As part of the regulatory compliance efforts, a systems administrator has been asked to eliminate the use of SSL in favor of TLS. However, after taking steps to remediate, the durability scan indicates the server is vulnerable to the POODLE attack. What likely caused this to occur

Answers

Answer 1

Explanation:

The vulnerability to POODLE attack is caused by the lack of proper validation of encryption padding.

The server is still vulnerable to POODLE attack, even when a system administrator has eliminated the use of SSL in favour of TLS. This move could be far more effective if rather than completely eliminating SSL, a server is created, that still tolerates the existence of SSL, this way, the server is irresistible to downgrade attacks.

Attackers could take advantage of the change from SSL to TLS, because it means there is no way to fight against attackers who try to use the vulnerability in SSL, as it simply doesn't exist anymore. But if SSL is not completely disabled, then TLS will rather make SSL stronger, and a "visit" to SSL every now and then would be possible.


Related Questions

Logan has developed an excellent presentation with interesting content. He received great feedback on the evaluation
form after presenting it in a workshop. Because he did such a good job, he will be able to use the exact same
presentation for the keynote address he will give next week.
-true
-false

Answers

False he should be responsible and make a response to both different and more details

What makes up the cloud in cloud computing ?

Answers

Answer:

storage

Explanation:

hope this helps

Write a program that prints the square of the product. Prompt for and read three integer values and print the square of the product of all the three integers.

Answers

Answer:

ok

Explanation:

aprogram that prints the square of the product. Prompt for and read three integer values and print the square of the product of all the three integers. is written below

a program that prints the square of the product. Prompt for and read three integer values and print the square of the product of all the three integers.

Is School Important?

I'm in 12th grade and I don't pay attention all I want to do is play video games all day

Answers

Answer:

Yes, school is important

Explanation:

It is in some areas of school.

Swap to virtual school. You work at your own pace and you have PLENTY of time to play games, just use playing games as a reward. Online classes usually take 2 hours to do work, instead of being and working at school for 8 hours.

is it a true or false that one of the disadvantages of desk desktop computer is that it is very expensive and require specialised hardware software and list of cooling to operate ​

Answers

One of the disadvantages of desktop  computer is that it is very expensive and require specialised hardware software and list of cooling to operate ​ is False.

One of the disadvantages of a desktop computer is not necessarily that it is very expensive and requires specialized hardware, software, and cooling to operate.

While it is true that desktop computers can be more expensive than some other computing options, such as laptops or tablets, the cost of a desktop computer can vary depending on the specifications and components chosen.

There are budget-friendly desktop options available that can meet the needs of many users without breaking the bank.

Similarly, while some specialized hardware and software may be required for specific tasks or applications, most desktop computers come pre-installed with a standard set of software and can handle a wide range of tasks without the need for additional specialized components.

As for cooling, desktop computers do require adequate cooling to maintain optimal performance and prevent overheating. However, modern desktop computers are typically designed with cooling systems that efficiently dissipate heat generated by the components.

This includes fans, heat sinks, and airflow management within the computer case. While some high-performance desktop configurations or custom-built systems may require additional cooling measures, the average desktop computer does not necessarily require extensive cooling solutions.

It is important to note that the advantages and disadvantages of desktop computers can vary depending on individual needs, preferences, and specific use cases.

While cost, hardware, software, and cooling can be factors to consider, they may not be universal disadvantages and can often be mitigated or tailored to suit the user's requirements and budget.

For more questions on desktop  

https://brainly.com/question/29887844

#SPJ11

18. Which hardware component interprets and carries out the instructions contained in the software?

Answers

The hardware component that significantly interprets and carries out the instructions contained in the software is known as the central processing unit or the processor.

Which part of the computer carries out program instruction?

The processor that is also called a CPU (central processing unit), is the electronic component that interprets and carries out the basic instructions that operate the computer. Memory consists of electronic components that store instructions waiting to be executed and data needed by those instructions.

Therefore, the central processing unit or the processor is the component of hardware that interprets and carries out the basic instructions that operate a computer.

To learn more about the Central processing unit, refer to the link:

https://brainly.com/question/474553

#SPJ1

What is unsolicited junk mail?

Answers

Answer: spam mail

Explanation:

Answer: GoodMorning: ) ✨Unsolicited means that the Recipient has not granted verifiable permission for the message to be sent. So another word that people use for unsolicited junk is = Spam email is unsolicited and unwanted junk email sent out in bulk to an indiscriminate recipient list. Typically, spam is sent for commercial purposes.  

HAVE AN AMAZING REST OF YOUR DAY: )

bills is replacing a worn-cut cable to his power table saw.what type of cable is he most likely using ?
A.PSC
B.SO
C.CS
D.HPD

Answers

Bill is replacing a worn-cut cable for his power table saw.  is using is A. PSC (Portable Cord).

What is the bills?

Working with frayed cables can be dangerous and may act as a form of a risk of electric shock or other hazards. To make a safe and successful cable replacement, there are some general steps Bill can follow.

A is the most probable  type of cable he is utilizing from the provided choices. A type of cord that can be easily carried or moved around. Flexible and durable, portable cords are frequently utilized for portable power tools and equipment.

Learn more about bills from

https://brainly.com/question/29550065

#SPJ1

In certain interfaces, it is necessary to inform users of an abnormal condition or time-dependent information. It is important that the display of this information catches the user's attention. Suggest five ways a designer can successfully attract attention.

Answers

The use of colors that are bold or distinctive  colors on the screen, the usage of fonts other than the standard font, or the size of the font or other objects on the screen are all ways that designers can draw attention.

What elements of a graphic design product are the most crucial to drawing the viewer's attention?

The element in a design that attracts the viewer's attention is the emphasis. Typically, the artist will use contrast to highlight certain elements in their work. There could be variations in the area's size, color, texture, form, etc.

Visual design: What is it?

By deliberately utilizing images, colors, typefaces, and other aspects, visual design focuses on the aesthetics of a site and the contents that are associated to it. The page's content or function are not diminished by an effective visual design.

To know more about designer  visit:-

https://brainly.com/question/12640334

#SPJ4

what is computer science

Answers

Computer science refers to the study of computers and their computational systems.

nowadays computers are playing a vast role in various organizations such as schools, hospitals, finance companies, airports, and mainly in software companies. in all of the above fields, the computer is playing a very important role by performing various tasks very effectively and efficiently.

there are various programs and languages which should be learned by the computer software engineer to perform the tasks. As to deal with computer and computer applications one should have complete knowledge of computer languages such as Python, c+, c++, etc.

At last, we can say that computer science is a field of study that involves theoretical and practical aspects of computing.

Know more about computer science at:

https://brainly.com/question/30186474  

What does reply to all do in most email programs?

Answers

Answer:

Hitting Reply All ensures the Cc'd person receives future emails that are part of this thread. If your response will influence other people's decision making or current thread recipients should know others are looped in, go with Cc or Reply All.

Answer:

If someone sends an email to more than one person, you have two option when replying. Clicking "Reply" sends your message to the email's sender, while clicking "Reply All," sends your message to everyone who received the original.

Write a program in your favorite language (e.g., C, Java, C , etc.) to convert max. 32 bit numbers from binary to decimal. The user should type in an unsigned binary number. The program should print the decimal equivalent. You should write a program from scratch that performs the conversion, please do not use built in functions. Please provide a screenshot of your program running on these values: 111011012 110000110011110101110101011101012 Please also include your source code together with your answers to assignment questions.

Answers

Answer:

In Python:

bin = int(input("Binary Number: "))

num = str(bin)

dec = 0

for i in range(len(num)):

   dec = dec + int(num[i]) * 2**int(len(num)-i-1)

   

print("Decimal Equivalent: "+str(dec))

Explanation:

Note that the program assumes that the user input will be valid. So, error check was done in the program

This line gets the binary number from the user

bin = int(input("Binary Number: "))

This converts the inputted number to string

num = str(bin)

This initializes decimal number to 0

dec = 0

This iterates through the string number

for i in range(len(num)):

This converts the number to decimal

   dec = dec + int(num[i]) * 2**int(len(num)-i-1)

This prints the result of the conversion    

print("Decimal Equivalent: "+str(dec))

See attachment for screenshots

Write a program in your favorite language (e.g., C, Java, C , etc.) to convert max. 32 bit numbers from
Write a program in your favorite language (e.g., C, Java, C , etc.) to convert max. 32 bit numbers from

how to use search engine optimization

Answers

The way to use search engine optimization are:

Publish vital, Authoritative worksDo Update Your work Regularly. Use Metadata.Do have a link-worthy site. Make use of alt tags.

What is optimization of search engine?

Search engine optimization is known to be the ways or science of boasting a website to bring up its visibility when people are said to have search for products or services.

Hence, The way to use search engine optimization are:

Publish vital, Authoritative worksDo Update Your work Regularly. Use Metadata.Do have a link-worthy site. Make use of alt tags.

Learn more about search engine from

https://brainly.com/question/512733

#SPJ1

The are two schools of ____________ are Symmetry and Asymmetry.

Answers

The two schools of design that encompass symmetry and asymmetry are known as symmetrical design and asymmetrical design.

Symmetrical design is characterized by the balanced distribution of visual elements on either side of a central axis. It follows a mirror-like reflection, where the elements on one side are replicated on the other side, creating a sense of equilibrium and harmony.

Symmetrical designs often evoke a sense of formality, stability, and order.

On the other hand, asymmetrical design embraces a more dynamic and informal approach. It involves the intentional placement of visual elements in an unbalanced manner, without strict adherence to a central axis.

Asymmetrical designs strive for a sense of visual interest and tension through the careful juxtaposition of elements with varying sizes, shapes, colors, and textures.

They create a more energetic and vibrant visual experience.

Both symmetrical and asymmetrical design approaches have their merits and are employed in various contexts. Symmetry is often used in formal settings, such as architecture, classical art, and traditional graphic design, to convey a sense of elegance and tradition.

Asymmetry, on the other hand, is commonly found in contemporary design, modern art, and advertising, where it adds a sense of dynamism and creativity.

In conclusion, the schools of symmetry and asymmetry represent distinct design approaches, with symmetrical design emphasizing balance and order, while asymmetrical design embraces a more dynamic and unbalanced aesthetic.

For more such questions on symmetry,click on

https://brainly.com/question/31547649

#SPJ8

A corporate or government network that uses Internet tools, such as Web browsers, and
Internet protocols best defines

Answers

Answer: Intranet

Explanation:

The options include:

A. extranet.

B) social network.

C) intranet.

D) e-market.

A corporate or government network that uses Internet tools, such as Web browsers, and Internet protocols is referred to as intranet.

Social networks are social media sites that are used by people which allows them to stay connected with one another.

E-market is a form of marketing whereby goods and services are promoted or advertised through the use of the internet.

Therefore, the answer to he above question is intranet.

What keeps a collection of files in one location?

Answers

Answer:

A folder.

Explanation:

You can organize files into folders, which will separate them into groups. Keep in mind that this is meant for computers. Having a folder can group all of the files together, to make them easier to access.

-kiniwih426

A folder
Bc is we’re u put ur files in a place and stay in the same place

(2-6)÷2+9 pls answer this question step by step​

Answers

Answer:

7

Explanation:

(2-6) ÷ 2+9

(2-6)= -4

-4 ÷ 2+9

-4÷2=-2

-2+9=7

The answer is 7 using PEMDAS

what is the full from of CPU?​

Answers

Answer:

CPU is known as Central Processing Unit.

Full form? Like CPU meaning central processing unit?

Sam’s password is known to be formed of 3 decimal digits (0-9) in a given order. Karren and Larry are attempting to determine Sam’s password by testing all possible combinations. If they are only able to try 10 combinations every day, how many days would it take to try all the possible combinations? 1000 100 3 73

Answers

Answer:

100

Explanation:

Answer:

The answer is 100, hope this helps!

Explanation:

In cell F5, enter a formula using the PMT function. Insert a negative sign (-) after the equal sign in the formula to display the result as a positive amount. Use defined names for the rate, nper, and pv arguments as follows:
· rate argument: Divide the Rate by 12 to use the monthly interest rate.
· nper argument: Multiply the Term by 12 to specify the number of months as the periods.
· pv argument: Use the Loan_Amount as the present value of the loan.
2.In cell F6, enter a formula without using a function that multiplies 12 by the Term and the Monthly_Payment, and then subtracts the Loan_Amount to determine the total interest
3. in cell J5, enter another formula using the PV function. Use defined cell names for the rate, nper, and pmt arguments as follows:
· rate argument: Divide the Rate by 12 to use the monthly interest rate.
· nper argument: Subtract the year value in cell H5 from the Term, and then multiply the result by 12 to specify the number of months remaining to pay off the loan.
· pmt argument: Use the Monthly_Payment as a negative value to specify the payment amount per period.

Answers

Answer:

Open MS-Office Excel (a.) Define name for rate, nper and pv cells as Rate, Term and Loan_Payment. Select the cell then Menu > Formulas

HELPPPP THESE STATEMENTS DESCRIBE DTP

HELPPPP THESE STATEMENTS DESCRIBE DTP

Answers

The correct statements that describe  DTP (Desktop Publishing) are:

DTP treats graphics and text boxes differently.

DTP lets you resize and rotate graphics.

DTP helps workers produce documents that improve communication.

What is the statements that describe DTP.

DTP  refers to the process of utilizing specialized operating system and finishes to create and design miscellaneous types of documents, in the way that brochures, flyers, newsletters, papers, books, and added printed fabrics.

DTP spreadsheet allows consumers to integrate text, representations, drawings, and other components to form visually attractive and professionally formatted documents.

Learn more about   Desktop Publishing from

https://brainly.com/question/7221406

#SPJ1

Question #2

Multiple Select

These statements describe DTP.

DTP treats graphics and text boxes differently.

DTP lets you resize and rotate graphics.

DTP helps workers produce documents that improve communication.

Many DTP features are included in WP programs.

WP and DTP are the same.

what is basic technology​

Answers

Answer:

Basic Technology is beginning or the intro of technology. While learning about   you will make imporvemnts, modifications,enchancements and derivatives along the way.

Explanation:

What is the BCC feature used for?

to format email message text in a custom font
to format email message text in a blind font
to send a courtesy copy of an email to someone who does not need to take action
to send an email to someone without revealing that person’s email address to others on the distribution list

Answers

Answer:

to send an email to someone without revealing that person’s email address to others on the distribution list

Explanation:

BAM

To send an email to someone without revealing that person’s email address to others on the distribution list.

What is BCC?

"Blind carbon copy" is referred to as BCC. BCC is a similar method to CC for forwarding copies of an email to additional recipients. When CC is used, a list of recipients is shown; when BCC is used, a list of recipients is not visible.

Because the other receivers won't be able to see that the email has been forwarded to another person, it is known as a blind carbon copy.

Carbon copy is referred to as a "CC" in email communication. When there was no internet or email, you had to sandwich a piece of carbon paper between the paper you were writing on and the paper you wanted to use as your copy in order to make a copy of the letter you were writing.

Therefore, To send an email to someone without revealing that person’s email address to others on the distribution list.

To learn more about BCC, refer to the link:

https://brainly.com/question/29398332

#SPJ6

Which of the following services may be implemented in a link-layer protocol? Select one or more statements. Coordinated access to a shared physical medium. Bit-level error detection and correction. Flow control between directly connected nodes. Lookup and forwarding on the basis of an IP destination address. End-end path determination through multiple IP routers. Reliable data transfer between directly connected nodes. Multiplexing down from / multiplexing up to a network-layer protocol. TLS security (including authentication) between directly connected nodes.

Answers

Note that the service that may be implemented in a link - layer protocol are:

Coordinated access to a shared physical medium. (Option A)Bit-level error detection and correction. (Option B)Flow control between directly connected nodes.  (Option C)Multiplexing down from / multiplexing up to a network-layer protocol. (Option D)Reliable data transfer between directly connected nodes. (Option E)

What is a link-layer protocol?

In the TCP/IP paradigm, the link layer is a descriptive domain of networking protocols that function exclusively on the local network segment (link) to which a host is connected. Protocol packets of this kind are not forwarded to other networks.

The data link layer takes information from the network layer in the form of packets, splits those packets into frames, and delivers those frames bit by bit to the underlying physical layer.

Learn more about Link-Layer Protocols:
https://brainly.com/question/29980004
#SPJ1

Using the PDF handout provide you will identify the seven functions of marketing and provide
examples of each function of marketing.
Explain how each core function works together to help us carry out the
marketing concept. You will be evaluated on your ability to accurately identify all seven functions, explain each function and provide examples (at least two) of each.

Using the PDF handout provide you will identify the seven functions of marketing and provideexamples

Answers

The Explanation of  how each core function works together to help us carry out the marketing concept is given below.

How do marketing functions work together?

The marketing function is known to be used in regards to selling and it is one that helps businesses to achieve a lot.

The six marketing functions are:

Product/service management, Marketing-information management, Pricing, Distribution, Promotion, selling.

The functions are known to often work together to be able to obtain products from producers down to the consumers.

Hence, each of the marketing functions is known to be one that need to  be done on its own, but they are said to be very effective, if the said functions work together as a team.

Learn more about marketing functions from

https://brainly.com/question/26803047

#SPJ1

email is suitable for which of the following types of messages in business? (choose every correct answer.)

Answers

Email is suitable for Informational, Promotional , Transactional , Networking.

What is Email
Email (short for "electronic mail") is a method of exchanging digital messages from an author to one or more recipients. Email is sent through a network of computers using a protocol called SMTP (Simple Mail Transfer Protocol). Email messages can contain text, files, images, or other attachments sent as a single block of data. Since its inception in the early 1970s, email has evolved into one of the most widely used forms of digital communication. It is used for a variety of purposes, including business communication, personal correspondence, and sharing of information and files.

To know more about Email
https://brainly.com/question/29444693
#SPJ4

Im using Java Create a file named Validate.java. In this file, create a method with the following signature: public static String getName(Scanner keyboard) Given a keyboard, make this method ask the user for a name. Ensure the name is between 5 and 15 characters. Return that name from this method.
Demo 2 content:
import java.util.Scanner; public class Demo2 { public static void main(String[] args) { Scanner keyboard = new Scanner(System.in); String name = Validate.getName(keyboard); System.out.println("Validated name: " + name); } }
these are the input and output for the homework
Standard InputFiles in the same directoryaENTER aaENTER aaaENTER aaaaENTER aaaaa
Demo2.java
Enter a name. The name must be in between 5 and 15 characters.\n Enter a name. The name must be in between 5 and 15 characters.\n Enter a name. The name must be in between 5 and 15 characters.\n Enter a name. The name must be in between 5 and 15 characters.\n Enter a name. The name must be in between 5 and 15 characters.\n Validated name: aaaaa\n Test Case 2
Standard InputFiles in the same directoryaaaaaaaaaaaaaaaaaaaaENTER aa aaaaaaaaaaaaaaaaENTER aaaaaa aaaaa aaaaaENTER aaaaaaaaaaaaaaaaaENTER aaaaaa aaaaaaaaaENTER aaaaaaaaa aaaaa
Demo2.java
Enter a name. The name must be in between 5 and 15 characters.\n Enter a name. The name must be in between 5 and 15 characters.\n Enter a name. The name must be in between 5 and 15 characters.\n Enter a name. The name must be in between 5 and 15 characters.\n Enter a name. The name must be in between 5 and 15 characters.\n Enter a name. The name must be in between 5 and 15 characters.\n Validated name: aaaaaaaaa aaaaa\n Test Case 3
Standard InputFiles in the same directoryMikeENTER Michael
Demo2.java
Enter a name. The name must be in between 5 and 15 characters.\n Enter a name. The name must be in between 5 and 15 characters.\n Validated name: Michael\n Test Case 4
Standard InputFiles in the same directoryAlice
Demo2.java
Enter a name. The name must be in between 5 and 15 characters.\n Validated name: Alice\n Test Case 5
Standard InputFiles in the same directoryDomingo
Demo2.java
Enter a name. The name must be in between 5 and 15 characters.\n Validated name: Domingo\n Test Case 6
Standard InputFiles in the same directoryThis is a test with garbage input. Does this work?ENTER noENTER Elon Musk
Demo2.java
Enter a name. The name must be in between 5 and 15 characters.\n Enter a name. The name must be in between 5 and 15 characters.\n Enter a name. The name must be in between 5 and 15 characters.\n Validated name: Elon Musk\n

Answers

Hi! To create a file named Validate.java and implement the get Name method with the given requirements, you can follow these steps:


1. Create a new file named Validate.java in your Java project.
2. Import the Scanner class at the beginning of the file: `import java.util.Scanner;`
3. Write the getName method as follows:

```java
public class Validate {
   public static String get Name(Scanner keyboard) {
       String name = "";
       do {
           System.out.println("Enter a name. The name must be between 5 and 15 characters.");
           name = keyboard.nextLine();
       } while (name.length() < 5 || name.length() > 15);
       return name;
   }
}
```

This method repeatedly asks the user for a name using the provided Scanner object, and checks if the name's length is between 5 and 15 characters. If the name does not meet the criteria, the loop continues until a valid name is entered. Finally, the validated name is returned.

In another file (e.g. Demo2.java), you can use the Validate class and getName method as follows:

```java
import java.util.Scanner;

public class Demo2 {
   public static void main(String[] args) {
       Scanner keyboard = new Scanner(System.in);
       String validatedName = Validate.getName(keyboard);
       System.out.println("Validated name: " + validatedName);
   }
}
```

This code creates a Scanner object, calls the getName method from the Validate class, and prints the validated name. When you run the Demo2.java file, you'll see the output based on the user input.

For such more question on implement

https://brainly.com/question/29439008

#SPJ11

How do programming and electricity work together?

Answers

Answer:

When you first press the power button, the computer sends a signal to the computer power supply, which converts the AC (alternating current) to DC (direct current). This power supplies the computer and its components with the proper amount of voltage and electricity.

Answer:

Electricity drives current whose outcome can vary with Transistors. Transistors combined together form Flip Flops or Logic Gates.

Explanation:

Follow instagrm at ➜ mvnnyvibesFollow instagrm at ➜ mvnnyvibes

How serious are the risks to your computer security?
Why is it important to protect a Wi-Fi network? What should you do to protect your Wi-Fi network?

Answers

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

What are the risk results for information and computer security?

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

https://brainly.com/question/12010892

#SPJ1

From the philosophical standpoint, especially in the discussion of moral philosophy or ethics, why do we consider “murder” or “killing” wrong or bad?

Answers

Explanation:

Morality is a set of values ​​and habits that a society acquires over time and can be categorized as good and bad values, right and wrong, justice and crime. Ethics is defined as the study of morals, the practical application of moral behaviors defined by society.

Therefore, the concept of "murder" or "killing" is seen as an immoral act by the vast majority of society around the world, strengthened by the set of moral conduct common to all human beings, which are the Articles on the Universal Declaration of Human Rights. Human Rights, which is an official document of the UN, which contains several universair and analytical rules on the rights of every individual, such as the right to life, security, freedom, etc.

Other Questions
Cathy & Gina sold baked goods at the festival, they were able to sell 18 items. The pies were $8 and loavesof bread were $4. They made $112. How many loaves of bread did they sell? you generate a 95% confidence interval for the mean carapace width of dungeness crabs, which is 141 /- 18 millimeters. which answer below could you use to improve your estimate (i.e. make your margin of error smaller)? increase the confidence level to 99%. invoke the central limit theorem. increase the number of crabs in your sample. eat one out of every 10 crabs in your sample so that you don't get hungry while you're making measurements. NEC Table 310.104(A) and the Reference may be used for the following question.NEC Table 310.104(A) covers conductor ? and ? rated 600 volts. Can someone tell me how to do this? This is so confusing to me. 3 ln x = ln 16 + ln 4. Solve for x. Please walk me through which log rule to use once you get to the point:ln x = (ln 16 + ln 4)/3 What is the measure of to the nearest degree? Which of the following is NOT a postulate of the Kinetic Molecular Theory? 1. Average Kinetic Energy of the system is a measure of the temperature of the system. 2. Energy is conserved in the collisions between gas molecules.. 3. Energy can either be destroyed or created. Its goes from one form to another. 4. Gases travel in straight line until they collide with other gas molecules Brainliest if correct an atom of 135i has a mass of 134.910023 amu. calculate the binding energy in mev per atom. enter your answer with 4 significant figures and no units. 141__25How do you write the problem above as a percentage? Write your answer using a percent sign (%). How do the MacIveys learn to survive in this harsh environment? i need the answers ? Paraphrasing another author's paragraph by substituting one or two words in each sentence and then adding one citation to the author at the end of the paragraph: _____ the chemical environment of protons can be deduced from their chemical shifts. what are the relative chemical shifts of the protons at the labeled positions? [protons that are highly shielded have low delta (chemical shift) values.] In the diagram, line l and line m are parallel, m3 = 9x16 and m5 = 7x+ 4 . Solve for x . How did Martin Luther King, Jr.'s "I Have a Dream" speech impact the civil rights movement?A: It called for violent resistance, resulting in riots across the country.B: It was largely ignored by the movement, though regarded as a superbly written speech.C: It was considered controversial and fragmented the movement into small groups.D: It inspired many people, giving strength and momentum to the movement. A graduated cylinder that is 24 cm tall can hold 1 L of water.What is the radius of the cylinder?What is the height of the 500 ml mark? The 250 ml mark?Recall that 1 liter(L) is equal to 1,000 milililiters (ml) nad that 1 liter (L) is equal to 1,000 cm cubed. These shapes are similar.Find X.X59271521 Complete the statements.Now, check another value for the variable.When w = 2, the first expression isWhen w = 2, the second expression isTherefore, the expressions are? [6(42)+(2123+1)]32