Select the correct answer.
What does virtualization do?
A.
It limits the working of the existing operating system.
B.
It creates barriers in cloud storage.
C.
It combines the existing physical servers into one logical server.
D.
It runs any operating system on your existing operating system.

Answers

Answer 1

Answer:

D.it runs any operating system on your existing operating system

Explanation:

because virtualization is a windows version for virtual machine.


Related Questions

g A user receives an email from an unknown source with a link to a website asking for their password. The userenters in their password, but nothing happens. What is the user a victim of

Answers

Based on the information provided, this user is a victim of phishing.

What is phishing?

Phishing can be defined as a type of cyberattack which involves making an attempt to obtain sensitive user information such as a password, especially by disguising as a trustworthy entity in an electronic communication (email), which is usually over the Internet.

In this context, we can infer and logically deduce that this user is a victim of phishing because he or she received an email from an unknown source with a link to a website asking for their password.

Read more on phishing here: https://brainly.com/question/23850673

#SPJ1

For which three everyday activities do people most typically use computers?

Answers

Answer:

Explanation:

People use computers to :

1. Communicate

2. Research

3. To better understand different aspects of their domain or just something they want to know.

4. Computers have the power to be obedient and do whatever people want, which makes them very efficient for a lot of tasks.

5. The fact that computers can run complex algorithms at an incredible speed is something that would be impossible for a person.

6. Computers can make people better understand the world.

7. An interesting fact, is that the brain works on electricity just like a computer, but also works like a computer. (imagine the neurons of the brain being bits.)

8. With the help of computers, we discovered more than 60 trillion of Pi's digits.

9. AI is a very powerful concept for computers because they can learn about anything over time, and get better than people at doing real-life tasks, which would make the overall human civilization better.

10. Computers could help us mathematically find Earth-like planets, which will be useful since in billions of years the sun will die.

11. The human robots, which would get one of the best human-made inventions, could simply change the world, into a way more efficient one, and the fact that our brain works just like the computer, makes us more like robots.

But, what if robots take over the world and kill all humans? Is that possible?

Nope. A robot will never kill anyone. Know why? Because robots will always be obedient to the code we write into them. Whatever if write into their chip, they will run(the code) that.

If a robot is coded to not kill anyone and kills someone, it is just like we wouldn't live in real life. No robot can overthink the code we put into them. People just think that robots will overtake control because of films and stories. That will never happen.

That's just how robots work. Humans are robots. But we can do whatever we want because the DNA doesn't program us to not do something. As humans, we can do whatever we think because we are programmed to not have limits in thinking. But, the robots have a limit. That limit is the script written into it.

Computers and AI have just advantages. No one will kill someone.

In addition to a specified pattern of characters, all legitimate credit card numbers must satisfy the Luhn Algorithm also known as the _____. Damm Algorithm Mod10 Algorithm Euclid's Algorithm Verhoeff Algorithm

Answers

Mod10 Algorithm is the correct answer

Word frequencies - functions
Define a function named GetWordFrequency that takes a vector of strings and a search word as parameters. Function GetWordFrequency() then returns the number of occurrences of the search word in the vector parameter (case insensitive).
Then, write a main program that reads a list of words into a vector, calls function GetWordFrequency() repeatedly, and outputs the words in the vector with their frequencies. The input begins with an integer indicating the number of words that follow.
Ex: If the input is:
5 hey Hi Mark hi mark
the output is:
hey 1
Hi 2
Mark 2
hi 2
mark 2
Hint: Use tolower() to set the first letter of each word to lowercase before comparing.
The program must define and use the following function:
int GetWordFrequency(vector wordsList, string currWord)
#include
#include
#include
#include
using namespace std;
/* Define your function here */
int main() {
/* Type your code here */
return 0;
}

Answers

Answer:

#include <iostream>

#include <vector>

#include <iomanip>

#include <string.h>

#include <string>

#include <algorithm>

using namespace std;

bool strEqual(const string& str1, const string& str2)

{

 //check each characters by case insensitive  

 return std::equal(str1.begin(), str1.end(),

                     str2.begin(), str2.end(),

                     [](char str1, char str2) {

                         return tolower(str1) == tolower(str2);

                     });

}

unsigned GetWordFrequency(vector<string>& vec,const string& str)

{

 //return the number of occurrences of the search word in the

 unsigned res=0;//the numbers of occurences

 for(auto itr:vec)

   {

     if(strEqual(itr,str))

       res++;

   }

 return res;

}

int main()

{

 int size=0;

 cin>>size;

 vector<string>vec;

 for(int i=0;i<size;i++)

   {

     string str;

     cin>>str;

     vec.push_back(str);

   }

   cout<<"Output:"<<endl;

 for(auto itr: vec)

   {

     cout<<itr<<" - "<<GetWordFrequency(vec,itr)<<endl;

   }

 return 0;

}

Explanation:

1) Coding for Table in Html

Answers

See below for the code in HTML

How to code the table in HTML?

The given table has the following features:

TablesCell mergingList (ordered and unordered)

The HTML code that implements the table is as follows:

<table border="1" cellpadding="1" cellspacing="1" style="width:500px">

<tbody>

 <tr>

  <td colspan="1" rowspan="2"><strong>IMAGE</strong></td>

  <td colspan="1" rowspan="2"><strong>name</strong></td>

  <td colspan="2" rowspan="1"><strong>first name</strong></td>

 </tr>

 <tr>

  <td colspan="2" rowspan="1"><strong>last name</strong></td>

 </tr>

 <tr>

  <td>DOB</td>

  <td>yyyy</td>

  <td>mm</td>

  <td>dd</td>

 </tr>

 <tr>

  <td>Qualifications</td>

  <td colspan="3" rowspan="1">references</td>

 </tr>

 <tr>

  <td>

  <ol>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

  </ol>

  </td>

  <td colspan="3" rowspan="1">

  <ol type = "a">

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

  </ol>

  </td>

 </tr>

</tbody>

</table>

<p>&nbsp;</p>

Read more about HTML at:

https://brainly.com/question/14311038

#SPJ1

Spectrum Technologies uses SHA 256 to share confidential information. The enterprise reported a breach of confidential data by a threat actor. You are asked to verify the cause of the attack that occurred despite implementing secure cryptography in communication. Which type of attack should you consider first, and why?

Answers

The type of attack in the case above that a person need to consider first, is Misconfiguration attack.

Why Misconfiguration attack?

Due to the fact that the company need to have configured a higher security hash algorithm instead of using the less-secure SHA 256 and as such the attack occurred.

Therefore, The type of attack in the case above that a person need to consider first, is Misconfiguration attack.

Learn more about Misconfiguration attack from

https://brainly.com/question/15702398

#SPJ1

A company's prospectus includes:
A) The company's investment options.
B) The company's guaranteed return strategy.
C) The company's revenue and net worth.
D) The company's research.

Answers

A company's prospectus includes: A. The company's investment options.

What is a prospectus?

A prospectus can be defined as a legal document that is formally required of companies by and filed with the Securities and Exchange Commission (SEC), so as to provide information about its investment options and offering that are for sale to the public.

This ultimately implies that, a company's prospectus must include information about the company's investment options.

Read more on prospectus here: https://brainly.com/question/27245796

#SPJ1

The more disks that are added to the tower, the more difficult the game becomes. What is the minimum number of moves it would take to move two disks from one peg to the other

Answers

The minimum number of moves it would take to move two disks from one peg to the other is first to make 1 move, then  3 moves.

What is the rule used in solving the Tower of Hanoi?

In the rules of this game, It state that just one disk is one that can be moved in case of some towers at any given time.

Note that just the "top" disk is one that can be removed and as such, The minimum number of moves it would take to move two disks from one peg to the other is first to make 1 move, then  3 moves.

Learn more about disks from

https://brainly.com/question/1558359

#SPJ1

Why is cyber security an important part of sending information using digital signals

Answers

Cyber security is an important part of sending information using digital signals. Because it keeps data safe while stored in the cloud and when they are transmitted. Option D is correct.

What are cybersecurity functions?

Analysts in cybersecurity defend an organization's hardware and network infrastructure against hackers and cybercriminals looking to harm them or steal confidential data.

When conveying information via digital signals, cyber security is a crucial component. because it protects data as it is sent and stored in the cloud.

Hence, option D is correct.

To learn more about cybersecurity  refer;

https://brainly.com/question/27560386

#SPJ1

In _________, the process requests permission to access and modify variables shared with others. A) entry section B) critical section C) exit section D) remainder section

Answers

In entry section, the process requests permission to access and modify variables shared with others.

What is Entry section?

Entry Section is known to be an aspect of any given process that tells the entry of a specific process.

Note that it often allows one process to enter and alter the shared variable and as such, In entry section, the process requests permission to access and modify variables shared with others.

Learn more about entry section from

https://brainly.com/question/1637572

#SPJ1

Sandra wants to track product data and uncover patterns in data. She should use a _____. spreadsheet spreadsheet word processor word processor database

Answers

Sandra can track product data and uncover patterns in data if She use a database.

How do you find trends and patterns in data?

A trend is one that can be seen by setting up a line chart. The  trendline is seen or created between a high and a low point.

In the case above, Sandra can track product data and uncover patterns in data if she use a database.

Learn more about patterns in data from

https://brainly.com/question/18892466

#SPJ1

Kim likes what you have offered and agrees. After consulting with your supervisor, you get the equipment from the trunk and begin working. Kim approaches you as you are installing the modem and is a little concerned about customers being on the same network. Kim is afraid that customers will be able to "read" the information from credit cards and sales registers.
a. offer Kim a VPN setup that will secure all network traffic.
b. Offer Kim a hardware firewall and section off the network to prevent customers from being able to read network traffic.

Answers

The VPN setup are:

The use of VPN via your router or

The first step is to make a VPN profile and one need to fill their details from your VPN service.Then use the Windows button by clicking it and then go to Settings > Network & Internet > VPN. select on Add a VPN connection and follow the steps.

Why use VPN?

A VPN is one that set up a secure, encrypted link between your device and a private server, and it is one that hides your traffic from being seen.

Therefore, The VPN setup are:

The use of VPN via your router or

The first step is to make a VPN profile and one need to fill their details from your VPN service.Then use the Windows button by clicking it and then go to Settings > Network & Internet > VPN. select on Add a VPN connection and follow the steps.

Learn more about VPN setup from

https://brainly.com/question/25554117

#SPJ1

Identify the true statements about the approach to privacy around the world. a. Uncertainty concerning the nature, extent, and value of privacy is widespread. b. The United States has the most centralized and consistent approach to personal privacy issues. c. A legal right to privacy as recognized within the United States is acknowledged by all western countries. d. Significant disagreement about privacy exists within the United States.

Answers

Answer:

a. Uncertainty concerning the nature, extent, and value of privacy is widespread.

d. Significant disagreement about privacy exists within the United States.

A security specialist discovers a malicious script on a computer. The script is set to execute if the administrator's account becomes disabled. What type of malware did the specialist discover

Answers

The security specialist has discovers a malicious script on a computer known as a logic bomb.

Is logic bomb a type of malware?

A logic bomb is known to be a form of a malicious program that is set up or ignited if a logical condition is met, such as after a series of transactions have been done, or on a given date.

Therefore, The security specialist has discovers a malicious script on a computer known as a logic bomb.

Learn more about malware from

https://brainly.com/question/399317

#SPJ1

Answer:

Logic Bomb

Explanation:

An accenture technology team located in the us has added a new feature to an existing online ticketing platform. the team would like to have the new feature reviewed by other global teams using individual instances of the platform. which technology, when combined with agile and devops, will help the team receive real-time feedback?

Answers

The technology, when combined with agile and devops, will help the team receive real-time feedback is artificial intelligence (ai).

What is AI artificial intelligence?

Artificial intelligence is known to be a form of simulation that regards to human intelligence acts by machines, mostly computer systems.

Note that in the above case, The technology, when combined with agile and devops, will help the team receive real-time feedback is artificial intelligence (ai).

See options below

intelligent apps

artificial intelligence (ai)

internet of things (lot)

cloud computing

I don't know this yet.

Learn more about Accenture technology from

https://brainly.com/question/25682883

#SPJ1

What are two advantages for computer programmers of using GitHub as a
collaborative tool when writing code?
A. No additional software installation is needed to view different
types of files.
B. Changes can be integrated into the finished main body of code..
C. Group members can indicate on a schedule when they are
unavailable.
D. Developers can share code online so it can be accessed and
worked on from anywhere.

Answers

The  two advantages for computer programmers of using GitHub as a collaborative tool when writing code are:

Changes can be integrated into the finished main body of code.Developers can share code online so it can be accessed and worked on from anywhere.What is GitHub advantages?

GitHub is known to be a form of a website that is made by developers and programmers to help them together to work on code.

The key benefit of GitHub is mainly version control system that gives room for for seamless collaboration and it is one that does not compromise the integrity of the original project.

So, The  two advantages for computer programmers of using GitHub as a collaborative tool when writing code are:

Changes can be integrated into the finished main body of code.Developers can share code online so it can be accessed and worked on from anywhere.

Learn more about computer programmers from

https://brainly.com/question/23275071

#SPJ1

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks

Answers

As Ben is personalizing the card, the wat he can complete the tasks is that he should use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

What is a word processor?

A word processor is known to be a program that helps to work or  processes words. They are Microsoft Word, WordPerfect (Windows only), etc.

Note that, As Ben is personalizing the card, the wat he can complete the tasks is that he should use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

See options below

Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. These are the things he needs to do:Create a list of invitees;Design the card; andPersonalize the card.How should he go about the task?

A. Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.

B. Use a graphics software for step 1, mail merge for step 2, and a word processor for step 3.

C. Use a word processor for steps 1 and 2 and a graphics software for step 3.

D. Use mail merge for steps 1 and 2 and a word processor for step 3.

Learn more about design from

https://brainly.com/question/1212088

#SPJ1

Rob should use a word processor for step 1, a graphics software for step 2, and a mail merge for step 3.

What is a word processor?

A word processor is a word-processing software program that is designed and developed to avail its end users an ability to type, format, adjust and save text-based documents.

In this scenario, Rob should use a word processor to create a list of invitees, a graphics software to design the card, and lastly, a mail merge to personalize the card.

Read more on word processor here: https://brainly.com/question/25813601

#SPJ1

Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she’s at home?.

Answers

The cloud technology characteristic that ensures that a cloud customer can make changes to her cloud database from her smartphone is Broad network access.

What is the network about?

Broad network access is known to be a feature of cloud computing as it is seen as  the ability of network tools to be able to link with a large scope or variety of devices.

Note that The cloud technology characteristic that ensures that a cloud customer can make changes to her cloud database from her smartphone is Broad network access.

Learn more about cloud technology from

https://brainly.com/question/19057393

#SPJ1

Write a Java program which declares and populates an array with some values (at least 5 values). Then it should call a method passing it the array. The method should modify the array values using a loop. Lastly, after the program calls the method, it should display the modified array contents to the console.

Answers

Answer:

CODE IN JAVA :

import java.util.*;

public class Main

{

public static void modifyArray(int[] arr, int n){

for(int i = 0; i < n; i++){

arr[i] = -1; // each value is modified to -1

}

}

public static void main(String[] args) {

int n;

System.out.print("Enter size of array(atleast 5): ");

Scanner sc = new Scanner(System.in);

n = sc.nextInt();

int array[] = new int[n]; // array with size n declared

// populating the array

System.out.print("Enter array elements: ");

for(int i = 0; i < n; i++){

array[i] = sc.nextInt();

}

// modifying array via a function

modifyArray(array, n);

// printing array values after modifiction

System.out.print("Array after modification: ");

for(int i = 0; i < n; i++){

System.out.print(array[i] + " "); // space separated

}

}

}

Explanation:

Describe two features of a digital audio workstation that can be used to enhance a podcast

Answers

The two features of a digital audio workstation that can be used to enhance a podcast are DAW is truly vital in case you need expert sounding song. Or in case you need an unprofessional-sounding song.

What are the blessings of the use of a virtual audio workstation?

Digital audio workstations have revolutionized the manner song and audio recordings are made. With surely limitless tune counts, lightning-quick, specific modifying capabilities, plugins, and more, all of us can bounce in and begin recording and mixing.

Regardless of configuration, cutting-edge DAWs have a relevant interface that lets in the consumer to adjust and blend more than one recordings and track right into a very last produced piece. A computer-primarily based totally DAW has a few primary components: a computer, a legitimate card or audio interface, a virtual audio modifying software, and an audio or midi source.

Read more about the workstation :

https://brainly.com/question/24540334

#SPJ1

Database file maintenance typically involves _____. Select all that apply

Answers

The maintenance of a database file typically involves:

A. using log files to recover data.

C. compacting the database.

D. defragmenting the database index.

What is a database?

A database is an organized and structured collection of data that're stored on a computer system as a backup and they're usually accessed electronically.

In database management system (DBMS), the maintenance of a database file typically involves:

The use of log files to recover data.Compacting the database.Defragmenting the database index.

Read more on database here: brainly.com/question/13179611

#SPJ1

Complete Question:

Database file maintenance typically involves _____. Select all that apply

A. using log files to recover data

B. writing new database client software.

C. compacting the database

D. defragmenting the database index.

Which load balancing method is not supported in equal cost multipath (ECMP) load balancing, but is supported in SD-WAN

Answers

The load balancing method that is not supported in equal cost multipath (ECMP) load balancing, but is supported in SD-WAN is Volume load balancing.

What is load balancing?

Load balancing is known to  be one that shares server loads in all of multiple resources  and also in all multiple servers.

Note that this method technique often works to reduce response time, and as such, The load balancing method that is not supported in equal cost multipath (ECMP) load balancing, but is supported in SD-WAN is Volume load balancing.

Learn more about load balancing from

https://brainly.com/question/13088821

#SPJ1

I Need Help with 6.1.3 circles in squares in codehs

Answers

The program below is able to calculate the area of a circle inscribed in a Square.

What is a program?

A program is a set of instructions given to the computer with specific end results in mind.

Sample program in Java

// Java Program to find the area of

// an inscribed circle in a square.

import java.io.*;

class GFG {

   

   static double PI = 3.14;

   

   // Function to find area of an

   // inscribed circle in a square.

   static double areaOfInscribedCircle(float a)

   {

       return ( PI / 4 ) * a * a;

   }

   // Driver code

   public static void main (String[] args)

   {

       float a = 8;

   

       System.out.println("Area of an inscribed"

       + " circle: " + areaOfInscribedCircle(a));

   }

}

Learn more about programs at :
https://brainly.com/question/1538272
#SPJ1

Which computer use microprocessor as its CPU ?

Answers

Microcomputer

Microcomputer was formerly a commonly used term for personal computers, particularly any of a class of small digital computers whose CPU is contained on a single integrated semiconductor chip. Thus, a microcomputer uses a single microprocessor for its CPU, which performs all logic and arithmetic operations.

You can use the keyboard/mouse, Insert Function box, and Sum button menu to insert functions in a formula. Which method do you prefer

Answers

The preferred method is using the keyboard/mouse to insert functions into formula

How to determine the preferred method?

The scenarios are given as:

Insert functions using the keyboard/mouse Insert functions without using the keyboard/mouse

Using the keyboard and the mouse to insert functions would be faster and more efficient, compared to not using the keyboard and the mouse

Hence, the preferred method is using the keyboard/mouse

Read more about keyboard and mouse at:

https://brainly.com/question/1245638?source=archive

#SPJ1

Nolan is writing an after action report on a security breach that took place in his organization. The attackers stole thousands of customer records from the organization's database. What cybersecurity principle was most impacted in this breach

Answers

The cybersecurity principle was most impacted in this breach is known to be confidentiality.

What is confidentiality?

Confidentiality is a term that connote the act of respecting a person's privacy, and not sharing personal or any sensitive information about a person to others.

Note that, The cybersecurity principle was most impacted in this breach is known to be confidentiality.

Learn more about confidentiality from

https://brainly.com/question/863709

#SPJ1

What tab must be configured for a user to obtain remote access?

Answers

Answer:

Click the Dial-in tab

Explanation:

Click Start, point to Administrative Tools, and then click Active Directory Users and Computers. Right-click the user account that you want to allow remote access, and then click Properties. Click the Dial-in tab, click Allow access, and then click OK

write a c program to find area of rectangle using user defined function.​

Answers

Answer:

// C Program to Find Area of Rectangle

#include <stdio.h>

int main() {

   float length, width, area;

   printf("Enter the length & width of the rectangle::\n");

   scanf("%f", &length);

   scanf("%f", &width);

   // It will calculate area of rectangle

   area = length * width;

   // It will print the final output

   printf("\nArea of the rectangle is: %f units\n", area);

   return 0;

}

Hope This Helps!!!

Make up a python program that can do the following
Write a program to ask the user to input the number of hours a person has worked in a week and the pay rate per hour.​

Answers

The program to ask the user to input the number of hours a person has worked in a week and the pay rate per hour is as written below.

How to write a Python Program?

To write this program, we will pay the hourly rate for the hours up to 40 and 1.5 times the hourly rate for all hours worked above 40 hours. Thus

hrs = input("Enter Hours:")

h = float(hrs)

xx = input("Enter the Rate:")

x = float(xx)

if h <= 40:

 print( h  * x)

elif h > 40:

print(40* x + (h-40)*1.5*x)

Read more about Python Program at; https://brainly.com/question/26497128

#SPJ1

2. How can Tailwind Traders ensure applications use geo-redundancy to create highly available storage applications?

Answers

Tailwind Traders CAN ensure applications use geo-redundancy to create highly available storage applications by:

Running one's application in read-only mode.Enforcing its use.

What is geo redundant storage?

Geo-redundant storage (GRS) is known to be a device that tends to copy one's data synchronously three times in the same or inside a single physical location in the primary region via the use of LRS.

Note that in the case above,  Tailwind Traders CAN ensure applications use geo-redundancy to create highly available storage applications by:

Running one's application in read-only mode.Enforcing its use.

Learn more about Geo-redundant storage from

https://brainly.in/question/6073238

#SPJ1

Other Questions
While there can be a group of artists that create a script, this is usually accomplished by the ______. Everything else held constant, when output is ________ the natural rate level, wages will begin to ________, increasing short-run aggregate supply. Three ropes A, B and C are tied together in one single knot K. (See figure.)If the tension in rope A is 65.3 N, then what is the tension in rope B? How and why do scientists try to remove bias from their experimentation? 2. What has happened to the rest of the houses in the neighborhood?There will come soft rainsPlease answer what is the probability of hitting a triangle on this dashboard? Vernon Taber deposits $600 into an ordinary annuity after each quarter for 4 years. The account pays 4% interest compounded quarterly. Find the a) future value, and b) total interest earned. The symptom of PTSD that involves reliving a trauma over and over mentally, including the emotional and physiological reactions is How does codominance at the molecular level help to explain why evolutionary processes haven't resulted in the elimination of the sickle-cell allele among people of African descent Question 2 of 10If a basketball player missed 53 free throws out of 100, what fraction andwhat percentage of free throws did the player make? Choose two answers. A convenience store recently started to carry a new brand of soft drink. Management is interested in estimating future sales volume to determine whether it shouldcontinue to carry the new brand or replace it with another brand. The following table provides the number of cans sold per week. Use both the trend projection withregression and the exponential smoothing (let a=0.4 with an initial forecast for week 1 of 574) methods to forecast demand for week 13. Compare these methods byusing the mean absolute deviation and mean absolute percent error performance criteria. Does your analysis suggest that sales are trending and if so, by how much?25Period 13 4574 635 652 739 679Saleswith regression forecast.(Enter your response rounded to the nearest whole number.)(1) Obtain the trend projectionThe forecast for week 13 is6637772386919773107181165612729 The audit committee is required by U.S. law to be: The table shows the information about the length of time, in minutes, it took students to do their maths homework.Draw a histogram. Lindsay is planning a flight from St. Catherines to Hamilton, which lies due west of St. Catharines.Her aircraft flies at a speed of 200 km/h in still air. A wind of 50.0 km/h is blowing from [W 60.0 N].In what direction must she aim the aeroplane to fly directly to Hamilton? (KU, TI) In modern times, people have lots of different opinions about who or what determines our lives. Many people have faith that a divine being is in control of our lives, and that we are just moving along a course that's been determined for us from birth. In that sense, we may feel as though we make our own choices, but in fact, that higher power is directing our choices. Create ONE post that answers the following prompt. According to modern people, who or what determines the outcome of people's lives? Is that similar to or different from what the ancient Greeks thought? Do you believe in fate? Why or why not? Review the debate between former presidents, Jimmy Carter and Ronald Reagan. In a three paragraph essay of (4-5sentences each), write an evaluation with evidence to support which candidate proposed a more compelling argument aboutinflation.kSupport your claim with specific data presented by each of the candidates. Be sure to mention a minimum ocounterpoint, and refute this point with evidence. A compound was decomposed and determined to be 51.27 % C, 7.75 % H and 40.98 % O by mass. What is the subscript for H in the empirical formula for this compound? 1. A scene that does not build to the climactic moment you expected is called a(n). Jury isselectedProsecutionand defensepresentevidence attrial?Which phrase best completes the diagram of the trial process?Defendant issentencedA. Jury deliberates and reaches a verdictB. Defendant is required to pay a large fineC. Prosecution gathers additional evidence against defendantD. Judge decides whether a case will be criminal or civil Triangle A B C has centroid G. Lines are drawn from each point through the centroid to the midpoint of the opposite side to form line segments A F, B D, and C E. The length of line segment A G is 19 x + 14 and the length of line segment D G is 9 x + 2.G is the centroid of triangle ABC.What is the length of GF?units