To ensure AD RMS network transmission is protected from being read and interpreted by protocol analyzers, which of the following must be allowed to enroll for a computer certificate?
a) File Server
b) Domain Controller
c) SQL Server
d) Internet Information Services (IIS)

Answers

Answer 1

Answer:

b) Domain Controller

Explanation:

Active Directory Rights Management Services (AD RMS) is a server software that is developed by Microsoft to manage information rights on the Windows server.

The AD RMS servers produce a rights account certificate to link various users with particular PC systems. They also issue end-user licenses.

To ensure that AD RMS network transmission is protected, the domain controller needs to be allowed to enroll for a computer certificate.

A domain controller is a server that authenticates requests from users on a  particular computer network. It keeps user data organized and secure.


Related Questions

If an organization’s DNS server can resolve a DNS request from its own cache, the DNS server is said to be ____.

Answers

Answer:

Answered below

Explanation:

The DNS server is said to be a caching-only DNS server.

A caching-only Domain Name System server, works by recieving queries from the client, proceeds to perform queries against other named servers, then caches the results and returns the results to the client.

Subsequent queries are resolved and returned for the specified host straight from the the cache, by the server, instead of submitting to the external server.

The advantage of this process is that it reduces traffic from outgoing DNS and speeds up the name resolution. Also, there is a reduction in the amount of query traffic.

What type of function is being performed when a router screens packets based on information in the packet header

Answers

Answer:

"Router screening" is the correct option.

Explanation:

A router that philters packets like a firewall. For certain instances, the whole firewall system is such a single scanning router.Often connected to a network stage as well as a container-filter firewall has been the scanning router firewall. This rather firewall operates by filtering protocol characteristics from received packets.

So that the above seems to be the correct approach.

What is resource management in Wireless Communication? Explain its advantages

Answers

Answer:

This is a management system in wireless communication that oversees radio resources and crosstalks between two radio transmitters which make use of the same channel.

Explanation:

Radio Resource Management is a management system in wireless communication that oversees radio resources and crosstalks between two radio transmitters which make use of the same channel. Its aim is to effectively manage the radio network infrastructure. Its advantages include;

1. It allows for multi-users communication instead of point-to-point channel capacity.

2. it increases the system spectral efficiency by a high order of magnitude. The introduction of advanced coding and source coding makes this possible.

3. It helps systems that are affected by co-channel interference. An example of such a system is the wireless network used in computers which are characterized by different access points that make use of the same channel frequencies.

A device driver would ordinarily be written in :__________
a. machine language
b. assembly language
c. a platform-independent language, such as Java
d. an application-oriented language

Answers

Answer: Assembly language

Explanation:

A device driver is a computer program that is in charge of the operation or the controls of a device attached to a computer.

device driver would ordinarily be written in an assembly language. Assembly language is a low-level symbolic code that is converted by an assembler. It is typically designed for a particular type of processor.

Strong emotions can interfere with your ability to
A. make wise decisions.
B. think and reason.
C. judge risks.
D. all of the above

Answers

All of the above

All emotions cloud judgement, but anger is the worst

Hope this helps ♥︎

Strong emotions can interfere with your ability to make wise decisions, think and reason, and judge risk. The correct option is (D).

Strong emotions can indeed interfere with a person's ability to make wise decisions, think clearly and reason logically, and accurately judge risks.

Emotions have the potential to cloud judgment, bias perception, and impede rational thinking, which can impact decision-making processes.

Therefore, Strong emotions can interfere with your ability to make wise decisions, think and reason, and judge risk. The correct option is (D).

To know more about the emotions:

https://brainly.com/question/14587591

#SPJ4

Raj was concentrating so much while working on his project plan that he was late for a meeting. When he went back to his office, he noticed his system was restarted and his project file was not updated. What advice would you provide Raj in this situation?

Answers

Answer:

Explanation:

Depending on the software that Raj was using to create his project he should first see if the software itself saved the project. Usually many software such as those included in the Microsoft Office Suite save the file automatically every 5 minutes or so in case of a power outage or abrupt closure of the file. If this is not the case he should try and do a system restore with the unlikely hope that it restores an older version of his project.

In a situation like this, it would be advisable for Raj to contact IT personnels and seek if the files could be retrieved.

Raj being late for a meeting due to what he was doing meant that the project he was working on is very important.

Therefore, to avoid losing thses files, he could contact the IT personnels and request if there is a way to retrieve the project file.

These way, the files could be retrieved and avoid losing his work.

Learn more : https://brainly.com/question/15315011

Write a CashRegister class that can be used with the RetailItem class that you wrote in Chapter 6's Programming Challenge 4. The CashRegister class should simulate the sale of a retail item. It should have a constructor that accepts a RetailItem object as an argument. The constructor should also accept an integer that represents the quantity of items being purchased. In addition, the class should have the following methods:
• The getSubtotal method should return the subtotal of the sale, which is the quantity multiplied by the price. This method must get the price from the RetailItem object that was passed as an argument to the constructor.
• The getTax method should return the amount of sales tax on the purchase. The sales tax rate is 6 percent of a retail sale.
• The getTotal method should return the total of the sale, which is the subtotal plus the sales tax.

Demonstrate the class in a program that asks the user for the quantity of items being purchased and then displays the sale’s subtotal, amount of sales tax and total.

Answers

Answer:

Following are the code to this question:

import java.util.*; //import package for user input

class RetailItem//defining class RetailItem  

{

private String desc;//defining String variable

private int unit;//defining integer variable

private double prices;//defining double variable

RetailItem()//defining default Constructor

{

   //Constructor body

}

Output:

The Sub Total value: 199.75

The Sales Tax value: 11.985

The Total value: $211.735

Explanation:

In the above code three class "RetailItem, CashRegister, and Main" is defined, in the class "RetailItem", it defines three variable that is "desc, unit, and prices", inside the class "get and set" method and the constructor is defined, that calculates its value.

In the next step,  class "CashRegister" is defined, and inside the class parameterized constructor is defined, which uses the get and set method to return its value.  

In the next step, the main class is declared, in the main method two-class object is created and calls its method that are "getSubtotal, getTax, and getTotal".  

There is some technical error that's why full code can't be added so, please find the attached file of code.  

During the name resolution process, which technique is used to avoid congestion when querying a server

Answers

Answer:

"NOT lookup " is the correct approach.

Explanation:

This methodology significantly reduces the quantity of congestion of DNS messages on a certain file. The application establishes that whenever a question reaches if it is processed. Unless the file is loaded, then perhaps the response is returned with the cached cache.Typically the name resolution occurs in something like a DNS File. The conversion usually occurs throughout this cycle from Username to IP, including IP via Username.

CHALLENGE 7.1.1: Initialize a list. ACTIVITY Initialize the list short.names with strings 'Gus', Bob, and 'Ann'. Sample output for the given program Gus Bob Ann 1 short_names- Your solution goes here 2 # print names 4 print(short_names[0]) 5 print(short names [11) 6 print(short_names[2])

Answers

Answer:

short_names = ["Gus", "Bob", "Ann"]

print(short_names[0])

print(short_names[1])

print(short_names[2])

Explanation:

There are some typos in your code. In addition to the missing part of the code, I corrected the typos.

First of all, initialize the list called short_names. The list starts with "[" and ends with "]". Between those, there are must be the names (Since each name is a string, they must be written between "" and there must be a semicolon between each name)

Then, you can print each name by writing the name of the list and the index of the names between brackets (Index implies the position of the element and it starts with 0)

When working with the instruction LAHF, the lower eight bits of the EFLAGS register will wind up getting moved into the

Answers

hellohellohellohello

g Write a method that accepts a String object as an argument and displays its contents backward. For instance, if the string argument is "gravity" the method should display -"ytivarg". Demonstrate the method in a program that asks the user to input a string and then passes it to the method.

Answers

Answer:

The program written in C++ is as follows; (See Explanation Section for explanation)

#include <iostream>

using namespace std;

void revstring(string word)

{

   string  stringreverse = "";

   for(int i = word.length() - 1; i>=0; i--)

 {

     stringreverse+=word[i];

 }

 cout<<stringreverse;

}

int main()

{

 string user_input;

 cout << "Enter a string:  ";

 getline (std::cin, user_input);

 getstring(user_input);

 return 0;

}

Explanation:

The method starts here

void getstring(string word)

{

This line initializes a string variable to an empty string

   string  stringreverse = "";

This iteration iterates through the character of the user input from the last to the first

   for(int i = word.length() - 1; i>=0; i--)   {

     stringreverse+=word[i];

 }

This line prints the reversed string

 cout<<stringreverse;

}

The main method starts here

int main()

{

This line declares a string variable for user input

 string user_input;

This line prompts the user for input

 cout << "Enter a string:  ";

This line gets user input

 getline (std::cin, user_input);

This line passes the input string to the method

 revstring(user_input);

 return 0;

}

Write a program that asks the user to enter a series of numbers separated by commas. Here is an example of valid input: 7,9,10,2,18,6 The program should calculate and display the sum of all the numbers.

Answers

Answer:

Here is the JAVA program. Let me know if you need the program in some other programming language.

import java.util.Scanner; // used for taking input from user

public class Main{ //Main class

public static void main(String[] args) {//start of main() function body

  Scanner scan = new Scanner(System.in); // creates a Scanner type object

   String input; // stores input series

    int sum = 0; //stores the sum of the series

    System.out.println("Enter a series of numbers separated by commas: "); //prompts user to enter a series of numbers separated by comma

     input = scan.nextLine(); //reads entire input series

     String[] numbers = input.split("[, ]"); //breaks the input series based on delimiter i.e. comma and stores the split sub strings (numbers) into the numbers array

   for (int i = 0; i < numbers.length; i++) { //loops through each element of numbers array until the length of the numbers reaches

          sum += Integer.parseInt(numbers[i]); } // parses the each String element of numbers array as a signed decimal integer object and takes the sum of all the integer objects

     System.out.println("Sum of all the numbers: " + sum);  } } //displays the sum of all the numbers

Explanation:

The program prompts the user to enter a series separated by commas.

Then split() method is used to split or break the series of numbers which are in String form, into sub strings based on comma (,) . This means the series is split into separate numbers. These are stored in numbers[] array.

Next the for loop iterate through each sub string i.e. each number of the series, converts each String type decimal number to integer using Integer.parseInt and computes the sum of all these integers. The last print statement displays the sum of all numbers in series.  

If the input is 7,9,10,2,18,6

Then the output is: 7+9+10+2+18+6

sum = 52

The program and its output is attached.

The fact that the speed of a vehicle is lower than the prescribed limits shall relieve the driver from the duty to decrease speed when approaching and crossing an intersection. True or false

Answers

Explanation:

the answer is false ........

The fact that the speed of a vehicle is lower than the prescribed limits shall relieve the driver from the duty to decrease speed when approaching and crossing an intersection is not true.

What is intersection in the traffic rules?

An intersection serves as the point where many lanes cross on the road which is a point where driver is required to follow the traffic rules.

However, the above statement is not true because , a driver can decide not  decrease speed when approaching and crossing an intersection, even though it is a punishable offense in traffic rules.

Read more on traffic rules here: https://brainly.com/question/1071840

#SPJ2

Is it appropriate to send an email and call the individual the same day to ask if they have received your email?

Answers

Answer:

It depends. (OPINION)

Explanation:

If this is an important email, and it REALLY had to be sent the day of, then yes, it may be appropriate to call the day of. However, if you procrastinated until the last day and are really worried; well; that's your fault. At least wait a day and give the receiver some time to process; they could be really busy. At least that's how I view it.

Select the Stats Worksheet. Enter simple formulas in B3 and B4 to pull through the calculated Total Expenditure and Total Net from the Data worksheet (cells X2 and Y2). If you have done it correctly the pie chart should now show how income is proportioned between expenditure and net. QUESTION: According to the pie chart, what percentage of Income is made up by Expenditure?

Answers

Answer:

62.49

Explanation:

Complete method printPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bagOunces followed by " seconds". End with a newline. Example output for ounces = 7:
42 seconds
import java.util.Scanner;
public class PopcornTimer {
public static void printPopcornTime(int bagOunces) {
/* Your solution goes here */
}
public static void main (String [] args) {
Scanner scnr = new Scanner(System.in);
int userOunces;
userOunces = scnr.nextInt();
printPopcornTime(userOunces);
}
}

Answers

Answer:

Replace

/* Your solution goes here */

with

if (bagOunces < 2) {

   System.out.print("Too Small");

}

else if(bagOunces > 10) {

   System.out.print("Too Large");

}

else {

   System.out.print((bagOunces * 6)+" seconds");

}

Explanation:

This line checks if bagOunces is less than 2;

if (bagOunces < 2) {

If yes, the string "Too Small" is printed

   System.out.print("Too Small");

}

This line checks if bagOunces is greater than 10

else if(bagOunces > 10) {

If yes, the string "Too Large" is printed

   System.out.print("Too Large");

}

The following condition is executed if the above conditions are false

else {

This multiplies bagOunces by 6 and adds seconds

   System.out.print((bagOunces * 6)+" seconds");

}

You are the network administrator for your company. A user reports that he cannot access network resources from his computer. He was able to access the resources yesterday. While troubleshooting his computer, you find that his computer is issued an Automatic Private IP Addressing (APIPA) address. All the network equipment in the user's computer is functioning properly because you are able to access the user's computer from a remote computer. What is most likely the problem

Answers

Answer:

the issued Automatic Private IP Addressing (APIPA) address.

Explanation:

Since we are told that the user was able to access the network resources yesterday, and all the network equipment in the user's computer is functioning properly, there is a very high possibility that because the user's computer has been issued an Automatic Private IP Addressing (APIPA) address, it affected his computer's ability to connect to a public network.

This is the case because private network IP addresses are known to prevent inflow and outflow of data onto public networks.

Assume a client calls an asynchronous RPC to a server, and subsequently waits until the server returns a result using another asynchronous RPC. Is this approach the same as letting the client execute a normal RPC

Answers

Answer:

This approach is not the same as letting the client execute a normal RPC

Explanation:

This approach is not the same as letting the client execute a normal RPC and this is because an asynchronous RPC sends an additional message across the network after the initial call/message is sent by the sender to the client. this additional message sent through the network is directed towards the sender of the initial call/message as an acknowledgement of the receipt of the initial message by the client .

synchronous RPC is made of two asychronous RPCs, hence the client executing a normal RPC  will not establish a reliable communication between the client and the sender as asynchronous RPC would

Vehicles driving in the opposite direction on a multi-lane highway with opposite lanes separated by a painted line must stop for school buses.
A. TRUE
B. FALSE

Answers

True? I think that’s it’s true, it’s different here in Canada

While interoperability and unrestricted connectivity is an important trend in networking, the reality is that many diverse systems with different hardware and software exist. Programming that serves to "glue together" or mediate between two separate and usually already existing programs is known as:

Answers

Answer:

Middleware

Explanation:

In today's technology like networking, software development, web development, etc, there is a need for connectivity. The problem at hand is the variation of the tech brands which results in the difference in operating systems, applications, and connectivity protocols. This problem is solved with the introduction of Middleware.

Middleware is the solution to conflicting software applications, interconnectivity between various tech platforms. It promotes cross-platform interactions.

Which option should you choose to review detailed markups within a document

Answers

Answer:

Tracking and Review features.

Explanation:

Tracking and Review are used to show detailed Markup when reviewing a document to make some changes to it.

To reveal detailed Markup, select REVIEW, then select VIEW OPTION from the Review list.

A Simple Markup shows a red line to where changes have already been made.

All Markup shows different person's edits in different colors of texts.

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page

Answers

Answer:

The correct answer is "List of posts with the most recent ones at the top".

Explanation:

A website that includes someone else's thoughts, insights, views, etc. about a writer or community of authors and that also has photographs as well as searching the web.It indicates that perhaps the blog should distinguish between different articles about the site because then customers who frequent the site will observe and experience the articles on everyone's blogs.

So that the above would be the appropriate one.

For this lab, imagine you are an IT Specialist at a medium-sized company. The Human Resources Department at your company wants you to find out how many people are in each department. You need to write a Python script that reads a CSV file containing a list of the employees in the organization, counts how many people are in each department, and then generates a report using this information. The output of this script will be a plain text file.

Answers

Answer:

import csv

import sys

file_csv = argv

with open( "file_csv", "rb" ) as file:

      rowlist= csv.DictReader( file )

      dict_count={ }

      for row in rowlist:

           dict_count[ row[ 'department' ] ] = dict_count.get( row[ 'department' ], 0 ) + 1

      print( " The count of employees per department are", dict_count )

Explanation:

The python script in the solution above is able to accept user input csv files via command prompt and get an output of the number of employees for each department.

What protocol communicates data between routers representing the edges of autonomous systems?Distance-vectorLink stateInterior gatewayExterior gateway

Answers

Explanation:

Exterior gateway protocol are the routing protocols that are used on the internet for exchanging routing information among the autonomous system. These autonomous systems can be gateway protocol, vector routing protocol.

The protocol that communicates data between routers representing the edges of autonomous systems is called Exterior Gateway Protocol (EGP).

Here,

An autonomous system (AS) is a collection of routers that are under a single administrative domain and have a common routing policy. These autonomous systems can be Internet Service Providers (ISPs), large organizations, or even smaller networks.

EGP is specifically designed to exchange routing information between routers that are at the edges of these autonomous systems. It allows routers in different autonomous systems to communicate with each other and share information about the best paths to reach various network destinations.

Know more about Autonomous system,

https://brainly.com/question/30240559

#SPJ6

A proper divisor of a positive integer $n$ is a positive integer $d < n$ such that $d$ divides $n$ evenly, or alternatively if $n$ is a multiple of $d$. For example, the proper divisors of 12 are 1, 2, 3, 4, and 6, but not 12. A positive integer $n$ is called double-perfect if the sum of its proper divisors equals $2n$. For example, 120 is double-perfect (and in fact is the smallest double-perfect number) because its proper divisors are 1, 2, 3, 4, 5, 6, 8, 10, 12, 15, 20, 24, 30, 40, and 60, and their sum is 240, which is twice 120. There is only one other 3-digit double-perfect number. Write a Python program to find it, and enter the number as your answer below.

Answers

Answer:

The program written in Python is as follows:

See Explanation section for line by line explanation

for n in range(100,1000):

     isum = 0

     for d in range(1,n):

           if n%d == 0:

                 isum += d

     if isum == n * 2:

           print(n)

Explanation:

The program only considers 3 digit numbers. hence the range of n is from 100 to 999

for n in range(100,1000):

This line initializes sum to 0

     isum = 0

This line is an iteration that stands as the divisor

     for d in range(1,n):

This line checks if a number, d can evenly divide n

           if n%d == 0:

If yes, the sum is updated

                 isum += d

This line checks if the current number n is a double-perfect number

     if isum == n * 2:

If yes, n is printed

           print(n)

When the program is run, the displayed output is 120 and 672

1)What is Big Data?
2) What is machine learning?
3) Give one advantage of Big data analytics.
4) Give any one application of Big Data Analytics. 5) What are the features of Big Data Analytics?

Answers

Answer:

Big data is defined as the extremely large data set that may be analysed computationally to reveal pattern,trends and associations, related to human behaviour and interaction.

Machine learning is a sub area of artifical intelligence where by the terms refers to the ability of IT system to independently find the solution to problem by reconnaissance pattern in databases.

The one advantage of bigdata is

To ensure hire the right employees.

The application of bigdata data is

to communicate media application nd entertainment

You have a Nano Server named Nano1. Which cmdlet should you use to identify whether the DNS Server role is installed on Nano1

Answers

Answer:

The correct solution will be "Get-Package".

Explanation:

The accreditation property defines a domain as well as client initials with computer authorizations for executing commands. Mostly on the virtual device, the argument ScriptBlock executes the Get-Package cmdlet. This order obtains from some kind of special introductory commercial software downloaded on either the user's computer.

How can technology efforts be reconciled to improve hazard/disaster preparedness, response, and mitigation to insure systems sustainability, data integrity, and supply chain protection?

Answers

Answer:

Prediction

With regard to preparedness for hazard/disaster, technology such as AI are being explored to see how they can help to predict natural disaster.

If there is a breakthrough in this space, it will drastically reduce the negative impact of natural disasters such as floods and earthquakes as people will become ready to respond to them and mitigate their effects where possible.

In agriculture, there are factors which come together to bring about flooding. Flooding is one of the major disasters which cripples entire value chains. With a potential threat anticipated or predicted by AI, businesses can invest in technologies that can help protect the farms, farmland and other resources critical to such a supply chain.

AI-powered technologies that provide prediction services often combine this advanced computing prowess with the ability to process big data.

Technology can reach places that are unreachable by humans

AI-powered robots will soon become the norm.

Presently there are self-learning and self instructing robots powered by Artificial Intelligence that have applications in warfare, manufacturing, deepsea diving and intelligence gathering, and transportation. It is not out of place to predict that in the next decade, scientists would have perfected rescue robots that can go into very unstable terrain that have been damaged by flood or earthquake and attempt a rescue of lives and property at a scale that has never been possible before.

Connectivity  

Connectivity helps people access to aid, resources that are critical for survival, transmission and receipt of life--saving information etc. CISCO has successfully used its technology called TacOps (short for Tactical Operations) successfully 45 times on over 5 continents.

Cheers!    

Input a list of positive numbers, find the mean (average) of the numbers, and output the result. Use a subprogram to input the numbers, a function to find the mean, and a subprogram to output the result. Use a subprogram to Input the numbers, a Function to find the mean and a subprogram to output the Result.

Answers

Answer:

def inputNumber():

   l = []

   num = int(input("Enter the number of integers you want to enter\n"))

   for i in range(0,num):

       print("Enter the ", i+1, " integers ")

       a = float(input())

       l.append(a)

   return l

def averageCalculator(l):

   total = 0

   for i in l:

       total += i

   avg = total/len(l)

   return avg

def printoutput(avg):

   print("The average of numbers is ", avg)

l = inputNumber()

avg = averageCalculator(l)

printoutput(avg)

Explanation:

A subprogram may be considered as a method where we pass some values in the arguments and return some value.

The answer is written in python language, where we have used

inputNumber() subprogram to get the input from the user.

function averageCalculator() to calculate the average.

printoutput() subprogram to print the output or the average of the numbers.

Please refer to the attached image for better understanding of the indentation of code.

Now, let us learn about them one by one:

inputNumber(): We get the number of values to be entered as an integer value and then get the numbers as float.

Store the values in a list and return the list to the caller main program.

averageCalculator(l): Contains a list as argument as we got from inputNumber(). It sums all the numbers and divides with total number to find the average. Returns the average value to the caller main program.

printoutput(avg): Contains an argument which is the average calculated in the averageCalculator(). It prints the argument passed to it.

Cloud computing gives you the ability to expand and reduce resources according to your specific service requirement.

a. True
b. False

Answers

Answer:

a. True

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In Computer science, one of the most essential characteristics or advantages of cloud computing is rapid elasticity.

By rapid elasticity, it simply means that cloud computing gives you the ability to expand and reduce resources according to your specific service requirement because resources such as servers can be used to execute a particular task and after completion, these resources can then be released or reduced.

Some of the examples of cloud computing are Google Slides, Google Drive, Dropbox, OneDrive etc.

Other Questions
Which is the simplified form of r to the negative 7th power plus s to the negative twelve Ben deposited $2,700 in an account that pays 3.25% simple interest. He created a graph of hisaccount balance equation (A = Prt+P) with a slope of 8,775. on its advertisement, a company claims that it has funds in its possession that are in fact not available for payment of losses or claims. the company is guilty of How to convert 2cm to feet? Write in point-slope form an equation of the line that passes through the point (8, 9) with slope 7. "To Kill a Mockingbird" is a literary representation of people dealing with all sorts of judgments and differences. Aptly, at one point Jem describes four kinds of people in Maycomb County: "Our kind of folks don't like the Cunninghams, the Cunninghams don't like the Ewells, and the Ewells hate and despise the colored folks." Is "otherness" rooted in people? How does our society deal with those differences today? This need to be correct plzzzzzzzzzzzz I got this answer wrong so send the new one Read the sentences. Most of the colonists took sides in the American Revolution. Some remained neutral.What is the correct way to combine the sentences? Lester Hollar is vice president for human resources for a large manufacturing company. In recent years he has noticed an increase in absenteeism that he thinks is related to the general health of the employees. Four years ago, in an attempt to improve the situation, he began a fitness program in which employees exercise during their lunch hour. To evaluate the program, he selected a random sample of eight participants and found the number of days each was absent in the six months before the exercise program began and in the last six months. Below are the results. At the .05 significance level, can he conclude that the number of absences has declined? Estimate the p-value.Employee Before After1 6 52 6 23 7 14 7 35 4 36 3 67 5 38 6 7 Because he was well aware of the effect his theory of evolution would have on the public and on the Church of England, Darwin delayed publishing his work for several decades while he gathered additional evidence. After invoking selective breeding of domesticated species as evidence that groups of organisms are capable of change, he then proposed that natural populations can change as well. On which two lines of evidence did he base this proposal? a) Individuals within a population vary, yet island species around the world all appear to be related to each other.b) Organisms produce more offspring than can be supported by their environment, and adaptations to specific environments increase an organism's ability to survive and reproduce.c) Organisms within a population vary, and all populations produce more offspring than can be supported by the environment, resulting in competition for survival within the population.d) Some individuals leave more descendants than other individuals, but the individuals in a population are essentially identical to each other.e) Some individuals within a population have greater success in survival and reproduction than others, and favorable traits within a population will accumulate over generations. Which activity can substantially increase a persons risk of contracting HIV infection? You are the manager who employs a participantive control approach. You have concluded that corrective action is necessary to improve customer satisfaction, but first you need to convince your employees that the problem exists. What kind of evidence do you think employees will find more compelling; quantitative measurements or anccdotes from your interactions with customers PLEASE ANSWER ASAP The drama club is selling candles for a fundraiser. They spend $100 on the candles and sell them for $4.50 each. How many candles must they sell to make more than $125 profit? Let x represent the number of candles sold. Which inequality can you use to find x? 4.5x 100 > 125 4.5x + 125 > 100 100 4.5x > 125 100 + 4.5x > 125 [tex] \frac{5 + n}{4} = - 1[/tex]What is n? The weights of ice cream cartons are normally distributed with a mean weight of ounces and a standard deviation of ounce. (a) What is the probability that a randomly selected carton has a weight greater than ounces? (b) A sample of cartons is randomly selected. What is the probability that their mean weight is greater than ounces? (a) The probability is nothing. (Round to four decimal places as needed.) (b) The probability is nothing. (Round to four decimal places as needed.) 0.25 L of aqueous solution contains 0.025g of HCLO4 (strong acid) what will be the Ph of the solution g 1.The following are types of living things excepta) Bactariab) fungic) Prolista d) lysosome Bearman and Brueckner (2001) found that teens who made a public virginity-until-marriage pledge became _______ likely to remain sexually abstinent than similar teens who do not make the pledge. during the course of songraphic exam, you notice lateral splaying of echoes in the far field. what can you do to improve the image slope of (-2,2) and (3,4)