Assume you are a manager in the security department of a high-tech corporation. You are mentoring Mary, an entry-level network technician, who is considering a career change to specialize in security. She asks you for advice as to whether she should self-study to become a security professional or seek formal education, such as a bachelor's degree in information security. What is your advice to Mary

Answers

Answer 1

Answer:

Seek a bachelor's degree.

Explanation:

Seems more compromised and education from people with experience already.

Answer 2

Mary, my advice to you would be to pursue formal education such as a bachelor's degree in information security, to specialize in the field.

Why should Mary consider pursuing a bachelor's degree in information security?

By obtaining a formal education in information security, such as a bachelor's degree, you will gain a comprehensive understanding of the fundamental principles, theories, and practices of security.

This will provide you with a solid foundation and knowledge base to excel in your career as a security professional. Additionally, pursuing a degree will often expose you to practical hands-on experiences, internships, and networking opportunities which will greatly enhance your learning and help you establish valuable connections within the industry.

Read more about security manager

brainly.com/question/32458782

#SPJ2


Related Questions

Identifying How to Print a Record on One Page
Which property ensures that all of the details for a record will be printed on the same page, instead of being broken
up between two pages during printing?
O the Control Source property
the Force New Page property
O the Keep Together property
o the Page Break property

Answers

Answer:

C) The Keep Together Property

Explanation:

6.11 LAB: Sort a vector
Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The first integer
indicates how many numbers are in the list. Assume that the list will always contain less than 20 integers.
Ex: If the input is:
5 10 4 39 12 2
the output is:
2 4 10 12 39
For coding simplicity, follow every output value by a space, including the last one.
Your program must define and call the following function. When the SortVector function is complete, the vector passed in as the parameter
should be sorted.
void SortVector(vector int>& myVec)
Hint: There are many ways to sort a vector. You are welcome to look up and use any existing algorithm. Some believe the simplest to code
is bubble sort: https://en.wikipedia.org/wiki/Bubble_sort. But you are welcome to try others: https://en.wikipedia.org/wiki/Sorting_algorithm.
290064 1698536.qx3zqy7

Answers

The sort a vector program is an illustration of functions, loops and vectors or lists.

The main program

The program written in C++, where comments are used to explain each action is as follows:

#include<bits/stdc++.h>

using namespace std;

//This defines the SortVector function

void SortVector(vector <int>& myVec){

   //This sorts the vector elements in ascending order

   sort(myVec.begin(), myVec.end());

   //This iterates through the sorted vector, and print each element

for (auto x : myVec)

 cout << x << " ";

}

//The main begins here

int main(){

   //This declares all the variables

   int num, numInput; vector<int> v;

   //This gets the length of the vector

   cin>>num;

   //The following iteration gets input for the vector

   for(int i = 0; i<num;i++){

       cin>>numInput;

       v.push_back(numInput);

   }

   //This calls the SortVector function

   SortVector(v);

return 0;

}

Read more about functions at:

https://brainly.com/question/24833629

How many binary digits does a single hexadecimal digit represent?

Answers

Four binary digits

A single hexadecimal digit can represent four binary digits.

What is the output of the following code segment?

String[] cs = "Elon Musk founded SpaceX on May 6, 2002.".split(" ");

System.out.println(cs.length);

Answers

Answer:

8

Explanation:

The ability of a language to let a programmer develop a program on a computer system that can be run on other systems is called ________. This usually requires the program to be recompiled on each type of system, but the program itself may need little or no change.

Answers

Answer:

Virtual Machine

Explanation:

Example: JVM

An airline describes airfare as follows. A normal ticket's base cost is $300. Persons aged 60 or over have a base cost of $290. Children 2 or under have $0 base cost. A carry-on bag costs $10. A first checked bag is free, second is $25, and each additional is $50. Given inputs of age, carry-on (0 or 1), and checked bags (0 or greater), compute the total airfare. Hints: First use an if-else statements to assign airFare with the base cost Use another if statement to update airFare for a carryOn Finally, use another if-else statement to update airFare for checked bags Think carefully about what expression correctly calculates checked bag cost when bags are 3 or more

Answers

Answer:

The program in Python is as follows:

age = int(input("Age: "))

carryOn = int(input("Carry on Bags [0 or 1]: "))

checkedBags = int(input("Checked Bags [0 or greater]: "))

airFare = 300

if age >= 60:

   airFare = 290

elif age <= 2:

   airFare = 0

if carryOn ==  1:

   airFare += 10

if checkedBags ==  2:

   airFare += 25

elif checkedBags >  2:

   airFare += 25 + 50 * (checkedBags - 2)

print("Airfare: ",airFare)

Explanation:

This gets input for age

age = int(input("Age: "))

This gets input for carry on bags

carryOn = int(input("Carry on Bags [0 or 1]: "))

This gets input for checked bags

checkedBags = int(input("Checked Bags [0 or greater]: "))

This initializes the base cost to 300

airFare = 300

This updates the base cost to 290 for adults 60 years or older

if age >= 60:

   airFare = 290

This updates the base cost to 0 for children 2 years or younger

elif age <= 2:

   airFare = 0

This updates the airFare if carryOn bag is 1

if carryOn ==  1:

   airFare += 10

if carryOn bag is 0, the airFare remains unchanged

This updates the airFare if checkedBags is 2. The first bag is free; so, only the second is charged

if checkedBags ==  2:

   airFare += 25

This updates the airFare if checkedBags greater than 2. The first bag is free; so, only the second and other bags is charged

elif checkedBags >  2:

   airFare += 25 + 50 * (checkedBags - 2)

if checkedBags is 0 or 1, the airFare remains unchanged

This prints the calculated airFare

print("Airfare: ",airFare)

HELP!!!!!!!!!
1. Which of the following sorts software from the lowest level of abstraction to the highest?

Program, code segment, statement

Statement, code segment, program

Program, statement, code segment

Code segment, statement, program



2.Which of the following describes a lossy transformation of a digital image composed of pixels which have red, green and blue components stored using values from 0-255?

Swap the values of the blue and green components for each pixel.

Replace the green component of each pixel with the average value of the red and blue components of the pixel.

Replace the values for each pixel with the values from the pixel which is 10 pixels to the right. If the pixel is less than 10 pixels from the right of the image continue counting from the left of the image when the edge is reached

Replace each component of each pixel with the original value of that component subtracted from 255.

3. Procedures in programming are often defined with parameters - variables that are used in the procedure for which a value needs to be specified each time the procedure is called. Which of the following give a variable that would be useful to have as a parameter for the specified method? The value of (pi) in a procedure to find the area of a circle The name of an author in a procedure to search a library catalog for books The side length of a cube in a procedure to find the surface area of a cube

I and III only

II and III only

I, II, and III

I only

Answers

Answer:

Explanation:

1. Statement, code segment, program

as program includes everything so it has the highest level of abstraction.

2. Replace the green component of each pixel with the average value of the red and blue components of the pixel

as averaging will cause the transformation to become lossy.

3.  II and III only

as value of pi is constant, not a variable.

Answer:

Explanation:

1. the lowest level of abstraction to the highest: Statement, code segment, program

2. lossy transformation of a digital image: Replace the green component of each pixel with the average value of the red and blue components of the pixel.

3.  a variable that would be useful to have as a parameter for the specified method: The name of an author in a procedure to search a library catalog for books The side length of a cube in a procedure to find the surface area of a cube

II and III only

Ideally, how often should you back up the data on your computer?

Answers

Answer:

not oftenly, but leave space for other things and important stuff.

why does a computer system need memory​

Answers

Explanation:

Computer memory is a temporary storage area. It holds the data and instructions that the Central Processing Unit (CPU) needs.

In addition to explaining the paper’s topic, a thesis statement provides instructions on how to read the paper. explains why the paper was written. determines who will read the paper. serves as the paper’s road map for the reader.

Answers

Answer: I believe it’s explains why the paper was written!

Explanation:

Took edge 2021

Answer:

Explains why the paper was written.

Explanation:

Please give brainliest.

Why a commerce student must learn about SDLC (Software Development Life Cycle) and its phases?
How SDLC could help a commerce graduate in career growth and success?

Answers

Answer:

The description of the given question is described throughout the explanation segment below.

Explanation:

A method that delivers the best reliability as well as cheapest possible applications throughout the specified timeframe, is termed SDLC. A business student could perhaps read about such a life cycle and its stages when individuals not only relate to scientific issues and mean effective pressure.

Whenever a successful entrepreneur does an inventory of an enterprise, people are useful. SDLC demonstrates the capacity for decision-making or judgments.

What is the output of the following code segment?

String[] cs = "Bill Gates and Paul Allen founded Microsoft on April 4, 1975.".split(" ");

System.out.println(cs[6].charAt(5));

Answers

Answer:

o

Explanation:

Write a recursive function

string reverse(string str)
that computes the reverse of a string. For example, reverse("flow") should return "wolf". Hint: Reverse the substring starting at the second character, then add the first character at the end. For example, to reverse "flow", first reverse "low" to "wol", then add the "f" at the end.

Answers

Answer:

Explanation:

The following code is written in Java. It creates a function called stringReverse that takes in one string parameter and uses a recursive algorithm to print out the input string in reverse. The output can be seen in the attached picture below.

void stringReverse(String str)

   {

       //Check to see if String is only one character or less

       if ((str==null) || (str.length() <= 1))

           System.out.println(str);

       else

       {

           System.out.print(str.charAt(str.length()-1));

           stringReverse(str.substring(0,str.length()-1));

       }

   }

Lucy wants to add some notes in her research paper that provide additional information to the reader. She also wants to display her university logo on all the pages as part of the title. What formatting can she apply to her document to include these details?

Answers

She can use a header

what are the qualitative data items about text book​

Answers

Answer:

Qualitative data is defined as the data that approximates and characterizes. Qualitative data can be observed and recorded. ... This type of data is collected through methods of observations, one-to-one interviews, conducting focus groups, and similar methods.

Question 1a
1. Create a (3,3) array where row 0 is [0, 0, 0], row 1 is [2, 2, 2], row 2 is [-2, -2, -2]. Print the array.
2. Change element [0,0] to 10 and element [2,2] to -10. Print the array.
3. Subtract 2 from every element. Print the array.
4. Print all of the elements of the revised array that are positive.
In [ ]: # Your codes for 1.
In [ ]: # Your codes for 2.
In [ ]: # Your codes for 3.
In [ ]: # Your codes for 4.
Question 1b
You are provided with two lists of numbers.
• List 'x' denotes all 8 possible dollar investment outcomes of a risky project;
• List 'p' denotes their corresponding outcome probabilities.
• For instance, there is a 5% chance of $10000.
In this question, let's first convert the two lists into two separate arrays. Can you use np.dot to calculate the expected value of this risky project? That is, 10000X0.05+1000X0.05+100X0.2 ... Calculation without using np.dot() will be considered no points.
Finally, print the following sentence using print+format: The expected value of this risky project is $XXX.X.
Hint: the portfolio mean return example at the end of 2.3
In [ ]: x = (10000, 1000, 100, 10, 1, 0, -10, -100]
p = [0.05, 0.05, 0.20, 0.20, 0.1, 0.1, 0.1, 0.2]
In [ ]: # Your code here

Answers

Answer:

(1) The program in Python is as follows:

rows, cols = (3, 3)

arr =[[0,0,0],[2,2,2],[-2,-2,-2]]

print(arr)

arr[0][0] = 10

arr[2][2] = -10

print(arr)

for i in range(rows):

   for j in range(cols):

       arr[i][j]-=2

   

print(arr)

for i in range(rows):

   for j in range(cols):

       if arr[i][j]< 0:

           print(arr[i][j], end = ", ")

(2) The program in Python is as follows:

import numpy as np

x = [10000, 1000, 100, 10, 1, 0, -10, -100]

p = [0.05, 0.05, 0.20, 0.20, 0.1, 0.1, 0.1, 0.2]

q = np.dot(x,p)

print(q)

Explanation:

(1)

This initializes the rows and columns of the array to 3

rows, cols = (3, 3)

1. This creates and array and also populates it with the given data

arr =[[0,0,0],[2,2,2],[-2,-2,-2]]

Print the array

print(arr)

2. This changes index 0,0 to 10 and index 2,2 to -10

arr[0][0] = 10

arr[2][2] = -10

Print the array

print(arr)

This iterates through the rows and the columns of the array

for i in range(rows):

   for j in range(cols):

3. This subtracts 2 from each array element

       arr[i][j]-=2

Print the array    

print(arr)

This iterates through the rows and the columns of the array

for i in range(rows):

   for j in range(cols):

If array element is negative

       if arr[i][j]< 0:

4. Print the array element

           print(arr[i][j], end = ", ")

(2)

Line 1 and 2 are given as part of the program

x = [10000, 1000, 100, 10, 1, 0, -10, -100]

p = [0.05, 0.05, 0.20, 0.20, 0.1, 0.1, 0.1, 0.2]

This uses np dot to multiply x and p

q = np.dot(x,p)

This prints the result of the product

print(q)

**GIVING ALL POINTS** 4.02 Coding With Loops
I NEED THIS TO BE DONE FOR ME AS I DONT UNDERSTAND HOW TO DO IT. THANK YOU

Output: Your goal

You will complete a program that asks a user to guess a number.


Part 1: Review the Code

Review the code and locate the comments with missing lines (# Fill in missing code). Copy and paste the code into the Python IDLE. Use the IDLE to fill in the missing lines of code.


On the surface this program seems simple. Allow the player to keep guessing until he/she finds the secret number. But stop and think for a moment. You need a loop to keep running until the player gets the right answer.


Some things to think about as you write your loop:


The loop will only run if the comparison is true.

(e.g., 1 < 0 would not run as it is false but 5 != 10 would run as it is true)

What variables will you need to compare?

What comparison operator will you need to use?

# Heading (name, date, and short description) feel free to use multiple lines


def main():


# Initialize variables

numGuesses = 0

userGuess = -1

secretNum = 5


name = input("Hello! What is your name?")


# Fill in the missing LOOP here.

# This loop will need run until the player has guessed the secret number.


userGuess = int(input("Guess a number between 1 and 20: "))


numGuesses = numGuesses + 1


if (userGuess < secretNum):

print("You guessed " + str(userGuess) + ". Too low.")


if (userGuess > secretNum):

print("You guessed " + str(userGuess) + ". Too high.")


# Fill in missing PRINT statement here.

# Print a single message telling the player:

# That he/she guessed the secret number

# What the secret number was

# How many guesses it took


main()

Part 2: Test Your Code

Use the Python IDLE to test the program.

Using comments, type a heading that includes your name, today’s date, and a short description.

Run your program to ensure it is working properly. Fix any errors you observe.

Example of expected output: The output below is an example of the output from the Guess the Number game. Your specific results will vary based on the input you enter.


Output


Your guessed 10. Too high.

Your guessed 1. Too low.

Your guessed 3. Too low.

Good job, Jax! You guessed my number (5) in 3 tries!




When you've completed filling in your program code, save your work by selecting 'Save' in the Python IDLE.


When you submit your assignment, you will attach this Python file separately.


Part 3: Post Mortem Review (PMR)

Using complete sentences, respond to all the questions in the PMR chart.


Review Question Response

What was the purpose of your program?

How could your program be useful in the real world?

What is a problem you ran into, and how did you fix it?

Describe one thing you would do differently the next time you write a program.

Answers

Answer:

sorry man

Explanation:

In this problem, you will derive the efficiency of a CSMA/CD-like multiple access protocol. In this protocol, time is slotted and all adapters are synchronized to the slots. Unlike slotted ALOHA, however, the length of a slot (in seconds) is much less than a frame time (the time to transmit a frame). Let S be the length of a slot. Suppose all frames are of constant length L = kRS, where R is the transmission rate of the channel and k is a large integer. Suppose there are N nodes, each with an infinite number of frames to send. We also assume that dprop < s,="" so="" that="" all="" nodes="" can="" detect="" a="" collision="" before="" the="" end="" of="" a="" slot="" time.="" the="" protocol="" is="" as="">

⢠If, for a given slot, no node has possession of the channel, all nodes contend for the channel; in particular, each node transmits in the slot with probability p. If exactly one node transmits in the slot, that node takes possession of the channel for the subsequent k â 1 slots and transmits its entire frame.

If some node has possession of the channel, all other nodes refrain from transmitting until the node that possesses the channel has finished transmitting its frame. Once this node has transmitted its frame, all nodes contend for the channel.

Note that the channel alternates between two states: the productive state, which lasts exactly k slots, and the nonproductive state, which lasts for a random number of slots. Clearly, the channel efficiency is the ratio of k/(k + x), where x is the expected number of consecutive unproductive slots

a. For fixed N and p, determine the efficiency of this protocol.
b. For fixed N, determine the p that maximizes the efficiency.
c. Using the p (which is a function of N) found in (b), determine the efficiency as N approaches infinity
d. Show that this efficiency approaches 1 as the frame length becomes large

Answers

Answer:

He is correct

Explanation:

21. The most overlooked people in information security are:
A consultants and temporary hires.
B. secretaries and consultants.
C. contract laborers and executive assistants.
D. janitors and guards.
E. executives and executive secretaries.

Answers

Answer: D. janitors and guards

Explanation:

Information security simply means the protection of information from an unauthorized use or access.

The most overlooked people in information security are the janitors and the guards. Due to the fact that they're at the bottom of the organizational chart, they tend to be overlooked and not given the respect that they deserve.

arrange the following numbers in ascending order -2/3, 7/-18 , 5/-19​

Answers

Answer:

2/3 5/19 7/18

Explanation:

Suppose class Person is the parent of class Employee. Complete the following code:
class Person :
def __init__(self, first, last) :
self.firstname = first
self.lastname = last
def Name(self) :
return self.firstname + " " + self.lastname
class Employee(Person) :
def __init__(self, first, last, staffnum) :
Person.__init__(self,first, last) self.staffnumber = staffnum
def GetEmployee(self) :
return self.Name() + ", " + self.staffnumber
x = Person("Sammy", "Student")
y = Employee("Penny", "Peters", "805")
print(x.Name())
print(y.GetEmployee())

Answers

Answer:

Explanation:

There is nothing wrong with the code it is complete. The Employee class is correctly extending to the Person class. Therefore, the Employee class is a subclass of Person and Person is the parent class of Employee. The only thing wrong with this code is the faulty structure such as the missing whitespace and indexing which is crucial in Python. This would be the correct format. You can see the output in the picture attached below.

class Person :

   def __init__(self, first, last) :

       self.firstname = first

       self.lastname = last

   def Name(self) :

       return self.firstname + " " + self.lastname

class Employee(Person) :

   def __init__(self, first, last, staffnum) :

       Person.__init__(self,first, last)

       self.staffnumber = staffnum

   def GetEmployee(self) :

       return self.Name() + ", " + self.staffnumber

x = Person("Sammy", "Student")

y = Employee("Penny", "Peters", "805")

print(x.Name())

print(y.GetEmployee())

8 cosas que hacemos que gastan mucha energia

Answers

1. PLANCHA DE ROPA
Es posible que planchar la ropa no consuma mucha energía, pero la propia plancha consumirá alrededor de 1200 vatios por hora.

2. SECADOR DE PELO
Aunque no uses tu secador de pelo por mucho tiempo, usa entre 1,000 y 1,875 vatios de energía por hora.

3. HUMIDIFICADOR
Los humidificadores son excelentes para mantener húmedo el aire seco, pero si no obtiene un modelo que ahorre energía, podría estar usando hasta 1,000 vatios de energía por hora.

4. HORNO TOSTADOR
Tostar un poco de pan o calentar una pizza puede llevar solo unos minutos, pero probablemente esté consumiendo más energía de la que cree. El horno tostador promedio utiliza alrededor de 1.150 vatios de energía por hora.

5. FABRICANTE DE CAFÉ
Si es como algunos de nuestros expertos en mejoras para el hogar, le gusta tomar su café diario. Sin embargo, la cafetera promedio usa entre 600 y 1200 vatios de energía.

6. ASPIRADORA
Las aspiradoras vienen en una variedad de estilos y usan una variedad de energía, por lo que una promedio le dará entre 300 y 1000 vatios de energía.

7. MICROONDAS
Al igual que las aspiradoras, las microondas también vienen en una variedad de estilos y usan una variedad de energía, por lo que la suya puede usar entre 600 y 1500 vatios de energía.

8. LAVAVAJILLAS
Sabemos lo conveniente que es un lavavajillas, pero cuando lo usas, estás usando alrededor de 1350 vatios de energía por hora.

Which is true regarding pseudocode?
It uses simple words and symbols to communicate the design of a program,
It compiles and executes code.
It expresses only complex processes.
O It gives a graphical representation of a set of instructions to solve a problem.

Answers

Answer:

It uses simple words and symbols to communicate the design of a program

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language. Also, a pseudocode gives a summary of the steps adopted during a software development process using simple (concise) words and symbols.

This ultimately implies that, a pseudocode uses simple words and symbols to communicate the design of a program.

Answer:

A: It uses simple words and symbols to communicate the design of a program

Explanation:

Credit to the person above me.

If You're is in credit card debt, why can't you just say your card was stolen so you can avoid the debt.

Answers

You can not claim this because most times credit card issuers will be able to match purchases and charges to your location, ex stores around you, online purchases sent to your location.
because they can see literally everything you do with your card, they monitor everything

Question 2
1 pts
Which of the following is true about main and secondary memory?
O Main memory is short term memory used by the CPU in processing commands,
secondary memory is more permanent and used for storage.
Secondary memory is lost when the device's power is turned off.
Main memory is more permanent and used for storage, secondary memory is short
term memory is used by the CPU in processing commands.
Main memory is used for storage.

Answers

Answer:

Main memory is short term memory used by the CPU in processing commands,

secondary memory is more permanent and used for storage.

Explanation:

Main memory defines ur ram.

Secondary memory defines your hard drives etc.

Encapsulation is a form of information hiding and an important characteristic of object-oriented programming. When a programmer accesses a property that has been encapsulated, he/she has no way of knowing how that property is implemented. All he/she knows is how to access that property via the public setter and getter methods. What are some examples of encapsulation or information hiding in the Bible

Answers

Answer:

There are a whole lot of encapsulation or information hiding examples in the Bible. Here are about 3 of them:

i. The parables of Jesus. Many times Jesus spoke in parables to teach His disciples and until He's explained they would not get the meaning.

ii. The interpretation of dreams by Joseph. A noticeable example is the one of the baker and the butler in Genesis 40. Each of them - the butler and the baker - both had a dream but the actual meaning and interpretation of those dreams were not known by them.

iii. Peter walking on water is yet another example of encapsulation. He was only following the instruction of the master. How he was able to walk on water was a mystery to him. Only Christ the master knew how. Encapsulation.

c program to check if number is even​

Answers

Answer:

Yes.

Explanation:

Check the jpeg below for the code.

Who takes Mindtap Web Design

Answers

Answer:

MindTap is a new personalized program of digital products and services that engages students with interactivity while also offering students and instructors choice in content, platform, devices, and learning tools. ... The customizable, cloud-based system is a web portal students log into to navigate via a dashboard.

Explanation:

MindTap for Minnick's Responsive Web Design with HTML 5 & CSS, 9th Edition is the digital learning solution that powers students from memorization to mastery. It gives you complete control of your course—to provide engaging content, to challenge every individual, and to build their confidence.

Describing Report Tools Functions
Which Report Tools contextual tab would you use to alter a column's font, color, and text size in a report?
O Design
Arrange
O Format
O Page Setup

Answers

Answer:

C. format

Explanation:

which function in Ecels tells how many numeric entries are there​

Answers

Answer:

CHKNUM

Brainly.......

Other Questions
what can 15 and 3 both be divided by Elizabeth Cady Stanton's purpose for writing The Declaration of Sentiments was torefuse to pay taxes without representationsupport the issue of women's rights and improve the civil and legal rights of women guaranteed by the Constitutionorganize delegates at the Women's Rights Convention in 1848convince individual states to grant women the right to vote Consider ABMX below.B25.22.1XM18.6BX=What is the perimeter of ABMX? Find the area of this circle. Use 3.14 for pie . Write a story on a ring that have supernatural powers and you can use these powers only one time.Please help me friends. Please help meh plzzzzzz can you help me for this math? Samuel wants to attend a four- year university with an annual tuition of $16,700. He has $21,000 in savings and earned a grant for $6,000 for each year of college. How much more does Samuel need to pay for the tuition for all four years? Estimate a 15% tip on a dinner bill of $49.35 by first rounding the bill amount to the nearest ten dollars. PLEASE HELP ASAP!! CORRECT ANSWER ONLY PLEASE!!!Mr. Slater invested $100,000 in a portfolio that is contains 60% stocks and 40% bonds. Over the course of a year, the value of the stocks increased to 67%, and the value of the bonds decreased to 33%. The current value of his investment is $118,400. How much should Mr. Slater move from stocks to bonds to rebalance his portfolio to 60% stocks and 40% bonds?A. $8,900B. $8,500C. $8,288D. $8,100 Can yall help me with this I dont understand stand 2 Jupiter orbits the sun in a nearly circular path with radius 7.8x10^11m. The orbital period of Jupiter is 12 years.The mass of Jupiter is 2.0 x 10^27 kg. predict the mass of the Sun. Someone please help me thank you If there are 30 adults at a party and 21 kids at a party what is the fraction of adults at the party does Earth's atmosphere carry gases and this affects our weather constantly. true or false What is the 1st phase of mitosisprophaseinterphasemetaphaseanaphase Which statement would cause polarization?Danny doesn't want to play football with Sam. Sam comes on the playground and takes the ball from the players.Danny and the other players run after Sam. Sam throws the ball to the other yard. Danny starts calling Sam names. Danny and Sam start to fight.Both Danny and Sam represent a ____________style of conflict management.a.confrontationalb.cooperativec.constructived.non-confrontational Re word this paragraph; so Its 'put in my own words' try to mix up the places of each sentences too please!-The sun creates three different types of electromagnetic radiation, which is considered harmful to humans. The light created includes X-rays, gamma rays, and ultraviolet light. These rays are harmful because of their high energy values, which are caused by their large frequencies. The gases of Earth's atmosphere absorb the high energy radiation, causing their molecules to move faster, but none of the light radiation reaches Earth's surface. Luckily for us, the high frequency of gamma rays and X-rays, as well as most ultraviolet light, cannot penetrate Earth's atmosphere and does not reach Earth's surface. If those harmful rays did reach Earth's surface it would make the planet plain to earth's - lol sorry im being supperrrrrr lazy rn A number, X, rounded to 1 decimal place is 3,7Write down the error interval for x,