What are the two types of malicious code?

Answers

Answer 1

There are many different types of malicious code, but two common categories are viruses and worms. A virus is a type of malware that is designed to replicate itself and spread to other computers by attaching itself to a host program or file. A worm, on the other hand, is a standalone program that can replicate itself and spread to other computers without needing to attach itself to a host program or file. Other common types of malicious code include Trojans, ransomware, and spyware.


Related Questions

Draw a circuit with a 12-volt battery and two resistors(100 ohms and 200 ohms) in parallel. What is the total resistance of the circuit?

Answers

The total resistance in the circuit is 66.67 ohm.

What is a circuit?

The circuit is a path designed for the flow of current. We can see that the resistors are connected to a common junction (in parallel) as shown in the image attached to this answer.

The total resistance is obtained from;

1/Rt= 1/R1 + 1/R2

1/Rt= 1/200 + 1/100

1/Rt= 0.005 + 0.01

Rt = 66.67 ohm

Learn more about resistance:https://brainly.com/question/21082756

#SPJ1

Draw a circuit with a 12-volt battery and two resistors(100 ohms and 200 ohms) in parallel. What is the

Answer:

The total resistance in the circuit is 66.67ohm

Make each word to its correct meaning baiting click-jacking cross-site scripting

Answers

Answer:

Explanation:

Sure! Here are the correct meanings for the given terms:

1. Baiting: Baiting refers to the act of enticing or luring someone into a trap or a specific action, often through deception or manipulation.

2. Click-jacking: Click-jacking is a technique used by malicious actors to trick users into clicking on a seemingly innocent element or link on a webpage, which actually performs a hidden action or leads the user to unintended destinations. It is designed to deceive and hijack the user's clicks for nefarious purposes.

3. Cross-site scripting: Cross-site scripting (XSS) is a security vulnerability that occurs when an attacker injects malicious scripts into a trusted website or web application. When other users visit the affected site, the injected scripts can execute on their browsers, potentially allowing the attacker to steal sensitive information, perform unauthorized actions, or manipulate the website's content.

I hope this clarifies the meanings of the terms "baiting," "click-jacking," and "cross-site scripting" for you.

When creating a PowerPoint presentation, what does it mean to apply movement to text or an object to control its display during the presentation? Group of answer choices animate hyperlink slide layout transitions

Answers

Answer:

animate

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

Furthermore, slide transition is an inbuilt feature of a presentation software that automatically changes the slides at regular intervals.

Generally, when a PowerPoint presentation is created, applying movement to a text or an object in order to control its display during the presentation is simply referred to as animation. There are various animation effects that could be applied by the user depending on his or her choice.

A web page's content can change based on how the user interacts with it.

Answers

Yes | Mostly

Many websites use cookies and more extensions were it collects data to personalize the results you find. For example you go on a website everyday are daily news and you like to read about crime around you. If the website uses cookie or other extensions, they can personalize on that topic and it might take down your location for more news around you. Hope this helps!

Answer:

A  dynamic  web page's content can change based on how the user interacts with it.

Explanation:

dynamic web page: a web page that contains elements that change

to track and collect alerts generated by a network monitoring system and pass them to a central server, where they can be automatically picked up, evaluated, and, when appropriate, logged as an incident, a system would be best.

Answers

All occurrences are recorded, all recordings are kept forever, and there is endless time and money to go over all the recorded data in digital investigative heaven.

Commercially available log gathering, analysis, and reporting systems are available. In addition to options for storing logs, log management systems include a configuration interface that enables administrators to set log retention parameters for each specific data source. The essential nonrepudiation capabilities, such as "signing" logs with a calculated hash that can be afterwards compared to the files as a checksum, are also provided by log management systems at the time of collection. After being gathered, the logs can also be searched, analyzed, and produced prefiltered reports that display log data pertinent to a certain function or purpose.

Learn more about Management here-

https://brainly.com/question/14523862

#SPJ4

Give a recursive definition for strings of properly nested parentheses and curly braces. For example ({}){}() is properly nested but ({)} is not

Answers

To provide a recursive definition for strings of properly nested parentheses and curly braces, we can define the base case and the recursive step.

Base case: An empty string is considered to be properly nested. Recursive step: If a string starts with an opening parenthesis "(" followed by a properly nested string, followed by a closing parenthesis ")", it is considered to be properly nested. If a string starts with an opening curly brace "{" followed by a properly nested string, followed by a closing curly brace "}", it is considered to be properly nested.

A recursive definition for strings of properly nested parentheses and curly braces is when a string is either empty or starts with an opening parenthesis/curly brace followed by a properly nested string followed by the corresponding closing parenthesis/curly brace.

To know more about parentheses visit:-

https://brainly.com/question/33546918

#SPJ11

Which of the following is a highly secure public facility in which backbones have interconnected data lines and routers that exchange routing and traffic data?
Select one:
a. ISP
b. NAP
c. NSF
d. POP

Answers

A NAP is the highly secure public facility in which backbones have interconnected data lines and routers that exchange routing and traffic data. It plays a crucial role in ensuring the efficient and secure functioning of the Internet.

The highly secure public facility that has interconnected data lines and routers that exchange routing and traffic data is known as a Network Access Point (NAP). A NAP is a physical location where multiple Internet Service Providers (ISPs) connect their networks to exchange Internet traffic. NAPs are designed to provide a high level of security to ensure the privacy and integrity of the data being exchanged between the networks.

A NAP is typically operated by a neutral third party that provides the necessary infrastructure and security measures. These facilities are essential for the proper functioning of the Internet as they allow for efficient and reliable data exchange between networks.

In contrast, ISPs are private companies that provide Internet connectivity to customers. A Point of Presence (POP) is a location where an ISP provides access to its network. A National Science Foundation Network (NSF) is a high-speed network that connects research institutions and universities in the United States.

Learn more about NAP here:

https://brainly.com/question/31759946

#SPJ11

Q4 - The folder Stock_Data contains stock price information (open, hi, low, close, adj close, volume) on all of the stocks listed in stock_tickers.csv. For each of the stocks listed in this file, we would like to compute the average open price for the first quarter and write these results to new csv called Q1_Results.csv.

a)First read the 20 stock tickers into a list from the file stock_tickers.csv

b) Next, create a dictionary where there is a key for each stock and the values are a list of the opening prices for the first quarter

c)The final step is writing the result to a new csv called Q1_results.csv

Answers

The Python code reads stock tickers from a file, calculates the average opening prices for the first quarter of each stock, and writes the results to "Q1_Results.csv".

Here's an example Python code that accomplishes the tasks mentioned:

```python

import csv

# Step a) Read stock tickers from stock_tickers.csv

tickers = []

with open('stock_tickers.csv', 'r') as ticker_file:

   reader = csv.reader(ticker_file)

   tickers = [row[0] for row in reader]

# Step b) Create a dictionary with opening prices for the first quarter

data = {}

for ticker in tickers:

   filename = f'Stock_Data/{ticker}.csv'

   with open(filename, 'r') as stock_file:

       reader = csv.reader(stock_file)

       prices = [float(row[1]) for row in reader if row[0].startswith('2022-01')]

       data[ticker] = prices

# Step c) Write the results to Q1_Results.csv

with open('Q1_Results.csv', 'w', newline='') as results_file:

   writer = csv.writer(results_file)

   writer.writerow(['Stock', 'Average Open Price'])

   for ticker, prices in data.items():

       average_open_price = sum(prices) / len(prices)

       writer.writerow([ticker, average_open_price])

```

In this code, it assumes that the stock tickers are listed in a file named "stock_tickers.csv" and that the stock data files are stored in a folder named "Stock_Data" with each file named as the respective stock ticker (e.g., "AAPL.csv", "GOOGL.csv").

The code reads the stock tickers into a list, creates a dictionary where each key represents a stock ticker, and the corresponding value is a list of opening prices for the first quarter. Finally, it writes the results to a new CSV file named "Q1_Results.csv", including the stock ticker and the average open price for the first quarter.

Please note that you may need to adjust the code based on the specific format of your stock data CSV files and their location.

To learn more about tickers, Visit:

https://brainly.com/question/13785270

#SPJ11

Marking Brainliest if correct!
One purpose of a network is...
A. Sharing software
B. Compiling program
C. Changing software
D. Starting up the computer

Answers

B. Compiling Program

Answer:

compiling program os correct Mark me brainlist

data inputs should appear more than once in a spreadsheet. (T/F)

Answers

False. In a spreadsheet, data (variables) shouldn't ever appear more than once. Excel does not allow for the simultaneous display of numerous spreadsheets.

How many various data kinds can we enter into a worksheet?

Data entry options include entering information into a single cell, many cells at simultaneously, or across multiple worksheets. You can enter data in the form of numbers, text, dates, or times. There are numerous methods to format the data.

Can we enter four different kinds of data into a worksheet?

The four main forms of Excel values are referred to as data types. Text, number, logical, and error are the four different forms of data. With each category, you can accomplish a variety of tasks.

To know more about spreadsheet visit :-

https://brainly.com/question/10509036

#SPJ4

What is the difference between hardware and software?

Answers

A Hardware is any physical device used in. You can touch hardware, but you cannot touch software. Hardware is physical, and software is virtual. (brainliest) ??

An end-user has reported that a legitimate sender sent an unexpected email stating the user needed to urgently update the password account information to a vendor website. Once the user clicked on the URL in the email, the user was taken to a landing page to update the user's credentials. The user entered the credentials, despite noticing the URL was slightly misspelled. What happened in this situation

Answers

Group of answer choices.

A) The attacker has sniffed the user's packets on the user's local network and has captured the user's credentials in plain text.

B) The user is a victim of a pharming attack by using social engineering to trick the user into clicking a link that redirected their traffic to a spoof website.

C) The user is the victim of an impersonation attack, where the attacker used intimidation by coaxing the target and engaging with them by putting them at ease.

D) The user is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website.

Answer:

D) The user is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website.

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

This ultimately implies that, the user in this scenario is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website to make it look like a credible, authentic and original one.

Answer:

D) The user is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website.

the working of the internet can be modeled by the 4 layer tcp/ip model. which ways does tcp, the transport control protocol layer interact with the other layers of the internet? select two answers.

Answers

The transport control protocol (TCP) layer is one of the four layers in the TCP/IP model and is responsible for ensuring reliable communication between applications running on different hosts.

TCP, the transport control protocol layer, interacts with the other layers of the internet in the following ways:

TCP interacts with the Application layer: TCP provides reliable, ordered, and error-checked delivery of data between applications running on different hosts. The TCP layer receives data from the application layer and segments it into smaller units known as packets.

TCP interacts with the Internet layer: The Internet layer uses the IP protocol to provide a connectionless service to the transport layer. TCP adds reliability to this connectionless service by providing error checking, flow control, and congestion control mechanisms. TCP also uses the IP protocol to transmit data between hosts and to route packets through the internet.

In summary, TCP interacts with the Application layer to receive data and with the Internet layer to provide reliability to the connectionless service provided by the IP protocol and to transmit data through the internet.

To know more about  transport control protocol click this link -

brainly.com/question/4727073

#SPJ11

Topology in networking essentially just means how the computers are interconnected with one another. True or false ?​

Answers

Answer: True

Explanation:

In networking, topology refers to the way in which computers are interconnected with one another. A network topology describes the layout of the connections between devices on a network, and it can have a significant impact on the performance, reliability, and security of the network.

Write a Python program to get the top three item prices in a shop. (15 points) Sample data: {'Apple': 0. 50, 'Banana': 0. 20, 'Mango': 0. 99, 'Coconut': 2. 99, 'Pineapple': 3. 99} Expected Output: Pineapple 3. 99 Coconut 2. 99 Mango 0. 99

Answers

To write a Python program to get the top three item prices in a shop. Here the code that represent the situation given:

def get_top_three_prices(items):

   sorted_items = sorted(items.items(), key=lambda x: x[1], reverse=True)

   top_three_items = sorted_items[:3]

   

   for item, price in top_three_items:

       print(item, price)

data = {'Apple': 0.50, 'Banana': 0.20, 'Mango': 0.99, 'Coconut': 2.99, 'Pineapple': 3.99}

get_top_three_prices(data)

How this codes work?

In order to determine the top three of the price. The program need to do the following step :

Create a dictionary containing the item names and pricesStep Use the `sorted()` function with the `reverse` parameter set to `True` to sort the dictionary by price in descending orderStep Loop through the sorted dictionary and print the top three items and their prices. Here's the Python code to get the top three item prices in a shop

As per data given, by following this steps, the top three items and their prices in the given shop are Pineapple for 3.99, Coconut for 2.99, and Mango for 0.99.

Learn more about looping

https://brainly.com/question/31033657

#SPJ11

Which term describes the degree to which a network can continue to function despite one or more of its processes or components breaking or being unavailable?

fault-tolerance

file tolerance

fault-line

file protection

Answers

Answer:

the answer is fault tolerance

Explanation:

Answer:

fault-tolerance

Explanation:

On Edge, fault-tolerance is described as the degree to which a network can continue to function despite one or more of its processes or components breaking or being unavailable.

I hope this helped!

Good luck <3


In an answer of at least two well-developed paragraphs, explain how the government
is involved in the circular flow of money and the circular flow of products.

Answers

The government plays a significant role in the circular flow of money and the circular flow of products. In the circular flow of money, the government acts as a regulator and stabilizer of the economy. The government regulates the economy by setting monetary and fiscal policies that influence interest rates, inflation, and economic growth. For instance, the government can use its monetary policy tools to increase or decrease the money supply, which affects the spending power of consumers, businesses, and financial institutions. This, in turn, affects the circular flow of money in the economy.

The government is also involved in the circular flow of products by creating policies and regulations that affect the production, distribution, and consumption of goods and services. For example, the government can set standards for the quality and safety of products, which affects the production and distribution processes. The government can also provide subsidies and tax incentives to promote the production and consumption of certain products. Additionally, the government can impose tariffs and trade barriers to protect domestic industries and regulate imports and exports, which affects the flow of products in the economy. Overall, the government's involvement in the circular flow of money and the circular flow of products is crucial in promoting economic stability, growth, and development.

how does credit card fraud detection work when might detection fail?

Answers

NEED THIS ASAP!!) What makes open source software different from closed source software? A It is made specifically for the Linux operating system. B It allows users to view the underlying code. C It is always developed by teams of professional programmers. D It is programmed directly in 1s and 0s instead of using a programming language.

Answers

Answer: B

Explanation: Open Source software is "open" by nature, meaning collaborative. Developers share code, knowledge, and related insight in order to for others to use it and innovate together over time. It is differentiated from commercial software, which is not "open" or generally free to use.

Task 2: Designing a Layout for a Website

Answers

Answer:

follow these steps Steps to Create Perfect Web Page Design Layout

1. Pen to paper ...

2. Add a grid to Photoshop and select your typography ...

3. Colors and layout ...

4. Think different ...

5. Focus on the details ...

Explanation:

what is a workbook? help please

what is a workbook? help please

Answers

Answer:

A wordbook is a book with questions for you to answer.

Explanation:

I used workbooks to learn when I was small, it's like many worksheets in a book. hop this helps :D

Franklin has a photographic assignment, and he needs to print some photographs using Adobe Photoshop. Which feature will help him see the
printed version of the document on the screen before he actually prints it?
The
feature in Photoshop will help Franklin see the printed version of the document on the screen before he actually
prints it.

Answers

Answer:

print preview

Explanation: i got it correct in plato

Answer:

print preview

Explanation:

on plato/edmentum

Which organization offers free benchmark tools for Windows and Linux?
a. PacketStorm Security
b. CVE
c. Center for Internet Security
d. Trusted Security Solutions

Answers

The Center for Internet Security is the company that provides free benchmarking software for Linux and Windows (CIS). CIS offers standards that were created by a group of cybersecurity professionals.

Why are firmware-infected rootkits regarded as the biggest threat to any embedded or general-purpose OS)?

Rootkits are particularly difficult to detect because they can hijack or subvert security software, which makes it possible that this kind of malware could survive on your computer for a long time and cause serious harm.

What operating system feature maintains track of which users are utilizing what resources and how much?

Accounting. The operating system's service maintains track of which users are using what resources—and how much—for accounting purposes as well as to compile consumption data.

to know more about Windows and Linux here:

brainly.com/question/14639136

#SPJ4

Murphy communications has been running a vlan-managed network to connect different devices. you as a network analyst want to assign a name to the vlan network, but you are unable to do so. what kind of vlan is most likely being used in the organization?

Answers

The kind of VLAN likely to be used in this organization is  Default VLAN

VLAN stands for Virtual Local Area Network. Default VLAN

Following the switch's initial bootup, all switch ports join the default VLAN. The broadcast domain is shared by all of these ports because they participate in the default VLAN. As a result, any device on any port can communicate with devices on other switch ports.

Any untagged data packets will be tagged with the default VLAN tag on ports with a configured default VLAN. Also, before leaving these ports, incoming data packets with the default VLAN tag will be untagged.

Configuring all switches' ports to be associated with VLANs other than VLAN 1 is a security best practice. Usually, to do this, all open ports are given to a black hole VLAN that is not used for any network activities.

learn more about Default VLAN here: https://brainly.com/question/5789383

#SPJ4

2. Say whether these sentences are True or False. a. Input is the set of instructions given to a computer to change data into information. the form of words numbers, pictures, sounds .it is true or false​

Answers

Answer:

I think it is false bcz the set of instruction given to computer is program.

What three key sequence will bring up the task manager?

Answers

Answer:

ctrl-shift-esc

Explanation:

Simply press Ctrl+Shift+Escape on your keyboard to bring up Task Manager. On the keyboard, press "Ctrl + Alt + Delete," you will see few options. To open Task Manager, select "Task Manager." To open Task Manager, right-click the Start button on the taskbar.

Write an LMC program as follows instructions:
A) User to input a number (n)
B) Already store a number 113
C) Output number 113 in n times such as n=2, show 113
113.
D) add a comment with a details exp

Answers

The LMC program takes an input number (n) from the user, stores the number 113 in memory, and then outputs the number 113 n times.

The LMC program can be written as follows:

sql

Copy code

INP

STA 113

INP

LDA 113

OUT

SUB ONE

BRP LOOP

HLT

ONE DAT 1

Explanation:

A) The "INP" instruction is used to take input from the user and store it in the accumulator.

B) The "STA" instruction is used to store the number 113 in memory location 113.

C) The "INP" instruction is used to take input from the user again.

D) The "LDA" instruction loads the value from memory location 113 into the accumulator.

E) The "OUT" instruction outputs the value in the accumulator.

F) The "SUB" instruction subtracts 1 from the value in the accumulator.

G) The "BRP" instruction branches back to the "LOOP" label if the result of the subtraction is positive or zero.

H) The "HLT" instruction halts the program.

I) The "ONE" instruction defines a data value of 1.

The LMC program takes an input number (n) from the user, stores the number 113 in memory, and then outputs the number 113 n times.

To know more about LMC program visit :

https://brainly.com/question/14532071

#SPJ11

what printer is commonly used to produce high-quality professional drawings such as architectural blueprints?

Answers

Answer:

Plotters are used to produce high quality professional drawings and images such as construction plans for buildings or blueprints for mechanical objects.

Answer:

Plotters are used to produce high quality drawings and images, such as construction plans for buildings or blueprints for mechanical objects.

Python programming using anaconda using Jupyter Notebook
file
1- You are ONLY allowed to use find() string method (YOU ARE NOT
ALLOWED TO USE ANY OTHER FUNCTIONS)
2- To get the full name from the user

Answers

To get the full name from the user using the find() string method in Python programming using Anaconda and Jupyter Notebook, you can follow these steps:

Create a new Jupyter Notebook file in your Anaconda environment.

Use the input() function to prompt the user to enter their full name and store it in a variable, let's say name_input.

Apply the find() method on the name_input variable to locate the position of the space character (' ') in the string. You can use name_input.find(' ') to accomplish this.

Retrieve the first name and last name from the name_input using string slicing. Assuming the space character is found at index space_index, you can use first_name = name_input[:space_index] to get the first name and last_name = name_input[space_index+1:] to get the last name.

You can now use the first_name and last_name variables as needed in your program.

Here's an example code snippet to demonstrate the above steps:

name_input = input("Enter your full name: ")

space_index = name_input.find(' ')

first_name = name_input[:space_index]

last_name = name_input[space_index+1:]

print("First Name:", first_name)

print("Last Name:", last_name)

Make sure to run each cell in the Jupyter Notebook to execute the code and see the output.

To know more about Python programming visit:

https://brainly.com/question/32674011

#SPJ11

what to do if you clicked on a phishing link on iphone?

Answers

They will have your ip but as long as you did not put any information into the site you are good if you did change email and password for the account. Explanation
Other Questions
Exercise 1 Underline the prefix in items 1 through 10 and the suffix in items 11 through 20. Using the meanings of the prefixes and suffixes listed above, write the meaning of the word. Check your answers in a dictionary.devaluate 160 N of force is applied to a 20kg object. How quickly will the object accelerate? WILL MARK BRAINLIEST PLS HELPPP!! L'agenda (the day-planner)You need to plan out your week, since you have so much to do! Please write out, inthe form of a daily to-do list, 15 sentences that explain what you, your friends, orfamily will do this week, and where. Since you will be discussing what you will bedoing in the future, use the verb aller + infinitive. Make sure you vary the verb forms(some may be 'l am going to, others 'We are going to, etc.), as well as the activitiesand the places. Include vocabulary from this lesson, especially the names ofbuildings that you will be visiting, during the week. Pls help Ill mark brainliest pls pls pls a 10 year old boy presents with high fever and a rash. the rash started on his wrists and ankles and has spread to his trunk, palms, and soles. the correct diagnosis is most likely: write 2 typical properties that are only common to transition metals Define how the changes in temperature changes and affects the cooling curve? State five important facts. I WILL GIVE A BRAINLIEST. Cobalt is an element with the formula, Co. How do you know cobalt is an element? The value of 7y2 is 10 more than the value of 2yPlease Do Help Holding all else constant, if a pencil manufacturer increases production from 12,260 to 13,610 when the market price of pencils increases by 12 percent, then the price elasticity of supply, using the midpoint method, must be ________, since the elasticity coefficient is_________. a. elastic, between 1.04 and 1.28 b. elastic, between 1.28 and 1.52. c. unit elastic, equal to 1.0 d. inelastic; between 0.75 and 0.89 e. inelastic between 0.89 and 0.98 2. According to the textbook, which of the following statements about drug interdiction is (are) correct? (x) Higher drug prices caused by drug interdiction policies may cause an increase in drug-related crime because drug addicts would have a greater need for quick cash. (y) Drug interdiction shifts the supply curve of drugs to the left, and, as a result, raises prices and total revenue in the drug market. (z) Advocates of drug interdiction argue that higher drug prices caused by such policies may discourage drug experimentation by young people a. (x), (y) and (z) b. (x) and (y) only c. (x) and (z) only d. (y) and (z) only e. (y) only julio pays 12.10 for 2.5 pounds of fish. what is the price per pound of fish what was kobes passion for sports 1) Which of the following is NOT an example of a microeconomics statement? a) The average price of all goods and services rose by 6.7% over the past 12 months in Canada. b) Canadian com producers were so efficient last year that total corn yield increased by 12%. c) The demand for e-bikes is increasing due to the aging population and the rising price of gas. d) The Canadian Autoworkers Union successfully negotiated a 3.5% increase in hourly wages for Honda autoworkers in Alliston, Ontario. 2) Pat can either drive to work which takes half an hour and uses $1.50 worth of gas. or take the bus which takes an hour and costs $1.00. If Pam is a rational decision-maker, how should she travel to work? a) Pat should take the bus because it costs $0.50 less than driving. b) Pat should drive because it saves half an hour relative to taking the bus. c) Pat should drive if saving half an hour is worth $0.50 or more. d) Pat should take the bus if saving half an hour is worth $0.50 or more. 3) A fall in the price of houses will shift the demand curve for houses to the right. a) True b) False Please check the attached. Fairly easy question. Which of the following might contribute to respiratory acidosis? Loss of gastric secretions from vomiting Accumulation of ketone bodies in a diabetic patient Obstruction of airways Hyperventilation Find the quotient for 7.868+1.4 Draw a germinating seedling Describe three strength training exercises that can be performed by adults at an average fitness level and then discuss at least two health benefits of strength training. the first number in this pattern is 25. the rule for this pattern is subtract 4. A cylinder has a surface area of 603 square feet and a diameter of 12 feet. Find the volume of the cylinder. Round your answer to the nearest cubic foot.