During a penetration test, you obtain read/write access to a DNS server. How could this be used to your advantage during the engagement

Answers

Answer 1

Information collecting is the first and most crucial step in carrying out a successful penetration test. The two methods of obtaining information are active and passive. Most novices usually rush or skip over this phase.

How can a penetration tester benefit from a vulnerability scan like this?

Companies are informed of the existence and location of existing bugs in their code through vulnerability scanners. During penetration tests, faults that could endanger the program are sought out in to an effort to discover whether unauthorized access or other harmful behavior is feasible.

Why is it crucial to confirm that you have permission before doing penetration tests and other cybersecurity-related activities?

Without permission, the penetration tester violates the Computer Misuse Act and, depending on the information found during the test, may also be held accountable under other Acts. The best method to handle consent is to start the procedure early and keep the testing provider informed.

Which of the following describes a penetration test plan's first step?

Penetration testing begins with obtaining reconnaissance information, often known as open source intelligence (OSINT). A pen tester strives to obtain as much information as possible about your company and the targets that could be exploited.

To know more about penetration test visit:

https://brainly.com/question/13068620

#SPJ4


Related Questions

Which options are available when saving a video of a presentation? Check all that apply. file type
file name
folder location
condensed file size
narration and audio
seconds-per-slide timing

Answers

Answer: file name, folder location, narration and audio, seconds per-slide timing

Explanation:

I just did it.

Answer: 2,3,5,6

Explanation:

Just did it

You have configured a wireless access point to create a small network. For security, you have disabled SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network. What should you do

Answers

Create a profile on the wireless client and try to browse from a client computer to the access point. You notice a few additional wireless networks.

How do you set up a wireless access point so that a wireless client can connect to it?

You can use a serial cable to connect a laptop or PC to the wireless access point's console port in order to configure the access point for your client. You can see access point setup panels using terminal software and modify particular settings, including radio channel and transmit power.

Which of the above items can be turned off to assist block access to a wireless network?

Utilizing MAC address filtering, turning down DHCP, and deactivating SSID broadcast all aid in limiting illegal access to wireless networks.

To know more about SSID broadcast visit:-

https://brainly.com/question/13191413

#SPJ4

The file management program incorporated into recent versions of Windows is ____.
a. WinZip
b. StuffIt
c. Disk Cleanup
d. File Explorer

Answers

File Explorer is the file management application built into more recent iterations of Windows.

Simply put, what is File Explorer?

File Explorer, formerly Windows Explorer, is a file manager program that comes preinstalled with versions of the Microsoft Windows operating system starting with Windows 95. For accessing the file systems, it offers a graphical user interface.

Why do I need WinZip, and what is it?

WinZip is a Windows software that enables you to archive and compress data for more effective distribution or storage. The previous applications PKZIP and PKUNZIP, which were often used in the DOS operating system, have been replaced by the more powerful and user-friendly WinZip.

To learn more about File Explorer visit:

brainly.com/question/28902151

#SPJ1

1. A Molex connector supplies +3.3V, +5V, and -12V voltages.
Select one:
True
False

Answers

The claim that a Molex connector provides +3.3V, +5V, and -12V voltages is untrue.

What voltage is supplied by a Molex connector?

All of the additional connections, known as Molex connectors, that protrude from the power supply are for drives and deliver +12V (yellow) and +5V (red) power in addition to two ground wires (black). When you want to upgrade your system to a Pentium 4 (P4) system, you use this Motherboard P4 12V 4-Pin to Molex 4-Pin Power Adapter Cable.

The function of a Molex connector

The company that creates computer connections and other related goods goes by the name of Molex. It links your computer power supply to disks and other components inside the computer and is also referred to as a Molex power connection (shown).

To know more about Molex connector visit:-

https://brainly.com/question/20372891

#SPJ4

Write three Python examples that actually generate file errors on your computer and catch the errors with try: except: blocks.

Answers

A improved development and design approach offers another chance to address these problems. Although the algorithm works well, there are still errors; the culprit is an input problem.

a = 1/0

print(a)

except ZeroDivisionError:

print("Zero!") output is Zero!.

How does Python error catching work?

Python uses the try and except block to catch and manage exceptions. Python runs the code that comes after the try statement as part of the program's "regular" operation. The program's reaction to any exceptions in the try clause that comes before the except statement is the code that follows.

What do Python file errors mean?

If you type the filename incorrectly or the file doesn't exist, Python may be unable to get the file.

To know more about algorithm visit :-

https://brainly.com/question/22984934

#SPJ4

Add two more statements to main() to test inputs 3 and -1. Use print statements similar to the existing one (don't use assert). 1 import java.util.Scanner; 3 public class UnitTesting // Method returns origNum cubed public int cubeNum(int origNum) { return origNum origNum origNum; public static void main (String [] args) { Unit Testing cubeTester - new Unit Testing(); System.out.println("Testing started"); System.out.println("2, expecting
8, got: " + cubeTester.cubeNum(2)); /* Your solution goes here */ System.out.println("Testing completed"); 18 1911

Answers

User input is obtained using the Scanner class, which may be found in the java.util package. Create an object of the type and use any of them to access the Scanner class.

The function of the import utility Scanner

A class called Scanner is included in the Java. util package. For any primitive datatype, it is used to receive user input (int, float, string, and so on).

What purposes does Java Util Scanner serve?

A component of the java. util package is the Java Scanner class. It was first made available with Java 1.5. Primitive data types like int, double, or the default String are parsed from user input using the scanner.

To know more about Scanner class visit :-

https://brainly.com/question/29640971

#SPJ4

In a SWOT analysis, potential internal strengths are helpful when they identify all key strengths associated with the competitive advantage including cost advantages, new and/or innovative services, special expertise and/or experience, proven market leader, improved marketing campaigns, and so on.

Answers

In a SWOT analysis, potential internal strengths are helpful when they identify all key strengths associated with the competitive advantage including cost advantages, new and/or innovative services, special expertise and/or experience, proven market leader, improved marketing campaigns, and so on is true.

What is SWOT analysis?A person or organization can discover Strengths, Weaknesses, Opportunities, and Threats (SWOT) relevant to business competitiveness or project planning using the SWOT analysis, a strategic planning and strategic management technique. It is also known as situational analysis or situational evaluation. Strengths, Weaknesses, Opportunities, and Threats, or SWOT, is an acronym. Your firm has internal strengths and weaknesses that you can improve and exert some control over. Examples include your team members, your patents and other intellectual property, and where you are. Strength, Weakness, Opportunity, and Threat is referred to as SWOT. A SWOT analysis helps you to determine the S-W of your firm as well as larger possibilities and threats (O-T). Greater situational awareness is beneficial for both strategic planning and decision-making.

To learn more about SWOT analysis refer to:

https://brainly.com/question/25066799

#SPJ4

In this assignment, you will build a program using techniques from previous CSS courses that counts unique fractions. No new constructs from our readings are expected, and as such, you can complete this program with just a handful of lines (12-25) of code in just one main function. (But do NOT feel that your code needs to be that short!) Note that the use of methods will improve your design and improve your grade. You will need to use loops, ifs, comments, etc., (in other words, structured programming) to complete this assignment and achieve the outcomes listed below. Included below is a sample execution of your program as well as a list of outcomes your program is to implement; notice reduction of fractions is optional in this version of the assignment. Do NOT build any classes (other than your driver, obviously). You are NOT allowed to use any of Java's built-in abstract data types like ArrayList or HashMap or any of that stuff.
Introduction
Your project is to read in a series of fractions from a text file, which will have each line formatted as follows: "A/B". A sample text file is listed below, and the purpose of your program is to read in each fraction and count the number of occurrences for the current fraction. When all the input is consumed (or as the input is consumed), your program will print out its list of unique fraction and their corresponding count – see the output below (and you may assume no blank lines or misleading characters; see the text file link on the website for one of the actual inputs I’ll use when testing your submission).
Sample Text Input
6/3
7/3
6/3
12/6
Sample Console Output
6/3 has a count of 3
7/3 has a count of 1
NOTE: it is also fine (though not required) if your program simplifies the fractions so that the output is:
2/1 has a count of 3
7/3 has a count of 1
---But either way, 6/3 and 12/6 count as the same fraction, so you do need some mechanism for determining if two fractions that look different are actually the same. The only optional part of the assignment is how you display them in the end.
text file:
6/3
4/2
5/9
80/90
800/900
15/25
5/5
1/1
1/10
1/100
1/1000
1/3
2/6
1/2
1/3
1/1
1/4
1/5
1/6
1/7
1/8
1/9
2/1
2/2
2/3
2/4
2/5
2/6
2/7
2/8
2/9

Answers

A style sheet language called Cascading Style Sheets is used to describe how a document published in a markup language like HTML or XML is presented.

What CSS means?

Web pages are styled and laid up using CSS (Cascading Style Sheets), which may be used to change the font, color, size, and spacing of your text, divide it into numerous columns or add animations and other ornamental elements.

CSS, which stands for Cascading Style Sheets, is a stylesheet language that tells the browser how to display our HTML; it is not a programming language. Today, CSS is used to determine the design of more than 95% of all websites on the internet, making it incredibly important.

Static web pages and web apps are made using the markup language known as HTML. The display of markup-language-written texts is controlled by CSS, a style sheet language. Green background color; HTML not allowed in CSS files.

Anonymous answered this import java. util.*; import java.io.File; public class FractionCounter { public static int gcm(int a, int b) { return b == 0 ? a : gcm(b, a % b); } public static void main(String [] args) { HashMap<String, Integer> fractionCou

To learn more about CSS refer to :

brainly.com/question/28721884

#SPJ4

Can anyone please answer this question?
What are the uses of a relational database?

Answers

Answer:

Explanation:

tool for storing various types of information that are related to each other in various ways. For example, a relational database for an online store might maintain customer data and maintain related information as well, such as their various addresses, wish lists, orders, etc.

Select the correct answer.Sherry wants to transfer photographs from her phone to her computer. She finds various files in several formats. Which format most likely contains her photographs

Answers

A file including images will be in the JPEG file format. JPEG is the format name for any file that is in the image form.

A picture is what kind of a format?

Joint Photographic Experts Group, also known as JPEG or JPG, is an acronym. In both color and black and white, they perform best with images. Additionally, we print JPEGs for our clients the majority of the time.

Which file type offers the greatest image detail to photographers?

Due of the format's ability to capture the greatest amount of detail, many seasoned photographers utilize RAW. Using a RAW file makes it frequently simpler to modify exposure later.

To know more about JPEG file visit :-

https://brainly.com/question/9925804

#SPJ4

Answer:

B. JPEG

Explanation: Fromat that always includes photography. Right on edmentum or plato.

While browsing the Internet on a Windows 10 workstation, the Internet Explorer browser window hangs and stops
responding. Which Task Manager tab would you use to end Internet Explorer?

Answers

Answer:

applications tab

Explanation:

4.02.
Forever and repeat can be used for iteration (repeating a series of instructions)

Answers

Answer:

D is the answer

Explanation:

Loops (Iteration): Forever and repeat can be used for iteration (repeating a series of instructions) To create a program you have to think carefully about the order of steps. The example here shows that a Loop will repeat forever a move of set number of steps contained within a speed variable.

Harrison worked on a spreadsheet to show market trends of various mobile devices. The size of the file has increased because Harrison used a lot of graphs and charts. Which file extension should he use so that the workbook takes less storage space?
Pilihan jawaban
xltx file extension
xlsm file extension
xlsb file extension

Answers

The file extension should he use so that the workbook takes less storage space is xlsm file extension.

What is xlsm file extension?Office Open XML file formats are a collection of file formats that can be used to represent electronic office documents. There are formats for word processing documents, spreadsheets, and presentations in addition to distinct forms for content like mathematical calculations, graphics, bibliographies, and other items. xlsx" and may be opened with Excel 2007 and later. xlsm" is essentially the same as ". xlsx" Only the macro's start command, ". xlsm," differs. The most popular software application for opening and editing XLSM files is Microsoft Excel (versions 2007 and above). However, you must first install the free Microsoft Office Compatibility Pack in order to utilize them in earlier versions of Excel.

To learn more about xlsm file extension refer to:

https://brainly.com/question/26438713

#SPJ4

Authentication failed: no connection and application not ready to run offline, Code: , Action: ITEM_BANK_REQUESTED

Answers

Many users encounter the error message "Invalid authentication". Use the same case as in the Tapo App when inputting email.

What are error codes used for?

Error codes can also be used to specify an error, making it easier to find its source and the appropriate solutions. When anything goes wrong, like the cause of the Blue Screen of Death, this is frequently utilized in consumer items to make it simpler to identify the precise issue the product is experiencing.

Why do I keep getting an authentication error message?

If you see this error message, it signifies that you have entered an erroneous username and/or password. "Authentication failed!," reads the error notice. Reply again. After too many unsuccessful attempts, you might have locked your account.

To know more about Authentication failed visit:-

https://brainly.com/question/28465761

#SPJ4

Which type of firewall policy calls for a firewall to deny all traffic by default?
a. restrictive policy
b. demilitarized policy
c. perimeter policy
d. permissive policy

Answers

The restrictive firewall policy requires a firewall to block all traffic by default.

What kind of attack brings down the operating system?

Ping of Death, also known as PoD, is a sort of Denial of Service (DoS) assault in which the attacker uses the straightforward ping command to launch numerous or corrupted packets at the targeted computer or service in an effort to crash, destabilize, or freeze it.

Which firewall safeguards the whole network?

Hardware-based firewalls are very practical for securing a number of machines and managing network traffic that attempts to get through them. Hardware-based firewalls have the benefit of adding another line of defense against attacks that target desktop computing systems.

To know more about firewall visit:-

https://brainly.com/question/13098598

#SPJ4

First to put f in the comments for will get brainliest no cap

Answers

Answer:

F

Explanation: Can I get brainliest pls I am big brain

Users report they have to select the output tray at the printer, even though the correct tray is selected in the print dialog. Which of the following should a technician perform FIRST to attempt to solve the problem

Answers

On the print server, reinstall the driver. Even when the right tray is selected in the print dialog, users claim they still need to choose the output tray at the printer.

Does a wireless printer make sense?

A wireless printer that relies on a hands-free gadget makes it simpler to operate when you're on the go. You will undoubtedly save a lot of money because there is no installation required. They operate within any household or business's budget.

What is a wireless printer's drawback?

The wireless printer's drawback is that an access point or wireless router is required. You are unable to use the wireless printer without a wireless network. However, the majority of houses and businesses already have wireless networks.

To know more about printer visit:

https://brainly.com/question/17136779

#SPJ4

A customer has reported that when using a cable to connect an older laptop to a 100Mbps switch that the link light does not illuminate. When testing the same cable with a newer 1Gbps switch, it works fine. Which of the following is the MOST likely cause of the problem?

Answers

The cable is pinned as a crossover. Crossover cables move the wire from pin 1 at one end to pin 3 at the other connector, as the name implies.

What is Crossover cables ?An Ethernet cable used to directly connect computing devices is known as a crossover cable. The RJ45 crossover cable uses two separate wiring standards instead of just one, using the T568A wiring standard on one end and the T568B wiring standard on the other.The transmit signals at one end of the crossover wire are connected to the receive signals at the other end by purposefully crossed cabling. The transmit signals at one end of the crossover wire are connected to the receive signals at the other end by purposefully crossed cabling.A patch cable can be used in place of a crossover cable or vice versa, and the receive and transmit signals are automatically adjusted within the device to give a functional connection, thanks to the auto MDI-X functionality that is supported by many network devices today.

To learn more about Crossover cables refer :

https://brainly.com/question/14325773

#SPJ4

what common security system is an idps most like? in what ways are these systems similar?

Answers

Answer:

An IDS (Intrusion Detection System) works like a burglar alarm in that it detects a violation of its configuration and activates an alarm. This alarm can be audible and/or visual, or it can be silent.

Explanation:

Dana is reviewing a coworker’s presentation and wants to make note of some questionable data on a chart. What steps should she take? Choose the correct answers from the drop-down menus.

1. First, select the_____.
a. review tab
b. object on the slide
c.new comment button
2. Go to the_____ tab.
a. home
b. insert
c. review
3. Click New Comment, and type in the observation.

4. The comment will appear in the Comment pane on the_________ of the slide.
a. top
b. bottom
c. left side
d. right side

Answers

Answer:

1. b.

2. c.

4. d.

Explanation:

Answer: object, review, right side

Which of the following network devices would MOST likely be installed to allow a fiber optic cable
to be plugged into a network device with only RJ-45 connections?
A. WAP
B. Basic switch
C. Hub
D. Media convertor

Answers

The network devices that would MOST likely be installed to allow a fiber optic cable to be plugged into a network device with only RJ-45 connections is D. Media convertor.

A media converter is a device that allows different types of communication media, such as copper and fiber optic cables, to connect to each other. In this case, a media converter would be used to allow a fiber optic cable to be plugged into a network device that has only RJ-45 connections, which are typically used for copper cables. The media converter converts the signals from the fiber optic cable to the signals that can be transmitted over copper cables. This allows devices that are connected to the network using copper cables to communicate with devices that are connected to the network using fiber optic cables.

Learn more about media installation here, https://brainly.com/question/30149240

#SPJ4

Constructing strings
Construct a string alphaString from 'a' to endLetter, using the double colon operator.
Ex: If endLetter is 'e', then alphaString is 'abcde'
function alphaString = CreateString(endLetter)
% endLetter: Ending letter of string
% Construct a string alphaString from 'a' to endLetter, using
% the double colon operator
alphaString = 'fixme';
end

Answers

A three-part inclining wall structural surface feature constructed of reinforced concrete. It serves to sustain the stairway's elements. The base of the string refers to the lower portion.

What is the purpose of string in construction?

A string is used in masonry to create a level or straight line. It serves as a reliable guide while constructing a wall. Determine the fixed points that need to be linked before using a string.

What exactly does "string processing" mean?

As a result of the computer's ignorance of words or concepts and treatment of text as strings of letters, working with text in computer programs is referred to as "string processing." Anything constituted by strings.

To know more about structural surface visit:

https://brainly.com/question/29834264

#SPJ4

what are the application area of the computer?explain in brief.​

Answers

Answer:

In short, every corner of the world

Explanation: Take a look at the world around you, every job sector atleast owns a computer system for one work or the other. Computers can be found in military, hospitals, schools and universities, banks and every sector around you

Why perfection is required in sync? and what are the causes that can ruin it?​

Answers

Perfection is not necessarily required in synchronization, but it can be important to ensure that synchronization is accurate and consistent. Synchronization is the process of coordinating the actions or timing of multiple devices or processes, and it is often used to ensure that data or events are properly aligned or coordinated.

There can be a number of causes that can ruin synchronization, including hardware or software malfunctions, network delays or disruptions, interference from other devices or signals, and human error. It can be important to identify and address these potential causes in order to maintain the accuracy and reliability of synchronization.

Select the correct answer.
Kyle is working on a programming language that uses functions similar to mathematical functions as their framework. What type of language is
he working on?
OA.
declarative languages
OB.
logic-based languages
O c.
functional languages
OD. object-oriented programming languages

Answers

Functional languages

In the Guess My Number program, the user continues guessing numbers until the secret number is matched. The program needs to be modified to include an extra criterion that requires all guesses to be within the lower and upper bounds. If the user guesses below or above the range of the secret number, the while terminates. How would the while statement be modified to include the new criterion?
a. while(userGuess != secretNumber || userGuess >= lowerLimit || userGuess <= upperLimit)
b. while(userGuess != secretNumber || userGuess >= lowerLimit && userGuess <= upperLimit)
c. while(userGuess != secretNumber && userGuess >= lowerLimit && userGuess <= upperLimit)
d. while(userGuess == secretNumber || userGuess >= lowerLimit && userGuess <= upperLimit)
e. while(userGuess == secretNumber && userGuess >= lowerLimit || userGuess <= upperLimit)

Answers

The while statement should be modified to while(userGuess != secretNumber && userGuess >= lowerLimit && userGuess <= upperLimit).

What should happen if the user guesses a number outside the range of the secret number? If the user guesses a number outside the range of the secret number, they will be prompted with an error message. The message should explain that their guess is outside the range and should provide instructions on how to guess a number within the range. For example, the message could say, "Your guess is outside the range of 1-10.Please enter a number between 1-10 to make a valid guess." Additionally, the user can be given the option to quit the game or retry their guess. If the user chooses to retry their guess, they should be given the opportunity to enter a new number within the range. It is important to provide clear instructions for the user so that they know what to do when their guess is outside the range.

To learn more about while statement refer to:

https://brainly.com/question/19344465

#SPJ4

Joe, a user, reports that his new smart wearable device is not synchronizing to his mobile device. Both devices are powered on, but the mobile device fails to read the data from the wearable. Which of the following will MOST likely fix this issue?
A. Pair the devices
B. Set the SSID
C. Update the smart wearable device firmware
D. Enable NFC

Answers

A.Pairing the devices is the most likely solution to this issue.

Which of the following will resolve this problem MOST PROBABLY?This involves connecting the two devices via Bluetooth or Wi-Fi so that they can share data.To pair the devices, the user needs to locate the Bluetooth or Wi-Fi settings on both devices, enable them, and then select the wearable device on the mobile device.If the device is not listed, the user may need to enter the device's unique code to pair the devices. Once the devices are paired, the mobile device should be able to read data from the wearable device.If the pairing does not work, the user may need to update the firmware on the smart wearable device.Updating the firmware can fix compatibility issues between the two devices.Finally, NFC (Near Field Communication) is not needed to sync the two devices, as NFC only works with very close proximity.The most likely fix for Joe's issue with his smart wearable device not synchronizing to his mobile device is to pair the devices. This process should allow the two devices to communicate and synchronize data between each other.Pairing the devices involves entering a PIN code or pressing a certain button to establish a secure connection. This may require both devices to be close to each other. Once the devices are paired, they should be able to share data.

To learn more about Pair the devices refer to:

https://brainly.com/question/29236437

#SPJ4

You are configuring cloud-based virtual networks without having to connect directly to the cloud provider hardware routers to configure VLANs. What enables this capability

Answers

Above the hardware that makes up network infrastructure, software-defined networking (SDN) adds a configuration layer that makes management easier and more standardized, such as through a web GUI or command-line tools.

Which approach involves processing data on network edge devices before moving it into and out of the cloud?

In order to process data between data sources and a public cloud environment, such as a business on-premises network, fog computing, also known as edge computing, uses network edge devices.

What type of network security protocol allows for the encryption of all network traffic with just one configuration?

Unlike application security protocols like HTTPS, which only apply to web servers and require each server to have a PKI certificate, IPSec can be configured to secure some or all network traffic using a single setup.

To know more about SDN visit :-

https://brainly.com/question/29386698

#SPJ4

It is possible to construct any algorithm using only Python's built-in operators and control statements. It is possible to construct any algorithm using only Python's built-in operators and control statements. False

Answers

Any algorithm can be developed using only the control statements and built-in operators of Python. The memory for the stack frame is reallocated when a call returns or finishes running.

Which of the following statements best represents how a parameter is used in Python?

When a function is called, an argument is supplied to it and is referred to as a parameter in the function declaration.

What is the name of the diagram that depicts the connection between the functions of a program and the flow of data between them?

In the Unified Modeling Language, a collaboration diagram—also called a communication diagram—illustrates the connections and interactions between software elements (UML).

To know more about Python visit:-

https://brainly.com/question/18502436

#SPJ4

Which of the following is the correct statement to return a string from an array a of characters?
A. toString(a)
B. new String(a)
C. convertToString(a)
D. String.toString(a)

Answers

The following is the appropriate syntax to extract a string from an array of characters named New String(a).

Which of the following describes the action of directly assigning a value of a primitive data type to an object wrapper?

The process of turning a primitive value into an object of the relevant wrapper class is referred to as autoboxing. Changing an int to a class of integer, for instance.

Which of the following statements uses Java to build a string?

by a new word: The "new" keyword is used to construct Java Strings. Consider this: String s = new String ('Welcome'); Two objects are created (one each in the heap and the String pool), and one reference variable is also created, with the variable "s" referring to the heap object.

To know more about New String(a) visit :-

https://brainly.com/question/30099412

#SPJ4

Other Questions
A manufacturer receives parts from two suppliers. A simple random sample of 400 parts from supplier 1 finds 20 defective. A simple random sample of 200 parts from supplier 2 finds 20 defective. Let p1 and p2 be the proportion of all parts from suppliers 1 and 2, respectively, that are defective. Test whether the defective rates of the parts from two suppliers are significant different at the 1% significance level. Conduct a hypothesis testing. Answer the next three questions. 12. Test statistic Dengue fever is an infectious disease of humans that is caused by a virus. There are four main viral strains, and an individual can never be infected by the same strain twice. However, a second infection can occur by any of the other strains. The severity of the second infection depends on the identity of both the strain that caused the first infection and the strain causing the second infection, as well as the order in which these were acquired. Required:How many different levels of severity are possible for an individual acquiring a second infection help pls, i'm stuck on this question organization formed at the end of world war ii to promote international peace and security carlos scored a total of 60 points in his last three basketball games. be improved in each game by scoring 6 more points than in the previous game. how many points did carlos score in his first game? Form the quadratic equation whose one root is 2 + 2^(1/2) What is moment arm distance? Ms A is a 53 year old marketing executive recently diagnosed with uterine cancer. She had a total hysterectomy and is undergoing radiation therapy. She is experiencing nausea, diarrhea, vomiting, and anorexia. Questions 45, 46, 47 refer to this case study. The symptoms she is experiencing are consistent with: What is the equation of the line that passes through the points (-2, 3) and (2, 7)? (5 points)O x-y=-1Ox-y=-2Ox-y=-5O x-y=-6 If the number of moles in a balloon is doubled, but the temperature and pressure don't change, what happens to the volume? aIt increases, but not in proportion with the moles bIt is cut in half cIt doubles dIt does not chang What is the approximate volume of this cone?3.14 as your approximation for Enter your answer as a whole number, like this: 42 A person travels by car from one city to another with different constant speeds between pairs of cities. She drives for 35.0 min at 55.0 km/h, 16.0 min at 95.0 km/h, and 40.0 min at 35.0 km/h and spends 55.0 min eating lunch and buying gas. (a) Determine the average speed for the trip. PLSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS HEEEEEEEEEEEEEEEEEEEEEEEELLLLLLLLLP ILLLLLLLLLLLLL BIVE brainleist help pls asap gotta ace this bc my grades bad If a solution is 8% solute, it is [x]% solvent After the Zhou removed this Shan as rulers, how did they reorganize the land? Which event allowed Germany to transfer soldiers to the western front?Soviet soldiers joined the war.US soldiers joined the war.Germany made peace with the Soviet Union.Germany made peace with the United States. Help please with this maths 1. Write a short dialogue between 'You and your Maths teacher' about study. 2.Write a short dialogue between 'A student and a class teacher' about leave. Donde estan Las palabras alphabet soup help