XYZ University wants to set up a VPN network to connect to the internet and ensure that all their data is safe. They have asked you to recommend the correct communication protocol to use. Which of the following protocols should you recommend and why?
a. HTTPS, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties.
b. IPsec, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties.
c. TLS, because it is used to secure communications between a browser and a web server. This ensures data is safe in communications across the network.
d. SSH, because it is used to secure communications between a browser and a web server. This ensures data is safe in communications across the network.
Answer: b. IPsec, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties.

Answers

Answer 1

The correct answer is option B:

b. IPsec, because it authenticates that the packets received were sent from the source and ensures that no other party can view the contents. It manages the keys to ensure that they are not intercepted or used by unauthorized parties.

What is IPsec?

Several protocols collectively known as IPsec are used to establish secure connections between devices. It contributes to the security of data transmitted over open networks. It works by encrypting IP packets and authenticating the source from which the packets originate. IPsec is frequently used to set up VPNs.

Internet Protocol and secure are both abbreviated as IP and sec, respectively, in the term "IPsec." The main routing protocol used on the Internet is called the Internet Protocol, and it uses IP addresses to specify where data will go. Authentication and encryption are added to this process by IPsec, making it more secure.

Learn more about IPsec

https://brainly.com/question/17299146

#SPJ1


Related Questions

In C++, When addressing variables in memory, addresses for some data-types (such as int, float and double) must be a multiple of 2, 4 or 8.
TRUE OR FALSE

Answers

True, in C++ you may use the & operator to get the memory address of a variable, as in: cout I endl; The output of that cout is the memory address of the first byte of the newly created variable i.

What operator can be used to determine a data type or variable's memory capacity in bytes?

The size that a data type represents can be determined by using the sizeof operator. For instance: sizeof(int); When used with a type name, the sizeof operator returns the total amount of memory that an object of that type can use, including any internal or tail padding.

Which of the following operators allocates memory for an object?

The new command returns a reference to the object after dynamically allocating memory for it. This reference points to the location in memory of the object that new allocated.

To know more about variable visit:-

https://brainly.com/question/17344045

#SPJ4

Instructions: Assume that there is a Vole program stored in memory at address 0x00, as illustrated in the table below. Trace the execution of the program step-by-step, and write down the contents of

the program counter (PC);
the instruction register (IR); and
the memory cell at address 0x02
at the end of each fetch phase of the machine cycle until the machine halts.

Memory Address Contents
0x00 0x22
0x01 0x11
0x02 0x32
0x03 0x02
0x04 0xC0
0x05 0x00

Answers

It is a language with codes. Using a total of 16 bits, which are also represented by hexadecimal numerals, the instructions are encoded. Thus, option C is correct.

What is the Vole program stored in memory at address?

The operation field of the register and the op-code make up a vole machine's instructions. The operation field has the final 12 bits, and the first 4 bits are known as the op-code.

The program counter is the register that holds the address of the subsequent instruction. The program counter (therefore the word counter) typically increments by one after each instruction is executed to hold the address of the subsequent instruction.

Therefore,  0×02 0×32 the memory cell at address 0×02 at the conclusion of each fetch phase of the machine cycle until the machine halts. The instruction register (IR).

Learn more about Vole here:

https://brainly.com/question/28197647

#SPJ1

Programming style refers to the way a programmer uses elements such as identifiers, spaces, and blank lines

Answers

Answer

Absolutely true.

Explanation

i.e:

bool test = false;

bool test=false;

bool bTest=false;

bool bTest = false;

if(test) {

}

if (test) {

}

if(test)

{

}

if (test)

{

}

if ( test )

{

}


Style can refer to quite a bit of things but that statement is true.

You work at a computer repair store. You want to use the RAID feature on the motherboard to configure two RAID arrays. You have installed five new SATA hard drives in the computer. You have installed Windows on the first drive, and you want to use the other four drives in your RAID arrays.
In this lab, your task is to complete the following:
Configure RAID for the SATA drive mode.
Define LD1 as a striped array using all of the space on two disks.
Define LD2 as a mirrored array using all of the space on two disks.
If you miss the keystrokes for entering the BIOS or RAID configuration utility, select Send Ctrl + Alt + Del at the bottom of the screen to restart the computer.

Answers

Create a RAID 5 array to provide both fault tolerance and increased performance. A RAID 0 array increases performance only, while a RAID 1 array provides only fault tolerance. Install three disks to create RAID 5 array. A RAID 5 array requires a minimum of three disks.

What is RAID 5 used for?

RAID 5 is one of the most common RAID configurations and is ideal for application and file servers with a limited number of drives. Considered a good all-around RAID system, RAID 5 combines the better elements of efficiency and performance among the different RAID configurations.

What is RAID 10 vs RAID 5?

A RAID 10 configuration can tolerate the failure of one of its physical disks. If more than one disk fails, data is not recoverable. A RAID 5 configuration can tolerate the failure of one of its physical disks. If more than one disk fails, data is not recoverable.

To know more about RAID 5 visit;

https://brainly.com/question/14669307

#SPJ4

A flowchart is a way to visually represent an algorithm. The flowchart below is used by an application to set the Boolean variable available to true under certain conditions. The flowchart uses the Boolean variable weekday and the integer variable miles.
BlockExplanationOvalThe start or end of the algorithmDiamondA conditional or decision step, where execution proceeds to the side labeled true if the condition is true and to the side labeled false otherwiseRectangleOne or more processing steps, such as a statement that assigns a value to a variable
Which of the following statements is equivalent to the algorithm in the flowchart?Selected Answer: [None Given]Answers:
weekday ad miles < 20

Answers

The statement that is equivalent to the algorithm in the flowchart is weekday ad miles < 20

What is an algorithm diagram?

An algorithm is graphically depicted in a flowchart. It is frequently used by programmers as a technique for planning programs to address issues. It employs interconnected symbols to represent the movement of information and processing. "Flowcharting" is the process of creating a flowchart for an algorithm.

Note that there are Two distinct techniques, algorithms and flowcharts, are useful for developing new programs, particularly in computer programming. A flowchart illustrates the steps of a program while an algorithm provides a step-by-step examination of the process.

Learn more about algorithm from

https://brainly.com/question/24953880
#SPJ1

________ allow(s) a commercial software package or cloud-based software to be modified to meet an organization's unique requirements without destroying the integrity of the software.

Answers

Customization features allow(s) a commercial software package or cloud-based software to be modified to meet an organization's unique requirements without destroying the integrity of the software.

What is Customization System?

As the name suggests, they are those developed or adapted to meet the specific needs of the company. In this sense, they differ from the so-called “off-the-shelf software”, which are those that are ready to be installed.

By customizing the benefits, you give the decision-making power to him, changing the focus from the product to the customer. With this, it is possible to choose what is in fact relevant to him at that moment.

See more about Customization features at brainly.com/question/29594386

#SPJ1

Give a scenario where choosing a large file system block size might be a benefit; give an example where it might be a hindrance.

Answers

Answer:

One scenario where choosing a large file system block size might be a benefit is when the file system is used to store large files, such as video or audio files. In this case, a larger block size can reduce the number of blocks needed to store the file, which can improve performance by reducing the amount of disk seek time required to access the file.

An example of where a large file system block size might be a hindrance is when the file system is used to store many small files, such as text files or images. In this case, a larger block size can result in wasted space because each block may contain only a small amount of data from a single file. This can reduce the overall capacity of the file system and may cause performance issues if the file system becomes fragmented.

you currently run mysql rds database instance and you need to upgrade to a more scalable database that offers high performance and high availability. which of the following database instances should you migrate/update to?

Answers

Answer:

Aurora................

Explanation:

Identify different steps of starting a business.​

Answers

Answer: hope your buissness goes well if your starting one/ hope this helps

Explanation:

Conduct market research. Market research will tell you if there's an opportunity to turn your idea into a successful business. ...

Write your business plan. ...

Fund your business. ...

Pick your business location. ...

Choose a business structure. ...

Choose your business name. ...

Register your business. ...

Get federal and state tax IDs.

LAB: Instrument information (derived classes) Given main() and the Instrument class, define a derived class, StringInstrument, for string instruments. Ex. If the input is: Drums Zildjian 2015 2500 Guitar Gibson 2002 1200 6 the output is: Instrument Information: Name: Drums Manufacturer: Zildjian Year built: 2015 Cost: 2500 Instrument Information: Name: Guitar Manufacturer: Gibson Instrument Information: Name: Drums Manufacturer: Zildjian Year built: 2015 Cost: 2500 Instrument Information: Name: Guitar Manufacturer: Gibson Year built: 2002 Cost: 1200 Number of strings: 6 Number of frets: 19 file: 8.10.1: LAB: Instrument information (derived classes) is marked as read only Current file: Instrument.java - 8.10.1: LAB: Instrument information (derived classes)

Answers

class StringInstrument extends Instrument {

  private  int numStrings, numFrets;

  public int getNumOfStrings() {

  return numStrings; }

   public void setNumOfStrings(int numStrings) {

   this.numStrings = numStrings;  }

  public int getNumOfFrets() {

  return numFrets; }

 public void setNumOfFrets(int numFrets)

  this.numFrets = numFrets; } }

What sort of instruments are strings?

The violin is the smallest member of the string family, followed by the viola, cello, and the largest member of the family, the double bass, also known as the contrabass.

What materials are used in stringed instruments?

Any musical instrument that makes sound through the vibrating of stretched strings, whether they are made of silk, animal gut, metal, or synthetic materials like plastic or nylon, is referred to as a stringed instrument.

To know more about string visit:-

https://brainly.com/question/4087119

#SPJ1

Write a code for Karol with proper indentation and style.

Answers

The code for Karol with proper indentation and style will be:

function start(){

for (var i = 0; i < 4; i++) {

move();

run();

}

function run(){

if (noBallsPresent()) {

for (var i = 0; i < 8; i++) {

putBall();

move();

}

turnLeft();

}

}

}

What is a program?

A computer program is a set of instructions written in a programming language that a computer can execute. Software includes computer programs as well as documentation and other intangible components.

It should be noted that the start function can be defined as a Coroutine, which allows it to pause its execution (yield). In this case, the code for Karol was given above.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

An inspector counts the number of bad apples in a crate.
A crate with fewer than 3 bad apples is marked excellent.
A crate with three to 7 bad apples is marked questionable.
A crate with more than 7 bad apples is marked spoiled.

Which of the AP exam expressions evaluates to true for questionable crates and false otherwise?

(NOT(bad < 3)) AND (NOT(bad > 7))

(bad ≥ 3) AND (bad ≤ 7)

(NOT(bad < 3)) AND (NOT(bad > 7)), (bad ≥ 3) AND (bad ≤ 7)

(NOT(bad < 3)) AND (NOT(bad > 7)), (NOT(bad < 3)) OR (NOT(bad > 7))

Answers

Answer:

(NOT(bad < 3)) AND (NOT(bad > 7)), (bad ≥ 3) AND (bad ≤ 7)

Explanation:

A(n) Summary function calculates summary statistics including AVERAGE, COUNT, and SUM, using criteria specified in a range.A. TrueB. False

Answers

true, A Summary function calculates summary statistics including AVERAGE, COUNT, and SUM, using criteria specified in a range.

What do the Excel summary functions do?

You can add up your values, count them all together or only the numeric ones, average them, identify the biggest or smallest value within a group of them, multiply them to get their product, or calculate their standard deviation or variance. Subtotals and summaries use the Sum function by default.

In Excel, where is the summary function?

To change a cell in the Value field, perform a right-click. Simply select Summarize Values By from the pop-up option. Select the Summary Function you want to utilize by clicking on it.

What three purposes does summarizing serve?

Summaries serve the following three purposes:

(1) They make an article's content clear, assisting readers in determining whether or not they want to read it;

(2) they assist readers in organizing their ideas around what will come next; and

(3) they assist readers in remembering key elements of the piece.

Learn more about excel functions here:

brainly.com/question/10307135

#SPJ4

Which of the following is a special group that provides its members with the ability to run the su and sudo commands?
a. sudoers
b. adm
c. wheel
d. sys

Answers

Answer:

A

Explanation:

From the options given below, choose the lead that provides the most direct transverse plane view of the interventricular septum of the heart.
a. lead V1
b. lead V3
c. lead V5
d. lead V7

Answers

The interventricular septum of the heart can be seen most clearly in the transverse plane through lead V1.

Which leads track the electrical activity of the heart's frontal plane?

The strength of the electrical signal is measured in certain directions inside the frontal plane by the standard and augmented limb leads. The unipolar chest leads measure the potential difference between the chest's surface and an unrelated composite electrode.

Which precordial lead offers a transverse view of the anterior wall of the left ventricle?

Groups of the precordial chest leads can be used to see various parts of the heart. The anterior leads, also known as leads V1, V2, V3, and V4, collectively provide a clear view of the anterior region of the heart. Together, leads V5 and V6 scan the left ventricle's lateral wall.

To know more about transverse visit:-

https://brainly.com/question/13618693

#SPJ4

Max is a cybersecurity professional. His job responsibilities include creating a risk management plan and employing additional safety practices. What
position does Max hold in his organization?

A chief information security officer
B. information assurance manager
C. penetration tester
D. network security engineer

Answers

Since Max is a cybersecurity professional. The position that Max hold in his organization is option D. network security engineer.

Who is responsible for risk management?

The President (Chair) and those in charge of the various business areas make up the Management Group, which is in charge of implementing risk management, keeping an eye on operational hazards, and taking risk-related action.

The following hardware and software systems are installed, configured, and maintained by a network security specialist in order to assure network security: deploys, evaluates, and maintains security tools like email encryption, firewalls, and VPNs.

Therefore, the network security engineer defends computer systems against online dangers such viruses, malware, and hacking attempts. The IT expert should be able to recognize current problems and create defenses against potential dangers. Systems' hardware and software must be tested and configured.

Learn more about network security engineer from

https://brainly.com/question/28558870
#SPJ1

Answer: information assurance manager

Explanation:

will edit if I'm wrong

Identify a logical operation (along
with a corresponding mask) that, when applied to an input string of 8 bits, produces an output string of all 0s if and only if the input string is 10000001.
and Write and test a short Python script to implement the previous question.

Answers

The logical operation that, when applied to an input string of 8 bits, produces an output string of all 0s if and only if the input string is 10000001 is OR.

What is a logical operation?

A binary variable function whose output is also a binary variable. In digital circuits, logic gates perform logical operations. AND, OR, NOT, and combinations of those operations are examples of logical operations.

They are useful for connecting logical formulas. For example, in propositional logic syntax. When both bits are different, XOR, exclusive OR returns 1. So, if we want all 0s and the for input only 10000001, there is only one operation that meets this condition: XOR 10000001. AND with 00000000 would also return 0, but with all inputs, not just 10000001.

Learn more about program on:

https://brainly.com/question/24833629

#SPJ1

to select a command using the keyboard, you can press the letter or number displayed in a keytip, which may cause additional keytips related to the selected command to appear.

Answers

True, to select a command using the keyboard, you can press the letter or number displayed in a keytip, which may cause additional keytips related to the selected command to appear.

What is command statement?

One form of statement that tells someone what to do is a command. Additional sentence types include inquiries, exclamations, and declarations. Usually, but not always, command phrases begin with an imperative (bossy) verb because they demand that the subject take an action.

Because command phrases order someone to do action, they typically—though not always—begin with an imperative (fussy) verb. Examples: The teacher yelled, "Stop talking! The crowd yelled, "Catch the ball!"

A statement that provides the reader a directive, a request, or a command is considered imperative.

Read more about command statement:

https://brainly.com/question/10941789

#SPJ4

in data analytics, a pattern is defined as a process or set of rules to be followed for a specific task.
a. true
b. false

Answers

The answer is b. False.

The statement "in data analytics, a pattern is defined as a process or set of rules to be followed for a specific task" is false. The correct option is b.

What is data analytics?

Data analytics (DA) is the act of studying data sets to discover trends and develop conclusions about the information contained within them. Data analytics is increasingly being performed with the assistance of specialist tools and software.

A pattern is a collection of data that follows an identifiable pattern, which analysts try to find in the present data. The majority of traders trade in the trend's direction. Contrarian investors are traders who trade against the trend. Most chart patterns are built on trendlines.

Therefore, the correct option is b. false.

To learn more about data analytics, refer to the link:

https://brainly.com/question/29109220

#SPJ2

There is a group of n children standing in a queue, where their ages are listed in the array A[ ]. The children are standing randomly in the queue. Most probably, their ages in the array A[ ] are randomly listed too. For each child, you are required to search for the next older child in the queue and to print the difference of their ages. Print all the outputs in an array Out[ ].

Answers

Answer:

solution for b)

A = [11, 10, 7, 13, 14, 12, 9, 15, 8]

Out = []

for i in range(len(A)):

   if i == len(A) - 1:

       if A[i] < A[0]:

           Out.append(A[0] - A[i])

       else:

           Out.append(-1)

   else:

       if A[i] < A[i + 1]:

           Out.append(A[i + 1] - A[i])

       else:

           Out.append(-1)

print(Out)

Write an algorithm to find the volume of 5 cubes​ ?

Answers

Answer:

V=a3

Explanation:

volume=area times 3

QUESTION 1. Discuss the societal impact of computers including some benefits and is related to their prominence in our society.

Answers

The  societal impact of computers including some benefits and is related to their prominence in our society are given below

Computers have altered how individuals interact with one another and their surroundings, as well as how they manage their time, their job, and their communities. In turn, society has affected the advancement of computers through the demands that individuals have for information processing.

What role does computer science play in our society?

The practice of applying technology to address difficult organizational issues is known as computer science. Computers and technology have been incorporated into almost every economic sector, industry, and even organization operating in the modern economy, which is why this field is so crucial.

Therefore, the benefits that come with utilizing a computer in the society by people are:

It  Boost your productivity.It enables you to access the Internet.It  save a ton of information and cut down on waste.It helps aids in information organization, searching, and sorting.Improve your data understanding.It helps maintains your connection.

Learn more about Computers from

https://brainly.com/question/21474169
#SPJ1

There are various ongoing competitions or complexities facing logistics and transportation companies in managing its supply chain operations either domestically or internationally, from the point of shippers until the point of consumption. These complexities have become a barrier and less competitive force among the other competitors in leveraging the profit margin and to be consistent in the market. Elaborate FIVE (5) competitions or complexities and meantime, propose solutions to overcome those competitions or complexities.​

Answers

Complex network of suppliers, manufacturers, and customers: Logistics and transportation companies often have to manage a complex network of suppliers, manufacturers, and customers, which can be challenging to coordinate and optimize. One solution to this complexity is to implement a supply chain management software that can help track and manage the flow of goods and information throughout the supply chain.

Limited capacity and resources: Logistics and transportation companies may face limited capacity and resources, which can impact their ability to meet demand and deliver goods on time. One solution is to implement just-in-time inventory management, which allows companies to only stock the necessary inventory needed to meet demand and reduce waste.

Volatility in demand and supply: Demand and supply can be volatile, which can make it difficult for logistics and transportation companies to forecast and plan effectively. One solution is to implement demand planning and forecasting tools, which can help companies predict and plan for changes in demand.

High transportation costs: Transportation costs can be a major factor in the logistics and transportation industry, and they can be difficult to manage and control. One solution is to implement a transportation management system (TMS), which can help companies optimize routes and reduce transportation costs.

Regulatory compliance: Logistics and transportation companies must adhere to a range of regulations, including safety regulations, environmental regulations, and trade regulations. One solution is to invest in compliance management software, which can help companies ensure compliance with all relevant regulations.

Your company works seven days a week, however, Sunday night is a slow night with little computer activity. You would like to do a level 0 dump once a week. Then only back up the changes from the previous back the other six days a week. How would you structure your backups:

Answers

Answer: If you would like to do a level 0 dump once a week and then only back up the changes from the previous back the other six days a week, you could structure your backups in the following way:

On Sunday night, when computer activity is low, you could do a full level 0 backup of your system. This will capture all of the data on your system at that point in time.

For the rest of the week, you could do incremental backups. These backups will only capture the changes made to your system since the last backup, rather than backing up the entire system again. This will save time and storage space, as incremental backups are typically much smaller than full backups.

You could then repeat this process every week, with a full level 0 backup on Sunday night and incremental backups on the other six days of the week.

It's important to note that this is just one way to structure your backups. There are many different ways to approach backup and recovery, and the best approach will depend on your specific needs and requirements.

space between characters expands as type size increases; thus, letter spacing in display type typically needs attention.

Answers

As type size increases, letter spacing should also increase to maintain readability and legibility. This is especially important in display type, where the spacing between characters can make or break the overall look of the design.

The Importance of Letter Spacing in Display Type

When designing with type, it is important to take into account the size of the type and the spacing between characters. As type size increases, the spacing between characters should also be increased in order to maintain readability and legibility. This is especially important in display type, where the spacing between characters can make a big difference in the overall look of the design.

By increasing the letter spacing when increasing the size of the type, the text can remain readable and visually appealing. So, when designing with type, remember to pay attention to letter spacing when increasing the size of the type.

Learn more about Writing: https://brainly.com/question/24858866

#SPJ4

14. The Hazard Communication Standard (HCS) is also known as the "right to know" law. A. O True B. O False​

Answers

Answer:

A. True

Explanation:

The Hazard Communication Standard (HCS) is also known as the "right to know" law. This law was enacted in the United States in 1986 and requires employers to provide employees with information about hazardous chemicals that are used in the workplace. The HCS is based on the principle that workers have a "right to know" about the hazards of chemicals that they may be exposed to at work.

write a docstring for this function

Answers

Answer:

def word_wrap(message, length=79):

   """

   Wrap a message to a specified line length.

   Args:

       message (str): The message to be wrapped.

       length (int): The maximum line length. Default value is 79.

   Returns:

       str: The wrapped message.

   """

   lines = message.split('\n')

   output = []

   for line in lines:

       words = line.split(" ")

       if len(words) > 0:

           output_line = words[0]

           for word in words[1:]:

               if len(output_line + f' {word} ') > length:

                   output.append(output_line)

                   output_line = f"{word}"

               else:

                   output_line = f"{output_line} {word}"

           output.append(output_line)

   return '\n'.join(output)

Which of the following activities are considered passive in regards to the functioning of an intrusion detection system? (Select two.)- Listening to network traffic- Transmitting FIN or RES packets to an external host- Monitoring the audit trails on a server- Disconnection a port being used by a zombie

Answers

A: Listening to network traffic and C: Monitoring the audit trails on a server are considered passive activities in regard to the functioning of an Intrusion Detection System.

An Intrusion Detection System (IDS) refers to a system that monitors network traffic for suspicious activities and issues alert when such activities are discovered. An intrusion Detection System is a software application that scans a network or server for harmful activities or policy breaches. Any malicious venture or violation activity is reported either to an administrator or collected centrally using a SIEM or security information and event management system. A SIEM  integrates outputs from various sources and uses alarm filtering mechanisms to differentiate malicious activities from false alarms.

You can learn more about Intrusion Detection System at

https://brainly.com/question/28962475

#SPJ4

Neutrik etherCON ports must be populated by Neutrik etherCON cables.

True. Neutrik connectors cannot connect with standard network cables.
False. The Neutrik etherCON port provides an RJ45 at the center and thus it does accept standard Ethernet cables.

Answers

Neutrik connectors cannot connect with standard network cables is false.

The Neutrik etherCON port provides an RJ45 at the center and thus it does accept standard Ethernet cables is false.

What exactly is Neutik EtherCON?

Ethernet cables are said to be frequently used to connect devices to a local network and to offer internet access. They attach to various devices' Ethernet ports. Connecting a WiFi router or modem to the internet access port or phone line is the most typical application for an Ethernet cable.

Therefore, In regards to Pro audio, video, and lightning network applications are best served by the etherCON Series, a lockable, ruggedized RJ45 connector system. The chassis connectors have a shape that makes it easy for them to attach to panels that are standardized in the entertainment sector. The above statement are false because they are incorrect.

Learn more about cables from

https://brainly.com/question/28227640
#SPJ1

The ___ utility allows you to create a copy of your entire hard drive on an external hard drive.
A. Backup and Restore
B. Scan Disk
C. Disk Copy
D. System Image

Answers

D. System Image is the answer
Other Questions
for the spectrochemical series as a whole, which of the following correctly describes the factors that lead to a ligand being strong field? [tex]\int\limits x^3 \sqrt{x^2 +1} dx[/tex] Movement of the chromosomes during anaphase would be most affected by a drug that prevents:a. polymerization of microfilaments.b. depolymerization of microfilaments.c. polymerization of microtubules.d. depolymerization of microtubules.e. none of the above M/J 09/P1/Q1In leaded petrol there isan additive composed of lead, carbon and hydrogen only. This compound contains29.7% carbon and 6.19% hydrogen by mass.What is the value of x in the empirical formula PbCHx?A 5B 6C 16D 20 digital media tend to spread information to most parts of the world in a nearly instantaneous manner. today, we have the opportunity to see and hear stories from faraway places that we might never visit with as much ease as speaking with a friend or family member seated in the next room. what did marshall mcluhan call this reality? Andrea skip counted using this number line to find the product of 4 and 7Which division problem in the same fact family could Andrea use to check her work?A. 04=7B. 74 = 28OC. 144 = 7D. 21+7=4E. 28+7=4 15 POINTS!!!What is a reason social media needs quality digital design?1) to raise stock values2) to enhance the user experience3) to enhance privacy settings4) to block hackers Directions and AnalysisTask 1: Participating in a Student OrganizationsIn the beginning of this course, you received an assignment to join a student organization,such as Family, Career and Community Leaders of America (FCCLA) and be an activeparticipant in all its events and projects. The activity required you to participate in all the activities of the student organization;keep a record of your participation in meetings, programs, and projects; take notes about the history, purposes and goals of the student organization;identify the benefits and responsibilities of membership in the student organization as astudent and in professional/civic organizations as an adult; and use a computer to record the information above and process it to create a slide showpresentation.This activity is now due. Upload the activity log that you have kept through this course.Also, upload the slide show presentation that you have created describing the history, purposes and goals of the student organization that you chose to join; the activities you performed as a member of this student organization; and the benefits and responsibilities of membership in the student organization as a studentand in professional/civic organizations as an adult.Type your response here: Can someone help, please The center for business analytics is considering a refund policy for no-shows. No refund would be given for members who do not attend, but non members who do not attend will be refunded 50% of the price. Build a spreadsheet model that calculates a profit or loss based on the number of nonmember registrants. Account for the fact that, historically, 25% of members who registered do not show and 10% of registered non members do not attend. The center pays the caterer for breakfast and lunch based on the number of registrants (not the number of attendees). However, the center only pays for parking for those who attend. What is the profit if each corporate member registers their full allotment of tickets and 127 nonmembers register? if required, round your answers to two decimal places HELPPPPPPPZZZZ!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! PLEASE DONT JUST TAKE MY POINTS I NEED SOMEONE ELSES PERSPECTIVERespond to the following in at least 3 sentences:What is one topic you could write an informational text about? How do you know so much about this topic?. What best describes the roles of photosystem i and photosystem ii in the process of photosynthesis?. The Safavid Empire did what that still impacts geopolitics todayO Created the boundaries of the Belgian congoRequired all muslims within it's bounds to become ShiaO Invaded EgyptO All of the aboveO None of the above What is the area of the consideration of other model that addresses the deficiencies young Soldiers and Officers have regarding the meaning behind military signs, symbols, customs, and traditions, which they see and experience every day? Please Help!!!! I will Brainlist!!! The question is in the picture! Find the Surface area of the composite figure. Asking again because I could not include the graph beforePLEASE include an explanation of some sort:1: A 75.0 kg astronaut is training for accelerations that he will experience upon reentry. He is placed in a centrifuge (r = 20.0 m) and spun at a constant angular velocity of 15.0 rpm (revolutions per minute). He is then slowed and brought to a stop in 2.0 minutes.(1a) Find the magnitude and direction of the centripetal acceleration and force when he is spinning at constant angular velocity.(2a) How many gs is the astronaut experiencing when moving at constant angular velocity?(3a) Find the torque that is needed to bring the centrifuge to a stop knowing the centrifuge has a mass of 5500.0 kg (ignore all other forces) and the force is applied at the edge of the centrifuge (20.0 m radius). Hint: torque is based on the change of linear velocity.2: An astronaut lands on an alien planet. He places a pendulum (L = 0.200 m) on the surface and sets it in simple harmonic motion, as shown in this graph.(graph is in attached image)(2a) What is the period and frequency of the pendulums motion?(2b) How many seconds out of phase with the displacements shown would graphs of the velocity and acceleration be?(2c) What is the acceleration due to gravity on the surface of the planet in m/s2? Determine the number of g-forces. Write a 250-word essay explaining how the quotes you selected link all the themes of each of the stories.Use specific examples that illustrate the tone, style, and word choices each author selects to communicate the theme. though the director sets the pace for a production, the pace and rhythm of a production ultimately becomes the responsibility of its performers. State True or False your answer: a. Trueb. False