Ask a New Question
Questions and answers by
hrsdptmsshch (supernatural)
Questions (343)
Use the sentences to answer the question.
Franklin spent an hour researching at the library last night. He checked out four books
1 answer
38 views
What is an absolute phrase?(1 point)
Responses a dependent clause that functions as an adverb a dependent clause that functions
1 answer
22 views
Which sentence includes a comma splice?(1 point)
Responses Cell phones should be permitted in schools, they can function as an
1 answer
20 views
Which sentence correctly uses the word they’re correctly?(1 point)
Responses They’re currently studying the technique of
1 answer
24 views
Which sentence correctly follows punctuation conventions?(1 point)
Responses Many customers have asked, “Does milk from
1 answer
29 views
Which sentence correctly uses hyphenation conventions?(1 point)
Responses The two faced-woman was unliked by others. The two
1 answer
28 views
In terms of climate change, what do cherry blossoms and sugar maple trees have in common?(1 point)
Responses They are affected by
1 answer
30 views
What is a major impact of climate change for fish species?(1 point)
Responses food toxicity food toxicity too much carbon dioxide
1 answer
37 views
A corporation is concerned that their code is being stolen by a different company, so they implement new procedures for logging
1 answer
31 views
Virtual private networks (VPNs) employ which protection mechanism?(1 point)
Responses encryption encryption checksums checksums
1 answer
20 views
What is the most complete explanation of the Zero Trust Methodology?(1 point)
Responses No one and no device are considered
1 answer
21 views
What is the goal of SafeCode?(1 point)
Responses to reduce the developers working on a project to reduce the developers working
1 answer
18 views
A business was recently breached due to a user downloading a file from the internet. This file, once opened, ran a Trojan virus
1 answer
20 views
How can you protect your home computer from being accessed by anyone in your household and getting into your personal data and
1 answer
24 views
What is the purpose of a firewall?(1 point)
Responses limits people using the internet limits people using the internet monitor
1 answer
18 views
What is the best action that a company should take when a mobile device is lost with an active network connection, and a copy of
1 answer
24 views
Using media access control (MAC) on your Wi-Fi requires the devices to which of the following?(1 point)
Responses see the SSID
1 answer
24 views
Backup software must be capable of proving which of the following functions to ensure the backup tapes are safe if they are
1 answer
29 views
You install antimalware software on your computer. What is the major attack you are trying to prevent the users from
1 answer
24 views
Claim: Since it requires an incredible amount of skill, golf should be regarded as a sport and golfers should be considered
1 answer
33 views
Within three years, two-thirds of the world’s population is expected to face water scarcity. Since showering accounts for
1 answer
19 views
A student is developing a claim about federal funding for public libraries. Which of these claims is fair?(1 point)
Responses
1 answer
39 views
A student is writing an argument that libraries in the United States should receive more federal funding. Which of the following
1 answer
22 views
When should a writer include counterclaims in the body of the essay and refute them point by point?(1 point)
Responses when the
1 answer
28 views
Why should a writer of an argumentative text include counterclaims? Select the two correct answers.(1 point)
Responses to show a
1 answer
17 views
What is the purpose of an opening statement in an argumentative text?(1 point)
Responses to support the reasoning to support the
1 answer
36 views
Which questions help a reader compare and contrast introductions to argumentative texts on the same topic? Select the two
1 answer
34 views
Why is identifying the audience vital to planning an argument? Select the two correct answers.(1 point)
Responses It allows a
1 answer
27 views
What are a writer’s purposes in an argumentative text? Select the two correct answers.(1 point)
Responses to tell readers about
1 answer
23 views
What is generally traded when securing systems?(1 point)
Responses the cost of implementation the cost of implementation the time
1 answer
19 views
Which of the following is an example of an internal threat?(1 point)
Responses a company protecting resources internally a
1 answer
39 views
A student has been prompted by their computer to install a patch for their operating system. They decide to ignore the message
1 answer
20 views
You have been surfing the internet and have decided to download a new game. Your computer issues a warning that the software may
1 answer
19 views
Quadrilateral upper R upper S upper T upper U.
In quadrilateral RSTU , diagonal RT¯¯¯¯¯¯¯ makes a pair of alternate
1 answer
21 views
Trapezoid upper A upper B upper C upper D with parallel sides upper A upper B and upper C upper D.
ABCD is a trapezoid with
1 answer
16 views
Quadrilateral with vertices upper P, upper Q, upper R, upper S. Angles upper P and upper R are across from each other and marked
1 answer
18 views
Quadrilateral labeled with vertices upper A, upper B, upper C, and upper D. The segment between upper B and upper D is longer
1 answer
16 views
Trapezoid upper A upper B upper C upper D with two parallel sides and two non-parallel sides.
ABCD is a trapezoid with
1 answer
15 views
Quadrilateral labeled with vertices upper A, upper B, upper C, and upper D. The segment between upper B and upper D is longer
1 answer
14 views
Quadrilateral labeled with vertices upper A, upper B, upper C, and upper D. The segment between upper B and upper D is longer
1 answer
20 views
What external threat could potentially compromise the security of an organization?(1 point)
Responses poor encryption protocols
1 answer
21 views
When a breach occurs on a small- or medium-sized business, and they have customer data exposed, the business has a 60% rate of
1 answer
26 views
Why would you shut down operations when a breach was detected?(1 point)
Responses to stop email from sending out bad emails to
1 answer
23 views
What is the effect of a security breach?(1 point)
Responses data loss data loss increase in revenue increase in revenue
1 answer
23 views
Describe the role of Governor Orval Faubus in the events surrounding the Little Rock Nine and how his actions impacted the
1 answer
23 views
What challenges did the Little Rock Nine face during their attempt to attend Central High School, and how did they overcome
1 answer
27 views
"How Robots Can Assist Students with Disabilities" by Alina Tugend
Imagine: Robots that help teach social skills to children with
1 answer
20 views
Use the word and its definition to answer the question.
conform: to comply with rules, laws, or standards What affix could you
1 answer
22 views
"Formerly Undocumented Woman Teaching Immigrants" by Samuel Gilbert
Most of BNHR’s work goes to support families. On the day I
1 answer
22 views
Example: A reference to the verse on the Statue of Liberty resonates with Americans because of its familiarity.
How does this
1 answer
23 views
What is an anecdote?(1 point)
Responses the stating of two opposite ideas using the same grammatical structure the stating of two
1 answer
25 views
A square with vertices upper S, upper D, upper G, and upper F (in that order). There are two dashed diagonals that intersect at
1 answer
24 views
A square with vertices upper A, upper S, upper D, and upper F (in that order) that appears slightly askew. There are two dashed
1 answer
20 views
A rhombus with vertices L, M, K, and F that looks like a diamond.
If m∠MKA=18.5° , which two statements would need to be true
1 answer
22 views
A rhombus with vertices L, M, K, and F that looks like a diamond.
If LA¯¯¯¯¯¯¯=−3x+4 and LK¯¯¯¯¯¯¯¯=−5x , what
1 answer
24 views
A parallelogram with vertices upper A upper B upper C upper D.
Because congruent diagonals prove that a parallelogram is a
1 answer
27 views
Rectangle upper A upper B upper C upper D is shown with point upper O in the center. Diagonal segments upper A upper C and upper
1 answer
40 views
Use the image to answer the question.
A rectangle upper A upper B upper C upper D has diagonals between upper A upper C and upper
1 answer
27 views
Use the image to answer the question.
A quadrilateral upper A upper B upper C upper D. Two diagonals connect vertices upper A to
1 answer
29 views
Quadrilateral ABCD≅LMNO≅STUV. If STUV is a rectangle and diagonal SU¯¯¯¯¯¯¯=5 cm, what is the length of diagonals AC
1 answer
81 views
Use the image to answer the question.
A rectangle upper A upper B upper C upper D has diagonals between upper A upper C and upper
1 answer
33 views
A rectangle upper A upper B upper C upper D has diagonals between upper A upper C and upper B upper D. The diagonals insect at
1 answer
29 views
Use the image to answer the question.
A quadrilateral upper A upper B upper C upper D. Two diagonals connect vertices upper A to
1 answer
31 views
Triangle ABC is drawn on a coordinate plane with vertices A(−3,−3), B(0,6), and C(4,−3) and medians indicating the
1 answer
25 views
A coordinate plane's axes range from 0 to 8, both by 1-unit increments. A triangle made up of vertices upper A, upper B, and
1 answer
33 views
Triangle ABC is drawn on a coordinate plane with vertices A(−2,−3) , B(4, 0) , and C(−2, 2) and medians indicating the
1 answer
28 views
A coordinate plane's axes range from negative 7 to 7, both by 1-unit increments. A triangle made up of vertices upper A, upper
1 answer
28 views
A scalene triangle made up of vertices upper A, upper B, and upper C, is plotted on a grid. Each of its vertices have their
1 answer
27 views
Triangle ABC is drawn on a coordinate plane with vertices A(4,4), B(9,1), and C(3,−1) and with medians indicating the midpoint
1 answer
22 views
Declaration of Sentiments, Seneca Falls" by Elizabeth Cady Stanton
The history of mankind is a history of repeated injuries and
1 answer
35 views
How can you best determine the intended meaning of a word with multiple meanings?(1 point)
Responses by looking at the context in
1 answer
20 views
Review the boldfaced word in the passage. By knowing that the Greek word sundromē means “to run together,” you can
1 answer
23 views
"Daniel Dae Kim statement to the U.S. House Committee" by Daniel Dae Kim
I was speaking to a pollster during the recent elections
1 answer
21 views
Why is it important for readers to compare and contrast texts?(1 point)
Responses to challenge opposing viewpoints to challenge
1 answer
21 views
"E-Scooter Innovations Avoid Sidewalk Problems" by Dalvin Brown
Spin hopes its remotely operated rides will enable the company to
1 answer
21 views
Question 1
Compared to the article, which detail is emphasized in the video?(1 point) Responses the importance of teamwork the
1 answer
19 views
"'Ain't I a Woman' Speech"
by Sojourner Truth Well, children, where there is so much racket there must be something out of
1 answer
24 views
"'Ain't I a Woman' Speech"
by Sojourner Truth Well, children, where there is so much racket there must be something out of
1 answer
28 views
Which of the following are most likely included in government foundational documents?(1 point)
Responses a list of famous
1 answer
21 views
About what percentage of atmospheric ozone is located in the stratosphere?(1 point)
Responses 90% 90% 10% 10% 40% 40% 75%
1 answer
27 views
Ozone in which layer of the atmosphere is sometimes called good ozone?(1 point)
Responses troposphere troposphere mesophere
1 answer
25 views
Which factor should be included in a model of energy flow into the atmosphere?(1 point)
Responses variations in local
1 answer
26 views
Which effect of temperature rise causes a feedback resulting in a rise in global temperatures?(1 point)
Responses less severe
1 answer
22 views
What does a wider tree ring indicate, as opposed to a thinner tree ring?(1 point)
Responses It indicates that the weather that
1 answer
26 views
What type of person tries to get your personal information by sending out friend requests from a fake profile?(1 point)
Responses
1 answer
24 views
You are worried about your password being stolen, but you have had this password for a long time. It is a good password and hard
1 answer
50 views
What would you use to hide and encrypt your internet traffic?(1 point)
Responses ransomware ransomware Virtual Private Network
1 answer
20 views
What security feature should you always turn on when your laptop is connected to public Wi-Fi to ensure a layer of security that
1 answer
26 views
What physical structure could you use to help prevent people from piggybacking on someone else's credentials?(1 point)
Responses
1 answer
20 views
What is adware?(1 point)
Responses Adware is a program that uses a computer network to replicate and propagate throughout the
1 answer
18 views
Question
You have a local area network (LAN) in your home and one in the business office that you own. You want to print from
1 answer
22 views
Which of the following is the correct term used to determine the bandwidth of any network transmission?(1 point)
Responses 100
1 answer
21 views
Which of the following would be a major disadvantage in a client-server model?(1 point)
Responses Username and password are
1 answer
23 views
Why must a network architect consider scalability when designing a network?(1 point)
Responses To increase the amount of switches
1 answer
15 views
You have added a new wireless tablet to the network. As an approved device, what is the function that the tablet can perform on
1 answer
23 views
What is a critical device for filtering malicious network packets from the internet?(1 point)
Responses antivirus antivirus
1 answer
22 views
What is the general network process that describes a new user gaining access to the network with a username and password?(1
1 answer
21 views
Which of the following connects physically to the switch hardware on the network?(1 point)
Responses router router server server
1 answer
25 views
What hardware is needed for a successful network?(1 point)
Responses lock down browser, anti-malware, productivity suites, and
1 answer
20 views
How does a client-server work?(1 point)
Responses works when the user enters a username and password to gain access works when
1 answer
21 views
Pages
1
2
3
4