in order to gain access to a private web site, each person must have his or her own 6-digit password, where some digit is used 3 times and the remaining 3 digits are distinct. how many such passwords are there?

Answers

Answer 1

A website that's password-protected and only accessible to internal staff, registered users, or partners.

What does it mean when a website is private?

With the use of a private website, you, your loved ones, and your friends may communicate online without worrying about getting unwanted attention from other people.

A website that's password-protected and only accessible to internal staff, registered users, or partners.

Occasionally, you must use a Mac, PC, or other device that does not belong to you since you are away from your own. You shouldn't want your passwords, search history, or browsing history to be saved on that device, therefore use a private browser to avoid this.

A website that's password-protected and only accessible to internal staff, registered users, or partners. Deep Web is used interchangeably.

To learn more about private website refer to:

https://brainly.com/question/6888116

#SPJ4


Related Questions

in the 1960s and 1970s, the existing telephone network was used for computer-to-computer communication beyond the local area. why was the telephone network not well suited for supporting computer traffic? be specific.

Answers

A group of computers that share resources on or provided by network nodes is referred to as a computer network.

What is  computer network ? In order to communicate with one another, the computers use standard communication protocols through digital networks. These linkages are made up of telecommunication network technologies, based on physically wired, optical, and wireless radio-frequency means that may be organized in a number of  computer network. Among the nodes of a computer network are laptops, servers, networking equipment, and other specialized or general-purpose hosts. In addition to having hostnames, they are recognized by network addresses. Hostnames act as distinctive designations for the nodes and are hardly ever modified after first assignment. For communication protocols like the Internet Protocol to locate and identify the nodes, network addresses are used.Computer networks can be categorized using a variety of factors, such as the signal-transmission medium, bandwidth, communications protocols used to manage network traffic, network size, topology, traffic-control mechanism, and organizational goals.Internet connectivity, digital video and audio, the shared use of application and storage servers, printers, fax machines, and email and instant messaging software are just a few of the many applications and services supported by computer networks.

To Learn more About computer network refer to:

https://brainly.com/question/1167985

#SPJ4

c++
Write a loop that subtracts 1 from each element in lowerScores. If the element was already 0 or negative, assign 0 to the element. Ex: lowerScores = {5, 0, 2, -3} becomes {4, 0, 1, 0}.
#include
using namespace std;
int main() {
const int SCORES_SIZE = 4;
int lowerScores[SCORES_SIZE];
int i = 0;
lowerScores[0] = 5;
lowerScores[1] = 0;
lowerScores[2] = 2;
lowerScores[3] = -3;
/* Your solution goes here */

Answers

In C++, you can use a for loop to iterate through the elements of the lowerScores array and subtract 1 from each element. If the element is already 0 or negative, assign 0 to the element. Here's the code:

```cpp
#include
using namespace std;

int main() {
   const int SCORES_SIZE = 4;
   int lowerScores[SCORES_SIZE] = {5, 0, 2, -3};
   int i;

   for (i = 0; i < SCORES_SIZE; ++i) {
       if (lowerScores[i] > 0) {
           lowerScores[i] -= 1;
       } else {
           lowerScores[i] = 0;
       }
   }

   for (i = 0; i < SCORES_SIZE; ++i) {
       cout << lowerScores[i] << " ";
   }

   return 0;
}
```

This code initializes the lowerScores array with the given values, then iterates through the array elements, updating each one based on the specified conditions. After the loop, the lowerScores array will become {4, 0, 1, 0}.

learn more about array here:

https://brainly.com/question/30757831

#SPJ11

What device is required to connect to the Internet?
O Wi-Fi
O an ISP
a router
a modem​

Answers

Answer:

modem

Explanation:

The primary piece of hardware you need is a modem. The type of Internet access you choose will determine the type of modem you need. Dial-up access uses a telephone modem, DSL service uses a DSL modem, cable access uses a cable modem, and satellite service uses a satellite adapter.

Answer:

D

Explanation:

Edg 2021

Does anyone have the answer for assignment 8: Personal organizer on project stem?

Answers

Answer: a personal adhesive is an application that helps both students and teachers looking up a  video will be helpful

Explanation:

I'm sorry I cant be much help thats all I can think of

What are the most important advantages of 5G wireless
technologies?(5 points)
What are the potential disadvantages of 5G wireless
technologies? (5 points)
Which industry or business sector, in your op

Answers

5G wireless technology is the latest generation of cellular mobile networks, providing increased speeds and lower latency. The advantages of 5G wireless technology are listed below:

1. Speed: With 5G, the speed is ten times faster than 4G, providing faster download and upload speeds.

2. Low latency: 5G network provides lower latency as compared to previous generations, making it ideal for real-time applications such as gaming, AR/VR, etc.

3. Increased capacity: The 5G network can handle more connected devices at once, reducing congestion in high-traffic areas and increasing capacity.

4. Improved network coverage: 5G network technology provides improved network coverage and connectivity in remote areas.

5. Enables new technologies: 5G technology allows for new technologies such as autonomous vehicles, smart cities, and the Internet of Things to be implemented.

The potential disadvantages of 5G wireless technologies are:

1. Cost: 5G infrastructure is expensive to install and maintain, which could be a disadvantage for users.

2. Limited range: 5G technology provides less range than previous generations, meaning more cell towers and infrastructure is needed.

3. Security concerns: 5G technology is vulnerable to hacking and cyber-attacks, which could be a potential disadvantage for users.

4. Interference with weather forecasting: 5G frequencies can interfere with weather forecasting capabilities, which could be a significant disadvantage for meteorologists and weather forecasters.

In my opinion, the industry or business sector that would benefit most from 5G wireless technology is the telecommunications industry. The telecommunication industry will benefit from increased network capacity and coverage, as well as faster download and upload speeds, allowing for more efficient communication and data transfer.

Learn more about 5G network here:

https://brainly.com/question/17473574

#SPJ11

Create a C++ program to compute the average of three tests or quizzes and display the score and average on distinct lines, and do it using arithmetic operators.

Answers

#include <iostream>

#include <vector>

#include <numeric>

int main() {

   

   std::vector<int> store(3);

   

   for(int i=0;i<3;i++){

       std::cout << i+1 << ". test result: ";

       std::cin>>store[i];

   }

   

   for(int i=0;i<3;i++) {

       std::cout << i+1 << ". test score: " << store[i] << std::endl;

   }

   

   std::cout << "Average: " << double(std::accumulate(store.begin(),store.end(),0.0)/store.size()) << std::endl;

   return 0;

}

Write a code segment to change the name of the Thing object, something, such that the new name consists of the old name with one character removed at random. For example, if something has name "ABCD", its new name could be set to "ACD". Write the code segment below. Can you help me by writing it in java?

Answers

A code segment to change the name of the Thing object, something, such that the new name consists of the old name with one character removed at random is given below:

The Code Segment

// C++ program to check whether two strings are anagrams

// of each other

#include <bits/stdc++.h>

using namespace std;

/* function to check whether two strings are anagram of

each other */

bool areAnagram(string str1, string str2)

{

// Get lengths of both strings

int n1 = str1.length();

int n2 = str2.length();

// If length of both strings is not same, then they

// cannot be anagram

if (n1 != n2)

 return false;

// Sort both the strings

sort(str1.begin(), str1.end());

sort(str2.begin(), str2.end());

// Compare sorted strings

for (int i = 0; i < n1; i++)

 if (str1[i] != str2[i])

  return false;

return true;

}

// Driver code

int main()

{

string str1 = "gram";

string str2 = "arm";

// Function Call

if (areAnagram(str1, str2))

 cout << "The two strings are anagram of each other";

else

 cout << "The two strings are not anagram of each "

   "other";

return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Write a code segment to change the name of the Thing object, something, such that the new name consists

what pillar allows you to build a specialized version of a general class, but violates encapsulation principles

Answers

The pillar which allows you to build a specialized version of a general class but violates encapsulation principle is inheritance. In inheritance pillar you can create a general class or specifically a parent class and acquire another object method and properties.

Inheritance in Object Oriented Programming (OOP)

Four pillars of Object Oriented Programming are abstraction, encapsulation, inheritance, and polymorphism. In inheritance an object can acquire another general object characteristics. It's like a child who inherited the parent's characteristics. What's the benefit of this pillar? Of course, reusability of the object, so you don't have to repeat a block code over and over again. This makes the code clean, simple and effective.

Learn more about programming language https://brainly.com/question/16397886

#SPJ4

A prime number is a positive integer that is evenly divisible only by 1 and itself. Write a predicate function called is_prime that accepts an integer parameter and returns true if that number is prime and false otherwise. Assume that the parameter is a positive integer.

Answers

The requirement of the given question is that we need to write a function that takes a positive integer number as a parameter and checks if the number is a prime number or not. If the number is a prime number then it returns true. But if the number is not a prime number then it returns false.

The required function is written here in Python:

def is_prime(number): ''' This is function named “is_prime” that accepts a     positive integer “number” as a parameter’’’

if number < 2: '''It checks if the “number” is less than 2. The smallest                                                   prime number is 2 so no need to check numbers less                                              than 2'''

return False ''' If the above condition is true , it returns “false” that the                 “Number” is not prime.'''

for i in range(2, number):  '''This is for loop runs with an increment of one through all numbers specified in the “range function”                                             i.e. from 2 to the value of “number” exclusively'''

  if (number % i) == 0:     ''' Checks if ”0” remainder is found, then           the “number” is not prime'''

    return False        # “Number” is not prime so it returns “false”

return True '''When it has looped through the entire range of                                                               values from 2 to “number-1” and does not find a value that gives “0” remainder, then the “number” is prime, thus returns “true”.'''

You can learn more about prime number at

https://brainly.com/question/145452

#SPJ4

I NEED THIS ASAP!!! I"LL GIVE 30 PTS.!!!

2 things are required to make a loop: a. ______________ b. _____________

Answers

Answer:

(not quite sure what the question is asking seems you need, but bare minimum is)

an initial value and an increment or decrement

a condition where the loop stops

Explanation:

assuming you have the structure for the loop, depending on the language it could be a for, while or until command. You will always need the initial value for the variable your looping on, how it changes (increment or decrement) and then a condition when the looping in to stop.

e.g. say you want to add up the numbers from 1 to 10, inclusive

sum = 0

for I is 1 to 10 incremented by 1

sum=sum+I

end of loop

How do you check to see if the user entered more than one character? Complete the code.

letter = input("Enter a letter: ")
if _____ > 1:
print("\nPlease guess a single letter.\n")

letter.len()

length(letter)

letter.length()

len(letter)

Answers

Answer:

1len(letter)

Explanation:

JUST GOT IT RIGHT

The code is letter = input("Enter a letter: ") if len(letter) > 1:print("\nPlease guess a single letter.\n")

What is code?

There are four kinds of coding:

Data compression (or source coding)Error control (or channel coding)Cryptographic coding.Line coding.

The description of a code is a set of rules or a method of communication, often with erratically assigned numbers and letters given specific definitions.

An illustration of code is the state's vehicle laws. An example of code is a made-up vocabulary that two children use to articulate to each other.The total numeral of computer languages to exist is approximately 9,000, though there are 50 that are the most famous programming languages in use today.

To learn more about code, refer to:

https://brainly.com/question/25605883

#SPJ2

i want pizzzzzzzaaaaaaaaaaa

Answers

sameeeeeeeeeeeeeeeeeeeee

Who plays patchy the pirate in SpongeBob SquarePants

Answers

Patchy the Pirate in SpongeBob SquarePants is played by Tom Kenny.

How to hide location on iphone without them knowing?.

Answers

Go to the settings, go to location, go to do not share my location, unless its from an app, then go to the app in settings it should say share location click the sliding button make it look grey

is a keyboard a software?

Answers

Answer:

Yes

Explanation:

Because it's apart of software hope this helps

The hardware is all the tangible computer equipment, such as the keyboard and mouse. The software is what makes the hardware work or lets you get things done, such as writing documents with Microsoft Word or playing a Solitaire game.

Is a keyboard a software or hardware?
Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, the software is the set of instructions that can be stored and run by hardware.


Hope it helps, have a great day!❤️✨

A student is doing research comparing mothers who work outside the home versus mothers who do not have an outside job. The student thinks that both ways are fine and hopes to find evidence that children are successful in both scenarios. One website claims that all mothers need to work outside the home and to do otherwise is deplorable. What is the most obvious characteristic this website lacks?

This website lacks blank
pls help asap

Answers

Answer:

they need some travis scott in their life

Explanation:

write the method heading for a method called larger that accepts 2 integer arrays and returns the array with the larger number of elements.

Answers

Writing a function to compute the average of the even numbers in the array is required for this application.

The percentage function When given an array of integers as a parameter or argument, even prints the average of the even numbers. The code below implements the aforementioned functionality in Python, and the code's output is also included. In computer science, an array is a group of objects (values or variables). At least one array index or key is used to uniquely identify each element. Given its index tuple, a mathematical formula can determine each element's location in an array. The simplest basic type of data structure is a linear array, sometimes known as a one-dimensional array. Since a two-dimensional grid can theoretically be used to represent a matrix, two-dimensional arrays are occasionally referred to as "matrices."

Learn more about array here:

https://brainly.com/question/28945807

#SPJ4

which meaning does the abbreviation c/c represent?

Answers

The phrase "carbon copy" alludes to the message's recipient whose location appears after Cc: header.

What does CC stand for?

Carbon copies: To let the recipients of a business letter know who else received it, a cc designation would be placed at the bottom of the letter, followed by the names of those who received carbon copies of the original. The term "cc" in emails refers to the additional recipients who received the message.

A typical email will have a "To" box, a "CC" field, and only a "BCC" section that allows you to enter email addresses. The abbreviation for carbon copy is CC. "Blind carbon copy" is what BCC stands for. The abbreviation BCC stands in blind carbon copy, while Cc stands for carbon copy. When copying someone's email, use Cc for copy them openly or Bcc to copy them secretly.

To learn more about carbon copy refer to :
brainly.com/question/11513369
#SPJ4

Joseph is a software developer for a company that creates smartwatches. Which type of operating system software does he create? (5 points)

Embedded OS
Stand-alone OS
Network OS
Client OS

Answers

Joseph, being a software developer for a company that creates smartwatches, would most likely be involved in creating an embedded operating system (OS).

What is an Embedded OS?

An embedded OS is a specialized type of operating system designed to run on small devices like smartwatches, smartphones, and other embedded systems. It's different from a standalone or client OS, which runs on personal computers, laptops, or servers, and from a network OS, which is designed for managing network resources.

Embedded OSs are typically stripped-down versions of traditional OSs, with a smaller footprint and lower resource requirements, optimized for the limited resources of embedded devices.

Read more about OS here:

https://brainly.com/question/22811693

#SPJ1


What is output if the user types in 8? Click all that apply.

Answers

Answer:

can u show a picture??? or something

Which of these jobs would be most appropriate for someone who majors in information systems? A. Managing a group of programers B. Creating a cloud based customer service application app C. Providing telephone tech support D. Designing a database for an online retailer.

Answers

Answer:

B. Creating a cloud based customer service application app

Explanation:

Information Systems is described as an "academic study of various systems encompassing a particular reference associated with the complementary networks and information of the software and hardware that different organizations and people use to collect, create, process, distribute, and filter data.

The information system includes an integrated pair of different components for storing, collecting, and processing data, along with this, it is utilized for providing knowledge, information, and digital products.

In the question above, the correct answer is option-B.

what conditional programming construct allows a program to select one of three or more distinct outcomes by placing one conditiional construct inside another? question 32 options: loop statement declaration statement nested if statement counting statement

Answers

A conditional programming construct allows a program to select one of three or more distinct outcomes by placing one conditional construct inside another is: C. nested if statement.

The types of control structure.

In Computer programming, there are different types of conditional programming construct and these include the following:

Loop statementNested if statementFor LoopWhile LoopIf/Else StatementIf Statement

What is an if statement?

An if statement can be defined as a type of conditional statement that is written by a computer programmer to handle decisions by running a different set of statements, depending on whether an expression is either true or false.

Similarly, a nested if statement refers to a type of conditional programming construct that is placed inside another if statement in order to test a combination of conditions before selecting the distinct outcomes.

Read more on nested if statement here: https://brainly.com/question/26500953

#SPJ1

Explain briefly what would happen if marketing research is not conducted before a product is developed and produced for sale.

Answers

Neglecting to do market research can result in indecision and inaction, fear of risk or the truth, and/or too many options, which can lead to paralysis. ... When launching a new product, effective market research will help you narrow down your true market potential and your most likely customers.

model of social relations, individuals go through life embedded in a personal network of individuals to whom they give and from whom they receive social support.

Answers

According to the social convoy theory of social relationships, people live their lives as part of a personal network of people to whom they provide support and from whom they receive it.

What is the meaning of social convoy?

The people that travel with us on the road of life are referred to as the social convoy. At every stage of development, this social grouping is a crucial component of successful adjustment and wellbeing.

As one matures and develops, they rely on these interactions and connections because all are social beings. Social convoy is a network of friends that travel through life with us and support us through both good and difficult times.

Learn more about social convoy from here:

https://brainly.com/question/7318152

#SPJ1

The complete question has been attached in text form:

In the social ______ model of social relations, individuals go through life embedded in a personal network of individuals to whom they give and from whom they receive social support.

3 things in terms of photography to learn about.

Answers

The three important principle in photography are;

Light Subject and Composition.

What is the explanation for these terms?

Photography is about light. Without it, you couldn't even take images, let alone excellent ones.

The quality of light varies from one to photograph, yet it is always what gives your photographs their underlying structure. It doesn't get any more basic than that.

Most of us snap photos because something catches our attention.

Unsurprisingly, that "something" is your subject.

If you're explaining a photograph to someone else, the topic is most likely the first thing you'll mention.

Finally, the composition is the third and most important aspect of every shot.

Simply said, composition is the arrangement of the things in your shot. It includes your camera position, the connections between photo elements, and the things you accentuate, deemphasize, or altogether eliminate. Composition is the method through which you communicate your tale.

Learn more about photography:
https://brainly.com/question/30685203
#SPJ1

PLEASE HURRY 50 POINTS
Perform online research and find out the different types of spreadsheet software programs in use. Then, list their features, and identify the areas in which people use them.

Answers

Answer:

One part of Clare’s job at an environmental awareness organization is to answer the phone to collect donations. The table shows the number of hours she worked each week, , and the amount of donations in dollars, , that the organization collected each week for 10 weeks.

Question 26 (5 points) Make ONE malware example for each of the following malware categories. Then,
explain how each of these examples works: a. Imprison b. Launch c. Snoop d. Deceive e. Evade

Answers

a. Ransomware, a type of malware, falls under the imprison category. It encrypts files, demands ransom, and provides a decryption key upon payment.

b. Botnets, a type of malware, fall under the launch category. They create networks of infected computers used for coordinated attacks.

c. Keyloggers, a type of malware, fall under the snoop category. They record keystrokes to capture sensitive information.

d. Phishing malware falls under the deceive category, imitating legitimate websites to trick users into revealing personal information.

e. Rootkits, a type of malware, fall under the evade category. They modify operating systems to hide their presence from security software.


a. Imprison: An example of malware that falls under the imprison category is ransomware. Ransomware encrypts the victim's files, making them inaccessible, and demands a ransom in exchange for the decryption key. Once the victim pays the ransom, the attacker provides the decryption key to unlock the files. Ransomware can be distributed through malicious email attachments or infected websites.

b. Launch: A type of malware that falls under the launch category is a botnet. A botnet is a network of infected computers controlled by a central command and control server. The malware infects computers, turning them into "zombies" that can be used to launch coordinated attacks, such as DDoS (Distributed Denial of Service) attacks. The command and control server sends instructions to the infected computers, directing them to launch attacks on targeted systems.

c. Snoop: Keyloggers are an example of malware that falls under the snoop category. Keyloggers record keystrokes made by a user on their computer or device. This allows the attacker to capture sensitive information such as passwords, credit card numbers, or personal messages. Keyloggers can be delivered through infected websites, phishing emails, or malicious downloads.

d. Deceive: Phishing malware is an example of malware that falls under the deceive category. Phishing malware imitates legitimate websites or services, tricking users into entering their sensitive information, such as usernames, passwords, or credit card details. The attacker then uses this information for identity theft or financial gain. Phishing malware can be delivered through emails, social media messages, or malicious links.

e. Evade: Rootkits are an example of malware that falls under the evade category. Rootkits modify the operating system to hide their presence and evade detection by security software. They can alter system files, processes, or drivers, making it difficult for antivirus software to detect or remove them. Rootkits are typically installed through vulnerabilities in software or by exploiting security weaknesses.

It is important to note that these are just examples, and there are many variations and subcategories within each malware category. The examples provided give you an idea of how each category works, but it's essential to stay vigilant and use security measures to protect against these threats.

Learn more about Phishing malware here :-

https://brainly.com/question/30586462

#SPJ11

You have an Active Directory forest named csmtech.local and two Active Directory domains in the forest named csmpub.local and csmsales.local. You want the DNS servers in each domain to be able to handle DNS queries from client computers for any of the other domains. DNS servers in the csmtech.local and csmpub.local domains should be authoritative for their own domains and the csmsales.local domain. However, DNS servers in csmsales. local should be authoritative only for csmsales.local. How should you set up the DNS servers and zones to handle this situation? Explain how the DNS servers in each domain should be configured with zones. Be sure to include information about replication scope and zone types.

Answers

Answer:

ecognize a statistical question as one that anticipates variability in the data related to the ... right now?” a) The ... c) This is not a statistical question because there ... predicted that more people sent 80 to 99 emails than 0 to 19 emails per week. Complete the histogram to represent the data. Is Lisa's prediction valid?

Explanation:

Question 6 [10 marks] a) How does a company's use of information systems affect its corporate strategies? (7 marks) b) Provide an example. (3 marks)

Answers

Answer:

following are the responses to the given question.

Explanation:

The capability to successfully utilize IT is mutually dependent on its ability to execute strategic strategy and set business goals. The ability to compete more and more relies on the capacity of an organization of using technology. In the future, what a company wants to do will rely on what its technologies can do. It may be an example of a company investing in information technology that allows a company to manufacture new products or improve the efficiency of the distribution system to the corporation's economic efficiency.

Chatbots are primarily responsible for _______.

thinking outside the box with customers

using instant messaging to collect email addresses and provide information about the company’s products

conducting all customer service interactions for the company

identifying customer requests so that a live agent can respond at a later time

Answers

Chat bots are primarily responsible for conducting all customer service interactions for the company. They use artificial intelligence to understand and respond to customer queries, providing efficient and effective customer support.

Chat bots are programmed to engage in conversations with customers through various communication channels, such as websites or messaging apps. When a customer interacts with a chat bot, it uses artificial intelligence and natural language processing to understand the customer's query or request.

Chat bots can handle a large volume of customer interactions simultaneously, making them efficient and scalable for companies with a high volume of customer inquiries.If the chat bot cannot resolve a customer's issue, it can escalate the conversation to a live agent for further assistance.In summary, chat bots are primarily responsible for conducting customer service interactions for a company.

To know more about interactions visit:

https://brainly.com/question/31385713

#SPJ11

Other Questions
What was the Louisiana purchase How do the body systems interact to make Usain Bolt run faster? if ln =54 and lm= 31 find mn What are the like terms in the expression below?3x + 8 + 3y + 8xA 8 and 8x C 3x and 8xB 3x and 3y D 3x, 3y, and 8 Political _____ is the translation of personal preference into voluntary action designed to influence public policy. the practice of training reporters to produce a standardized, seemingly neutral news product was the result of which data type should normally not be used to control a counting loop? Please help me this is 39 pts!1. "Maddy loved to go to the park and feed the ducks when she was feeling down." Which method is the author using to develop Maddy's character?-describe a character's personality-write something a character saidtell about something a character did-describe how a character looks During photosynthesis, energy is transferred from...A. sunlight to ATPB. carbon dioxide to oxygenC. water to oxygen D. sunlight to glucose help tool manufacturing has an expected ebit of $89,000 in perpetuity and a tax rate of 23 percent. the firm has $250,000 in outstanding debt at an interest rate of 5.5 percent, and its unlevered cost of capital is 11.4 percent. what is the value of the firm according to m Each concert ticket costs $2. Eight students sold 96 concert tickets. If each of the students sold the same number of tickets, how much did each student collect? Which explanation for psychological disorders would suggest that they occur when people have trouble balancing their basic instinctual urges against the demands of society Write an email to your friend telling her about what jop you'd like to do in the future Use the method of variation of parameters to find a particular solution of the differential equation 4y" 4y +y = 16et/2 that does ' not involve any terms from the homogeneous solution. = Y(t) = What does pedal pulse indicate? All contains two distinct points,C and D. Select each statement. 2x3, find h(6)h(6). Write an equation that is perpendicular to y=6x+3y=6x+3 and goes through the point (12,10)(12,10). sin7x - sin3xcos 7x - cos3x the following is not a characteristic of bsc: select one: a. it integrates communication with irregularity. b. it articulates the factors that drive the strategy of the organization. c. it defines the development of performance indicators for each goal. d. it defines in particular the critical goals to achieve success.