75. A list of all of the significant events that occur in an application is known as:
a. Audit log
b. Replay log
c. Export file
d. Data dump

Answers

Answer 1

A. A list of all of the significant events that occur in an application is known as an audit log.

An audit log is a record of all actions performed on a system or application, including login attempts, file accesses, data modifications, and other security-related events. The audit log helps to maintain accountability and provide a trail of actions performed by users or applications. The information recorded in the audit log includes the date and time of the event, the user or process that initiated the event, and the specific action taken. By reviewing the audit log, system administrators and security professionals can detect and investigate potential security breaches, identify unauthorized access attempts, and monitor compliance with organizational policies and regulations.

To learn more about significant click on the link below:

brainly.com/question/20630613

#SPJ11


Related Questions

every department can now edit their own portion of the university's web site. the editing software prevents someone from editing another department's content and also permits authorized editors to edit only a portion of the department's pages. this kind of software is called what?

Answers

A program known as a content management system (CM) allows users to create, edit, collaborate on, publish, and save digital information.

Meaning of management system?

A management system is the method an organization uses to coordinate the various aspects of its operations in order to accomplish its goals. The content areas of your website are completely under the authority of users with the editor position in WordPress. They have the ability to add, modify, publish, and delete any post on the website, even those published by other people. A comment can be moderated, edited, or deleted by an editor. A management system is a crucial tool for streamlining your company's operations and increasing productivity. The right management system implementation and certification for your company's operations boost business performance and incorporate safe and sustainable practices.

To learn more about management system refer to

https://brainly.com/question/24998003

#SPJ4

What is CPU known as in the computer?

Answers

Answer:

It is also known as the processor of the computer

Explanation:

The CPU is what retrieves and executes instructions, causing it to oftenly be referred to as processor.

Answer:

It is known as the brain of the computer

Explanation:

CPU stands for central process unit. It is responsible for processing the information to the computer just like how human brains process the information in their brains first then act. Thus, why CPU is known as the brain of the computer.

Hope this helps!

In the video game Animal Crossing: New Horizons, villagers are organized by Personality and Hobby.


The 8 Personalities are:


Normal

Lazy

Sisterly

Snooty

Cranky

Jock

Peppy

Smug


The 6 Hobbies are:


Education

Fashion

Fitness

Music

Nature

Playing


Create a program that allows the user to create their own Animal Crossing villager. The user should be able to enter a name, after which the program will choose a random Hobby and Personality for the villager:


"Please enter a Villager Name:

>> Betsy

Betsy is Snooty and into Nature"


The program should store both the Hobbies and Personalities in lists, and when creating a villager it should randomly choose from each list for the personality.



Requirements:

· Both Personalities and Hobbies must be stored in lists

· You must generate a different random number to determine the hobby and personality (that is, don't generate 1 random number and use it for both lists, as that prevents many combinations)

· In randomizing, you should make sure that all combinations are possible (that is, make sure you don't accidentally leave out a personality or hobby from random generation)

· The program shouldn't crash

Answers

The video game program is an illustration of randomization and lists

Randomization involves generating random numbers or selecting random optionsLists are variables that hold multiple values

The video game program

The video game program written in Python, where comments are used to explain each action is as follows:

#This imports the random package

import random

#This creates a list for personalities

Personality = ["Normal","Lazy","Sisterly","Snooty","Cranky","Jock","Peppy","Smug"]

#This creates a list for hobbies

Hobbies = ["Education","Fashion","Fitness","Music","Nature","Playing"]

#This gets input for name

name = input("Please enter a Villager Name: ")

#This generates a random number for personality

personalityNum = random.randint(0, 7)

#This generates a random number for hobbies

hobbiesNum = random.randint(0, 5)

#This prints the the required output

print(name,"is",Personality[personalityNum],"and into",Hobbies[hobbiesNum])

Read more about Python programs at:

https://brainly.com/question/16397886

PLEASE HELP ASAP!

Create a form with a basic drop-down list with three items. The second item should be initially chosen by default.

Answers

More information? I have no idea what you are talking about could be programming, no idea which language. Please provide more information

There is a weird green and black kinda growth on my screen that moves when I squeeze the screen, it also looks kinda like a glitchy thing too,Please help

Answers

LCD stands for Liquid Crystal Display. So yes, what you're seeing is liquid. it's no longer contained where it needs to be.

How do you write mathematical expressions that combine variable and literal data

Answers

Variables, literal values (text or integers), and operators specify how the expression's other elements are to be evaluated. Expressions in Miva Script can generally be applied in one of two ways: Add a fresh value.

What connection exists between literals and variables?

Literals are unprocessed data or values that are kept in a constant or variable. Variables can have their values updated and modified since they are changeable. Because constants are immutable, their values can never be updated or changed. Depending on the type of literal employed, literals can be changed or remain unchanged.

What kind of expression has one or more variables?

The concept of algebraic expressions is the use of letters or alphabets to represent numbers without providing their precise values. We learned how to express an unknown value using letters like x, y, and z in the fundamentals of algebra. Here, we refer to these letters as variables.

to know more about mathematical expressions here:

brainly.com/question/28980347

#SPJ1

Ben is writing web page content on a newly launched gaming gadget. He has to use hyperlinks to help visitors navigate to web pages that deal with other types of electronic gadgets. Where should he place the hyperlinks in the web page?

Answers

Answer:

at the bottom of the web page

Explanation:

Ben is creating a web page content for the gaming gadget that  has been newly launched. He uses hyperlinks so that the visitors can navigate the web pages properly which deals with some other electronic gadgets also. So Ben should place the hyperlinks at the bottom of the web page as it will provide anyone viewing the web pages easily.

An integrated development environment (ide) bundles tools for programming into a unified application. what kinds of tools are usually included?

Answers

Answer:

Text editors, code libraries, compilers, and test platforms.

Explanation:

During which two phases of website development do developers construct diagrams to understand the website better?

gathering information
planning
design
development
launch

Answers

Website development and website design

The cost of an items is Rs 200. what will be the cost of 50 such items. write a simple program​

Answers

Answer:

In Python:

Unit_Cost = 200

Cost50 = 50 * Unit_Cost

print("Cost of 50 items: Rs."+str(Cost50))

Explanation:

This initializes the unit cost to 200

Unit_Cost = 200

This calculates the cost of 50 of such items

Cost50 = 50 * Unit_Cost

This prints the calculated cost

print("Cost of 50 items: Rs."+str(Cost50))

The Pennsylvania Department of Transportation, a state administration, repaired potholes along PA 23 highway, which feeds into the center of Conshohocken. a) Carlos' employer updates all of his computer systems using U.S.-made parts. b) Deborah gets a new refrigerator made in the United States.
c) Carlos bought a bottle of Italian wine.
d) Deborah's father in Sweden ordered a bottle of Vermont maple syrup from the manufacturer's website.

Answers

Transaction: Darnell buys a sweater made in Guatemala Category: Imports (M). Transaction: Darnell's employer assigns him to provide consulting services to an Australian firm that's opening a manufacturing facility in China Category: Exports (X).

What is export and import?

Exporting is the sale of goods and services from one's home country to another. Importing, on the other hand, refers to the purchase of foreign products and their transportation into one's home country.

Darnell purchases a Guatemalan-made sweater. Imports is a category (M)

Darnell's employer assigns him to provide consulting services to an Australian company that is establishing a manufacturing facility in China. Category: Exports (X)

Eleanor receives a new video camera made in the United States. Category: Consumption (C)

The Pennsylvania Department of Transportation, a state administration, repairs potholes on PA Highway 23, which runs through Conshohocken. Purchases made by the government (G)

Jacques purchases a new set of tools for his plumbing business. Investment is a category (I).

Thus, this can be concluded regarding the given scenario.

For more details regarding export and import, visit:

https://brainly.com/question/26428996

#SPJ1

A small startup company has hired you to harden their new network. Because funds are limited, you have decided to implement a unified threat management (UTM) device that provides multiple security features in a single network appliance: Firewall VPN Anti-spam Antivirus You join the UTM device to the company's Active Directory domain. The company's traveling sales force will use the VPN functionality provided by the UTM device to connect to the internal company network from hotel and airport public Wi-Fi networks. Which weaknesses exist in this implementation

Answers

Answer: The UTM represents a single point of failure

Explanation:

Unified threat management is a method used in information security which has to do with the installation of a single hardware or software that provides several security functions.

Even though it's easy to manage from a single device, the disadvantage is that within the information technology infrastructure, there is a single point of failure.

what are the advantages of customer relationship managment​

Answers

Answer:

Enhances Better Customer Service.

Facilitates discovery of new customers.

Increases customer revenues.

Helps the sales team in closing deals faster.

Enhances effective cross and up-selling of products.

Simplifies the sales and marketing processes.

Makes call centers more efficient.

Enhances customer loyalty.

The first commercially available digital camera was which of the following?

Answers

Kodak Professional Digital Camera System

hope it helps

pls mark me as brainliest

Answer:

D

Explanation:

None of the above

Drag the tiles to the correct boxes to complete the pairs.
Match the effects with the result they have.
silky blur
grainy BMW effect
soft focus
zoom effect
blurs an image while maintaining sharp edges
simulates flow of water
shows motion lines around the main object
obtains a darker, textured finish

Answers

Silky blur::shows motion lines around the main objectgrainy BMW effect:-obtains a darker, textured finishsoft focus:-blurs an image while maintaining sharp edgeszoom effect:-simulates flow of water

Done

Answer:

1 : blurs an image while maintaining sharp edges = soft focus

2:  simulates flow of water = silky blur

3: shows motion lines around the main object = zoom effect

4:  obtains a darker, textured finish = grainy B/W effect

Explanation:

Drag the tiles to the correct boxes to complete the pairs.Match the effects with the result they have.silky

What information should be documented in an incident log?

Answers

An incident log should document the following information: Incident identification, Date and time, Reporter details, Incident description, Affected parties, Root cause, Actions taken, Resolution status, Follow-up action, and Additional notes.

Incident identification: Assign a unique identifier to the incident for easy tracking and reference. Date and time: Record the date and time when the incident occurred, as well as when it was reported and logged. Reporter details: Note the name and contact information of the person who reported the incident.Incident description: Provide a brief and accurate description of the incident, including the nature and severity of the issue. Affected parties: List any individuals, departments, or assets impacted by the incident. Root cause: If known, specify the underlying cause of the incident.Actions taken: Detail the steps taken to address and resolve the incident, including any troubleshooting, workarounds, or corrective measures. Resolution status: Note whether the incident is resolved, ongoing, or pending further action. Follow-up actions: List any necessary follow-up steps, such as additional investigation, preventive measures, or process improvements. Additional notes: Include any other relevant information or observations about the incident.By documenting this information in an incident log, you can efficiently track and manage incidents, analyze trends, and implement improvements to prevent future occurrences.

Learn More About Incident Log: https://brainly.com/question/28456887

#SPJ11

Select all correct statements below: Group of answer choices A redundant link's switch port will be blocked by STP until needed. An Ethernet network can only have one active path at any time. Both frames and packets are prevented from being retransmitted through a network indefinately due to the TTL feature. STP is used to prevent Ethernet network performance degradation. An IP network can only have one active path at any time.

Answers

Snhahshshshshshhshshshsshhshshshshhs

A looping construct that continues to repeat until the expression becomes false is

A) a while loop.
B) a for loop.
C) an infinite loop.
D) a pass loop.

Answers

Answer:

A) a while loop.

Explanation:

A while loop is a programming construct that continues to repeat until the expression becomes false.

While loops are conditional statement that executes as long as the conditions remain true. They are used to automate tasks that are otherwise repetitive and would require redundant computing time to do them manually.

Answer: A. A while loop. I think

Explanation:

What in your view has led to the success of cloud computing? identify and describe at least three major technologies that have made the cloud possible and provide your rationale for selection.

Answers

The success of cloud computing occurred due to the cost reducing, flexible, redundancy and reliability, scalability, collaboration, efficiency, virtually and availability as critical success factors as the impact of the use of cloud computing for organizations.

Three major technologies that have made the cloud possible and provide your rationale for selection.

1. Infrastructure as a Service (IaaS):

IaaS essentially encourages access rather than ownership. This solution offers the end user options when it comes to hosting both standard software and programmes that have been developed specifically for them, as well as a generic data centre for storage.

2. Platform as a Service (PaaS):

Organizations may create, run, and manage apps without the need for IT infrastructure thanks to platform as a service (PaaS). Application development, testing, and deployment are made simpler and faster as a result.

3. Software as a Service (SaaS):

Software that is licenced on a subscription basis is used in place of conventional on-device software in software as a service (SaaS). It is hosted centrally on the cloud. Salesforce.com is a prime illustration.

Learn more about cloud computer:

https://brainly.com/question/26972068

#SPJ4

An iterative sketch is one deliverable you will need to provide to your client. What is an iteraive sketch?
A rough mock up of design approaches for the project, which can change over time.
A sketch of he final design of the project
A rough sketch of the project completed at the initial stages of the project.
A framework for the project

Answers

An iterative sketch is a rough mockup of design approaches for the project, which can change over time. It is a visual representation of the project that is used to communicate design ideas to the client.

The iterative sketch is created early in the design process and is intended to be a starting point for further discussion and refinement. It is an iterative process, meaning that the sketch is refined and revised based on feedback from the client and the design team. The goal of the iterative sketch is to arrive at a final design that meets the needs and requirements of the client while also being aesthetically pleasing and functional. It is a rough sketch that captures the key elements and functionality of a design but is not yet a final product. The purpose of an iterative sketch is to get feedback from stakeholders and end-users early in the design process so that changes and revisions can be made before the design is finalized. This can help ensure that the final design meets the needs of its intended audience and is more likely to be successful.

Find out more about iterative sketch

at brainly.com/question/31238329

#SPJ4

What is the importance of using the proper markup language?

Answers

The importance of using the proper markup language is that: D. Without the right tags the content won’t be accurately indexed.

What is HTML?

HTML is an abbreviation for hypertext markup language and it can be defined as a standard programming language that is used for designing, developing and creating websites or web pages.

In hypertext markup language (HTML), all character entities must be created by using the right and appropriate tags in order to ensure that all of the contents of a web resource are accurately and properly indexed.

In conclusion, hypertext markup language (HTML) helps to create a working relationship between the web browser and a search engine by accurately and properly indexing contents.

Read more on HTML here: brainly.com/question/4056554

#SPJ1

Complete Question:

What is the importance of using the proper markup language?

A. HTML tells the web browser where the page should be filed.

B. Without HTML, the keywords cannot be read by the search engine.

C. HTML allows the search engine to "talk" to the web browser.

D. Without the right tags the content won’t be accurately indexed

Answer:

D: Without the right tags the content won't be accurately indexed.

Write a program that reports whether or not someone is old enough to vote in the U.S. You should do the following in your program:


Ask the user for their age, and store it in a variable

Use an if/else statement with the proper comparison operator to print You are old enough to vote! if the person’s age is at least 18, and You are not old enough to vote. otherwise

An example run of your program might look like this:


Age: 19

You are old enough to vote!

… or like this:


Age: 16

You are not old enough to vote.

Answers

You can run this program in your Python interpreter or save it as a .py file and run it from the command line. When you run the program, you'll be prompted to enter your age, and then you'll see the appropriate message printed based on your age.

Here's an example program in Python that meets the requirements you described:
```
age = int(input("Age: "))

if age >= 18:
   print("You are old enough to vote!")
else:
   print("You are not old enough to vote.")
```
This program first asks the user to input their age, and then converts it to an integer and stores it in the variable `age`. It then uses an if/else statement to check whether the age is greater than or equal to 18. If it is, it prints "You are old enough to vote!". If it isn't, it prints "You are not old enough to vote.".

To learn more about Python Here:

https://brainly.com/question/30427047

#SPJ11

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. She can access the network from her usual office, but today, she is trying to access the wireless network from a conference room, which is across the hall and next to the elevator. Which of the following is the MOST likely cause of her connectivity problem?

a. The user has not yet rebooted her laptop computer while at her new location.
b. The user needs a new IP address because she is working on a different floor.
c. The wireless network access point on the user's normal floor has failed.
d. The user is out of the effective range of the wireless access point on her floor.
e. The user has not yet logged off and back on to the network while at her new location.

Answers

Answer:

d. The user is out of the effective range of the wireless access point on her floor.

Explanation:

how to sum all the odd or even numbers in an arraylist in java?

like the program asks for user input and adds the input to an arraylist and then the user can click a button (sum odd or sum even) and then the value of all odd or even numbers should be returned based on what button the user clicks, so how do i do that ?

Answers

A program exists as a detailed set of ordered operations for a computer to execute. Generally, the program exists placed into a storage area available to the computer.

What is java?

Java exists as a class-based, object-oriented programming language that exists designed to contain as rare implementation dependencies as possible.

For even sum:

BtnSumE.addActionListener(new ActionListener()

{

public void actionPerformed(ActionEvent e)

{

int sumE = 0;

for (int counter = 0; counter < aryNums.size(); counter++)

{

if (aryNums.get(counter) % 2 == 0)

{

sumE += aryNums.get(counter);

TxtArea.setText(String.valueOf(aryNums.get(counter)));

TxtArea2.setText("The sum of the even integers is " + valueOf(sumE));

}

For odd sum:

BtnSumO.addActionListener(new ActionListener()

{

public void actionPerformed(ActionEvent e)

{

int sumO = 0;

for (int counter = 0; counter < aryNums.size(); counter++)

{

if (aryNums.get(counter) % 2!= 0)

{

sumO += aryNums.get(counter);

TxtArea.setText(String.valueOf(aryNums.get(counter)));

TxtArea2.setText("The sum of the odd integers is " + valueOf(sumO));

}

When running the program for an even sum we get "74" and for the odd sum, we get "263".

Array list (aryNums) contain these numbers [0, 2, 23, 74, 263].

To learn more about computer programs refer to:

https://brainly.com/question/23275071

#SPJ9

Match the terms with their definitions

Match the terms with their definitions

Answers

Answer:

Malware goes with the third definition, single sign-on goes to the fourth definition, phishing goes to the second definition, and clickjacking goes to the first definition.

Hope this helps! :)

Malware = a term used for software designed to damage your computer or steal your personal information

Single sign-on = when you use a single credential to log into multiple websites

Phishing = when random links mislead you into giving your password or other vital information to an unscrupulous website or person

Clickjacking = when you unknowingly click a malicious link, thinking it to be a legitimate link
:)

Please tell answer fast​

Please tell answer fast

Answers

Answer:

a sonos wireless speakers

Emily is deciding between two cameras. One has a 25-megapixel rating, and the other has a 10-megapixel rating. What is the main difference between the two cameras?

Responses
The 25-megapixel camera has higher image resolution than the 10-megapixel camera.The 25-megapixel camera has higher image resolution than the 10-megapixel camera. , ,

The 10-megapixel camera has a greater depth of field than the 25-megapixel camera.
The 10-megapixel camera has a greater depth of field than the 25-megapixel camera.,
The 10-megapixel camera has a higher shutter speed than the 25-megapixel camera.
The 10-megapixel camera has a higher shutter speed than the 25-megapixel camera.,
The 25-megapixel camera has a larger maximum aperture than the 10-megapixel camera.

Answers

Answer:

D

Explanation:

The 25-megapixel camera has higher image resolution than the 10-megapixel camera.

Explain the difference between undecidable problems and unreasonable time algorithms. Be specific.

Answers

One for which no algorithm can ever be written to find the solution is an unsolvable problem. An undecidable problem is one for which no algorithm can ever be written that will always provide any input value with a correct true/false option.

An insoluble issue is one for which there is no algorithm that can ever be constructed to locate the solution. Undecidable problems are those for which there is no method that will ever be developed that can consistently return a true/false answer for any input value.

What is time algorithms?

If the value of an algorithm is constrained by a value that is independent of the amount of the input, the algorithm is said to be constant time sometimes written as time. For instance, accessing any individual element in an array requires a constant amount of time because just one operation is required to find it.

We employ a technique known as "Big O notation" to describe how time-consuming a method is. We employ a language called the Big O notation to express how time-consuming an algorithm is.

Therefore, we would argue that the insertion sort's best-case time complexity is O. (n). Linear complexity is another name for O(n) complexity.

Thus, An insoluble issue is one for which there is no algorithm.

For more information about time algorithms, click here:

https://brainly.com/question/14635830

#SPJ6

what are the best methods of checking the provided options from the installation package when performing an installation from the command line in windows? check all that apply.

Answers

The best method of checking out the options that the installation package provides is consult the documentation for the application to see what options they provide, try to use the /? help flag to see if you get any helpful output.

What is an application documentation?

What does application documentation (software documentation) entail? Software documentation refers to the written, visual, or visual instructions that are provided with computer programs. Software documentation often provides instructions on how to use a service or an application.

A set of internationally recognized standards called as good documentation practice (GDocP), also referred to as good record-keeping practice (GRK), ensures the reliability.

Check the application's documentation to discover what choices are available; The /?, /h, and /help switches will frequently provide you with some information about the options the installation offers. As an alternative, you can find the same information by looking through the software's documentation.

Hence, When running the package, try using the /?, /h, or /help flags to see if they produce any useful output.

Learn more about documentation  from

https://brainly.com/question/1218796
#SPJ1

See full question below

If you're performing an installation from the command line in Windows, what's the best method of checking out the options that the installation package provides? Check all that apply.

Write a program that reads a list of scores separated by a space in one line and then assigns grades based on the following scheme:
The grade is A if score is >= best - 10.
The grade is B if score is >= best - 20. The grade is C if score is >= best - 30. The grade is D if score is >= best - 40. The grade is F otherwise.
Sample Run Enter scores: 40 55 70 58
Student 0 score is 40 and grade is C Student 1 score is 55 and grade is B Student 2 score is 70 and grade is A Student 3 score is 58 and grade is B​

Answers

A Python program that reads a list of scores, assigns grades based on the given scheme, and prints the results. The `f` before the string allows us to embed expressions (like the variables `i`, `score`, and `grade`) within curly braces `{}`.

We start by reading the scores as a string from the user, using the `input()` function. We then split the string into a list of scores using the `split()` method, which splits the string at whitespace characters (spaces, tabs, etc.) by default. We convert each score to an integer using a list comprehension.

This program uses a function `assign_grade` to determine the grade based on the score and the best score. The main function reads the scores as input, converts them to integers, and finds the best score. It then iterates through the scores and uses the `assign_grade` function to find the grade for each student, and finally prints the results.

To know more about program visit:

https://brainly.com/question/11023419

#SPJ11

Other Questions
All of the following are important skills of systematic observation, EXCEPT:A. describing behavior objectively.B. observing children only as individuals.C. observing children at different times of the day.D. being aware of individual biases. The peoples party was least successful in pursuing which goal?Perssuring states to allow referendums and inniativesrequiring the rich trophy a higher income tax Enacting the direct election of U.S. senatorsforcing the adoption of the silver standard The scientific method ________. Question 7 options: is a rigid methodology that must be precisely followed to ensure validity is undertaken only by trained scientists in a controlled laboratory setting is the means by which absolute truth can be uncovered is a rough recipe for answering questions, but the steps need not be performed in the same order as outlined Use exponents to rewrite 27.A. 93B. 39C. 9 + 9 + 9D. 23E. 33 why do jews celebrate passover? what does it commemorate? If n=25,x(x-bar)=30, and s=5, find the margin of error at a 90% confidence level. Give your answer to two decimal places. _______ You are standing near a set of train tracks and hear the whistle of a coming train. You look to your left and notice the train traveling from left to right at 150 miles per hour. Yea i know Bolt is standing at the end of the passenger car on the train and begins to run. To you standing still it appears that Usain Bolt is running at a speed of 177 miles per hour. How fast is Usain Bolt actually running relative to the train? CALLING ALL BRAINLY USER HELP ME AND I'LL MARK U (BRAINLLEST)!!! McDonald's success in franchising in global markets can be attributed to several factors which do not include: Select one: a. local market knowledge. b. cross licensing. c. none of them d. granting franchisees leeway to tailor menu offerings to suit local tastes. e. a well known global brand name. What 3 numbers have 3 factors?. FeatureRead the passage.Amelia EarhartCourtesy of the Library of CongressAmelia Earhart wasn't afraid to break down barriers. In 1928, she was the first woman to fly as a passenger across the Atlantic Ocean. Then, in 1932, she became the first woman to pilot a plane across that ocean. There weren't many female pilots back then, and her actions inspired other women to follow their dreams. This was especially important because there were few career choices available to women at that time. Amelia Earhart has inspired generations of women to do things that had never been done by women before.Amelia Earhart Flies Across the AtlanticIn 1928, Amelia Earhart received a phone call that would change her life. She was invited to become the first woman passenger to cross the Atlantic Ocean in a plane. "The idea of just going as 'extra weight' did not appeal to me at all," she said, but she accepted the offer nonetheless. On June 17, after several delays due to bad weather, Amelia Earhart flew in a plane named Friendship with co-pilots Wilmer "Bill" Stultz and Louis "Slim" Gordon. The plane landed at Burry Port, South Wales, with just a small amount of fuel left.Earhart's first trip across the Atlantic took more than 20 hours! After that flight Earhart became a media sensation. Following the trip, she was given parties and even a ticker tape parade down Broadway in New York City. President Coolidge called to congratulate her on crossing the Atlantic. Because Earhart's record-breaking career and physical appearance were similar to pioneering pilot and American hero Charles Lindbergh, she earned the nickname "Lady Lindy."Earhart wrote a book about her first flight across the Atlantic, called 20 Hrs., 40 Min. She continued to break records. She also polished her skills as a speaker and writer, always advocating women's achievements, especially in aviation.Amelia Earhart's Last FlightAfter flying across the Atlantic as a passenger in 1928, Amelia Earhart's next goal was to achieve a transatlantic crossing on her own. In 1927, Charles Lindbergh became the first person to make a solo nonstop flight across the Atlantic. In 1932, exactly five years after Lindbergh's flight, Earhart became the first woman to repeat the feat. Her popularity grew even more. She was the undisputed queen of the air! There was no doubt she had accomplished a great deal. Still, she wanted to achieve more. What did Earhart do next?She decided that her next trip would be to fly around the world. In March 1937, she flew to Hawaii with fellow pilot Paul Mantz to begin this flight. Earhart lost control of the plane on takeoff, however, and the plane had to be sent to the factory for repairs.In June, she went to Miami to again begin a flight around the world, this time with Fred Noonan as her navigator. No one knows why, but she left behind important communication and navigation instruments. Perhaps it was to make room for additional fuel for the long flight. But without a way to talk to others or to figure out their course, they were taking a big risk. The pair made it to New Guinea in 21 days, even though Earhart was tired and ill. During the next leg of the trip, they departed New Guinea for Howland Island, a tiny island in the middle of the Pacific Ocean. July 2, 1937, was the last time Earhart and Noonan communicated with a nearby Coast Guard ship. They were never heard from again.The U.S. Navy conducted a massive search for Earhart and Noonan that continued for more than two weeks. Unable to accept that Earhart had simply disappeared and perished, some of her admirers believed that she was a spy or was captured by enemies of the United States. The Navy submitted a report following its search, which included maps of search areas. Neither the plane nor Earhart nor Noonan were ever found. No one knows for sure what happened, but many people believe they got lost and simply ran out of fuel and died. Amelia Earhart was less than a month away from her 40th birthday.Question 1Part AWhat inference can be made about Amelia Earhart?ResponsesA. She enjoyed trying things that no one else had done.B. Although she flew airplanes, she secretly worked for the government.C. Her attempt to fly around the world failed because she was sick.D. Once a male pilot achieved something, Amelia had to do the same.Question 2Part BWhich detail from the text best supports the answer to Part A?ResponsesA. some of her admirers believed that she was a spy or was captured by enemies of the United States.B. In 1932, exactly five years after Lindbergh's flight, Earhart became the first woman to repeat the feat.C. Amelia Earhart wasn't afraid to break down barriers.D. The pair made it to New Guinea in 21 days, even though Earhart was tired and ill. Need answers for the questions sent in the picture HELPPP ME ASPAP I'LL GIVE YOU BRAINLIST (NO NONSENSE PLS)1. Nobelium has an atomic number of 102 and an atomic mass of 259. Explain how to calculate how many neutrons are in the most common form of Nobelium. Include a mathematical expression to help explain your answer (example: 1+1 = 2) 2. The atomic mass of Mercury is 200.592. The atomic number for Mercury is 80. As protons and neutrons are only available as a whole, how do scientists determine an atomic mass reported as a decimal number? Explain your answer using Mercury as an example. The amount of time it takes Isabella to wait for the bus is continuous and uniformly distributed between 4 minutes and 18 minutes. What is the probability that it takes Isabella more than 7 minutes to wait for the bus When the price of a pair of black shoes increases by 10 percent, the quantity demanded of a pair of black shoes decrease by 4 percent, then the price elasticity of demand for a pair of black shoes is 0inelastic. 0unit elastic. 0elastic. 7(2x + 3) 5x - 9simplify the following expressions into equivalent forms Solve the system of linear equations given by 2y + 3z = 7 3x + 6y - 12z = -3 5x 2y + 2z = -7 Use Gauss-Jordan elimination method. Which two rulings were made as part of the Nuremburg Trials?-National law always takes precedence over international law if the two conflict.- Only officers can be held accountable for international crimes in the military.-Some atrocities can be prosecuted even if they werent illegal at the time. -Following orders is not a valid excuse for gross violations of international law. when testing for the presence of sugar, what are the limitations of the benedict's test? select four answers. Which level of the state court structure would deal with each situation described below1. A person driving to work is issued a ticket for running a red light2. A person is arrested for breaking into a business and stealing goods3. A person convicted of a civil crime wants the conviction to be overturned.