the thanksgiving attack on san francisco was an example of what kind of cyber attack?

Answers

Answer 1

An example of a ransomware cyber attack was the Thanksgiving Day assault in San Francisco.

What does a targeted cyber attack look like?

The Spear-phishing is a type of targeted attack in which emails are sent to specific recipients and may contain links or the attachments that download dangerous software. using a botnet to launch a DDOS assault.

What are some instances of active attacks?

An assault on the authentication procedure in which the attacker sends data to the claimant, Credential Service Provider (CSP), verifier, or Relying Party (RP). Man-in-the-middle (MitM), impersonation, and session hijacking are a few examples of ongoing attacks.

To know more about cyber attack visit:-

https://brainly.com/question/28270451

#SPJ4


Related Questions

what is chicago to new york flights

Answers

Flights from Chicago to New York are airplane trips that connect the two major cities.

There are several airlines that offer non-stop and connecting flights between the two destinations, including United Airlines, American Airlines, and Delta Airlines. The flight duration typically ranges from 2 to 3 hours, depending on the specific airline and route.

It is important to note that flight times and availability may vary based on the time of year and other factors. It is recommended to check with the specific airline for the most up-to-date information.

Learn more about flights from chicago to new york:

brainly.com/question/29766777

#SPJ11

what is the number for august?

Answers

August is the eighth month of the year, so the number for August is 8.

What is year?

Year is a unit of time that is defined as the length of one orbital revolution of the Earth around the Sun. It is typically used to measure the duration of events, such as birthdays, anniversaries, or other calendar events. A year consists of 365.2425 days, or 8,765.82 hours, or 525,949.2 minutes, or 31,536,000 seconds. It is divided into 12 months, each with its own distinct characteristics. The months of the year are January, February, March, April, May, June, July, August, September, October, November, and December. Each year, the Earth completes its orbit around the Sun, bringing us from one season to the next.

To learn more about year

https://brainly.com/question/28792227

#SPJ4

How to cite a block quote?

Answers

To cite a textual quotation, you must follow the following steps::

First introduce the quote with a signal phrase, followed by a colon.Then, you should indent the entire quote one inch from the left margin and double-space it.After the quote, you should include a parenthetical citation with the author's last name and the page number(s) where the quote can be found.

Here is an example:
According to Smith (2010):

(Smith, 2010, p. 45)

Remember to always be accurate and professional when citing a block quote.

¿Who is block quote?

A block quote is one that starts with a specific income. This income can be divided according to general categories, such as:

Personnel costs.Administration.Publications.Electoral education events.

For more information about block quote, visit:

https://brainly.com/question/30396753

#SPJ11

how does software-defined networking reduce both the risk of human error and overall network support and operations costs?
A. It ensures network resources such as printers are used correctly
B. It allows individualized configuration through manual input
C. It increases physical access to all network devices
D. It automates configuration, policy management and other tasks

Answers

By automating setup, policy administration, and other duties, software-defined networking (SDN) decreases both the possibility of human mistake and overall network support and operations expenses.

What is the purpose of software defined networking?

Software-defined networking refers to the use of software-based controllers or application programming interfaces (APIs) to communicate with the network's underlying hardware architecture and control traffic (SDN).

What security benefits can Software Defined Networking SDN offer customers?

Specific Security: More visibility across the network is one of the main benefits of SDN networking. Any security that affects traffic in traditional networking is encompassing. SDN makes it granular. This implies that engineers can finely target and prevent harmful data across your network.

To know more about software visit:-

https://brainly.com/question/1022352

#SPJ1

After packets of information have passed through multiple routers on the internet, what happens to them when they arrive at your home network?

Answers

When packets of information arrive at your home network, they are routed to the correct device based on their destination address.

What is network?

Network is a system of computers, smartphones, and other devices that are connected together to facilitate the exchange of data. It is a communication infrastructure that allows devices to communicate with each other. Networks can be used to send and receive data, share resources, and provide access to the internet. A network can either be local or wide area, depending on the geographical location of the devices. Networks can also be wired or wireless and support various protocols such as Ethernet, Wi-Fi, and Bluetooth.

Once the packets have reached their destination, they are reassembled and the data is made available to the recipient. Depending on the type of data, it may be displayed on the screen, stored, or used for some other purpose.

To learn more about network
https://brainly.com/question/29506804
#SPJ1

what knowledge permissions do article contributors need

Answers

Article contributors require Customize Application privilege as well as Read, Create, and Edit article actions.

Who are some of the contributors?

A contributor is someone who participates in or makes a contribution to something. Contributors are writers and those who contribute money in particular. Contributors are writers whose work appears in a book, magazine, or newspaper. Contributors are third-party contacts participating in your client's work, such as a lawyer or a client's consultant. If you have any connections or third-party firms with a stake or engagement in a job or a company, you can easily keep them updated by adding them as Contributors.

Know more about  Application Visit:

https://brainly.com/question/28650148

#SPJ4

what is the most common connector used with utp cabling carrying ethernet traffic?

Answers

The most common connector used with UTP cabling carrying Ethernet traffic is the RJ-45 connector, which is a standard connector for network cables in most modern Ethernet networks.

The most common connector used with UTP (unshielded twisted pair) cabling carrying Ethernet traffic is the RJ-45 (registered jack) connector. This is a standard connector used in most modern Ethernet networks, and it is compatible with various networking standards, including 10BASE-T, 100BASE-TX, and 1000BASE-T. The RJ-45 connector is a modular connector that features eight pins and is designed to terminate UTP cabling in a structured wiring system. The connector is easy to install and replace, making it a popular choice for network administrators. It is also widely available and relatively inexpensive, making it an affordable option for both home and commercial networking applications.

Learn more about common connector here:

https://brainly.com/question/16963770

#SPJ4

what total number of compartments are located inside a collective protection system

Answers

Within a collective protection system, there are four compartments.

What exactly is a system of collective protection?

A ship's HVAC system incorporates the Collective Protection System (CPS), a permanent air filtration system. It generates pressure in some places, which will force air outward in the case of a chemical outbreak. Unfortunately, the existing CPS was not created with energy efficiency in mind.

What is an instance of group defense?

The aim of the safety strategy known as collective protection is to simultaneously protect a number of workers who are exposed to a certain risk. The systems used to prevent falls from heights serve as an illustration.

To know more about collective protection system visit:-

https://brainly.com/question/14471213

#SPJ4

[4] b.A sequential data file called "Record.txt" has stored data under the field heading RollNo., Name, Gender, English, Nepali Maths and Computer. Write a program to display all the information of male
students whose obtained marks in computer is more than 90.​

Answers

Answer:

Explanation:

Assuming that the data in the "Record.txt" file is stored in the following format:

RollNo. Name Gender English Nepali Maths Computer

101 John M 80 85 90 95

102 Jane F 85 80 75 92

103 David M 90 95 85 89

104 Mary F 75 90 80 94

105 Peter M 95 85 90 98

Here is a Python program that reads the data from the file and displays the information of male students whose obtained marks in computer is more than 90:

# Open the Record.txt file for reading

with open("Record.txt", "r") as file:

   # Read the file line by line

   for line in file:

       # Split the line into fields

       fields = line.strip().split()

       # Check if the student is male and has obtained more than 90 marks in Computer

       if fields[2] == "M" and int(fields[6]) > 90:

           # Display the student's information

           print("RollNo.:", fields[0])

           print("Name:", fields[1])

           print("Gender:", fields[2])

           print("English:", fields[3])

           print("Nepali:", fields[4])

           print("Maths:", fields[5])

           print("Computer:", fields[6])

           print()

This program reads each line of the "Record.txt" file and splits it into fields. It then checks if the student is male and has obtained more than 90 marks in Computer. If so, it displays the student's information on the console.

The program to display all the information of male students whose obtained marks in computer is more than 90. is in the explanation part.

What is programming?

Computer programming is the process of performing specific computations, typically through the design and development of executable computer programmes.

Assuming that the data in the "Record.txt" file is structured in a specific format and separated by commas, here is an example Python programme that reads the data from the file and displays information about male students who received more than 90 points in Computer:

# Open the file for reading

with open('Record.txt', 'r') as f:

   # Read each line of the file

   for line in f:

       

       # Split the line by commas

       data = line.split(',')

       # Check if the student is male and has obtained more than 90 marks in Computer

       if data[2] == 'M' and int(data[6]) > 90:

           # Display the information of the student

           print(f"Roll No.: {data[0]}\nName: {data[1]}\nGender: {data[2]}\nEnglish: {data[3]}\nNepali: {data[4]}\nMaths: {data[5]}\nComputer: {data[6]}\n")

Thus, in this program, we use the open() function to open the "Record.txt" file for reading.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

What research area industrial revolution belongs to?

Answers

The shift from a mostly rural and economy to one that was dominated by industry and machine production is covered in the research topic of the industrial revolution.

Economic history includes the industrial as a topic of study. The shift from a mostly rural and handicraft economy to one dominated by industry and machine production is covered, as the technological, economic, and social developments that took place during that time. During the middle of the 18th and the beginning of the 19th century, England saw a transformation that eventually expanded to other regions of Europe, North America, and rest of the world. As a result of the development of new technologies like the steam engine, the spinning jenny, and the power loom, there was a rise in the production of products and services during this time. As a result, the gap between the affluent and the poor widened, resulting in increasing economic growth, urbanization, and social structural changes.

Learn more about machine here-

brainly.com/question/7172766

#SPJ4

in calculating the time spent on reading or writing a disk block, all the factors below should be considered except a. how long it takes to transfer the data b. how long it takes to decrypt the data that is encrypted. c. how long it takes for the proper sector to appear under the reading/writing head d. how long it takes to move the arm to the proper cylinder

Answers

In calculating the time spent on reading or writing a disk block, all the factors below should be considered except, how long it takes to move the arm to the proper cylinder. Thus, option D is correct.

What is block?

In data storage and transmission block is called as physical record contains whole number of records, and it is a sequence of bits having maximum length called block size.

When data is placed into the blocks it is called as blocking, and process of extracting data is called as a deblocking. Blocking reduces amount of external storage required for data in some devices.

Therefore,  how long it takes to move the arm to the proper cylinder is not considered in calculating the time spent on reading or writing a disk block. Hence, option D is correct.

 

Learn more about block, here:

https://brainly.com/question/16614000

#SPJ1

Is Typescript better than Javascipt?

Answers

Every one of these dialects are excellent, but TypeScript stands out from the competition in a significant manner that renders it more suited for front-end development.

Describe Java?

Operates on millions of devices, include laptops, smartphones, game consoles, medical equipment, and many more. Java's syntax and principles are derived from the C / C++ dialects. Java is used to create the Android operating system. itself. While Kotlin has lately emerged as a Java-free alternative for Android development, it still makes usage of the Jvm and can communicate with Java code.

Describe a computer?

A computer is a machine that processes data in form of data based on a programme, piece of software, or a collection of instructions regarding how to accomplish something.

To know more about java visit :

https://brainly.com/question/29897053

#SPJ4

how is the execution context of a process used by the os

Answers

The execution context of a process, including information about its current state and resources, is used by the OS to manage and schedule processes, allocate system resources, and enforce security policies.

The execution context of a process, also known as its process control block (PCB), contains crucial information about the state of the process, including the program counter, register values, memory allocation, open file descriptors, and other resources being used. The OS uses this information to manage and schedule processes, allocate system resources, and enforce security policies. The execution context also enables the OS to perform context switching, which allows it to temporarily suspend the execution of a process and switch to another one, improving system efficiency and multitasking capability. Overall, the execution context plays a critical role in the functioning of an operating system by providing the necessary information to manage and control processes in a safe and efficient manner.

Learn more about execution context here:

https://brainly.com/question/14272566

#SPJ4

how to cite an article apa

Answers

Cite APA postings from online articles just like you would a standard website entry. Put the website name in italics, the author's name, the publisher's name.

How do I cite a webpage using APA style?

APA website citations typically include the author, the date of publication, the page or article's title, the website name, and the URL. If there is no author listed, begin the citation with the article's title. Include the retrieval date if the page is expected to change in the future.

What should APA referencing in the seventh edition resemble?

Double-space the references list (between each reference AND within the reference). By author last name, references are listed alphabetically. New lines are added for each reference.

To know more about APA visit:-

https://brainly.com/question/30403495

#SPJ4

mike is a commercial landscaping specialist who wants to use the internet for job hunting. which one of the following tactics is the least likely to be successful?

Answers

mike is commercial landscaping use the internet for job hunting. Send a tweet to people he is following and followers saying that is hungry work.

Using a friend, a larger corporate network, your personal network, or social media to find a job Utilizing a job-hunting website search engines for job postings. reading the classifieds in the newspaper .utilising a private or public recruiter or employment agency .searching for available positions on a company's website, usually through its application tracking system visiting a job fair. using expert advice, such as outplacement firms that provide training in résumé writing, job application, and interview success.

learn more about job hunting. here:

https://brainly.com/question/12408261

#SPJ4

True or False? an operating system manages system resources including ram.

Answers

It is TRUE to state that an operating system manages system resources including RAM.

What is an Operating System?

An operating system is a software program that manages computer hardware and software resources and provides common services for computer programs.

One of the key functions of an operating system is to manage system resources, including Random Access Memory (RAM), which is used to temporarily store data that the computer is actively using.

The operating system allocates memory to programs as needed and manages the memory to ensure that programs do not interfere with each other or with the operating system itself.

Learn more about operating system at:

https://brainly.com/question/6689423

#SPJ1

What would happen if the AV node failed to delay transmission of signals from the SA node? A. The atria and ventricles would contract at the same time B. The ventricles would start squeezing from the top to the bottom C. The AV node and the SA node would be unable to communicate C. Neuronal regulation of heart rate would be impaired E. None of the above are correct

Answers

A. The atria and ventricles would contract at the same time.

The AV (atrioventricular) node is responsible for delaying the electrical impulses that are generated by the SA (sinoatrial) node, which is the natural pacemaker of the heart. This delay allows the atria to contract and pump blood into the ventricles before the ventricles contract and pump blood out of the heart.

If the AV node fails to delay the signals from the SA node, the atria and ventricles would contract at the same time, which would result in inefficient pumping of blood and a decrease in cardiac output. This condition is called atrioventricular dissociation, or AV dissociation. It can be caused by a number of factors, including damage to the AV node, certain medications, and certain medical conditions such as heart block.

Therefore, option A is the correct answer. The other options are not correct because they do not describe the consequences of AV node failure in delaying the transmission of signals from the SA node.

Please brainliest

python string concatenation

Answers

With the + operator and the * operator, respectively, Python allows you to concatenate two separate strings together as well as the same string more than once.

How are two strings concatenated?

Concatenation is the process of attaching one string to the end of another string. The + operator can be used to combine strings. String literals and string constants are concatenated at the time of compilation; concatenation does not occur during runtime.

In Python, how do you concatenate A and B?

The print statement is then used to display the output after concatenating the two strings with the help of the ("%"). The modulus ("%") operator combines the string that is stored in the two variables "a" and "b" and in Python, the "% s" symbol indicates the string data type.

To know more about python string concatenation visit:-

https://brainly.com/question/17031234

#SPJ4

What occurs during the process optimization step of business process management?
OAnalysts use flowcharts and other tools to depict workflow.
OManagers adapt (modify) the process to enhance process performance.
OThe business process execution language engine is run.
OManagers track the individual components of the process as well as the process as a whole.

Answers

Managers adapt (modify) the process to enhance process performance during the process optimization step of business process management. The correct option is 2.

What is optimization?

Optimization in business refers to the process of fine-tuning a business strategy or process in order to increase efficiency or reduce costs.

This can be accomplished by making better use of resources, cutting costs, or investing in labor-saving technologies.

Managers analyse the current process to identify bottlenecks and areas for improvement during the process optimization step of business process management.

They then make changes to the process to improve performance, such as shortening the time it takes to complete a task or lowering costs.

This step entails making changes to the process and testing it to ensure its effectiveness.

Thus, the correct option is 2.

For more details regarding optimization, visit:

https://brainly.com/question/29521416

#SPJ1

Your question seems incomplete, the probable complete question is:

What occurs during the process optimization step of business process management?

OAnalysts use flowcharts and other tools to depict workflow.OManagers adapt (modify) the process to enhance process performance.OThe business process execution language engine is run.OManagers track the individual components of the process as well as the process as a whole.

how does software-defined networking reduce both the risk of human error and overall network support and operations costs?A. It ensures network resources such as printers are used correctlyB. It allows individualized configuration through manual inputC. It increases physical access to all network devicesD. It automates configuration, policy management and other tasks

Answers

Software-defined networking (SDN) reduces both the risk of human error and overall network support and operations costs by automating many of the manual configuration and policy management tasks that are traditionally completed by humans.

What is Networking ?

Networking is the process of connecting computer systems and other electronic devices together to allow the transfer of data between them. It is the basis for digital communication, allowing devices to communicate with each other over a physical or wireless network. This type of communication is useful for sharing information between users, allowing for more efficient collaboration and the sharing of resources.

This automation ensures that network resources such as printers are used correctly and that individualized configurations can be applied with minimal manual input. Additionally, SDN increases physical access to all network devices, allowing for more efficient and cost-effective management of the network.

To learn more about Networking

https://brainly.com/question/29338740

#SPJ4

what is the approximate value of fj/fn?

Answers

the approximate value of FJ/FN in planetary motion is 662.

The Sun, Moon, and planets all seem to travel along the ecliptic when viewed from Earth. The ecliptic is the Sun's apparent journey across the stars over the course of a year. (In course, the Sun revolves around the Earth and not the other way around, but due to the velocity of our orbit, it appears that way.) The planets never stay exactly on the ecliptic, but they always stay near by.

But unlike the Sun, the planets don't always move steadily along the ecliptic. Though they frequently go in the same direction as the Sun, occasionally they appear to slow down, stop, and change course.

learan more about Planetary Motions here:

https://brainly.com/question/3488967

#SPJ4

What is the approximate value of FJ/FN?

a) 662

b) 1.94

c) 111

d) 35.8

A system administrator must scan the company's network to identify which ports are open and which software and software versions are running on each. Determine the syntax that should be used to yield the desired information if the administrator will be executing this task from a Linux command line.
A. Netstat -a
B. Nmap -A 10.1.0.0/24
C. Nmap -O 10.1.0.0/24
D. Netstat -r

Answers

Option A (netstat -a) displays active network connections.

The syntax that should be used to yield the desired information if a system administrator wants to scan the company's network from a Linux command line to identify which ports are open and which software and software versions are running on each is option B: nmap -A 10.1.0.0/24.

The nmap command is a network exploration and security auditing tool that can be used to discover hosts and services on a network, as well as the operating systems and versions they are running. The -A option enables aggressive scanning, which includes operating system detection, version detection, script scanning, and traceroute.

The 10.1.0.0/24 is the network address of the company's network, with the /24 specifying the subnet mask.

Option A (netstat -a) displays active network connections,but does not provide information on software and software versions. Option C (nmap -O 10.1.0.0/24) is used for operating system detection, but does not provide software and software version information. Option D (netstat -r) displays the kernel routing table, but does not provide information on open ports or running software.

Learn more about system administrator here:

https://brainly.com/question/29894226

#SPJ4

Hardware and software work ______ to allow user to form of function?
jointly
repeatedly
separately
independently

Answers

Answer:

Explanation:

seprately

how is brenna murphy's rainbow array 1 different than traditional prints? question 2 options: it is not an impression. it is part of an edition. it is a valuable work. it is mass-produced.

Answers

Rainbow Array 1 by Brenna Murphy and conventional prints. Rainbow Array 1 does not directly address any of the options offered, making it impossible to make a comparison to conventional prints.

What is printing an array?

The text section of the console in the Processing environment is where the printArray() method outputs array data. Between each element of the array, a new line is added. This function can only output arrays that are one dimensional. Be aware that the console is not fast.

Describe a one-based array.

The first item in an array is indexed as 0 when using zero-based array indexing, while the first item in an array using one-based array indexing is indexed as 1.

To know more about Array visit:-

https://brainly.com/question/13107940

#SPJ1

How do you sort an array in C++?

Answers

A C++ STL includes a built-in function called sort an array in C++ With this function, the range's items can be arranged in either ascending or descending order.

How is a list sorted?

Using the sort() method of the Arrays class, we may arrange arrays in ascending order. The array that has to be sorted is passed as a parameter to the function sort(). ReverseOrder(), a function offered by the Collections class, was used to sort an array in descending order.

In C++, how do you sort an array?

First is the index (pointer) of the first element in the range that needs to be sorted in this case. In the range to be sorted, last is the index (pointer) of the last element.

To know more about sort an array in C++ visit :-

https://brainly.com/question/29035434

#SPJ4

Why is the date a file was modified useful?
A.It identifies the most recent version.
B.It identifies the day it was created.
C.It identifies the location of the file.
D.It identifies the last time the file was opened.

Answers

The reason why the date a file was modified is useful is bA. It identifies the most recent version.

What is a File?

A computer file is a resource used by computers to store data that is largely identified by its file name. Data may be entered into a computer file in the same way that words can be written on paper.

With this in mind, the date of modification of the file shows the most recent version to know when the changes were made, to see if the content has been compromised.

Read more about files here:

https://brainly.com/question/518894

#SPJ1

when citing a website, only the web address needs to be cited. True or false?

Answers

It's true that all that has to be given when referencing a website is the URL.

What two things need to be cited or supported?

Author's first and last names. Page Title Date, Month, Year, and Website Address. Quotes, opinions, and predictions, whether directly quoted or paraphrased, must always be cited, whether the information is found online or in print. by the original author extrapolated statistics. the original's visuals.

Which three citation rules apply?

The fields of science, psychology, and education all use the APA (American Psychological Association). The Humanities use MLA (Modern Language Association) formatting guidelines. Business, history, and the fine arts all frequently employ the Chicago/Turabian referencing style.

To know more about  website visit:-

https://brainly.com/question/19459381

#SPJ4

What do Aba and Preach do?

Answers

Aba and Preach are two companies dedicated to helping people improve their personal image and achieve their goals.

Aba offers professional advisory, coaching and training services in areas such as leadership, interpersonal skills development, time management, effective communication, conflict management and interpersonal relationships. These services are intended to help people improve their personal image, increase their self-confidence, and achieve their professional and personal goals.

On the other hand, Preach offers training and development services to organizations and teams, helping to improve productivity, innovation and communication. Using neuroscience-based tools and techniques, Preach helps companies improve their decision-making processes, optimize their resources, and improve collaboration among their team members. These services help organizations reach optimal performance levels and increase the leadership and management skills of their teams.

Lear More About Professional services

https://brainly.com/question/4884763

#SPJ11

What is an advantage of an hidps?

Answers

An advantage of an hidps (host-based intrusion detection and prevention system) is that it can monitor and protect individual systems or hosts within a network.

This allows for more granular control and the ability to detect and prevent intrusions on a specific device, rather than just at the network level. Additionally, hidps can provide insight into the behavior of individual users and applications, helping to identify potential security risks.

Overall, hidps is a valuable tool for securing individual systems within a larger network.

For more information about advantage of an hidps, visit:

https://brainly.com/question/27804374

#SPJ11

the _______ animation animates the object leaving the slide; starts with the object visible and ends with the object not visible. entrance emphasis exit motion paths

Answers

The animation described in the statement is Exit animation.

What are the different types of exit animations available in presentation software?

Different presentation software may have different types of exit animations available, but some common types include Fade, Dissolve, Wipe, Zoom, and Fly Out. Each type of exit animation can be customized to adjust the direction, speed, and other properties of the animation.

What is the purpose of using exit animations in a presentation?

Exit animations can help to add visual interest and engagement to a presentation, by animating objects as they leave the slide. This can help to emphasize the end of a point or transition, and can also help to create a sense of movement and progression within the presentation. However, it is important to use exit animations sparingly and appropriately, as too many or overly complex animations can be distracting and detract from the content of the presentation.

Learn more about animation here:

brainly.com/question/29996953

#SPJ4

Other Questions
survey research has shown that people with high levels of empathy (that is, an ability to imagine and feel what others are experiencing) tend to indicate lower ratings of enjoyment of violent humor than people with lower levels of empathy. based on these results, one can conclude that on november 1, 2022, a company using accrual accounting, pays for a television advertising campaign. commercials will run evenly over six months beginning on november 1, 2022. how much advertising expense will be reported on an income statement prepared for the year ended december 31, 2023?A. $900,00B. $600,00C. $450,00D. $300,00 the ________ ethical approach proposes that a persons or employers character rather than specific behaviors is what is important. What is Osmosis, Diffusion, Tyndall effect and Brownian Motion??? The primary key to hypnosis is finding someone who accepts suggestions easily (true or false) what were the two largest cities in the indus valley civilization frisco company's merchandise inventory account at year-end has a balance of $62,115, but a physical count reveals that only $61,900 of inventory exists. the adjusting entry to record this $215 of inventory shrinkage is: multiple choice account title debit credit merchandise inventory 215 inventory shrinkage expense 215 account title debit credit purchases discounts 215 cost of goods sold 215 account title debit credit cost of goods sold 215 purchases discounts 215 account title debit credit inventory shrinkage expense 215 cost of goods sold 215 account title debit credit cost of goods sold 215 merchandise inventory 215 Determine the unknown side of the similar triangle btw ik this isn't college math it was automatically set to it Find each valueED=AB= How does the Hood Canal Bridge work? FILL IN THE BLANK. when the research objective is to ________, focus groups may be an alternative. What process refers to dividing up your money into avariety of different asset classes, such as lots of different stocks, not justApple and Amazon? * Why do some photons travel right through the atom unchanged while others are absorbed?A) Only photons of specific frequencies can promote an electronic transition.B) Only visible light photons can interact with electrons.C) Only a few photons get deflected by the nucleus since it's only a tiny part of the atom's volume.D) Only negatively charged photons interact with atoms. Why was the ruling family's loyalty to Russiabeingquestioned? A scientist mixes 0.02 g of a strong monoprotic base in 83ml of water and obtains a pH of 12 . He then realizes that he forgot to label the container and forgot what base he added. What is the most likely the identity of thisr base? LiOH NaOH RbOH KOH What are the 5 parts of the nose? Use the drop-down menus to compare 2.25 and 3.please i need help!!! what process happens again and again in the rock cycle For a pair of objects, the center of mass is located.Choose one: A. along the line between the two objects, closer to the less massive object.B. at the center of the less massive object.C. at the center of the more massive object.D. along the line between the two objects, closer to the more massive object. Increased levels of carbon dioxide in the blood will result in decreased:a. parasympathetic stimulation to the heartb. sympathetic stimulation to the heartc. blood flow to the lungsd. heart ratee. cardiac outpu