Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have broad security implications for years to come. Which firewall architecture is designed to host servers that offer public services?

Answers

Answer 1

Complete Question:

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?

a) Bastion Host

b) Screened subnet

c) Screened host

d)  Screened

Answer:

b) Screened subnet

Explanation:

In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.

Screened subnet firewall architecture is designed to host servers that offer public services.

In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.

A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;

1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.

2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.

3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.

The screened subnet when properly configured helps to prevent access to the internal network or intranet.


Related Questions

(ii)
Give two uses of the Start Menu.​

Answers

Answer:

used folders, files, settings, and features. It's also where you go to log off from Windows or turn off your computer. One of the most common uses of the Start menu is opening programs installed on your computer. To open a program shown in the left pane of the Start menu, click it

A program is run line by line to determine the source of a logic error. Which best describes the specific tool being used? (A.)compiler,(B.)interpreter,(C.)stepping function,(D.)beta tester

Answers

Answer:

C) Stepping function

Explanation:

I do not have the textbook definition at hand.

But, based on my years of exp. working as a Software Engineer, we step function line by line to determine errors.

Answer:

A.

Explanation:

Write a SELECT statement that returns four columns from the Invoices table, named Number, Total, Credits, and Balance: Number Column alias for the InvoiceNumber column Total Column alias for the InvoiceTotal column Credits Sum of the PaymentTotal and CreditTotal columns Balance InvoiceTotal minus the sum of PaymentTotal and CreditTotal Use the AS keyword to assign column aliases.

Answers

Answer and Explanation:

For returning four columns from the  Invoices table, named Number, Total, Credits, and Balance the SELECt statement is as follows

Select     Invoice Number     As     Number

              Invoice Total          As      Total

Payment total + credit total  As      Credits

Invoice total

(Payment total + credit total) As     Balance

These are displayed as above

32.
To give an existing document a different name
A. retype and give it another name,
B. use the save command
C. use the same as command
D. use windows explorer to copy.

Answers

Answer:

B.

Explanation:

If you are trying to save an existing document you would use the save command and you will be prompted if you want to rename it to what ever you wish

Hope this helps :)

which key Moves the cursor to the previous field data sheet view​

Answers

Answer:  Frequently used shortcuts

To do this Press

Show or hide a property sheet F4

Switch between Edit mode (with insertion point displayed) and Navigation mode in the Datasheet or Design view F2

Switch to Form view from the form Design view F5

Move to the next or previous field in the Datasheet view The Tab key or Shift+Tab

Explanation:  I hope this helps

While working on an investigation, a colleague hands you a list of file creation and access times taken from a compromised workstation. To match the times with file access and creation times from other systems, what do you need to account for

Answers

Answer:

Record time offsets.

Explanation:

In this scenario, to match the times with file access and creation times from other systems, you will need to account for time offsets.

The time offset refers to the time stamp associated with different processes or tasks on a computer in nanoseconds through the operating system.

Since you've been handed a list of file creation and access times taken from a compromised workstation by your colleague, you'll need to match respectively the time the file was created to the time it was accessed by an unauthorized user.

Additionally, the time stamp varies depending on the operating system being used;

- For windows operating system, it uses a 64 bit time stamp.

- For Linux or Unix, it uses a 32 bit time stamp.

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices. Group of answer choices

Answers

Complete Question:

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

Group of answer choices:

A. True.

B. False.

Answer:

A. True.

Explanation:

A proxy server is an example of non-security devices with security features because it acts as a hub or gateway between a user and the internet. Therefore, when a user request for resources through a website, the proxy server acts as an intermediary between them and the web server providing such resources.

ACL is an acronym for access control list and it comprises of rules that grant or deny access to resources on a network.

A firewall is a network security system which prevents unauthorized access on a private network by monitoring, controlling and filtering inbound and outbound network traffic (packets) based on a set of security rules.

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

Hence, Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

Which statement is true?
a. When a method call is made, the called method must know how to return to its caller, so the return address is pushed onto the program execution stack.
b. Stacks support recursive method calls in the same manner as conventional, nonrecursive method calls.
c. The program execution stack contains the space created for a method's global variables on each invocation of that method during a program's execution.
d. When a method returns to its caller, the memory for that method's local variables is popped off the stack and those variables are no longer known to the program.

Answers

Answer: D) When a method returns to its caller, the memory for that method's local variables is popped off the stack and those variables are no longer known to the program.

Explanation:

Read the following code used to calculate the total cost of an item with tax: price = input("What is the item price? ") tax = price * 0.065 totalPrice = price + tax There is an error in the code. What type of function needs to be used? (5 points) float() int() print() str()

Answers

Answer: float()

Explanation: The code used to calculate total price = tax + price.

price = input("What is the item price? ")

tax = price * 0.065

totalPrice = price + tax

Since the input required from the user will be numerical, that is the price of an item, then it has to be stated explicitly, instead the code throws an error as it will read in a string if not stated explicitly.

Also, Given that the total price calculation will require decimal or fractional calculations, using the float() function will allow the program to read in the user input as a numerical value which can be used in further calculation as the float () function provides flexibity when working with fractional values.

Write a loop that reads positive integers from standard input and that terminates when it reads an integer that is not positive. After the loop terminates, it prints out, on a line by itself, the sum of all the even integers read. Declare any variables that are needed. ASSUME the availability of a variable, stdin, that references a Scanner object associated with standard input

Answers

Answer:

Written in Java Programming Language

import java.util.Scanner;

public class Assign{

   public static void main(String [] args)    {

   Scanner stdin = new Scanner(System.in);

   int num,sum=0;

   System.out.println("Start Inputs: ");

   num = stdin.nextInt();

   while (num>=0) {

       if(num%2== 0)

       {

       sum+=num;    

       }      

       num = stdin.nextInt();

   }

   System.out.print("Sum of even numbers: "+sum);

   

   }

}

Explanation:

I'll start my explanation from line 4

This line initializes Scanner object stdin

Scanner stdin = new Scanner(System.in);

This line declares necessary variables and initializes sum to 0

   int num,sum=0;

This line prompts user for inputs

   System.out.println("Start Inputs: ");

This line reads user inputs

   num = stdin.nextInt();

This line checks is user input is not negative (It's a loop that will be repeated continually until a negative number is inputted)

   while (num>=0) {

This line checks if user input is an even number

       if(num%2== 0)

       {

If the above condition is true, this line calculates the sum of even numbers

       sum+=num;    

       }      

This line prepares the user for next input

       num = stdin.nextInt();

   }

This line prints the calculated sum of even number; If no even number is inputted, the sum will be 0

   System.out.print("Sum of even numbers: "+sum);

Write a program segment with a do-while loop that displays whether a user-entered integer is even or odd. The code should then ask the user if he or she wants to test another number. The loop should repeat as long as the user enters 'Y' or 'y' . Use a logical OR operator in the do-while loop test expression

Answers

Answer:

Following is the program in C++ program

#include<iostream> // header file

using namespace std; // namespace  

int main() // main function  

{

int num1 = 0; // variable declaration  

char test;// variable declaration  

do

{

cout << " Enter the number: ";

cin >> num1; //Read the input by the user  

if (num1 % 2 == 0) // check the condition of even

cout << " number is even.\n";

else // check the condition of odd

cout << "Number is odd.\n";

cout << " Do you wanted the another test of number (y/n)? ";

cin >> test; //Read the input by user

} while (test == 'y' || test == 'Y'); //terating the loop

return 0;    

}

Output:

Enter the number:45

number is even.

Do you wanted the another test of number (y/n) Y

Enter the number:5

Number is odd.

Do you wanted the another test of number (y/n) n

Explanation:

Following are the description of program

Declared a variable "num1" as integer type and initialized as 0 to them Declared a variable "test" as char type .After that iterating the do -while loop .Read the value by the user in the "num1" variable .Check the condition of even and odd by using % operator .Read the value of test by the user .If the user enter Y or y then loop again executing otherwise not .

Could someone give an example or tell me what all of these mean? (For internet source citing) Evaluation: • Domain Name: • Authoritativeness: • Accuracy: • Timeliness: • Objectivity: •Writing Style and Mechanics: • Graphics: • Links:

Answers

Evaluation-the making of a judgment about the amount, number, or value of something; assessment

Domain Name-Is a websites name (ex-Google)

Authoritativeness-The quality of possessing authority. The quality of trustworthiness and reliability.

Accuracy-the quality or state of being correct or precise

Timeliness-the fact or quality of being done or occurring at a favorable or useful time.

Objectivity-the quality of being objective.

Writing Style and Mechanics-Style has to do with how a piece of writing sounds. Everyone has a style which develops along with their writing.

Paragraph structure: Each paragraph should begin with a topic sentence that provides an overall understanding of the paragraph. ...

Sentence length: Sentences should be kept as short as possible so that their structure is simple and readable.

Graphics-are visual images or designs

Links- is an open source text and graphic web browser with a pull-down menu system.

Consider the following code: x = 17 y = 5 print (x % y) What is output?

Answers

Answer:

2

Explanation:

The modulo operator returns the remainder after integer division.

17 / 5 has integer result 15 and remainder 2

Which of the following statements about an inner class is true? An inner class is used for a utility class that should be visible elsewhere in the program. An inner class that is defined inside a method is publicly accessible. An inner class that is defined inside a method is not publicly accessible. An inner class that is defined inside an enclosing class but outside of its methods is not available to all methods of the enclosing class.

Answers

Answer:

(c) An inner class that is defined inside a method is not publicly accessible.

Explanation:

In programming languages such as Java, inner class (also called nested class) basically means a class inside another class or interface. The following are a few things to note about an inner class

i. Inner classes are used to group classes logically so that they are easy to use and maintained.

ii. An inner class defined inside a method of an enclosing class is not publicly accessible. They are called method local inner class

iii. An inner class that is defined inside an enclosing class but outside of its methods are available to all methods of the enclosing class

iv. An inner class has access to members, including private members, of its enclosing class.

a force of 50n acts on a body of mass 5kg. calculate acceleration produced .​

Answers

Answer:

Force = 50n

mass = 5kg

Force = m * acc

50 = 5 * A

A = 50/5

A = 10 m/s^2

HOPE IT HELPS!!!

Explanation:

which functions are performed by server-side code??​

Answers

Answer:

The answer is explained below

Explanation:

Server side code is a code built using the .NET framework so as to communicate with databases which are permanent. Server side code is used to store and retrieve data on databases, processing data and sending requested data to clients.

This type of code is used mostly for web applications inn which the code is being run on the server providing a customized interface for users.

In cell B12, enter a formula to calculate the amount budgeted for mileage to/from Airport. The amount is based on the Mileage Rate to/from Airport and the Roundtrip Mikes to Airport locates in the Standard Inputs section.

Answers

Answer:

Format the Title and Complete the Input Areas

Your first tasks are to format the title and complete the input area. The input area contains two sections: Standard Inputs that are identical for all travelers and Traveler Inputs that the traveler enters based on his or her trip.

Open e01c1Travel and save it as e01c1Travel_LastFirst.

Merge and center the title over the range A1:E1 and set the row height for the first row to 40.

Apply the Input cell style to the ranges B3:B6, E3:E4, and E6:E7, and then apply the Calculation cell styleto cell E5. Part of the borders are removed when you apply these styles.

Select the ranges A3:B6 and D3:E7. Apply Thick Outside Borders.

Enter 6/1/2018 in cell E3 for the departure date, 6/5/2018 in cell E4 for the return date, 149 in cell E6 for the hotel rate per night, and 18% in cell E7 for the hotel tax rate.

Enter a formula in cell E5 to calculate the number of days between the return date and the departure date.

Insert Formulas

The Detailed Expenses section contains the amount budgeted for the trip, the actual expenses reported by the traveler, percentage of the budget spent on each item, and the amount the actual expense went over or under budget. You will insert formulas for this section. Some budgeted amounts are calculated based on the inputs. Other budgeted amounts, such as airfare, are estimates.

Enter the amount budgeted for Mileage to/from Airport in cell B12. The amount is based on the mileage rate and roundtrip to the airport from the Standard Inputs section.

Enter the amount budgeted for Airport Parking in cell B13. This amount is based on the airport parking daily rate and the number of total days traveling (the number of nights + 1) to include both the departure and return dates. For example, if a person departs on June 1 and returns on June 5, the total number of nights at a hotel is 4, but the total number of days the vehicle is parked at the airport is 5.

Enter the amount budgeted for Hotel Accommodations in cell B16. This amount is based on the number of nights, the hotel rate, and the hotel tax rate.

Enter the amount budgeted for Meals in cell B17. This amount is based on the daily meal allowance and the total travel days (# of hotel nights + 1).

Enter the % of Budget in cell D12. This percentage indicates the percentage of actual expenses to budgeted expenses. Copy the formula to the range D13:D18.

Enter the difference between the actual and budgeted expenses in cell E12. Copy the formula to the range E13:E18. If the actual expenses exceeded the budgeted expenses, the result should be positive. If the actual expenses were less than the budgeted expense, the result should be negative, indicating under budget.

Add Rows, Indent Labels, and Move Data

The Detailed Expenses section includes a heading Travel to/from Destination. You want to include two more headings to organize the expenses. Then you will indent the items within each category. Furthermore, you want the monetary columns together, so you will insert cells and move the Over or Under column to the right of the Actual column.

Insert a new row 15. Type Destination Expenses in cell A15. Bold the label.

Insert a new row 19. Type Other in cell A19. Bold the label.

Indent twice the labels in the ranges A12:A14, A16:A18, and A20.

Select the range D10:D21 and insert cells to shift the selected cells to the right.

Cut the range F10:F21 and paste it in the range D10:D21 to move the Over or Under data in the new cells you inserted.

Format the Detailed Expenses Section

You are ready to format the values to improve readability. You will apply Accounting Number Format to the monetary values on the first and total rows, Comma Style to the monetary values in the middle rows, and Percent Style for the percentages.

Apply Accounting Number Format to the ranges B12:D12 and B21:D21.

Apply Comma Style to the range B13:D20.

Apply Percent Style with one decimal place to the range E12:E20.

Underline the range: B20:D20. Do not use the border feature.

Apply the cell style Bad to cell D21 because the traveler went over budget.

Select the range A10:E21 and apply Thick Outside Borders.

Select the range A10:E10, apply Blue-Gray, Text 2, Lighter 80% fill color, apply Center alignment, and apply Wrap Text.

Manage the Workbook

You will apply page setup options, insert a footer, and, then duplicate the Expenses statement worksheet.

Spell-check the workbook and make appropriate corrections.

Set a 1.5" top margin and select the margin setting to center the data horizontally on the page.

Insert a footer with your name on the left side, the sheet name code in the center, and the file name code on the right side.

Copy the Expenses worksheet, move the new worksheet to the end, and rename it Formulas.

Display the cell formulas on the Formulas worksheet, change to landscape orientation, and adjust column widths. Use the Page Setup dialog box or the Page Layout tab to print gridlines and row and column headings.

When approved for a loan, an individual essentially applied for aid in the area of...
A. Increasing (and financing) immediate increase in cash flow
B. limited liability
C. future educational services
D. protections and insurance

Answers

Answer:

The correct answer is A. When approved for a loan, an individual essentially applied for aid in the area of increasing (and financing), as it implies an immediate increase in cash flow.

Explanation:

Every loan involves the delivery of money by a bank or a financial agency to a person or company, with the consideration that the latter will later return said amount, plus an additional amount for interest, within a specified period and may pay in a single payment and in full or through an installment plan. But, in any case, the immediate result of said loan is an increase in the cash flow of the person who obtains said loan, which can be used for the acquisition of goods or services, or to face different eventual expenses.

An employee sets up Apache HTTP Server. He types 127.0.0.1 in the browser to check that the content is there. What is the next step in the setup process?

Answers

Answer:

Set up DNS so the server can be accessed through the Internet

Explanation:

If an employee establishes the HTTP server for Apache. In the browser, he types 127.0.0.1 to verify whether the content is visible or not

So by considering this, the next step in the setup process is to establish the DNS as after that, employees will need to provide the server name to the IP address, i.e. where the server exists on the internet. In addition, to do so, the server name must be in DNS.

Hence, the first option is correct

Your question is lacking the necessary answer options, so I will be adding them here:

A. Set up DNS so the server can be accessed through the Internet.

B. Install CUPS.

C. Assign a static IP address.

D. Nothing. The web server is good to go.

So, given your question, what is the next step in the setup process when setting up an Apache HTTP Server, the best option to answer it would be: A. Set up DNS so the server can be accessed through the Internet.

A server can be defined as a specialized computer system that is designed and configured to provide specific services for its end users (clients) on a request basis. A typical example of a server is a web server.

A web server is a type of computer that run websites and distribute web pages as they are being requested over the Internet by end users (clients).

Basically, when an end user (client) request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser; a request is sent to the Internet to view the corresponding web pages (website) associated with that particular address (domain name).

An Apache HTTP Server is a freely-available and open source web server software designed and developed to avail end users the ability to deploy their websites on the world wide web (WWW) or Internet.

In this scenario, an employee sets up an Apache HTTP Server and types 127.0.0.1 in the web browser to check that the content is there. Thus, the next step in the setup process would be to set up a domain name system (DNS) so the server can be accessed by its users through the Internet.

In conclusion, the employee should set up a domain name system (DNS) in order to make the Apache HTTP Server accessible to end users through the Internet.

Find more information here: https://brainly.com/question/19341088

Jasmine is using the software development life cycle to create a song-writing app. She wants to work with others to create music. What should Jasmine do to begin the process?
Analyze and document the requirements for building the app
Break up the work into chunks and begin writing the app code
Make improvements and enhancements to the app based on feedback Write pseudocode and create a mock-up of how the app will work and look

Answers

Answer:Python's built-in library of functions allows programmers to import pre-written applications.

Explanation:

Answer: Analyze and document the requirements for building the app

Explanation: I took a quiz with that question and guessed and got it right. Other than that, I got nothing

The goals of _____ are to determine the work load at which systems performance begins to degrade and to identify and eliminate any issues that prevent the system from reaching its required system-level performance.

Answers

Answer:

volume testing hope this helps :)

The parallax perspective says that objects that are close up appear to move __________ than far away objects.

A. More smoothly
B. More randomly
C. Slower
D. Faster ​

Answers

Answer:

It appears to move faster.

Is the IOT governable by frameworks? Explain your rationale.

Answers

Answer:

Absolutely yes.

Explanation:

IoT is an acronym for Internet of Things. This is a system of network devices connected together in order to transmit data over the internet. And since communication of these devices is over the internet, there's a need for some protocols for control and moderation. Hence, the need for IoT governance frameworks.

Some of the aspects that should be governed by these frameworks are;

i. Data confidentiality:

Data such as Social Security Numbers, Bank Verification Numbers and Credit card details, that are being transmitted in an IoT system should be assured of protection from unwanted usage or access.

ii. Data integrity:

These data should also be assured of consistency and accuracy over a long period of time.

iii. Accountability:

When there is a breach or some sort of mishappening, there has to be a body that would be held accountable.

The RAM is a type of ____ a.Main Memory b.Secondary Memory c.Human Memory d.EPROM e.EEPROM

Answers

Answer:

b.Secondary Memory

Explanation:

it is where information is stored for a short period of time.

Hope it helps.

RAM is a primary memory... aka main memory because computer can't function without it

here's an excerpt from geeksforgeeks

Memory is the most essential element of a computing system because without it computer can’t perform simple tasks. Computer memory is of two basic type – Primary memory(RAM and ROM) and Secondary memory(hard drive,CD,etc.). Random Access Memory (RAM) is primary-volatile memory and Read Only Memory (ROM) is primary-non-volatile memory.

ALGUEM SABE COMO MUDA O NOME DE PERFIL!?!?!? SE SOUBER ME AJUDA!!

Answers

Answer:

The following are the steps to change the profile name.

Explanation:

In the given question it is not defined in which we change the profile name.so, we define the steps to change the profile name social media like (Face book).

first of all, login into your account with your id and password.After login go to the setting bar, this bar is available on the top right corner.    After opening the setting go to the general setting option and open it.In the general setting option, It provides name, username, and contact options in these options we update the profile name.  To update the profile name we click on the edit link in which it opens the edit panel. After writing the name select the save changes button to save the profile name.

Answer:

MUDA DA MUDAAAA

Explanation:

convert thefollowing decimal number to its equivalent binary, octal, hexadecimal 255

Answers

Answer:

Binary: 11111111

Octal: 377

Hexadecimal: FF

Explanation:

Given

Decimal Number: 255

Required

Convert to

- Binary

- Octal

- Hexadecimal

Converting to binary...

To convert to binary, we take note of the remainder when the quotient is divided by 2 until the quotient becomes 0;

255/2 = 127 R 1

127/2 = 63 R 1

63/2 = 31 R 1

31/2 = 15 R 1

15/2 = 7 R 1

7/2 = 3 R 1

3/2 = 1 R 1

1/2 = 0 R 1

By writing the remainder from bottom to top, the binary equivalent is 11111111

Converting to octal...

To convert to octal, we take note of the remainder when the quotient is divided by 8 until the quotient becomes 0;

255/8 = 31 R 7

31/8 = 3 R 7

3/8 = 0 R 3

By writing the remainder from bottom to top, the octal equivalent is 377

Converting to hexadecimal...

To convert to hexadecimal, we take note of the remainder when the quotient is divided by 16 until the quotient becomes 0;

255/16 = 15 R 15

15/16 = 0 R 15

In hexadecimal, 15 is represented by F; So, the above division can be rewritten as

255/16 = 15 R F

15/16 = 0 R F

By writing the remainder from bottom to top, the hexadecimal equivalent is FF

Each row in a database is a set of unique information called a(n) (A.)table,(B.)record,(C.)object,(D.)field

Answers

Answer:

the answer is B.) A record

Explanation:

I just took the test and got it right.

Answer:

it's A or a record

Explanation:

Operations that run in protected mode must go through which of the following before they can access a computer’s hardware? A. Kernal B. Network C. Device driver D. User Interface

Answers

Answer:

Option A (Kernal) seems to be the right answer.

Explanation:

A Kernel appears to be the central component of such an OS. This handles machine as well as hardware activities, including most importantly storage as well as CPU power.This manages the majority of the initialization as well as program input/output requests, converting them into CPU data-processing commands.

The other given option are not related to the given circumstances. So that option A would be the right answer.

Answer:

kernel

Explanation:

what is a type of system software that allows a user to perform maintenance type tasks​

Answers

Answer:

Computer

Explanation:

The type of system software that allows a user to perform maintenance-type tasks​ is a computer.

A computer has many programs and operating systems.

Variables defined inside a member function of a class have: Block scope. Class or block scope, depending on whether the binary scope resolution operator (::) is used. Class scope. File scope.

Answers

Answer:

The answer is "Block scope".

Explanation:

In the programming, the scope is a code, in which it provides the variable ability to exist and not be retrieved beyond variable. In this, the variables could be defined in 3 locations, that can be described as follows:

Inside a method or the block, which is also known as a local variable. Outside of the method scope, which is also known as a global variable. Defining parameters for functions known as formal parameters.
Other Questions
What is the scale factor of the dilation? Cules tres culturas han influido la cultura de Puerto Rico? A 8.00-kg object is hung from the bottom end of a vertical spring fastened to an overhead beam. The object is set into vertical oscillations having a period of 1.70 s. Find the force constant of the spring. A mineral that helps in clotting of blood________.please tell me what is the answer of this question. Find the value of this expression if x = -7.X2 +7/xEnter the correct answer. What are the domain and range of f(x) = 2|x 4|? The average daily rainfall for the past week in the town of Hope Cove is normally distributed, with a mean rainfall of 2.1 inches and a standard deviation of 0.2 inches. If the distribution is normal, what percent of data lies between 1.9 inches and 2.3 inches of rainfall? a) 95% b) 99.7% c) 34% d) 68% Please answer this correctly without making mistakes What is the value of x in the equation 4x +8y=40, when y=0,8? given f(x) = x -2, if the domain is 5, find the range Which decision-making skills can be used to promote health? Check all that apply. {the options:} -the ability to determine that a source of information is valid -the ability to list alternatives when facing a decision -the ability to make decisions on experience alone -the ability to use criteria to evaluate a service or product -the ability to gather information about health issues -the ability to seek advice if more information is needed PLEASE HELP ASAPPP Flower bed is filled with five types of flowers. Which placement of the flowers represents the highest entropy? What are the differences and simiarities between greco-roman culture and middle age The following data has been collected about Keller Company's stockholders' equity accounts:Common stock $10 par value 10,000 shares authorized and 5,000 shares issued, 3,000 shares outstanding $50,000Paid-in-capital in excess of par value, common stock 40,000Retained earnings 15,000Treasury stock 31,200 Brian owns a company that makes inexpensive replacement parts for bicycles. He's ready to increase the scale of his business and wants to use Google Display Ads to drive sales. Which feature of a Google Display Ads will help Brian achieve his business objectives? Differentiate x^(-3)/3-2x^2-x^(-1) women perform better than men when they are put in leadership positions. write to against the motion Robyn saves up $204 and spends $32.50 on books. She wants to purchase more books from a sale where they cost $8.15 each. Which equation represents the situation? A. 204x=8.15+32.5 B. 8.15x+32.5=204 C. 8.15+32.5x=204 D. 32.5x=2048.15 classify the following into physical and chemical changes a) drying of a shirt in the sun b) rising of hot air over a radiator c)rusting of iron d)mixing of sand with sugar e) digestion f) milk turns to curd g) dissolution of salt in water