EXTRA CREDIT - 1 point! Scenario: A small business has implemented the best way to handle the few Service Accounts they have in their AD: They use a random password generator to set Service Account passwords, have 1 Service Account per service, and policies are set so that the accounts do not expire. The current passwords are not even stored anywhere. The company rigorously documents this setup, and diligently deprovisions accounts when services configurations change. The company has also implemented Account Monitoring, and know when any of the Service Accounts is being attempted to be used without the correct password, indicating an attack attempt. Due to the security sensitivity of the data accessible via the Service Accounts, any attack attempts will cause the service account to be disabled and IT staff alerted. Finally, the company has implemented a script that can be used to update the existing passwords -- resetting them via the only account delegated this authority: the Enterprise Root account. To ensure none of the IT staff can use the Enterprise Root account to reset a Service Account without consent, the password for the Enterprise Root account is only known to the company's CIO (Chief Information Officer), and is not stored anywhere. Identify (1) one major problem that you can see with this setup, and describe why this is a problem. There are multiple correct answers possible for this EXTRA CREDIT question.

Answers

Answer 1

Answer:

A small business has implemented the best CIO:-

Though the setup is well planned but there is another drawback to that setup as the root password is with the company CIO. So, even in case of critical situation, if the CIO is somehow unavailable, the entire business will be inactive as users can't able to logon into the system as it is mentioned the service accounts can only be reset using the ROOT account. There should be other alternatives to this failure.

Explanation:


Related Questions

Assume that the client wants to retrieve the www.cnn home page but has no information about the www.cnn web server IP address. Describe the process of the client obtaining the IP address for the hostname www.cnn under the assumption that it is not cached at the local DNS server and that the local DNS server has not cached an entry for the DNS server. Describe this for the recursive case!.

Answers

Answer:

You could type ipconfig www.cnn in command promt.

Explanation:

Take the program written last weekend that creates a deck of cards, shuffles them, and then lists them out. Modify the program to 'deal' two hands of cards (two players). Each player will be dealt 5 cards. Deal one to the first player, then one to second player. Repeat until both players have 5 cards in their hand. Then compute the total points in each player's hand and determine the winner with the most points. If a player has an ace, then count that as 11 points. Print out the winning player total points and then his cards. Then print out the losing player total points and his cards. Turn in both your code and a copy of the screen output.

Answers

Answer: Here, you might need to make some changes to format it how you'd like, but it gives you the desired output :)

Explanation:

import random as chunky

def play():

   hand1, hand2 = [], []

   for n in range(5):

       hand1.append(chunky.choice(cardList))

       hand2.append(chunky.choice(cardList))

   print("Hand 1: ", end= "")

   for n in hand1:

       print(n, end= " ")

   print()

   print("\nHand 2: ", end= "")

   for n in hand2:

       print(n, end= " ")

   print()

   while "A" in hand1:

       hand1[hand1.index("A")] = 11

   while "A" in hand2:

       hand2[hand2.index("A")] = 11

   print(f"\nHand 1 Total: {sum(hand1)}  Hand 2 Total: {sum(hand2)}")

   print("\nHand 1 WINS!") if sum(hand1) > sum(hand2) else print("\nHand 2 WINS!")

cardList = [1,2,3,4,5,6,7,8,9,10,"A"] #Skipped King, Queen, and Jack. Did not know how to incorperate them

chunky.shuffle(cardList)

looper = True

while looper == True:

   play()

   x = input("\n\nWould you like to go again?(y/n): ")

   if x.lower() == "n":

       quit()

What is the fastest way to copy the format from one cell to multiple other cells?
Double-click on the Format Painter.
Single-click on the Format Painter.
Use Copy and Paste commands.
Use Cut and Paste commands.

Answers

use copy and paste commands.. i think! hope this hells

Double clicking on the format pointer is the fastest way to copy the format from one cell to multiple other cells. Thus, the correct option is A.

What is Format pointer?

The format pointer holds a value which represents the memory address of an available data item in the file. If the data item from the file becomes unavailable. For example, because it is in a program which has been canceled then the pointer format is considered to hold a value which is incompatible with the format options.

Use the Format Painter to quickly apply the same formatting, such as the color, font style and size, or border style, to multiple pieces of text or graphics in the data item. With the help of format painter, a person can copy all of the formatting from one object and apply it to another object think of it as copying and pasting for formatting.

Therefore, the correct option is A.

Learn more about Format painter here:

https://brainly.com/question/29563254

#SPJ2

Use the drop-down menu to complete each statement. First, calculate the time spent doing each activity _____ . Next, multiply each category by ____ . Then, ___ the totals. Last, subtract the total from ____ .

Answers

Answer:1. Every day 2. 7 3. add 4. 168

Explanation:

I got it right on Edge

First, calculate the time spent doing each activity every day. Next, multiply each category by 7. Then, add the totals. Last, subtract the total from 365.

What is the significance of the activity?

The significance of activity may be determined by the fact that it usually enhances your health and lowers the threat of developing several diseases and other abnormal conditions like type 2 diabetes, cancer, and cardiovascular disease.

According to the context of this question, if you are required to calculate the time spent doing each activity in each day. You are required to make a chart that represents all such activities followed by multiplication. Then, you are considerably required to add the totals followed by subtracting the total from the total number of days in a year.

Therefore, first, calculate the time spent doing each activity every day. Next, multiply each category by 7. Then, add the totals. Last, subtract the total from 365.

To learn more about Activities, refer to the link:

https://brainly.com/question/26654050

#SPJ3

define a computer, state its 3 main activities with examples of the functions of each of those activities​

Answers

Answer:

The four main functions of a computer are to:

- take data and instructions from a user

-process the data according to the instructions

- and display or store the processed data.

These functions are also referred as the input function, the procedure function, the output function, and the storage function.

Explanation:

What should Anthony use to determine his available study hours for an upcoming project? LOOK AT THE PICTURE

Answers

Answer:

The answer is B i got it right

Explanation:

Answer:

The correct answer is B

Explanation:

Plz help, will guve brainliest to best answer (if i can)

Answers

Answer:

Online text:1,3,4

not online text:2,5

Def locate_substring(dna_snippet, dna): This function takes in two strings, dna_snippet and dna, where dna_snippet is a substring of dna, and returns all locations of the substring as a list of integers. In other words, dna_snippet may exist in multiple locations within dna; you should return the beginning index position of each occurrence of dna_snippet inside of dna. Example: * Sample DNA snippet (substring): "ATAT" * Sample DNA string: "GATATATGCATATACTT" * The returned position list: [1, 3, 9]

Answers

Answer:

In Python. The function is as follows:

def locate_substring(dna_snippet, dna):

   res = [i for i in range(len(dna_snippet)) if dna_snippet.startswith(dna, i)]  

   print("The returned position list : " + str(res))

Explanation:

This iterates defines the function

def locate_substring(dna_snippet, dna):

Check for all occurrence

   res = [i for i in range(len(dna_snippet)) if dna_snippet.startswith(dna, i)]  

print all occrrence

   print("The returned all position list : " + str(res))

Following is the Python program to the given question.

Python

According to the question,

DNA Series: GATATATGCATATACTTDNA

Snippet: ATAT

Program: def locate_substring (dna_snippet, dna):

start = 0 while True: start = dna.

find(dna_snippet, start) #finding the first occurrence of dna_snippet in dna.

if start == -1: return # if dna.find() returns -1 yield start #Resumes next execution start += 1dna=input ("Enter the DNA sequence: ") dna_snippet=input

("Enter the DNA snippet: ") print(list(locate_substring(dna_snippet,dna )))

Program Explanation: Defining a function.

An infinite loop is being utilized just to produce the indexes from which dna snippet begins.

Determining the initial occurrence of dna snippet inside dna. storing the new occurrences of dna snippet throughout the starting point.

Whenever dna.find() returns minus one, it means there was no occurrence identified and the method should be exited.

Find out more information about Python here:

https://brainly.com/question/26497128

Write a program that teaches arithmetic to a young child. The program tests addition and subtraction. In level 1, it tests only addition of numbers less than 10 whose sum is less than 10. In level 2, it tests addition of arbitrary one digit numbers (which means that the sum could be more than 10). In level 3, it tests subtractions of one digit numbers with a non-negative difference. Generate random numbers for each of the levels based on its requirements, and get players answers as their response. Verify if the user entered the correct answer. The player will start at level 1, and gets up to two tries per problem. Advance from one level to the next when the player has achieved a score of five points (one point per successful answering the question).

Answers

Answer:

Explanation:

The following program is written in Java and creates three levels with the different set of randomly generated arithmetic problems. As the player goes getting more points they advance every 5 points to the next level.

import java.util.Random;

import java.util.Scanner;

class Main {

   private static Random random = new Random();

   private static Scanner in = new Scanner(System.in);

   static int points = 0;

   public static void main(String[] args) {

       while (true) {

           System.out.println(points);

           if (points < 5) {

               System.out.println("Starting Level 1");

               levelOne();

           } else if (points < 10) {

               System.out.println("Starting Level 2");

               levelTwo();

           } else if (points < 15) {

               System.out.println("Starting Level 3");

               levelThree();

           }

       }

   }

   public static boolean levelOne() {

       int numberOne = random.nextInt(10);

       int numberTwo = random.nextInt((10 - numberOne));

       int answer = numberOne + numberTwo;

       int count = 0;

       while (points < 5 && count < 2) {

           System.out.println("What is " + numberOne + " + " + numberTwo + "?: ");

           int userChoice = in.nextInt();

           if (userChoice == answer) {

               points += 1;

               levelOne();

           } else {

               count += 1;

           }

       }

       return false;

   }

   public static boolean levelTwo() {

       int numberOne = random.nextInt(10);

       int numberTwo = random.nextInt(10);

       int answer = numberOne + numberTwo;

       int count = 0;

       while (points < 10 && count < 2) {

           System.out.println("What is " + numberOne + " + " + numberTwo + "?: ");

           int userChoice = in.nextInt();

           if (userChoice == answer) {

               points += 1;

               levelTwo();

           } else {

               count += 1;

           }

       }

       return false;

   }

   public static boolean levelThree() {

       int numberOne = random.nextInt(10);

       int numberTwo = random.nextInt(10);

       int answer = numberOne - numberTwo;

       int count = 0;

       if (answer <= 0) {

           levelThree();

       }

       while (points < 15 && count < 2) {

           System.out.println("What is " + numberOne + " - " + numberTwo + "?: ");

           int userChoice = in.nextInt();

           if (userChoice == answer) {

               points += 1;

               levelThree();

           } else {

               count += 1;

           }

       }

       return false;

   }

}

On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance (number of keys) from that key, and r is 2(1/12). Given an initial key frequency, output that frequency and the next 4 higher key frequencies.

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:

print('{:.2f} {:.2f} {:.2f} {:.2f} {:.2f}'.format(your_value1, your_value2, your_value3, your_value4, your_value5))

Ex: If the input is:

440
(which is the A key near the middle of a piano keyboard), the output is:

440.00 466.16 493.88 523.25 554.37

Answers

Answer:

In C:

#include <stdio.h>

#include <math.h>

int main(){

   float f0,r,temp;

   r = pow(2.0,1.0/12);

   printf("f0: ");    scanf("%f", &f0);

   temp = f0;

   for(int i = 0; i<=4;i++){

       f0 = f0 * pow(r,i);

       printf("%.2lf ", f0);

       f0 = temp;    }

   return 0;

}

Explanation:

This declares f0, r and temp as float

   float f0,r,temp;

This initializes r to 2^(1/12)

   r = pow(2.0,1.0/12);

This prompts the user for f0

   printf("f0: ");    scanf("%f", &f0);

This saves f0 in temp

   temp = f0;

This iterates the number of keys from 0 to 4

   for(int i = 0; i<=4;i++){

This calculates each key

       f0 = f0 * pow(r,i);

This prints the key

       printf("%.2lf ", f0);

This gets the initial value of f0

       f0 = temp;    }

   return 0;

Consider two different implementations, M1 and M2, of the same instruction set. There are three classes of instructions (A, B, and C) in the instruction set. M1 has a clock rate of 60MHz and M2 has a clock rate of 80MHz. The average number of cycles of each instruction class and their frequencies (for a typical program) are as follows:
Instruction Class M1-cycles M2-cycles/ Frequency
/instruction class instruction class
A 1 2 50%
B 2 3 20%
C 3 4 30%
a. Calculate the average CPI for each machine, M1 and M2.
b. Calculate the CPU execution time of M1 and M2.

Answers

Explanation:

A.)

we have two machines M1 and M2

cpi stands for clocks per instruction.

to get cpi for machine 1:

= we multiply frequencies with their corresponding M1 cycles and add everything up

50/100 x 1 = 0.5

20/100 x 2 = 0.4

30/100 x 3 = 0.9

CPI for M1 = 0.5 + 0.4 + 0.9 = 1.8

We find CPI for machine 2

we use the same formula we used for 1 above

50/100 x 2 = 1

20/100 x 3 = 0.6

30/100 x 4 = 1.2

CPI for m2 =  1 + 0.6 + 1.2 = 2.8

B.)

CPU execution time for m1 and m2

this is calculated by using the formula;

I * CPI/clock cycle time

execution time for A:

= I * 1.8/60X10⁶

= I x 30 nsec

execution time b:

I x 2.8/80x10⁶

= I x 35 nsec

WHY
is communication Important
in
space​

Answers

Answer:

Communication is vitally important to astronauts while they are in space. Not only does it allow them to talk to their friends and family back home, it also allows them to communicate with the team of experts on the ground that helps them carry out their mission safely.

How can you access your router if your provider is spectrum I've tried calling spectrum, they tried helping me but somehow it hasn't really helped me, is there any other way that I can access my router?

Answers

Answer:

what do you mean by access?

Explanation:

if anything you can try to make an account with spectrum in order to connect your router and see if its connect with your current internet provider. Another thing is most router have an app, check with you comes with one. If it does then this will allow you to change default name and password that your router came with.

how to check if serial interface is dte ot DCE?

Answers

If you can see the DTE/DCE cable, you can tell by looking which router has the DCE interface connected to it - the letters "DTE" or "DCE" will either be molded into the connector itself, or if it's an older cable there should be a little piece of tape on the cable that tells you what the interface type is.

What is a sorting algorithm

Answers

Explanation:

In computer science, a sorting. algorithm is an algorithm that puts elements of a list in a certain order. The most frequently used orders are numerical order and lexicographical order. Efficient sorting is important for optimizing the efficiency of other algorithms that require input data to be in sorted lists

In matlab how would this specific code be written and how could I ask the user to enter a vector of coefficients for the polynomial model. Verify that the entry has an even number of elements (an odd number of elements would mean an even order polynomial). If an invalid vector is entered, prompt the user to re-enter the vector until an acceptable vector is entered. If the user does not enter an acceptable vector after 5 attempts (including the first prompt), display a warning and remove the last element of the last vector entered. (For example, if the last user input is [1 2 3 4 5], the vector becomes [1 2 3 4]).
my code
[1,2,3,4];

Answers

Answer:

Explanation:

that is correct 1234

What year was "scripting" first invented

Answers

Answer:

Late 1950's

Explanation:

I hope this helps, have a great day :)

grade 11 essay about the year 2020​

Answers

Answer:

This 2020 have a new normal class because of CO VID-19 Disease have more students and teachers patient the teachers is preparing a module to her/his student and the student is answering are not learning lesson because of the COV ID-19 the whole word enduring to that pandemic and all fronliners is the hero in this pandemic because all frontliners is helping the people to we heal and to healed that virus.

Explanation:

See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.
For instance, for input file:
ABCDEFGHIJKLM
It will output:
ADGJM
Iseek_example.c file contant:
// C program to read nth byte of a file and
// copy it to another file using lseek
#include
#include
#include
#include
void func(char arr[], int n)
{
// Open the file for READ only.
int f_read = open("start.txt", O_RDONLY);
// Open the file for WRITE and READ only.
int f_write = open("end.txt", O_WRONLY);
int count = 0;
while (read(f_read, arr, 1))
{
// to write the 1st byte of the input file in
// the output file
if (count < n)
{
// SEEK_CUR specifies that
// the offset provided is relative to the
// current file position
lseek (f_read, n, SEEK_CUR);
write (f_write, arr, 1);
count = n;
}
// After the nth byte (now taking the alternate
// nth byte)
else
{
count = (2*n);
lseek(f_read, count, SEEK_CUR);
write(f_write, arr, 1);
}
}
close(f_write);
close(f_read);
}
// Driver code
int main()
{
char arr[100];
int n;
n = 5;
// Calling for the function
func(arr, n);
return 0;
}

Answers

Answer:

See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.

For instance, for input file:

ABCDEFGHIJKLM

It will output:

ADGJM

Iseek_example.c file contant:

// C program to read nth byte of a file and

// copy it to another file using lseek

#include

#include

#include

#include

void func(char arr[], int n)

{

// Open the file for READ only.

int f_read = open("start.txt", O_RDONLY);

// Open the file for WRITE and READ only.

int f_write = open("end.txt", O_WRONLY);

int count = 0;

while (read(f_read, arr, 1))

{

// to write the 1st byte of the input file in

// the output file

if (count < n)

{

// SEEK_CUR specifies that

// the offset provided is relative to the

// current file position

lseek (f_read, n, SEEK_CUR);

write (f_write, arr, 1);

count = n;

}

// After the nth byte (now taking the alternate

// nth byte)

else

{

count = (2*n);

lseek(f_read, count, SEEK_CUR);

write(f_write, arr, 1);

}

}

close(f_write);

close(f_read);

}

// Driver code

int main()

{

char arr[100];

int n;

n = 5;

// Calling for the function

func(arr, n);

return 0;

}

Explanation:

help me pleaseeee
also what’s the center

Answers

Answer:

a property

Explanation:

h1 is the selector here, and 'center' is the value.

A property !!!!.........

The child’s game, War, consists of two players each having a deck of cards. For each play, each person turns over the top card in his or her deck. The higher card wins that round of play and the winner takes both cards. The game continues until one person has all the cards and the other has none. Create a program that simulates a modified game of War.
The computer will play both hands, as PlayerOne and PlayerTwo, and, for each round will generate two random numbers and compare them.
If the first number is higher, PlayerOne’s score is increased by 1 and if the second number is higher, PlayerTwo’s score is increased by 1.
If there is a tie, no score is incremented.
When one "player" reaches a score of 10, that player should be deemed the winner and the game ends.
The range of numbers should be 1-13 to simulate the values of cards in the deck.

Answers

Answer:

In Python

import random

p1 = 0; p2 =0

while(p1 <10 and p2<10):

   p1play = random.randint(1,14)

   p2play = random.randint(1,14)

   print("Player 1 roll: "+str(p1play))

   print("Player 2 roll: "+str(p2play))

   if p1play > p2play:

       p1+=1

       print("Player 1 wins this round")

   elif p1play < p2play:

       p2+=1

       print("Player 2 wins this round")

   print()

print("Player 1: "+str(p1))

print("Player 2: "+str(p2))

if p1 > p2:    print("Player 1 wins")

else:    print("Player 2 wins")

Explanation:

See attachment for complete program where comments were used to explain some lines

Can i get any information on this website i'd like to know what its for ?
https://www.torsearch.org/

Answers

Explanation: torsearch.org is a safe search engine mainly used for dark wed purposes. It does not track your location nor give any personal information.

What was one of the main advantages of BPR at Chevron?​

Answers

Answer:

Business process re-engineering improves performance of chevron at end-to-end process and saves company's fifty million dollars by reducing operation cost.

Arnie is planning an action shot and wants the camera to move smoothly alongside his running characters. He is working on a tight budget and can’t afford expensive equipment. What alternatives could you suggest?

Mount the camera on a wagon, wheelchair, or vehicle and move it next to the characters.
Rearrange your script so you don’t need to capture the motion in that way.
Try running next to the characters while keeping the camera balanced.
See if you can simulate the running with virtual reality.

Answers

Camera and wagon are answer

What is a key consideration when evaluating platforms?

Answers

Answer:

The continuous performance of reliability data integrity will lead to the benefit and profit of the platform's regular structure changes. Cleanliness in the platform whereas addresses the straightforward structure of task performance and adequate data integrity.

((PLEASE HELP ME)) i need to get all my school work done before thursday
------------- are used to navigate between pages and Web sites.

Question 1 options:

Transitions


Animations


Hyperlinks


None of the above

Answers

Answer:

none of the above

Explanation:

Web navigation refers to the process of navigating a network of information resources in the World Wide Web, which is organized as hypertext or hypermedia. The user interface that is used to do so is called a web browser.

Pitch an idea for an app that would help with sustainability (examples could be recycling, food waste or energy). What features would it have, how would one of these features work and how would it positively impact the user of the app

Answers

you could do something like homeless help, it would be able to find homeless ppl if they signed up and get them a partner to help them with there life

Explanation:

This image shows a web designer’s grids for different pages on a website. The uppermost box on each page is the website’s identity. Which important principle of a good website has the designer violated?

Answers

You need to add a picture in order for others to understand what you are asking.

Answer:

consistency

Explanation:

plato

the uppermost box is different sizes and different positions everytime, that violatesone of the principles of design which is consistency.

6) Read the article posted on The Verge entitled How to fight lies, tricks, and chaos online and summarize the four steps. Then answer the following: Are these four steps enough guidance to help us discover truth in this day and age? Justify your answer with supporting arguments.​

Answers

Answer:

A. Summarily, the four steps to accurately sharing information include;

1. consciously employing our senses to examine news deeply so as to accurately determine their source and purpose.

2. determining the origin of the story so as to know when and where it stems from.

3. examining the context of the material so as to find inconsistencies.

4. analyzing the evidence, arguments and information being presented in the story.

B. The four steps presented in the story are enough guidance to help us differentiate between accurate and false information on the net.

I agree with all of the points presented by the author of this article on analyzing information found online. Recently, I viewed a video on the net which was presented as a fact but a little digging revealed that the original video was a prank that had been edited, so as to remove important details. The first point raised by the speaker which is honing my senses to know that something is wrong with the information (it was too bad to be true), helped me to dig deeper. I found a link to the original video that revealed a completely different detail from what I had just seen.

Explanation:

For people who care that the information they share online are true, the points raised by the author of the article, "How to fight lies, tricks, and chaos online", can prove beneficial. The first step is applying one's senses to know when an information is too bad or good to be true. The next step is determining the origin of the story. When and where a story comes from is crucial to knowing if it is truly relevant.

Thirdly, reading in between lines might reveal that the story is deceitful and lacks truth or originality. Lastly weighing the evidence of the story will help the reader in knowing the usefulness of the story to him.

Your co-worker who went to UCLA tells you that DHCP is not enabled at your new job, so you should just use the same IP address that you have at home to connect to the internet. He told you it should work because your computer is communicating with a unique public IP address at home, so no other computer in the world would have it. When you try this, your computer does not have internet access. Give two reasons why?

Answers

Answer:

1. internet connection is not enabled on the computer.

2. The DHCP server in the company is not enabled as well.

Explanation:

For a user to access the internet, the computer must have a public IP address that is either assigned to it by a service provider or dynamically from the DHCP server in the computer. In the case of the former, the user just needs to enable the internet connection to obtain the unique IP address.

If the DHCP server or the internet connection is not enabled, the user would not have access to the internet.

Other Questions
As a newly elected school prefect, write a speech that you deliver at the swearing in ceremony on at least four things you will do to improve upon the academic performance of the school On a local swim team 6 members each swam 1,685 meters during the season. How many total kilometers did the 6 members swim during the season The remaining questions refer to the following situation: Suppose a certain farmer wants to find out if the average length of the green beans in her field is 4 inches. She collects a random sample of 100 beans and get a sample mean of 3.75 inches. (Suppose she knows that the population standard deviation of bean length is 0.5.) What is the population in this situation Officials who represent their countrys government are known as _____.Immersive Reader A.refugees B.diplomats C.prisoners of war D.ethnic groups two ways in which women and children can be protected from discrimination and violence Grapes cost $3.25 per pound. Darius paid a total of $26 for grapes.How many pounds of grapes did Darius buy? Please help I will give brainliest Slavery throughout the United States was permanently abolished by the aratification of the Constitution of the United States bapproval of the Republican Party platform of 1860 cissuance of the Emancipation Proclamation dadoption of the 13th amendment to the Constitution Read the paragraphs from two sources Nico is using to research solar eclipses.Source 1Nico wants to take notes based on both sources."Solar" means relating to the Sun. "Eclipse" means to block. A solar eclipse Which two notes accurately combine information fromoccurs when the moon blocks the path between the Sun and Earth. The Sun is hidden both sources?from Earth in that position.How does this happen? We know that the moon is much smaller than the Sun,1. There are many kinds of eclipses in space andso how can the moon block our view of the Sun? The moon is much closer to Earthtwo types we can see from Earth.than the Sun is. From our point of view on Earth, the moon can look about the samesize as the Sun.2. A lunar eclipse happens when Earth's shadowblocks sunlight from reaching the moon.Source 23. Some people on Earth can see the moon blockthe Sun and its light during a solar eclipse.An eclipse occurs when one object in space blocks the view of another objectin space. From Earth, there are two main types of eclipses: lunar and solar. A lunareclipse occurs when Earth's shadow hides the moon. A solar eclipse occurs when themoon hides the Sun, casting a shadow on part of Earth.4. Solar eclipses occur when the view of the Sunfrom a part of Earth is blocked by the moon.5. From Earth, the moon can appear to be thesame size as the Sun, even though the Sun isactually much larger. The mass of the Moon is 7.3x1022 kg and its radius is 1738 km. What is the strength of the gravitational field on thesurface of the Moon? (Do all required steps) QUICK!! FiRST PERSON TO ANSWER THIS CORRECTLY GETS BRAINLIES To find the height of a pole, a surveyor moves 121 feet away from the base of the pole and then, with a transit 3.6 feet tall, measures the angle of elevation to the top of the pole to be 39. To the nearest foot, what is the height of the pole? Round your final answer to the nearest tenth of a foot. Solve the following values for x and y 1) (8x + 7) 5y (7y - 34) (9x - 4) In the reaction Cu + 2Ag-->Cu2+ + 2Ag, the oxidizing agent is1.Ag+2.Ag3.Cu2+4.Cu Item 22 Burke's Corner currently sells blue jeans and T-shirts. Management is considering adding fleece tops to its inventory to provide a cooler weather option. The tops would sell for $49 each with expected sales of 3,600 tops annually. By adding the fleece tops, management feels the firm will sell an additional 215 pairs of jeans at $59 a pair and 350 fewer T-shirts at $20 each. The variable cost per unit is $27 on the jeans, $11 on the T-shirts, and $23 on the fleece tops. With the new item, the depreciation expense is $29,000 a year and the fixed costs are $64,000 annually. The tax rate is 40 percent. What is the project's operating cash flow Quines son los nueve hombres que entran en el laberinto cada nueve aos? Compralos con losjvenes que ingresaban al laberinto del minotauro en el mito de Teseo y Ariadnateniendo encuentra: la cantidad, su objetivo en el laberinto y la forma de morir en cada relato 1) Asma works for 32 hours in a week and is paid 15.20 for each hour worked.James works 30 hours in a week and is paid 11.50 for each hour worked.What is the difference in their total weekly pay? value of giant lantern The elevations, in miles, of three museums are marked on the number line below. Point O on the number line represents sea level. Which of the following statements is true? *A. Museum A is at sea level and both museums B and C are above sea level.B. Museum A is above sea level and Museum B is at sea level.C. Both museums B and C are below sea level.D. Museums A and B are below sea level. In August, one of the processing departments at Tsuzuki Corporation had beginning work in process inventory of $24,000 and ending work in process inventory of $13,000. During the month, $283,000 of costs were added to production. In the department's cost reconciliation report for August, the cost of units transferred out of the department would be: Multiple Choice $294,000 $270,000 $281,000 $307,000