you can configure the windows firewall to allow or block specific _________.

Answers

Answer 1

The windows firewall can be set up to permit or deny access to particular IP address ranges, programs, protocols, users, and ports.

How should Windows Firewall be set up?

Open the Control Panel by selecting Start. System and Security > Windows Defender Firewall. Choose to turn on or off Windows Firewall. Select Windows Firewall to enable settings for the domain, private network, and public network.

Which Windows Firewall setting excludes all communication except that which is specifically permitted by a rule?

All outbound network traffic is typically permitted by Windows Defender Firewall unless it matches a rule that forbids the traffic. Unless it fits a rule that permits the traffic, Windows Defender Firewall by default blocks all inbound network traffic.

To know more about windows firewall visit:-

https://brainly.com/question/14683400

#SPJ4


Related Questions

How many parameters does the create_frame function take?

How many parameters does the create_frame function take?

Answers

The numbers of parameters that the create_frame function accept  is one that is at least 127 parameters.

What is the create_frame function parameters?

A new frame structure is created via the createFrame() function. A new frame structure is created via the createFrame() function. It adds the header data, including the start delimiter, frame type, Serial ID, Waspmote ID, and sequence number, after clearing the frame buffer. The addSensor() function should be used to add sensor fields to the payload after this function has been called.

Therefore, without more details about the method, I am unable to determine how many parameters the create frame function requires.

Depending on its intended usage and the environment in which it is called, the create frame function may accept any number of parameters. It is impossible to correctly estimate the number of parameters a function requires without more details.

Learn more about function  from

https://brainly.com/question/29851234

#SPJ1

idea citizen activation

Answers

Answer:Idea citizen activation badge is a part of the idea silver award and is in the citizen category,helping you learn digital awareness,safety and ethics.

Answer: The Citizen Activation badge is part of the iDEA Silver Award and is in the Citizen category, helping you learn digital awareness, safety and ethics.

Want to know more about iDEA?

iDEA helps people develop digital, enterprise & employability skills for free. Log in or sign up to start a badge and begin to earn points on iDEA.

um i'm new here... and i don't know really how to use this... i was wondering if som 1 can help me

Answers

Shining and warm

Collapse 3

JOJO

fate series

Bungou Stray Dog

EVA

Dao Master

Alien invasion

Future diary

Fate of Space

Story Series

Beyond the Boundary

Bayonetta

Onmyoji

Full-time master

How to develop a passerby heroine

Illusion Front

Psychometer

your name

Noragami

One Piece

Senran Kagura

Attacking Giant

Kabaneri of the Iron Fortress

Violet Evergarden

Demon Slayer

Under one person

Guilt crown

Black reef

Star Cowboy

Black Street Duo

Aria the Scarlet Ammo

Hatsune Miku

The last summoner

re creator

Detective Conan

Naruto

grim Reaper

Tokyo Ghoul

Song of Hell

At the beginning

Sword Art Online

Girl opera

Hakata pork bones pulled dough

Sunny

Black bullet

Trembling

On the broken projectile

Black Butler

Destiny's Gate

Persona

God Prison Tower

April is your lie

Ground-bound boy Hanako-kun

League of legends

Clever girl will not get hurt

Tomorrow's Ark

DARLING in the FRANKXX

RWBY

Little Busters

dating competition

Gintama

One Punch Man

The promised neverland

Taboo curse

God of college

Queen of Arms

Sword Net 3

Final fantasy

Answer:

This platform is used to provide answers for homework. The same way you just asked this question, you would ask the question you have for homework and wait for someone to answer. You can gain points by answering questions for other people and to make sure you get something done faster, you can look the questions up to see if anyone else asked it before.

2. Read the following scenarios about how three different programmera approach
programming a computer game. Identify which type of programming design
approach each represents (3 points):
a) Yolanda first breaks down the whole game she needs to program into modules.
She then breaks these modules into smaller modules until the individual parts are
manageable for programming. She writes the smallest modules, and then
recombines them into larger parts.
b) Isabella takes the game process and groups together sets of related data involved
in the process. She then identifies the messages the data should respond to. After
writing the code for each set of data, Isabella then combines, tests, and refines the
subsets until the software runs properly

Answers

a.) Structured programming

b.) Object-oriented programming

c.) Top-down programming

The programming design approach represented in this scenario is modular programming. The programming design approach represented in this scenario is object-oriented programming.

What is programming?

The process of creating a set of instructions that tells a computer how to perform a task is known as programming.

Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

Modular programming is the programming design approach represented in this scenario.

Yolanda divides the entire game into modules, which are then subdivided further into smaller modules until the individual parts are manageable for programming.

Object-oriented programming is the programming design approach represented in this scenario. Isabella organizes sets of related data and determines which messages the data should respond to.

Thus, this method entails representing data and functions as objects and employing inheritance and polymorphism to generate flexible and reusable code.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

You use the ____ option with the dcfldd command to designate a hashing algorithm of md5, sha1, sha256, sha384, or sha512.

Answers

When utilizing the dcfldd command, one uses the `hash=` option to define a hashing algorithm of md5, sha1, sha256, sha384, or sha512. This command can be used to create a bit-by-bit image of a disk or to clone disks utilizing the input-output device file (`/dev/sda`) and the output file (`/mnt/backup/image.dd`).

When cloning disks, dcfldd writes the input file to the output file as it reads it, enabling the creation of perfect clones of the input file. Because it is useful for forensic and data recovery applications, the command also includes a variety of checksum, hash, and message digest algorithms that may be used to guarantee data integrity and authenticity. The `hash=` option allows users to specify which hashing algorithm to use.

It can be specified as `hash=md5`, `hash=sha1`, `hash=sha256`, `hash=sha384`, or `hash=sha512`.In conclusion, when utilizing the dcfldd command, one uses the `hash=` option to define a hashing algorithm of md5, sha1, sha256, sha384, or sha512.

To know more about input visit:-

https://brainly.com/question/29310416

#SPJ11

When a document contains text displayed in 10-point Cambria, to what does the 10-point refer?-the font style-the number of colors in which a character can be displayed-the font size-the number of characters that can fit in one linear inch of text

Answers

In typography, the term "point" refers to a unit of measurement used to define the size of characters in a font. It is commonly used in the design and printing of documents, as well as in digital typography.

Therefore, when a document contains text displayed in 10-point Cambria, the "10-point" refers to the font size, which is the size of the characters in the font. In this case, the characters in the Cambria font are 10 points in height, which is a common size for body text in many documents.Hence, the correct answer is: "the font size".

To learn more about typography click the link below:

brainly.com/question/26733261

#SPJ11

To generate integers between and including -10 to 10 you would use:


random.randint(-10, 10)


random.random()*20 + -10


random.random(-10, 10)


randint(-10, 10)


I will give Brainliest

Answers

Answer:

random.randint(-10,10)

Explanation:

Which situation faced by these mobile app developers requires the skill of adaptability?

A.
Amelia’s client wants to incorporate some additional new features in an app a few days before its release date.
B.
Trevor must persuade his co-workers about an idea to improve the app they are developing.
C.
Dennis must work with employees from a different department on a new project.
D.
A day before the release of an app she developed, Bianca discovers a flaw in the app that the testing team did not detect.

please help me

Answers

Answer:

C

Explanation:

dennis has to adapt to his new location

Apply conditional formatting so cells ___with a value greater than the average are formatted using a yellow fill with dark yellow text.
Font Size

Answers

Apply conditional formatting so cells Font Size with a value greater than the average are formatted using a yellow fill with dark yellow text.

What is layout rule in Excel?

In a comparable fashion, you may create a conditional formatting rule to examine the values of  cells. For example: =$A2<$B2 - layout cells or rows if a fee in column A is much less than the corresponding fee in column B. =$A2=$B2 - layout cells or rows if values in columns A and B are the same.

The process of a new conditional formatting rule that uses a formula to apply yellow fill and bold font to values is given in the picture attached.

Therefore, Apply conditional formatting so cells Font Size with a value greater than the average are formatted using a yellow fill with dark yellow text.

Learn more about Font Size on:

https://brainly.com/question/1176902

#SPJ1

how do you find our performance task about obtaining clients blood pressure
essay po yan 10 sentences

Answers

Answer:

To evaluate the performance task of obtaining a client's blood pressure, several factors should be considered. Firstly, the accuracy of the measurement should be evaluated. This includes ensuring that the correct cuff size is used and that the measurement is taken at the appropriate location on the arm. Secondly, the technique used to obtain the measurement should be evaluated. This includes proper positioning of the client, proper inflation of the cuff, and proper timing of the measurement.

Thirdly, the client's comfort during the procedure should be evaluated. This includes ensuring that the client is relaxed and that the procedure is not causing any pain or discomfort.

Fourthly, the client's understanding and cooperation during the procedure should be evaluated. This includes ensuring that the client is informed about the procedure and that they are willing and able to participate.

Fifthly, the communication and professionalism of the person obtaining the measurement should be evaluated. This includes ensuring that the person obtaining the measurement is able to explain the procedure clearly and effectively, and that they are able to handle any questions or concerns the client may have.

Sixthly, the proper documentation and recording of the measurement should be evaluated. This includes ensuring that the measurement is recorded correctly and that the client's information is kept confidential.

Seventhly, the proper sanitation and sterilization of the equipment before and after use should be evaluated.

Eighthly, the proper use of the equipment should be evaluated.

Ninthly, the ability to identify any abnormal results and take appropriate actions should be evaluated.

Lastly, the ability to recognize any emergency situations and take appropriate actions should be evaluated.

Overall, the performance task of obtaining a client's blood pressure requires attention to detail, proper technique, and the ability to handle any issues that may arise. It is important to ensure that the measurement is accurate, the client is comfortable and informed, and that proper documentation and sanitation protocols are followed.

the header and footer sections include a . group of answer choices
a. left and right section b. center section c. only top and bottom section
d. left, right, and center section

Answers

The header and footer sections include option  c. only top and bottom section

What is the the header and footer sections

The majority of word processing programs or document editors have a standard placement for the header and footer sections, which are usually positioned at the top and bottom of every page, respectively.

These portions are distinct from the primary content section of the file and offer a designated area for details that require uniform display on every page, like logos, dates, author names, document titles, and page numbers. The topmost part of the page houses the header.

Learn more about  header and footer sections  from

https://brainly.com/question/14379814

#SPJ4

here should glassware be stored after it is cleaned? select one: in a drying oven, or designated locations such as drawer

Answers

The correct answer is Glassware can be heated to 110 degrees Celsius and left in the oven for several hours or overnight to help remove the water film.

Glassware should be rinsed with acetone two to three times if it has to be dry and utilised right away after washing. This will soon evaporate and eliminate any water. Although it's not a good idea to blow air into glassware to dry it, you may occasionally use a vacuum to cause the solvent to evaporate. Wash and dry each glass and cup before you start packing. To ensure that everything is totally dry, carry out this task at least 24 hours before packing. Non-tempered glass cannot be used in the oven while tempered glass is often safe to do so. Glass is typically not tempered. Glass service ware, glass plates, and drinking glasses are a few examples of non-tempered glass. Only tempered glass will have an oven-safe label.

To learn more about Glassware click the link below:

brainly.com/question/20372443

#SPJ4

Which range function creates the following list of numbers?

21 25 29 33 37 41

Group of answer choices

range(21, 44, 4)

range(21, 41)

range(21, 41, 4)

range(21, 44)

Answers

Note that the range function that creates the following list of numbers is:  range(21, 44, 4) (Option A)

What is the rationale for the above response?

The rationale for the above response is that the range function generates a sequence of numbers from a starting value to an ending value with a specific step size.

The list of numbers, "21 25 29 33 37 41", starts from 21 and increments by 4 until it reaches 44. Therefore, range(21, 44, 4) would generate this sequence of numbers.

The first argument is the starting value, the second argument is the ending value, and the third argument is the step size, which in this case is 4.

Learn more about  range function:

https://brainly.com/question/29145252

#SPJ1

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

Think of all the activities you do in a day that involve electrical energy. Use this sheet to make a list of 5-8 activities. Describe how electrical energy is used in each case. When you are done, consider which ones you might be able to do without to save electricity. Activity Description of how electrical energy is used

Answers

Some everyday activities that involve electricity can be:

TelevisionCellphoneComputerAir conditioningHair dryerHow is electrical energy used in daily activities?

Let's go into more detail about the use of electricity in each case identified in the list above. The TV, for example, works by converting electrical energy into sound and light energy, in addition to thermal energy as some components of the device are heated.

Cell phone batteries use chemical energy that is transformed into electrical energy to recharge the devices. In the computer, there is a transformer that converts the electrical energy and distributes it to the components of the machine.

The air conditioner also works as a transformer that uses the ambient air temperature and transforms it into cold air using refrigerant gas. In the hair dryer, there is a conductor that transforms electrical energy into heat.

Therefore, electrical energy is present in the lives of individuals in daily activities, being essential for work, health and human well-being.

Find out more about electrical energy here:

https://brainly.com/question/60890

#SPJ1

After creating a webpage with html code, what do you need to do so that others can access it on the internet?.

Answers

After creating a webpage with HTML, you will need to upload them to a location on AFS so that others can access it on the internet.

What is internet?

The meaning of the internet is the climate of the information based on World wide web network.

There is large network of computers connected together in offices or organizations to explore the internet.

The webpage formed using HTML code has to be uploaded on AFS. AFS is the platform everyone can view the content whichever is uploaded.

Thus, After creating a webpage with HTML, you will need to upload them to a location on AFS so that others can access it on the internet.

Learn more about internet.

https://brainly.com/question/13308791

#SPJ2

The following program has a bug. The thread is supposed to sleep for 1 second and then print a string. However, when it is run, nothing prints. Why?
You can fix this bug by replacing a function in the main thread with one of two different pthread function calls. Which one is it?
#include
#include
#include
void *thread(void* arg);
int main(){
pthread_t tid;
pthread_create(&tid, NULL, thread, NULL);
exit(0);
}
void* thread(void* arg) {
sleep(1);
printf("Hi there!\n");
return NULL;
}

Answers

The bug in the program is due to the main thread exiting before the child thread has a chance to print the string. To fix this issue, you can use the pthread_join() function to wait for the child thread to complete its execution before exiting the main thread.
Here's the modified version of your code with the bug fixed:
c
#include
#include
#include
void *thread(void* arg);
int main(){
   pthread_t tid;
   pthread_create(&tid, NULL, thread, NULL);
   pthread_join(tid, NULL); // Add this line to wait for the child thread to complete
   exit(0);
}
void* thread(void* arg) {
   sleep(1);
   printf("Hi there!\n");
   return NULL;
}
By adding pthread_join(tid, NULL);, you are ensuring that the main thread waits for the child thread (identified by `tid`) to finish its execution before it exits. This will allow the child thread to sleep for 1 second and print the string as intended.

Learn more about bug visit:

https://brainly.com/question/31224816

#SPJ11

CRC has much higher type i and type ii error rates than parity and block checking.

a. True
b. False

Answers

CRC has much higher type i and type ii error rates than parity and block checking. This is b. False

How to explain the information

Block checking is a broader term that encompasses various error detection methods, including cyclic redundancy check (CRC), checksums, and more complex techniques. It involves dividing the data into blocks and calculating a checksum or other error-detection code for each block. The receiver then checks these codes to determine if any errors have occurred.

Cyclic Redundancy Check (CRC) is a method used for error detection in data transmission. It is a more robust and reliable error-checking technique compared to parity and block checking. CRC has a low probability of both type I and type II errors, making it highly effective in detecting errors in transmitted data

Learn more about block on

https://brainly.com/question/31679274

#SPJ4

assume the variable age has been assigned an integer value, and the variable is full time student has been assigned a boolean value (true or false). write an expression that evaluates to true if age is less than 19 or is full time student is true.

Answers

The expression that evaluates to true if age is less than 19 or is full time student is true will be age<19 or True== is_full_time_student

What is the Boolean value about?

The truth value, or TRUE or FALSE, is represented by a Boolean value. The null value is used to represent a value of unknown for a Boolean statement or predicate.

An expression that may only be evaluated as true or false is known as a boolean expression. It was named after mathematician George Boole.

Therefore, the expression that evaluates to true if age is less than 19 or is full time student is true will be age<19 or True== is_full_time_student

Learn more about Boolean on:

https://brainly.com/question/25039269

#SPJ1

Queries with an __________ operator tend to expand results, while queries with an __________ operator tend to restrict results.

Answers

Queries with an "OR" operator tend to expand results, while queries with an "AND" operator tend to restrict results.

The "OR" operator is used in queries to retrieve documents or information that contain at least one of the specified keywords. When using the "OR" operator, the search engine or database returns a broader set of results by including any document that matches one or more of the given terms.

This operator is useful when you want to explore multiple possibilities or when you are unsure of the exact terms to use. However, it can also lead to a larger number of irrelevant results.

On the other hand, the "AND" operator is used in queries to retrieve documents or information that must contain all the specified keywords. When using the "AND" operator, the search engine or database narrows down the results by only including documents that satisfy all the given terms.

This operator is helpful when you want to focus on specific information or when you need precise results. It helps to filter out irrelevant documents and retrieve more targeted information.

In summary, the "OR" operator expands results by including any matching term, while the "AND" operator restricts results by requiring all specified terms to be present.

The choice between these operators depends on the desired breadth or specificity of the search.

For more such questions on operator,click on

https://brainly.com/question/30299547

#SPJ8  

question 3 which layer in the transmission control protocol/internet protocol (tcp/ip) model does ip use?

Answers

Network Layer. For the network, this layer, also referred to as the network layer, accepts and sends packets. These protocols include the robust Internet protocol (IP), the Address Resolution Protocol (ARP), and the Internet Control Message Protocol (ICMP).

What layer of the TCP/IP paradigm does the transport layer belong to?

Layer 4: The Transport Layer, which TCP/IP depends on to efficiently manage communications between two hosts. The transport layer creates this connection whenever an IP communication session has to start or stop.

In the TCP/IP model, what is Layer 3?

Data segments are transmitted between networks using packets at Layer 3 (Network). This layer gives the data segments source and destination IP addresses when you message a friend.

To know more about Network Layer visit :-

https://brainly.com/question/14715896

#SPJ4

what is the difference between a "pre-deposition" of dopant, and a "drive-in" of the dopant? why is it necessary to make these two distinct steps?

Answers

The difference between a "pre-deposition" of dopant and a "drive-in" of the dopant and the reason for making these two distinct steps are given below:Pre-deposition of dopant: The pre-deposition of dopant is a process in which the dopant material is first applied on the surface of the semiconductor material before the heat treatment.

The dopant material is usually in the form of a gas, a liquid, or a solid. The purpose of pre-deposition is to introduce the dopant material into the semiconductor material and to ensure that it is evenly distributed on the surface of the material.Drive-in of dopant: Drive-in of dopant is a process in which the dopant material is diffused into the semiconductor material by heating the material to a high temperature.

During the drive-in process, the dopant material is driven deeper into the semiconductor material, and the concentration of the dopant material is increased.The reason for making these two distinct steps is that the pre-deposition process and the drive-in process serve different purposes. The pre-deposition process is used to introduce the dopant material into the semiconductor material and to ensure that it is evenly distributed on the surface of the material.

To know more about dopant visit:

https://brainly.com/question/30125235

#SPJ11

application programming interfaces, or apis, are sets of that query databases for specific information a.) methods b.) programs c.) sources d.) sql

Answers

API (Application Programming Interfaces) is a program that are sets of that query databases for specific information.

What is an API (Application programming interface)?

An application programming interface, or API, allows businesses to expose the data and functionality of their applications to third-party developers and business partners, as well as departments within their own organizations.

Through a documented interface, this allows services and products to communicate with one another and leverage one another's data and functionality.

Programmers aren't required to understand how an API works; they simply use the interface to communicate with other products and services. API usage has skyrocketed in the last decade, to the point where many of today's most popular web applications would be impossible to create without them.

Why we need APIs -

Improved collaborationEasier innovationData monetizationAdded security

To learn more about API, visit: https://brainly.com/question/12987441

#SPJ1

What potential downsides can you see to Face book’s Groups for Schools initiative

Answers

Answer:

Probably hate speech, and invasion of privacy on face book xD

The following are examples of common workplace injury except O Falls
O Strains
O Following instructions
O Electrical accident

Answers

Answer:

O Following instructions

Explanation:

What sorts of changes have you been observing in your society in your society in comparison in last 3 years​

Answers

People care less about their own opinions an more abt others

How can a user access the Mailbox Cleanup tools?

Start a new AutoArchive.

Enter the Backstage view.

Left-click the Inbox folder.

Open the Deleted Items folder.

Answers

Answer:

Sorry this isn’t an answer but does anyone know of a quizlet for the Microsoft Office course because I can’t find anything anywhere. Help a fellow student out. I need answers.

Explanation:

Answer: B: enter backstage view

Explanation:

I took the test. Plz mark me brainliest!

give a recursive algorithm to compute the product of two positive integers m and n using only addition

Answers

A recursive algorithm to compute the product of two positive integers m and n using only addition is as follows:

1. If n is equal to 1, return m.

2. Otherwise, recursively calculate the product of m and n-1 and add m to the result.

What is a recursive algorithm to calculate the product of two positive integers m and n using only addition?

The recursive algorithm for computing the product of two positive integers m and n using only addition is based on the principle of repeated addition. If the value of n is 1, we simply return m as the product.

Otherwise, we recursively calculate the product of m and n-1 and then add m to the result. This recursive process continues until n becomes 1, at which point the final product is obtained.

By breaking down the multiplication operation into repeated additions, we can effectively compute the product of two positive integers using only addition operations. This recursive approach allows us to solve the problem by dividing it into smaller subproblems and building up the final result.

Learn more about recursive algorithm

brainly.com/question/31417991

#SPJ11

Ryan is a university student who maintains a personal diary on his computer. At the end of the day, he writes about the events that took place and how he spent his day. The words that he frequently mentions in his diary are today, university, and professor. The moment he types the first two letters of these words, they appear as a suggestion. Which feature of the word processing program makes these suggestions?.

Answers

These recommendations are made by word completion programs, a sort of word processing software.

Word processing What is it?

A word processor is a tool or computer application that, among other things, enables the entry, editing, formatting, and output of text.

Modern word processors are word processor programs that run on general-purpose computers as opposed to the dedicated stand-alone machines of the past.

A function called autocomplete, commonly referred to as word completion, anticipates the remaining letters in a word as the user types.

On Android and iOS smartphones, this feature is referred to as predictive text. Users often accept suggestions in graphical user interfaces by clicking the tab or down arrow keys.

As soon as he types these words' first two letters, they as a suggestion, appear. It is a recommendation for word completion.

To know more about Word processing visit:-

https://brainly.com/question/29762855

#SPJ4

The computer code behind password input can be modified to force people to change their password for security reasons. This is known as “password expiration,” and some websites and companies use it regularly. However, people tend to choose new passwords that are too similar to their old ones, so this practice has not proven to be very effective (Chiasson & van Oorschot, 2015). Your friends have a hard time remembering passwords. What method can you devise for them so that they can remember their new passwords AND make them very different from the old ones?

Answers

Answer:

to remember the passwords you could either make a little rhyme to "help" remember it or you could be like everyone else and write it down on a piece of paper. you could also write the password over and over again to make it stick. a way to make a password different from an old one is to use completely different wording and completely different numbers.

Explanation:

Answer:

B

Explanation:

got it right

Other Questions
Lillian kicks a football. its height in feet is given by h(t)= -16t^2+72t where t represents the time in seconds after kick. how many seconds have gone by when the football is at its highest point? Assume that the weights (in pounds) of papers discarded each week by different offices in a large secretariat, are normally distributed with mean 9.43 and standard deviation 4.17 pounds. Find the prob A book costs $ 25.00. You have a coupon for 30 % off. Calculate the final price of the book with a 5% GST. (Begin by finding the discount price and then adding the GST) A 1500 kg elevator, suspended by a single cable with tension 16.0 kN, is measured to be moving upward at 1.2 m/s. Air resistance is negligible.1. We want to find the elevators speed after traveling upward 10.0 m. This could be solved with Newton's laws and kinematics, but we will use the energy principle. How much work does tension do on the elevator as it rises 10.0 m?2. How much work does gravity do on the elevator as it rises 10.0 m?3. What is the elevator's kinetic energy after rising 10.0 m?4. What is the elevator's speed after rising 10.0 m? Type _____ fibers (also called fast oxidative-glycolytic) exhibit a mixture of slow- and fast-twitch characteristics. Why was the russian government overthrown in 1917. an adolescent presents at the clinic with reports of pedunculated lesions projecting from the skin on the trunk area. the nurse knows that this is a sign of: Investors looking to make a profit supportedthe war against the Spanishthe settlement of Jamestownthe coronation of Queen Elizabeth I due to her pro-business policiesQueen Elizabeth's rivals Light of 630 nm wavelength illuminates two slits that are 0.25 mm apart. FIGURE EX33.5 shows the intensity pattern seen on a screen behind the slits. What is the distance to the screen? The wholesale cost of a pair of PUMA sneakers is $28. Academy Sporting Goods sells the sneaker for 74.99. Rounded to the nearest 10th of a percent, which choice best represents the markup rate?Question 4 options:37.8%.6%167.8%62.7%I WILL GIVE BRAINLIST IF YOU PUT THE RIGHT ANSWER BUT IF U DONT KNOW IT DO NO ANSWER OR I WILL REPORT U how old do you have to be to work at firehouse subs things that are not connected with religion, but are instead part of ordinary, everyday life, durkheim called Questions from the book called the boy in the striped pajamas Can someone help me out? :P i need some help again Question 1.2: When the spring is at rest, how does the force that the force sensor exerts on the spring compare to the force that the string exerts on the spring? Use physics concepts and principles to support your answer. HELP 100 POINTS What is one way that Gaozu achieved stability within the Tang dynasty? the parent function f(x)=log^5x has been transformed by reflecting it over the x-axis stretching it vertically by a factor of two and shifting it up three units. which function is representative of this transformation/ g(x)=-2log^5(x)+3, g(x)=log^5...(2x)-3, g(x)=log^5(-2x)+3, g(x)=2log^5(x)-3 the federal trade commission (ftc) defines a deceptive practice as one that is likely to mislead a reasonably prudent consumer and result in some sort of detriment to the consumer. True or False Mrs. Miller's statistics test scores are normally distributedwith a mean score of 85 () and a standard deviation of 5 ().Using the Empirical Rule, about 95% of the scores lie between whichtwo v