What was the result for African Americans who fought for better rights and fairer pay in the Pacific Northwest?Select the best answer from the choices provided.OA. They were fired and then went to work at Boeing.OB.They were unsuccessful despite government help.OC. They were fired and forced to move east.OD. They often managed to win both better rights and fairer pay. Underline or highlight the signal phrases in the sentences below:According to the American Chemistry Council, "1,800 U.S. businesses have a part in the recycling of plastics."Recycling also reduces the need for energy, claims the Environmental Protection Agency. Parasitism relationship between 2living things. Explain the relationship. Related to Checkpoint 9.2) (Yield to maturity) Abner Corporation's bonds mature in 17 years and pay 11 percent interest annually. If you purchase the bonds for $800, what is your yield to maturity? Yo A(n) ______ loan will likely have a lower interest rate at first but can go up or down.A. unsubsidizedB. variableC. fixed Ruth is training for a half-marathon. On Saturday, she ran 3 miles in 34.5 minutes. On Sunday, she ran 2.5 miles in 28 minutes. How much faster, in minutes per mile, was her pace on Sunday than on Saturday? In 1991, the moose population in a park was measured to be 3360. By 1996, the population was measured again to be 3560. If the population continues to change linearly:Find a formula for the moose population, P, in terms of t, theyears since 1990. (I think my teacher meant for it to be 1991)And what does your model predict for the moos population to be in 2007? you work for a company that offers their services through the internet. it is critical that your website performs well. as a member of the it technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. after doing a little research, you have determined that you are a victim of a denial-of-service attack. as a first responder, which of the following is the next step you need to perform in response to the security incident? Tell whether the sequence is arithmetic. If it is, identify the common difference. -9, -17, -26, -33, ... A. Not arithmetic B. Arithmetic, common difference is 8 C. Arithmetic, common difference is 9 D. Arithmetic, common difference is 7 Current Attempt in Progress Lazurus Steel Corporation produces iron rods that are supposed to be 36 inches long. The machine that makes these rods does not produce each rod exactly 36 inches long. The lengths of the rods are normally distributed and vary slightly. It is known that when the machine is working properly, the mean length of the rods is 36 inches. The standard deviation of the lengths of all rods produced on this machine is always equal to 0.035 inch. The quality control department at the company takes a sample of 20 such rods every week, calculates the mean length of these rods, and tests the null hypothesis, ut = 36 inches, against the alternative hypothesis, * 36 inches. If the null hypothesis is rejected, the machine is stopped and adjusted. A recent sample of 20 rods produced a mean length of 36.015 inches Calculate the p-value for this test of hypothesis. Based on this p-value will the quality control inspector decide to stop the machine and adjust it if he chooses the maximum probability of a Type I error to be 0.01? Approximately how much strength measurement gain is attributable to ""learning"" or exercise familiarization? Please post to this discussion board after completing tasks under Module 16. Discuss the following topics: o What does VBA stand for? o If we needed to edit VBA code, what do we do and where do we go to view the code? Does Excel give its users the ability to write their own VBA code? How? When writing code using VBA, is there a way of pausing the code until information or data is supplied by a user? Please explain. o How do we "debug" a macro? Please explain the procedure for "debugging" which includes an explanation of "stepping through" the macro. Consider a country populated by many identical infinitely lived households where utility at each instant depends on per capita consumption. It has a growing population and a production technology enabling it to produce output from capital and labour under constant returns to scale. Give a thorough explanation of how a social planner would allocate resources in such a country.