What must your motherboard have to use bitlocker encryption in windows 7/8/10 which will ensure that your hard drive cannot be used in another computer?

Answers

Answer 1

Your motherboard has a TPM chip to use BitLocker encryption in windows 7/8/10, which will ensure that your hard drive cannot be used on another computer.

A TPM chip, a special motherboard chip for features like BitLocker and Windows Hello, provides hardware encryption. Most motherboards available for purchase do not, however, come with a dedicated chip, but many do have firmware that can mimic TPM functionality in Windows.

TPM chip stores encryption keys, certificates and passwords among others, used to authenticate your personal computer or laptop. TPM chip improves computer privacy and security by protecting authentication credentials, protecting data, and proving software running basic functionalities.

Learn more about a TPM chip: brainly.com/question/10738411

#SPJ4


Related Questions

State the functions of :
\( \textsf{ \green{1)hub.}} \\ \: \: \: \: \: \: \textsf{ \orange{2)repeater.}} \\ \: \: \: \textsf{ \red{3)bridge.}} \\ \: \: \: \textsf{ \color{hotpink}{4)router.}}\)
\( \: \)
_________
Thank You! :)​

Answers

Answer:

Hello Mate,

Your Ans is Here:-

1) Hub:

Hubs are simple network devices, and their simplicity is reflected in their low cost. Small hubs with four or five ports with the requisite cables, they provide everything needed to create a small network. Hubs with more ports are available for networks that require greater capacity.

2) Repeater:

Repeaters are network devices operating at physical layer of the OSI model that amplify or regenerate an incoming signal before retransmitting it. They are incorporated in networks to expand its coverage area. They are also known as signal boosters.

3) Bridge:

A bridge is a class of network device that's designed to connect networks at OSI Level 2, which is the data link layer of a local-area network (LAN).4) Router:

router takes data packets from devices and directs them to the right place.

Different algorithms can be made to complete the same task in different ways.
options:
True
False

Answers

Answer:

True hope this helps you and everyone!

Answer:

as long as it's the same problem

You can create Sparklines for rows of data that you add later by using the _________ on an adjacent cell that contains a sparkline.

Answers

You can create Sparklines for rows of data that you add later by using the fill handle on an adjacent cell that contains a sparkline.

What is the best use for a sparkline?Sparklines are very small Excel cells that include charts. These graphs are used to display a trend over time or a dataset's fluctuation. By using this layer of visual analysis, you may employ these sparklines to improve the appearance of your boring data.The line sparkline uses a line chart to represent data values. Values are shown using a column chart in the column sparkline. Positive and negative numbers are displayed on the win/loss sparkline.A sparkline is a little graph that displays data visually in a worksheet cell. Sparklines can be used to emphasise maximum and lowest values as well as patterns in a range of values, such as seasonal rises or declines or economic cycles.

Learn more about sparkline refer to :

https://brainly.com/question/29832130

#SPJ4

with what section of sox would the it professional deal the most, and why?

Answers

The IT professional would most likely deal with the section of SOX concerning the protection of financial information. This section requires that companies have processes in place to ensure the accuracy and completeness of financial records, as well as the protection of information from unauthorized access.

The IT professional would deal the most with section 404 of SOX. This section requires companies to assess and report on the effectiveness of their internal controls over financial reporting. The IT professional plays a crucial role in ensuring that the company's information systems are secure and reliable, and that the financial data is accurately recorded and reported. This is important because any weakness or deficiency in the internal controls could lead to financial misstatements or fraud.

Learn more about  IT professional: https://brainly.com/question/29735142

#SPJ11

This question has two parts : 1. List two conditions required for price discrimination to take place. No need to explain, just list two conditions separtely. 2. How do income effect influence work hours when wage increases? Be specific and write your answer in one line or maximum two lines.

Answers

Keep in mind that rapid prototyping is a process that uses the original design to create a model of a part or a product. 3D printing is the common name for rapid prototyping.

Accounting's Business Entity Assumption is a business entity assumption. It is a term used to allude to proclaiming the detachment of each and every monetary record of the business from any of the monetary records of its proprietors or that of different organizations.

At the end of the day, we accept that the business has its own character which is unique in relation to that of the proprietor or different organizations.

Learn more about Accounting Principle on:

brainly.com/question/17095465

#SPJ4

"Caller ID" is the feature that displays the telephone number of the caller on the telephone of the person he or she calls. With Caller ID now routine and widely used, it might be surprising that when the service was first available, it was very controversial because of privacy implications. (a) What aspect of privacy (in the sense of Section 2.1.1) does Caller ID protect for the recipient of the call? What aspect of privacy does Caller ID violate for the caller? (b) What are some good reasons why a nonbusiness, noncriminal caller might not want his or her number displayed?

Answers

Answer: Provided in the explanation section

Explanation:

please follow this explanation for proper guiding.

(a)

i. What aspect of privacy does Caller ID protect for the recipient of the call?

* The beneficiary of the call utilizing the Caller ID highlight becomes more acquainted with who precisely the guest is, independent of the guest being a decent/terrible individual or authentic/ill-conceived call.  

* Depending on how the call went or wound up, i.e., the discussion, business, messages passed on, the beneficiary would have the option to act in like manner and suitably dependent on the guest and his message's respectability, habits, morals, demonstrable skill, or telephone decorums, and so forth.  

* Also, the beneficiary gets the alternative to choose how to manage the call even before him/her picking the call, when he/she comes to know who the guest is through Caller ID include, the beneficiary gets security by either separating the call, sending or diverting the call, recording the call, not noting the call, or in any event, blocking or announcing the number in any case. Along these lines, the beneficiary's security is ensured from various perspectives.

ii. What aspect of privacy does Caller ID violate for the caller?

* Even however as it were, in fact it distinguishes, confirms, and validates the guest demonstrating he/she is who he/she professes to be. In any case, the guest ID highlight or innovation unveils numerous information and data about the guest, for example, his accurate phone number or PDA number, nation code, the specific phone or versatile transporter organize he/she is utilizing, and so on., as this data may make dangers the guest's security, (for example, character burglaries or just assailants caricaturing others utilizing this current guest's data), classification, it might cause accessibility issue for the guest as when the guest is besieged with ill-conceived calls, spam, and undesirable calls, there are chances their telephone numbers could and would be imparted to many advertising and selling organizations or industry without the guest's assent, there are chances somebody focusing on the guest may tap or wire his/her significant, basic business, social, expert, individual, or private calls for touchy data to assault them and abuse the bantered data. The guest certainly loses his/her secrecy, opportunity, directly for discourse, security, and wellbeing when passing on messages over the call when they know there could be somebody tapping or recording the call, or even the beneficiary may abuse the guest's character and his/her passed on data.  

* Hence, the guest doesn't get the opportunity from reconnaissance i.e., from being followed, followed, watched, and spying upon by trouble makers.  

* The guest would lose the control of their data on how it would be put away or utilized.  

* The guest probably won't get opportunity from interruptions.

(b).  What are some good reasons why a non-business, non-criminal caller might not want his or her number displayed?

* A non-business and a noncriminal guest would need to enjoy typical, common, and regular exercises; mingle and do his/her own day by day close to home, private, and public activities' assignments, occupations, occasions, social occasions, correspondences, individuals organizing, and so on., without making any whine about things, exposure stunts, without causing anyone to notice tail, screen, follow, question, or explore the guest superfluously except if the guest has enjoyed, asked, stated, discussed, or passed on any message that is unlawful, exploitative, wrongdoing, and culpable.  

* Such a guest would need total or most extreme namelessness, as to them, guest ID innovation just uncovers their own and private life exercises, correspondences, and so forth., to others to pass judgment on them, question them, and later cross examine and research them on their interchanges.  

* Such guests for the most part search for security in general.  

* Specifically, such guests need classification of their calls, discussions, messages, call logs, and so forth.  

* The beneficiary on occasion may get the guest's private unlisted number without the guest's assent or authorization.  

* The beneficiary may utilize the guest's telephone number and name to get a lot other data about him/her, which the beneficiary should, that would incorporate the guest's location (area) through an opposite catalog or just turning upward in any phone registry.  

* The beneficiary might not have any desire to talk, mingle, or work with the guest in view of the area (address), ethnicity (from the name), race, or district the guest is from.  

when a consumer wants to compare the price of one product with another, money is functioning as select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a a store of value. b a unit of account. c a medium of exchange. d all of the above.

Answers

Money serves largely as an account unit when a customer wishes to compare the costs of different goods. If money enables you to put off purchases until you actually want the items, it serves as a store of value.

What is a unit of account?

One of the money functions in economics is the unit of account. One common way to assess the market worth of products, services, and other transactions is with units of account.

A unit of account, which is also referred to as a "measure" or "standard" of comparative worth and deferred payment, is a requirement before any business transactions involving debt may be created.

Money serves as a common unit of measurement and exchange.

Thus, it serves as a foundation for price quotation and haggling. It is required for the creation of effective accounting systems.

Economics' unit of account enables a semi-meaningful interpretation of expenses, profits, and prices so that a company can evaluate its own performance. It enables investors to understand.

Hence, Money serves largely as an account unit when a customer wishes to compare the costs of different goods.

learn more about  a unit of account click here:

https://brainly.com/question/12730352

#SPJ4

What does hashing mean when it comes to cryptography?

A. scramble
B. unscramble
C. sorting
D. categorizing

Answers

Answer:

do you have a picture of it

I think the answer is A! Scramble

A group of computers that are interconnected in order to share information or documents is called a _____.

Answers

network.


Hope this helps!

drew is examining the logs for his company's web applications. he discovers what he believes is a breach. after further investigation, it appears as if the attacker executed code from one of the libraries the application uses, code that is no longer even used by the application. what best describes this attack

Answers

A web application security evaluation tool called WebInspect aids in finding both known and undiscovered vulnerabilities in the Web application layer.

What is web application?

Web application is defined as an application program that is provided over the Internet via a browser interface and kept on a remote server.

Security experts and QA testers can find security vulnerabilities and configuration problems with the aid of WebInspect, an automated DAST solution that offers thorough vulnerability detection.

Thus, a web application security evaluation tool called WebInspect aids in finding both known and undiscovered vulnerabilities in the Web application layer.

To learn more about web application, refer to the link below:

https://brainly.com/question/8307503

#SPJ1

What are 2 ways to send a message to your client when signed in as an accountant user?.

Answers

Answer:

The use of Ask client and request are the two ways to send a message to your client when signed in as an accountant user.

You want to be able to restrict values allowed in a cell and need to create a drop-down list of values from which users can choose. Which feature should you use?a. Protect Worksheetb. Conditional Formattingc. Allow Users to Edit Rangesd, Data Validation

Answers

You must construct a drop-down list of options from which users may select if you wish to be able to limit the values that can be entered into a cell. Therefore, the feature we ought to employ is data validation.

What is meant by data validation?

In computer science, the act of verifying that data has been cleansed to ensure that they have data quality—that is, that they are both accurate and usable—is known as data validation.

Data validation is the process of confirming the accuracy and quality of the source data before using, importing, or otherwise processing it. Numerous techniques of validation can be used, depending on the parameters or objectives of the destination. Data validation is a part of data cleansing.

Data validation procedures check the data's correctness. It determines if the data is within the field's permitted range of values by applying a set of criteria. The system makes sure that the inputs follow the established guidelines, such as those governing the kind, originality, format, and consistency of the data.

Learn more about data validation refer to :

brainly.com/question/29976983

#SPJ4

Scientists have put genes into potato plants to make vaccines against cholera and hepatitis B.This type of research is called

Answers

Answer:

Edible vaccines

Explanation:

In the recent years, biotechnologist have developed a new concept known as the edible vaccines. The Edible vaccines are a subunit vaccines. Here the selected genes are first introduced into the plants and then the transgenic plant is induced to make the encoded protein. Foods like potato, corn, banana, soybean, lettuce, legumes and rice are used for these applications.

These edible vaccines can reduce diseases like the cholera, Hepatitis-B, diarrhea and other disease.

2.3 Code Practice: Question 1

Answers

Answer:

a=int(input("Enter a numerator: "))

b=int(input("Enter a divisor: "))

quotient=a/b

remainder=a%b

print("Quotient is: " + str(int(quotient)))

print("Remainder is: " + str(int(remainder)))

Explanation:

Hope this helps lovely :)

Answer:

Answer is in explanation

Explanation:

num = int(input("Enter Numerator "))

den = int(input("Enter Denominator "))

one=int(num/den)

two=int(num%den)

print(one + two)

As the senior analyst responsible for data staging, you are responsible for the design of the data staging area. If your data warehouse gets input from several legacy systems on multiple platforms, and also regular feeds from two external sources, how will you organize your data staging area? Describe the data repositories you will have for data staging.

Answers

Answer:

The corresponding schemas I use such as given below.

Explanation:

Dim: Used in the design for certain artifacts belonging to measurements. Fact: Used for these artifacts throughout the design relevant to the truth Admin: Used for all configuration-related artifacts that could be open to professional end-users. Audit: That used to hold audit-related particles. Etl: Is used for keeping objects, particularly staging details, directly connected to something like the ETL method. Report: Used to keep objects utilized explicitly for programs for documentation.Olap: Used for keeping objects directly used for systems for study. Test: Used to carry objects which have been used exclusively for research. Useful- Used to carry objects that just about any member including its implementation may typically use.

A newly released mobile app using Azure data storage has just been mentioned by a celebrity on social media, seeing a huge spike in user volume. To meet the unexpected new user demand, what feature of pay-as-you-go storage will be most beneficial?

Answers

Answer:

The ability to provision and deploy new infrastructure quickly.

Explanation:

As per the question, the 'ability to provision and deploy new infrastructure quickly' feature would be most beneficial in meeting this unanticipated demand of the users. Azure data storage is characterized as the controlled storage service that is easily available, resistant, secure, flexible, and dispensable. Since it is quite a flexible and available service, it will meet the storage demands of a high range of customers conveniently.

Of the following versions of Windows, which support an IPv4/IPv6 dual-stack configuration? (Choose all that apply. )

a. Windows XP

b. Windows Server 2003

c. Windows Server 2008

d. Windows Vista SP1

Answers

Because of the decline in the number of IPv4 addresses and the need to accommodate the growing number of users and internet-connected devices, the shift to IPv6 has become increasingly necessary.

IPv6 has the ability to accommodate a significantly greater number of internet addresses than IPv4, which has only 4.3 billion IP addresses; this number of IP addresses will soon be depleted. The following versions of Windows support an IPv4/IPv6 dual-stack configuration, Windows Server 2008, and Windows Vista SP1 are the only versions that support an IPv4/IPv6 dual-stack configuration.

IPv6 support is not available in Windows XP or Windows Server 2003 (although Windows Server 2003 can provide IPv6 routing).Windows Vista and Windows Server 2008 can both communicate natively over IPv6 networks with other IPv6-enabled systems.

To know more about IPv4 visit:

https://brainly.com/question/32374322

#SPJ11

Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.
Which number represents the "on* state of a computer?
_ represents the "on" state of a computer.

Answers

Binary values are used to denote the 'ON' and 'OFF' state of a computer. The 'ON' state is denoted by the binary value '1'

The 'ON' state of a computer represents the mode when the computer system is running and can be used to perform computing operations.

The binary values '0' and '1' are used to designate the ON and OFF state.

When the computer is ON, it is designated by the binary value 1 ; while the OFF state is designated by the binary value 0.

Therefore, the number which signifies the ON state of a computer is 1.

Learn more :https://brainly.com/question/4722254

How do you code an action method that handles an HTTP POST request but not an HTTP GET request?
a. Code the HttpPost attribute above the action method
b. Pass the model object to the View() method
c. Inherit the PostController class
d. Use the Startup.cs file to configure the middleware for HTTP POST requests

Answers

To code an action method that handles only HTTP POST requests, you can use the HttpPost attribute above the action method.

So, the correct answer is A..

This tells the server to only accept POST requests for this particular action method. You do not need to pass the model object to the View() method, as this is not related to handling POST requests.

Inheriting the PostController class is not necessary either, as this does not provide any specific functionality for handling POST requests.

Additionally, using the Startup.cs file to configure the middleware for HTTP POST requests is not necessary for handling POST requests in a specific action method. Simply adding the HttpPost attribute is sufficient.

Hence, the answer of the question is A.

Learn more about network at

https://brainly.com/question/31538043

#SPJ11

Choose the option that best matches the description given. The older term, social service, referred to advancing human welfare. The new term, meaning to provide for the needs of various people and groups, is ____.
A. social assistance
B.social welfare
C.social media
For everyone that doesn't wanna watch the ads, The answer is A, social assistance.

Answers

Answer:

Social Assistance

Explanation:

Provision and disbursement of intervention in other to palliate the suffering and want of an individual, group or community can be described as rendering social assistance. Assistance which also means helping people fulfill their needs could be offered by the government, non-governmental organizations or individuals personnels. Rendering social assistance could be in the form of cash or gift offerings, provision of food for the hungry, shelter for the homeless, medical interventions for the sick and catering for other touch points of the needy.

Answer:

Social Assistance

Explanation:

(Java) What, in your opinion, is wrong with this nested for loop?

for(int x = 0; x < 10; x++){

for(int x = 10; x > 0; x--){

System.out.println(x);

}

}

Answers

The issue with this   nested for loop in Java is the declarationof the second loop variable.

Why is this so?

Both loops   use the same variable name"x" for iteration. This creates a conflict because the inner loop re-declares the "x" variable, leading to a compilation error.

Each loop should have a unique variable name to avoid naming conflicts and ensure proper loop execution.

The corrected code will be --

for (int x =0; x < 10; x++)   {

   for (int y = 10;y > 0; y--)   {

       System.out.println(y);

   }

}

Learn more about Java at:

https://brainly.com/question/25458754

#SPJ1

One of Level 3's public DNS servers is ____________.
a. 4.2.2.3
b. 8.8.8.8
c. 127.0.0.1
d. 192.168.1.1

Answers

One of Level 3's public DNS servers is 4.2.2.3. DNS servers help computer users by translating domain names such as brainly.com into the IP addresses that computers use to connect online. Level 3 DNS servers are one such service.

A DNS (Domain Name System) server is a networked computer that has a database of domain names and their IP addresses. DNS is an abbreviation for Domain Name System. It works by translating user-friendly domain names into the numerical IP addresses that computers require to communicate with one another on the internet. Level 3 DNS servers are one of these services. They are trusted by internet service providers and other large businesses because they offer reliable, high-performance, and secure DNS services. One of Level 3's public DNS servers is 4.2.2.3. Therefore, one of Level 3's public DNS servers is 4.2.2.3, which can be used to provide a more reliable, high-performance, and secure DNS service.

To learn more about DNS servers, visit:

https://brainly.com/question/32268007

#SPJ11

The cost of an items is Rs 200. what will be the cost of 50 such items. write a simple program​

Answers

Answer:

In Python:

Unit_Cost = 200

Cost50 = 50 * Unit_Cost

print("Cost of 50 items: Rs."+str(Cost50))

Explanation:

This initializes the unit cost to 200

Unit_Cost = 200

This calculates the cost of 50 of such items

Cost50 = 50 * Unit_Cost

This prints the calculated cost

print("Cost of 50 items: Rs."+str(Cost50))

When trying to upload assignment on canvas wont let me click choose file.

Answers

Try either reloading the tab or resetting computer.

50 POINTS!!!! What is HpseuHostLauncher, and can I disable it without any major impact on my laptop?

Answers

Answer:

????????

Explanation:

7.5 Code Practice Edhesive

7.5 Code Practice Edhesive

Answers

The written software that will determine the average reward sum for a specified number of gold medals and the total prize money is provided below: gold medals, total prize money; def calculate award money.

What does the code above refer to?

The entire award money is determined by dividing the total reward money by the number of gold medals using the first function, calculate award money. Therefore, The average prize money is determined by dividing the total prize money.

total award money = total sponsorship + total prize money return total award money / num medals; def average award money(num medals, total sponsorship, total prize money)

def Calculate the Average:

Enter the number of gold medals you've won in the entry box.

total sponsorship = float(input("How much money were you sponsored overall? "), ")

The formula is: total prize money = float(input("Your prize money is: "))

Average Award Funding is equal to Average Award Funding (num medals, Total Sponsorship, Total Prize Funding)

calculate average()

To know more about software  visit:-

https://brainly.com/question/1022352

#SPJ1

Which component of the operating system selects the next process to be executed when the cpu becomes idle?

Answers

The next process to be executed when the CPU becomes idle is CPU scheduling. The foundation of multi-programmed operating systems is CPU scheduling.

The operating system can increase computer productivity by moving the CPU between processes. Multiprogramming is a rather straightforward concept. The operating system must choose one of the processes in the ready queue to be performed whenever the CPU becomes idle. The short-term scheduler handles the selection procedure.

One of the processes in memory that are ready to run is chosen by the scheduler, and that process is given the CPU. The issue of choosing which task in the ready queue should receive the CPU is dealt with by CPU scheduling.

Learn more about CPU scheduling https://brainly.com/question/13107278

#SPJ4

172.16.0.0/12 is one of the subnets (blocks of ipv4 addresses) reserved by the internet assigned numbers authority (iana) for private networks. this address range starts at 172.16.0.0. its size is defined by the prefix length 12, which indicates that the addresses in this subnet are defined by having the same first 12 bits. recall that an ipv4 address is a 32 bit number. what is the highest address in this address range?

Answers

The size of 172.16.0.0/12, a subnet reserved by the Internet Assigned Numbers Authority (IANA) for private networks, is defined by the prefix length 12, which indicates that addresses in this subnet have the same first 12 bits.

An IPv4 address is a 32-bit number. To know the highest address in this address range, we need to calculate the number of IP addresses in this range.

The highest address in this range is obtained by adding the highest decimal value to the base IP address, which is 172.16.0.0/12. So, for 172.16.0.0/12, the highest IP address would be 172.31.255.255/12 as this is the highest number that can be generated with a 12-bit prefix.

To determine the highest IP address in this range, we first need to understand what is meant by the CIDR notation, which is used to represent IP addresses. CIDR (Classless Inter-Domain Routing) notation is used to specify a subnet mask by indicating the number of bits set to 1 in the subnet mask.

In CIDR notation, a subnet mask is represented by the number of bits set to 1. The remaining bits are set to 0. So, if we have a 32-bit IPv4 address, the subnet mask is represented by a number between 0 and 32.

For example, the subnet mask 255.255.0.0 can be represented as 16 in CIDR notation because the first 16 bits are set to 1, and the remaining bits are set to 0. Similarly, 172.16.0.0/12 means that the first 12 bits are set to 1, and the remaining bits are set to 0. Therefore, to determine the number of IP addresses in this range, we need to calculate the number of possible combinations of the last 20 bits.

The number of possible combinations of the last 20 bits is 2^20. Therefore, the total number of IP addresses in the range 172.16.0.0/12 is 2^20 or 1,048,576. To find the highest IP address in this range, we need to add the highest decimal value to the base IP address, which is 172.16.0.0/12. So, for 172.16.0.0/12, the highest IP address would be 172.31.255.255/12 as this is the highest number that can be generated with a 12-bit prefix.

172.16.0.0/12 is a subnet reserved by the Internet Assigned Numbers Authority (IANA) for private networks. The prefix length of 12 indicates that the addresses in this subnet are defined by having the same first 12 bits. An IPv4 address is a 32-bit number. The highest address in this range is 172.31.255.255/12 as this is the highest number that can be generated with a 12-bit prefix.

To know more about IP address :

brainly.com/question/31026862

#SPJ11

HELP PLS!!! In a presentation, what is layout?

Answers

a plan about how to do it
Slide layouts contain formatting, positioning, and placeholder boxes for all of the content that appears on a slide
HELP PLS!!! In a presentation, what is layout?

question 2 according to the mccandless method, what is the most effective way to first present a data visualization to an audience?

Answers

The McCandless method recommends giving an audience an overview of the information first, such as an elevated summary or a list of the main points, before providing a visualization tool.

How does visualization work?

The graphic depiction of data and information is the focus of the multidisciplinary topic of data and information visualization. When interacting with large amounts of data or information, like a time series, it is especially effective. In order to improve cognition, different aspects of abstract data are also being studied. Both non-numerical and numerical data, including such text and geospatial information, are included in the abstract data.

To know more about Visualization
https://brainly.com/question/29430258
#SPJ4

Other Questions
Friedman said, "There is no such thing as an american job __ ___anymore." what does that mean ? What percent of a mammals genetic material comes from each gamete?A.10%B.100%C.25%D.50% Whats the difference between Marijuana and Cannabinoids? in studies of problem discussion and conflict management between partners, individuals with which type of attachment style are most likely to report feeling hostile and angry after a discussion session? Compute the flux integral SF. dA in two ways, directly and using the Divergence Theorem. S is the surface of the box with faces x = 1, x = 3, y = 0, y = 1, z = 0, z = 3, closed and oriented outward, and F=x2i+5y2j+z2k. 1) The moon is not traveling in a perfect circle therefore the force is not inward. However, what object is applying the net force on the moon?2) Does the Moon apply a force to the Earth? Explain3) Does the Earth apply a force to the Moon? Explain4) The force between two masses is 2 N. If the distance between the two masses is tripled, what is the new force between the masses?5) The force between two masses is 2 N. If the mass of one of the masses is tripled, what is the new force between the masses? Please help I am not comphrending it at all. Your response should be in the form of a multiparagraph essay Writeyour response in the space providedThe best thesis is Throughout time, clothing is important."The best thesis is "Clothing helps people survive."The best thesis is "Clothing has changed over time for the better."The best thesis is Throughout history, there have been relationships betweenclothing styles and developments in clothing creation." What are the relative frequencies to the nearest hundredth of the columns of the two-way table?ABGroup 12444Group 24810Drag and drop the values into the boxes to show the relative frequencies. does monthly remittance of sales tax reduce stockholders equity why did you make the attribution you made in the beginning of the chapter? what type of attribution was this? what potentially caused you to make each attribution? Translate this sentence into an equation.The difference of Diego's age and 12 is 41Variable d to represent Diego Strategies to reduce costs and expenditures, such as the rationing of care, very likely will have an adverse effect on a company reports the following changes in account balances. and they paid no dividends during the year. what are operating, investing, and financing cash flows, respectively, for year 2? the verb "to be" is one of the most common verbs in the English language. It is an irregular verb. You might recognize it in one of its forms, for example: am, are, is, was, were, had been, am being. The verb "to be" is usually followed by an adjective to tell more about the "state of being." For example, I"I was happy when Alissa gave me a cupcake." Identify the verb ''to be'' in this sentence.Even though we enjoyed the cruise, we were very homesick. which of the following molecular compounds does NOT need the usage of prefix for the first elementSO2S2O3N2SN2S3 How many solutions, in positive integers less than 10, does the equation x + y + z = 20have? .In the US Balance of Payments accounts, a sale of euros by the US treasury should be treated as:Group of answer choicesa credit to capital accounta debit to capital accounta credit to official reserve accounta debit to official reserve account The commander in chief of the British forces in America who was to drive the French out of America wasGroup of answer choicesEdward BraddockGeorge WashingtonBenjamin franklinWilliam Pitt What is the gender gap in politics ?. The author of the petition would MOST LIKELY agree with what reason for resisting British mercantilist policies? A. British laws are too protectionist and hurt the colonies ability to provide for themselves. B. British laws undermine colonial currency by inflating the costs of British manufactured goods. C. British laws promote consumerism in order to secure more profits for British companies. D. British laws require too much labor and dont leave the colonists time for their own work.this test is so confusing