Ask a New Question
Search
Questions and answers by
hrsdptmsshch (supernatural)
Questions (343)
Use the sentences to answer the question.
Franklin spent an hour researching at the library last night. He checked out four books
1 answer
17 views
What is an absolute phrase?(1 point)
Responses a dependent clause that functions as an adverb a dependent clause that functions
1 answer
15 views
Which sentence includes a comma splice?(1 point)
Responses Cell phones should be permitted in schools, they can function as an
1 answer
13 views
Which sentence correctly uses the word they’re correctly?(1 point)
Responses They’re currently studying the technique of
1 answer
15 views
Which sentence correctly follows punctuation conventions?(1 point)
Responses Many customers have asked, “Does milk from
1 answer
19 views
Which sentence correctly uses hyphenation conventions?(1 point)
Responses The two faced-woman was unliked by others. The two
1 answer
19 views
In terms of climate change, what do cherry blossoms and sugar maple trees have in common?(1 point)
Responses They are affected by
1 answer
23 views
What is a major impact of climate change for fish species?(1 point)
Responses food toxicity food toxicity too much carbon dioxide
1 answer
30 views
A corporation is concerned that their code is being stolen by a different company, so they implement new procedures for logging
1 answer
25 views
Virtual private networks (VPNs) employ which protection mechanism?(1 point)
Responses encryption encryption checksums checksums
1 answer
14 views
What is the most complete explanation of the Zero Trust Methodology?(1 point)
Responses No one and no device are considered
1 answer
14 views
What is the goal of SafeCode?(1 point)
Responses to reduce the developers working on a project to reduce the developers working
1 answer
13 views
A business was recently breached due to a user downloading a file from the internet. This file, once opened, ran a Trojan virus
1 answer
15 views
How can you protect your home computer from being accessed by anyone in your household and getting into your personal data and
1 answer
17 views
What is the purpose of a firewall?(1 point)
Responses limits people using the internet limits people using the internet monitor
1 answer
13 views
What is the best action that a company should take when a mobile device is lost with an active network connection, and a copy of
1 answer
15 views
Using media access control (MAC) on your Wi-Fi requires the devices to which of the following?(1 point)
Responses see the SSID
1 answer
16 views
Backup software must be capable of proving which of the following functions to ensure the backup tapes are safe if they are
1 answer
19 views
You install antimalware software on your computer. What is the major attack you are trying to prevent the users from
1 answer
18 views
Claim: Since it requires an incredible amount of skill, golf should be regarded as a sport and golfers should be considered
1 answer
21 views
Within three years, two-thirds of the world’s population is expected to face water scarcity. Since showering accounts for
1 answer
14 views
A student is developing a claim about federal funding for public libraries. Which of these claims is fair?(1 point)
Responses
1 answer
21 views
A student is writing an argument that libraries in the United States should receive more federal funding. Which of the following
1 answer
14 views
When should a writer include counterclaims in the body of the essay and refute them point by point?(1 point)
Responses when the
1 answer
19 views
Why should a writer of an argumentative text include counterclaims? Select the two correct answers.(1 point)
Responses to show a
1 answer
13 views
What is the purpose of an opening statement in an argumentative text?(1 point)
Responses to support the reasoning to support the
1 answer
25 views
Which questions help a reader compare and contrast introductions to argumentative texts on the same topic? Select the two
1 answer
17 views
Why is identifying the audience vital to planning an argument? Select the two correct answers.(1 point)
Responses It allows a
1 answer
13 views
What are a writer’s purposes in an argumentative text? Select the two correct answers.(1 point)
Responses to tell readers about
1 answer
15 views
What is generally traded when securing systems?(1 point)
Responses the cost of implementation the cost of implementation the time
1 answer
13 views
Which of the following is an example of an internal threat?(1 point)
Responses a company protecting resources internally a
1 answer
16 views
A student has been prompted by their computer to install a patch for their operating system. They decide to ignore the message
1 answer
13 views
You have been surfing the internet and have decided to download a new game. Your computer issues a warning that the software may
1 answer
13 views
Quadrilateral upper R upper S upper T upper U.
In quadrilateral RSTU , diagonal RT¯¯¯¯¯¯¯ makes a pair of alternate
1 answer
11 views
Trapezoid upper A upper B upper C upper D with parallel sides upper A upper B and upper C upper D.
ABCD is a trapezoid with
1 answer
10 views
Quadrilateral with vertices upper P, upper Q, upper R, upper S. Angles upper P and upper R are across from each other and marked
1 answer
13 views
Quadrilateral labeled with vertices upper A, upper B, upper C, and upper D. The segment between upper B and upper D is longer
1 answer
11 views
Trapezoid upper A upper B upper C upper D with two parallel sides and two non-parallel sides.
ABCD is a trapezoid with
1 answer
8 views
Quadrilateral labeled with vertices upper A, upper B, upper C, and upper D. The segment between upper B and upper D is longer
1 answer
9 views
Quadrilateral labeled with vertices upper A, upper B, upper C, and upper D. The segment between upper B and upper D is longer
1 answer
12 views
What external threat could potentially compromise the security of an organization?(1 point)
Responses poor encryption protocols
1 answer
14 views
When a breach occurs on a small- or medium-sized business, and they have customer data exposed, the business has a 60% rate of
1 answer
21 views
Why would you shut down operations when a breach was detected?(1 point)
Responses to stop email from sending out bad emails to
1 answer
15 views
What is the effect of a security breach?(1 point)
Responses data loss data loss increase in revenue increase in revenue
1 answer
13 views
Describe the role of Governor Orval Faubus in the events surrounding the Little Rock Nine and how his actions impacted the
1 answer
15 views
What challenges did the Little Rock Nine face during their attempt to attend Central High School, and how did they overcome
1 answer
20 views
"How Robots Can Assist Students with Disabilities" by Alina Tugend
Imagine: Robots that help teach social skills to children with
1 answer
13 views
Use the word and its definition to answer the question.
conform: to comply with rules, laws, or standards What affix could you
1 answer
13 views
"Formerly Undocumented Woman Teaching Immigrants" by Samuel Gilbert
Most of BNHR’s work goes to support families. On the day I
1 answer
15 views
Example: A reference to the verse on the Statue of Liberty resonates with Americans because of its familiarity.
How does this
1 answer
16 views
What is an anecdote?(1 point)
Responses the stating of two opposite ideas using the same grammatical structure the stating of two
1 answer
13 views
A square with vertices upper S, upper D, upper G, and upper F (in that order). There are two dashed diagonals that intersect at
1 answer
12 views
A square with vertices upper A, upper S, upper D, and upper F (in that order) that appears slightly askew. There are two dashed
1 answer
14 views
A rhombus with vertices L, M, K, and F that looks like a diamond.
If m∠MKA=18.5° , which two statements would need to be true
1 answer
14 views
A rhombus with vertices L, M, K, and F that looks like a diamond.
If LA¯¯¯¯¯¯¯=−3x+4 and LK¯¯¯¯¯¯¯¯=−5x , what
1 answer
11 views
A parallelogram with vertices upper A upper B upper C upper D.
Because congruent diagonals prove that a parallelogram is a
1 answer
20 views
Rectangle upper A upper B upper C upper D is shown with point upper O in the center. Diagonal segments upper A upper C and upper
1 answer
32 views
Use the image to answer the question.
A rectangle upper A upper B upper C upper D has diagonals between upper A upper C and upper
1 answer
18 views
Use the image to answer the question.
A quadrilateral upper A upper B upper C upper D. Two diagonals connect vertices upper A to
1 answer
20 views
Quadrilateral ABCD≅LMNO≅STUV. If STUV is a rectangle and diagonal SU¯¯¯¯¯¯¯=5 cm, what is the length of diagonals AC
1 answer
44 views
Use the image to answer the question.
A rectangle upper A upper B upper C upper D has diagonals between upper A upper C and upper
1 answer
23 views
A rectangle upper A upper B upper C upper D has diagonals between upper A upper C and upper B upper D. The diagonals insect at
1 answer
19 views
Use the image to answer the question.
A quadrilateral upper A upper B upper C upper D. Two diagonals connect vertices upper A to
1 answer
23 views
Triangle ABC is drawn on a coordinate plane with vertices A(−3,−3), B(0,6), and C(4,−3) and medians indicating the
1 answer
17 views
A coordinate plane's axes range from 0 to 8, both by 1-unit increments. A triangle made up of vertices upper A, upper B, and
1 answer
24 views
Triangle ABC is drawn on a coordinate plane with vertices A(−2,−3) , B(4, 0) , and C(−2, 2) and medians indicating the
1 answer
19 views
A coordinate plane's axes range from negative 7 to 7, both by 1-unit increments. A triangle made up of vertices upper A, upper
1 answer
22 views
A scalene triangle made up of vertices upper A, upper B, and upper C, is plotted on a grid. Each of its vertices have their
1 answer
21 views
Triangle ABC is drawn on a coordinate plane with vertices A(4,4), B(9,1), and C(3,−1) and with medians indicating the midpoint
1 answer
17 views
Declaration of Sentiments, Seneca Falls" by Elizabeth Cady Stanton
The history of mankind is a history of repeated injuries and
1 answer
18 views
How can you best determine the intended meaning of a word with multiple meanings?(1 point)
Responses by looking at the context in
1 answer
14 views
Review the boldfaced word in the passage. By knowing that the Greek word sundromē means “to run together,” you can
1 answer
16 views
"Daniel Dae Kim statement to the U.S. House Committee" by Daniel Dae Kim
I was speaking to a pollster during the recent elections
1 answer
16 views
Why is it important for readers to compare and contrast texts?(1 point)
Responses to challenge opposing viewpoints to challenge
1 answer
15 views
"E-Scooter Innovations Avoid Sidewalk Problems" by Dalvin Brown
Spin hopes its remotely operated rides will enable the company to
1 answer
14 views
Question 1
Compared to the article, which detail is emphasized in the video?(1 point) Responses the importance of teamwork the
1 answer
13 views
"'Ain't I a Woman' Speech"
by Sojourner Truth Well, children, where there is so much racket there must be something out of
1 answer
17 views
"'Ain't I a Woman' Speech"
by Sojourner Truth Well, children, where there is so much racket there must be something out of
1 answer
20 views
Which of the following are most likely included in government foundational documents?(1 point)
Responses a list of famous
1 answer
14 views
About what percentage of atmospheric ozone is located in the stratosphere?(1 point)
Responses 90% 90% 10% 10% 40% 40% 75%
1 answer
20 views
Ozone in which layer of the atmosphere is sometimes called good ozone?(1 point)
Responses troposphere troposphere mesophere
1 answer
15 views
Which factor should be included in a model of energy flow into the atmosphere?(1 point)
Responses variations in local
1 answer
20 views
Which effect of temperature rise causes a feedback resulting in a rise in global temperatures?(1 point)
Responses less severe
1 answer
13 views
What does a wider tree ring indicate, as opposed to a thinner tree ring?(1 point)
Responses It indicates that the weather that
1 answer
18 views
What type of person tries to get your personal information by sending out friend requests from a fake profile?(1 point)
Responses
1 answer
19 views
You are worried about your password being stolen, but you have had this password for a long time. It is a good password and hard
1 answer
27 views
What would you use to hide and encrypt your internet traffic?(1 point)
Responses ransomware ransomware Virtual Private Network
1 answer
12 views
What security feature should you always turn on when your laptop is connected to public Wi-Fi to ensure a layer of security that
1 answer
18 views
What physical structure could you use to help prevent people from piggybacking on someone else's credentials?(1 point)
Responses
1 answer
15 views
What is adware?(1 point)
Responses Adware is a program that uses a computer network to replicate and propagate throughout the
1 answer
14 views
Question
You have a local area network (LAN) in your home and one in the business office that you own. You want to print from
1 answer
15 views
Which of the following is the correct term used to determine the bandwidth of any network transmission?(1 point)
Responses 100
1 answer
13 views
Which of the following would be a major disadvantage in a client-server model?(1 point)
Responses Username and password are
1 answer
15 views
Why must a network architect consider scalability when designing a network?(1 point)
Responses To increase the amount of switches
1 answer
10 views
You have added a new wireless tablet to the network. As an approved device, what is the function that the tablet can perform on
1 answer
17 views
What is a critical device for filtering malicious network packets from the internet?(1 point)
Responses antivirus antivirus
1 answer
16 views
What is the general network process that describes a new user gaining access to the network with a username and password?(1
1 answer
16 views
Which of the following connects physically to the switch hardware on the network?(1 point)
Responses router router server server
1 answer
18 views
What hardware is needed for a successful network?(1 point)
Responses lock down browser, anti-malware, productivity suites, and
1 answer
14 views
How does a client-server work?(1 point)
Responses works when the user enters a username and password to gain access works when
1 answer
13 views
Pages
1
2
3
4