using the _________ cipher you select multiple numbers by which to shift letters.

Answers

Answer 1

Using the Polybius square cipher, you select multiple numbers by which to shift letters.

What is the Polybius square cipher?

Polybius square cipher is a substitution cipher, which is a kind of transposition cipher, invented by the Greek historian Polybius in the second century BC. The Polybius square cipher is a cipher that maps letters of the alphabet onto two-digit numbers using a grid.

Each letter is represented by its coordinates in the grid of squares, which is identified by a letter label at the top of the column and left of the row. In other words, each letter is represented by two numbers that represent the column and row that the letter appears in the square.

Learn more about cipher at

https://brainly.com/question/31718003

#SPJ11


Related Questions

Using Scenario "Inappropriate Access" below -- answer following.

Will give thumbs up if all is answered. Thanks!

1. Identify scope, determine estimates, run through analysis steps for the example

Following tables needed in the response:
1. Scope Table (with your most important scenarios),
2. LEF Table,
3. Primary Loss Table,
4. SLEF Table,
5. Secondary Loss Table
Provide reasoning for each value selection. (EXAMPLE: why have you chosen a specific asset at risk, why chosen a particular threat effect, where did you get a specific loss value, how did you get your your LEF values)
INAPPROPRIATE ACCESS
Determine the level of risk associated with inappropriate access privileges in a cus­tomer service application.

BACKGROUND
During a recent audit, it was discovered there were active accounts in a customer service application with inappropriate access privileges. These accounts were for employees who still worked in the organization, but whose job responsibilities no lon­ger required access to this information. Internal audit labeled this a high risk finding.

ASSET(S) AT RISK
The account privileges in question permit access to the entire customer database, comprised of roughly 500,000 people. This information includes customer name, address, date of birth, and social security number. No banking, credit, or other finan­cial information exists in these records.

THREAT TYPE(S}
The primary type of threat event here is clearly malicious. It is difficult to realisti­cally imagine that someone with inappropriate access to an application they're no longer supposed to have access to would accidentally log into that application, and do something that would inappropriately disclose customer information. However, there is a twist here.
What about the possibility of an employee with inappropriate access logging into the application and just rummaging around looking up customer information out of boredom or curiosity but not with an intent to harm-snooping, as it were? That is absolutely a realistic scenario, and it's something that the organization is not okay with, so the question boils down to whether we scope that separately from the truly malicious event.


Deciding whether to combine or separate scenarios like this typically boils down to whether there is likely to be a significant difference in the:

• Frequency of one scenario over the other
• Capability between the threat agents in one scenario versus the another
• Losses that would occur, or
• The controls that would apply

Answers

The scope of the analysis for the inappropriate access scenario includes determining the risk associated with unauthorized access privileges in a customer service application. We need to evaluate the potential threats, assets at risk, and potential losses to estimate the level of risk accurately.

To analyze the inappropriate access scenario, we need to consider the scope, estimate potential losses, and assess the associated risks. The primary asset at risk in this case is the customer database, which contains sensitive personal information of approximately 500,000 individuals, including names, addresses, dates of birth, and social security numbers. Although financial information is not present, the disclosure of personal data can still have significant consequences for individuals and the organization.

The primary threat type identified is malicious access, as it is unlikely for individuals with inappropriate access to accidentally log in and disclose customer information. However, there is an additional threat scenario to consider: the possibility of employees with unauthorized access engaging in snooping or unauthorized information lookup out of curiosity or boredom. This scenario presents a realistic concern that should be scoped separately from the truly malicious event.

When determining whether to combine or separate these scenarios, several factors must be considered, including the frequency of each scenario, the capability of threat agents, potential losses, and the controls that would apply. Assessing these factors will help in developing appropriate risk mitigation strategies tailored to each scenario.

Learn more about analysis

brainly.com/question/32375844

#SPJ11

x = 100
if x > 0:
x -= 1
print(x)

Answers

Answer:

Explanation:

Program  and Reault:

x = 100if x > 0: x -= 1print(x)

the two basic requirements for a good document scanner are . a. a document feeder and optical character recognition software b. a bar code imager and an executive information system c. a virtual private network and a radio wave transmitter d. a radio frequency identification tag and a digital printing software

Answers

The two basic requirements for a good document scanner are:

(a) a document feeder and optical character recognition software.

These features allow for efficient and accurate scanning of multiple documents, as well as the ability to convert scanned text into editable and searchable digital formats. While other features such as a bar code imager or radio frequency identification tags may be useful for specific industries or applications, they are not essential for a basic, reliable document scanner.

A document feeder is a device that allows multiple pages to be scanned automatically. This is important because it saves time and effort compared to manually placing each page on the scanner bed one by one. A document feeder can be either automatic or manual, but automatic document feeders (ADF) are generally more efficient and faster.

Optical character recognition (OCR) software is a technology that enables scanned documents to be converted into editable text. OCR works by analyzing the scanned image of a document and identifying characters and words within it. The OCR software then converts these characters into digital text that can be edited and searched. This is important because it makes scanned documents more usable and accessible, especially for search and archival purposes.

Together, a document feeder and OCR software enable a document scanner to quickly and efficiently scan and process large volumes of documents, converting them into editable and searchable digital files. This can be extremely useful for businesses, organizations, and individuals who need to manage and archive large amounts of paper documents.

Thus, the correct option is : (a).

To learn more about document scanners:

https://brainly.com/question/30558821
#SPJ11

Choose the correct option to fill in each blank.
In ___ parallelism, the computer divides a task into
___, which it then allocates to different processors for execution.

Blank 1:
Data-level parallelism
Instruction-level parallelism
Task-Level parallelism

Blank 2:
Subprograms
Subtasks
Submodules

Answers

Answer:

Blank 1:  Task level parrallelism

Blank 2:  Sub Tasks

Explanation:

Task Parallelism means concurrent execution of the different task on multiple computing cores.

Consider again our example above, an example of task parallelism might involve two threads, each performing a unique statistical operation on the array of elements. Again The threads are operating in parallel on separate computing cores, but each is performing a unique operation.

Answer:

In task-level parallelism parallelism, the computer divides a task into subtasks , which it then allocates to different processors for execution.

After having done the hand calculation and pseudocode for a program that models inflating a spherical balloon, now implement the task in Java. Remember, first the balloon is inflated to have a certain diameter (which is provided as an input). Then you inflate the balloon so that the diameter grows by an inch, and display the amount the volume has grown. Repeat that step: grow the diameter by another inch and show the growth of the volume.


Complete the modifing program.


the program will get the input from other method which I can't access.


Please just assume you'll get the input from the user.


import java.util.Scanner;

class Balloon

{

public static void main(String[] args)

{

Scanner in = new Scanner(System.in);

System.out.print("Diameter: ");

double diameter = in.nextDouble();

double growth=1;


int c=0;

while (c<10)

{

double vol=diameter*diameter*diameter*3.14/6;

diameter = growth + diameter;

System.out.printf("Increase in diameter: %.0f",growth);

System.out.println("New Diameter "+ diameter);


double growthvol=diameter*diameter*diameter*3.14/6;


System.out.printf("Increase in volume: %.0f",growthvol-vol);

System.out.println("New Volume "+growthvol);

c++;

}

}

}


Expected output should've looked like this:


Diameter: 10

Increase: 173

Increase: 208

or


Diameter: 7.5

Increase: 101

Increase: 127

Answers

To modify the program to display the growth in volume after inflating a spherical balloon, first, get the diameter of the balloon from the user as an input. Then, inflate the balloon so that the diameter grows by an inch and display the amount the volume has grown. Here's the modified code of the program to display the growth in volume after inflating a spherical balloon in Java.

import java.util.Scanner;

class Balloon {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.print("Diameter: ");

       double diameter = in.nextDouble();

       double growth = 1;

       int c = 0;

       double vol = diameter * diameter * diameter * 3.14 / 6;

       while (c < 10) {

           diameter += growth;

           System.out.printf("Increase: %.0f\n", growth);

           System.out.printf("New Diameter: %.1f\n", diameter);

           double growthvol = (diameter * diameter * diameter * 3.14 / 6) - vol;

           System.out.printf("Increase: %.0f\n", growthvol);

           System.out.printf("New Volume: %.1f\n", diameter * diameter * diameter * 3.14 / 6);

           vol = diameter * diameter * diameter * 3.14 / 6;

           c++;

       }

   }

}

The above code prompts the user to input the diameter of the balloon, inflates the balloon, and displays the growth in volume as the diameter of the balloon increases by an inch. The `diameter` variable gets updated with the new diameter value after inflating the balloon, and `growthvol` calculates the growth in volume by subtracting the initial volume of the balloon from the new volume of the balloon after inflating it by an inch. The `vol` variable holds the volume of the balloon at the current iteration, and it is updated after each iteration.

Learn more about iteration:

https://brainly.com/question/30890374

#SPJ11

Messing around is driven by the user's:
A. need to have friends.
B. love of fighting games.
C. initiative and interests.
D. obsession with a project.

Answers

Answer:

The answer is C

Explanation:

I hope that the answer

a(n) ______ machine enables you to install a second operating system on a computer.

Answers

A virtual machine (VM) is a type of compute resource that uses software rather than a real computer to run applications and run programs. A physical "host" machine hosts one or more virtual "guest" machines.

What advantages do virtual machines have?

A firm can save time, money on management, and physical space by running numerous OS instances on a single piece of hardware because the software is distinct from the actual host computer.

What VM software is the most widely used?

The top four virtualization-friendly programs are VMware Fusion, Parallels Desktop, Oracle VM Virtual Box, and VMware Workstation. Really great features are provided for free by Oracle VM Virtual Box. It is also compatible with Mac, Windows, and Linux.

To know more about virtual machine visit :-

https://brainly.com/question/30044516

#SPJ4

Help me with this question asap please

Help me with this question asap please

Answers

Answer:

Parameter

Explanation:

The function's scope is truly local. The () brackets at the end execute the function -- the enclosing brackets are to disambiguate what is being executed.

I WILL MARK YOUR BRAINLIEST IF YOU ANSWER

Draw a flowchart to print first 10 multiples of 5.
Please also draw it on paper and answer

SILLY ANSWERS = REPORT!

Answers

Answer:

Explanation:

Sorry it's very messy, for this a loop is need but inclusive of a count/index variable which I have used and called the variable 'number'

I WILL MARK YOUR BRAINLIEST IF YOU ANSWERDraw a flowchart to print first 10 multiples of 5.Please also

Richard wants to share his handwritten class notes with Nick via email. In this scenario, which of the following can help Richard convert the notes into digital images so that he can share them via email? a. Bar coding device b. Digital printing software c. Document scanner d. Radio frequency identification tag

Answers

Answer: Document Scanner

Explanation: Cos then he can easily add the paper notes to his computer and email the client.

Select ALL the correct answers.
In attempts to improve their contribution to the environment a company decides to adapt green computing. Which of these techniques will contribute to green computing?
A.virtualization
B.grid computing
C.recycling
D.autonomic computing

Answers

Answer:

c. and a.

Explanation:

I think thought are right because you have to adapt the green

Answer:

A. Virtualization

C. Recycling

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

the ___ database option facilities you to create Database from scratch ​

Answers

Answer:

cookie?

Explanation:

where everything is hard saved

A ____ is a share of ownership in a company

Answers

Answer:

stock

A stock is a share of ownership in a company

a stock is a share of ownership in a company

Which special network area is used to provide added protection by isolating publicly accessible servers?

Answers

A demilitarized zone (DMZ) is an area of the network where extra security is placed to protect the internal network from publicly accessible servers like web servers and email servers.

The most crucial action to take to stop console access to the router is which of the following?One needs to keep a router in a locked, secure area if they want to prevent outsiders from accessing its console and taking control of it. The router's console can only be accessed by those who have been given permission.A screened subnet, or triple-homed firewall, refers to a network architecture where a single firewall is used with three network interfaces. It provides additional protection from outside cyber attacks by adding a perimeter network to isolate or separate the internal network from the public-facing internet.A demilitarized zone (DMZ) is an area of the network where extra security is placed to protect the internal network from publicly accessible servers like web servers and email servers.        

To learn more about network refer to:

https://brainly.com/question/1326000

#SPJ4

what aspects of your life are most influenced by media and technology​

Answers

Answer:

Everyday life

Explanation:

Television

office work (computers )

Music

video games

ware house work uses technology

work from home jobs use technology

cellular towers

Q 1: How computer produces result?
Q 2: Write function of power supply in system unit?

Answers

The computer produces result as an Output,  by the central processing unit.

What are the function of power supply in system unit?

The key functions of a power supply unit are:

It helps to change AC to DC.It transmit DC voltage to the motherboard, adapters, and othersIt gives cooling and lead to more air flow via its case.

What is the result of the computer?

The result shown by a computer is known as an output, the result is known to be made by the central processing unit, that is said to be a computer's whole aim for existing.

Hence, The computer produces result as an Output,  by the central processing unit.

Learn more about computer from

https://brainly.com/question/24540334

#SPJ1

Suppose that the last value, 2, was mistakenly recorded as 20. What measure(s) of the typical value in a dataset would be affected by this error

Answers

The measure(s) of the typical value in a dataset that would be affected by the error of recording the last value as 20 instead of 2 are the mean and potentially the median.

Both the mean and median are commonly used measures to represent the typical value of a dataset, but they can be influenced by outliers or errors in the data.

The mean is calculated by summing all the values in the dataset and dividing by the total number of values. In this case, the error of recording the last value as 20 instead of 2 would significantly affect the mean since it is included in the calculation. The presence of this larger value would increase the overall sum, leading to an inflated mean value.

The median, on the other hand, is the middle value of a sorted dataset. If the dataset is affected by the error, the median may not be impacted if the 20 is not one of the middle values. However, if the dataset is sorted in ascending order and the error causes the 20 to be placed in the middle, the median would be affected.

To know more about sorted dataset click here: brainly.com/question/28335899

#SPJ11

Which of these tasks can be accomplished when the drop-down menu of the Bullets icon is clicked?

Answers

Answer:

The answer is:

(1)Select the bullet, that is used in the list

(2)Defining the new bullet, which is used in the list

Explanation:

In the question, the choices were missing. so, we define the correct choice only.

In choices 1 and choice 2, both use the bullets, but in choice 1, it is used in the list, in which it is used to define the list options, and in the choice 2, it defined the new bullets in the list.  

you want to provide scalability for an application installed on an nlb cluster composed of several servers. which filtering mode should you use?

Answers

The same version of Windows Server 2016 must be used by all servers. An Active Directory domain must be joined by all servers. Hardware components must be the same across all servers.

A Network Load Balancing (NLB) cluster's settings can be changed using the Set-NlbCluster cmdlet. The cluster operating mode, cluster name, and cluster primary IP address are among the setup adjustments you can make. The most recent copy of the cluster database, which contains information about the setup and condition of the cluster, is kept in the quorum resource. On all active nodes, a failover cluster keeps a consistent, updated copy of the cluster database. Resources, sometimes known as physical or logical units, can be hosted by a node. The same subnet must have at least one IP address for each machine.

Learn more about server here-

https://brainly.com/question/7007432

#SPJ4

A customer complains that the network connection on the laptop is intermittent. The customer states that they are using a wireless PC card for network connectivity. The customer believes that the laptop may be too far from the wireless access point; however, he does not know where the wireless access point is located.

As a technician, you need to be able to ask questions that will be recorded on a work order. What are 5 closed-ended questions and 5 opened-ended questions that you would ask a customer. ​

Answers

how are you

I will ask what's the problem

what happend before u saw this

what did I do after

was anyone with you

and give me permission to help

You've just received an email message that indicates a new serious malicious code threat is spreading across the internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent the code from spreading further.

Required:
Based on the email message, what are the next BEST actions to complete?

Answers

Answer:

The next BEST actions to complete could either be to call 911 or just drive somewhere further from your computer and where you live because the threat might come to your place, or it might already be in your place.

Explanation:

PLEASE HELP, MAKE SURE IT IS THE CORRECT WAY!! 100 POINTS!!!

Joe, a project manager, calls your extension because his computer just crashed. He lets you know that his computer will not connect to the internet, that he has lost multiple files, and he needs to get things back up and running in the next hour due to an important meeting he is scheduled to host. He is irritated because he is working on an older laptop and is getting a new one next week. He says that he knew this would happen and wishes that this laptop worked for just one more week.

He is agitated and in a panic. He is afraid that he has lost all his important documents and is blaming the company’s technology. As you ask him questions to find out more about the problem, you make the rookie mistake of asking, “Have you tried restarting your computer?” Joe explodes in a rage and screams that he already told you that he did and that you are not listening to him.

You are now in a situation where you not only need to determine the cause of the problem and fix it, but you also need to calm this individual down so that you can get clearer and more accurate information.

What do you do?

Answers

Consider his point of view and apologize politely. Reason out the causes in a calm and orderly manner. Take deep breaths and listen to what he has to say.

The way a student prepares for a test or reviews academic material is referred to as

a study environment.
study habits.
study hall.
a study schedule.

Answers

Study habits ig













Dsksndjdjs

why does messenger keep saying waiting for network

Answers

you prob need to fix your data or redownload it again

Consider the following static method.

private static void recur (int n)

{

if (n != 0)

{

recur in

2);

System. Out. Print(n + " ");

}

}

What numbers will be printed as a result of the call recur (7) ?

Answers

The given recursive method, recur(int n), prints the value of n and recursively calls itself with the value n / 2 until n becomes zero.

Let's trace the execution of the method recur(7) step by step:

Initial call: recur(7)

The condition n != 0 is true since n is 7.It prints 7.The method recursively calls recur(7 / 2), which is recur(3).

Recursive call: recur(3)

The condition n != 0 is true since n is 3.It prints 3.The method recursively calls recur(3 / 2), which is recur(1).

Recursive call: recur(1)

The condition n != 0 is true since n is 1.It prints 1.The method recursively calls recur(1 / 2), which is recur(0).

Recursive call: recur(0)

The condition n != 0 is false since n is 0.It does not print anything and returns.

Thus, based on the above execution, the numbers that will be printed as a result of the call recur(7) are: 7, 3, 1.

For more details regarding recursive method, visit:

https://brainly.com/question/30714086

#SPJ1

(a)What is digital literacy
(b)state two benefits of digital divide
(c)list and explain the (2) types of digital literacy.
(Computer Studies.)

Answers

Digital literacy refers to the ability to use, understand, and critically evaluate digital technologies and media. It includes skills such as using a computer and the internet, creating and editing digital content, and understanding how to protect oneself online.

There are several benefits to closing the digital divide, which refers to the gap between individuals and communities that have access to digital technologies and those that do not. Some of these benefits include:

Improved access to information and education: Digital literacy enables individuals to access a vast amount of information and educational resources online, which can help to increase knowledge and skills.Increased economic opportunities: Digital literacy can help individuals to find jobs and participate in the global economy. It can also help businesses to expand their reach and increase productivity.Enhanced social connections: Digital literacy can help individuals to connect with others and participate in online communities, which can help to improve social connections and support networks.

There are two main types of digital literacy:

Basic digital literacy: This refers to the basic skills and knowledge needed to use digital technologies and media, such as navigating websites, using email, and protecting oneself online.Advanced digital literacy: This refers to more advanced skills and knowledge related to creating and manipulating digital content, such as coding, graphic design, and video editing.

Both types of digital literacy are important for different reasons. Basic digital literacy is essential for participating in modern society and accessing information and services online. Advanced digital literacy can open up additional career opportunities and enable individuals to create and share their own digital content.

Social media marketers need the ability to do what?
Code in JavaScript
Collaborate across teams
Communicate with customers
Make a website useful

Answers

Communication with customers
I believe the answer is communicate with customers

system software controls how the various technology tools work together along with the application software. system software includes both operating system software and utility software.

Answers

By integrating the different components of a computer system, system software ensures seamless interaction between hardware and application software. It allows applications to utilize system resources effectively and provides a stable and secure environment for users.

Thus, system software plays a crucial role in enabling the smooth functioning of technology tools and applications. System software is an essential component that controls the collaboration between different technology tools and application software. It consists of two main types: operating system software and utility software.

1. Operating system software: This software acts as a bridge between the computer hardware and the user. It manages the computer's resources, such as memory, CPU, and input/output devices, and provides a user-friendly interface. The operating system coordinates the execution of application software, ensures efficient allocation of resources, and handles error conditions.

2. Utility software: Utility software is designed to perform specific tasks that enhance the system's performance or provide additional functionalities. It includes various tools such as antivirus software, disk defragmenters, file compression tools, and backup software. These utilities help optimize system performance, protect against security threats, and improve overall efficiency.

To know more about components visit:

https://brainly.com/question/13488004

#SPJ11

meaning and explanation of fortran​

Answers

Definition of FORTRAN. : a computer programming language that resembles algebra in its notation and is widely used for scientific applications. Hope this helped!

Answer:

is a general-purpose, compiled imperative programming language that is especially suited to numeric computation and scientific computing.

Explanation:

Fortran, as derived from Formula Translating System, is a general-purpose, imperative programming language. It is used for numeric and scientific computing. Fortran was originally developed by IBM in the 1950s for scientific and engineering applications.

Other Questions
The table below gives selected values for the differentiable and decreasing function f and its derivative. If f^-1(x), what is the value of g(9) Gross domestic product is calculated by summing up A) the total quantity of goods and services in the economy. B) the total quantity of goods and services produced in the economy during a per C) the total market value of goods and services in the economy. D) the total market value of final goods and services produced in the economy 1. Todd knows that he wants to work in hospitality and tourism, but he isnt sure that he wants to attend college. Compare and contrast the education or training and certifications needed for several different careers in the hospitality and tourism industry that could help Todd decide what his next steps are.2. Remember Michael? Turns out he took the job as a dishwasher so he could get restaurant experience and move closer to his dream of becoming a chef. Think about Michael in ten years. He is applying to be chef de cuisine at a local fine dining restaurant. This is a management and leadership position. Thinking about Michaels likely career trajectory from dishwasher to chef, what elements might Michael include in a digital portfolio to make him a competitive candidate for the chef de cuisine job? Why might it be important for Michael to create a portfolio when applying for this job?3. Why are ethics important in the hospitality and tourism industry? Compare and contrast appropriate/inappropriate workplace social behavior and work ethics. Equity funds, index funds, and market cap equity funds are best for which type of investor?A) Investors with a low risk toleranceB) Investors who want to protect the value of their investmentsC) Investors who are close to retirementD) Investors with a long time horizon Armando viva con su familia en otra ciudad antes de vivir en San Salvador. Escribe dilogos diciendo lo que varias personas en su familia hacan cuando vivan en la otra ciudad.MODELO: la hermana de Armando / escribir a unos parientes en San SalvadorLa hermana de Armando escriba a unos parientes en San Salvador.1. Armando / salir a jugar al ftbol con unos amigos2. la abuela / comprar golosinas en la dulcera3. sus primos / correr por el parque de atracciones4. el to y la ta / visitar los museos de historia5. la ta Luisa / mirar las vitrinas de los almacenes nuevos6. su hermano mayor / comer los sbados en un restaurante mexicano Joe collects toy cars and marbles. Whenever he collects 4 cars, he also collects 12 marbles. How many marbles does he collect after collecting 20 cars? What rule is being used? 2) Which benefit is a budget most likely to provide?A) realistic financial goalsB) lower depreciation costsC) decreased tax paymentsD) higher annual salary Length (cm): Length (m) 100: 1250: 2.578.2: .782123.9: 1.239y: ? I need to know what goes next to the y Write an equation for the proportional relationship. Let x represent a length measured in meters and y represent the same length measured in centimeters. I don't know what would be the equation. plz help dicriminant of 3x^2-4x+2 When you plot the following data in a scatterplot, will your trend line be increasing,decreasing, or horizontal?X2.456710Y3 1 20 -2 -7A. IncreasingB. DecreasingC. Horizontal please help Me make sure you put the correct answer A county has constructed a conical building to store sand. The cone has a height of 101 m and a diameter of 330 m. Find the volume of this building to the nearest hundredth. Use 3.14 for . What is the standard form of equation The major difference between bacterial and eukaryotic cytoplasmic membranes is the presence of ______, which are molecules that are typically found in eukaryotic cytoplasmic membranes but lacking in bacterial cytoplasmic membranes. who will answer this 2 questions correct I will mark him/her as a brainliest. if the length of Suez Canal on a map of drawing scale 1 : 1400000 is 70 km,then it's length on the map=.......cm. the second question is the sum of edges of a cube is 24 cm then it's volume......cm3 don't write anything wrong cause ok the answers... Good Luck The compounds are balanced. 2MgO + 2Cl2 2MgCl2 + ? Multiply a Polynomial by a MonomialIn the following exercises, multiply.236. (8b 1)b Help please ASAP for 12pts Art Think about the Three-Fifths Compromise. Draw a political cartoon that expresses your views on the issue. Tape Company is thinking about buying a new machine that will better the efficiency of their production process as well as better their product's quality. The machine will be useful for 5 years and give each of the cash flows at the end of the year:First Year Cash Flow: $240,000Second Year Cash Flow: $288,000Third Year Cash Flow: $432,000Fourth Year Cash Flow: $264,000Fifth Year Cash Flow: $204,000There will need to be maintenance done for the machine at the end of year three which will be a fee of $87,750 for the company. Once the five years have ended, the company is able to sell the machine for salvage for $58,500.The company's discount rate is 14.0% while the machine is priced at $585,000.In regards to the investment, what is the net present value in the new machine?