Leslie is a cybersecurity consultant approached by a new startup, BioHack, which plans to develop a revolutionary but controversial new consumer product: a subdermal implant that will broadcast customers’ personally identifying information within a 10-foot range, using strong encryption that can only be read and decrypted by intended receivers using special BioHack designed mobile scanning devices. Users will be able to choose what kind of information they broadcast, but two primary applications will be developed and marketed initially: the first will broadcast credit card data enabling the user to make purchases with the wave of a hand. The second will broadcast medical data that can notify emergency first responders of the users’ allergies, medical conditions, and current medications. The proprietary techniques that BioHack has developed for this device are highly advanced and must be tightly secured in order for the company’s future to be viable. However, BioHack’s founders tell Leslie that they cannot presently afford to hire a dedicated in-house cybersecurity team, though they fully intend to put one in place before the product goes to market. They also tell Leslie that their security budget is limited due to the immense costs of product design and prototype testing, so they ask her to recommend free open-source software solutions for their security apparatus and seek other cost-saving measures for getting the most out of their security budget. They also tell her that they cannot afford her full consulting fee, so they offer instead to pay her a more modest fee, plus a considerable number of shares of their company stock.
Question 1:What risks of ethically significant harm are involved in this case? Who could be harmed if Leslie makes poor choices in this situation, and how? What potential benefits to others should she consider in thinking about BioHack’s proposal?
Question 2:Beyond the specific harms noted in your answer to Question 1, what are some ethical concerns that Leslie should have about the proposed arrangement with BioHack? Are there any ethical "red flags" she should notice?
Question 3:What are three questions that Leslie should ask about the ethics of her involvement with BioHack before deciding whether to accept them as clients (and if so, on what terms?)

Answers

Answer 1

The risks include potential harm to user privacy and security, while the ethical concerns encompass data misuse, fair compensation, and transparency.Leslie's poor choices could harm users through data breaches, identity theft, or unauthorized access to medical information.

What risks and ethical concerns are involved in the case of BioHack's proposed product?

The risks include potential harm to user privacy and security, misuse of personally identifying information, and compromised encryption. Leslie's poor choices could harm users through data breaches, identity theft, or unauthorized access to medical information.

She should consider the potential benefits of the product in terms of convenience for users and improved emergency response. Ethical concerns include privacy infringement, data security, fair compensation, transparency of stock shares, and potential conflicts of interest.

Leslie should notice red flags related to inadequate security measures, insufficient budget allocation for cybersecurity, and potential conflicts between the product's controversial nature and ethical considerations.

Learn more about ethical concerns

brainly.com/question/11539948

#SPJ11


Related Questions

What screen adjustments are made to the digital dashboard when enhanced mode is selected on 2023 z?.

Answers

The screen adjustments that are made to the digital dashboard when enhanced mode is selected on 2023  is the 12.3-inch TFT meter display.

What is it about?

The 12.3-inch TFT meter display is known to be a form of all-new that is made along with three display modes to be able to match driver preference.

Note that “Normal” mode is one that gives a sporty feel with the center area made for navigation, audio and also a form of vehicle information.

Therefore, The screen adjustments that are made to the digital dashboard when enhanced mode is selected on 2023 is the 12.3-inch TFT meter display.

Learn more about dashboard from

https://brainly.com/question/1147194

#SPJ1

Write an expression whose value is true if all the letters in the str associated with s are all lower case

Answers

An expression whose value is true if all the letters in the str associated with s are all lower case is  s.islower()

What does expression implies in computer terms?

The term "expression" is a term that connote a computer program statement that examines to some specific value.

Note that A Boolean expression can examine to either true or false, e.g. ( money > 100 ).

Hence, An expression whose value is true if all the letters in the str associated with s are all lower case is  s.islower()

Learn more about Computer expression from

https://brainly.com/question/24912812

#SPJ1

________ sites let users evaluate hotels, movies, games, books, and other products and services.

Answers

Social review websites avail end users an opportunity to evaluate hotels, movies, games, books, and other products and services.

What is a website?

A website can be defined as a collective name which connotes a series of webpages that are interconnected or linked together with the same domain name, so as to provide certain information to end users.

What is social review?

Social review can be defined as a process through which end users are availed an opportunity to evaluate various products and services that are provided by an e-commerce business firm, especially through the use of websites and over the Internet (active network connection).

In conclusion, we can infer and logically deduce that social review websites avail end users an opportunity to evaluate products and services such as hotels, movies, games, books.

Read more on website here: https://brainly.com/question/26324021

#SPJ1

Which colour scheme and design elements would you choose for a website for a neighbourhood swim team

Answers

F this is not related to math I’d pick light blue or a teal blue with either white or gold

The Crow’s foot symbol with two vertical parallel lines indicates _____ cardinality.a. (0,N)b. (1,N)c. (1,1)d. (0,1)

Answers

The Crow’s foot symbol with two vertical parallel lines indicates option  c. (1,1) cardinality.

What is Symbols in crow's foot notation?

Crow's foot diagrams is one that stands for entities as boxes, and its association as lines that exist between the boxes.

Note that different shapes at the ends of these lines stands for the relative cardinality of the relationship and thus The Crow’s foot symbol with two vertical parallel lines indicates option  c. (1,1) cardinality.

Learn more about notation from

https://brainly.com/question/1750038

#SPJ1

One common command-line network utility tool is “netstat,” which displays which protocol is being used. It can review particular ports or display all active connections and ports on which a computer is listening and, depending on the OS, can also include the total number of bytes of traffic, domain names, and IP addresses (local and foreign). Name at least two potential uses of this command, making sure at least one use is related to secure administration principles.

Answers

An example of two potential uses of this command is in the area or aspect of:

The troubleshoot of networking problems.In configuration

What protocol does the netstat command use?

It is known to use the Internet Protocol (TCP/IP) and it is one that is used without parameters, this command  is said to often show active TCP connections.

What is netstat used for?

The network statistics ( netstat ) command is known to be a kind of a networking tool that is often used for troubleshooting and configuration, and this is one that can be used as a tool for monitoring for connections over the network.

Hence,  it is used in incoming and outgoing connections, routing tables, port listening, and others. Therefore, An example of two potential uses of this command is in the area or aspect of:

The troubleshoot of networking problems.In configuration

Learn more about troubleshoot from

https://brainly.com/question/9572941

#SPJ1

What are the three places that store personal data

Answers

Answer: information in databases, Internet bulletin boards, newsgroups, and social media sites.

Explanation:

The sticky notes often have strings of characters written on them that appear to be passwords. What can you do to prevent the security risk that this practice presents

Answers

Educate the user on how to make strong passwords

A(n) ___________ g is a set of elements with a binary operation, denoted by *, that associates to each ordered pair (a,b) of elements in g an element ( a*b) in g.

Answers

A(n) elliptic curve is a set of elements with a binary operation, denoted by *, that associates to each ordered pair (a,b) of elements in g an element ( a*b) in g.

Why is it called an elliptic curve?

In mathematics, an elliptic curve is known to be a kind of a smooth, curve that is said to be projective and also an algebraic curve which there is found to be a specified point O.

Note that  the elliptic curves are seen to be the set of points that are said to be gotten or obtained as an outcome of solving elliptic functions that is known to be over a predefined space.

Therefore, A(n) elliptic curve is a set of elements with a binary operation, denoted by *, that associates to each ordered pair (a,b) of elements in g an element ( a*b) in g.

Learn more about binary operation from

https://brainly.com/question/26891746

#SPJ1

What is not one of the main stages of the hardware lifecycle?

Answers

Recycling is not one of the main stages of the hardware lifecycle.

What is hardware life cycle main stages?

They are:

Procurement DeploymentMaintenanceRetirement.

Hence, Recycling is not one of the main stages of the hardware lifecycle.

Learn more about hardware lifecycle from

https://brainly.com/question/17076377

#SPJ1

An Amazon Fulfillment Associate has a set of items that need to be packed into two boxes. Given an integer array of the item weights (

Answers

The task here is to complete a function that gives the required result indicated in the question. [See the full question below]

What is the completed function of for the above program?

The completed function is given as;

def minimulHeaviestSetA(arr,n):

    arr.sort(reverse=True)

    x=0

    for i in range(1,n):

        if sum(arr[:i])>sum(arr[i:]):

            x=i

           break

    return arr[:x][::-1]

              n=int(input()) arr=list(map(int,input().split())) A=minimulHeaviestSetA(arr,n)

print(A)  

Learn more about functions:
https://brainly.com/question/20476366
#SPJ1

Full question:

An Amazon Fulfillment Associate has a set of items that need to be packed into two boxes. Given an integer array of the item weights larr) to be packed, divide the item weights into two subsets, A and B. for packing into the associated boxes, while respecting the following conditions: The intersection of A and B is null The union A and B is equal to the original array.

The number of elements in subset A is minimal. The sum of A's weights is greater than the sum of B's weights. Return the subset A in increasing order where the sum of A's weights is greater than the sum of B's weights. If more than one subset A exists, return the one with the maximal total weight.

Example n=5 arr = 13,7,5,6, 2) The 2 subsets in arr that satisfy the conditions for Aare (5, 7) and (6, 7]:

A is minimal (size 2) • Surn(A) = (5 + 7) = 12 > Sum(B) = (2+ 3+6) = 11 • Sum(A) + (6 + 7) = 13 > Sum(B) = (2 + 3 + 5) - 10 •

The intersection of A and B is null and their union is equal to arr. . The subset A where the sum of its weight is maximal is [6.7).

Function Description Complete the minimal Heaviest Seta function.

which of the following is acomputer program that detects, prevents. and takes action sto deactivate or remove malicious programms

Answers

An Antivirus program fits the description of a computer program that detects, prevents and takes action to deactivate or remove malicious programs.

What is an antivirus program?

An antivirus program is any software installed on a computer system with the sole aim of detecting, preventing and removing threats from harmful software applications. We can liken antivirus software to a security guard stationed in front of a building; the building in this case is the computer system.

You can learn more about an antivirus program here https://brainly.in/question/11940932

#SPJ1

A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are: 1) The year must be divisible by 4 2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400 Some example leap years are 1600, 1712, and 2016. Write a program that takes in a year and determines whether that year is a leap year. Ex: If the input is:
1712 the output is: 1712 is a leap year. Ex: If the input is: 1913 the output is: 1913 is not a leap year
Your program must define and call the following function. The function should return true if the input year is a leap year and false otherwise. def is_leap_year(user_year) Note: This is a lab from a previous chapter that now requires the use of a function,

Answers

Based on the fact that the program should be able to return true if the input is a leap year, and false if the input is not, the program is shown below.

What program will return true if it is a leap year?

In order to make a program that tells whether a year is a leap year or not, you need to start off with the definition:

def is_leap_year(user year):

Then continuing the program, the full code would be:

def is_leap_year(user_year):

   if(user_year % 400 == 0):

       return True

   elif user_year % 100 == 0:

       return False

   elif user_year%4 == 0:

       return True

   else:

       return False

if __name__ == '__main__':

   user_year = int(input())

   if is_leap_year(user_year):

       print(user_year, "is a leap year.")

   else:

       print(user_year, "is not a leap year.")

If you input the year, 1712, the program would return the result, "1712 is a leap year."

Find out more on using programs to define functions at https://brainly.com/question/20476366

#SPJ1

Which text most closely resembles the form in which one instruction is stored in a single location of a typical computer's memory?

Answers

A text which most closely resembles the form in which an instruction is stored in a single location of a typical computer's memory is: c. Add 34, #9, 25.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:

KeyboardNetworkMonitor screenMouse

What is a memory?

A memory can be defined as a terminology that is used to describe the available space on an electronic device that is typically used for the storage of data or any computer related information such as:

ImagesVideosTextsMusicCodesFolders

In computer science, we can infer and logically deduce that "add 34, #9, 25." is a text which most closely resembles the form in which an instruction is stored in a single location of a typical computer's memory.

Read more on memory here: https://brainly.com/question/24881756

#SPJ1

Complete Question:

Which text most closely resembles the form in which one instruction is stored in a single location of a typical computer's memory?

a. w = (x + y) * (y - z)

b. w = x + 000111 - (y * 1110101)

c. Add 34, #9, 25

d. (Mul 45, 2) + (Mul 33, 5) + (Mul 4, 8)

When patel’s advertising co. decided to upgrade its computer network, many people were involved in the decision. In b2b buying systems, decisions are often made:_____.

Answers

In b2b buying systems, decisions are often made by by a committee after a lot of considerable deliberation.

What is Business-to-Business service?

Business-to-business is known to be a kind of a scenario where one business is said to often makes a commercial transaction with another kind of business.

The B2B decision-making process is known to be made up of some discrete tasks such as:

Knowing that there is an issue or need.Examining  and comparing the available alternative or solutionsDefining the requirements that is needed for the product and others.

Hence, In b2b buying systems, decisions are often made by by a committee after a lot of considerable deliberation.

Learn more about b2b from

https://brainly.com/question/26506080

#SPJ1

Accessibility is the degree to which a product or service is readily available and usable by _____.

A - as many people as possible
B - anyone who is disabled
C - anyone who is disabled
D - employees

Answers

Answer:

A-As many people as possible

Task 5: Create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer whose ID currently is stored in I_CUST_ID. Place these values in the variables I_CUSTOMER_NAME and I_CREDIT_LIMIT, respectively. When the procedure is called it should output the contents of I_CUSTOMER_NAME and I_CREDIT_LIMIT.

Answers

The SQL statement that would create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer is:

GET_CREDIT_LIMIT

SELECT CUST_ID 125

FROM FIRST_NAME, LAST_NAME, CREDIT_LIMIT

WHERE LAST_NAME ="Smith"

What is SQL?

This is an acronym that means Structured Query Language that is used in handling data in a database.

Hence, we can see that from the attached image, there is a table that contains the details of customers and their various data such as their first and last names, credit limits, address, etc, and the  GET_CREDIT_LIMIT procedure is shown above.

Read more about SQL here:

brainly.com/question/25694408

#SPJ1

Which type of printer maintenance commonly requires resetting a maintenance counter?

Answers

The type of printer maintenance that commonly requires resetting a maintenance counter is Fuser Reset or ITM Reset.

What is a Printer?

This refers to the device that is used to produce an output in a hardware format.

At some point during use, the printer can develop some fault and to run a maintenance, there would have to be a reset of the maintenance counter.

This can be done with the use of the Fuser Reset or ITM Reset.

Read more about printer maintenance here:

https://brainly.com/question/11188617

#SPJ1

2. Change the owner of /home/fparker/projects to the fparker user and change the group to the fparker group

Answers

The program based on the information given is illustrated below.

What is a program?

It should be noted that a computer program is a set of instructions in a programming language for a computer to execute. In this case, computer programs are one component of software.

Basedon the information given, in order to change the owner and group that owns the directory projects from the linux terminal, the command will be:

chown fparker:fparker /home/fparker/projects

chown is the command that is used to change the owner and group of any file or directory in linux.

fparker:fparker - is in the format user:group that is, the ones that need to be changed), since user name and the group name are fparker, it is used.

/home/fparker/projects - is the path of the directory, where the owner and group are being changed.

Learn more about program on:

https://brainly.com/question/23275071

#SPJ1

Complete information

Complete the following tasks in order on CorpServer:

Change the owner of /home/fparker/projects to the fparker user and change the group to the fparker group.

46. The public information _______________ includes the types of information to be distributed, the procedures for distributing information, procedures for updating or correcting information, and a method for allowing the public to express concerns or questions.

Answers

Answer:

the public information cycle or system

The _____ method of developing systems produces code that is modular and reusable.

Answers

The object-oriented analysis method of developing systems produces code that is modular and reusable.

What is object oriented system analysis?

Object-oriented systems analysis and specification (OSA) is known to be a kind of a method that is often used in regards to systems analysis and this is known to be one that helps to create or builds on the strengths of former systems and, at also at the same time, look into their weaknesses.

Note that this is said to be the basic idea behind the OSA methodology that are known to be described. The framework of OSA system models is known to be object class.

Hence, The object-oriented analysis method of developing systems produces code that is modular and reusable.

Learn more about object-oriented  tool from

https://brainly.com/question/11158544

#SPJ1

Determine whether the compound condition is True or False.
7<12 or 50!=10

7<12 and 50<50

not (8==3)

Answers

The  compound condition are:

7<12 or 50!=10 is false7<12 and 50<50 is falsenot (8==3) is true

What is compound condition?

A compound statement is known to be one that shows up as the body of another statement, e.g. as in if statement.

The  compound condition are:

7<12 or 50!=10 is false7<12 and 50<50 is falsenot (8==3) is true

Learn more about compound condition  from

https://brainly.com/question/18450679

#SPJ1

Continue your S3 and S4 assignment for a young soccer league with the following specification. Do not include the previous queries from Task 5. A team will play some of the other teams in the same division once per season. For a scheduled game we will keep a unique 8 character code, the date, time and location (max 60 characters

Answers

Using the computational language in SQL script it is possible to write a code scheduled game we will keep a unique 8 character code, the date, time and location.

Writting the code in  SQL script:

SELECT Trainer.firstName+' '+ Trainer.lastName as trainer ,

Customer.firstName+' '+ Customer.lastName as customer

FROM Customer, Trainer

WHERE Trainer.handlingCustomer = Customer.id;

SELECT Trainer.firstName+' '+ Trainer.lastName as trainer ,

Customer.firstName+' '+ Customer.lastName as customer

FROM Customer, Trainer

WHERE Trainer.handlingCustomer = Customer.id AND

Customer.firstName = 'Robert';

SELECT Trainer.firstName+' '+ Trainer.lastName as trainer ,

Customer.firstName+' '+ Customer.lastName as customer

FROM Customer, Trainer

WHERE Trainer.handlingCustomer = Customer.id AND

Trainer.firstName = 'Mary';

SELECT Trainer.firstName+' '+ Trainer.lastName as trainer ,

Customer.firstName+' '+ Customer.lastName as customer

FROM Customer, Trainer

WHERE Trainer.handlingCustomer = Customer.id AND

Trainer.hiredIn >= 2015;

See more about  SQL script at brainly.com/question/15693585

#SPJ1

A client discovers the address of a domain controller by making a dns query for which record?

Answers

In order for a client to discover the address of a domain controller, they can make a DNS query for the SRV record.

What is the SRV record?

This refers to a record of the location of data files in a certain service being offered in a system. It is considered a Domain Name System (DNS) record which means it can be access via a DNS query.

If a client wants to discover the location of a domain controller, they can use this Domain Name System to make a query that will help them to locate the address of the domain controller from the records in the Active Directory.

Find out more on the Domain Name System (DNS) at https://brainly.com/question/12465146

#SPJ1

>>> A = [21, 'dog', 'red'] >>> B = [35, 'cat', 'blue'] >>> C = [12, 'fish', green'] >>> E = [A, B, C] What is the value of E1 2

Answers

The value of E[1][2] is 'blue'

How to determine the value of E?

The code segment is given as:

A = [21, 'dog', 'red']

B = [35, 'cat', 'blue']

C = [12, 'fish', 'green']

E = [A, B, C]

The above code segment is written in Python, and the lists A, B and C are merged to form list E

This means that list E would be a two-dimensional list.

So, the value of E is [[21, 'dog', 'red'], [35, 'cat', 'blue'], [12, 'fish', 'green']]

Rewrite as:

E = [[21, 'dog', 'red'],

      [35, 'cat', 'blue'],

      [12, 'fish', 'green']]

The element at E[1][2] is the element at the second row and the third column.

This element is 'blue'

Hence, the value of E[1][2] is 'blue'

Read more about python programs at:

https://brainly.com/question/24833629

#SPJ1

why are pirated software considered a threat?​

Answers

Pirated software are considered a threat because if they are able to infect your PC with a kind of adware, bots and even a ransomware, they can damage your PC.

What are the disadvantages of using pirated software?

The Disadvantages of Pirated software is known to be the likelihood to be infected with a kind of serious computer viruses, that tends to damage the a person's computer system.

Hence, Pirated software are considered a threat because if they are able to infect your PC with a kind of adware, bots and even a ransomware, they can damage your PC.

Learn more about pirated software from

https://brainly.com/question/3615098

#SPJ1

; This program replaces the value in R0 with its absolute value. ; ; It does NOT modify any other registers! ; .ORIG x0200 START XXXXXXXX ; copy R0 to itself to set the condition codes based on R0 XXXXXXXX ; if R0 is NON-NEGATIVE, skip the negation (already correct) XXXXXXXX ; R0 is negative, so negate it XXXXXXXX DONE BR START .END

Answers

Using the knowledge in computational language in LC-3 Assembly it is possible to write a code that replaces the value in R0 with its absolute value

Writting the code

       .ORIG x0200

START

       AND R0, R0, #0  ; copy R0 to itself to set the condition codes based on R0;

                       ; i.e performing addition operation with Zero option to set the flags

       BRzp DONE       ; if R0 is NON-NEGATIVE, skip the negation (already correct);

                       ; Branch to DONE if number is poistive

       NOT R0, R0      ; R0 is negative, so negate it i.e taking 2's complement

       ADD R0, R0, #1  ; R0 = -R0 is performed successfully

DONE    BR START

       

       .END

See more about  LC-3 Assembly at brainly.com/question/12978370

#SPJ1

The (blank) option will help determine the overall look of her presentation.

Answers

The slide layout option will help determine the overall look of her presentation.

Which option in a presentation program is vital?

Slide layouts is known to be a function that is made of  all the tools in regards to formatting, positioning, and others used in a slide and it is one that have all of the content that is seen on a slide.

Hence, The slide layout option will help determine the overall look of her presentation.

Learn more about presentation from

https://brainly.com/question/2189162

#SPJ1

Answer: themes

Explanation:

Computer networks that use packet switching are less efficient than telephone networks that use circuit switching.

Answers

Computer networks that use packet switching are less efficient than telephone networks that use circuit switching is a false statement.

Is packet switching more better than circuit switching?

Packet switching is known to be easy to use and they are known to be very much affordable when compared to circuit switching.

Note that in packet switching, it is more efficient in regards to bandwidth because it do not need to deal with a little number of connections that cannot be using all that bandwidth.

Hence, Computer networks that use packet switching are less efficient than telephone networks that use circuit switching is a false statement.

Learn more about Computer networks from

https://brainly.com/question/1167985

#SPJ1

Resource _____ let you view, manage, and automate tasks on multiple aws resources at a time.

Answers

Resource group let you view, manage, and automate tasks on multiple aws resources at a time.

What are the resource groups?

Resource groups is known to be a kind of a group that is said to be the key unit in System Automation that is meant for Multiplatforms.

Note that it is said to be logical containers that are meant for the collection of resources hence, Resource group let you view, manage, and automate tasks on multiple aws resources at a time.

See full question below

Resource _____ let you view, manage, and automate tasks on multiple AWS resources at a time.

A-stores.

B-groups.

C-users.

D-graphs.

Learn more about Resource group from

https://brainly.com/question/3752408

#SPJ1

Other Questions
when critics of a presidential charge the chief executive is trying to turn the office into an imperian presidency In a situation where the seller negotiates a contract contingent upon being able to find a new home to purchase, who needs to be protected Suppose that an MBA degree creates no externality because the benefits of an MBA are captured by the student in the form of higher wages. If the government offers subsidies for MBAs, then which of the following statements is correct What is the change in entropy (AS) when a solid substance decomposes andproduces gaseous products? Which listing correctly identifies the areas of consideration when analyzing civil considerations and their effect on military operations? what conclusion can be drawn about human origins on a map imagine yourself as a farmer owning land which is infertile. How would uh convert it into a fertile farmland The worldview of sikhism is similar to the hindu philosophical school called:________A. Sankhya. B. Mimamsa. C. Vaisheshika. D. Vedanta If you were a security professional in a company, what are four roles (two sets of two related roles) you would separate and why? A box of jerseys for a pick-up game of basketball contains 8 extra-large jerseys, 6 large jerseys, and 4 medium jerseys. If you are first to the box and grab 2 jerseys, what is the probability that you randomly grab 2 extra-large jerseys A soccer team played 25 games last season. they won 16 games, lost 5 games, and tied the rest. There are 15 players on a volleyball team. Only 6 players can be on the court for a game. How many different groups of players of 6 players can the coach make, if the position does not matter? You are creating a family budget for the year, using a spreadsheet application. Which is the best category of software to apply here? During the Romantic era, piano music was intended for professional performers only. Group of answer choices The par value of common stock must always be equal to its market value on the date the stock is issued. Select the correct answer from the drop down.How do authors develop a theme in a text?The authors develop a theme by using tools such as, plot, and . Which shock can the fed deal with most effectively? Does Chile have freedom of speech? The graph of Y= sin x--= sin(x-3);3%Ounits to the left 3 units to the right3x2 units up22 is the graph of the y = sin(x) shifted in which direction?units down What did Thomas Watson believe about the following: A. Urban bankers and lawyersb Railroads C. Mail D. Road and school