joe wants to allow guests to use his organizations wireless network by providing a preshared key. what solution can he deploy to allow users to access his open network?

Answers

Answer 1

A communications protocol called ANT+ was created to make it simple to link fitness sensors like cycle computers and heart rate monitors.

AES encryption with a 128- or 256-bit key is used to encrypt whole drives with Bitlocker, a popular Windows-only program. Bitlocker cannot produce encrypted containers, in contrast to TrueCrypt and VeraCrypt. Partitions must be encrypted in their entirety. The ideas of risk management, threat modeling, the security model, security governance principles, business continuity needs, and policies and procedures are all covered in the domain of security and risk management.

The most secure VPN protocol is OpenVPN. It works with a variety of ciphers for encryption, including AES-256, Blowfish, and ChaCha20. It is supported by nearly every VPN service natively and has no known vulnerabilities.

Learn more about protocol here-

https://brainly.com/question/27581708

#SPJ4


Related Questions

when web services are offered outside the firewall, traffic is prevented from reaching the internal networks via the implementation of some form of proxy access or dmz architecture.

Answers

An isolated networking space or sub-network that is isolated from the rest of the organization's connected footprint using logical or physical blocks to enable access to untrusted connections in a safe environment is referred to as a demilitarized zone (DMZ).

Demilitarized zones are secluded network areas that provide as a secure link between proprietary and non-proprietary networks within an organization's perimeter. It stops unauthorized traffic from entering the internal local area network of a business. A demilitarized zone (DMZ) is a region where warring parties have agreed to put their differences aside in order to create peace. An example of a DMZ is the little sliver of territory that divides North and South Korea on the Korean Peninsula.

Learn more about demilitarized here-

https://brainly.com/question/7933837

#SPJ4

the introduction of the minicomputer a. allowed computers to be customized to the specific needs of departments or business units. b. enabled decentralized computing. c. offered new, powerful machines at lower prices than mainframes. d. all of the above.

Answers

The invention of the minicomputer made it possible to tailor computers to the unique requirements of departments or business units, enabling decentralised computing, and provided brand-new, potent machines for less money than mainframes. all the given option is correct.

What is minicomputer?
A minicomputer, often known as a mini, is a category of smaller general-purpose computers that were created in the middle of the 1960s and were marketed for significantly less money than mainframe and semi computers from IBM and its main rivals. The New York Times proposed a consensus definition of the a minicomputer in a 1970 survey as a device with an input-output device, such as a teleprinter, and at least four thousand words of memory that can execute program in a higher level language, including such Fortran or BASIC, and that costs less than US$25,000. The class comprised a unique group with its own operating systems and software architectures. As opposed to calculation and record keeping, minis were made towards control, instrumentation, human contact, and communication switching.

To learn more about minicomputer
https://brainly.com/question/28004913
#SPJ4

Which term best describes the output of the integer division operator?
Difference
Fraction
Quotient
Remainder
Sum

Answers

Answer: Quotient

Explanation:

suppose you wish to learn what tables are included in a database, what entity characteristics these tables contain, and how these tables are related. which resource would provide this information?

Answers

A table consists of rows and columns. Each column corresponds to an attribute of the entity referenced by the table. Each row represents an instance of the entity described by the database table.

The specific data associated with each attribute is stored in rows corresponding to each column. A database is a structured collection of information about various specific, well-defined types of entities. Entities generally have various specific types of relationships with each other. Each entity has a specific set of (unique) attributes of interest. An entity type typically corresponds to one or more related tables in your database. attribute. A characteristic of an entity type that describes the entity. For example, the Person entity type has a Date of Birth attribute.

Learn more about entity here-

https://brainly.com/question/14972782

#SPJ4

Write a python program to check whether the number is divisible by 7. If its divisible, print its divisible otherwise find previous number and the next number which is divisible by 7​

Answers

f = int(input("Enter a number: "))

if(f%7==0):

   print("It's divisible by 7.")

else:

   if(f<7):

       print("7")

   else:

       print(str(f-(f%7))+", "+str(f+(7-(f%7))))

Which of the following Excel features allows you to automatically populate adjacent cells with data?
O AutoEdit
O AutoFill
O Macros
O Flash Fill

Answers

Answer:

The answer of the question is B which is the autofill feature

Answer:

Explanation:

Which of the following Excel features allows you to automatically populate adjacent cells with data?

O AutoFill

regular languages can be expressed by regular expressions. we had pointed out that difference operator (-) is not a valid operator in regular expressions. hence, regular languages are not closed under the difference operator. group of answer choices true false

Answers

Language description can be done algebraically using regular expressions. The regular languages are precisely described by regular expressions.

An algebraic technique to characterize languages is with regular expressions. Regular Expressions are a perfect description of regular languages. The regular language that E defines is L(E), if E is a regular expression. We can develop a DFA A such that L(E) = L for each regular expression E. (A).

Regular languages are identified by regular expressions. They have the ability to succinctly express regular languages and operations on them.

The following definition uses recursion to define the set of regular expressions over an alphabet. Any one of the set's elements is a regular expression.

To know more about regular expression click on the link:

https://brainly.com/question/17255278

#SPJ4

a company has a static website hosted on an s3 bucket in an aws region in asia. although most of its users are in asia, now it wants to drive growth globally. how can it improve the global performance of its static website?

Answers

For all accounts and buckets that you don't want to be publicly visible, it should enable Block Public Access. Data can be safely uploaded and downloaded to Amazon S3 utilizing HTTPS endpoints with SSL.

The basic protocol used to transmit data between a web browser and a website is HTTP, while HTTPS is the secure version of HTTP. To strengthen the security of data transport, HTTPS is encrypted. This is crucial when customers register into a bank account, email account, or health insurance provider and transfer sensitive data.

Any website should use HTTPS, especially those that request login information. Websites that do not employ HTTPS are marked differently from those that do in contemporary web browsers like Chrome.

HTTPS encrypts messages using an encryption protocol. Previously known as Secure Sockets Layer, the technology is now known as Transport Layer Security (TLS) (SSL). This protocol uses an asymmetric public key infrastructure to secure communication.

To know more about HTTPS click here:

https://brainly.com/question/10663873

#SPJ4

a user is working on a home computer when another user seems to open an application to view documents on the same computer. the user immediately suspects that a back door into the computer exists.which action should be taken first to deal with the problem?

Answers

The user should immediately disconnect the computer from the internet or any other network it is connected to. The user should then scan the computer for malware and viruses and remove any that are found. The user should then change all passwords on the computer.

What is computer?
A computer is indeed a digital electrical device that may be configured to automatically perform series of logical or mathematical operations (computation). Programs are generic set of operations that can be carried out by modern computers. These apps give computers the ability to carry out a variety of tasks. A computer system is a "full" computer that comes with the peripheral devices, operating system, and hardware required for "full" functioning. This phrase may also apply to a collection of connected computers that work as a unit, such as a computer network a computer cluster. Computers are used as control systems in a wide range of industrial goods.

To learn more about computer
https://brainly.com/question/23275071
#SPJ4

suppose that you have a merkle tree with 4 transactions. what is the lowest number of hashes one need to provide to verify that a transaction belongs to a tree?

Answers

The leaf-node level at the base of the tree is made up of the eight transaction hashes, which are also referred to as transaction IDs. Pairs of these transactions are hashed together.

Hashing together pairs of TXIDs yields a merkle root, which is a brief but distinctive fingerprint for all the transactions in a block. Then, every block header will provide a brief summary of each transaction contained in the block because this merkle root is used as a field in a block header. The user can confirm whether it contains a transaction in the block by using a Merkle tree, which adds up all of the transactions in a block and creates a digital fingerprint of the complete set of activities. A data structure used in computer science applications is called a Merkle tree.

Learn more about transaction here-

https://brainly.com/question/24730931

#SPJ4

the design of the research could be any of the following general classfication descriptive correlation casual experiment time serieds

Answers

It is TRUE to state that The design of the research could be any of the following:

general classification descriptive correlation casual experimenttime series.

What are the various types of research?

The first is Descriptive Research.

Descriptive Research is a sort of research that is used to characterize a population's characteristics. It collects data that is used to answer a variety of what, when, and how inquiries about a certain population or group.

Descriptive research "aims to shed light on present challenges or problems using a data gathering procedure that allows them to characterize the situation more thoroughly than was previously feasible." Simply said, descriptive studies are used to characterize different features of phenomena.

Casual Experimentation or research is the study of cause-and-effect relationships. To establish causality, the variation in the variable suspected of influencing the difference in another variable(s) must be discovered, and the changes from the other variable(s) must be computed (s).

A descriptive correlational study is one in which the researcher is primarily concerned with characterizing connections between variables rather than attempting to demonstrate a causal relationship.

Time series analysis is a method of examining a set of data points gathered over a period of time. Time series analysis involves analysts capturing data points at constant intervals over a predetermined length of time rather than merely occasionally or arbitrarily.

Learn more about research:
https://brainly.com/question/28467450
#SPJ1

Full Question:

The design of the research could be any of the following:

general classfication descriptive correlation casual experimenttime series

True or False?

juan, a network analyst, is using the tcp xmas scan while performing a technical assessment to determine network vulnerabilities. what would be the response of all open ports?

Answers

While doing a technical assessment to determine network vulnerabilities, you used the TCP XMAS scan, All open ports will ignore the packets.

Here's the full question:

While doing a technical assessment to determine network vulnerabilities, you used the TCP XMAS scan. What would be the response of all open ports?

a. The port will send an ACK

b. The port will send a SYN

c. The port will ignore the packets

d. The port will send an RST

What is port scanning?

Port scanning refers to a method used to detect which ports in a given network are open and available for use. It also involves sending packets to certain ports on a host to inspect responses to detect potential, underlying vulnerabilities.  

During port scanning, A port scanner will send a TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) network packet and inquire the port about their status. The responses will either be: open, closed or blocked.

In using xmas scan, a loophole with the TCP RFC is used to differentiate between open and closed ports. This means that the Xmas scan in order to identify listening ports on a targeted system will send a specific packet; If the port is open on the target system then the packets will be ignored.

Learn more on port scanning from:

https://brainly.com/question/10536867?referrer=searchResults

#SPJ4

which special identity group contains any account (except guest) that is currently signed in to a computer or domain with a valid username and password?

Answers

The answer to the following query is authenticated, by the user.

Users are referred to as authenticated users if they access our accounts or those of others for legitimate reasons through a straightforward login or logon process without hacking. Simply said, authenticated users are those actual individuals who log in using their real username and password.

A domain in computer networking is a collection of devices that share the same administrative authority. An organization might have a domain that encompasses all of the computers in its offices, for instance. Subdomains, which are smaller groups of computers within a domain, can be created.

Learn more about Special Identity Group :

https://brainly.com/question/28145492

#SPJ4

say you are registering for next semester’s classes. you have choice a, which is your art class, and choice b, which is your math class. you need both of them, but it’s a race between time and luck. if you end up registering on time for choice a, but you don’t get your choice b, which logical operators would be true?

Answers

A set of boolean operands will only have a logical AND (&&) operator (logical conjunction) that is true if and only if all of the operands are true. If not, it will be untrue.

A logical operator is a symbol or word that joins two or more expressions in such a way that the value of the resulting compound expression solely depends on the value of the original expressions and the meaning of the operator. The AND, OR, and NOT logical operators are often used. The logical NOT (!) operator transforms truth into untruth and vice versa. Normally, boolean (logical) values are used with it. When applied to non-Boolean values, it returns true unless its sole operand can be transformed to false. The two vertical line symbols stand in for the logical OR operator. In contrast to the logical AND operator, it only returns false if both of the expression's claims are untrue.

Learn more about Operator here-

https://brainly.com/question/2945136

#SPJ4

suppose a packet is 10k bits long, the channel transmission rate connecting a sender and receiver is 10 mbps, and the round-trip propagation delay is 10 ms. how many packets can the sender transmit before it starts receiving acknowledgments back?

Answers

10 packets can sender transmit before it starts recieving acknowledgements back .

What is a packet  ?

In telecommunications and computer networking, a network packet is a structured unit of data delivered via a packet-switched network. A packet is made up of control information and user data, often known as the payload. Control data provides information needed to deliver the payload.

Calculation

packet length = 10k bits

                        =  10 * [tex]2^{10}[/tex] bits

band width = 10 mbps = 10  * [tex]10^{6}[/tex] sec

transmission time = L / b.w. = ( 10 *2^10 )/ (10 * 10^6) = 0.001024 sec.

for every 0.001024 sec one packet transmit to reciever from sender .

number of packets sent in 10 ms = (10 * 10^-3) / 0.001024 = 9.76 = 10(approx.)

therefore 10 packets can sender transmit before it starts recieving acknowledgements back .

learn more about packets here :

brainly.com/question/20038618

#SPJ4

[x] is an online software company that specialize in selling ad spaces in their parent company’s magazine. [x] manages an online database that allows their customers to upload and pay for their business ads for magazine placement. because [x]’s database needs to connect to the parent company’s database, the parent company has requested that [x] system be assessed and verified as secure.

Answers

The following are some helpful database security procedures that can shield the database from threats and enable safe connections to any other system's database:

Logical and physical database structure securityFor databases and Web applications, use firewalls.Database value reductionControl tight database accessAnalyze and monitor database operations

How to illustrate the information?

A technique that assesses the vulnerability of databases at a specific time is security evaluation of databases. The initial risk component is evaluated by determining how vulnerable a dataset is to a collection of patched security defects and attack scenarios.

The dataset's review identifies the databases' advantages and disadvantages for users. Experts recommend taking preventative measures to address any shortcomings and build capacity as a result. Priorities for necessary modification and potential enhancements will be suggested by the evaluation.

Learn more about database on

https://brainly.com/question/518894

#SPJ1

What are the useful practices for database security that can help protect the database from attackers?

Please help as soon as possible please need to turn it in

Answers

Answer:

4 is true , 5 I think it's A and number 6 is false

you will install hyper-v on the server and create seven virtual servers, with each server running windows server 2012. which windows server 2012 edition should you install?

Answers

Installing all of the Hyper-V components from Powershell is the workaround. In contrast to Windows Server 2012 Essentials (non-R2) edition, Windows Server 2012 R2 Essentials may operate a single instance of a virtual machine on Hyper V.

Hyper-V cannot be installed if an active hypervisor is present. When we attempt to install Hyper-V on a server that is already a virtual machine, this error happens. Itanium-based processors are not supported, and x64-based processors are the minimum CPU requirements for running Hyper-V. Hardware Data Execution Protection and hardware-assisted virtualization must also be turned on. A dual-core processor is not necessary at all. The Windows Server 2016 Standard or Datacenter Editions both support the installation of Hyper-V.

Learn more about Hyper V here-

https://brainly.com/question/14466010

#SPJ4

each aws region is composed of two or more locations that offer organizations the ability to operate production systems that are highly available, fault tolerant and scalable beyond what would be possible using a single data center. what are these locations called?

Answers

An Availability Zone is a distinct location within a region that is insulated from failures in other Availability Zones and provides inexpensive, low-latency network connectivity to other Availability Zones in the same region. Replication areas, geographic districts, and compute centers are not terms used to describe AWS data center locations.

What is AWS region ?

AWS Regions are physical locations around the world where Amazon clusters data centers in AWS Availability Zones for application and service delivery. Regions also extend the capabilities of other delivery options, such as AWS Local Zones.

learn more about aws region here :
brainly.com/question/24119924

#SPJ4

all types of remote access techniques connecting to a network require at least one of what two different types of remote access server?

Answers

All types of remote access techniques connecting to a network require at least one of what two different types of remote access server and that are:

1. Remote Access Server

2. Remote Access Client

What is difference between two types of remote access server ?

A remote access server is a place where a system is put up to keep all of the company's/data, institute's, and members of the institute/data company's remotely accessible, allowing them to operate from any location with an internet connection.

All nodes/devices that connect to the network are considered remote access clients. People from the institute/company log in and connect to the server using the credentials that have been issued to them. It opens a connection to the server.

learn more about remote access server here :

brainly.com/question/28900477

#SPJ4

volunteering ,job shadowing and internships all look good on colleage application because they show colleges the

Answers

Answer:

Volunteering, job shadowing and internships all look good on college applications because they show colleges that you are intelligent and committed to new learning opportunities.

Explanation:

Volunteering, job shadowing and internships all look good on a college application because they show colleges that would allow you to show your capabilities and would also show that you are a good person. Every college or university would want every student to help out in the world. This would also let you open more possibilities in the future too. As you grow, your mind has to grow too so this would let them know how you are able to accomplish this task and show them that you are able to do anything.

te many different sources of security information created in his environment and correlate those sources for relevant security issues. which one of the following tools would assist colin to accomplish the given task?

Answers

Another crucial tool for protecting networks from security threats is the firewall. By filtering incoming traffic from unauthorized sources, a firewall can aid in preventing unauthorized access to a network.

Preventative measures are intended to be put in place before a threat event in order to lessen the chance and potential consequences of a successful threat event. Policies, standards, protocols, procedures, encryption, firewalls, and physical barriers are a few examples of preventative measures. There are eight key hazards to your company's technological security, including malware and pop-up ads online. Security concerns brought on by technology include phishing, social engineering, and pretexting. When attempting to minimize these hazards, being aware of them already constitutes half the battle.

Learn more about Network here-

https://brainly.com/question/15088389

#SPJ4

When you cite your sources and give credit to the authors, you are: (select all that apply)
practicing ethical behavior.
allowing people to know where you got your ideas.
behaving in an unethical way.
behaving in a scholarly way.

Answers

When you cite your sources and give credit to the authors, you are: (select all that apply) is option A: practicing ethical behavior.

Why is ethical behavior important?

In order to tell the truth, maintain our word, or assist a stranger in need, we must follow ethical principles. Everyday decisions we make are guided by an ethical framework that helps us avoid unjust results and helps us make decisions that have good effects on the world.

Therefore, Honesty, fairness, and equity in interpersonal, professional, and academic relationships as well as in research and scholarly pursuits are characteristics of ethical behavior. The rights, diversity, and dignity of both individuals and groups of people are respected in ethical behavior.

Learn more about ethical behavior from

https://brainly.com/question/27962109
#SPJ1

Answer:

a, b, d

Explanation:

:)

What do you create when you want to set up a meeting using the Microsoft Office Online Calendar application?

A. Appointment
B. Event
C. Individuals
D. Groups

Answers

Answer:

Explanation:

B. Event

The answer is B Event

the​ problem seeks to find the shortest possible route that visits each location or city exactly once and returns to the starting location.

Answers

The traveling salesman problem seeks to find the shortest path or route that visits each city or location exactly once and returns to the starting location. Hence the right fill-in-the-blank is "Travelling Salesman".

What is a Travelling Salesman Problem?

The travelling salesman problem is an algorithm that seeks the shortest path to visit each city exactly once and return to its starting location. The traveling salesman problem requires a set of cities or locations and the distance between each pair of locations or cities. This algorithm finds the shortest possible route that visits every given location and returns to its starting location. This is an NP-Hard problem.

The correct question is given below:

"

The​ _________ problem seeks to find the shortest possible route that visits each location or city exactly once and returns to the starting location.

"

You can learn more about travelling salesman problem at

https://brainly.com/question/26913198

#SPJ4

Why would a community member go to a Disaster Recovery Center

Answers

Survivors can get help applying for federal assistance, learn about the types of assistance available, learn about the appeal process and get updates about applications.

distributor claims that the chance that any of the three major components of a computer (cpu, monitor, and keyboard) is defective is 3%. cal the chance that all components work in a computer set.

Answers

The chance that all components work in a computer set is 94.09%. This chance is calculated using binomial probability.

Binomial probability or known as binomial experiment can be described as the probability of exactly x successes on n repeated trials in an experiment which has two possible outcomes.

Step-by-step explanation:

Formula:

P(x) = ⁿCₓpˣ (1-p)ⁿ⁻ˣ

Desc:

P(x) =  the probability of getting success in x trials

n = number of trials

P = the probability of getting success

P ( x ≤ 1) = P(0) + P(1)

³C₀(0,03)⁰ (0,97)³ + C₁ (0,03)¹(0,97)² =  (0,97)³ + (0,03)¹(0,97)² = 0,9409 = 94,09%

Learn more about Binomial probability at https://brainly.com/question/13029978

#SPJ4

what occurs when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high/peak load requirements ensuring a sudden spike in usage does not result in poor performance or system crashes?

Answers

By their very nature, distributed applications and services that operate in the cloud are sophisticated programs with plenty of moving components.

Performance testing has many new definitions in the world of cloud native today, where businesses test the functionality of serverless apps, online applications, cloud computing systems, and containerized architectures.

It's crucial to be able to watch how people utilize your system, check resource usage, and generally keep an eye on its performance and health in a production setting. This knowledge can be used as a diagnostic tool to identify problems and fix them, as well as to assist identify possible difficulties and stop them from happening.

Monitoring can give you information about how well a system is working. Maintaining quality-of-service goals requires monitoring. Typical instances for monitoring data collection include:

ensuring the system's continued health.

monitoring the system's and its constituent parts' availability.

maintaining performance to make sure that as the amount of work increases, the system's throughput does not abruptly decline.

To know more about cloud click on the link:

https://brainly.com/question/27108963

#SPJ4

dan is designing a segmented network that places systems with different levels of security requirements into different subnets with firewalls and other network security devices between them. in which phase of the incident response process is dan working in the given scenario?

Answers

Before a system is shut down for imaging, a live response is often employed to gather any volatile evidence and to get a "first look" at the system to see if it needs any further care.

Finding and analyzing electronic data is the process of digital forensics. By gathering, identifying, and confirming the digital material to recreate historical events, the approach aims to preserve any evidence in its most authentic form while carrying out a structured examination. Experts are required to first identify and gather all forensic resources that the organization needs when an accident occurs in order to integrate the forensic procedures into an incident respond strategy of any company.

Learn more about Forensics here-

https://brainly.com/question/14403044

#SPJ4

supercomputers are machines that could compute quadrillions of floating-point operations per second. that is, their performance is multiples of 10 15 1015 operations per second. these machines are used for a variety of things, including simulating earthquakes, nuclear reactions, and the big bang. in fact, supercomputer simulations have at this point replaced the testing of actual nuclear arms. some of the advantages of these simulations include: select two answers. elimination tool select all that apply a models can incorporate all of the complexities of nuclear reactions. b models are cheaper than building multiple designs and testing each in the real world. c modern supercomputers are cheaper than a mid-size car. d simulations come without the environmental risks associated with nuclear tests.

Answers

Some advantage of supercomputers simulation of earthquakes, nuclear reactions, and the big bang are:

b. Models are cheaper than building multiple designs and testing each in the real world.

d. Simulations come without the environmental risks associated with nuclear tests.

What are supercomputer?

Supercomputers are large systems that are specifically designed to solve complex scientific and industrial challenges. They perform at or near the highest operational rate for computer operation. Traditionally, supercomputers have been used for scientific and engineering applications that must handle massive databases, do a great amount of computation or both.

Learn more on Supercomputers from:

https://brainly.com/question/23126369?referrer=searchResults

#SPJ4

Other Questions
What was the end result of the Korean War?O North Korea and its communist allies achieved total victory and total control over South Korea.O South Korea and its UN allies were able to successfully invade and claim North Korea.O A cease-fire agreement was signed and a demilitarized zone was established between North and South Korea.O China and the Soviet Union used the war as an opportunity to take over the entire Korean Peninsula. In year 1 pepper company reported a $40,000 gross margin on $200,000 of sales revenue. In year 2 peppers accounting records showed sales revenue of $220,000 and cost of goods available for sale of $210,000. Using the gross margin method of estimating inventory, the estimated amount of ending inventory for year 2 is. Consider the following functions.f = {(-5, 2), (2, -5), (-1, -3)}and g = {(-1, 1), (-5,3)}Step 1 of 4: Find (f + g)(-1) Identify the Roman peace? Or the Pax Romana? Graphing is a way to represent data visually to represent the motion of a rolling ball students craft data on A-line graph which of the following would accurately label the X ax pls be quick or is do Friday (the young warriors )she cheated in the final contest Finnegan wants to buy a sweater for $29.50 and jeans for $42.50. If the sales tax rate is 8.25%, what will be the amount of sales tax on Finnegans purchase? hii! does anyone have tips on how to memorize things faster? I have VERY strict parents and I would like to make them proud. I already have amazing grades but I go through tons of trouble to memorize little amounts of phrases When you're , you're flexible and willing to change your mind or your direction when necessary.rigidadaptablerudehumorous Pythagorean TheoremFind the length of the third side, write in simplest radical form if needed. 3(3v - 4) = 51 solve for v simplify your answer as much as possible Let g(x)=x^2-64 and h(x)=root(8x+512). Find each combination and state its domain. 1. (h/g)(x)(Number one has a fraction) 2. (hg)(x)3. (gh)(x)Show work please! Fictitious element Az has two common isotopes. What is the average atomic mass (in amu) of Az given that seven-ninth of the isotopes have a mass of 325.2 amu, while the rest have a mass of 329.6 amu? Report the answer to 4 significant figures. What would your weight on the moon be if you weighed 120 pounds on Earth?(50 POINTS !!) wahby s, fashoyin-aje l, osgood cl, et al: fda approval summary: accelerated approval of sacituzumab govitecan-hziy for third-line treatment of metastatic triple-negative breast cancer. clin cancer res 27:1850-1854, 2021 To establish proximate cause in a negligence claim, it is necessary to prove that the. Which sentence would be the best conclusion to the essay? A. These benefits are important and overcome the negative parts of gaming. B. So, even the things people say are bad about gaming can be turned into benefits. C. Perseverance, patience, problem solving and focus are things that will help students do better. D. The lessons learned from gaming can be applied not only in school, but in everyday life as well. 11. Which of the following is true at equilibrium?a.The reaction stopsb. The forward and reverse reactions occur at equal ratesC. The reactants have been used upd. The products have been used up Holly wants to buy a new house in Cardiff.She knows that Land Transaction Tax will be added to the price of the house.Land Transaction Tax rates are shown below: pay nothing on the first 180000 of the price of the house, pay 35% on the part of the price of the house that is above 180000 and up to and including 250000, pay 5% on the part of the price of the house that is above 250000 and up to and including 400000.The most Holly can afford to spend, including Land Transaction Tax, is 327000.Let x be the highest price of house that Holly can afford.Write an equation in x and solve it to calculate the highest price of house that Holly can afford.