Which of the following is a reason to use Remote Assistance instead of Remote Desktop Protocol (RDP)

Answers

Answer 1

The original statement makes the claim that you require user control over the computer.

Describe the desktop :

Documents, phone books, cellphones, reference materials, writing and painting tools, and project binders are examples of the types of items that one can find on the top of a real desk in a desktop, which is a digital display area.

What makes it a desktop, and why?

A desktop computer is one that you use at your desk as opposed to a laptop, which is one that fits on your lap. A phone or media player would be a portable computer. The term "computer desktop," which should be pronounced "computer desktop" rather than "desktop computer," is most frequently used to refer to a component of your programs and the computer.

To know more about Desktop visit :

https://brainly.com/question/30052750

#SPJ4


Related Questions

What is 90x8-78x0
help me pls

Answers

Answer:

720 - 0 = 720

Therefore, your answer is 720

Answer:

720

Hope it helps:)

Pls answer as fast as you can I will give brainliest

What aspect of the initial database planning process would the formula
(0 + Pt × 3 + p)/5 be used in?

A. Time estimation
B. Budgeting
C. Workforce forecasting
D. Entity prediction

Answers

I believe it would be “A” it would make the most sense...

__________ is a design principle that addresses the agreement or visual connection among design elements in a drawing.

Answers

Harmony the effectiveness with which a composition's visual components interact with one another. One of the most fundamental and crucial design elements is alignment. Through the creation of a visual link between them, it aids in unifying the elements on a page.

Which of the following best describes the visual route that the eye takes?

The eye of the viewer travels around the work of art, usually focusing on certain areas. Within the artwork, this visual components might be focused on the lines, borders, shapes, and colours.

What visual aspect describes the space surrounding, above, or beneath an object or objects?

The area between and around objects is known as space. Negative space is the term for the area surrounding objects; negative space

To know more about visual components visit:-

https://brainly.com/question/19584494

#SPJ4

Users are mentioning that a file share on a Windows server is no longer accessible. You check the server and see the share is still in place. You decide to check to see if any related ports are currently blocked on the server. What command can you use to investigate the ports

Answers

You can examine the ports using the other address command.

Which of the following presents a security risk following the installation of a new app on a mobile device?

storage of data. The data that you save on the device and whether other apps can access it is the most frequent security worry for Android applications.

What management tool may be used to investigate often unresponsive applications?

What management tool may be used to investigate often unresponsive applications? A log of issue events connected to system stability can be viewed using the Windows Reliability Monitor.

To know more about address command visit :-

https://brainly.com/question/29990582

#SPJ4

When this operator is used with string operands it concatenates them, or joins them together.
Select one:
a. &
b. *
c. %
d. +
e. None of these

Answers

+ concatenates or joins string operands together when used with string operands.

Does C++ attempt to convert the operands to the same type when using an operator?

A preprocessor directive must contain the iosetwidth header file when a program uses the setw manipulator. It is difficult to display the number 34.789 with two decimal places in a field of 9 spaces in C++.

when there are two different data types as operands for an operator?

Before completing the operation, C++ always converts both of the operands of an operator that has two operands of a different data type to a double. 3.5 will be displayed as a result of the next two C++ statements.

To know more about string operands visit :-

https://brainly.com/question/29602356

#SPJ4

Account_Info Account_Info_ID auto number Account_Info_Name varchar2(100) Account_Removal Account_Removal_ID auto number Account_Info_ID number Account_Removal_Name varchar2(100) Account_Info contains all records in the system Account_Removal contains all removed records in the system Please write a SQL statement to retrieve only records that are not in the Account_Removal table

Answers

The SQL statement to retrieve only records that are not in the Account_Removal table is:

SELECT * FROM Account_Info WHERE Account_Info_ID NOT IN (SELECT Account_Info_ID FROM Account_Removal);

How to write a SQL statement?A SQL statement is a type of query used to interact with databases and retrieve data. The statement is written in Structured Query Language (SQL) and is often used by developers, data analysts, and other professionals who need to access and manipulate data. To write a SQL statement, the first step is to determine the type of query required. For example, SELECT statements are used to retrieve data, INSERT statements are used to add new data, and UPDATE statements are used to modify existing data. Once the query type is identified, the statement is written using the appropriate keywords, such as SELECT, FROM, WHERE, ORDER BY, and other keywords. Furthermore, the statement should include the specific columns and tables that the query should target, as well as any parameters that should be used to filter the results.After the statement is written, it should be tested before it is executed. This is to ensure that the statement is working correctly and that the data being retrieved is accurate and up-to-date. Once the statement is tested and confirmed to be working correctly, it can be executed to retrieve the desired results.

To learn more about sql statement refer to:

https://brainly.com/question/19538735

#SPJ4

the security team was eventually able to write a better rule to match the sql injection technique that the attacker had used.

Answers

Input validation and parametrized queries with prepared statements are the only effective defences against SQL Injection attacks. Not just web form inputs like login forms must be sanitised by the developer.

What is SQL Injection attacks ?In computer science, SQL injection is a method of attacking data-driven systems by injecting malicious SQL statements into entry fields for execution. Although SQL injection is primarily recognised as a website attack vector, it may be used to target any kind of SQL database.Attackers can become administrators of the database server, spoof identities, alter already-existing data, cause repudiation problems like cancelling transactions or changing balances, allow full disclosure of all data on the system, destroy data or otherwise make it unavailable, and cause repudiation issues.In fields like login boxes, search boxes, or "sign up" fields, hackers input SQL commands. The goal is to access a system using intricate code sequences and divulge the data stored inside.

To learn more about SQL Injection refer :

https://brainly.com/question/15685996

#SPJ4

Single-Select Questions with Reading Passage #1 Grocery Grabbr The following passage will be used to answer questions #1 - #5 Markus is finding that it takes too long to track down all of the groceries he needs to buy from a given store. Grocery Grabbr to the rescue! The app allows Markus to input his shopping list and search for his local grocery store in Grocery Grabbr's database. If his grocery store is there, Markus is all set to go! The database stores grocery items, cost, and item location information for each grocery store. When Markus walks into the store, a notification pops up on his smartphone letting him know that Grocery Grabbr is ready to get to work. Each of Markus' grocery items is displayed one at a time, along with the aisle number and shelf location. After Markus grabs his items off the shelf, he hits a button on the app to navigate to the next item. The list of items is arranged so that Markus follows the most efficient path through the grocery store. When Markus finishes shopping, the total amount of money his groceries cost is displayed, which allows him to double check the total cost with the cashier. Grocery Grabbr pays grocery stores a small amount of money for each user who successfully uses the app and checks out of the store with over one hundred dollars worth of groceries.
Question: Which of the following data must be obtained from the user's smartphone in order for Grocery Grabbr to suggest the order for picking up groceries?
A. the grocery list the user input
B. the location of the grocery store
C. the user's photo album on their smartphone
D. the user's current location

Answers

Answer:

A. the grocery list the user input

D. the user's current location

Explanation:

In the passage provided the only actual user inputs that is needed is the grocery list and then the user must choose from a list of available grocery stores. They do not need to enter the location of the grocery store. Therefore, the only actual pieces of data that the app would need are the grocery list that the user inputs and the user's current location in order to provide the list of available nearby grocery stores for picking up the groceries. This is done through the GPS on the smartphone.

The Windows ________ utility returns your computer to the state it was in when it came from the factory.

Answers

Answer:

Windows system Restore.

How to fix microsoft has blocked macros from running because the source of this file is untrusted

Answers

Removing Mark of something like the Web is the quickest way to unlock macros. To delete, perform an appropriate on the file, select Properties, and then click the General tab's Unblock checkbox.

Who currently owns Microsoft?

250 million Microsoft shares, or 103 million shareholder votes, are owned by Bill Gates. As of December 2021, the selling price of Bill Gates' ownership in Windows was $35 billion. William H. "Bill" Gates

How can I contact Microsoft customer support?

To get support phone numbers. If a post was useful to you, kindly advise it as such and give it a rating. This will make it easier for other people to discover solutions to similar queries.

To know more about Microsoft visit :

https://brainly.com/question/26695071

#SPJ4

A professor went to a website for rating professors and looked up the quality rating and also the​ "easiness" of the six​ full-time professors in one department. The ratings are 1​ (lowest quality) to 5​ (highest quality) and 1​ (hardest) to 5​ (easiest). The numbers given are averages for each professor. Assume the trend is​ linear, find the​ correlation, and comment on what it means

Answers

The result of the statistical software for this issue is r = 0.862. As a result, there is a 0.86232315 link between quality and ease.

Is a website reliable?

Look at the website's URL. If the URL starts with "https" rather than "http," the site is secured with a TLS/SSL certificates (the s in https stands for secure). All of your data is protected by TLS certificates when it is transmitted from computer browser to the webpage servers.

What drives our use of websites?

A web page is frequently used to give viewers information, including images or videos to better explain crucial subjects. A website can be utilised to market goods and services to visitors. A site, like our website Computer Hope, is made up of several web pages.

To know more about Website visit :

https://brainly.com/question/19459381

#SPJ4

Which of the following statements about yield management systems (YMS) is true?a.The first use of YMS was in the U.S. car industry as it looked for ways to compete withimports.b.YMS eliminate the problem of simultaneous production and consumption from services.c.YMS cannot be used by any other businesses but services.d.YMS are complex pricing systems used to set equilibrium pricing points.e.YMS are mathematically complex systems to make use of underutilized capacity andreduce the cost of perishability.

Answers

The statements about yield management systems (YMS) is true is e. YMS are mathematically complex systems to make use of underutilized capacity and reduce the cost of perishability.

Yield management systems (YMS) are a set of mathematical and analytical techniques used to optimize the revenue and profits of businesses that have a limited capacity, perishable inventory, and uncertain demand. They are used by a wide range of industries, such as airlines, hotels, car rental companies, and event venues, to set prices that reflect the level of demand and the urgency of the purchase. YMS are designed to make use of underutilized capacity and reduce the cost of perishability by adjusting prices based on demand patterns and historical data, and by offering different prices for different types of customers.

Learn more about yield management systems here:https://brainly.com/question/17003985

#SPJ4

The claim that yield management systems (YMS) are mathematically complicated systems that exploit underutilised capacity and lower perishability costs is valid.

A collection of quantitative and analytical methods known as yield management systems (YMS) are used to maximize sales and profitability for companies with constrained capacity, perishable inventory, and erratic demand.

They are used by a variety of businesses, including travel agencies, lodging establishments, vehicle rental agencies, and locations for special events, to determine rates that account for the level of demand and the urgency of the transaction.

YMS are made to modify pricing depending on historical data and demand patterns, and to provide various prices for various products in order to take advantage of underutilized capacity and lower the cost of perishability.

To know more about yield management systems brainly.com/question/17003985

#SPJ4

A customer recently moved a high-end graphics card from a known-working computer to a different computer. The computer works without issue when viewing email and web pages or when using certain applications. However, when a game with high-end graphics requirements is opened, the program will run for a few minutes before the computer shuts down. Which of the following is MOST likely causing the problem?
A. Video RAM
B. Power supply wattage
C. CPU frequency
D. Monitor resolution

Answers

The most likely cause of the problem is the power supply wattage.

What type of graphics card was installed in the new computer? The type of graphics card installed in the new computer depends on the specific model of the computer and its intended use. For example, a gaming computer may require a more powerful graphics card than a basic office computer. If the new computer is used mainly for gaming or video editing, it may require a dedicated graphics card such as an NVIDIA GeForce or AMD Radeon. For basic office work, a basic integrated graphics card is sufficient. When selecting a graphics card, it is important to consider the types of games or programs that will be used with the computer. Some games or programs may require a more powerful graphics card to run smoothly. Additionally, if the computer is used for video editing, an additional graphics card such as a Quadro or FirePro may be required. When shopping for a new computer, it is important to research the specific graphics card that will be required for the intended use of the computer. This will help to ensure that the computer is equipped with the necessary hardware to run the desired programs or games. Additionally, it is important to consider the power supply of the computer when selecting a graphics card.Some graphics cards require more power than the standard power supply can provide, so a higher wattage power supply may be necessary.

To learn more about graphics card refer to:

https://brainly.com/question/30097997

#SPJ4

Select the correct answer from each job down menu

Ben is writing an assignment on feasibility study. Help him complete the following sentences

The _____ feasibility Study an evolution of the effectiveness of the product to meet clients requirements. This study requires a board visualization of how the product will operate once it is ______ and ready to use.

Options for the first box are: operational, social, and technical

Options for the second box: researched, installed, and proposed

Answers

Answer:

The Operational feasibility Study an evolution of the effectiveness of the product to meet clients requirements. This study requires a board visualization of how the product will operate once it is installed and ready to use.

Explanation:

A feasibility study is an inquest on the possibility of launching a project. It determines whether a project should be continued or discontinued. The operational feasibility study determines the usability of the project by clients after it is completed.

If the project will not meet the client's requirement, then the project has failed the operational feasibility study and should be discontinued. We also have the technical and economical feasibility studies.

A user calls the help desk stating a laptop is performing slowly and the hard drive activity lights are blinking continuously. A technician checks for enough hard drive space, disables antivirus and indexing services, and runs a full-system diagnostics check, which returns no failure. Which of the following should the technician do NEXT?
A. Install a new hard drive
B. Check for hard-drive firmware updates
C. Replace the hard drive with a solid state drive
D. Configure the laptop in high-performance mode
E. Change the boot order in the system BIOS

Answers

Check for hard-drive firmware updates. Without requiring any hardware upgrades, a firmware update will provide your device new, sophisticated working instructions.

What is firmware ?Firmware is a particular type of computer software that in computers controls the hardware at the lowest level. Firmware can serve as the entire operating system for simpler devices, handling all control, monitoring, and data manipulation tasks. Computers, home and personal appliances, embedded systems, and computer peripherals are common examples of gadgets that contain firmware. Non-volatile memory systems like flash memory, ROM, EPROM, and EEPROM store firmware. Firmware updates necessitate the actual replacement of ROM integrated circuits or the reprogramming of EPROM or flash memory using a unique technique. Some firmware memory devices have pre-installed software that cannot be removed after purchase. Firmware updates are frequently performed to address bugs or add features.

To learn more about Firmware refer :

https://brainly.com/question/18000907

#SPJ4

is it true or false graphics created in a computer are computer graphics​

Answers

Answer:

True because it just makes sense

Explanation:

Answer: true

Explanation: its computer graphics

state three advantages of using a printer​

Answers

Answer:

Advantage: Convenience. One of the key advantages of printing out material is that it is convenient.

Advantage: Secure Delivery. Paper records can be anonymously delivered

Advantage: Ease of Reading

I hope It helps

Need help

What are the two types of requirements needed for analysis?

A. Operational and system

B. Software and system

C. Technical and system

D. Operational and technical

Answers

I think the answer is D

Drag each label to the correct location on the image.Match the file formats with the types of multimedia they can store.GIFFLVMP4AACPNGRM

Answers

A technique of delivering information or entertainment that incorporates several communication modalities is known as multimedia.

What is meant by multimedia?A system for transmitting information or entertainment that uses a variety of communication methods is known as multimedia. To present at school, you might use multimedia. For instance, multimedia could include audio clips, still images, and video.Contrary to traditional mass media, which includes little to no user interaction like printed material or audio recordings, multimedia is a form of communication that combines various content forms like text, audio, images, animations, or video into a single interactive presentation. Video podcasts, audio slideshows, and animated videos are a few common forms of multimedia.The fundamentals of software, hardware, and other technologies, as well as their applications in interactive communication, are all included in multimedia.

Matched the file formats :

JPEG - IMAGE

WMA - AUDIO

MP4 -VIDEO

MNG- ANIMATION

Learn more about multimedia refer to :

https://brainly.com/question/24138353

#SPJ4

Which of the following must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function ?
A. UpnP
B. Power Spike
C. Power Surge
D. Disk Management

Answers

UpnP option (A) must be enabled to allow a video game console or VoIP handset to configure your firewall automatically by opening the IP addresses and ports needed for the device to function .

How do firewalls work?

In a private network, firewalls act as gated barriers or gateways to regulate the flow of authorized and unauthorized web traffic. The phrase refers to actual structures that serve as barriers to contain fires until rescue services can put them out.

Can a firewall be breached by hackers?

A firewall might be safe, but if it's guarding a vulnerable program or operating system, a hacker will quickly get over it. There are countless instances of software flaws that hackers can reap the benefits of to penetrate the firewall.

To know more about Firewall visit :

https://brainly.com/question/28411552

#SPJ4

An Information Technology department is looking for a new inventory management system. Which of the following would be the most accurate choice: A) Schematic
B) Spreadsheet
C) Network Diagram
D) Radio Frequency Identification (RFID) database system

Answers

The D: "Radio Frequency Identification (RFID) database system" is an Information Technology department looking for a new inventory management system.

Radio Frequency Identification (RFID) technology has been designed to keep track of individual elements in inventory, even if these items are not visible or are moving around quite a bit, Radio Frequency Identification (RFID) database system is a perfect tool for practicing airtight inventory control. After all, this technology can sense when an element leaves a warehouse or store, provided the RFID tag remains in place.

Thus, Radio Frequency Identification (RFID) database system offers an optimal inventory control.

You can learn more about Radio Frequency Identification (RFID) at

https://brainly.com/question/1933883

#SPJ

which of the following is a characteristic of a college savings plan

Answers

Answer:

where are the options for the question

all of the following are principles essential to a secure information system except A. Integrity B. Accountability C. Availability D. Confidentiality

Answers

The following are principles essential to a secure information system except for accountability.

Which is an essential principle of a secure information system?

An essential principle of a secure information system is the concept of defense in depth. This is a multi-layered approach to security, which involves the use of multiple layers of security controls. These security controls can include technical measures, such as firewalls, encryption, and authentication protocols; physical measures, such as locked doors and access cards; and administrative measures, such as policies and procedures.

By using multiple layers of security controls, it becomes much more difficult for an attacker to penetrate the system.

Furthermore, the presence of multiple layers of security also makes it easier to detect and respond to any attempts at unauthorized access.

The defense-in-depth approach is essential for protecting sensitive data and ensuring the integrity of information systems.

To learn more about information systems refer to:

brainly.com/question/24944623

#SPJ4

Based on the output from your switches, answer the following questions: Which switch is the root bridge

Answers

The output from a switch is the process of forwarding a packet from one port to another port on the same switch or to another network device. The switch uses the MAC address of the destination device to determine the correct port to forward the packet to.

To choose the root bridge on a switch, the switch uses a protocol called the Spanning Tree Protocol (STP). The STP algorithm selects one switch in the network to be the root bridge, which is the central point for the network topology. The root bridge is responsible for sending out bridge protocol data units (BPDUs) and determining the best path for data to travel through the network.

To choose the root bridge, the switch uses a process called the election process, in which the switch with the lowest bridge ID (BID) is chosen as the root bridge. The BID is a combination of the switch's MAC address and a configurable priority value. The switch with the lowest BID is chosen as the root bridge and the other switches in the network will adjust their paths to forward traffic through the root bridge.

You can choose the root bridge in the switch by configuring the switch's priority value. A lower priority value will increase the chances of the switch being elected as the root bridge.

The answer has to be general since the question is incomplete.

Learn more about root bridge here: brainly.com/question/29417452

#SPJ4

what do you mean by radix of a number system​

Answers

Answer:

The description on the given topic is summarized in the below explanation segment.

Explanation:

One concept is known as the radix, always seemed to denote the sequence of numbers or digits included throughout a spot numbering scheme before actually "moving over" towards the next number.There would be a variety of different components or figures throughout a place number system scheme, plus the point zero.

You work in an office that uses Linux servers and Windows servers. The network uses both the TCP/IP protocol. The Linux server is used as an FTP server. Today you have received several calls from people who are unable to contact the Linux server at its known IP address. You are sitting at the Linux server and want to check its IP address. Which command should you use

Answers

Answer:

The answer is "ifconfig".

Explanation:

The ifconfig. me is indeed a website that shows basic network packets, like IP address, hostname, user agent string. It provides a simple interface that may be queried with the assistance of the command prompt to obtain the required information. The whole function provides the essential information about a certain program's interface.

You can include ____ in calculations to indicate which calculation should be done first.
a.brackets [ ]
b.curly braces { }
c.slashes //
d.parentheses ( )

Answers

parentheses ( )

What is an illustration of a parenthesis?

Parentheses () are used to surround additional, non-essential material in a sentence to clarify, explain, or add a footnote. To avoid breaking the flow of a statement, use parenthesis. Examples: She’ll be arriving at our place after work (about six o’clock). Today I’m going to see my grandmother (my father’s mother).

Parentheses are a type of punctuation mark that is commonly used to add extraneous information or an aside to a phrase. Parentheses are represented by two curved vertical lines: ( ). A parenthesis is a single one of these punctuation symbols.

To learn more about parenthesis to refer:

https://brainly.com/question/28190753

#SPJ4

You must ensure that cloud storage is available in the event of a regional disruption. What should you configure

Answers

Data redundancy is made possible in the event of a disruption in one region by replicating data stored in the cloud to additional physical locations, or geographic zones.

Which cloud computing paradigm puts the onus of patching virtual machine operating systems on the cloud provider?

In the IaaS model, the cloud service provider controls IT infrastructures including storage, server, and networking resources and offers them to subscriber companies via virtual machines accessible over the internet.

Which common port is utilized to connect to a Radius server?

UDP packets are used by the RADIUS protocol. For RADIUS authentication packets, two UDP ports are utilized as the destination port (ports 1645 and 1812). For authentication packets, it should be noted that port 1812 is used more frequently than port 1645.

To know more about Data redundancy visit :-

https://brainly.com/question/11711681

#SPJ4

Which step of the Department of Defense Risk Management Process consists of the activities to develop, implement, implement and document

Answers

The program's activities to create, put into practice, and record the procedures it will take to mitigate certain risks make up the risk management process planning process.

What are the steps in the risk management procedure for the Department of Defense?

The five key steps of the risk management process are planning, identification, analysis, mitigating risk, and monitoring.

Which of the following phrases describes the procedure of monitoring and evaluating risk as you get more knowledge about risk in projects?

The process of locating and evaluating potential problems that can adversely affect important corporate endeavors or projects is known as risk analysis. This process is used to help businesses avoid or reduce particular risks.

To know more about program's  visit:-

https://brainly.com/question/11023419

#SPJ4

What is the name of the process which permits a continous tone image to be printed simultaneously with text

Answers

The Halftone process is the name of the process which permits a continous tone image to be printed simultaneously with text.

An image in halftones is what?

Halftones are used most frequently to print photographs, paintings, or other comparable pictorial works that are reprinted in books, periodicals, and newspapers. In a halftone, the picture's continuous tones are divided into a sequence of evenly spaced, varying-sized dots and printed using just one ink colour.

In image processing, what is halftoning?

By changing the size of teeny black dots placed in a regular pattern, halftoning, also known as analogue halftoning, simulates different shades of grey. Printing companies and the publishing business both employ this method.

To know more about Halftone visit

brainly.com/question/10678312

#SPJ4

Other Questions
HELP DUE IN 15 MINS!Quadrilateral DAVE has vertices D(2, 2), A(4, 2), and V(5, -3). Plot a point E to make DAVE an isosceles trapezoid.1. What are the coordinates of E ( , )?? When a positive number is multiplied by the sum of twice the number and half the number, the result is the original number. What is the number Jamie is talking to her dad about the homelessness issue in their city. Her dad tells herthere wouldn't be a problem if these people would just get jobs. Jamie disagrees with herdad's statement. How might Jamie respond in a way that informs her dad about whomakes up the homeless population and why people become homeless? What are threeaction steps Jamie and her family might take to make a difference in her city's homelesspopulation? Can someone help me with this 7. Find the slope and y-intercept of the line given by -6x - 18y = 20. The school surveillance camera was able to capture an image of the suspect. The imageshows the thief standing next to the gym door. In real life the door measures 84 inches butis 14 cm in the image. If your suspect is 10.83 cm in the photo. How many inches tall arethey in real life? (Round to nearest whole inch.) Report the height in feet and inches. Ex."2 feet 5 inches" how did Lincoln handle the Trent affair 1. Write 7 example of mathematical expreion. 2. Larry had 5 3/6 yard of fabric. He ued 2 2/3 to make a bag for hi computer. Write an expreion that will how how much of the fabric Larry will have left. PLEASE HURRY UPPPPP!!! I HAVE 1 HOUR LEFT UNTIL SUBMISSION!!! How many Solutions does the equation 3x -5 = -3 have ? A bakery sells yesterday's bagels for a discounted rate of $2.64/dozen. What is the price per bagel? explain why there is a greater efficiency in supplying plants as human food Select the correct answer. which equation combines with the given equation to form a system of equations with the solution x = 3 and y = 9? x 2y = 21 a. 4x 6y = 64 b. 2x y = 36 c. 4x y = 21 d. -3x 4y = 33 e. 3x 2y = 28 Try to identify the following based on their description by a field geologist: A geologist found this sample to have an extremely shiny appearance, which was determined to be a bright silvery gray metallic. This sample is not very hard, maybe slightly harder than or as hard as a fingernail and seems to break into cubes. The following is a list of six control plans. Control Plansa. Review shipped not billed sales ordersb. Turnaround documentsc. Deposit slip filed. Procedures for rejected inputse. Computer agreement of batch totalsf. Document designThese are followed by a list of five statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). Control Goals or System Deficiencies1. The shipping clerk could not read the quantity picked that had been written on the picking ticket by the warehouse clerks.2. In a periodic/batch environment, helps to ensure the information system control goal of input completeness of the shipping notices.3. Helps to ensure that all shipments are billed in a timely manner.4. Meets the operations system control goal of efficiency of resource use by reducing the number of data elements to be entered from source documents.5. Provides an "audit trail" of deposits.Match the five control goals or system deficiencies with a control plan that would best achieve the desired goal or prevent the system deficiency. A letter may be used only once, with one letter left over. 7y+5z-2y+zgrade 7 math Solve for the area of the combined shape Shelley drew a scale drawing of a neighborhood park. The volleyball court, which is 8 meters wide in real life, is 4 millimeters wide in the drawing. What is the scale factor of the drawing?Simplify your answer and write it as a fraction. I need IXL answer's PLEASE Does the number of repeating atoms groups affect the properties of substances? 4. (15 points) Give an algorithm that takes as input a positive integer n and a number x, and computes xn (i.e., x raised to the power n) by performing O(lgn) multiplications. Your algorithm CANNOT use the exponentiation operation, and may use only the basic arithmetic operations (addition, subtraction, multiplication, division, modulo). Moreover, the total number of basic arithmetic operations used should be O(lgn). What did the Supreme Court rule about Japanese internment?