When constructing policies regarding data _______________, it is important that these policies offer particular guidance on separation of duties (SOD), and that there are procedures that verify SOD requirements. creation access use storage

Answers

Answer 1

Answer:

access

Explanation:

Managing users' access rights to digital resources within the organization's environment is a fundamental SoD control. As more services are requested by users, utilizing the built-in panels to check compliance with internal controls might become excessive. Companies require a comprehensive Identity Governance and Administration plan to monitor these user access and offer an authoritative source of identity definitions in order to ensure  SoD compliance.


Related Questions

Check ALL of the correct answers.
What would the following for loop print?
for i in range(2, 4):
print(i)
2
2
3
4.
1

Help now please

Answers

Answer:

2,3,4

Explanation:

Starts at two, goes to four. Thus it prints 2,3,4

We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the challenges you would face in such a scenario.

Answers

Answer:

Explanation:

Everything runs on the internet nowadays. Living without internet would bring many challenges. One of which would be difficulty making purchases. It is not always easy to find what you need close by which is why the majority of commerce nowadays is done through the internet. Another difficulty would be the lack of information, not being able to quickly search for something. Lastly, and probably the most important is the lack of communication. Without internet, you would lose contact with many loved ones around the world and would be limited to telephone communication.

You are troubleshooting a problem with a blank LCD display. You have verified that it is connected to the computer and has power. What's the most likely problem?A. Incorrect driverB. Faulty CRT tubeC. Failed backlightD. Dead pixels

Answers

The most likely troubleshooting problem is a blank LCD display, which has been confirmed to be connected to the computer and has power, is a failed backlight.

An LCD is a flat-panel monitor that uses liquid crystal displays to generate images. When a computer's LCD display goes blank, it's usually caused by one of two things: either the backlight has failed or the monitor's LCD flat-panel display has become damaged.  You have verified that it is connected to the computer and has power. However, this could be attributed to any number of things, including faulty drivers, damaged hardware, and so on. The most common cause is a failed backlight because it is the component that produces the necessary light for the display to function properly. A dead backlight can cause a blank display, and it is the most likely cause of the problem. A faulty CRT tube is a monitor component, but it isn't applicable in this case. Dead pixels and incorrect drivers are not the most likely cause of a blank LCD display.

To know more about troubleshooting:https://brainly.com/question/28508198

#SPJ11

If your computer is running slowly, which of the following is most likely to solve the problem?
Scanning, cleaning, and optimizing your hard drive
Checking to make sure all of the computer’s cords are plugged in
Reentering the serial numbers of the software programs the computer is running
Searching the hard drive for missing DLL files

Answers

Answer:

Purchase Anti-virus

Explanation:

Delete old files.

clear your temp

update to a ssd

Answer:

A. Scanning, cleaning and optimizing your hard drive

Explanation:

IM A DIFFERENT BREEED!

also... when your computer is slow, you usually scan and clean your computer files and delete unnecessary files you don't need so that your computer can run more smoothly and faster.

if a web server is down (such as powered off), the server may return a page saying to please try again later. group of answer choices true false

Answers

The correct answer is True.

When a web server is down or powered off, it is unable to process incoming requests and serve web pages. In such cases, it is common for the server to return an error page or message to the user indicating that the server is currently unavailable and to try again later. This is a standard practice to inform users about the temporary unavailability of the server and to manage their expectations.

The specific error page or message may vary depending on the configuration of the web server or the application running on it. The purpose of such messages is to provide a clear indication to users that the server is experiencing issues and that they should attempt to access the website or service at a later time when the server is back online or operational.

Therefore, it is true that when a web server is down, it may return a page asking users to try again later.

To know more about  web server, visit:

https://brainly.com/question/32221198

#SPJ11

You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?

Answers

From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.

What techniques are used to raise search rankings?

If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.

        To learn more about search rankings. refer

        https://brainly.com/question/14024902  

         #SPJ1

Use the drop-down menus to select the note-taking method that completes each statement.

The (__________)method uses a left side and right side layout.

The ( _________ ) method organizes concepts into levels.

When using the (___________) method, a summary is written at the bottom of the notes.

A relationship between levels of content can easily be seen when using the (_________) method.

Answers

Answer:

1. cornell

2. outliner

3. cornell

4. outliner

Explanation: POGCHAMP

Answer:

What the other guy said

Explanation:

MORE POG CHAMP

where can you find more information about the history of pa cyber?

Answers

To find more information about the history of PA Cyber, you can visit the official website of Pennsylvania Cyber Charter School (PA Cyber) or explore reputable educational websites and resources. Additionally, conducting a search using search engines can provide you with various sources of information, including news articles, press releases, and academic papers.

The official website of PA Cyber is a reliable source to learn about the history of the organization. It may provide information about the founding of PA Cyber, key milestones, and any significant events or developments throughout its history. The website may also offer additional resources, such as reports, case studies, or testimonials.

Conducting a search using search engines or utilizing online databases specific to education or charter schools can yield more information. By using search terms such as "history of PA Cyber" or "PA Cyber Charter School timeline," you can find relevant sources such as news articles, interviews, and scholarly publications that discuss the history and evolution of PA Cyber.

To gather more information about the history of PA Cyber, it is recommended to visit the official PA Cyber website and conduct searches on reputable educational websites, news sources, and academic databases. By utilizing these sources, you can obtain a comprehensive understanding of PA Cyber's background, milestones, and its role in the field of online education.

To know more about website , visit

https://brainly.com/question/28431103

#SPJ11

Andy is working on a project to build an accounting software program for his firm. He uses old programming modules that contained code to perform various processes and links them to create a complete system. Which approach does he apply to the program design?
A.
structured programming
B.
non-structured programming
C.
top-down approach
D.
bottom-up approach
E.
modular programming

Answers

Answer:

E.  modular programming

Explanation:

Andy is applying a design known as modular programming. This is basically a design in which the entire project is broken down into various parts known as modules. Each one of these modules performs a very different and unique task. As the modules are created they are linked together like pieces of a puzzle in order to form the entire project. This makes tackling a large project much easier and makes debugging problems much easier as well.

By definition, what is the process of reducing security exposure and tightening security controls?

Answers

Hardening is the technique of reducing security exposure and tightening security controls of software and network devices.

Security is a major concern, when connecting over a network. Through hardening, security of a network is protected from vulnerable activities. Hardening reduces exposures associated with security and provides tight controls for it.

Hardening is typically a collection of tools and techniques that are used to decrease vulnerability in computer software, applications, network devices and infrastructure. The main goal of hardening is to protect security by identifying and eliminating superfluous programs, applications, permissions and access, which in turn, reduces the chances that attackers and malware will gain access over the network ecosystem.

You can learn more about hardening at

https://brainly.com/question/27912668

#SPJ4

Focusing on the career cluster "Arts, Audio/Video Technology & Communications", which of the following careers is NOT part of this cluster? (Choose all that apply.)

Landscaper
News Reporter
CEO
Actress
Graphic Design Artist
I will give brainliest to right answer

Answers

Answer:

Landscaper

CEO

Explanation:

Arts, Audio/Video Technology & Communications:

Careers including performing arts, acting, dance, visual arts such as animation and graphic design. Includes audio and video careers, such as news reporters, television technicians, and film editors.

What can cause camera shock?

Answers

The flash of the camera

A data analyst uses _____ to decide which data is relevant to their analysis and which data types and variables are appropriate

Answers

Answer:

I believe that the answer is a database organization.

__ allow(s) users with mobility issues to control the computer with their voice.

Speech input software

Tracking devices

Head pointers

Text-to-speech

Answers

Answer:

Speech input device

Explanation:

I think this is the answer

Answer: speech input software

Explanation: got it right on edgen

most computers have temporary holding areas called __________.

Answers

Answer:

Random Access Memory (RAM)

RAM (Random access memory)

for this problem, we will explore the issue of truthfulness in the stable matching problem and specifically in the gale-shapley algorithm. the basic question is: can a man or a woman end up better off by lying about his or her preferences?

Answers

In the Gale-Shapley method, moving a pair up or down the list won't make a woman's partner better.

Why does the Gale-Shapley algorithm fail to make a woman's partner better?

The stable matching problem is well-known to be solved by the Gale-Shapley algorithm. It functions by having each man make a proposal to the woman he likes the most, and each woman accept the best offer thus far. If no man or woman would choose to be matched with the other over their current relationship, then the matching is stable.

In this scenario, rearranging the pairs on a woman's preference list will not affect the algorithm's result because the male she values most will always come in first.

To know more about algorithm visit:-

https://brainly.com/question/30409793

#SPJ4

A firm would be most likely to establish an enterprise portal if it wanted to Multiple Choice prevent outsiders from using its information network. allow users to access different areas of its network depending on their relationship to the firm. prevent viruses from being downloaded from the company's website. search for hidden patterns and unknown relationships among data stored in different information systems.

Answers

Answer:

prevent outsiders from using its information network.

Explanation:

The firm would use a portal to create a network or intranet for all its information because only employees would have access to it.

You want to make sure that all users have passwords over eight characters in length and that passwords must be changed every 30 days. What should you do

Answers

Answer:

Configure account policies in Group policy.

Explanation:

Ava and Elizabeth are planning on using an IDE to create their program. Describe tools and facilities available in the IDE which can help them to identify and correct syntax errors.

Answers

Bracket matching. This is used for languages that use pairs of brackets to mark out blocks of code. It allows the code to be read and understood more quickly. If you forget to close a bracket while writing, coloured sections may help you to detect missing brackets.Syntax checks. This recognises incorrect use of syntax and highlights any errors.Auto-completion (or code completion). This is designed to save time while writing code. As you start to type the first part of a function, it suggests or completes the function and any arguments or variables.

You’ve been given a new cell phone with a 2 gigabyte data plan. You plan to use your phone for text messages, images, video, and music. Which of these categories are best compressed using lossless compression? Which of these categories are best compressed using lossy compression? Why?

a. Video should use lossy compression because it usually has a large file size which we need to reduce.
b. Text should use lossy compression because it always has a large file size which we need to reduce.
c. Audio should use lossy compression to save data and transmit quickly.

Answers

Answer: I think that it should all use lossless compression.

Explanation: it will reduce the space it take up in the files and it was be able to save data and help with transmission.

A Lossy compression should be applied to text messages and music while lossless compression should be applied to images and videos

What is Lossy compression?

A lossy compression of a file implies that the quality of the file is reduced in order to get the file compressed.

The type of compression can be applied to text messages and music because a reduction in the size and quality will only reduce few details about the text messages and music file.

Since lossless compression is such that even after the file size is reduced, the quality remains unchanged. There are type of compression can be applied to video and pictures because even if the size is reduced, the quality of the files are not expected to change.

Hence, Lossy compression should be applied to text messages and music. Lossless compression should be applied to images and videos.

Read more about file compressions at:

brainly.com/question/13663721

#SPJ2

A luxury can be defined as something that is an indulgence, rather than a necessity. Most people in the world would view items such as food, shelter, and water as necessities. In the United States, many would likely add electricity and indoor plumbing to that list. Today, many individuals are beginning to view Internet access as a necessity. But is it really a necessity—that is, essential for existence? If so, what about the individuals who do not have Internet access or those who choose not to use it? How might the perception of Internet access being or not being a necessity affect the growth of e-commerce?

Answers

Answer:

To improve the growth of e-commerce, internet access is a necessity.

Explanation:

The internet is an important tool for education and entertainment. It is a global network of thousands of computer networks connected to communicate and share information.

The concept of internet access as a necessity is majorly for remote workers, online education, bill payment and other e-commerce activities. This means that internet access is a necessity based on life-style choices.

Special words are those words that start and end with the same letter. [14]
Examples: COMIC, WINDOW, EXISTENCE
Palindrome words are those words that read the same from left to right and vice- versa.
Examples: MADAM, LEVEL, CIVIC, MALAYALAM
Note: All palindromes are special words, but all special words are not palindromes.
Write a program to accept a word. Check and print whether the word is a Palindrome word or only a special word or neither of them.
Write 2 comment lines at least. Variable description table need not be written.

Answers

Answer:

This program is written in python programming language

The program uses few comments (See Explanation for further explanation of each line)

See attachment for proper format view of the source code

Program starts here

#Prompt user for Input

inpstring = input("Enter a string: ")

#Reverse user input

revstring = inpstring[::-1]

#Calculate length of user input

i = len(inpstring)

if(inpstring.upper() == revstring.upper()):

     print("The input string is Palindrome")

else:

     if(inpstring[0].upper() == inpstring[i-1].upper()):

           print("The input string is a Special Word")

     else:

           print("The input string is neither Palindrome nor Special")

Explanation:

inpstring = input("Enter a string: ")-> This line accepts input from user

revstring = inpstring[::-1]-> This line reverses user input

i = len(inpstring)-> This line calculates the length of user input

The following if statement checks for palindromes; i.e. if input string is equal to reversed string

if(inpstring.upper() == revstring.upper()):

     print("The input string is Palindrome")

If the above is statement is not true, the following is executed (to check for special word)

else:

The following if statement checks if the first letter of the input string is equal to its last letter

     if(inpstring[0].upper() == inpstring[i-1].upper()):

           print("The input string is a Special Word")

If the above statement if not true, then input string is not a special word and it's not palindromic.

Hence, the its accompanying else statement will be executed

     else:

           print("The input string is neither Palindrome nor Special")

Special words are those words that start and end with the same letter. [14]Examples: COMIC, WINDOW, EXISTENCEPalindrome

you are adding new cables to a data outlet where you have to run the cables above the ceiling tile. what kind of cables should you use in such a scenario?

Answers

Plenum-rated cables should be used for running wires above ceiling tiles. For usage in air handling spaces, plenum-rated cables have a specific insulation that satisfies the fire safety standards.

What kind of cable is most frequently used to link computing devices?

UTP network cable is the most widely used type. It is simple to use, set up, grow, and debug. Each pair of copper wires in a typical UTP cable consists of two wires that have been twisted together.

What kind of network type receives a signal using a coaxial cable?

Coax cable is used by cable internet to deliver internet service to your home. The cable service provider pipes copper-based cable into your home. A coax is used to connect your router or cable modem.

To know more about cables visit:-

https://brainly.com/question/10932960

#SPJ1

Joann wants to save the building block she created for the title of her company.

In which file does she save this building block?

Answers

Answer:

Building Blocks.dotx

Explanation:

Just did it on Edge2020

Which of the following has the function of directing that data intended to reach a specific location along the right path?A. A network interface cardB. A cableC. A wireless connectionD. A router

Answers

Answer: D.

Explanation: A router is used to forward data packets.

Which of the following has the function of directing that data intended to reach a specific location along the right path?

A. A network interface card

B. A cable

C. A wireless connection

D. A router - Correct

what type of dns query causes a dns server to respond with the best information it currently has in its local database?

Answers

The type of DNS query that causes a DNS server to respond with the best information it currently has in its local database is a recursive query.

A recursive query is a type of DNS query where the client requests the name server to provide a complete resolution to the domain name. Recursive queries are sent by clients, such as web browsers or email clients, to a DNS server. When a DNS server receives a recursive query, it provides the best information it has in its local database. If the server doesn't have the information, it will send queries to other DNS servers until it receives the information requested. The recursive query process is designed to be more efficient since it reduces the number of requests for the same resource and helps in providing information faster than a non-recursive query. Additionally, recursive queries are useful for clients that do not have direct access to the DNS root servers. A DNS server can provide the best information it currently has in its local database for an address that has not yet been cached or added to its local DNS table. A recursive query process makes DNS resolution faster and more efficient.

To know more about dns query visit:

https://brainly.com/question/33460067

#SPJ11

when selecting authentication types for an ras server, what is considered to be the most secure authentication type?

Answers

When it comes to selecting authentication types for a Remote Access Service (RAS) server, the most secure authentication type is dependent on the specific needs of your organization. That being said, the most commonly used and recommended authentication types for RAS servers are:

1. Two-Factor Authentication: This type of authentication requires two different types of credentials to gain access to a system or application. For example, a password and a fingerprint or a password and a smart card. This method is considered highly secure as it is harder to compromise both types of credentials. 2. Secure Sockets Layer (SSL) Certificate Authentication: SSL is a protocol that encrypts data between a web server and a web browser. SSL Certificate Authentication requires users to have a valid SSL certificate installed on their device, which is then used to verify their identity. This authentication method is considered secure as it requires a valid certificate to be present on the user's device.

3. Smart Card Authentication: Smart card authentication requires users to have a smart card that contains a digital certificate. When a user inserts their smart card into a reader, the digital certificate is used to verify their identity. This method is considered secure as it requires a physical token that cannot be easily duplicated. Ultimately, the most secure authentication type for your RAS server will depend on your specific security needs, budget, and user convenience. It is recommended to consult with a security expert to determine the best authentication types for your organization.

Learn more about Remote Access Service here-

https://brainly.com/question/31860803

#SPJ11

What are the benefits of writing functions that use parameters and return List 2 please and explain what is return

Answers

Answer and explanation:

There are many benefits of writing functions that use parameters and return. Some of them are:

1. Flexibility: With functions having parameters, several values of the parameters can be used at invocation time thereby making the application flexible. For example, given the following function in Java.

public void showName(String name){

   System.out.println("Your name is " + name);

}

To call this method (function), the programmer could use various values for the name parameter used in the function like so:

showName("John");

showName("Doe");

If the function didn't have a parameter, it is possible it will only print a hardcoded name every time the function is called.

2. Scope Control: When a function is allowed to return a value, it helps to work around scope issues since variables declared within a function are limited to that function and do not exist outside the function. This means that the values of these variables cannot be used anywhere else outside the function in which they are being declared. However, if the function returns a value, the value can be used anywhere else in the program.

For example:

public String getDouble(int x){

   int y = x * 2

   return y;

}

The function above returns twice the value of the argument supplied to it. Since the integer variable y is declared within the function, it's value cannot be used outside the function. However, since the value is being returned by the function, it could be used anywhere the function is being called. Thanks to the return keyword.

pls explain the special keys on a keyboard and their functions ...eg shift key,control key​

Answers

Tab- used to advance the cursor to the next tab stop.

Shift- allows you to type capital letters and the symbols at the top of the keys

Control-  enabling other keys on the keyboard to perform secondary functions

Alt- used to change (alternate) the function of other pressed keys

CapsLock- causes all letters of bicameral scripts to be generated in capital letters.

Answer:

Multiple functions

Explanation:

If you'd like an answer to the purpose of the shift key and the control key, then I'll answer those two, specifically. Tell me if you'd like any more assistance afterwards! ( :

#1: Shift key: This key's basic function is this: when you hold down on it as well as a letter key (e.g. f ), then it will automatically make that letter uppercase.

For example, in this sentence I typed F while pressing the shift key as well:

Frederick looked out the window.

While in this one, I didn't.

frederick looked out the window.

My computer automatically tells me that the spelling of Frederick I used in the second sentence is wrong, since Frederick is proper - and is the beginning of a sentence.

#2: Control key: This key allows you to to do some pretty cool things, depending on which key you click it with.

For example, ctrl + j generates a document download page, while ctrl + d opens a bookmark page? option.

I hope this was very helpful, and let me know if you need any further assistance in the future! ( :

What is HTML? (list down any 5 points)

Answers

Answer:

The HyperText Markup Language, or HTML is the standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets and scripting languages such as JavaScript.HyperText Markup Language (HTML) is the set of markup symbols or codes inserted into a file intended for display on the Internet. The markup tells web browsers how to display a web page's words and images.

Explanation:

If this doesn't answer your question tell me and i'll fix it.

Other Questions
Assume a simple model for how quickly Bitcoin blocks propagate through the network: after t seconds, a group of miners controlling a proportion (t) of the mining power has heard about the transaction, up to some point tmax after which all miners will have heard about it. That is, (t)=1 for all ttmax . Further assume that (0)=0 and (t) is monotonically increasing in t. Assume that blocks are found in Poisson process with a mean time to find a block of =600 seconds (=1/600). A stale block (likely to become an orphan block) occurs if some miner finds a block before news of the most recent block reaches them.a. Given the design of the Bitcoin P2P network, explain why an exponential propagation model (i.e. (t)b t for some b) is a plausible model. Hint: Recall that the derivative of an exponential is another exponential function.b. Suppose (t)=2 t/30 -1, that is, an exponentially increasing proportion of the mining power hears about a new block up until tmax= 30 seconds, at which point all have heard. What is the probability of at least one stale block being found? c. If we lowered to 60 seconds to make transactions post faster, how would this affect your answer from part (b)? What problems might this cause? Consider this reaction occurring at 298 K: BaCO3(s) BaO(s) + CO2(g)Substance rH o / kJ mol1 rS o / J mol1 K 1 BaCO3(s) 1213.0 112.1 BaO(s) 548.0 72.1 CO2(g) 393.5 213.8a. Using the information in the table above, show that the reaction is not spontaneous under standard conditions by calculating rG o . {5 marks}b. If BaCO3 is placed in an evacuated flask, what partial pressure of CO2 will be present when the reaction reaches equilibrium? {3 marks}c. Can the reaction be made more spontaneous by an increase or decrease in temperature? If so, what temperature is required to make the reaction spontaneous under standard conditions? {3 marks}d. What temperature is required to produce a carbon dioxide partial pressure of 1.5 bar? {3 marks} How can I write a program in c language that calculates and produces these 2 columns sequence numbers using looping statement? Enter a number: 5 Sequence: 1, 2, 3, 4, 5 Squared: 1, 4, 9, 16, 25Do you want to continue? Y/NN What is the difference between Spanish and Latin American foods The role of in the production process is central to why the United States is rich and most of the rest of the world is poor. A) labor B) land C) capital D) government What type of software permits a user to record video of what is occurring on the computer along with typed and cursor actions in order to create a lesson Fabian has $700 to spend at a bicycle store for some new gear and biking outfits. Assume all prices listed include tax. He buys a new bicycle for $387.10. He buys 3 bicycle reflectors for $4.43 each and a pair of bike gloves for $12.36. He plans to spend some or all of the money he has left to buy new biking outfits for $45.81 each. What is the greatest number of outfits Fabian can buy with the money that's left over? NO LINKS What controls circadian rhythms in humans? Explain how this process works. what is a photo copy machine The original price, p, of a single scoop of ice cream has increased by 7%. The new price can be represented as 1.07p. Which expression is also equivalent to the new price? * value of 250.0 NIC. An electromagnetic wave has an electric field with a peak value of What is the average intensity of the wave? d) 120 W/m2 a) 0.66 W/m? e) 170 W/m2 b) 0.89 W/m2 c) 83 W/m ) sity lo passes through two suce Vous avez t tmoin une injustice. Raconter??? solve for x: 5(2x-4)=10 psychologists have identified a number of factors in the etiology of psychological disorders. match the types of factors with the causes they focus on. Which information can be used to determine an atom's identity?Counting the number of electronsCounting both neutrons and electronsCounting the number of neutronsCounting the number of protons prove that q(2, ^32, ^42.) is an algebraic extension of q but not a finite extension of q. Greenpeace NGO social impact1. Draw your theory of change2. Determine the indicators for measurement of the change(s): determine a set of performance criteria for your impact/change(s)3. Discuss your plans for future reporting and how you will evaluate the impact of the project/institution (what kind of reporting you would have and when you will make evaluations) Suppose you are one of a team of marketers at a large hospital. Your boss has asked you to compile secondary research data on one of the hospitals specialties; the rest of the team will be working to gather primary data. (The selection of the specialty is up to you.) What would you do next? Explain how you would approach the research and provide some examples of secondary data related to the topic that you could present to your boss. PLS HELPCompose your own antithetical parallels by completing these lines. The first line is given, and you are to compose the second line. The second line should contrast with the first line:The lake is clear and blue, The inequality below is equivalent to which of the following7-(2/3)x 9A.x>9 B.X>-35C.x