mary is interested in moving into a career as a penetration manager. which of the following it certifications should she pursue? CEH, CISM, CISSP

Answers

Answer 1

Pursuit of a CEH certificate you can find employment in one of the IT industries that is expanding the quickest with this qualification.

What does penetration serve to accomplish?Penetration testing's primary goal is to assess how likely it is that systems or end users will be compromised and to assess any potential effects that might result from such an incident on the resources or operations that are at stake.Typically, testers that are ethical hackers will conduct pen tests. These IT professionals are ethical hackers that assist businesses in locating potential entry points into their infrastructure by using hacking techniques.   Pursuit of a CEH certificate You can find employment in one of the IT industries that is expanding the quickest with this qualification.    

To learn more about Penetration testing's refer to:

https://brainly.com/question/26555003

#SPJ4


Related Questions

How do you make a spreadsheet with formulas to show foriegn currency

Answers

Excel's Simple Currency Conversion function can be used to create a spreadsheet containing formulas to display foreign currencies is VLOOKUP(C2,F2:G7,2,0)*A2.

How can I have Excel perform currency conversions automatically?All you have to do is visit the sheet that has the exchange rates. Refresh All may be found under Queries & Connections > Refresh All. The currency conversion formula used by Excel would automatically update in addition to refreshing the exchange rates imported from the internet.Excel's Simple Currency Conversion function can be used to create a spreadsheet containing formulas to display foreign currencies: =VLOOKUP(C2,F2:G7,2,0)*A2. The Vlookup syntax finds the currency in the Excel Table, then gets the current exchange rate from column G and converts the USD value.        

To learn more about Currency conversion formula refer to:

https://brainly.com/question/17906368

#SPJ1

Analyze and compare iOS and Android operating systems (OS) to accurately differentiate between the two. (Select all that apply.)
Android releases updates often, while iOS is more sporadically released.
iOS is limited to Apple products, while Android has multiple hardware vendors.
Android is an open source OS based on Linux, unlike iOS, which is a closed and proprietary system.
iOS is more vulnerable to attack due to being a closed source, while Android is more secure with multiple partners working to secure the OS.

Answers

iOS is only compatible with Apple devices, but Android supports a variety of hardware manufacturers and is open source platform based on Linux, in contrast to iOS, and that's a closed or patented system.

Describe operating systems in simple terms.

An software (OS) is the software that controls most other application applications running on a computer after being installed into the system first by a boot program. Throughout a stated api, the network applications seek services first from software (API).

What function does OS serve?

The most crucial bit of technology that runs on a machine is the operating system. This then handles the resources, functions, program, and hardware of the computers. We can interact only with computer using this method even if you don't understand its language.

To know more about Operating system visit:

https://brainly.com/question/1763761

#SPJ4

HS Computer Science Questions

Answers

The CPU is in charge of carrying out a program, which is a collection of stored instructions. An input device will be used to provide input for this application, which will then process the input and report the results to an output device.

What computer work with input, output processing?

1.Typed text, mouse clicks, and other methods of entering data into a computer system are examples of input. Processing is the process of converting input data into output data. Output is what the computer produces after analysing the input—the visual, aural, or tactile experiences.

2. A directory structure is a type of container for files and folders. It uses a hierarchical structure to organize files and directories. A directory can be logically organized in a number of ways, some of which are listed below. The single-level directory is the simplest type of directory structure.

3. Data flow is the key of programming. Data is available for a programmer to input into a program. The software can interpret the input data using its own data. All of this information can be combined to represent concepts and benefit the user and the program.

Therefore, A computer is a tool that can be configured to take in data (input), transform it into information that is useful (output).

Learn more about computer here:

https://brainly.com/question/13976978

#SPJ1

which of the following statements is true? you can open multiple documents at once by control-clicking or shift-clicking in the splash screen. you can open multiple documents at once by control-clicking or shift-clicking in the open dialog box. you can only open one document at a time in photoshop. you can open multiple documents at once by choosing select all in the import dialog box.

Answers

Answer: The answer is  you can open multiple documents at once by choosing select all in the import dialog box.

Explanation: Hope this was helpful

Answer:

u can open multiple documents at once by choosing select all in the import dialog box

hope this helps

In the United States, the primary path to privacy is via __________, whereas in Europe and other countries, it is via __________.
A. opt-in; opt-in
B. opt-in; opt-out
C. opt-out; opt-out
D. opt-out; opt-in

Answers

In the United States, the primary path to privacy is via opt-out, whereas in Europe and other countries, it is via opt-in.

What are opt out opt in paths of privacy?

The majority of significant privacy laws around the world, including the CCPA (California's Consumer Privacy Act) and the GDPR (General Data Protection Regulation) in Europe, now require that businesses give data privacy top priority when undertaking particular data collection and processing activities.

This necessitates the creation of simple, efficient procedures on websites that allow users to grant consent (also known as "opting in") or deny consent (commonly known as "opting out") for the purpose of revoking consent at any time.

Users must essentially provide their consent and take positive action in order to opt-in. Opt-in is used to consent to or accept something, to put it simply. Opt-out refers, as the name suggests, to the primary action consumers take to withdraw their consent. Opting out, to put it simply, is the action of users declining or withdrawing their consent in response to a certain event or process.

To know more about  opt out opt in refer:

https://brainly.com/question/8444030

#SPJ4

3. Use either summation notation or instruction count method to measure time complexity for the following function. void printPairs(int arr[], int n){ for(int i=0; i

Answers

Summation Notation: T(n) = Σ(i=0 to n-1)Σ(j=i+1 to n-1)1 = (n-1)(n-2)/2 = O(n^2)
Instruction Count Method: T(n) = 3n + 2(n-1)(n-2)/2 = (3n + n^2 - 3n -2)/2 = O(n^2)

What is time complexity ?
Time complexity is the measure of how long it takes for an algorithm or program to execute and complete its task. It is typically expressed in terms of the amount of time required to complete a program as a function of the size of the input. In other words, the time complexity of an algorithm is the amount of time it takes to run a certain number of instructions for a given input size. Time complexity can help determine the efficiency of an algorithm and can also be used to compare different algorithms for the same problem.

To know more about time complexity
https://brainly.com/question/28014440
#SPJ4

what is the path you have to follow in order to change the font of a selected text?​

Answers

Answer:

Go to font dialogue box then select another font.

Explanation:

You can choose another font by going to the dialogue box and choose a different font.

First you I would say type a word like Apple

Then use your cursor and highlight over it it should turn blue

Then go to the top and find font or it would say style

Then click whatever font you would like to change it to

There is fonts like Sans script, Times new Roman , Comic Sans, Arial etc…

Going from my previous question... Your system crashes on Friday. How would you restore your system using the dump levels that were used in the previous questions

Answers

Testing backups is as important as data backup & restoration. Data backup's main objective is to enable data restoration in the future.

What happens when system crashes?

When it comes to computers, a crash is when a program or the operating system stops working properly. When: Hardware has failed in a way that cannot be repaired. Data in the operating system have become tainted.

What causes a system to crash?

Errors in the computer hardware or the operating system (OS) cause computers to crash. Although software faults are undoubtedly more frequent, hardware errors can be extremely damaging and are more difficult to detect. In order for a computer to operate properly, a number of hardware components

To know more about system visit:

brainly.com/question/17313982

#SPJ1

when would it make sense not to use database system ​

Answers

 not needed for the user as it can cast a huge amount and overheads of purchasing the database and maintaining it:

Explanation:

Telnet is inherently insecure because its communication is in plaintext and is easily intercepted.
Which of the following is an acceptable alternative to Telnet?
Remote Desktop
SSH
SLIP
SHTTP

Answers

The most crucial factor is that SSH is significantly more secure than Telnet, which has led to Telnet nearly entirely being replaced in daily use. SSH uses different standard ports than Telnet does.

SSH vs. SSL: what are the differences?

SSH is used to establish a secure tunnel to another computer from which you may issue instructions, transfer data, etc. This is the primary distinction between SSH and SSL. On the other hand, SSL is used to securely send data between two parties; unlike SSH, it does not allow you to issue commands.

Which encryption standards employ RSA?

For digital signature and encryption purposes, RSA is used by numerous protocols, including Secure Shell (SSH), OpenPGP, S/MIME, and SSL/TLS.

Learn more about network here:

https://brainly.com/question/29350844

#SPJ4

Use the most appropriate notation among O, Q, and W to indicate the time efficiency class of sequential search a) in the worst case. b) in the best case. c) in the average case.

Answers

Notation(O) is used to measures the worst case time complexity. In the best case, the time complexity of Linear Search is O. (1). In the worst-case scenario, the time complexity is O. (n).

What is linear search ?A linear search, also known as a sequential search, is a method of finding an element within a list in computer science. It checks each element of the list in turn until a match is found or the entire list has been searched.Linear search is usually very simple to implement and useful when there are only a few elements in the list or when performing a single search in an un-ordered list.When searching for multiple values in the same list, it is often advantageous to pre-process the list in order to use a faster method. For example, one could sort the list and perform binary search on it, or construct an efficient search data structure from it.If the list's content changes frequently, repeated re-organization may be more trouble than it's worth.

To learn more about linear search refer :

https://brainly.com/question/26533500

#SPJ1

Consider a Shortest Job First (SJF) CPU scheduler, with the following process workload:
Process Arrival Time CPU Burst
P1 t 5
P2 t+6 7
P3 t+10 5
P4 t+2 3
P5 t+8 9
P6 t+4 1
Assume that the CPU is free and no other processes exist in the ready queue when P1 enters the ready queue at time t. Determine the schedule of process execution and compute the wait times for each of the above six processes. Which of the following is a TRUE statement about the average wait time and the maximum wait time for the six processes?
A. The average wait time is between 5.0 and 5.5 time units; the maximum wait time is between 11 and 12 time units.
B. The average wait time is between 3.5 and 4.0 time units; the maximum wait time is between 11 and 12 time units.
C. The average wait time is between 4.0 and 4.5 time units; the maximum wait time is between 12 and 13 time units.
D. The average wait time is between 4.0 and 4.5 time units; the maximum wait time is between 11 and 12 time units.

Answers

Answer:

Shortest Job First (SJF) CPU scheduler:- Process Arrival Time CPU Burst P1 t 5 P2 t+6 7 P3 t+10 5 P4 t+2 3 P5 t+8 9 P6 t+4 1 Since we have to deal with the Waiting time therefore we will assume t=0, so that to make our calculations easier.

Can computers be opened from the All programs submenu

Answers

Answer:

I am pretty sure...if not try duck duck go

Which of the following addresses is a nonroutable IPv4 address?answer choices
a) 172.35.193.1
b) 192.169.32.1
c) 168.192.32.1
d) 18.172.32.1

Answers

The address that is a nonroutable IPv4 address is option A: 172.35.193.1

What is a non routable IPV4 address?

The IPv4 address whose ranges are reserved by the IANA for private internets and are not publicly routable on the global internet, in accordance with guidelines outlined in Internet Engineering Task Force (IETF) document RFC-1918are: IP addresses in the 10.0. 0.0/8 range from 10.0. 0.0 to 10.255. 255.255.

Therefore,  one can say that Nonroutable IP addresses are those that are frequently used within a LOCAL Area Network (for example, your home or business) and cannot have their packets transported to (or from!) the Internet.

Learn more about nonroutable IPv4 address from

https://brainly.com/question/29454882
#SPJ1

"Documentation written for programmers should include text and program flowcharts, ________, and sample output as well as system flowcharts.
A) Pseudocode
B) Logic errors
C) Program listings
D) Syntax errors"

Answers

Documentation written for programmers should include text and program flowcharts, Program listings, and sample output as well as system flowcharts. Thus, the correct option is option C.

What is program flowchart?

The program flowchart is a data flow that depicts the data flow while writing a program or algorithm. When working with others, it enables the user to quickly explain the process. These flowcharts for programming also examine the reasoning behind the program to process the programming code.

The use of programming flowcharts is varied. For instance, they can examine, visualize, and work with the codes. In order to understand how a user uses a tool, they can also assist in determining the structure of the application.

The condition and effectiveness of work are improved by the use of programming flowcharts. The device has four fundamental symbols with programming code written on them.

Learn more about flowchart

https://brainly.com/question/6532130

#SPJ1

write a recirsive function named productsof odds that accepts a tuple

Answers

Answer:

def productOfOdds(t):

   if len(t) == 1:

       if t[0] % 2 == 1:

           return t[0]

       else:

           return 1

   else:

       if t[0] % 2 == 1:

           return t[0] * productOfOdds(t[1:])

       else:

           return productOfOdds(t[1:])

t = (1, 2, 3, 4, 5, 6, 7, 8, 9)

print("Product of odd elements:", productOfOdds(t)

this is a new capability for businesses provided by technologies able to analyze customer behavior over the internet.

Answers

The new capability for businesses provided by technologies able to analyze customer behavior over the internet is customer segmentation. The correct option is d.

What is customer segmentation?

Customer segmentation is the process of categorizing customers based on how and why they purchase. It enables businesses to develop more targeted sales and marketing strategies for certain customer segments.

Customer behavior segmentation includes inclinations and frequent acts, feature or product use, and habits. This allows you to target your audience more effectively with relevant messaging. To begin, it is critical to establish strong customer relationships.

Therefore, the correct option is d, Customer segmentation.

To learn more about customer segmentation, refer to the link:

https://brainly.com/question/28167080

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Direct marketing.

Merchandise allocation.

Telephone trees.

Customer segmentation.

how do I write a proper python dictionary for my rooms in my text-based adventure game? I have the entrance, the gallery (wizard hat), the cellar (wizard robe), the bedroom (the potion), dining room (spell book), dungeon (wizard orb), the living room (wizard staff) and the potion room (the wizard). (The items that go with the rooms are in parenthesis behind the rooms)

Answers

Python may be used to create text adventure games that the player enters text into, which causes the tale to change.

How to Create a Text Based Adventure Game in Python?If you're learning how to program, creating a text adventure game is a fun project to try. Python can be used to create text adventure games that the player enters text into, which causes the story to change.The Python script will go over a number of fundamental programming ideas. Print commands, if clauses, and functions are included in this.Using a common text file with the.py extension, you can write a script. If you are unfamiliar with Python syntax, check at some fundamental Python examples to help you learn it more quickly. You may also take a look at some practical Python one-liners to carry out specific tasks.Set up your story and welcome message in the main function of the Python code."AdventureGame.py" should be created as a new file.Include the primary starting function in the file. A brief introductory tale will be included in the feature to welcome the player to the adventure game. After that, it will call introScene, another function.

To Learn more About Python refer To:

https://brainly.com/question/26497128

#SPJ4

you are working as a network analyzer for an isp. a client has approached you to set up a network connection for a bank with offices around the state. the network needs to connect these offices with each other in order to gather transaction and account information into a central database. which of the following connections will you provide in this scenario?
a. LAN
b. MAN
c. WAN
d. CAN

Answers

In this scenario, the appropriate network connection to provide for the bank with offices around the state is a WAN (Wide Area Network).

A WAN is a network that connects multiple smaller networks, such as LANs (Local Area Networks) and MANs (Metropolitan Area Networks), over a large geographic area. In the case of the bank, the WAN would connect the bank's offices around the state with each other, allowing them to share transaction and account information and access a central database.

A LAN is a network that covers a small geographic area, such as a single building or office. It is typically used to connect computers, printers, and other devices within a single location. In this scenario, the bank's individual offices would likely have their own LANs to connect their local devices. However, the LANs would not be able to connect the bank's offices with each other, so a WAN would be needed for that purpose.

A MAN is a network that covers a larger geographic area than a LAN, such as a city or region. It is typically used to connect multiple LANs within a larger area. In this scenario, the bank's offices within a single city or region might be connected by a MAN. However, a MAN would not be able to connect the bank's offices across the state, so a WAN would be needed for that purpose.

A CAN (Campus Area Network) is a network that covers a small geographic area, such as a college campus or industrial complex. It is typically used to connect multiple LANs within a smaller area. In this scenario, a CAN would not be applicable, as the bank's offices are spread across a large geographic area and not contained within a single campus or complex

A low level distributed denial of service (DDoS) attack that involves SYN or SYN/ACK flooding describes what type of attack?

Answers

Note that a low-level distributed denial of service (DDoS) attack that involves SYN or SYN/ACK flooding describes "a TCP three-way handshake."

What is a DDoS attack?

A low-level distributed denial of service (DDoS) attack that involves SYN or SYN/ACK flooding is a type of network-level attack. It is called a "low level" attack because it targets the lower layers of the network protocol stack, such as the transport and network layers.

In this type of attack, the attacker sends a large number of SYN or SYN/ACK packets to the target system in an attempt to overwhelm it with traffic. SYN packets are used to initiate a connection between two systems, and SYN/ACK packets are used to acknowledge and complete that connection. By sending a large number of these packets, the attacker can flood the target system with traffic and disrupt its ability to function normally.

Learn more about DDoS attack:
https://brainly.com/question/29238912
#SPJ1

what is a website to make infographic on?

Answers

Answer: Piktochart , Canva , Domo

Explanation:

Canva has to be the best website you could use for this purpose.

If you want a browser based free version of photoshop I recommend photopea they are very similar in terms of features.

Please explain in full detail what is Virtual Machine Management?

Answers

Answer:

Virtual machine management refers to the process of creating, configuring, and maintaining virtual machines (VMs) in a virtualized environment. Virtual machines are software-based simulations of physical computers that run on a host machine and provide the same functionality as a physical computer.

Virtual machine management involves tasks such as setting up and configuring the virtualization software, creating and installing virtual machines, assigning resources (such as CPU, memory, and storage) to the virtual machines, and monitoring the performance of the virtual machines. It also involves managing the virtual machine environment, such as backing up and restoring virtual machines, migrating virtual machines to different hosts, and managing the virtual machine storage and network connectivity.

Virtual machine management is important for organizations that use virtualization technology to improve the efficiency and flexibility of their computing infrastructure. By using virtual machines, organizations can run multiple operating systems and applications on a single physical host, which can save on hardware costs and improve resource utilization. Virtual machine management enables organizations to effectively manage and maintain their virtual machines to ensure that they are running smoothly and efficiently.

The quantity of a product or product group can be calculated as the ... of the value and the uni price
a) no answer
b)sum
c)difference
d)ratio
e)product

Answers

The quantity of a product or product group can be calculated as the ratio of the value and the uni price. Thus, the correct option for this question is D.

What is the formula for the product cost?

The formula for the product cost is as follows:

Product Cost per Unit Formula = (Total Product Cost ) / Number of Units Produced.

In this case, if you want to avoid losses, the sales price must be equal to or greater than the product cost per unit. If the sale price is equal, it is a break-even situation, i.e., no profit or loss, and the sales price covers the cost per unit.

Therefore, the quantity of a product or product group can be calculated as the ratio of the value and the uni price. Thus, the correct option for this question is D.

To learn more about Product cost, refer to the link:

https://brainly.com/question/14699408

#SPJ1

The ____ is made up of business that focus on digital equipment, software, communications technologies, and related services
Choose matching definition
a. ICT industry
b. True
c. Goods, services
d. Graphical user interface

Answers

The ICT industry is made up of business that focus on digital equipment, software, communications technologies, and related services.

What exactly do you mean by “ICT industry”?

The information and communication technology (ICT) sector combines manufacturing and service businesses whose products largely fulfill or allow the function of information processing and communication via electronic methods, including transmission and display.Telecommunications devices (such as telephones), information kiosks, and transaction machines are examples of electronic and information technology. Websites that use multimedia.

The information and communication technology (ICT) sector combines manufacturing and service businesses whose products largely fulfill or allow the function of information processing and communication via electronic methods, including transmission and display. The ICT sector contributes to technical advancement, increased output, and productivity. And information technology will carry out our tasks

To learn more about ICT refer:

https://brainly.com/question/29565707

#SPJ4

Answer

Explanation

java the withdraw method works differently: it should first check if the balance is greater than amount to withdraw to allow the transaction to go. and also to look at the new balance and see if it goes below minimum balance to decide whether to subtract the fees from the current balance.

Answers

To implement the withdraw method as described, you could use the following pseudocode:

def withdraw(amount):

 if balance > amount:

   balance -= amount

   if balance < minimum_balance:

     balance -= fees

 else:

   print("Insufficient funds.")

The withdraw method first checks if the balance is greater than the amount being withdrawn. If it is, it subtracts the amount from the balance. Then, it checks if the new balance is below the minimum balance. If it is, it subtracts the fees from the balance. If the balance is not greater than the amount being withdrawn, it prints a message indicating that there are insufficient funds.

1. Machine learning is

A) Program building technology, which includes training on Examples (with or without a teacher)

B) construction of the hardware architecture of modern computers c) implementation of multithreaded computing algorithms

Answers

Answer: A

Machine learning is a form of AI which a machine is subjected on a dataset to learn from the data, often to generate new media.

Which method will search an array for the first occurrence of 10?
myArray.
(10)

index
find
append
search

Answers

If an array element cannot be found, the indexOf() function returns -1. It returns the first index of the element's occurrence.

Which approach searches an array for the very first instance of 10? The indexOf() method uses rigorous equality (the same algorithm as the === operator) to compare search Element to array items.In sparse arrays, the indexOf() technique leaves empty spaces unfilled.The method indexOf() is general.Only a length property and properties with integer keys are required for this value.The indexOf() method returns the array element's initial index of occurrence, or -1 if it cannot be found.An element's position inside the array is indicated by its index, which can either be a number or a field with a number (beginning at When you give an array name and index, the following guidelines apply:The name of the array must be a distinct symbolic name.

To learn more about array refer

https://brainly.com/question/28061186

#SPJ1

phanteks (ph-p1000gc) revolt pro series, 80plus gold, fully modular, patented power combo technology, 1000w atx power supply review

Answers

Power combo technology with a 1000w atx power supply, 670 Review of all high grade construction.

Is Phanteks a reliable brand of PSU?

A potent yet effective PSU is the Phanteks AMP 1000W White Edition. It received an 80 Plus Gold rating because it is 92% efficient at half load.

How effective is Phanteks?

When it comes to mainstream ATX chassis, the Phanteks Eclipse G360A stands out because it offers good airflow and RGB. It has some design flaws, but for $100 and with three aRGB PWM fans that help deliver excellent thermal performance, it's a fantastic chassis for builders on a budget.

To know more about technology visit:-

https://brainly.com/question/9171028

#SPJ4

Which of these is associated with a specific file and provides a way for the program to work with that file?a. Filenameb. Extensionc. File objectd. File variable

Answers

Answer:

C................................

opportunities & challenges of emmerging technology for ethiopia​

Answers

Answer:

There are many potential opportunities and challenges that emerging technologies could bring to Ethiopia. Some potential opportunities include:

Improved access to information and education: Emerging technologies such as the internet and mobile devices could help to increase access to information and educational resources, which could in turn improve educational outcomes and economic opportunities for people in Ethiopia.Increased efficiency and productivity: Emerging technologies such as artificial intelligence, robotics, and automation could help to improve the efficiency and productivity of various industries in Ethiopia, which could help to drive economic growth and development.Improved healthcare: Emerging technologies such as telemedicine and medical devices could help to improve access to healthcare services in Ethiopia, particularly in rural and remote areas where access to healthcare is often limited.Improved communication and connectivity: Emerging technologies such as 5G networks and satellite technology could help to improve communication and connectivity in Ethiopia, which could have numerous benefits for both individuals and businesses.

However, there are also potential challenges that emerging technologies could bring to Ethiopia, including:

The potential for job displacement: As emerging technologies become more prevalent, they could potentially displace workers in certain industries, which could lead to unemployment and social unrest.The potential for increased inequality: If emerging technologies are not adopted and implemented in an equitable way, they could exacerbate existing inequalities and create new ones.The need for infrastructure and investment: In order for emerging technologies to have a positive impact in Ethiopia, significant investment in infrastructure and training will be necessary. This could pose a challenge for a country with limited resources.The potential for security and privacy concerns: Emerging technologies also raise important security and privacy concerns, which will need to be addressed in order to ensure the safe and responsible use of these technologies.
Other Questions
fix the code below so it does not leave the loop too early. try the codelens button to see what is going on. when should you return true or false? How do I find the inverse of j(x)=x - 10 + 4 which country has been devastated by the spilling of 9 million barrels of oil into its river system due to the poor environmental record of transnational oil corporations operating within its borders? My friend Umpt has no more than 30 mimstoons........... bob works for abc corporation and is a practicing muslim. he tells his employer that he must have off every saturday for religious reasons. saturday is their busiest day. in order for abc to be able to terminate bob, they must a. prove that an attempt to accommodate here would be unreasonable b. prove that ABC Corporation is not a religious organization c. prove that Bob's social media posts are not about religion d. prove that Bob has never gone to church Grandpa Minion's genotype for color blindness was: Question 4 options: XCXC XCY XCX XY Regina made 1,240 pot holders. She wants to sell them in packages of 10. How manypackages will she have? Explain your thinking. When writing a cadenza, you could use expression to show what your instrument can do. Which of the following would be an example of this?A. Work out ways of making your instrument sound happy, sad, angry, etc.B. Explore different ways of making a note on the instrument. Which of the following would be a possible amino acid sequence for an oligopeptide given the experimental data below. Give your answer in 3 letter format. 1. The amino acid composition is found to be [gly, phe, leu, arg, thr and met and some decomposition products] 2. The peptide has a molecular weight around 700 Da and absorbs at 280 nm. 3. Treatment with carboxypeptidase results in phenylalanine and a peptide. 4. First cycle Edmond Degradation yields PTHthreonine 5. CNBR treatment yields two tripeptides. 6. Trypsin digestion produces a dipeptide and a tetrapeptide with met on the amino end. 7. Chymotrypsin digestion yields tetrapeptide and a dipeptide. I do not understand how to do this. Pls, explain. On July 4th, 1776, the Second Continental Congress officially approvedthe Declaration of Independence. The 56 men who signed "the Declaration"put their lives on the line, knowing that they would be hanged for treason if Great Britain prevailed. Yet, they did it anyway. Considering this, what must it take for people to join a revolution? Why do people choose to revolt? Based on the section "Zoos and Conservation," what isthe author s viewpoint about the role of zoos inconservation efforts?Zoos are critical forconserving endangeredanimal populations.Zoos canlower the number of endangeredspecies only by working with other zoos.The efforts of zoos have led to a decrease inthethreats animals faco in thewild.The efforts of zoos should be dedicated onlyto the conservation of endangered species. Question 6(Multiple Choice Worth 4 points)(02.08 LC)Which type of professional would help the government determine where to set the price of oranges for U.S. markets?O ConsumersO EconomistsO ExportersImporters The perimeter of your rectangular pool is 130ft. Three time the length is equal to 10 times the width. Find the length and width of the pool. Find the area if the pool. what is the filmmakers main purpose for making the video Gandhi: the rise to fameA: to persuade people to agree with gandhis political viewsB: to entertain people with story about a famous persons lifeC: to explain that gandhi was different from hollywoods portrayal of himD: to show how gandhi changed history through his actions a client is receiving an oxytocin infusion for induction of labor. when the client begins active labor, the fetal heart rate (fhr) slows at the onset of several contractions with subsequent return to baseline before each contraction ends. what action should the nurse implement? 1. Jayda drank % of a gallon of water on Monday.On Tuesday, she drank 1 times as much wateras she did on Monday.How many gallons of water did Jayda drink inall?If Jayda's goal is to drink a gallon by Wednesday,how many more gallons does she need to drink? Geoff counts the number of oscillations of a simple pendulum at a location where the acceleration due to gravity is 9.80 m/s2, and finds that it takes 24.0 s for 14 complete cycles.1) Calculate the length of the pendulum. (Express your answer to three significant figures.) a client in her first trimester of pregnancy has been attending educational sessions on pregnancy. what statements by the client would indicate to the nurse that client teaching has been successful? Identify this system of equations:y=4x-4y=-4x+4A. Consistent and IndependentB. Consistent and DependentC. InconsistentAnd also, this question isn't required, but if the 2 slope-intercept forms are opposite, do they equal each other. (Like the question above, 4x-4+ and -4x+4)