Kira would like to implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization. What control would best meet her needs

Answers

Answer 1

The control that Kira would be needing in order to  implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization is the CASB

What is the SaaS solutions?

This is the term that is used to refer to what is called Software as a service. This is the service that allows for the connection of certain cloud based apps over the internet connection.

This service is known to work for the person that subscribes to it following the pay as you go way. It helps in certain services such as the emails, calendars and in certain office tools.

Hence we can conclude that the CASB is the control that Kira would be needing in order to  implement a security control that can implement access restrictions across all of the SaaS solutions used by her organization

Read more on SaaS here: https://brainly.com/question/13615203

#SPJ1


Related Questions

explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”

Answers

It means that there are people  who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.

What is the joke about?

This is known to be a popular  joke that is often  used by people who are known to be great savvy in the field of mathematics.

The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.

The binary system is one that relies on numbers that are known to be  in groups of 2.

Therefore, If the speaker of the above phrase is one who is able to understand binary, that person  would  be able to say that that the phrase  is correctly written as  "there are 2 types of people that understand binary".

Learn more about binary from

https://brainly.com/question/21475482

#SPJ1

In Hootsuite Inbox, you can see all the correspondence between a user and your organization on a particular social channel, including public and private conversations. This is useful for

Answers

The ability to view all the correspondence between an end user and your organization (company) on a particular social media channel, as well as public and private conversations is useful for understanding the full context of the most recent exchange in Hootsuite Inbox.

What is Hootsuite Inbox?

Hootsuite Inbox can be defined as a type of software application that is designed and developed to help end users in managing social messages (correspondence) from their organization's customers and audiences, especially by availing them an ability to collect and view (see) both private and public conversations (messages) from all networks or social media channel in one place.

This ultimately implies that, the ability to view all the correspondence between an end user and your organization (company) on a particular social media channel, as well as public and private conversations is useful for understanding the full context of the most recent exchange in Hootsuite Inbox.

Read more on Hootsuite Inbox here: https://brainly.com/question/15321261

#SPJ1

In a partially filled array, the number of slots in the array that are not currently used is the?

Answers

Answer:

Can you please explain more

Explanation:

What type of security control does not require the insertion of the keycard into the reader but relies on the placement of the card within the lock's range to be recognized?

Answers

A type of security control that doesn't require the insertion of the keycard into the reader, but relies on the placement of the card within the lock's range to be recognized is generally referred to as proximity reader.

What is a door?

A door can be defined as a solid material made of wood or metal, which is designed and developed to facilitate entrance and exit out of a building.

What is a keycard?

A keycard can be defined as small plastic card, which is designed and developed to read and process magnetically encoded data in an electronic device that is fitted in a door, rather than the use of a door key.

In conclusion, we can infer and logically deduce that a proximity reader simply refers to a type of security control that is designed and developed to rely only on the placement of a card within the door lock's range to be recognized, rather than lying on the insertion of the keycard into the reader.

Read more on doors here: brainly.com/question/22731237

#SPJ1

Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their _____.

Answers

Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their Web browsers.

What is a Platform as a service PAAS?

Platform as a service (PaaS) Software is known to be a kind of a hardware that gives an operating system on which a lot of developers can be able to make and also transmit solutions without the use of the underlying system software.

A web browser is known to be that which takes a person yo anywhere on the internet and it helps one to get back information.

Hence, Platform as a service (PaaS) services are hosted in the cloud and accessed by clients through their Web browsers.

See full question below

Platform as a service (PaaS) is hosted in the cloud and accessed by clients through their _____.

Web browsers

Web avatars

smart cards

data gloves

Learn more about PaaS from

https://brainly.com/question/20600180

#SPJ1

structure that the house the electronic system specifications

Answers

Electrical systems, also called circuits or networks, are designed as mixtures of mainly three fundamental components: resistor, capacitor, and inductor. They are likewise defined by resistance, capacitance, and inductance—generally considered to be lumped-parameter effects.

What are the specifications of a circuit?

The specification can (and normally does) also set some of the physical parameters that the procedure must meet, such as size, weight, moisture resistance, temperature range, thermal output, vibration tolerance, and acceleration tolerance.

What is the electronic system?

An Electronic System is a physical interconnection of components, or parts, that gathers various parts of information together.

To learn more about Electrical systems, refer

https://brainly.com/question/24786034

#SPJ9

Which component is responsible for collecting and consolidating data from network devices that are being monitored with snmp?

Answers

Answer:

A storage area network (SAN) is a dedicated high-speed network or subnetwork that interconnects and presents shared pools of storage devices to multiple servers.

The availability and accessibility of storage are critical concerns for enterprise computing. Traditional direct-attached disk deployments within individual servers can be a simple and inexpensive option for many enterprise applications, but the disks -- and the vital data those disks contain -- are tied to the physical server across a dedicated interface, such as SAS. Modern enterprise computing often demands a much higher level of organization, flexibility and control. These needs drove the evolution of the storage area network (SAN).

SAN technology addresses advanced enterprise storage demands by providing a separate, dedicated, highly scalable high-performance network designed to interconnect a multitude of servers to an array of storage devices. The storage can then be organized and managed as cohesive pools or tiers. A SAN enables an organization to treat storage as a single collective resource that can also be centrally replicated and protected, while additional technologies, such as data deduplication and RAID, can optimize storage capacity and vastly improve storage resilience -- compared to traditional direct-attached storage (DAS).

SAN architecture

A storage area network consists of a fabric layer, host layer and storage layer.

Write the code to call/execute the following function

void printInfo()
{
cout << "Jared" << endl;
cout << "ITP100" << endl;
cout << "TCC" << endl;
}

Answers

Answer:

write a main() function and call your function.

Explanation:

See picture. Executed at replit.

difference between sorting and filtering​

Answers

Answer:

Essentially, sorting and filtering are tools that let you organize your data. When you sort data, you are putting it in order. Filtering data lets you hide unimportant data and focus only on the data you're interested in.

Explanation:

Hope this will help

Sorting

The term “sorting” is used to refer to the process of arranging the data in ascending or descending order.

Example: Statistical data collected can be sorted alphabetically or numerically based on the value of the data.

Filtering

The process of data filtering involves selecting a smaller part of your data set to view or analyze. This is done by using that subset to view or analyze your data set as a whole.

Example: A complete set of data is kept, but only a portion of that set is used in the calculation, so the whole set is not used.

Hope this helps :)

The keyword __________ is required to declare a class.
a. public
b. private
c. class
d. all of the above

Answers

Answer is b-private

Answer:  b. private

Explanation:


There are 79 different career pathways included within the 16 nationally recognized Career Clusters.

Answers

There are 79 different career pathways included within the 16 nationally recognized Career Clusters is a true statement.

What are the Career Clusters about?

The National Career Clusters Framework is known to be one that is often used as a kind of an organizing tool that is made for Career Technical Education (CTE) programs, curriculum design and others.

Note that there are said to be 16 Career Clusters in the National Career Clusters Framework, that is standing for 79 Career Pathways to help all learners to be able to pass their way to higher success in college and also in their career. It is made up of:

Agriculture, Food & Natural ResourcesArchitecture & ConstructionArts, A/V Technology & Communications, etc.

Hence, There are 79 different career pathways included within the 16 nationally recognized Career Clusters is a true statement.

Learn more about Career Clusters from

https://brainly.com/question/24613213

#SPJ1

1.1 give five (5) reasons why modeling is an important part of system analysis and design

Answers

Modeling is important because it predicts outcomes, involves the knowledge of variables, analyzes the system, incorporates information and avoids biases.

What is Modeling?

In computation, modeling refers to the action of taking into account all variables that produce a given outcome and then predict it in a virtual environment.

Modeling is fundamental in system design because enables the prediction of the behavior of diverse variables simultaneously.

In conclusion, Modeling is important because it predicts outcomes, involves the knowledge of variables, analyzes the system, incorporates information and avoids biases.

Learn more about modeling here:

https://brainly.com/question/17994947

#SPJ1

Compare MAN, WAN, and LAN, and make a table having three columns. ​

Answers

Answer:

MAN :-)

MAN stands for metropolitan area network.It covers a larger area than LAN such as small towns, cities, etc. A MAN, also called the Metropolitan Area Network, is defined as the computer network that joins the metropolitan areas.The maintenance cost of MAN is difficult.

WAN :-)

WAN stands for wide area network.It covers a large area than LAN as well as a MAN such as country/continent etc.A WAN, also called the Wide Area Network, is defined as a telecommunications network that extends over a large area.The maintenance cost of WAN is difficult.

LAN :-)

LAN stands for local area network.It covers smaller areas such as colleges, schools, hospitals, and so on. LAN (Local Area Network) is defined as a computer network that is responsible for connecting local areas like schools, residents, universities, etc.The maintenance cost of LAN is easy.

Hope its helpful :-)

If so, please mark me as brainlist :-)

 

 

 

 

 

How could each of the two-proposed changes decrease the size of an mips assembly program? On the other hand, how could the proposed change increase the size of an mips assembly program?

Answers

Based on the question attached, the Number of bits that is needed to address a register is 7 bits.

3.  How could the proposed change increase the size of an mips assembly program?

The two-proposed changes decrease the size of an mips assembly program because a lot of complicated operations will need to be put in place or implemented in one instructions instead of numerous instructions due to the lowered register leaking issue. The program's size will be therefore be lowered as a result of this issue.

The proposed change will increase the size of an mips assembly program because  The size of the instruction word will then be brought up or raised if the required bits are added to the opcode and that of the register fields, which will bring up the size of the programmed.

In  the MIPS register file;

The Number of MIPS registers = 128

The Number of bits needed = log₂128

The  Number of bits needed = 7 bits

So Increasing number bits for opcode will be = (6 + 2)

                                                                       = 8

Therefore the answers to question one:

1. R-type instruction

Op-code = 6 bits

rs = 5 bits

rt = 5 bits

rd = 5 bits

shamt = 5 bits

funct = 6 bits

Hence, the size of the opcode field will be go up by two bits, to eight bits and the size of the rs ,rt, and rd fields is also go up to 7 bits.

For question 2 which is I-type instruction, there is:

Op-code = 6 bits

rs = 5 bits

rt = 5 bits

Immediate = 16 bits

Hence, The size of the opcode field will also go up by two bits, to eight bits and the size of the rs, rt  fields will is also go up to 7 bits.

Therefore, Based on the question attached, the Number of bits that is needed to address a register is 7 bits.

Learn more about program from

https://brainly.com/question/14897427

#SPJ1

See full question below

Assume that we would like to expand the MIPS register file to 128 registers and expand the instruction set to contain four times as many instructions. 1. How this would this affect the size of each of the bit fields in the R-type instructions? 2. How this would this affect the size of each of the bit fields in the I-type instructions? 3. How could each of the two proposed changes decrease the size of an MIPS assembly program? On the other hand, how could the proposed change increase the size of an MIPS assembly program?

In the past, mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of?

Answers

Mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of memory and screen size.

What is mobile application?

A mobile app is known to be a kind of a software application that was made specifically for its use in terms of  small, wireless computing machines.

It includes, smartphones and tablets, instead of desktop or laptop computers.

Note that Mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of memory and screen size as this was said to be a major setback for it.

Learn more about mobile applications from

https://brainly.com/question/917245

#SPJ1

See full question below

In the past, mobile applications were typically not as full-featured as their non-mobile counterparts because of the limitations of

Select one:

a. memory and screen size.

b. screen size and keyboard functionality.

c. processing speed and graphics capabilities.

d. storage capacity and processing speed.

Which of the following tiny computer apps is designed to be useful but could cause more harm than good?

BIOS
Macro
OS
Sys file

Answers

The following tiny computer app that is designed to be useful but could cause more harm than good is Sys file

What is a Sys file?

This refers to the system file that is in operating systems and contains settings and variables that can make changes to the operating system.

Hence, we can see that if a user decides to tamper with the sys file on their operating system- either Microsoft DOS or Windows Operating Systems, this can lead to irreparable damages.

Read more about sys file here:

https://brainly.com/question/14364696

#SPJ1

What windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?

Answers

The windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain is known to be Local Security Policy tool.

Does Windows 10 possess local security policy?

The Local Security Policy is known to be one that is often seen in Windows 10 and it is also known to be made up of information that is regarding the security of a local computer.

Note that If a person is trying to get into the Local Security Policy in Windows 10 Home, a person will receive an error report about it.

Therefore,  The windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain is known to be Local Security Policy tool.

Learn more about windows utility from

https://brainly.com/question/6058561

#SPJ1

in makecode arcade, which part of the interface can be used to answer questions about how a block functions?

Answers

in make code arcade, The Advanced section is the part of the interface can be used to answer questions about how a block functions.

What is the function about?

In Blocks, Functions is known to be the element that one can find under the Advanced section.

Note that in finding functions in block, student can be be introduced to Simple functions.

Hence, in make code arcade, The Advanced section is the part of the interface can be used to answer questions about how a block functions.

Learn more about block functions from

https://brainly.com/question/17043948

#SPJ1

Answer:

The right side panel

Explanation:

On the right side panel you can see the various functions of specific block functions in MakeCode Arcade.

What is the lowest grade of utp that is rated for 100 mbps transmission?

Answers

The lowest grade of UTP that is rated for 100 Mbps transmission is option A. CAT-5. CAT-5 was the first UTP standard ratified for 100 Mbps transmissions. Before that, CAT-3 was popular but only supported 10 Mbps. CAT-5e, CAT-6, and CAT-6a all support at least 1 Gbps and came after CAT-5.

Category 5 cable (CAT- 5) is a twisted pair cable for computer networks. Since 2001, the variant commonly in use is the Category 5e specification (Cat 5e). The cable standard provides performance of up to 100 MHz and is suitable for most varieties of Ethernet over twisted pair up to 2.5GBASE-T but more commonly runs at 1000BASE-T (Gigabit Ethernet) speeds.

What is UTP?

Unshielded twisted pair (UTP) is a ubiquitous type of copper cabling used in telephone wiring and local area networks (LANs). There are five types of UTP cables -- identified with the prefix CAT, as in category -- each supporting a different amount of bandwidth.

Therefore, the correct answer is as given above

learn more about CAT-5: https://brainly.com/question/28122297

#SPJ1

The complete question goes thus:

What is the lowest grade of UTP that is rated for 100 Mbps transmission?

A. CAT-5

B. CAT-5e

C. CAT-6

D. CAT-6a

Write a program that first reads a list of 5 integers from input. then, read another value from the input, and output all integers less than or equal to that last value

Answers

Answer:

integers = [int(i) for i in input().split()]

value = int(input())

for integer in integers:

--if integer <= value:

----print(integer)

Explanation:

We first read the five integers in a string. We can use the .split() method, which splits the string into separate parts on each space.

For example:

print(input())

>> "4 -5 2 3 12"

print(input().split())

>> ["4", "-5", "2", "3", "12"]

We cannot work with these numbers if they are strings, so we can turn them into integers using the int constructor. An easy way to do this is with list comprehension.

print([int(i) for i in input().split()]

>> [4, -5, 2, 3, 12]

Now that all the values in the list are integers, we can use a for loop to get each of the values and check whether they are less than or equal to the value.

Let's first get the value from the input.

integers = [int(i) for i in input().split()]

value = int(input())

print(value)

>> 4

Here, we have to pass the input through the int constructor to be able to compare it with the other integers. Let's now make a for loop to go through each integer and check if the integer is less than or equal to value.

for integer in integers:

--if integer <= value:

----print(integer)

The dashes are there to show indentation and are not part of the code.

The cathode ray tube eventually was eventually used for what entertainment device?

Answers

[tex]\huge\underline{\underline{\boxed{\bm {Answer:}}}}[/tex]

[tex] \large\bm{Television}[/tex]

[tex]\huge\underline{\underline{\boxed{\bm {Explanation:}}}}[/tex]

The cathode ray tube can be said to be a vacuum tube which contains one or more electric guns. This tube produces images when an electron beam strikes a phosphorescent surface. This tube produces pictures as a form of video signals. The entertainment device, which the cathode ray tube was eventually used for since it produces pictures, is a television set.

A__________ is a website that provides a forum for "bottom-up" commentary, description of events, video postings, and general conversation.

Answers

A blog is a website that provides a forum for "bottom-up" commentary, description of events, video postings, and general conversation.

What is a blog?

A blog, in full  is known as a Web log or a Weblog. This is known to be a kind of an online journal that is usually owns by people or firm and it is one where a person, group, or corporation usually shows a record of activities, thoughts, or their  beliefs.

Note that the  blog is said to be a web page that a person needs to update on a constant basis and a lot of times, brands do have blogs right on their websites, and this tends to make it easier for users to be able to see and engage with a lot of others with posts.

Therefore, A blog is a website that provides a forum for "bottom-up" commentary, description of events, video postings, and general conversation.

Learn more about website from
https://brainly.com/question/13171394

#SPJ1

What do you think that private information like passwords pin number will be guarded or shared with the public? why?

Answers

The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

Why should you use passwords to protect private information?

Passwords is known to be that factor that tends to give the first line of defense against any form of what we call illegal access to your computer and also that of one's personal information.

Note that the stronger a password of a person is, the more protected one can say that one's computer will be from any kind of hackers and malicious software.

Therefore one need to or one  should maintain the use of a strong passwords for all accounts that are present on your computer.

Hence, The private information like passwords pin number will be guarded or shared with the public because it gives the first line of defense where it can act against any form of unauthorized access to a person's computer and personal information.

Learn more about passwords from

https://brainly.com/question/17174600

#SPJ1

A data analyst uses _____ to decide which data is relevant to their analysis and which data types and variables are appropriate

Answers

Answer:

I believe that the answer is a database organization.

Array bounds checking should be directly coded into a system rather than assumed.

a. True
b. False

Answers

Answer:

True

Explanation:

One cannot assume an array bounds, it has to be specific

Similar to Wi-Fi, ____ is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger.

Answers

Similar to Wi-Fi, WiMAX is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger.

What is WiMAX used for?

WiMax is know to be a full worldwide interoperability that is said to be made just for microwave access and this is said to be a form of a communication technology that was set up for wireless delivering of  high-speed Internet service to a lot of geographical areas.

Wi-Fi is also known to be a kind of a wireless technology that is often used to link up computers, tablets, and other devices to that of the internet.

Note that Wi-Fi is said to be a radio signal transmitted from a wireless router  and as such, Similar to Wi-Fi, WiMAX is designed to provide Internet access to fixed locations (sometimes called hotzones), but the coverage is significantly larger.

Learn more about Wi-Fi from

https://brainly.com/question/13267315

#SPJ1

What type of os must be installed on your machine to allow this type of action by another person?

Answers

Answer:

Im sure its called Single User OS

How does xm satellite deter nonsubscribers from listening to its transmissions? Does this make the radio programing a private good or public good? Explain why.

Answers

XM Satellite Radio is known to be a kind of pay for service radio that tends to provides online radio services in the regions of the United States and Canada. Note that the XM Satellite often encrypt their satellite signals, and they have a receiver with assigned permission.

How does XM satellite radio work?

XM Radio's is known to be a kind of a ground station that is often seen to passes or they  transmits a signal in its two active GEO satellites.

Note that it is one that often bounce the signals back down to radio receivers that can be found on the ground.

Hence, the radio receivers are said to be programmed to be able to get  receive and they can also unscramble the digital data signal, that has about or more than 170 channels of digital audio.

Therefore, XM Satellite Radio is known to be a kind of pay for service radio that tends to provides online radio services in the regions of the United States and Canada. Note that the XM Satellite often encrypt their satellite signals, and they have a receiver with assigned permission.

Learn more about satellite from

https://brainly.com/question/18496962

#SPJ1

Iris has completed a graphic design project for a client. what should iris obtain from the client in order to display the work in her portfolio? iris must get a from the client that gives her permission to display the work in her portfolio.

Answers

This stands very vague and usually relies on the laws of the country in which you exist working.

What is portfolio?

A portfolio stands for a group of financial assets like stocks, bonds, commodities, cash, and cash equivalents, including closed-end funds and exchange-traded funds (ETFs). People commonly believe that stocks, bonds, and cash include the core of a portfolio. The term itself comes from the Italian phrase for a case organized to carry loose papers (portfolio), but don't think of a portfolio as a physical container. Rather, it's an conceptual way to guide to groups of investment assets.

This stands very vague and usually relies on the laws of the country in which you exist working. In some cases, Iris would need approval from the client to display the work. In other cases, Iris would not require anything because she exists as the original creator of the content. This mostly depends on the laws of the country and whether or not a specific contract existed formed between Iris and the client, expressing if the content rights were transferred or not.

To learn more about portfolio refer to:

https://brainly.com/question/20707078

#SPJ4

Answer:i dont see no answer

Explanation:

During which phase of system development would you acquire any necessary hardware and software?

Answers

During the design phase of system development, you would acquire all the necessary hardware and software.

What is SDLC?

SDLC is an abbreviation for system development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality systems.

In Computer technology, there are seven (7) phases involved in the development of a system and these include the following;

PlanningAnalysisDesignDevelopment (coding)TestingDeploymentMaintenance

Also, phased implementation simply refers to an implementation methodology in which smaller portions of functionality of a system are typically implemented one at a time (one after the other).

In conclusion, we can infer and logically deduce that you would acquire all the necessary hardware and software during the design phase of system development.

Read more on phases here: brainly.com/question/7112675

#SPJ1

Other Questions
Which characteristic of money explains that currency has a consistent numerical worth, whether in the form of a dollar or as one hundred one-cent pennies? Standard Store of value Medium of exchange Measure of value In the electron transport chain, protons are pumped from where to where in the mitochondria of eukaryotic cells? A locker combination consists of two non-zero digits. the digits in a combination are not repeated and range from 2 through 9. event a = the first digit is less than 5 event b = the second digit is less than 5 if a combination is picked at random, with each possible locker combination being equally likely, what is p(b|a) expressed in simplest form? If you add two more people to a project team of five, how many more communication channels will you add? PLEASE HELPThe character vs. character conflict between Jake and Dean in part 1 of "For the Win most supports the prediction thatJake will struggle with his decision to turn around and look for Dean.Dean will once again win first place and beat Jake, like he has in the past.Jake and Dean will face dangerous weather conditions as they race.Dean and Jake will help each other during the race and become good friends. __medium distinguishes different types of microorganisms based on an observable change in the colonies or in the medium. Mrs. gomes found that 40% of students at her high school take chemistry. she randomly surveys 12 students. what is the probability that exactly 4 students have taken chemistry? round the answer to the nearest thousandth. p (k successes) = subscript n baseline c subscript k baseline p superscript k baseline (1 minus p) superscript n minus k. subscript n baseline c subscript k baseline = startfraction n factorial over (n minus k) factorial times k factorial endfraction Which work by bla bartk's is an example of his later period, characterized by folk-inspired melodies and a use of traditional chords? The reaction of automobile exhaust and ultraviolet light produces? The use of an information system to support the sharing of content among networks of users related by common interests is termed __________. Find the value of x(4x+10)108 67 3x Human kinship is to the _____ perspective as human diversity is to the _____ perspective. The _______ are the blank spaces at the top, bottom, left, and right of a page. page paddings bordering white spaces margins gutters a 30kg crate is pulled up a ramp 15m long and 2m high by a constant force of 100n. the crate starts from resta nd has a velocity of 2m/s when it reaches the ramp. what is the frictional force between the crate and the ramp. use the principal of conservation energy. Which structure(s) coordinates daily cycles of activity that are linked to the day-night cycle?? A triangle is shown.What is the unknown side length, to the nearest tenth, in the triangle? The intent of hazardous materials regulations is to ensure safety, contain the material, and:_______. In which zone would you expect to find the greatest abundance of marine organisms? middle intertidal zone supralittoral zone high littoral zone low intertidal zone If a sample of n = 4 scores is obtained from a normal population with = 70 and = 12. What is the z-score corresponding to a sample mean of m = 69? The connections and relationships a salesperson developed would be considered to be a form of ________ capital.