what type of password did the security expert recommend you put on smart home devices?

Answers

Answer 1

A security expert would recommend you use a strong and unique password on smart home devices.

Smart home devices refer to the electronic devices that we use in our daily lives that are interconnected through the internet. These devices can include smart lights, thermostats, cameras, door locks, among others, which you can easily manage using your smartphone or any other networked device.

If you have a smart home device, you will need to ensure that it is secure, which will require you to set up a password. A security expert would recommend you use a strong and unique password on smart home devices. The password should have the following characteristics:

It should be at least 12 characters longIt should have a combination of upper and lower-case letters, numbers, and special charactersIt should not be easily guessableIt should not be used on other accounts

Learn more about password:

brainly.com/question/15016664

#SPJ11


Related Questions

What is desktop computer?

Answers

Answer:

in which u can play GTA V and other amazing games...

loveUSA

Explanation:

love USA , LOVE USA

Answer:

A computer suitable for use at an ordinary desk.

Explanation:

Have a good day

Web-based applications are application software which operate and can be accessed through.

Answers

Main Answer:Web-based applications are application software which operate and can be accessed through a web browser.

Sub heading:

what is web browser?

Explanation:

1.web browser  is application software for accessing the world wide web.

REFERENCE LINK:

https://brainly.com

Hashtag:

#SPJ4

How would life be different if you could only communicate 1 on 1 instead of with
multiple people at once?

Answers

Answer:

very

Explanation:

people pay more attention and learn better in one on one conversations than in groups . I believe we would have more understanding persons in the world and also the world would be a better place

The ability to communicate with multiple people at once has significantly shaped various aspects of modern life, impacting efficiency, collaboration, social interactions, education, business, entertainment, and more.

If communication were limited to one-on-one interactions instead of being able to communicate with multiple people at once, several aspects of life would be different:

1. Efficiency: Communication with multiple people at once, like in group chats or meetings, allows for efficient dissemination of information. With only one-on-one communication, sharing information and updates might take more time and effort.

2. Collaboration: Collaborative work involving multiple people would be impacted. Group projects, team discussions, and brainstorming sessions might be less dynamic and productive without the ability to communicate with everyone simultaneously.

3. Social Dynamics: Social interactions would likely change. Group events, parties, and gatherings might be less common since interactions would be limited to one-on-one conversations.

4. Business and Networking: Networking events, conferences, and workshops often involve interactions with multiple people.

5. Education: Classroom settings and lectures would be affected. Teachers would need to communicate with each student individually, which could slow down the learning process and reduce opportunities for group discussions.

6. Social Media and Online Platforms: Social media platforms that enable conversations with multiple people at once would need to be reimagined. Current features like comments, replies, and threads might not exist in the same form.

Learn more about Communication here:

https://brainly.com/question/29811467

#SPJ3

10. a set of processes is when each process in the set is blocked awaiting an event that can only be triggered by another blocked process in the set. a) spinlocked b) stagnant c) preempted d)deadlocked 11. a closed chain of processes exists, such that each process holds at least one resource needed by the next process in the chain is the condition of . a) no preemption b) mutual exclusion c) circular wait d) hold and wait 12. the condition can be prevented by defining a linear ordering of resource types. a) hold and wait b) no preemption c) mutual exclusion d) circular wait 13. the specifies the instants in time at which the selection function is exercised. a) decision mode b) medium-term scheduling c) ready state d) tat 14. response time in an interactive system is an example of: a) user-oriented criteria for long-term scheduling policies b) system-oriented criteria for short-term scheduling policies c) system-oriented criteria for long-term scheduling policies d) user-oriented criteria for short-term scheduling policies 15. examples of include processors, i/o channels, main and secondary memory, devices, and data structures such as files, databases, and semaphores. a) regional resources b) joint resources c) reusable resources d) consumable resources

Answers

10. The condition described in the question is called a deadlock, where each process in the set is waiting for another process to release a resource. Therefore, the answer is (d)deadlocked.

11. The condition described in the question is called a circular wait, where each process is waiting for a resource held by another process in a closed chain. Therefore, the answer is (c)circular wait.

12. The condition that can be prevented by defining a linear ordering of resource types is circular wait. Therefore, the answer is (d)circular wait.

13. The term that specifies the instants in time at which the selection function is exercised is decision mode. Therefore, the answer is (a)decision mode.

14. Response time in an interactive system is an example of user-oriented criteria for short-term scheduling policies, as it is concerned with providing a quick and responsive system for the user. Therefore, the answer is (d)user-oriented criteria for short-term scheduling policies.

15. Examples of reusable resources include processors, i/o channels, main and secondary memory, devices, and data structures such as files, databases, and semaphores. Therefore, the answer is (c)reusable resources.

Learn more about data: https://brainly.com/question/26711803

#SPJ11

What is the main difference between a data warehouse and a data lake?

Answers

Answer:

Simple

Explanation:

A data lake is a vast pool of raw data, the purpose for which is not yet defined. A data warehouse is a repository for structured, filtered data that has already been processed for a specific purpose. The two types of data storage are often confused, but are much more different than they are alike.

A data lake is a sizable collection of unprocessed data, the use of which is currently unknown. Data that has previously been processed for a particular purpose is formatted, filtered, and stored in a data warehouse. The two forms of data storage are frequently mixed together, yet they differ greatly from one another.

What is  Data?

Data, which can describe quantity, quality, realism, statistics, other fundamental units of meaning, or just sequences of indicators that can be further interpreted, is a collection of numerical variables that transmit information in the quest for knowledge. A dataset is a distinct state inside a collection of data.

In a nutshell, a data dashboard is an information management tool that visually collects, analyzes, and presents key metrics (KPI), metrics, as well as critical data points, enabling you to keep tabs on the condition of your company, department, team, or particular process.

The single form of data, or datum, is essentially equal to the word "data point." It is the true data generated from a measurement or investigation, and it can be displayed as a numerical data point, a statistical display, or a graph in a statistical or analytical context.

To read more about Data, refer to - https://brainly.com/question/10980404

#SPJ2

Lost passwords set for documents in Microsoft® Word® documents can be retrieved in the backstage view. True False

Answers

Answer:

I may be wrong but im pretty sure its true

Explanation:

True <3

What is the result when you run the following program?

print(“2 + 7”)
print(3 + 1)

Answers

Answer:

line 1 = 2+7 (you added quote marks)

line 2 = 4 (you did not add quote marks, which adds both nums together)

Explanation:

FIFTY POINTS IF YOU CAN HELP ME!!!!
You have been looking for a part-time job and it looks like you have found a good fit. You researched the listings on a job board, emailed your résumé to the company’s HR department, and got a phone call back. They gave you login information for a private system so you could take an online test, and now you’ve just had an online video interview. Which networking features have you used so far in your job search?

Answers

Answer:

Research jobs in digital media. Using a job-posting site like Indeed, Monster, Career Builder, or other sites, search for a job in your area. Once you identify a job in digital media that you may want to do, research the qualifications and education needed to perform this job, Write a paper of at least 300 words that includes: many things?

Explanation:

Which statement about programming languages is true?

1) Lisp was designed for artificial intelligence research.
2) BASIC was the first high-level programming language.
3) FORTRAN was an early programming language designed for business use.
4) Pascal was the first programming language for personal computers.

Answers

Answer:

2

Explanation:

plz make me brainliest

Option A: Lisp was designed for artificial intelligence research.

The acronym Lisp stands for List Programming is a computer programming language developed about 1960 by John McCarthy.Lisp is the second-oldest high-level programming language which has a widespread use today.LISP has a very simple syntax in which a parenthesized list is used to give operations and their operands.This Language was designed for manipulating data strings with convenience.Lisp includes all the working as the function of any object.Lisp uses symbolic functions which are easy to use with AI applications.Originally Lisp was created as a practical mathematical notation used in computer programs.Lisp pioneered many revolutions in the field of computer science such as tree data structures, automatic storage management etc.

illl give brainliest plzzzzzzzzzz

illl give brainliest plzzzzzzzzzz

Answers

The one paste symbol name is : paste settings

it consist of 'paste special' and 'set default paste if im not wrong'

you are conducting research for a design project and need to collect user data for your study. what can you do to make sure privacy and security are part of your ux design and research practices?

Answers

To ensure that privacy and security are part of your UX design and research practices, you can take the following steps: Obtain informed consent, Collect only what you need, Anonymize data, etc.

1. Obtain informed consent: Before collecting any data, it is essential to obtain informed consent from your participants. This means explaining the purpose of the study, what data will be collected, how it will be used, and any potential risks involved. Participants should have the option to opt-in or opt-out of the study, and their consent should be documented.
2. Collect only what you need: It is important to collect only the data that is necessary for your study. This helps to minimize any potential risk of exposure and protects the privacy of your users.
3. Use secure data storage: Once you have collected data, it should be stored securely to prevent unauthorized access. This may involve using encryption or secure storage options such as password-protected databases or cloud storage.
4. Anonymize data: Whenever possible, data should be anonymized to protect the privacy of your users. This means removing any personally identifiable information and using unique identifiers instead.
5. Limit access to data: Access to collected data should be limited only to those who need it for the study. This helps to prevent unauthorized access and ensure the security of your users' information.

By implementing these practices, you can ensure that privacy and security are a priority in your UX design and research practices. This not only protects your users but also helps to build trust and credibility in your brand.

To know more about UX design , click here:

https://brainly.com/question/30457919

#SPJ11

Access your Practice Lab titles Access your exercise content Reports and files Access your settings Access help and support CompTIA Linux Customize or Write Simple Scripts Review Review Well done, you have completed the Customize or Write Simple Scripts Practice Lab. Lab Assessment Test your knowledge on the topics covered in this lab by completing the review questions below. 1 Question What is the extension of a shell script

Answers

Answer:

The extension for a shell script in windows ends with a .ps1 and for the extension for linux it is .sh, not quite sure for OSX.

in python, given x = 10, x = x 1 is a not a legal statement. group of answer choices true false

Answers

The statement "x = x 1" is not a legal statement in Python and this is easily explained.

Why is this not a legal statement in Python?

In Python, the phrase "x = x 1" is an invalid statement.

The reason for this limitation in Python is that variable names are not allowed to have any spaces or special characters, including the numeral 1.

To name a variable correctly, it is necessary to begin with a letter or underscore and include only letters, numbers, and underscores.

Therefore, the accurate response is incorrect.

Read more about python programs here:

https://brainly.com/question/26497128

#SPJ4

Working with text in presentation programs is very ____ using text in other applications.

A.) different from
B.) similar to

Answers

Answer:

A

Explanation:

Your inquiry states that "Working with text in presentation programs is very ____ using text in other applications." Working in presentation software such as Microsoft PowerPoint and Microsoft Word, is very different. Microsoft PowerPoint allows you to do so much more on the visuals, Microsoft PowerPoint and other presentation software also has capabilities to present information than displaying it in a text-editor.

Working with text in presentation programs is very similar to using text in other applications.

What is a presentation?

A presentation is known to be any kind of work or things that is shown to others during a formal ceremony.

Conclusively, Note that Working with text in presentation programs is very similar to using text in other applications as it all involves typing or inputting words.

Learn more about presentation  from

https://brainly.com/question/24653274

No-no prompt was originally designed for use in a(n)

Answers

No-No prompt was originally designed for use in a therapy setting. No-No prompt is an auditory cue, which is frequently employed to correct unacceptable behavior. A sound of the same intensity and duration is associated with the unacceptable behavior, which serves as a reminder to avoid that behavior in the future.

In more than 100 words, we will describe the No-No prompt.The No-No prompt is a type of prompt that is frequently used in speech therapy to improve communication. This prompt is used to encourage children to avoid doing things that are incorrect or inappropriate.

When children use incorrect grammar, pronunciation, or other communication abilities, the No-No prompt can be used to notify them of their mistakes. A specific sound, such as a buzzer or a clap, is frequently used to provide this prompt. The sound serves as a reminder to the child that they must modify their behavior or communication style.

To know more about originally visit:

https://brainly.com/question/4675656

#SPJ11

Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri consider prior to taking the laptop apart

Answers

Complete Question:

Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What should Sherri consider prior to taking the laptop apart? (Select all that apply.)

Group of answer choices.

a. Try an external device before replacing the motherboard.

b. Make sure you have the correct processor for the motherboard.

c. Verify that the laptop is not under warranty.

d. Determine whether a teardown procedure is available.

Answer:

b. Make sure you have the correct processor for the motherboard.

c. Verify that the laptop is not under warranty.

d. Determine whether a teardown procedure is available.

Explanation:

In this scenario, Sherri is considering replacing a processor on her laptop because the laptop is running slower than she would like.

Hence, Sherri should consider the following informations prior to taking the laptop apart;

I. Make sure you have the correct processor for the motherboard. She can get the specifications of the motherboard and processor on the manufacturer's website.

II. Verify that the laptop is not under warranty because if it still under warranty, taking the laptop apart would void the warranty granted by the original manufacturer.

III. Determine whether a teardown procedure is available. She should ensure there is a guide available for dismantling and re-coupling of the laptop.

what permission must be granted for a user to run procedures within a database?

Answers

Answer:

To grant permissions on a stored procedure

From Stored Procedure Properties, select the Permissions page. To grant permissions to a user, database role, or application role, select Search. In Select Users or Roles, select Object Types to add or clear the users and roles you want.

Which of the following statements are true regarding Moore’s Law? Select 3 options. A. Moore’s Law can be applied to processing advances in general and not just the miniaturization of transistors and chips. B. Moore’s Law was accurate until about 1998, when computing advances slowed drastically. C. The accuracy of Moore’s Law is being affected by the difficulty of making increasingly smaller components at the same rate. D. Moore’s Law is expected to continue at the same rate, even with the introduction of quantum computers. E. Gordon Moore, a co-founder of Intel, described Moore’s Law in 1965.

Answers

Answer: Which of the following statements are true regarding Moore’s Law? Select 3 options.

Explanation:

• The accuracy of Moore’s Law is being affected by the difficulty of making    increasingly smaller components at the same rate.

• Gordon Moore, a co-founder of Intel, described Moore’s Law in 1965.

• Moore’s Law can be applied to processing advances in general and not just   the miniaturization of transistors and chips.

Statement that can be considered as true statement about Moore’s Law  is C:The accuracy of Moore’s Law is being affected by the difficulty of making increasingly smaller components at the same rate.

Moore's law can be regarded as an observation that was made by Gordon Moore, which explains that there is always a double increase in number of transistors in a dense integrated circuit in every two years.

However, this law has it's shortcomings because of the difficulty of producing smaller components at the same rate.

Therefore, option C is correct.

Learn more at,:

https://brainly.com/question/15018447?referrer=searchResults

i need help on what im doing wrong

i need help on what im doing wrong

Answers

Answer:

The error is that you're trying to convert a string with letters inside into an int. What happens if a user type in 'a' instead of '1'? 'a' is not a number so the int('a') would fail and give you an error. Make you add a line to check whether the input a number or not.

Explanation:

Change your code to

DEorAP  = input("Is it AP or DE?")

if DEorAP.isdigit()

  DEorAP = int(DEorAP)

an oce edit can result in which of the following? a. line item suspension b. claim rejection, claim denial, rtp, line item suspension, claim adjustment c. claim rejection, claim denial, rtp, claim suspension, claim adjustment d. claim rejection, claim denial, rtp, suspension, line item rejection, and line item denial

Answers

d. An OCE (Office of Civil Enforcement) edit can result in a claim rejection, claim denial, RTP (Return to Provider), suspension, line item rejection, and line item denial. An OCE edit is a type of automated edit used by Medicare to identify and resolve potential errors in claims submissions before payment is made.

If a claim does not meet certain requirements, it may trigger an OCE edit and result in a claim rejection, meaning that the claim is not processed. If the claim is processed but does not meet certain criteria, it may result in a claim denial or adjustment. In some cases, the claim may be suspended for further review, or certain line items may be rejected or denied. The OCE edit process is designed to ensure that claims are paid accurately and efficiently.

Learn more about OCE edit: https://brainly.com/question/23331999

#SPJ4

besides protecting a computer from under-voltages, a typical ups also performs which other actions?(select two.)

Answers

The other actions a typical ups performs, besides protecting a computer from low voltages, is:

Protects from over-voltagesConditions the power signal

In addition to protecting a computer from low voltages, a typical Uninterruptible Power Supply (UPS) can also protect against over-voltages, brownouts, blackouts, and power surges. It also conditions the power signal by filtering out any noise or spikes in the power signal before it reaches the computer.

The UPS also helps to provide a consistent stream of clean power to the computer, which can help to improve its performance and reliability.

Learn more about computers:

https://brainly.com/question/24540334

#SPJ4

Besides protecting a computer from under- voltages, a typical UPS also performs which two actions? (Select two.)

A. Prevents electric shock

B. Prevents ESD

C. Protects from over-voltages

D. Conditions the power signal

E. Protects network cabling from EMI

11.
Mona is confused about finite loop and infinite loop, explain her with the help of
example.

Answers

Answer:

The basic difference between finite and infinite is the number of times it runs and ends. The loop is basically a set of instructions that keeps repeating itself.

The finite loop ends after running for a finite times. This body of finite loop will stop executing after certain condition is reached. Hence the finite loop body keeps executing itself finite number of times.

An infinite loop keeps running and repeating itself endlessly.This loop never ends. This loop can be the result of an error in a program. For example when no stopping or exit condition is specified in the program.

Explanation:

Example of finite loop:

Lets take for loop as an example:

for(int i =0; i<=5; i++)

{ cout<<i<<endl; }

Now the loop starts from i=0

Next it enters the body of loop to execute the statement: cout<<i; which means that the value of i is displayed on the output screen.

This loop keeps executing until the value of i exceeds 5.

At first iteration 0 is printed on the output screen, at second iteration 1, at third iteration 2, at fourth iteration 3, fifth iteration 4, sixth iteration 5. After each of these iterations, the value of i is incremented by 1.

When 5 is printed, then at the next iteration the specified condition i.e. i<=5 gets false as the value of i now becomes 6 after incremented by 1.

So the loop stops running. So this means that loop ran for finite times and stopped after the a certain condition is reached. The output is:

0

1

2

3

4

5

Example of infinite loop:

Lets take while loop:

int i = 6;

    while (i >=5)

    {         cout<< i;

             i++;     }

In the above example, the loop will run infinite times. Here the value of i is initialized to 6. Then while loop is used which checks the condition which is the value of i is greater than or equal to 5. If the condition is true, the body of the loop starts executing which prints the value of i. Lets see what happens at each iteration:

1st iteration: i>=5 is True because i=6 and 6 is greater than 5. The program control enters the body of loop. The statement cout<<i prints 6. Next the value of i is incremented by 1 and it becomes 7.

2nd iteration: i>=5 is True because i=7 and 7 is greater than 5. The program control enters the body of loop. The statement cout<<i prints 7. Next the value of i is incremented by 1 and it becomes 8.

This loop will repeat itself infinite times and never stops as i will always have value greater than 5. So this is the example of infinite loop.

When a condition constantly evaluates to true, the loop control does not travel outside of that loop, resulting in an infinite loop.

Infinite loop and example:

When a condition never turns false, the program enters a loop, which keeps repeating the same block of code over and over, with no end in sight.

An endless loop is demonstrated in the following example: b = input("what's your name?") while a==1 ", Welcome to Intellipaat!" print("Hi", b, ",

Find out more information about 'Loop'.

https://brainly.com/question/2081668?referrer=searchResults

what is 2D thinking and 3D thinking? i literally don't understand

Answers

Answer:

Two dimensional thinking implies concepts that are flat or only partially representative of the whole. Three dimensional thinking implies the first part of 2d thinking conjoined with intersecting dimensions rendering a deeper field of meaning.

Explanation:

Question 1 (1 point)

Document orientation is the direction that a page is displayed for viewing and printing. Which terms relate to page orientation?


Question 1 options:


Portrait and Landscape


Top and Bottom Margins



Inside and Outside Margins



Header and Footer


Question 2 (1 point)

Which option will add the same text at the top and/or bottom of every page in your document?


Question 2 options:


Aline and Underling



Header and Footer



Page Count and Bookmark



Bold and Italic


Question 3 (1 point)

Changing the layout of a document page or the design of text is called:


Question 3 options:


Printing.



Reviewing.



Editing.



Formatting.


Question 4 (1 point)

What is the keyboard shortcut for inserting a page break?


Question 4 options:


CTRL+ENTER



CTRL+V



CTRL+C



CTRL+A


Question 5 (1 point)

Which term refers to the blank areas surrounding a document page?


Question 5 options:


Margins



Sidebars



Footers



Headers

ILL GIVE BRAINLIEST TO WHOM EVER GETS ALL 5 RIGHTT!

Answers

Answer:

The answers are in the Explination :3

Explanation:

Question 1 - Portrait and Landscape.

Question 2 - Header and Footer

Question 3 - Formatting

Question 4 - Ctrl + Enter

Question 5 - Margins

This question has two parts : 1. List two conditions required for price discrimination to take place. No need to explain, just list two conditions separtely. 2. How do income effect influence work hours when wage increases? Be specific and write your answer in one line or maximum two lines.

Answers

Keep in mind that rapid prototyping is a process that uses the original design to create a model of a part or a product. 3D printing is the common name for rapid prototyping.

Accounting's Business Entity Assumption is a business entity assumption. It is a term used to allude to proclaiming the detachment of each and every monetary record of the business from any of the monetary records of its proprietors or that of different organizations.

At the end of the day, we accept that the business has its own character which is unique in relation to that of the proprietor or different organizations.

Learn more about Accounting Principle on:

brainly.com/question/17095465

#SPJ4

development manager is building a new application. he asks you to review his requirements and identify what cloud technologies he can use to meet them. the application must

Answers

Cloud resource generation and management are automated by the infrastructure deployment service known as Deployment Manager.

What are the 3 deployment models?Depending on where the environment's infrastructure is located, each deployment model is established. The three primary cloud service delivery models are infrastructure as a service, platform as a service, and software as a service.The distribution of system updates is managed by a deployment manager. You'll be responsible for creating release schedules, offering assistance during the technical release procedure, and making sure that production systems are operational after a successful release, among other things.A blue-green deployment is the most popular tactic. Users continue to utilise the stable version while testing and evaluating the new version (the blue version) (the green version). The users are then transferred over to the blue version when it is available.

To learn more about Deployment refer to:

https://brainly.com/question/15190878

#SPJ4

Why are programming languages like Java and Python ideal for rapid development?

Answers

Because Java, as well as Python, are high-level programs that don't need generating or parsing, they are perfect for quick development. This implies that engineers can code a program without testing it first and then publishing it.

What are programming languages?

A method of nomenclature for creating software applications is known as a computer program. The majority of formal programming are text-based, though they can also be graphical.

A substantial rise in the use of Python for machine learning and data analysis supports its status as the programming with the biggest growth. Python is a programming language with dynamic typing, while Java is a structured query and compiler language. Java is faster at play and simpler to debug thanks to this one difference, while Python is simpler to utilize and read.

Learn more about programming languages, Here:

https://brainly.com/question/12696037

#SPJ5

typically provide students with a general understanding of information technology, including computer platform technologies, data management systems, and basic programming. A Master Degree programs B Cisco degree programs C Associate degree programs D CertaPort degree programs​

Answers

Answer:

the correct answer is ''associate degree programs"

Explanation:

because i took the test and got this answer right. hope this helps :)

Jeremiah needs to see data in two different table views from two regions without creating two tables. Which two features would he use to create this?

Answers

Answer:

Tables & Filter

Explanation:

That correct

Answer:

D. Tables and filter

Explanation:

Which of the following could improve network protections from denial of service attacks? Payload to increase the amount of available bandwidth Antivirus software to prevent an attack from occurring Administrators to catch the attack before it can occur

Answers

The option that could improve network protection from denial of service attacks is for administrators to catch the attack before it can occur.

How can this work?

This involves implementing effective monitoring and detection mechanisms that can identify potential attacks before they overwhelm the network.

Payload to increase the amount of available bandwidth and antivirus software can help protect against certain types of attacks, but they do not address the root cause of denial of service attacks, which is the intentional overload of the network.

Therefore, it is important to focus on prevention and early detection to minimize the impact of these attacks on network performance and availabilit

Read more about dos attacks here:

https://brainly.com/question/30656531

#SPJ1

Other Questions
A list of financial statement items for Ivanhoe Company includes the following: accounts receivable $16,800; prepaid insurance $3,120; cash $12,480; supplies $4,560; and debt investments (short-term) $9,840. Prepare the current assets section of the balance sheet listing the items in the proper sequence. (List current assets in order of liquidity.) 3) Abhasra and Lisa each improved their yards by planting rose bushes and geraniums. Theybought their supplies from the same store. Abhasra spent $219 on 30 rose bushes and 11geraniums. Lisa spent $420 on 6 rose bushes and 44 geraniums. Find the cost of one rose bushand the cost of one geranium.(EXPLAIN HOW DONE) SOMEBODY PLEASE PLEASE HELP ME IM BEGGING YOU ILL RATE YOU 5 STARS AND GIVE A HEART PLEASE HELP Which statement about parallax scrolling is true?A. Parallax scrolling distorts the position of the player character when playing the game.B. Parallax scrolling involves segmenting the playing area into background layers that move slower than the foreground layers.C. Parallax scrolling involves unifying the playing area into a single environment.D. Parallax scrolling involves segmenting the playing area into background layers that move faster than the foreground layers.E. Parallax scrolling involves segmenting the playing area into background layers and foreground layers that move at the same speed. Brainliest!!!Which statements are true? Check all that apply.A.) In eukaryotes, DNA is found in the cytoplasm of the cell.B.) RNA is the nucleic acid that helps build proteins.C.) DNA is the nucleic acid that carries genetic information.D.) The structure of proteins is determined by DNA.E.) A chromosome is made of RNA. Main events in the purple children Mr. Bannon sells roses at a commission rate of 25%. What is his commission for selling 235 dozen roses, priced at $15.50 a dozen? NEED HELP IMMEDIATELY Help Please:(! Will mark brainliest!According to the article, what effect did the British invasion have on mainstream popular music? A. It cut sales of American records to young audiences. B. It encouraged corporate takeovers of smaller markets. C. It brought African sounds to mainstream audiences. D. It put London at the center of the music industry. Solve the equation |x-3| -10=-5 Workers who believe that their workplaces have a sense of equity are more likely to exhibit ____ behaviors and less likely to exhibit ____ behaviors. A man and a woman affected with Babomania mate and have an unaffected son. Which of the following mechanisms of inheritance can be ruled out? Choose all that can be ruled out. a. Autosomal Recessive b. Y-linkedc. X-linked Recessived. X-linked Dominant e. None of the mechanisms shown can be ruled out f. Autosomal Dominant Simplify.45+8.8Select the correct choice below and, if necessary, fill in the answer box to complete your choice.OA. 45+8.8=OB. The expression is undefined. 1. cyclobenzaprine (amrix) is prescribed for a patient with muscle spasms of the lower back. which appropriate nursing interventions would be included? a company purchases a warehouse for $200,000, expects to use it for 10 years, and expects to sell it at the end of that period for $50,000. how much is annual depreciation by the straight-line method? What contribution to energy do carbohydrates make? Which is the value of this expression when p = -2 and q = -1? -4 -1/16 1/16 4 14What is the solution to the system of equations that was solved by graphing?0A (-2,2)B (-1,1)C (1,-1)D (2,-2) Which of the following pairs of goods is an example of substitutes?A. Shirts and trousersB. Pen and InkC. Petrol and DieselD. Coffee and Sugar 106Pd2+How many protons, electrons, and neutrons are in this? Alejandro and Emila ordered a pizza. Alejandro at 1/3 of the pizza and Emila ate 2/5 of the pizza. How much did they eat together? Was there any pizza left? How much?