A help desk technician determines that a user's issue is caused by a corrupt file on their computer. What is the fastest way to transfer a good file to the computer?

Answers

Answer 1

The fastest way to transfer a good file to the computer is Use the C$ administrative share to copy the file.

How do I copy a file?

To copy a file, right-click on the desired file and select Copy. Alternatively, you can use the keyboard shortcut. To copy the item: click Ctrl+C. Navigate to the folder you want to move or copy the item to and click Ctrl+V or right-click and select paste.

To automatically paste the text, you will be inserting the copied content, which is in the clipboard to the desired location by the user, since such an operation only works if something has previously been copied or cut.

See more about copy a file at brainly.com/question/18241798

#SPJ1


Related Questions

Project 12-2: Bird Counter
Help me make a Python program for birdwatchers that stores a list of birds along with a count of the
number of times each bird has been spotted.


Console
Bird Counter program

Enter 'x' to exit

Enter name of bird: red-tailed hawk
Enter name of bird: killdeer
Enter name of bird: snowy plover
Enter name of bird: western gull
Enter name of bird: killdeer
Enter name of bird: western gull
Enter name of bird: x

Name Count
=============== ===============
Killdeer 2
Red-Tailed Hawk 1
Snowy Plover 1
Western Gull 2


Specifications
 Use a dictionary to store the list of sighted birds and the count of the number of times
each bird was sighted.
 Use the pickle module to read the dictionary from a file when the program starts and
to write the dictionary to a file when the program ends. That way, the data that's
entered by the user isn't lost.

Answers

The program based on the information given is illustrated below.

How to illustrate the program?

It should be noted that a computer program is a set of instructions in a programming language for the computer to execute.

Based on the information, the program is illustrated thus:

Code:

import pickle

#function to read birds data

def readBirdsData():

try:

birdsFile = open("birdsData","rb")

birdWatcher = pickle.load(birdsFile)

birdsFile.close()

birdWatcher ={}

except EOFError:

birdWatcher ={}

return birdWatcher

#function to write the data into file using pickle

def writeBirdsData(birdWatcher):

if birdWatcher == {} :

return

sorted(birdWatcher)

birdsFile = open("birdsData","ab")

pickle.dump(birdWatcher,birdsFile)

birdsFile.close()

#function to display birds data in sorted order

def displayBirdsData(birdWatcher):

print("Name\t\tCount")

print("========\t===========")

for key in sorted(birdWatcher.keys()):

print("{}\t\t{}".format(key,birdWatcher[key]))

#main function

def main():

birdWatcher = readBirdsData()

print("Bird Counter Program")

print ("\nEnter 'x' to exit\n")

name = input("Enter name of bird: ")

while True:

#break the loop if x is entered

if name == 'x':

#if the name exists in dictionary then increase the value

if the name in birdWatcher.keys():

birdWatcher[name] = birdWatcher[name] + 1

else:

#dd it otherwise

birdWatcher[name] = 1

name = input("Enter name of bird: ")

displayBirdsData(birdWatcher)

writeBirdsData(birdWatcher)

#driver code

if __nam__ == '__main__':

main()

Learn more about programs on:

https://brainly.com/question/26642771

#SPJ1

Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.

About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted widgets. They've hired you on as a security consultant to help bring their operations into better shape.

Organization requirements: As the security consultant, the company needs you to add security measures to the following systems:

An external website permitting users to browse and purchase widgets

An internal intranet website for employees to use

Secure remote access for engineering employees

Reasonable, basic firewall rules

Wireless coverage in the office

Reasonably secure configurations for laptops

Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices.

Engineers will require access to internal websites, along with remote, command line access to their workstations.

Grading: This is a required assignment for the module.

What you'll do: You’ll create a security infrastructure design document for a fictional organization. Your plan needs to meet the organization's requirements and the following elements should be incorporated into your plan:

Authentication system

External website security

Internal website security

Remote access solution

Firewall and basic rules recommendations

Wireless security

VLAN configuration recommendations

Laptop security configuration

Application policy recommendations

Security and privacy policy recommendations

Intrusion detection or prevention for systems containing customer data

Answers

The authentication can be done by using user id and password, social sign-in or by using the biometrics.  

How to explain the information?

Authentication works as follows:  

Prompting the user to enter the credentials.  Send credentials to the authentication server.  Match the credentials.  Authorize the user and grants the acces

External Website security:  

Use of firewall.  Implement the access control.  Use of MVC (Model View Controller) Use of encryption.  Use of SSL certificate.Use of security plugins.  Use of network monitoring team.  

Internal Website security:  

Use of authentication to identify the user identity.  Use of authorization to provide different user with the specific privileges and access.  Encrypt or hide sensitive web pages.  By implementing IT policies.  Educate the user about the website.  

Remote Access Solution:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway.  

Firewall and Basic rules recommendations:  

Firewall is important for managing the traffic and providing external website security.  Rules to prevent SQL injection and XSS.  Allow only the specific type of traffic.  Use access rules for IP security.  Implement certain IT policies.  

Wireless Security:  

Wifi is being used in every organization and it prevents the network from malicious access.  

Wireless security can be provided by usin encryption, decryption, and authorization.  

VLAN configuration:  

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

VLAN can be configured between router and firewall that passes the network.  

Laptop Security Configuration:  

Use of password, VPN and the registering the laptop will provide laptop security. .  

Application policy recommendations:  

Application policy includes integration, use of cookies access control, and implanting other organization and IT rules.  

Security and privacy policy recommendations:  

It includes listin of security methods to be implemented for traffic filtering, user authentication and other specific policy for the website.  

Intrusion detection or prevention for systems containing customer data:  

IPS is implemented behind firewall and it matches the incoming traffic against the security policies.

Learn more about security infrastructure on:

https://brainly.com/question/5939963

#SPJ1

When you try to move the desktop icon using the click and drag method and it doesn't move, what is the reason?​

Answers

You aren’t clicking hard enough. Go to settings and push help

Python Programming
Create a Dictionary for a bank customer that contains: First Name, Last Name, Account Number, Savings amount and Checking amount. Minimum 3 customer. (each must be different)

Create a Dictionary for a Bank ATM that is made up of the customers from above.

When your program runs it should prompt the user for an account number (must be one in your dictionary).

The user can then select the following options. (stay in a loop until the user ends the session)

Review account information. (Print all the information for that account)

Deposit money to Savings or Checking. (Add amount to account)

Withdraw from Savings or Checking. (Subtract amount from the account. Can’t go below $0).

End session with ATM. (Print a farewell message)

Answers

The python program that creates a Bankaccount class for a Bank ATM that is made up of the customers and has a deposit and withdrawal function is given below:

Python Code

# Python program to create Bankaccount class

# with both a deposit() and a withdraw() function

class Bank_Account:

def __init__(self):

 self.balance=0

 print("Hello!!! Welcome to the Deposit & Withdrawal Machine")

def deposit(self):

 amount=float(input("Enter amount to be Deposited: "))

 self.balance += amount

 print("\n Amount Deposited:",amount)

def withdraw(self):

 amount = float(input("Enter amount to be Withdrawn: "))

 if self.balance>=amount:

  self.balance-=amount

  print("\n You Withdrew:", amount)

 else:

  print("\n Insufficient balance ")

def display(self):

 print("\n Net Available Balance=",self.balance)

# Driver code

# creating an object of class

s = Bank_Account()

# Calling functions with that class object

deposit()

s.withdraw()

s.display()

Read more about python programming here:

https://brainly.com/question/26497128

#SPJ1

Security hardware and software that control access to a company’s intranet and other internal networks is called a(n):_________

Answers

Answer:Firewall

Explanation:

What is the main advantage of using DHCP?


1. Leases IP addresses, removing the need to manually assign addresses

2. Allows usage of static IP addresses

3. Allows you to manually set IP addresses

4. Maps IP addresses to human readable URLs

Answers

Answer:

1 computers will be leased an IP address from a DHCP server.

2.easier management of IP addresses.

3.allows the automatic management of IP addresses.

The main advantage of using DHCP is it leases IP addresses, removing the need to manually assign addresses.

The correct answer is Option A.

Given data:

The main advantage of using DHCP is:

Leases IP addresses, removing the need to manually assign addresses.

DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network, removing the burden of manually configuring IP addresses for each device.

This dynamic allocation of IP addresses makes network setup and management more efficient, reduces the chances of IP address conflicts, and simplifies the process of connecting devices to the network.

To learn more about DHCP server, refer:

https://brainly.com/question/31440711

#SPJ3

How the (i)?? Help me to slove this

Answers

Answer:

#include <fstream>

 ifstream inFile("bookBorrower.txt");

 ofstream outFiles ("overPayment.txt");

Explanation:

fstream has ifstream and ofstream for input and output, respectively.

As a computer starts up, you see an error message about the hal. at what point in startup does this error occur?

Answers

If you see an error message about the HAL as a computer starts up, the point in startup at which this error occurs is: C. When Windows attempts to launch critical device drivers.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:

KeyboardNetworkMonitor screenMouse

What is an operating system?

An operating system (OS) can be defined as a system software that's usually pre-installed on a computing device by the manufacturers, so as to manage random access memory (RAM), software programs, computer hardware and all user processes.

In Computer technology, if you see an error message about the HAL as a computer starts up, the point in startup at which this error occurs is typically when the Windows operating system attempts to launch critical device drivers.

Read more on computer here: https://brainly.com/question/10811580

#SPJ1

Complete Question:

As a computer starts up, you see an error message about the HAL. At what point in startup does this error occur?

A. When BIOS/UEFI is searching for an OS using devices listed in the boot priority order

B. When Windows attempts to load the user profile

C. When Windows attempts to launch critical device drivers

D. When Windows attempts to launch the Windows kernel

As data travels further over a wavelength or frequency, what goes down?

Answers

As data travels further over a wavelength or frequency, the radiation type goes down.

What is an electromagnetic spectrum?

An electromagnetic spectrum can be defined as a range of frequencies and wavelengths into which an electromagnetic wave is distributed into.

In Science, the electromagnetic spectrum consist of the following types of energy from highest to lowest frequency and shortest to longest wavelength:

Gamma raysX-raysUltraviolet radiationVisible lightInfrared radiationMicrowavesRadio waves

In this context, we can infer and logically deduce that as data travels further over a wavelength or frequency within the electromagnetic spectrum, the radiation type goes down.

Read more on electromagnetic spectrum here: brainly.com/question/23423065

#SPJ1

How is a collapsed cubit similar to a bit?

Answers

Answer:

It can stay in a state of superposition. It is still dependent on its counterparts. It has a single value of either 0 or 1.

Explanation:

hope it's helpful to you

At north wind headquarters, where were penguins first reported missing on the giant TV screen? And what did the penguins react?

Answers

Answer:

Berlin zoo

The penguins reacted that they must respond with action ASAP

Answer:

Berlin zoo, the penguins reacted that "It's time to go".

This means that the penguins care about each other and must rescue each other.

need help how to type the code please

Answers

Answer:

#include <stdio.h>

#define MAXIMUM_LOAN_PERIOD 14

#define FINE_RATE 0.20

#define SEPARATOR "----------------"

int main() {

 double amountFined;

 int numberOfBooks, daysLoan, daysOverdue;

 printf(SEPARATOR "\nBOOK LOAN SYSTEM\n" SEPARATOR "\n");

 

 printf("Enter the number of books  : ");

 scanf("%d", &numberOfBooks);

 printf("Enter the days of the loan : ");

 scanf("%d", &daysLoan);

 

 printf(SEPARATOR SEPARATOR SEPARATOR "\n");

 

 daysOverdue = daysLoan - MAXIMUM_LOAN_PERIOD;

 amountFined = FINE_RATE * numberOfBooks * daysOverdue;

 printf("Days overdue               : %d\n", daysOverdue);

 printf("Fine                       : RM %.2f\n", amountFined);

 return 0;

}

Explanation:

Reading integers can be done using scanf. What is missing in this code is checking for bad input, but the happy flow works!

State two skills to be used to access information from the internet in order to avoid unwanted materials.

Answers

Answer:

data

Explanation:

faster transmission of data

Two skills that can be used to access information from the internet while avoiding unwanted materials namely effective search strategies, critical evaluation of sources.

What is search strategies?

An organised arrangement of search phrases is known as a search strategy. In order to find relevant results, the search strategy combines the essential ideas in your search query.

All potential search terms, keywords, and phrases will be taken into account in your search strategy.

Here are two techniques for using the internet to acquire information while avoiding undesirable content:

Good search tactics include using precise and pertinent search phrases to weed out irrelevant content and improve the accuracy of search results.Source analysis: It's crucial to critically assess the information's sources before using it while accessing data online.

Thus, these are the skills used to access information.

For more details regarding search strategies, visit:

https://brainly.com/question/29610536

#SPJ2

Enterprise software is designed for organizations to __________.

Answers

Answer:

The goal of enterprise software is to enable the activities of large organizations, supporting a wide range of different user roles.

"using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer."

Answers

The use of the broadband type of communications channel is one where several users can simultaneously use a single connection for high-speed data transfer.

What is wireless medium?

In wireless transmission, the tool that is often used is the air, is via electromagnetic, radio and microwave signals.

What does broadband mean?

The term Broadband is known to be the sharing or the transmission of wide bandwidth data in course of a high speed internet connection.

Note also that broadband internet is the lowest of 25 Mbps download and that of 3 Mbps upload speeds.

Hence, The use of the broadband type of communications channel is one where several users can simultaneously use a single connection for high-speed data transfer.

Learn more about communications from

https://brainly.com/question/26152499

#SPJ1

Why is the physical layer at the bottom level of a protocol stack?

Answers

The lowest level protocols are placed at the bottom, creating the foundation upon which higher levels, or coatings, are placed. The OSI Reference Model, for example, includes seven layers, each of which is interrelated, providing assistance to those above and below.

What are the layers of stack protocol?Application layer. As indicated by its name, the application layer is responsible for communication between applications operating on two different end systems.Transport layerNetwork layerLink layer. Physical layer.

What is the top layer of the protocol stack?

The collection of protocols used in a communications network. A protocol stack is a defined hierarchy of software layers, starting from the application layer at the top (the source of the data being sent) to the data link layer at the bottom

To learn more about  physical layer, refer

https://brainly.com/question/14723994

#SPJ9

Which of the following is a key feature of a relational database?

A) It has high scalability and performance that can enable almost unlimited growth
B) It has flexible data models that make it easy to store and combine
data of any structure and allow dynamic changes to the schema.
C) It is designed for highly available systems that should provide a consistent, high-quality experience for all users globally
D) It uses primary keys and foreign keys as a means to provide
efficient access to data and is supported directly in the database
rather than maintained in the application code.

Answers

It uses primary keys and foreign keys as a means to provide efficient access to data and is supported directly in the database rather than maintained in the application code.

Explanation: Relational databases use an expressive query language, make efficient use of indexes within the database, ensure strong consistency, and fit well within an enterprise management system. Non-relational databases have a flexible data model, have high scalability, and performance, and have always-on global deployments.

The statement which describes a key feature of a relational database is that it uses primary keys and foreign keys as a means to provide efficient access to data and is supported directly in the database rather than maintained in the application code. Thus, the correct option for this question is D.

What is a Relational database?

A relational database may be defined as a collection of information that organizes data in predefined relationships where data is stored in one or more tables or relations of columns and rows, making it easy to see and understand how different data structures relate to each other.

The key features of a relational database may include atomicity, consistency, isolation, durability, data consistency, flexibility, togetherness, data sharing, independence, etc. Each relation (table) must have a unique field that describes each record. This unique field is called a primary key.

Thus, the correct option for this question is D.

To learn more about Relational databases, refer to the link:

https://brainly.com/question/13262352

#SPJ2

Why multiprocessing operating system is more suitable for modern life?

Answers

Answer:

multiple processors and they are connected with the physical memory computer buses clocks and periprial devices the main objective of using a multiprocessor operating system is to increase the exclusion speed of the system and consume high computing power

In cell N2, enter a formula using the IF function and structured references as follows to determine which work tier Kay Colbert is qualified for:
a. The IF function should determine if the student's Post-Secondary Years is greater than or equal to 4, and return the value 2 if true or the value 1 if false.

Answers

The IF Function based formula that can be entered into cell N2 that will return 2 if true, and 1 if false is =IF(M2 >=4, 2, 1).

How is the IF function used?

An IF function allows us to be able to sort through data by analyzing data to find out if it conforms to a certain characteristic that we are looking for.

If the data corresponds, the IF function will return a value that means True, but if it doesn't, the value returned would be false.

After typing in the IF function, the next thing to do is specify the cell where the data you want to analyze is. In this case that data is in cell M2. You immediately follow this up by the parameter being compared.

In this case, we want to know if the figure in cell M2 is greater or equal to 4 so the next entry is M2>=

The next entry is the return if the comparison is true. In this case, the number for true is 2 and the one for false is 1. The full formula becomes:

=IF(M2 >=4, 2, 1).

In conclusion, the function is =IF(M2 >=4, 2, 1).

Find out more on the spreadsheets at https://brainly.com/question/1429504.

#SPJ1

ethics related to all
artificial intelligence?

Answers

Answer: autonomous systems (transportation, weapons), machine bias in law, privacy and surveillance,  AI governance, confirming the moral and legal status of intelligent machines (artificial moral agents), human-machine interaction, mass automation; (3) long-term (starting with the 2100s): technological singularity, mass unemployment, space colonization. etc

TensorFlow and Pytorch are examples of which type of machine learning platform?

Answers

TensorFlow and Pytorch are examples of Supervised Machine Learning (ML), in addition, both support Artificial Neural Network (ANN) models.

What is a Supervised Machine Learning?

Machine learning (ML) is a subcategory of artificial intelligence that refers to the process by which computers develop pattern recognition or the ability to continually learn or make predictions based on data, and then make adjustments without being specifically programmed to do so.

In the supervised machine learning, the computer is given a labeled dataset that allows it to learn how a human does a task. This is the least complex model as it attempts to replicate human learning.

see more about computing at: brainly.com/question/2175764

#SPJ1

What can quantum computers do more efficiently than regular computers?

Answers

A traditional computer uses bits to do computations, where 0 represents off and 1 represents on. It processes data in the form of what is known as computer binary language—sequences of zeros and ones. More transistors increase the processing power.

The principles of quantum mechanics are used by a quantum computer. like a traditional computer that just employs ones and zeros. Particles can reach these states because of their intrinsic angular momentum, or spin. The particle's spin can be used to represent the two states 0 and 1. For instance, a counterclockwise spin indicates 0, whereas a clockwise spin represents 1. The ability of the particle to exist in several states at once is one benefit of employing a quantum computer. Superposition is the name for this phenomena. This phenomenon allows a quantum computer to reach both the 0 and 1 states simultaneously. As a result, information in a traditional computer is conveyed as a single number, either 0 or 1. Quits, which are characterized as a 0 and a 1 occurring simultaneously, are used in quantum computers to increase processing power. For instance:

A 2 bit vintage computer must expand through each step in order to analyze the numbers 00 01 10 11 and arrive at a conclusion. A two-qubit quantum computer is capable of simultaneously analyzing every possibility. the passing of time.


Thank you,

Eddie

A user may enter some text and the number of times (up to a maximum of 10) to repeat it. Display the text repeated that many times with no space in between. For example, if the user types in Hey and 3, the display would be HeyHeyHey. If the user provides no text or provides a number greater than 10, display only an error message.

Answers

The command that would be given to execute a code that asks for input and runs it repeatedly until it has satisfied the condition is a do-while loop.

What is a Do While Statement?

This is a conditional statement that is used in programming to run a set of code and check the conditions set and commands to execute and finally terminates when the conditions are satisfied.

Therefore, based on the fact that a loop would be used, and the displayed text would be repeated many times, the do-while loop would be used for this program.

Read more about do-while statements here:

https://brainly.com/question/13089591

#SPJ1

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. Which is the FASTEST way to transfer a good file to the computer?

Answers

The FASTEST way to transfer a good file to the computer is to  use the C$ administrative share to copy the file.

What is C$ administrative share?

The c$ share is known to be a kind of an administrative share that is often known to be the cluster or SVM administrator  that a person can be able to can use to be able to go through and manage the SVM root volume.

Note that The characteristics of the c$ share are the path for this kind of admin. share is known to be always the path to the SVM root volume and it is one that a person cannot modify.

Hence, based on the above, the The FASTEST way to transfer a good file to the computer is to  use the C$ administrative share to copy the file.

Learn more about file share from

https://brainly.com/question/15267859

#SPJ1

Jessica is training to be a cinematographer. It is her first experience shooting a scene. Where do you think she should focus the camera?
A.
focus on the subject’s expressions
B.
focus on the subject’s face
C.
focus on the subject’s eyes
D.
focus on the subject’s body language

Answers

It should be all of the above

How artifical intelligence will have more effect on our day to day life ? ​

Answers

Answer:

Artificial intelligence can dramatically improve the efficiencies of our workplaces and can augment the work humans can do. When AI takes over repetitive or dangerous tasks, it frees up the human workforce to do work they are better equipped for—tasks that involve creativity and empathy among others.

• Provide a rationale for each part of your design, explaining the problem, approach, and why you made the choices you made.

Answers

In the network constructed, we need to use 3 switches to  be able to connect a single client PC to the single server. Therefore:

Connect server to switch 1        (225 m)Connect switch 1 to switch 2     (225 m)Connect switch 2 to switch 3    (225 m)Connect switch 3 to client PC   (225 m)

What is the network about?

The maximum distance for ethernet connection is known to be about 100 meters and it is one that is often used in the transmission speeds.

Note that when one has added to the network switches, the distance need to be increased to about 200 meters and thus about 900 meters of distance need to exist between the client PC and the server.

The Ethernet network need to be designed as:

Connect server to switch 1        (225 m)

Connect switch 1 to switch 2     (225 m)

Connect switch 2 to switch 3    (225 m)

Connect switch 3 to client PC   (225 m)

Note that Total distance covered = 225 + 225 + 225 + 225

                                                       = 900 meters

Therefore, In the network constructed, we need to use 3 switches to  be able to connect a single client PC to the single server.

Learn more about Ethernet from

https://brainly.com/question/16947988

#SPJ1

See full question below

• Ethernet network that connects a single client PC to a single server and label the locations of switches and transmission links.

Provide a rationale for each part of your design, explaining the problem, approach, and why you made the choices you made.

During the reverse engineering process, a is
performed which identifies the design elements and principles incorporated into
the product design.

Structural Analysis
O Functional Analysis
O Visual Analysis
O Design Analysis

Answers

During the reverse engineering process, the performed which identifies the design elements and principles incorporated into the product design is Visual Analysis.

What is reverse engineering process?

Reverse engineering process involves putting or separating into parts an already made equipment or machines.

It can be done in aircraft, structural designs and many other products. It  is done to generate information on materials and design that is used in fabricating a design.

It make use of visual observation and analysis for it judgement and data collection.

Therefore,

During the reverse engineering process, the performed which identifies the design elements and principles incorporated into the product design is Visual Analysis.

Learn more on engineering below

https://brainly.com/question/17169621

#SPJ1


Question 9
The boom in collaboration between U.S. companies and workforces in India created a
need for blank

Answers

Answer:

Outsourcing

Explanation:

The boom in collaboration between U.S. companies and workforces in India created a need for Outsourcing.

I believe this is correct, but I'm not 100% certain.

what is the advantage of www? give 5 pints.​

Answers

communication

delivering messages

research

exploring

texting

Research

Communication

To connect with other people.

Information on almost every subject imaginable.

Powerful search engines to do day to day work.
Other Questions
help pleaseee and explain how , Im confused thanks Geometry: complete this proof (ASAP!!! Its urgent) What is the relative humidity of air that has reached its dew point temperature? will give 85 points How would Carine complete this conversation with Emmanuel if her phone number is 0127161823?Emmanuel: Salut Carine! Quel est ton numro de tlphone?Carine: Salut, Emmanuel! Mon numro, cest _______________. 1)y-6=12 7)8t=42 porfavor alguien me ayuda con esto 2)-5+k=1 para quien no lo sepa,la cosa es encontrar el valor de3)-2g=-14 8)-9+z=18 la letra que sale ay 4)y_4=12 9)7+w=145)12+u=-12 10)13_5=126)f-7=10 11)D_2=-10 Question 13Which of the following does not describe a section of the U.S. Constitution?O A general guideline of individual rightsO A general guideline of employment rightsIt defines the division of powers with the federal government through checks and balances.It defines the division of powers between the federal and state government. Excess hydrogen ion is eliminated from the body largely by:________ a) sweating. b) the kidneys. c) the liver. d) the feces. buffers Write an argumentative editorial that argues for or against young peoples ability to initiate positive change in their communities. prompt Area=Help me please thanks :) a 100 square mile area of national forest is how many acres ? how many hectares? Quick algebra 1 question for 10 points!Only answer if you know the answer, quick shout-out to tariqareesha2 and MrBrainly, tysm for the help! Question 3What's the height of a cone if the volume is 562 cubic inches and the radius is 5 inches.O 72.05 unitsO 120.62 unitsO21.47 unitsO38.90 unitsPrevious _____ contracts involve payment to the supplier for direct and indirect actual costs and often include fees. Amanda has a job that pays $35 per hour for the first 40 hours worked each week, plus 1.5 times this hourly rate for work done over 40 hours. suppose amanda works 50 hours this week. how much will she earn before taxes? What time are we _____ Grandma's house tomorrow? Which of the following information is NOT true? in article exciting new gym is opening soon Consider the quadratic equation x2 + 2x - 35 = 0. Solve by factoring and using the zero-product property.What are solutions to quadratic equations called? Show your work. Select the correct answers. which two measures did the united states take to counter terrorism after the september 11 attacks? withdrew support for israel passed the patriot act banned immigration increased airport security denied entrance to foreigners Hich root does not refer to an endocrine gland? Quick algebra 1 question for some points!Only answer if you know the answer, quick shout-out to tariqareesha2 and MrBrainly, tysm for the help!