which of the following is used to define minimum security requirements a device must meet before it can connect to a network?

Answers

Answer 1

The option that is used to define minimum security requirements a device must meet before it can connect to a network is NAC.

What is the security requirements?

NAC stands for Network Access Control. It is a security solution that is used to ensure that only authorized and secure devices are allowed to connect to a network.

In a NAC system, a device attempting to connect to a network is first checked to ensure that it meets the minimum security requirements set by the network administrator. These security requirements can include things like up-to-date anti-virus software, proper firewall configurations, and the latest software patches.

Therefore, If the device meets the minimum security requirements, it is granted access to the network. If it does not meet these requirements, it may be quarantined or denied access until it can be brought up to the necessary security level.

Read more about security requirements  here:

https://brainly.com/question/29796708

#SPJ1


Related Questions

in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4

Answers

Answer:

c)4

Explanation:

Hope it could helps you

Which graphic file format would you choose if you needed to make an animated graphic for a website?

ai

png

gif

py
please help

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct option for this question is gif.

Gif is a series of images that are used as animated graphics for a website. A gif is the file format of an animated image. You may have seen many animated images on websites like stickers etc.

other options are not correct because:

ai: is adobe illustrator file format

png: png is an image file format but not for an animated image

py: py is a file extension of the python file.

Answer:

gif

Explanation:

Which argument is not a default filter for data?
O Does Not Equal
O Above Average
O Less Than
O Top 50

Answers

The one that is not a default filter for data is Top 50. The correct option is D.

What is a data filter?

Creating Default Filters for Workbooks setting default filters on the dashboard ensures that anyone visiting the page for the first time sees the same filters. Dashboards sent via email always include the default filters.

Filters can be used to narrow down and hide sections of your worksheet's data. While it may sound similar to grouping, filtering differs in that it allows you to qualify and display only the data that is of interest to you.

Among the several data filters, top 50 is not the one that is included in this list.

Thus, the correct option is D.

For more details regarding filter, visit:

https://brainly.com/question/11866402

#SPJ1

does voice over ip have the same problems with firewalls that streaming audio does? discuss your answer.

Answers

Yes, Voice over IP (VoIP) has the same problems with firewalls that streaming audio does.

The Voice over IP and streaming audio both have a UDP protocol that needs to pass through the firewall. However, the firewall is generally designed to inspect traffic using TCP, which is a connection-oriented protocol. It is why streaming audio and VoIP require special firewall configurations to work correctly.

When streaming audio over the internet, there is no consistency in the quality of the audio being transmitted due to issues like jitter, latency, and packet loss.

Voice over IP also experiences the same problems and may even be less reliable. For example, there could be a delay in the conversation between two people or even complete loss of communication due to packet loss.

In conclusion, Voice over IP and streaming audio share the same problems with firewalls because they both use the same protocol, UDP, to transmit audio data.

Thus, it is essential to configure firewalls properly for VoIP or streaming audio to work correctly and reliably.

Learn more about Voice over IP (VoIP):https://brainly.com/question/14255125

#SPJ11

A network that typically reaches a few meters, such as up to 10 meters (33 feet), and consists of personal devices such as mobile computers, smartphones, and handheld devices is called:_______

Answers

Answer:

PAN (Personal Area Network)

Explanation:

A network that typically reaches only a few meters (10 m or 33 ft) and contains personal devices like mobile computers, smartphones and handheld devices is called PAN (Personal Area Network).

PAN enables communication between devices that are near a human being (i.e. only for shorter distances).

It can be wireless such as bluetooth earphones used with the smartphone, wireless keyboard and mouse used with laptop or computer, TV and remote control communication.

It can be wired such as wired earphones used with the smartphone, any USB (Universal Serial Bus) device connected to a computer/laptop.

JAVA
Write a program that requests the user input a word, then prints every other letter of the word starting with the first letter.
Hint - you will need to use the substring method inside a loop to get at every other character in the String. You can use the length method on the String
to work out when this loop should end.
Sample run:
Input a word:
domain
dmi

Answers

Answer:

import java.util.*;

public class MyClass {

   public static void main(String args[]) {

       Scanner input = new Scanner(System.in);

       System.out.print("Input a word: ");

       String userinput = input.nextLine();

       for(int i =0;i<userinput.length();i+=2) {

           System.out.print(userinput.charAt(i));

       }

   }

}

Explanation:

This line prompts user for input

       System.out.print("Input a word: ");

This declares a string variable named userinput and also gets input from the user

       String userinput = input.nextLine();

The following iterates through every other character of userinput from the first using iteration variable i and i is incremented by 2

       for(int i =0;i<userinput.length();i+=2) {

This prints characters at i-th position

           System.out.print(userinput.charAt(i));

What is the output of the following C++ code? int list[5] = {0, 5, 10, 15, 20}; int j; for (j = 0; j < 5; j++) cout << list[j] << " "; cout << endl; Group of answer choices 0 1 2 3 4 0 5 10 15 0 5 10 15 20 5 10 15 20

Answers

Answer:

what?

Explanation:

PLZ HELP

Locking a cell so that others cannot alter its contents is known as
OA. conditional formatting
OB. conditional formula
OC. lookup tables
D. cell protection

Answers

Answer:

Cell protection

Explanation:

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

how many bits are in a binary number

Answers

Answer:

8 bits in a binary number

Explanation:

Data in computer is stored in the form of a binary digit which can hold either 0 or 1. and this binary digit is known as byte represented by 8 bits.

if a document uses 240 unique letters and symbols, how many bits would be needed to store every character of the document?

Answers

3840 bits would be needed to store every character of the document if each character is represented using 16 bits

How many bits would be needed to store every character of the document?

To determine the number of bits needed to store each character of the document, we first need to know the range of unique characters being used. If the document uses 240 unique letters and symbols, we can assume that the characters are represented using an encoding scheme, such as ASCII or Unicode.

ASCII is a commonly used character encoding scheme that assigns a unique numerical value (0-127) to each character. If the document only uses ASCII characters, then each character can be represented using 7 bits (128 unique values).

However, if the document uses a wider range of characters, such as Unicode, which supports a broader set of characters from various languages and symbols, then more bits will be required to represent each character. Unicode typically uses 16 bits (2 bytes) to represent each character, allowing for a much larger range of unique characters.

In this case, since we know that there are 240 unique characters, we can assume that each character requires 16 bits (2 bytes) to be stored. Therefore, the number of bits needed to store every character of the document would be:

240 unique characters * 16 bits = 3840 bits

Learn more about memory:

https://brainly.com/question/28483224

#SPJ4

Check ALL of the correct answers.
What would the following for loop print?
for i in range(2, 4):
print(i)
2
2
3
4.
1

Help now please

Answers

Answer:

2,3,4

Explanation:

Starts at two, goes to four. Thus it prints 2,3,4

Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode. What can she do to make the games work properly in Windows

Answers

Complete Question:

Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode.

Group of answer choices;

A. Reboot into Safe Mode

B. Run compatibility mode for 640 x 480 resolution.

C. Reduce her screen resolution to 640 x480

D. Reboot into Low Resolution Mode

Answer:

B. Run compatibility mode for 640 x 480 resolution.

Explanation:

In this scenario, Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode. In order to make the games work properly in Windows, Missy should run compatibility mode for 640 x 480 resolution.

The video graphics array (VGA) is the standard graphics or display interface used for computer monitors. It was developed in 1987 by IBM and it had a standard display resolution of 640 x 480 pixels.

Hence, if the output of a software program (games) looks fuzzy or is not being displayed properly, you should run compatibility mode for 640 x 480 resolution. This is to enable low resolution video mode on the computer.

The VGA mode is very basic because only minimal video drivers are being loaded on the windows.

Some clues left on a drive that might indicate steganography include which of the following?
a. Graphics files with the same name but different file sizes
b. Multiple copies of a graphics file
c. Steganography programs in the suspect's All Programs list
D. All of the above

Answers

Some clues left on a drive that might indicate steganography include option D: All of the above.

a. Graphics files with the same name but different file sizes.

b. Multiple copies of a graphics file.

c. Steganography programs in the suspect's All Programs list.

What is steganography?

Steganography is a technique for concealing sensitive information within a regular, non-sensitive file or message so as to avoid detection; the sensitive information is then extracted at its intended location. To further conceal or protect data, steganography can be used in conjunction with encryption.

Hence, Steganography is the practice of enclosing openly available information inside of something that seems normal. Steganography is a technique used by cybercriminals to conceal malicious code or stolen data in media like images and audio files.

Learn more about Steganography from

https://brainly.com/question/13089179
#SPJ1

A system is described by the following differential equation: find the expression for the transfer function of the system

Answers

To find the transfer function of a system, we first need to obtain the Laplace transform of the differential equation. Let the system be described by the differential equation:

y''(t) + 2y'(t) + 3y(t) = u(t) Taking the Laplace transform of both sides, and using the property L{y'(t)}=sY(s)-y(0), we get: s^2Y(s) - sy(0) - y'(0) + 2sY(s) - 2y(0) + 3Y(s) = U(s)  where Y(s) is the Laplace transform of the output signal y(t), U(s) is the Laplace transform of the input signal u(t), y(0) and y'(0) are the initial conditions of the output signal.Solving for the output signal Y(s) gives: Y(s) = (s^2 + 2s + 3) / (s^2 + 2s + 3) Thus, the transfer function H(s) of the system is: H(s) = Y(s) / U(s) = 1 The transfer function is simply 1, which means that the output signal is equal to the input signal. This system is therefore a simple gain system with no frequency response characteristics.

To learn more about function click the link below:

brainly.com/question/28966371

#SPJ4

Using the information below, answer the question to the right. Which function should you use to extract shipping values from the Lookup Table?

Using the information below, answer the question to the right. Which function should you use to extract

Answers

Answer: HLookup

Explanation:

HLookup is a function in Microsoft Excel that is part of the Lookup functions, that is, it is used to lookup a value from another table or cell so that it reflects in the desired table.

The “H” in the HLookup stands for Horizontal, that is Horizontal Lookup.

The HLookup function works by looking for a value in the top row of a table or array of values and returning the value in the same column from a row that is specified.

The function is;

=HLOOKUP(lookup_value, table_array, row_index_num, [range_lookup])

So, to extract our shipping value from the lookup table, we use the formula;

=HLOOKUP(C2,$B$11:$E$12,2)

which is known as accurate processing of computer​

Answers

Answer:

GIGO is the considered as the accurate processing in computers. In the field of computer science, the word GIGO stands for " garbage in, garbage out". It is a concept that refers that if bad input is provided to the computers, the output will also be bad and useless. It is the inability of the program to any bad data providing incorrect results.

Explanation:

which applications or services allow hosts to act as client and server at the same time?client/server applicationsemail applicationsP2P applicationauthentication server

Answers

The applications or services that allow hosts to act as client and server at the same time are client/server applications, email applications, P2P applications, and authentication servers.


Applications or services that allow hosts to act as both client and server at the same time are called P2P (peer-to-peer) applications. P2P applications enable direct communication between hosts without the need for a centralized server, making them distinct from client/server applications and email applications. Authentication servers, on the other hand, are specifically used to verify user identities and manage access control.A network host is a computer or other device connected to a computer network. A host may work as a server offering information resources, services, and applications to users or other hosts on the network. Hosts are assigned at least one network address.

A computer participating in networks that use the Internet protocol suite may also be called an IP host. Specifically, computers participating in the Internet are called Internet hosts. Internet hosts and other IP hosts have one or more IP addresses assigned to their network interfaces. The addresses are configured either manually by an administrator, automatically at startup by means of the Dynamic Host Configuration Protocol (DHCP), or by stateless address autoconfiguration methods.

learn more about client/server here:

https://brainly.com/question/30466978

#SPJ11

meaning of interpreter in data processing​

Answers

Answer:

In computer science, an interpreter is a computer program that directly executes instructions written in a programming or scripting language, without requiring them previously to have been compiled into a machine language program.

WHO KNOWS HOW TO TAKE A SCREENSHOT ON A HP PAVILION COMPUTER, PLS HELP!!!!!

Answers

Answer:

Me

Press the Windows key and Print Screen at the same time to capture the entire screen. Your screen will dim for a moment to indicate a successful snapshot. Open an image editing program (Microsoft Paint, GIMP, Photoshop, and PaintShop Pro will all work). Open a new image and press CTRL + V to paste the screenshot.

Explanation:

You need press this button for take a capture

WHO KNOWS HOW TO TAKE A SCREENSHOT ON A HP PAVILION COMPUTER, PLS HELP!!!!!

Answer:

Use the keys win + shift + s

If that doesnt work than I don't know what will

what are the prerequisites to integrate qualys with servicenow cmdb

Answers

To integrate Qualys with ServiceNow CMDB, there are a few prerequisites that need to be fulfilled. These prerequisites include: Access to both Qualys and ServiceNow: To integrate Qualys with ServiceNow CMDB, you need to have access to both the Qualys and ServiceNow platforms.

Qualys API access: To integrate Qualys with ServiceNow CMDB, you need to have access to the Qualys API. You will need to generate an API key from the Qualys platform and ensure that the key has the necessary permissions to access the data you want to integrate. ServiceNow API access: To integrate Qualys with ServiceNow CMDB, you need to have access to the ServiceNow API.

You will need to generate an API key from the ServiceNow platform and ensure that the key has the necessary permissions to access the data you want to integrate. Data mapping: Before you can integrate Qualys with ServiceNow CMDB, you need to map the data fields from Qualys to the corresponding fields in ServiceNow. This will ensure that the data is properly synced between the two platforms. Integration setup: Finally, you need to set up the integration between Qualys and ServiceNow CMDB. This can be done using a third-party integration tool or by writing custom scripts to handle the data transfer. Overall, integrating Qualys with ServiceNow CMDB can be a complex process, but with the right tools and expertise, it can be done successfully. The prerequisites to integrate Qualys with ServiceNow CMDB include access to both Qualys and ServiceNow, Qualys API access, ServiceNow API access, data mapping, and integration setup.To integrate Qualys with ServiceNow CMDB, the prerequisites are as follows: ServiceNow Instance: Ensure you have an active ServiceNow instance running on a supported version. Qualys Subscription: You need a valid Qualys subscription with access to Vulnerability Management and/or Policy Compliance modules. ServiceNow App: Install the "Qualys Vulnerability Integration" app from the ServiceNow Store on your ServiceNow instance. Qualys API Credentials: Obtain the API credentials (username and password) for your Qualys account, which will be used for the integration setup. ServiceNow API Credentials: Obtain the API credentials (username and password) for your ServiceNow instance, which will be used in the Qualys integration setup. Define Asset Groups: Identify and define asset groups in Qualys that you want to synchronize with ServiceNow CMDB.

To know more about Qualys visit:

https://brainly.com/question/31200365

#SPJ11

Which fine arts field might someone who loves travel enjoy? O watercolor painting O travel photography O food blogging O hotel management​

Answers

Answer: Watercolor Painting

Explanation:

Answer:

Explanation:

Travel photography

When comparison shopping, all of these hint at a good deal EXCEPT_____________________.

Answers

Answer:

lower-priced models offer more features

Explanation:

1. An application in which scanners are commonly used is
A) Publishing
B) Billing
C) PRINTING REPORTS
D) CHEQUE PROCESSING

2. THE CONTROL UNIT'S PRIMARY FUNCTIONS ARE ALL OF THE FOLLOWING EXCEPT
A) TO READ AND INTERPRET PROGRAM INSTRUCTIONS
B) TO DIRECT THE OPERATIONS OF THE INTERNAL PROCESSOR COMPONENTS
C) TO TEMPORARILY STORE INSTRUCTIONS
D) TO CONTROL THE FLOW OF PROGRAMS AND DATA INTO AND OUT OF RAM

Answers

1. An application in which scanners are commonly used is Publishing.The correct answer is option A. 2. The control unit's primary functions are all of the following except To temporarily store instructions.The correct answer is option c.

1. An application in which scanners are commonly used is:
A) Publishing
Scanners are commonly used in the publishing industry to convert physical documents, such as books, magazines, or artwork, into digital format. This allows for easier storage, editing, and reproduction of the content.
2. The control unit's primary functions are all of the following except:
C) To temporarily store instructions
The control unit's primary functions are:
- To read and interpret program instructions
- To direct the operations of the internal processor components
- To control the flow of programs and data into and out of RAM
The control unit does not have the function of temporarily storing instructions. Instead, it coordinates and manages the execution of instructions by sending signals to other components of the computer system.

For more such questions Publishing,Click on

https://brainly.com/question/7221406

#SPJ8

what is UTP in terms of network​

Answers

Answer: Unshielded bent match (UTP) could be a omnipresent sort of copper cabling utilized in phone wiring and neighborhood region systems (LANs). There are five sorts of UTP cables recognized with the prefix CAT, as in category each supporting a distinctive sum of transfer speed.

Explanation:

which term is commonly used to describe the shuffling of positions in search engine results in between major updates?

Answers

Flux refers to the redistribution of websites rankings in search engine that occurs before search engines update their database.

What is flux in search engine?The three fundamental components of a search engine are a crawler, an offline processing system to gather data and produce a searchable index, and an online engine to respond to real-time queries.In the search field of a search engine, a user types a single word (a search term) or a group of words (a search phrase).The most relevant results are those that are returned by search engines once they have determined the user's intent from the search terms. Application deployment (CD) and progressive delivery (PD) are made possible by Flux through automatic reconciliation.

To learn more about search engine refer

https://brainly.com/question/512733

#SPJ4

Flux refers to the redistribution of websites rankings in search engine that occurs before search engines update their database.

What is flux in search engine?The three fundamental components of a search engine are a crawler, an offline processing system to gather data and produce a searchable index, and an online engine to respond to real-time queries.In the search field of a search engine, a user types a single word (a search term) or a group of words (a search phrase).The most relevant results are those that are returned by search engines once they have determined the user's intent from the search terms.Application deployment (CD) and progressive delivery (PD) are made possible by Flux through automatic reconciliation.

To learn more about search engine refer:

brainly.com/question/512733

#SPJ4

in the three as of security, what is the process of proving who you claim to be?

Answers

The process of proving who you claim to be is authentication. The process of authentication contains verification of the identity of a person or device.

Authentication can be defined as the process of verifying a user or device before allowing access to a system or resources. In other words, authentication can be described as confirmation that a user is who they say they are. This makes sure solely those with authorized credentials gain access to secure systems.

The three A's of security contain Authentication, authorization, and accounting (AAA) is a term for a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.

You can learn more about authentication at https://brainly.com/question/28398310

#SPJ4

verilog code with comments for the 2:4 binary decoder, the 4:2 binary encoder, and the 4:2 prior- ity encoder. do not use behavioral verilog for these descriptions! use the structural and dataflow concepts introduced in the previous lab.

Answers

The Verilog code is /* 4 to 2 priority encoder */

Data flow description is given below:

module two_four_decoder (

input wire [1:0] w, input wire En, output wire [3:0] y);\\input output declaration

assign y[0]= (En & (~w[1] & ~w[0]));\\y0=1 when w1 and w0 are 00;

assign y[1]= (En & (~w[1] & w[0]));\\y1=1 when w1 and w0 are 01

assign y[2]= (En & (w[1] & ~w[0]));\\y2=1 when w1 and w0 are 10

assign y[3]= (En & (w[1] & w[0]));\\y3=1 when w1 and w0 are 11

endmodule

/* 4 to 2 encoder*/

module four_two_encoder(input wire [3:0] w, output wire [1:0] y, output wire zero);

assign y[1]=w[3] | w[2];

assign y[0]=w[3] | w[1];

assign zero= w[3] | w[2] | w[1] | w[0];

endmodule

/* 4 to 2 priority encoder */

module priority_encoder(input wire [3:0] w, output wire [1:0] y, output wire zero);

assign y[1]=w[3] | w[2];

assign y[0]=w[3] | (~w[2] & w[1]);

assign zero= w[3] | w[2] | w[1] | w[0];

endmodule

Learn more about Verilog code here:

https://brainly.com/question/15119491

#SPJ4

PLZ HELP 50 points. 4. How did Debevec and his team keep Emily from looking like a plaster mannequin?

Answers

Answer: Debevec and his team kept Emily from looking like a plastic mannequin by capturing her in a wide variety of facial expressions, and simulating the facial muscle movements in the animation software.

Explanation:

how to find the first derivative of a titration curve in excel

Answers

To find the first derivative of a titration curve in Excel, you can use the numerical differentiation technique.

Here's a step-by-step guide:

Open your Excel spreadsheet and ensure that your titration curve data is in two columns: one column for the volume of titrant added and another column for the corresponding pH or other measured parameter.

Create a new column next to your data and label it "First Derivative" or something similar.

In the first row of the "First Derivative" column, enter the formula to calculate the numerical derivative. You can use the central difference formula for numerical differentiation:

=(B3-B1)/(A3-A1)

Here, B3 and B1 represent the pH values in the adjacent cells, and A3 and A1 represent the corresponding volumes of titrant added. Adjust the cell references according to your data range.

Know more about Excel spreadsheet here:

https://brainly.com/question/29987837

#SPJ11

Other Questions
What would be the blood type of a person who inherited an A allele from one parent and an O allele from the other? type B type O type A type AB In 2014, the Bureau of Labor Statistics (BLS) announced that of all adult Americans, 146,305,000 were employed, 9,617,000 were unemployed, and 92,025,000 were not in the labor force. What is the adult population A movie theater is splittingcups 30 of popcorn into 18bags. How much popcornwill each bag holde each day, a restaurant sends its used linens to a laundry service to be cleaned and pressed. in economic terms, the laundry service would be classified as a(n) service. Government agencies allow consumers to initiate transactions with government agencies, such as when they pay their taxes, pay traffic fines, or renew automobile registrations via the Internet. The online marketing domain involved is ____________ . Find how many students are enrolled in sections taught by Todd Smythe. (HINT: join INSTRUCTOR, SECTION, and ENROLLMENT) I will give you branilest! This is due and if I fail this I will have an F. While in New York City, is it a better deal for a group of friends to take a taxi or the subway to get from the Empire State Building to the Metropolitan Museum of Art? Explain your reasoning.Here is some information about New York City and its transportation system. Information about NYC taxi cabs:As of 2020, taxi cabs charge an initial fee of $2.50. Then there is an additional charge of $0.50 per 1/5 mile if the car is traveling about 12 miles per hour. In slower or stopped traffic, the additional fee is $0.50 per minute.Information about the NYC subways:As of 2020, a single subway ride is 2.75. However, multiple day passes can be purchased at a discount rate.Information about the NYC tourist attractions:The distance between the Empire State Building and the Metropolitan Museum of Art varies between 2.5 miles to 3.2 miles depending on your route. What Do You Own That You Wouldnt Buy For Its Current Market Value What is the answer to this math problem? -0.4w=4.2 5. a sample has a density of 1.37 x 105 cfu/ml. what sample volume should yield a countable plate? which two dilution tubes could be used to produce this sample volume? how? The length of a rectangle is 5 mm longer than the width. If the area of the rectangle is 24 mm^2, what is the width of the rectangle? Explain how WorldWar II affected French colonial power in Vietnam?? how do you tell between a linear and non-linear function? A) Calculate the pH of 0. 215 M carbonic acid. Ka1 for carbonic acid is 4. 3 X 10-7. pH = 3. 52B) Now, suppose you add some solid sodium hydrogen carbonate to the carbonic acid solution in part A). What will happen to the pH?The pH will remain the same when the sodium hydrogen carbonate is added. You can't tell what will happen to the pH. The pH will rise when the sodium hydrogen carbonate is added. A buffer is formed and the pH will rise when the sodium hydrogen carbonate is added. The pH will fall when the sodium hydrogen carbonate is added. A buffer is formed and the pH will fall when the sodium hydrogen carbonate is added. A buffer is formed and the pH will remain the same when the sodium hydrogen carbonate is added. C) Calculate the pH of solution when the concentration of sodium hydrogen carbonate is 0. 820 M. pH = 6. 94790693688853 Is it possible to help with this question? 4y + 12 = 12 + 4ysolve! Give the following numbers correct to 3 decimal places:0.26451.005760.00248Round the following whole numbers to the nearest 10:153458 1. Note that the 10K is split into Items and is consistent for every SEC Registrant. Item 1a discusses risks. Note that many items are discussed including COVID - 19. In Item 1B, Kroger would discuss any open SEC comments. They currently have none. In Item 2, they describe "Properties". Item 3 is titled "Legal Proceedings". Item 4 is "Mine Safety Disclosures" which is not applicable for many SEC Registrants. Item 5 discusses a Registrants' Stockholder Matters. annual report, when did Kroger last declare a quarterly dividend? What was the amount and when will it be paid? 2. Item 7 is a key item as it Management's Analysis (referred to as the MD&A). What was a significant event during the fiscal year?19. How much cash did Kroger generate from Operating Activities in 2021?20. What causes the greatest difference between net income and cash flow from operating activities? 21. Why is Share-based employee compensation added to Net Earnings to calculate Net Cash Provided by Operating Activities? 22. How much cash did Kroger generate or use from Investing activities in 2021? What was the largest item in this area? 23. How much cash did Kroger generate or use from Financing activities in 2021? Did Kroger borrow more funds than they paid back? Indicate amounts borrowed and payments. How much did Kroger spend on Treasury Stock (repurchase of common stock) transactions? 24. Does the ending cash balance on the Statement of Cash Flows agrees to Cash on the Balance Sheet? (yes or no) Statement of Changes in Stockholders' Equity - This statement explains the changes in individual equity accounts during the year. Most annual reports show the statement of changes in stockholders' equity as a formal financial statement; however, some corporations show the statement of stockholders' equity in the notes of the financial statements. If the retained earnings are the only capital account that changed during the fiscal year, a statement of changes in retained earnings is usually presented instead. You will find the information to answer the following questions in this statement or on the balance sheet. 25. What is the par value per share for common stock? (See balance sheet) 26. What is the number of common shares authorized? 27. What is the number of common shares held in treasury? what is the sound intensity level of a sound with an intensity of 4.0106 w/m2 ? Circumference if circle is_________