jasmine is creating a presentation. she wants to ensure the integrity and authenticity of the presentation. which of the following will she use to accomplish the task? a. mark as final b. digital signature c. restrict permission d. encrypt document

Answers

Answer 1

Jasmine should create a presentation using a digital signature.

A digital signature: how do I make one?

Simply signing your name with a pen, taking a photo of it, and uploading it to a digital device is the easiest and most basic way to produce a digital signature. A physical object that utilizes digital data is referred to as a digital device. Like desktops and laptops, personal computers are multipurpose computing devices.

Explain what a digital signature is.

A mathematical process known as a digital signature, a sort of electronic signature, is frequently used to verify the veracity and integrity of a message (e.g., an email, a credit card transaction, or a digital document).

To know more about digital signature visit:-

https://brainly.com/question/20463764

#SPJ4


Related Questions

using encryption, you make it impossible for attackers to read your messages even if they intercept them. this is .

Answers

Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is confidentiality

Utmost  licit websites use the encryption protection called “ secure sockets subcaste ”( SSL), which is a form of cracking data that's  transferred to and from a website. This keeps  bushwhackers from  penetrating that data while it's in conveyance.  

What's encryption?  

Data encryption is a way of  rephrasing data from plaintext( unencrypted) to ciphertext( translated). druggies can  pierce translated data with an encryption key and  deciphered data with a decryption key. guarding your data.  

The purpose of encryption is confidentiality — concealing the content of the communication by  rephrasing it into a  law. The purpose of digital autographs is integrity and authenticity — vindicating the sender of a communication and indicating that the content has not been changed.

Learn more about encryption :

brainly.com/question/9979590

#SPJ4

mustang is an object of type car. which statement invokes drive()? question 7 options: car.drive(150); drive(135); mustang->drive(115); mustang.drive(145);

Answers

The statement that invokes the drive method for a mustang object of type car is mustang.drive(145);.

What is Java ?

Java is a high-level programming language that is class-based and object-oriented. It was developed by James Gosling and his team at Sun Microsystems in the mid-1990s and is now owned by Oracle Corporation. Java is designed to be portable and run on any platform, making it one of the most widely used programming languages in the world. It is used to develop various applications such as web applications, mobile applications, desktop applications, and games. Java is known for its security features and ability to handle large amounts of data, making it a popular choice for enterprise applications.

mustang.drive(145); is the correct statement to invoke drive().

The object 'mustang' is of type 'car' and it has a method 'drive()'.To invoke a method of an object in Java, you need to use the dot notation and provide the method arguments in the parentheses.In this case, the method 'drive()' takes an argument '145', so the correct statement is 'mustang.drive(145);'.'car.drive(150);' invokes the drive() method on the 'car' class, not on the 'mustang' object.'drive(135);' is incorrect syntax as it does not specify the object on which the drive() method is being invoked.'mustang->drive(115);' is incorrect syntax as it uses the arrow operator '->', which is not used in Java.

Learn more about Java click here:

https://brainly.com/question/28447680

#SPJ4

from hardware design/engineering point of view, why is it better to build several microprocessors (cores) on a single circuit board than several individual faster cores, one per board? (15 pts)

Answers

From a hardware design/engineering point of view, it is better to build several microprocessors (cores) on a single circuit board than several individual faster cores, one per board, due to the following reasons:

Cost savings: Building multiple cores on a single circuit board is significantly cheaper than creating individual faster cores, one per board. Increased reliability: Having multiple cores on a single board increases the reliability of the system since each core is able to work in parallel, thus providing redundancy.Increased performance: Multiple cores on a single board allow for more efficient use of resources, increased speeds, and better power management.Reduced complexity: By having multiple cores on a single board, the complexity of the design is reduced since there is no need to design and build separate boards for each core. More flexibility: Multiple cores on a single board can be easily reconfigured and customized, allowing for more flexibility.

Learn more about microprocessors: https://brainly.com/question/30467115

#SPJ4

Commands for adding lessons are present in the

Answers

Commands for adding lessons are present in the d. Text Panel

What is the Commands about?

The specific location of commands for adding lessons can vary depending on the software or application being used. However, in a general sense, it's possible that the commands for adding lessons could be present in:

Note that Text Panel: A text panel is a section of the user interface where text can be entered or displayed. In an educational software, the text panel could contain buttons or menus for adding lessons or other content.

Learn more about Commands  at:

https://brainly.com/question/25808182

#SPJ1

See full question below

Commands for adding lessons are present in the

a. Toolbar b. Navigation Panel c. Title Bar d. Text Panel

research on the 5th generation of computers stating the advantages and disavantage how such computers were designed,examples of such computers etc​

Answers

The 5th generation of computers, also known as the artificial intelligence (AI) era, was designed to incorporate advanced technologies such as machine learning, natural language processing, and expert systems. These computers were designed to have the ability to learn, reason, and make decisions based on complex data sets.

Advantages of 5th generation computers include:

Improved efficiencyIncreased intelligence: More natural interaction

What are the 5th generation of computers?

The Disadvantages of 5th generation computers include:

High cost: Due to their advanced technologies, 5th generation computers can be quite expensive.Complexity: These computers are often more complex to use and maintain than previous generations of computers, which can be a disadvantage for some users.

Therefore, the Examples of 5th generation computers include:

IBM WatsonGo/ogle AssistantAmazon Alexa

Learn more about computers from

https://brainly.com/question/21474169

#SPJ1

write an instruction sequence to subtract the 16-bit value stored at program memory 0x1050~0x1051 from the sum of two 16-bit values stored at program memory 0x1060~0x1061 and 0x1070~0x1071. store the result at data memory 0x2000~0x2001.

Answers

Here is a sample code in Assembly language that implements the instruction sequence you described:

; Subtract the value stored at program memory 0x1050~0x1051 from the sum of two values stored at program memory 0x1060~0x1061 and 0x1070~0x1071

; and store the result at data memory 0x2000~0x2001

; Load the first operand from program memory 0x1060~0x1061 into register A

MOV A, [0x1060]

ADD A, [0x1070]

; Load the second operand from program memory 0x1050~0x1051 into register B

MOV B, [0x1050]

; Subtract B from A and store the result in A

SUB A, B

; Store the result at data memory 0x2000~0x2001

MOV [0x2000], A

Coding is the process of using a programming language to create software, applications, or systems that can perform specific tasks or solve specific problems. Coding involves writing code, which is a set of instructions that a computer can understand and execute.

Learn more about coding: brainly.com/question/30434576

#SPJ4

Answer:

sample code uhh i think

Explanation:

pretty sure bro

Universal Containers (UC) wants to build a mobile application that twill be making calls to the Salesforce REST API. UC's Salesforce implementation relies heavily on custom objects and custom Apex code. UC does not want its users to have to enter credentials every time they use the app. Which two scope values should an Architect recommend to UC

Answers

An app host website is a service provider. You can specify one or more service providers and enable Salesforce as an identity provider.

The IP address of the application has to be added to the list of Trusted IPs in order to limit connections to the employee portal server alone. The IP addresses that are used to identify people and can be easily confirmed are known as trusted IPs. Users whose IP addresses are not on the trusted IP list must confirm their identity by receiving a login code for every transaction. In the aforementioned scenario, we must add the IP address of the employee portal to the trusted IP list to ensure that employee-only access is restricted. Because Salesforce is not a part of the SSO configuration, it is a separate system.

Learn more about The IP address here:

https://brainly.com/question/14331846

#SPJ4

Which question should programmers ask when determining the goals of a
game they are going to develop?

Answers

These questions will help the programmers define the vision and scope of the game project and ensure that the development process is aligned with the game’s goals and desired outcomes.

What are these questions that a programmer should ask?

rogrammers should ask the following questions when determining the goals of a game they are going to develop:

   Who is the target audience?    What is the game’s unique selling point or value proposition?    What is the desired player experience?    What is the objective or end goal of the game?    What are the gameplay mechanics and features?    What is the storyline or narrative?    What are the technical requirements and limitations?    What is the expected revenue model?

To learn more about programmers, visit: https://brainly.com/question/30432240

#SPJ1

Is Mei-ying communicating effectively in order to reach her goal of getting the job? Why or why not?

Answers

Communication facilitates cooperation among employees and advances the organization's goals.

What is the Communication?

Giving, receiving, and exchanging information are all parts of communication, which might take the form of talking, writing, listening, or reading. Listen intently, talk or write properly, and appreciate many points of view when communicating.

There are certain points by which communicates effectively in order to reach her goal of getting the job.

Define the goal.Set specific and measurable actions to achieve the goal. Communicate the goal clearly and openly. Predict possible challenges ahead.

Therefore, As a result, communication was very effective in order to reach her goal of getting the job.

Learn more about Communication here:

https://brainly.com/question/22558440

#SPJ1

The show formulas button is a toggle button-it is either on or off.
a. True
b. False

Answers

The four layers that make up the gastrointestinal tract wall are the mucosal, submucosa, fibromuscular propria, and serosa, in that order.

The term "mucosa" also refers to the mucous membranes. Mucosa lines the cavities and internal organs of your body that are exposed to foreign objects. The submucosa is between the muscularis externa and the outside surface of the mucosa. It is made up of connective tissue and a range of different cell types, including fibroblasts, lymphocytes, eosinophils, macrophages, plasma cells, and mast cells. These layers of muscle tissue are used during peristalsis, the process by which food is moved downward through the stomach. The exterior lining of the stomach, as well as of other abdominal, chest, and body compartments also referred to as a serous membrane.

Learn more about Mucous membranes here:

https://brainly.com/question/29987674

#SPJ4

how to identify duplicates in excel without deleting

Answers

The usage of conditional formatting to find and highlight duplicate data. This is the way to review the duplicates and decide if you want to remove the data or not. We need to select the cells you want to check for duplicates. It should be noted that excel cannot highlight the duplicate values area of a PivotTable report.

The easiest way to detect duplicate data in Excel is the use of the COUNTIF function.

Supposing you have a list of items in column B that you want to check for duplicates in data. These can be invoices, product IDs, names, or any other data.

For an instance, Here is a formula to find duplicates in Excel including first occurrences (where B2 is the topmost cell):

=COUNTIF(B:B, B2)>1

Learn more about duplicate data in excel at:

brainly.com/question/7600155

#SPJ4

The processor can decide what to do next based on the results of earlier computations and (blank) from the outside world. What is the missing word?

Answers

Answer:

Input

Explanation:

Information the computer receives from the outside world is called input. Input can be a number of different things: the weather, which buttons are pressed, and so forth. It can come from any place the processor is able to receive information from, such as the user or a web search. The processor makes its decisions based on input.

5) A brick-and-mortar store is an online store that uses an older version of HTML.


True
False

Answers

I’m not sure I think false

while configuring a new vpn client, which role service needs to be installed for the remote access role on a windows server?

Answers

The Routing and Remote Access Service on the server must first be enabled. Navigate to Control Panel > Administrative Tools > Routing and Remote Access to complete this task.

The VPN server must then be configured to accept incoming VPN connections. Go to IP Routing > General under Routing and Remote Access. Check the box next to "Enable IP Routing." The VPN server must then be set up to assign addresses to clients. Go to IP Routing > Address Pool under Routing and Remote Access. When prompted, specify the address range of 192.168.200.200 to 192.168.200.250 and click the "Create" button. The VPN server must then be configured to use Routing and Remote Access for authentication. Select the "Use Routing and Remote Access" checkbox by going to Routing and Remote Access > Security > Authentication.

Learn more about VPN here:

https://brainly.com/question/29890049

#SPJ4

The Windows CreateFile() system call is used to create a file. What is the equivalent system call in UNIX?

Answers

The Windows Create Process() system call creates a new process. What is the equivalent system call in UNIX: fork()

There are two sub-windows in the Process Explorer display. The information displayed in the bottom window depends on the mode that Process Explorer is in; for example, if it is in handle mode, you will see the handles that the process selected in the top window has opened; if it is in DLL mode, you will see the DLLs and memory-mapped files that the process has loaded.

The top window always displays a list of the currently active processes, along with the names of their owning accounts. Powerful search features in Process Explorer allow you to quickly identify processes that have specific handles opened or DLLs loaded.

Process Explorer is useful for identifying DLL-version issues or handling leaks because of its distinct capabilities, which also offer insight.

To know more about  Windows here

https://brainly.com/question/26420125

#SPJ4

The Windows Create Process() system call creates a new process. What is the equivalent system call in UNIX:

A) NTCreateProcess()

B) process()

C) fork()

D) getpid()

Ways of sharing information in traditional mode and u modern mode​

Answers

The traditional ways of sharing information can be through physical acts of communication, which include talking and writing letters or sending and receiving texts in the form of transmitting e-mails.

we no longer actually rely on traditional modes of sharing information but use modern ways as they are faster and involve an active audience participating in the medium. social media and digital marketing are a few examples.

Books, newspapers, magazines, and radio are a few examples of traditional modes of sharing information. Internet, social media and blogging are a few examples of modern information-sharing methods.

To learn more about the topic:

https://brainly.com/question/1347779?referrer=searchResults

Complete questions-

what are the different ways of sharing information in traditional and modern modes?

if you were 'looking inside' your computer and saw a bit pattern that looked like: 0010 what would that bit pattern be representing? pick the best answer below. some answers may be close, but only one is the best answer.

Answers

One and zero only make up a bit pattern. Any variable just is what it is. And a reference or pointer is. Put that explanation aside and consider it to be stating the obvious.

What amount of bit patterns are there?

N bits have a total of 2N possible patterns. This is important. You will lose a lot of time in this and subsequent courses if you let yourself become confused on it. Computer science frequently uses this number.

What purposes do bit patterns serve?

Number representation is one of the most popular uses of a bit-pattern. Arabic notation in base 10 is how we typically write numbers. We use the ten distinct symbols (0, 1, 2, 3, 4, 5, 6, 7, 8, and 9) in this system.

To know more about bit pattern visit :-

https://brainly.com/question/13014227

#SPJ4

when is a compound conditional that uses the keyword 'and' true? a one test is true and the other is false b at least one test is true c both tests are false d both tests are true

Answers

Both tests are true  is a compound conditional that uses the keyword 'and' true.

In a previous article, we covered the use of the conditional operators (, >, =, >=, ==, and!=) to construct conditional expressions. Use the conditional expression speed  70, for instance, to determine whether the value stored in the variable speed is less than 70. boolean values are obtained from conditional expressions:

I love it so much! What if, however, we wanted to know if speed is both less than 80 and greater than 70? How would we go about doing this?

Let's carefully examine the example above since it introduces some new syntax.

Walkthrough Interactive

To get started, click on an icon below!

Compound conditional expressions are first shown in the example above. Using two new operators, and (&&) and or (||), they are produced by combining various distinct conditional expressions.

To know more about   compound conditional here

https://brainly.com/question/24370161

#SPJ4

which information is not included in a material safty data sheet?

Answers

Answer:

The MSDS lists the hazardous ingredients of a product, its physical and chemical characteristics (e.g. flammability, explosive properties), its effect on human health, the chemicals with which it can adversely react, handling precautions, the types of measures that can be used to control exposure, emergency 

the leadership team is reviewing a computer application that will send a text message to the healthcare provider when a laboratory or diagnostic test result is available to review. which is this application demonstrating? select one:

Answers

Healthcare reform will send a text message to the healthcare provider when a laboratory or diagnostic test result is available to review. In this case option A ids correct.

The majority of health care reform is governmental policy that influences how healthcare is delivered in a specific location. Usually, health care reform aims to:

increase the number of people who are covered for health care by either public insurance programs or private insurance companies

Increase the number of healthcare professionals from which consumers can select

Increasing access to medical specialists

Boost the standard of medical care

Take better care of the populace

Reduce the cost of medical care

The debate over health care reform in the United States touches on issues like the right to health care, access, fairness, sustainability, quality, and the amount of money spent by the government. The mixed public-private health care system in the United States has health care costs that are the highest in the world.

To know more about Healthcare reform here

https://brainly.com/question/1286704

#SPJ4

The leadership team of a large healthcare organization is designing a new strategic plan for an electronic health record system. Which has been most instrumental in mandating strategic planning to achieve organization and population healthcare goals?

Nursing informatics specialist

Internal stakeholders

Community members

System software cannot handle technical details without user intervention.a. Trueb. False

Answers

System software cannot handle technical aspects without user interaction. when a single physical computer runs a specialised programme called virtualization software.

The system software is it used by the user?

Photo of Without user input, system software cannot handle technical details. The components of a computer system's user interface that enable user interaction. A user interface, sometimes referred to as a human-computer interface, is made up of both hardware and software elements. It manages communications between users and the system.

What do you describe a type of computer application that routinely executes additional tasks without user input while running in the background?

A background process is a computer operation that runs automatically without user involvement. These applications frequently handle activities related to logging, system monitoring, scheduling, and user notification.

To know more about system software visit:-

https://brainly.com/question/12908197

#SPJ4

james has just inserted his grade for a quiz into a new database table. which operation has james just performed?

Answers

James just completed the operation of adding a record. A record known as an A record links a domain to the computer's actual IP address.

Which kind of query is used to update or delete data from or update specific records in a database table?

An action query or a select query can be used as a database query. A query that pulls data from a database is called a select query. Data manipulation in the form of insertion, updating, deletion, or other types is the subject of an action query.

How do I include an A record in DNS?

Click Add DNS resource record after right-clicking on the zone where you want to add a resource record. The dialog box for adding DNS resource records appears. Select the DNS server where you want to add one or more new resource records by clicking DNS server in the Resource record properties.

To know more about domain visit :-

https://brainly.com/question/10178947

#SPJ4

in command mode, what letter command will have the same effect as hitting the left arrow key?

Answers

In command mode in Vim, the letter command to have the same effect as hitting the left arrow key is "h".

What is Vim?

Vim (Vi IMproved) is a highly configurable, open-source text editor designed to be efficient and highly usable. It is a terminal-based text editor that is widely used by programmers and system administrators for editing code, configuration files, and other text-based documents. Vim is known for its powerful and versatile features, such as syntax highlighting, code indentation, and support for multiple programming languages, as well as its distinctive modal design, which separates the modes for inserting text and executing commands. Vim has a large following of users who swear by its efficiency and speed, and it is widely regarded as one of the best text editors available.

The letter command that will have the same effect as hitting the left arrow key in command mode is 'h'.

In Vim, 'h' stands for "left" or "leftward". So, when you press 'h' in command mode, it will move the cursor one character to the left, just like hitting the left arrow key.

Learn more about Vim click here:

https://brainly.com/question/29649677

#SPJ4

what exploit is characterized as the abuse of email systems to send unsolicited email to large numbers of people?

Answers

Any unwanted, uninvited digital communication transmitted in bulk is referred to as spam. Spam is frequently transmitted by email, but it can also be sent through social media, text messages, and phone calls.

What makes spam what it is?

The Geo. A. Hormel Company held a contest in 1937 to come up with a name for their new product, which they dubbed "The Miracle Meat" and advertised as a health food. It stands for "spiced ham" and was one of the names offered.

What is the common name for unwanted and unsolicited emails?

Unsolicited messages sent in bulk via email are referred to as email spam, junk email, spam mail, or simply spam (spamming).

To know more about spam visit:-

brainly.com/question/30584585

#SPJ4

Any unwanted, uninvited digital communication transmitted in bulk is referred to as spam. Spam is frequently transmitted by email, but it can also be sent through social media, text messages, and phone calls.

What makes spam what it is?

The Geo. A. Hormel Company held a contest in 1937 to come up with a name for their new product, which they dubbed "The Miracle Meat" and advertised as a health food. It stands for "spiced ham" and was one of the names offered.

What is the common name for unwanted and unsolicited emails?

Unsolicited messages sent in bulk via email are referred to as email spam, junk email, spam mail, or simply spam (spamming).

To know more about spam visit:-

brainly.com/question/13058726

#SPJ4

kim has a job as a database administrator. one of her employees sent her an e-mail with a spreadsheet attached. the spreadsheet needs to be merged into one of kim's databases. which operation does kim need to perform?

Answers

Kim must carry out the import operation. An Import Operation is a status of the import of a single resource.

Which type of query is used to perform an operation on specific records in a database table, such as updating or deleting data?

An action query or a select query can be used as a database query. A query that pulls data from a database is called a select query. Data manipulation in the form of insertion, updating, deletion, or other types is the subject of an action query.

What does a supervisor of import operations do?

Being an Import/Export Supervisor ensures that every payment transaction is carried out in accordance with specifications. ensures that all documentation is recorded in tracking systems and that it is current. In addition, the Import/Export Supervisor collaborates with shippers, customs officials, and customers to resolve issues and expedite solutions.

To know more about operation visit :-

https://brainly.com/question/15024511

#SPJ4

Digital exclusion, also known as the digital divide, separates
O
O
social media users and non-social media users.
those who have Internet access and those who don't.
those who live in poverty and those who don't.
young Internet users from old Internet users.

Answers

those who have Internet access and those who don't.

what causes spinning nebula clumps to collapse into flat accretion discs?

Answers

Answer:

Gravity drives the nebular collapse, but conservation of angular momentum cause the nebula to spin faster and faster as mass concentrates toward its center. The balance of gravity and rotation leads to a flattened disk.

write a c program (or java program) for hw1 2 that reads input numbers from a user and displays the numbers) in the order of frequencies.

Answers

Program (or Java program) for hw1-2 that displays user-inputted numbers in the order of their frequency distribution are given below:-.

How does Java read a user-provided number?

The nextInt() function is called after creating an instance of the Scanner class in order to read an integer from the user. It is the mechanism that is most frequently used to accept input of primitive kinds. The same is true for the use of nextDouble(), nextLong(), nextFloat(), etc.

import java.util.Scanner;

public class Inputfunctions {

 public static void main(String[] args)

{

  Scanner readme = new Scanner(System.in);

  System.out.println("Enter The Two Numbers (Press Enter after each):");

  //the two variables to hold numbers

  double n1,  n2, n3;

  n1 =  readme.nextDouble();

  n2 =  readme.nextDouble();

  n3 = n1 +  n2;

  System.out.println(" Total = " + n3);

 }

To know more about program  visit:-

https://brainly.com/question/29133726

#SPJ4

drag the below statements into the correct column, indicating which are true and which are false, regarding the subclass of anticoagulants known as heparins?

Answers

Heparin injection is a blood thinner. It is used to reduce blood clotting and assist prevent dangerous clots from developing in blood arteries.

Which of the following statements best describes how heparin acts as an anticoagulant?

Heparin increases the activation of antihrombin III, which blocks thrombin activation and fibrinogen conversion to fibrin. As a result, this drug INDIRECTLY suppresses thrombin via antithrombin III. Since the early 1950s, EDTA has been used as an anticoagulant and offers several benefits over other anticoagulants [2]. It prevents blood clots by eliminating or chelating calcium from the circulation. When platelet counts fall considerably (typically to 50% of baseline), heparin should be discontinued promptly, and direct thrombin inhibitors such as lepirudin or argatroban should be begun if anticoagulation is required.

Learn more about blocks  from here;

https://brainly.com/question/7188483

#SPJ4

if you want to apply styles to all of the li elements within a main element, how do you code the selector?

Answers

If we wish to apply styles to all of the li elements within a main element, use the Main li.

Which selector is used to style a specific set of elements?

The class selector chooses HTML items with the same class property as the selection. The class selector is handy for targeting numerous items, such as cards or pictures with matching styles. You use a to choose an element with a certain class. The contextual selector (space) will choose any element within the element. For example, if you have an ol> with an ul> inside it, choosing with ol li will also pick the items of the ol> since they are contained within the ol>. CSS universal selectors are represented by the asterisk (*). It may be used to pick any and all forms of HTML page components. When used to pick a child object, the asterisk can also be preceded by a selector. When we wish to pick all of the elements on the page, we may use this selector.

Learn more about HTML from here;

https://brainly.com/question/9069928

#SPJ4

Other Questions
a student has built a 10-cm-long pinhole camera for a science-fair project. she wants to photograph her friend, who is 180 cm tall, and have the image on the film be 5 cm high. how far should the front of the camera be from her friend using all digits 3247 make the smallest number Ella sees 7 beetles when she weeds her garden. Each beetle has 6 legs.How many legs are there on all 7 beetles?Check your work. How many legs are there on 7 beetles? legs on 7 beetles. the harrisburg store has net working capital of $2,715, net fixed assets of $22,407, sales of $31,350, and current liabilities of $3,908. compute total asset turnover ratio? What is the value of the angle marked with x? Part of what the Declaration of Independence does is set up the basis for a new government and a brand new country. Discuss Jeffersons vision of America as it appears in the text, making sure to include evidence from the reading. What was his hope for the country? How would he feel about what America has become? Did it meet his expectations?Videos if needed: Enlightenment Thinkers, Tea/taxes and the American Revolution: crash course, The French Revolution: crash course, Hattian Revolution: crash course or Book if needed for pages: An Age of Revolutions in Europe and the Americas/Rev. Texts p. 3-17, p. 18-21, p. 21-23, p. 23-28, 29-34, p. 35-38 In no less than 150 words, describe some of the ideas about where the different gods and goddesses came from in the ancient Greek system. Then comment on these theories, explaining why you do or do not consider them to be useful ways of thinking. Use your knowledge of The Odyssey as needed. Explain how the production possibilities curve model shows the concepts of scarcity and efficiency. FILL IN THE BLANK. Katie knows to be especially careful with what she eats and drinks during her first trimester of pregnancy because a key aspect of development called ________ takes place during this period.a. myelinizationb. anencephalyc. organogenesisd. endometriosis It's election day for a club. If a president and vice-president are elected, how many different combinations can be made among twelve people? which one of the followings are the key properties of object oriented paradigm? group of answer choices data abstraction information hiding encapsulation Jeff created the following shape to fill with skittles. He also wants to decorate the outside with Skittle wrappers. Find the surface area to determine the number of skittle wrappers he would need to save and volume to determine how the amount of Skittles he could fill it withShow work please and thank you A ferris wheel is 50 meters in diameter and boarded from a platform that is 1 meters above the ground. The six o'clock position on the ferris wheel is level with the loading platform. The wheel completes 1 full revolution in 4 minutes. The function h = f(t) gives your height in meters above the ground t minutes after the wheel begins to turn. which instruction to the patient is most likely to result in their placing their foot in dorsiflexion? Who was the political cartoon made for?who or what is being depicted? How was it possible? Whats the significant of the image, whats it trying to convey ? Please halpTysm for it ^-^ Direction Respond to the following prompts by using the passage below.Jones, Sasha. Do school dress codes discriminate against girls? Education week. August 31,2018 Nationwide, 53 percent of public schools enforce a strict dress code during the 2015-16 school year, according to the National Center for Education Statistics. But, data on whos being punished for dress-code violations and how the penalties are being meted out are harder to come by. The study by the NWLC takes a rare quantifiable look at the issue. Released in April, it examines the experience of 21 black girls who attend or attended 12 Dutriot of Columbus schools including charter schools and analyzes district wide student discipline du te the one-on-one interviews, all of the girls reported experiencing ar wie sing dress-code enforcement in their school Common punishments for those violations included mixing class time or facing suspension, as a result of hair, makeup, clothing styles that were deemed inappropriate. Since the report release, two of the schools have maile changes to their dress policiesQuote a sentence (or phrase) from the passage above. Be sure to attribute the quote to the author and include an in-text citation___________________________________________________________________________________________________________________________________________________________________________________________________________________________Integrate a short phrase from the following quote into a sentence. Quote: "If more of us valued food and cheer and song above hoarded gold, it would be a merrier world." Thorin Oakenshield___________________________________________________________________________________________________________________________________________________________________________________________________________________________Integrate the following quote in a sentence by adding a word or words to indicate that the ushering to is dwarves. Quote: "If more of us valued food and cheer and song above hoarded gold it would be a merrier world- Thorin Oakenshield___________________________________________________________________________________________________________________________________________________________________________________________________________________________Integrate the following quote in a sentence by omitting a word or words because you want to focus only on the fact that people should value food, not cheer or song Quote: "If more of us valued food and cheer and song above hoarded gold, it would be a merrier world" Thorin Oakenshield___________________________________________________________________________________________________________________________________________________________________________________________________________________________ You have been asked to temporarily fill in for an administrator who has just been fired. This administrator was known to have lax security standards, and you suspect that passwords are still kept in the /etc/passwd file.Which of the following entry within the passwd file would indicate that the passwords are stored there? In New York Times v. Sullivan, the Supreme Court ruled that statements about public figures are examples of libel only when they are made with malice and and reckless disregard for the truth. How does this ruling support a healthy democracy? Use fraction strips to find each sum 2 6/10 + 1 3/5