The so-called WAP gap involves the __________ of information where the two different networks meet, the WAP gateways.

Answers

Answer 1

Complete Question:

The so-called WAP gap involves the ______ of information where the two different networks meet, the WAP gateways.

Group of answer choices

A. integrity.

B. confidentiality.

C. authentication.

D. WTLS.  

Answer:

B. confidentiality.

Explanation:

WAP is an acronym for wireless application protocol and it is a standard communications protocol used for accessing, formatting and filtering of data (informations) on wireless devices such as mobile phones over the internet or mobile wireless network.

Simply stated, a wireless application protocol (WAP) is a lightweight and easy to use protocol designed and developed for devices with low computing power e.g mobile devices.

There are two (2) main standard protocols that are being used for the wireless application protocol (WAP), these are;

1. Transport Layer Security (TLS).

2. Wireless Transport Layer Security (WTLS).

The so-called WAP gap involves the confidentiality of information where the two different networks (WTLS and TLS) meet, the WAP gateways.

In wireless communications, the wireless transport layer security was an improvement on the transport layer security. However, it created a major problem of confidentiality in the translation of the two protocols in a WAP architecture.

First, the user data is encrypted with a public key of an application server and then encrypted again from the client mobile device to the WAP gateway using the wireless transport layer security (WTLS) and lastly, the transport layer security (TLS) is used from the WAP gateway to the enterprise server. The TLS translates the WTLS data by decrypting it first and then encrypting it again.

The security concerns or confidentiality issues associated with using WAP is that, all messages are seen in plain text by the WAP gateways in the translation at the TLS point, thus causing the so called WAP gap.

Answer 2

Answer:

FROM THE TOP MAKE IT DROP THATS SOME WAP WAP WAP WAP

Explanation:


Related Questions

How can software assist in procuring goods and services?
What is e-procurement software?
Do you see any ethical issues with e-procurement?
For example, should stores be able to block people with smartphones from taking pictures of barcodes to do comparison shopping?

Answers

Answer:

Answered below

Explanation:

E-procurement software is the enterprise software that integrates and automates an organisation's procurement processes.

E-procurement software assists in procuring goods and services by allowing customers to browse online catalogs and stores, add their goods to shopping carts and send their requisition. This process reduces errors and improves efficiency.

Ethics of procurement include integrity, impartiality, fairness and transparency. Stores shouldn't block customers from doing comparison shopping.

A static class method can be accessed without referring to any objects of the class. True False

Answers

Answer:

True

Explanation:

This is true because a static class method can be accessed without referring to any objects of the class. When a class member is made static, it's very easy to access the object.

The member becomes static and becomes class level

____________ are used to store all the data in a database

Answers

Data elements within the database are stored in the form of simple tables.

Answer:

The correct answer is data store

Explanation:

Which management function do leaders perform first when an organization begins a project?

OA. organizing

OB.directing

OC. controlling

OD. planning

Answers

Answer:

PLANING

Explanation:

They include: planning, organizing, leading, and controlling. You should think about the four functions as a process, where each step builds on the others. Managers must first plan, then organize according to that plan, lead others to work towards the plan, and finally evaluate the effectiveness of the plan.

We will extend this idea to streams. Write a function called rle that takes in a stream of data, and returns a corresponding stream of two-element lists, which represents the run

Answers

Answer:

def rle(data_stream ):

     with open( "data_stream" ) as file:

           container= [ ]

           two_itemlist= [ ]

           while True:

                 container.append( file.readlines )

           file.close( )

                 while container == True:

                         value= container.pop(0)

                         split_value= value.split( " " )

                         while split_value == True:

                              while len( two_itemlist) < 2:

                                    holder = split_value.pop( 0 )

                                    two_itemlist.append( holder )

                              yield two_itemlist

new_list = rle ( new_file )

Explanation:

In the solution above, the defined function is a generator, as it continuously returns a two-element list.

JavaCalculate the ChangeProgramming challenge description:The goal of this question is to design a cash register program. Your register currently has the following notes/coins within it:One Pence: .01Two Pence: .02Five Pence: .05Ten Pence: .10Twenty Pence: .20Fifty Pence: .50One Pound: 1Two Pounds: 2Five Pounds: 5Ten Pounds: 10Twenty Pounds: 20Fifty Pounds: 50The aim of the program is to calculate the change that has to be returned to the customer with the least number of coins/notes. Note that the expectation is to have an object-oriented solution - think about creating classes for better reusability.Input:Your program should read lines of text from standard input (this is already part of the initial template). Each line contains two numbers which are separated by a semicolon. The first is the Purchase price (PP) and the second is the cash(CH) given by the customer.Output:For each line of input print a single line to standard output which is the change to be returned to the customer. If CH == PP, print out Zero. If CH > PP, print the amount that needs to be returned (in terms of the currency values). Any other case where the result is an error, the output should be ERROR.The output should change from highest to lowest denomination.Test 1Test 1 Input11.2520Expected OutputFive Pounds, Two Pounds, One Pound, Fifty Pence, Twenty Pence, Five PenceTest 2Test 2 Input8.7550Expected OutputTwenty Pounds, Twenty Pounds, One Pound, Twenty Pence, Five PenceTest 3Test InputDownload Test 3 Input2010Expected OutputDownload Test 3 InputERRORCode below:please fill the functions and or classes here. thank you for help.import java.io.BufferedReader;import java.io.IOException;import java.io.InputStreamReader;import java.nio.charset.StandardCharsets;public class Main {/*** Iterate through each line of input.*/public static void main(String[] args) throws IOException {InputStreamReader reader = new InputStreamReader(System.in);BufferedReader in = new BufferedReader(reader);try {double purchasePrice = Double.parseDouble(in.readLine());double cash = Double.parseDouble(in.readLine());Main.calculateChange(purchasePrice, cash);} catch (Exception e) {System.out.println(e);}}public static void calculateChange(double purchasePrice, double cash) {// Access your code here. Feel free to create other classes as required}}

Answers

Answer:

i dont know

Explanation:

Can you make the wording more clear?

Compute the overall (Cache) performance CPU:
A processor runs at 3.0 GHz and has a CPI=1.5 for a perfect cache (i.e. without including the stall cycles due to cache misses). Assume that load and store instructions are 25% of the instructions. The processor has an I-cache (Instruction – cache) with a 5% miss rate and a Dcache (Data memory cache) with 4% miss rate. The hit time is 1 clock cycle for both caches.
Assume that the time required to transfer a block of data from the main memory to the cache, i.e. miss penalty, is 40 ns.
a. Compute the number of stall cycles per instruction
b. Compute the overall (cycle per instruction) CPI
c. Compute the average memory access time (AMAT) in ns.

Answers

Answer:

See explanation.

Explanation:

Given:

Instruction miss rate = I-cache miss rate = 5% = 0.05

Data miss rate = D-cache miss rate = 4% = 0.04

CPI (without including the stall cycles) = 1.5

Miss Penalty = 40 ns × 3 GHz = 120 cycles

load and store instructions = 25% = 0.25

hit time = 1 clock cycle

a. Compute the number of stall cycles per instruction

 Instruction miss cycles = I-cache miss rate * miss penalty

                                        = 0.05 * 120

                                        = 6

Data miss cycles = D-cache miss rate * miss penalty * load and store  

                                                                                                instructions

                            = 0.04 * 120 * 0.25

                            = 1.2

Total memory stall cycles = Instruction miss cycles + Data miss cycles

                                          = 6 + 1.2

                                          = 7.2

number of stall cycles per instruction = 7.2

b. Compute the overall (cycle per instruction) CPI

CPI (stall)  =  1.5 + 7.2

                    = 8.7

Ideal CPU = CPU time with stalls  / CPU time with perfect cache

                    = I x CPI (stall) x Clock cycle/ I x CPI x Clock cycle

                      = 8.7 / 1.5

                     = 5.8

c. Compute the average memory access time (AMAT) in ns.

Combined misses per instruction = 0.05 + 0.25 * 0.04 = 0.06

Combined Miss Rate = Combined misses per  I/ 1.25 access per I

Combined Miss Rate = 0.06 / 1.25 = 0.048

Average Memory Access time (AMAT) = Hit time + Miss rate × Miss penalty

                                                                = 1 + 0.048 * 120

                                                               = 6.7

                                                                = 6.76 cycles

                                                                 = 6.76 / 3

                                                                 = 2.253 ns

AMAT = 2.253 ns

Use the words: Explain, Compare. Create a question using "explain" as the verb. Answer that question.
EG: Explain what collective action is? Answer: It is behaviors that....

Answers

Answer:

i need free points cus i have zero sry

Explanation:

Which social media platform provides filters that alter the user's face by smoothing and whitening skin, changing eye shape, nose size, and jaw profile

Answers

Answer: Snap-chat

Explanation:

is a social media platform application developed for mainly sharing of photos with the use of some special filters which are able alter how the person looks. examples of such filters are filters that alter the user's face, smoothing and whitening the users skin, changes the eye shape of the user, alters the nose size and jaw profile of the individual using the app. Snap chat has become a photo favorite for many young people today and celebrities alike.

witch of the following might cause you to flash the Bios/UEFi​

Answers

Answer:

This bios is to perform the access the Ram, video settings and modify settings.

Explanation:

This bios is to contain the section is to explain the motherboard are known as the Bios and to access the modify setting to the processor.

Bios is to contain that basic input and output system of the component and system bios to the recent interface is contain to the boot .Bios system perform it test as the video card, USB drives, to the components way to the operating system.Bios is perform to the change the bios setting and upgrade the bios settings, to interact the motherboard.Bios is to consist  to the built storage device, cards to the assembled by the bios program.Bios is to perform hard drives to the higher capacity and the faster system optimizations.Bios system is performed to the automatically to configure the system and also referred to the some system.Bios are to comes on the personal computer  system to the run into software to power on, this used in input/ output process.Bios is to provide the abstract layer system and display the interface to program on operating system.Bios is contain are the stored in a flash memory to remove the chip from that mother board system.

which statement compares the copy and cut commands?
1. only the copy command requires the highlighting text
2. only to cut command removes the text from the original document
3. only the cut command uses the paste command to complete the task
4. only the copy command is used to add text from a document to a new document

Answers

Answer:

only to cut command removes the text from the original document

Explanation:

To say that only the cut command removes the text from the original document implies that you can use the cut command on a text, let's say "a boy and girl" to remove the text on the original document where it was located to a new document or text box, in other words, the text "a boy and girl" would no longer be found in the original document.

However, the copy command would not remove the text from the original document.

Answer:

only the command removes the text from the original document.

Explanation:

just did it

You have just used a command that produced some interesting output on the screen. You would like to save that information into a file named "interesting.txt", which does not currently exist. You can do this by issuing the same command, but appending which of the following?
A. > interesting.txt
B.
C. interesting.txt
D. | interesting.txt

Answers

Answer: A. > interesting.txt

Explanation: From the command line, one can perform numerous tasks from navigating into a directory, creating a new directory, deleting files, create files, modify files and so on using simple commands. In the scenario above, after using a common which is used to produce an output on the screen, such as the 'echo' command, one may wish to save the file giving the user the ability to access the file later. Since it is stated the file name 'interesting.txt' given to the file does not currently exist, appending the sign > saves the file. If the filename already exists, it will overwrite the existing content.

Security problems with master keys include (mark all that apply): Master keys are easier to copy than other keys. Master keying reduces the number of useful combinations. Locks that have the master pins needed for master keys are easier to pick. Unauthorized master keys will permit access to any lock in the series.

Answers

Answer:

- Master keys are easier to copy than other keys.

- Unauthorized master keys will permit access to any lock in the series.

Explanation:

This is the sad reality when an individual who's unauthorized gains access to a master key, then, he may be permitted access to any lock in the series.

Also, rather trying to copy other keys, it will be far easier to copy just one key– the master key.

If I execute the expression x <- 4L in R, what is the class of the object `x' as determined by the `class()' function?

Answers

Answer:

integer

Explanation:

The expression can be implemented as follows:

x <- 4L

class(x)

Here x is the object. When this expression is executed in R, the class "integer" of object 'x' is determined by the class() function. R objects for example x in this example have a class attribute determines the names of the classes from which the object inherits. The output of the above expression is:

"integer"

Here function class prints the vector of names of class i.e. integer that x inherits from. In order to declare an integer, L suffix is appended to it. Basically integer is a subset of numeric. If L suffix is not appended then x<-4 gives the output "numeric". Integers in R are identified by the suffix L while all other numbers are of class numeric independent of their value.

Assume that the variables v, w, x, y, and z are stored in memory locations 200, 201, 202, 203, and 204, respectively.
Using any of the machine language instructions in
Section 5.2.4, translate the following algorithmic operations into their machine language equivalents.
a. Set v to the value of x – y + z. (Assume the existence of the machine language command SUBTRACT X, Y, Z that computes CON(Z) = CON(X) – CON(Y).)
b. Set v to the value (w + x ) - ( y + z)
c. If (v ≥?w) then
set x to y Else set x to z
d. While y < z do
Set y to the value ( y + w + z)
Set z to the value (z + v)
End of the loop

Answers

Answer and Explanation:

A. To translate the above algorithm to machine language, we first assign have to perform the first part of the operation which is x-y and set the value to the v variable. The x, y and v values are stored in memory location 202, 203 and 200 respectively.

The z value in the memory location 204 is then added to the v value in memory location 200. The first code sequence is stored in memory location 50 and the second code sequence to achieve x+y-z stored in v is stored in memory location 51(as asummed in question)

B. In the second algorithm, we add value in w which is in memory location 201 to value in x in memory location 202 and assign the result to v in memory location 200. The same is done for y+z in memory locations 203 and 204 respectively with result stored in w. We then subtract the values in v in memory location 200 from w and assign the value to v in memory location 200

C. in the first memory location 50, the code sequence v compared to w is stored. If v(stored in memory location 201)is greater than or equal to w(in memory location 202), it moves to address 54 and assigns the y value to x in memory locations 203 and 202 respectively else it assigns z valuein memory 204 to x value in 202 and jumps to next instruction

D. In this algorithm, it first compares y and z in memory locations 203 and 204 respectively in the first code sequence memory 50. In 51, it checks to see if the condition is satisfied and if it is, it jumps to address 53 and adds y and w in their various memory locations and stores it in memory 203 in y otherwise it moves to address 57. Now to get y+w+z, It then adds y +w in memory location 203 in y to z in memory location 204 and then stores the result in y. Subsequently it adds the z value to v and stores the result in v and moves to address 50 where it compares a new set of value as in a loop in the algorithm which continues till the "while" condition can no longer be satisfied.

cpp g Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards, then backwards. End each loop with a newline. Ex: If courseGrades

Answers

Answer:

lol don't ask people to write code for you

assuming its an array, n is size.

normally:

for(int ele: courseGrades){

cout << ele <<" ";

}

cout << endl;

reverse:

reverse(courseGrades, courseGrades + n);

for(int ele: courseGrades){

cout << ele <<" ";

}

cout << endl;

Who should perform the validation test, the software developer or the software user?

Answers

The software user, it is to verify the user not the developer, obviously there are some cases where the developer must verify themselves but that occasion is very far in between

Hope this helps ♥︎

there are primarily three methods of programming in use today: procedural, recursive, and object oriented true or false

Answers

Answer:

False.

Explanation:

In Computer programming, there are primarily two (2) methods of programming in use today:

1. Procedural programming: it is an early form of programming (coding) in which software developers make use of a top to down approach in instructing the computer on what actions to take through logical or step-by-step processes. This top-down approach is known as an inline programming, it basically involves calling a procedure such as functions, routines or sub-routines. Some examples of a procedural programming language are Java, Pascal, C, BASIC and FORTRAN.

2. Object-oriented programming (OOP): it is a high level programming language which is based on creating objects that comprises of data (fields) and code (procedures). This procedure includes a method while the data that makes up the object is generally referred to as fields and includes arrays, variables, class etc. Some examples of object-oriented programming language are Python, Ruby, Raku, Java, C++ etc.

Generally, in computer programming a procedural programming is primarily based on creating procedures while an object-oriented programming is based on the creation of objects.

Computer science;
What is an Algorithm? B: Mention five attributes of a properly prepared Algorithm. C: The roots of a quadratic equation ax2+b×+c=0 can be gotten using the almighty formular Using a properly designed algorithm, write a pseudocode and draw a flowchart to take quadratic equation coefficients as input and calculate their roots using the almighty formular, and display result according to value of the discriminant d, d=square root b rest to power 2 minus 4ac, i.e when d=o, when's o. Note when d

Answers

Answer:

Flowchart of an algorithm (Euclid's algorithm) for calculating the greatest common divisor (g.c.d.) of two numbers a and b in locations named A and B. The algorithm proceeds by successive subtractions in two loops: IF the test B ≥ A yields "yes" or "true" (more accurately, the number b in location B is greater than or equal to the number a in location A) THEN, the algorithm specifies B ← B − A (meaning the number b − a replaces the old b). Similarly, IF A > B, THEN A ← A − B. The process terminates when (the contents of) B is 0, yielding the g.c.d. in A. (Algorithm derived from Scott 2009:13; symbols and drawing style from Tausworthe 1977).

Explanation:

Flowchart of an algorithm (Euclid's algorithm) for calculating the greatest common divisor (g.c.d.) of two numbers a and b in locations named A and B. The algorithm proceeds by successive subtractions in two loops: IF the test B ≥ A yields "yes" or "true" (more accurately, the number b in location B is greater than or equal to the number a in location A) THEN, the algorithm specifies B ← B − A (meaning the number b − a replaces the old b). Similarly, IF A > B, THEN A ← A − B. The process terminates when (the contents of) B is 0, yielding the g.c.d. in A. (Algorithm derived from Scott 2009:13; symbols and drawing style from Tausworthe 1977).

Digital certificates, smart cards, picture passwords, and biometrics are used to perform which of the following actions?

a. Integrity
b. Confidentiality
c. Authorization
d. Authentication

Answers

Answer:

d. Authentication.

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.

Companies expose themselves to harsh sanctions by federal agencies when they violate the privacy policies that their customers rely upon.

a. True
b. False

Answers

Answer:

True

Explanation:

A privacy policy is a legal document or statement that discloses the ways a party gathers uses and manages a customer's data. These data include personal information such as address, name, financial records, medical history, travel records etc.

Policies such as the Children Online Privacy Protection Act which protects children on websites collecting children's data, the Gram-Leach-Bliley Act, The Health Insurance Portability and Accountability Act, are in place to ensure that privacy is protected and sanctions are metted out to violating companies.

People from this cultural group are more tolerant to new ideas and opinions that differ from their own
A) North Americans
B) People with low uncertainty avoidance
C) None of these
D) People with high uncertainty avoidance

Answers

Answer:

B) People with low uncertainty avoidance

Explanation:

Uncertainty avoidance is how cultures differ on the amount of tolerance they have of unpredictability. Mostly, uncertainty avoidance deals with technology, law, and religion. People with low uncertainty avoidance cultures accept and feel comfortable in unstructured situations or changeable environments and  tend to be more pragmatic and more tolerant of change. People in cultures with high uncertainty avoidance try to minimize the occurrence of unknown and unusual circumstances.

Describe conceptually how an sql retrieval query will be executed by specifying the conceptual order of executing each of the six clauses

Answers

Answer:

Answered below

Explanation:

An SQL retrieval query contains six clauses which are executed in an orderly sequence. These clauses include; SELECT, FROM, WHERE, GROUP BY, HAVING and ORDER BY.

The select clause enables us specify the data we want to retrieve. This statement is the starting point of SQL queries.

The FROM statement comes second and specifies the table the data is being retrieved from.

The WHERE clause helps us limit the data to those that meet a particular condition.

The GROUP BY statement helps group your information in a more meaningful way.

The HAVING clause puts a condition on your group.

The ORDER BY statement orders your information in descending order or ascending order.

What command would you use to display the disk usage in human readable format of a directory named test3. Assume this directory is right under your home directory and you are executing this command from your home directory.

Answers

Explanation:

if we use the above command with -h then this will show the result in human readable format.

df -h

Ex: df -h test3     (The command as asked in the question)

So the above command is showing the disk status in Gigabyte format.

Try the same command in your system. If directory test 3 is not present then create a new one with mkdir command.

Which part(s) of CAIN is realized through the use of message digest functions and hashes?

Answers

Answer:

Integrity

Explanation:

In CAIN, integrity is realized through the use of message digest functions and hashes.

Integrity in CAIN simply means securing a message on transit without it being tampered. To accomplish and achieve integrity, hash functions are used. These hash functions receive arbitrary length message and bring out a fixed sized message digest.

The message digest and hash function maps input data of arbitrary length to an output fixed data length. Hashing is used to guarantee integrity.

a database of the virus is called____​

Answers

Answer:

I believe it is poisoning I could be wrong

What type of job involves working at client locations and the ability to work with little direct supervision?

a. field-based

b. project-based

c. office-based

d. home-based

Answers

Answer:

A

Explanation:

Consider two decision problems X and Y. If X reduces in polynomial time to 3-SAT and 3-SAT reduces in polynomial time to Y. Which of the following can be inferred from the previous statement?

a. X is in NP and Y is in NP-Hard.
b. Y is in NP and X is in NP-Hard.
c. Both X and Y are in NP-hard.
d. Both X and Y are in NP.

Answers

Answer:

X is in NP and Y is in NP-HARD ( A )

Explanation:

X is in NP and Y is in NP-HARD can be inferred from the previous statement made in the problem above because  problem decision X  can be in NP if it can BE reducible to a 3-SAT polynomial real time, if that can be achieved then  3SAT will be in NP since SAT is in NP as well.

also problem decision Y  can be in NP-HARD if 3SAT can be reducible to it in polynomial time as well hence option A is the correct option

write a function that given an integer Y and 3 non-empty string A,B,W, denotingthe year of vacations, the beginning month, the end month and the day of the week for 1st January of that year

Answers

Answer:un spain please

Explanation:

4. Write a script called lineCounter that accepts a filename as a command line argument. It should run through the file line by line, displaying a character count for each line. The script should include a line counter, which records the line number, and is incremented when each line is processed.

Answers

Answer:

from sys import argv

script, filename = argv

with open( filename ) as file:

      line_counter = 0

       while True:

               extract_line = file.readlines( )

               line_counter += 1

               character_count = extract_line.count( )

               print( " line number: { } , character count: { }". format( line_counter, character_counter )

         print ( " Nothing left to count" )

         file.close( )  

Explanation:

The 'argv' is a module in the python system package, which allows for user input and script execution in the command. It loads the script and the file as a tuple which is offloaded in the script like arguments in a function.

Other Questions
If one were to argue that World War II was the most prolific time for agricultural research and development, which of the following statements would best defend this assertion? If the toxic quantity is 1.5 gg of ethylene glycol per 1000 gg of body mass, what percentage of ethylene glycol is fatal The estimated direct labor cost for February is closest to: Multiple Choice $456,000 $28,652 $253,460 $658,996 ii) The distance travelled by an object in time(100 + 1) s is (5.2 + 0.1) m. What is thespeed and it's error?Ans: 0.052 ms-l, + 0.029 ms' write five to ten sentnces reason why people migrate in the past and now "Institutional portfolio managers have been allocating an increasing percentage of their funds to cash and cash equivalent positions. This is an indication that their market sentiment is:" What is the official language of Oceania?NewspeakNewglishNewlangNewtalk I am in confusion Which of the following values of x satisfy the equationbegin equation . . . 2 times x raised to the second power, plus 7 times x, plus 3 . . . equals 0 . . . end equation? What is NOT a major purpose of orientation and socialization? Reducing stress and anxiety Reducing employee benefits Reducing start-up costs Reducing employee turnover list the parts that make up a human body what's the square root of 57? The chart lists organisms in five different categories living near the Texas Gulf Coast.Organisms Living Near the Texas Gulf CoastVegetationMammalsInvertebratesFishBirds Algae Willow oaks River otter Coyotes Shrimp Mosquitoes Red drumPygmysurfish. Laughinggulls Wood ducksBased on the chart, which food chain best models a flow of energy in this ecosystem? Discuss each of the 4 influences on your wellness Rafael se ha convertido en un experto de la computadora. ste es un comentario que hacen sus padres. Completa el texto con elpretrito perfecto de los verbos de la lista.aprenderayudarbeneficiarconocerconseguircrearenseargrabar informacin1. Rafael (1)_____rpidamente a trabajar en su computadora. Conectado a Internet (2)______para hacer sus tareas escolares y (3)________a su hermana con las suyas. Tambin nosotros nos (4)______con su conocimiento de interesantes sitios web. Rafael tiene ms amigos gracias a la red e incluso (5)_______a conectarnos con el mundo.personas de distintos pases. Nuestro hijo nos (6)_______ When two different bacterium species are used to produce pest-resistant Bt plants, one bacteria naturally produces the pest-killing toxin and the second bacteria is used to ______. A mountaineer shouts for help Half a second later (0.5 she hears the echo How far away is the rock face which is reflecting her voice (take the speed of sound to be 330 m/s Among the four northwestern states, Washington has 51% of the total population, Oregon has 30%, Idaho has 11%, and Montana has 8%. A market researcher selects a sample of 1000 subjects, with 450 in Washington, 340 in Oregon, 150 in Idaho, and 60 in Montana. At the 0.05 significance level, test the claim that the sample of 100 subjects has a distribution that agrees with the distribution of state populations. Military members may be subject to dis-honorable discharge for unauthorized disclosure.A. TrueB. False PLEASE HELP ASAP BRAINLIEST FOR WHOEVER ANSWERS CORRECTLY!!!!!!!!!!!!(4) However, I did not receive the prepaid envelope with my new phone. (5) I contacted the customer service department twice, once on September 28 and again on October 2 to have them send me a prepaid envelope. (6) As a result, I received two more shipments that contained the same thing: instructions on how to send the defective phone back. (7) However, neither shipment contained the prepaid envelope that I was supposed to receive.(8) Alas, I called the customer service department again on October 10. (9) The manager who I spoke with told me that the shipping label used by Chit Chat Inc. to ship the new phone included round-trip postage. (10) Although doubtful, I tried to schedule a pickup on the Central Parcel Service site. (11) As I expected, the tracking numbers were invalid. (12) There is no such thing as a round-trip shipping label.(13) Having failed with the first manager, another manager with whom I spoke ordered the prepaid envelope without hesitation. (14) However, she could not guarantee that the warehouse would actually send it. (15) She added that she had no control over the warehouse. (16) On October 12, I received yet another package with instructions but no prepaid envelope.Which sentence contains incorrect pronoun usage? A. sentence 12 B. sentence 9 C. sentence 4 D. sentence 16