Hanna wants to grant temporary folder access to few workstations at her workplace. She wants to prevent the workstations from accessing the internal files. Which file permission she should assign? A. Read B. List folder content C. Read & Execute D. Write

Answers

Answer 1
Answer: B. List folder content.

Explanation:

Hanna should assign the "List folder content" permission to the workstations. This will allow the workstations to view the names of files and folders within the directory but prevent them from accessing the internal files, reading or writing their contents, or executing any files.

In summary:

A. Read - Allows reading the contents of files.
B. List folder content - Allows viewing the names of files and folders within the directory.
C. Read & Execute - Allows reading and executing files.
D. Write - Allows creating new files or modifying existing ones.

For Hanna's use case, the correct answer is B. List folder content.

Related Questions

Select the correct text in the n passage.
Pick the correct characteristics that define the matting process.
Matting uses a front or window mat to separate the print fro the glass of the frame and to add an extra border around the photo. It is the
final step in displaying the photo. it provides breathing space around the print and guides the viewer to focus on the Image. also gives › solid
backing to the photo. Matting tends to hold the print In place if it is loose-mounted. it provides a decorative edge to the print and Includes a
mechanism to hang the photo.
Reset
Next
ghts reserved.

Answers

The correct text in the passage that defines the matting process is it provides a decorative edge to the print and includes a mechanism to hang the photo.

What is matting in compositing?

The  Matting and compositing are known to be some key operations in graphics.

In the matting process, a background element that has arbitrary shape is known to be extracted from a background image.

Hence, The correct text in the passage that defines the matting process is it provides a decorative edge to the print and includes a mechanism to hang the photo.

Learn more about Matting from

https://brainly.com/question/26875233

#SPJ1

Becky is preparing a document for her environmental studies project. She wants to check her document for spelling and grammar errors. Which function key command should she use?

A.

F1

B.

F2

C.

F5

D.

F7

E.

F12

Becky is preparing a document for her environmental studies project. She wants to check her document

Answers

According to what I know, I think it is F7.

Hoá học 9 giải hộ mềnh vơiz:))

Ho hc 9 gii h mnh viz:))
Ho hc 9 gii h mnh viz:))
Ho hc 9 gii h mnh viz:))

Answers

Answer:

sorry di ko alam

what is application software?

Answers

Answer:

In information technology, an application ( app ), application program or application software is a computer program designed to help people perform an activity. Depending on the activity for which it was designed, an application can manipulate text, numbers, audio, graphics, and a combination of these elements.

Answer:

A set of programs that are used to solve particular problems of the user through computer is called application software.

A database opened in ________ mode allows only one user at a time the ability to open and edit the database

Answers

Answer:

A database opened in exclusive mode allows only one user at a time the ability to open and edit the database.

You are in a group of five people whose small airplane crashed and
now you are stranded on a deserted tropical island for 24 hours. The
safety island is 3 miles away and can not be reached by walking.
Limited supplies from the plane have washed ashore(a flashlight, 2
bottles of water, a sheet, the tail of the plane, a bottle of perfume,
a ball of string, and a knife). Flora(plants/vegetation) and
fauna(animals) exist on the island.
1. You must use all of the supplies
2. Think of the "what if" issues: ex. How will your group
protect themselves from the animals? How can you reach
the safety island? How will your group eat? The sea
contains salt water, etc.

Answers

First and foremost, it's important to prioritize survival and safety in this situation.

What are the necessary steps?

Here are some steps that the group could take using the available supplies:

Using the knife and ball of string, construct a shelter that can protect the group from the elements and provide a place to sleep. The sheet can be used as a roof or to create walls, and the tail of the plane can be used for support.

With the flashlight and knife, explore the island to find a fresh water source. If one is not found, the group can ration the two bottles of water until they can be rescued.

Use the knife and ball of string to create weapons and tools for protection and gathering food. The perfume can be used as a deterrent for some animals.

If there is no source of fresh water on the island, the group can use the ball of string and sheet to create a solar still to purify salt water from the sea.

Finally, the group can work together to come up with a plan to safely make their way to the safety island. This may involve using the tail of the plane as a makeshift raft, or building a larger boat using materials found on the island.

To protect themselves from animals, the group can create weapons and tools using the knife and ball of string.

Learn more about word problem on;

https://brainly.com/question/21405634

#SPJ1

What are the key differences between the IT operations for a large company (ex. Boeing, Ford, Proctor & Gamble, etc) and the IT operations for a small company (ex. O'fallon Brewery, AAA plumbing services, Mississippi Valley Roofing, etc) Why are there differences? Are there differences in the use of information?

Answers

The key differences between IT operations for large companies and small companies lie in the scale, complexity, and resources involved. Large companies like Boeing, Ford, and Proctor & Gamble typically have more extensive IT operations compared to small companies like O'fallon Brewery, AAA plumbing services, and Mississippi Valley Roofing.

Large companies often have complex IT infrastructures with multiple departments, extensive networks, and a higher volume of data. They require dedicated IT teams to manage and maintain these systems. On the other hand, small companies usually have simpler IT setups with fewer employees and a smaller scope of operations.
The differences in IT operations arise due to various factors such as budget, organizational structure, and business requirements. Large companies have larger budgets to invest in advanced technologies, sophisticated software, and hardware infrastructure. They may also have dedicated IT departments with specialized personnel for different tasks such as network management, cybersecurity, and system administration.

Small companies, in contrast, may have limited budgets for IT operations and often rely on outsourcing or employing a smaller IT team. They may prioritize cost-effective solutions and use off-the-shelf software and hardware. Small companies might also have less complex IT needs and can rely on simpler information management systems.
In terms of information use, both large and small companies rely on data for decision-making and business operations. However, the types and volumes of information may vary. Large companies often have a wider range of data sources, including customer data, supply chain information, and market analytics. Small companies may have a more focused set of information, such as customer records and financial data.

To know more about IT  refer for:

https://brainly.com/question/12947584

#SPJ11

PLZ HELP What is the problem with this program?

name = "Jenny"

name = input("What is your name?")

A.
the variable name has to begin with a capital letter

B.
input should be output

C.
the first line should be omitted because the second line defines the variable

D.
the variable needs to begin with a number to distinguish it from other variables

Answers

Answer:

B

Explanation:

the answer is B imput should be output

Answer: I think the answer is (C)

I'm doing the exam rn and that what i think

Explanation:

please answer i will give you brainelst!!!!!!!!!!

please answer i will give you brainelst!!!!!!!!!!

Answers

Answer:

I think it's D

Explanation:

Hope you don't get it wrong

There are 3 types of tickets, sorted by their price in ascending order. 1. AB for travel in and between zones

A

and

B

only; 2.

BC

for travel in and between zones

B

and

C

only; 3.

ABC

for travel in and between any zones

−A

and

B

and

C
. You are given 3 arrays of strings stationsA, stationsB , and stationsc , which contain the names of stations in that particular zone. You are also given 2 strings origin and destination, which contain names of the starting and ending station for a trip. Your task is to return a string with the name of the cheapest ticket that will allow you to get from the origin station to destination station. If the origin station or the destination station doesn't exist in any of the zones, return an empty string. Note: You can assume that a direct route always exists. E. G. , if you need to go from zone A to zone B, you shouldn't go via zone C. Example - For stationsA = ["Green Park", "Holborn"], stationsB = ["Mile End", "Bow Road"], stationsC

=

["Forest Hill", "Balham"] origin = "Forest Hill", and destination = "Green Park", the output should be solution (stationsA, stationsB, stationsC, origin, destination)

=

"ABC". Explanation: "Forest Hill" is to zone

C

and is in zone

A

, so only the

ABC

ticket would allow you to travel between them. - For stationsA = ["Green Park", "Holborn"], ["Mile End", "Bow Road"] , stationsC

=

["Forest Hill", "Balham"], origin = "Holborn", and destination = "Green Park" , the output should be solution (stationsA, stationsB, stationsC, origin, destination) = "AB". Explanation: Both "Holborn" and "Green Park" are in zone A,

Answers

So the cheapest ticket that would allow you to travel between them is the AB ticket.

What is travel?

Travel is the act of moving from one place to another, for any purpose. It can be for leisure, business, educational, religious, or medical reasons. It can be a short or long journey, and can involve the use of various modes of transportation such as a car, plane, train, boat, or motorbike. Traveling can provide a sense of adventure and exploration, and can be a great way to learn about different cultures and lifestyles. It can also be a great way to relax and recharge, by exploring beautiful landscapes and discovering new places. Traveling can be a great way to make memories, build relationships, and create lasting experiences. It can also be a great way to gain perspective on life, and gain the courage to take on new adventures.

To learn more about travel

https://brainly.com/question/29484548

#SPJ1

30 points for this.
Any the most secret proxy server sites like “math.renaissance-go . Tk”?

Answers

No, there are no most secret proxy server sites like “math.renaissance-go . Tk”

What is proxy server sites

A proxy server functions as a mediator, linking a client device (such as a computer or smartphone) to the internet.  Sites operating as proxy servers, otherwise referred to as proxy websites or services, allow users to gain access to the internet using a proxy server.

By utilizing a proxy server site, your online activities are directed through the intermediary server before ultimately reaching your intended destination on the web.

Learn more about   proxy server sites from

https://brainly.com/question/30785039

#SPJ1

A grade 8 girl types her age as 18 years old as to gain access to a certain website. Is this statement ethical or unethical? Give atleast 2 reasons for both options.

Answers

Answer:

The answer is ethical.

Explanation:

Because first off she is lying about her age and second apparently she is too young to get in the website.

Which of the following statements about RAID is correct? Group of answer choices All RAID configurations provide fault tolerance for up to one disk failure A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration RAID 5 allows up to two disk failures During a RAID 5 disk failure, read performance is not impacted A RAID 1 configuration of four 1TB disks has a storage capacity of 2TB

Answers

Answer:

A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration

Explanation:

Redundant Array of Independent Disks(RAID) are multiple physical drives arranged in logical units to provide data redundancy and increased performance. They are

RAID 1 configuration duplicates data storage, albeit of lower performance than RAID 0. Also called disk mirroring because it mirrors data on two or more disks, it provides at least two drives that are used interchangeably or together.

A RAID 1 is the configuration of the 4 disks that has higher storage capacity than a RAID 0 configuration. This option A is correct.

What is the RAID ?

The RAID is a redundant array of the inexpensive disks and refers to the storage visualization technology that combines multiple physical disk drives. Its contract with earlies highly reliable mainframe disk drives.

The RAID one needs mini of two physical drives as the data is given simultaneously in two places. These drives are mirror images as ne fails the other can take over.

Find out more information about the RAID.

brainly.com/question/26980060.

Does technology make us lazy? Explain. (Remember to support your
answer with citations and references)

Answers

The impact of technology on human laziness is a topic that has been widely debated and it is true to some extent.

Does technology make us lazy?

Some argue it makes us lazy, while others say it can enhance productivity and efficiency.

Argument - technology makes us lazy. Advocates claim tech's conveniences can promote inactivity and a sedentary lifestyle. Tasks once done by hand can now be completed with machines, leading to possible over-reliance on technology and less physical activity, which causes health issues.

Tech improves productivity and efficiency.  Tech revolutionized communication, info access, & task automation, enabling more accomplishment in less time.

Learn more about  technology  from

https://brainly.com/question/7788080

#SPJ1


What kind of file is this? What is it used for? Describe a situation where you might want to create
this type of file.

Answers

What is the file called u gave a blank statement

What kind of file is this? What is it used for? Describe a situation where you might want to create
this type of file.

This statement uses the value of a variable or expression to determine where the program will branch to. A) switch. B) select. C) associative. D) scope

Answers

The statement that uses the value of a variable or expression to determine where the program will branch to is called a "switch" statement.

Explanation:

1. A switch statement is a programming construct that allows a program to execute different code blocks based on the value of a variable or expression.

2. The switch statement evaluates the value of the expression or variable and compares it to a list of possible values called "cases".

3. When a match is found, the program executes the code block associated with that case and then exits the switch statement.

4. The switch statement is commonly used in situations where a program needs to make a decision based on a user's input or the value of a variable.

5. In contrast, a select statement is not a commonly used programming construct, and it is not directly related to branching in a program.

6. An associative statement is also not a commonly used programming construct, and it is not related to branching in a program at all.

7. Finally, scope refers to the visibility and accessibility of variables and functions in a program, but it is not directly related to branching in a program.

Know more about the switch statement click here:

https://brainly.com/question/30396323

#SPJ11

True or False: Visual Studio is not a part of Unity. You could use a different code editor to edit your C# scripts if you wanted to.

Answers

Answer:

True

Explanation:

Visual Studio and Unity are two different things. Visual Studio is an IDE developed by Microsoft, and Unity is a game engine developed by another company. Visual Studio is the default editor in Unity, but you are able to use something different.

Source: https://docs.unity3d.com/Manual/ScriptingToolsIDEs.html

There are different kinds of true statement.  Visual Studio is not a part of Unity is a true statement.

Is Visual Studio a part of Unity?Visual Studio is known to for  Mac Tools and also for Unity is said to be part of  the installation of Visual Studio for Mac.

You can verify the type of Visual Studio differs for Mac and other product.

Learn more about Visual Studio from

https://brainly.com/question/4925305

what if you accidentally delete your browser history

Answers

Answer:

Nothing is ever deleted on a computer. Even though delete functions exist the data still remains somewhere in the computer, whether on the hard drive or in obscure files tucked away deep in the operating system. Recovering deleted internet history is quite straightforward if you know what you're doing.

Show an example of a DHCP packet with a padding option.

4. Show an example of a DHCP packet with an end-of-list option.

5. What is the maximum number of seconds that can be stored in the Number of Seconds field of a DHCP packet?

Answers

The above looks at an example of a DHCP packet with a padding option among other related concepts.

How is this so?

Example of a DHCP packet with a padding option

DHCP Packet -

- Message Type   -  Discover

- Client IP Address   -  0.0.0.0

- Options   -

- Option 53   -  DHCP Message Type (Discover)

- Option 0   -  Padding (0x00)

Example of a DHCP packet with an end-of-list option -

DHCP Packet   -

- Message Type   -  Offer

- Client IP Address  -  192.168.1.10

- Options   -

- Option 53   -  DHCP Message Type (Offer)

- Option 255   -  End-of-List (0xFF)

The maximum number of seconds that can be stored in the Number of Seconds field of a DHCP packet is 65535 seconds.

Learn more about DHCP  at:

https://brainly.com/question/10097408

#SPJ4


What is the difference between an entity type and an entity
instance?
Please give an example of entity attribute and relationship
attribute.

Answers

1) Entity Type: Represents a category or class of similar objects/entities. Example: "Customer."

2) Entity Instance: Specific occurrence or individual object belonging to an entity type. Example: "John Smith" (a customer).

3) Entity Attribute: Characteristic or property that describes an entity. Example: "Name," "Age," "Address" (attributes of a customer entity).

1. Entity Type: An entity type represents a collection or category of similar objects or entities that share common characteristics. It is a blueprint or template that defines the structure and properties of entities belonging to that category. An entity type is defined by its attributes, which describe the properties or characteristics of the entities within that type. It represents the general concept or class of objects.

Example: In a database for a university, the "Student" entity type represents all the individual students. It would have attributes like student ID, name, date of birth, and contact information.

2. Entity Instance: An entity instance, also known as an entity occurrence or simply an entity, is a specific occurrence or individual object within an entity type. It represents a unique, identifiable entity that conforms to the structure and properties defined by its entity type. Each entity instance has its own set of attribute values, which differentiate it from other instances of the same entity type.

Example: Continuing with the university database example, an entity instance of the "Student" entity type would be a specific student, such as John Smith, with a unique student ID, name, date of birth, and contact information.

Entity Attribute: An entity attribute is a characteristic or property that describes an entity. It provides specific details or information about an entity instance. Attributes are used to define the structure and properties of an entity type. For example, in the "Student" entity type, attributes could include student ID, name, date of birth, and contact information.

Relationship Attribute: A relationship attribute, also known as a relationship property or role, is an attribute associated with the relationship between two entities. It describes the characteristics or properties of the relationship itself, rather than the entities involved. For example, in a database modeling the relationship between a "Student" entity and a "Course" entity, a relationship attribute could be the student's enrollment date in the course or their grade in the course.

learn more about database here:

https://brainly.com/question/6447559

#SPJ11

which of the following best explains why the computearea method will cause a compilation error?

Answers

The correct answer is Which of the following describes the compile error that the compute Area method will result in the best The declaration of local variables used inside a method is prohibited.

The surface of a shape's area is measured. You must multiply the length and breadth of a rectangle or square in order to determine its area. A has an area of x times y. Calculate the size of this square. How are land areas determined? Any unit of measurement can be used to compute a piece of land's area. The initial measurement of the land is its length and breadth, and the findings are multiplied. The area of the land is calculated as the product of the length and breadth of the land. Describe Area. The region that an object's shape defines as its area.

To learn more about compute Area click on the link below:

brainly.com/question/25554674

#SPJ4

Which two configuration steps are required before quick actions can be used in macros?

Answers

The two configuration steps are required before quick actions can be used in macros are:

B . Quick Actions must be enabled in the org.

C . The specific quick action must be added to the case Feed.

What is Computer configuration?

In regards to communications or the use of computer systems, a configuration of a system is known to be a term that connote a kind of an arrangement  or setting of all of its functional units.

It is one that is known to be based to their nature, number as well as main chief characteristics.

Therefore, The two configuration steps are required before quick actions can be used in macros are:

B . Quick Actions must be enabled in the org.

C . The specific quick action must be added to the case Feed.

Learn more about configuration from

https://brainly.com/question/13484609
#SPJ1

October 6, 2021examsLeave a commentPost navigation

Which two configuration steps are required before quick actions can be used in Macros?

A . Global Actions needs on the publisher layout.

B . Quick Actions must be enabled in the org.

C . The specific quick action must be added to the case Feed.

D . The specific quick action must be added to the case record Type.

You need a collection to represent secret agents. Every agent has a unique codename that identifies them, and an Agent object that represents them. The best collection for this would be

Answers

Answer:

A  HashMap< String, Agent >

is a best collection for this

Explanation:

Collection is basically a framework that is used in order to perform operations on data and to store and manipulate objects.

HashMap is a Map based collection where Map is a data structure of interface which allows the key and value pairs mapping and HashMap is a collection class used to store these key-value pairs of data.

The syntax is:

HashMap<key, value>

So in  HashMap< String, Agent > statement the String is used to store the codename for every agent and Agent is an object that represents each agent. So this is represented as key-value pair using HashMap.

Jordan just wrote a secret message program in Python that converts the number 7,095 to 1s and 0s. Which number system is Jordan converting to?

A Binary
B Decimal
C Digital
D Hexadecimal

Answers

Answer:

binary

Explanation:

bi-two numbers doesnt meet reqiurments automatically considered 0

Answer:

Binary

Explanation:

i took the test

What is misleading about the term “overdraft protection”?

Answers

Answer:

it makes it sound beneficial but it will take money from you.

With overdraft protection, if you don't have enough money in your checking account, checks will clear and ATM and debit card transactions will still go through. If you don't have enough overdraft protection to cover a shortfall, transactions won't go through, and fees may be high.

The thing which is misleading about the term “overdraft protection” is it sounds beneficial but does not provide protection to the user.

What is an overdraft?

When an account reaches zero, a bank will provide the customer money through an overdraft to cover taxes and other expenditures called overdrafts. This loan amount is provided to customers at a certain charge.

The term "overdraft protection" is misleading because it does not prevent you from paying it back rather it only permits you to do so when your bank account is insufficient to cover the outstanding balance so that you won't look foolish if your card is rejected.

It means that the amount is just provided as a loan on a certain charge not as a free amount as benefits to the customer. In the end, customers have to pay back the withdrawn amount.

Learn more about Overdraft, here:

https://brainly.com/question/1739416

#SPJ6

Is there any router that you can just buy that provides a internet service and don't have to pay for monthly subscriptions?

Answers

There is no router that provides a internet service to end users without them having to pay for monthly or yearly subscriptions.

What is a router?

A router can be defined as a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.

What is wi-fi?

Wi-Fi can be defined as a wireless network technology that is designed and developed to avail end users and network devices such as computer systems, mobile devices, router and switches, to communicate with one another over the Internet or through an active network connection.

In conclusion, there is no router that provides a internet service to end users without them having to pay for monthly or yearly subscriptions because this is the fee charged by an internet service provider (ISP) for data plans.

Read more on router here: brainly.com/question/24812743

#SPJ1

3.5 code practice python

Answers

Answer: This chapter is about variables in Python. So a variable can be any data type. And to find the datatype of a variable we need to use below code: x =10 print (type (x)) This will output: integer Now we can covert a string into integer as below:x=input("Enter X:")But above x is considered as string, and we need to convert it to integer to make use in for loop or any calculation.we can use:int(x), and this will convert x to int from string.Also, we have operators to change the variable values like =. +=, -=, /=, *= etc. So you need to remember these, and you will be up with all that is required for understanding variables. And rest is self explanatory certainly.

Explanation:

The answer is self explanatory

option 1: untangle a knot you see in the world. option 2: if you had a time machine and could go back in time or into the future for a day, where/when would you go, what would you do, and why?

Answers

Option 1: This could involve anything from a twisted shoelace or a complicated knot in a piece of rope.

Option 2: I would choose to go back in time to the year of the first moon landing.

How to entangle a knot?

The best way to untangle a knot is to start by gently pulling on one of the ends of the knot. This will allow you to see how the knot is structured and how it is tied. Once you have an idea of what the knot looks like, you can use your hands to gently pull apart the individual strands of the knot. Once you have separated the strands, you can carefully use a pair of scissors to cut the knot. Be sure to cut the knot carefully and evenly so that it does not create any new knots. After cutting the knot, you can then use your hands to gently separate the strands of the knot until it is completely untangled.

To learn more about time machine refer to:

https://brainly.com/question/27973693

#SPJ4

Can you see who tries to access a password-protected file, but does not put in the password?

Answers

I belive you can not see who did however I may be wrong

Yes/no

Explanation:

Depending on the person.

Yes, if your cousins,parents,etc have opened it.

No, if people like hackers have done it.

what is the u.s. federal government standard for digital signatures?

Answers

The U.S. federal government standard for digital signatures is defined by the Electronic Signatures in Global and National Commerce (ESIGN) Act and the Uniform Electronic Transactions Act (UETA). These laws establish the legal validity of electronic signatures in interstate and electronic commerce transactions.

Here are the key points of the U.S. federal government standard for digital signatures:
1. Consent: The signer must provide consent to use an electronic signature. This can be done through various means such as checking a box or typing their name.
2. Association: The electronic signature must be associated with the signer and the document being signed. This ensures that the signature cannot be easily copied or transferred to another document.
3. Integrity: The electronic signature must be tied to the document in such a way that any subsequent changes to the document are detectable. This ensures the integrity and authenticity of the document.
4. Reliability: The technology used to create the electronic signature must be reliable and secure, ensuring that the signature cannot be easily forged or tampered with.
5. Accessibility: The electronic signature process must be accessible to all parties involved, regardless of disabilities or technological limitations.
6. Audit Trail: There should be a record of the entire signing process, including the date and time of the signature, the IP address of the signer, and any other relevant information. This helps in verifying the authenticity of the signature if any disputes arise.
It's important to note that there are various technologies and platforms that can be used to meet the U.S. federal government standard for digital signatures, such as digital certificate-based solutions, biometric signatures, or secure electronic signature platforms.
By adhering to these standards, digital signatures provide a secure and legally recognized way to sign documents electronically, saving time, resources, and promoting efficiency in various sectors.

To learn more about Electronic Signatures
https://brainly.com/question/15020044
#SPJ11

Other Questions
Sage Company, a machinery dealer, leased manufacturing equipment to Mays Corporation on January 1, 2017. The lease is for a 7- year period and requires equal annual payments of $31,535 at the beginnin (20 POINTS PLEASE ANSWER QUICK) How does the Mandate of Heaven affect a persons right to rule? Careers and the Job MarketWhich fact from the passage does the table onpage 5 BEST support?Health care and assistance jobs will experiencegrowth by 2022Overall job growth will occur among smallbusinesses.The job market often seems like a strangelyweighted seesaw, with some jobs flying highand others sinking to the ground beforerebounding. A host of factors, includingtechnology, the economy, politics, and evengeography, affects this constant up anddown-and uneven-movement,No matter how unpredictable the job marketmay seem to the ordinary bystander, there isa science of forecasting the employmentfuture. It is often based on results fromsurveys that ask companies about their hiringpractices and projections. Among theemployment trends cited in one job marketforecast in 2015 were the ramping up of smallFarming and forestry jobs are expected to declineby 2022Software application careers require education andskills Each sales associate at an electronics store has a choice of the two salary options shown below:$115 per week plus 9.5% commission on the associates total sales$450 per week with no commissionThe average of the total sales amount for each associate last year was $125,000. Based on this average, what is the difference between the two salary options each year? (1 year = 52 weeks) PLEASE HELP!!!!! WORTH 40 POINTS Health promotion can occur on three different levels, namely, personal, social and physical development. compare how the three levels differ in terms of promoting health. 1.Kate and Moss get go to Mental clinic because of landslide Moss have a big problem on his knee and she can walk because of hurt and Kate have a bug problem too on her own face is it all ok?!2.the fireman didn't know how to open the Hoss he asking anyone but they didn't want to help he how to open the hoss?!3.A boy playing ball and the ball go to her moms garden the garden of her mom is a super favorite and he don't know how to make ok the garden how to make ok the garden??please help me!!I brainless you if your right answer delete if wrong:) Nitrogen combines with oxygen in the atmosphere during lightning flashes to form nitrogen monoxide, NO, which then reacts further with O2 to produce nitrogen dioxide, NO2. (a) What mass of NO2 is formed when NO reacts with 364 g O2? __ g (b) How many grams of NO are required to react with this amount of O2? the difference of 7 and the product of 4 and a is 11 the american idea for massive economic aid to europe after world war ii was called select one: a. the marshall plan. b. the triple alliance. c. nato. d. the triple entente. Plssssssssssss answer quick :) Service-oriented architecture includes "reuse." Which of the following is a description of why a business finds it useful? Using sensitive data again and again. Access to servers from many locations. Reliable capacity-on-demand. The selection of a specific computing device by each employee. The breaking apart of functionality into small services that can be used by many different syste what role did South Africa women play against the violation of human rights from 1950 to 1760 HELP! According to Hamilton, what is the purpose of the executive pardon? In other words, why would an executive use the pardon? Write an essay explaining the effect of one new technology on people's lives. I NEED THE ANS ASAP!!! PLS HELPP, WILL GIVE BRAINLIEST Given the ethical dilemma that Bruce described, would you have handled the situation differently? Explain.2) Discuss possible, alternative courses of action to handling/addressing this ethical dilemma. Question 10(Multiple Choice Worth 1 points)(01.04 LC)Solve (3) 2. 6 please help 5 5 6 Find the equation of the tangent line to the function f(x) = 3x^-2x+4 at x = 1. (Use symbolic notation and fractions where needed.) can someone help me!??