A packet capture shows a bunch of ARP requests from a single IP.
Which of the following activities is most likely to cause this?
Phishing
Data exfiltration
Scanning
Beaconing

Answers

Answer 1

The activity that is most likely to cause a packet capture showing a bunch of ARP requests from a single IP is scanning.ARP requests stand for Address Resolution Protocol requests. It is a message sent out by a device to ask other devices for the physical address (MAC address) of an IP address it needs to communicate with.

ARP requests are broadcast messages, so they go out to all devices on the network. If a device sees an ARP request that is meant for its IP address, it will reply with its MAC address.ARP scanning is the process of sending out a large number of ARP requests to a range of IP addresses. This is usually done as part of a reconnaissance activity where an attacker is trying to map out the devices on a network. By sending out a lot of ARP requests, an attacker can quickly build up a list of IP addresses and their associated MAC addresses.Once an attacker has this information, they can use it to launch further attacks against the network.

For example, they may use this information to launch a spoofing attack, where they pretend to be a legitimate device on the network. They can also use this information to launch a denial-of-service attack by flooding the network with traffic.

To summarize, scanning is the activity that is most likely to cause a packet capture showing a bunch of ARP requests from a single IP.

To know more about Address Resolution Protocol visit:

https://brainly.com/question/30395940

#SPJ11


Related Questions

Write a while loop that prints the first 16 numbers of the pattern: 1, 4, 9, 16, 25

Answers

Answer:

Explanation:

the pattern is increasing squared number. 1^2, 2^2, 3^2, 4^2, 5^2



int i=1;

while (i<=16) {

Print i^2;

i++;

}

what are different features of ms access​

Answers

1. Tables: Access allows users to create tables to store and organize data. Tables have rows and columns, and provide a structured structure for storing data.

2. Forms: Access provides a form builder that simplifies data entry and improves the user interface. Forms allow users to enter data into tables in a simple and structured way.

3. Reports: Access enables users to create professional-looking reports based on data stored in tables. Reports can include charts, graphs, summaries, and other visual elements to present data in a meaningful way.

4. Queries: Access provides a query building tool that allows users to extract specific information from tables. Queries help retrieve data, perform calculations, and create new tables or views based on specified criteria.

5. Relationships: Access methods allow users to establish relationships between tables. This ensures data consistency and allows data recovery and maintenance across multiple tables.

6. Macros and Visual Basic for Applications (VBA): Access supports automation through macros and VBA. Macros provide a way to automate common tasks, while allowing for advanced flexibility and programming capabilities in VBA Access.

7. Security: Access provides security features to protect databases and control user access. Users can set permissions, passwords and encryption to ensure data privacy and integrity.

8. Integration with other Microsoft Office applications: Access seamlessly integrates with other Microsoft Office applications such as Excel, Word, and Outlook to share, import, and export data

These are just some of the features that make Microsoft Access a powerful tool for database management and data analysis.

What is the best CPU you can put inside a Dell Precision T3500?

And what would be the best graphics card you could put with this CPU?

Answers

Answer:

Whatever fits

Explanation:

If an intel i9 or a Ryzen 9 fits, use that. 3090's are very big, so try adding a 3060-3080.

Hope this helps!

Program directions: Your math instructor has given two quizzes worth 30 points each. Your overall grade is the sum of the two quiz scores. You are to write a program that asks the user to input two integer quiz scores and then calculate the overall grade using the following grade scale. If either square is greater than 30 or less than zero, print “ERROR”
A = 54 or higher
B = 48 or higher, but less than 54
C = 42 or higher, but less than 48
D = 36 or higher, but less than 42
F = Less than 36

IN EDHESIVE OR PYTHON PLEASE

Answers

Answer:

Explanation:

subject_1_marks=input("Enter first subject marks")

subject_2_marks=input("Enter Second subject marks")

if((subject_1_marks)**2 OR (subject_2_marks)**2) >30:

       print(ERROR)

eIif( subject_1_marks+subject_2_marks>=54):

     print(A)

eIif( subject_1_marks+subject_2_marks>=54 AND subject_1_marks+subject_2_marks<=48 ):

     print(B)

eIif( subject_1_marks+subject_2_marks>=48 AND subject_1_marks+subject_2_marks<=42 ):

     print(B)

eIif( subject_1_marks+subject_2_marks>=42 AND subject_1_marks+subject_2_marks<=36 ):

     print(C)

elif( subject_1_marks+subject_2_marks<=36):

    print(F)

else:

   print(some thing is wrong)

Which of the following is true about 'build' Maven life cycle?
A - It cleans up artifacts created by prior builds.
B - This is used to build the application.
C - This generates site documentation for the project.
D - None of the above.

Answers

Option B - "build" is used to build the application - is true about the Maven lifecycle.

In the Maven build lifecycle, the "build" phase is responsible for building the application. It compiles the source code, runs tests, and creates artifacts such as JAR or WAR files. Option A, cleaning up artifacts, is not part of the "build" phase but rather the "clean" phase.

Option C, generating site documentation, is handled by the "site" phase. The "build" phase focuses on assembling and packaging the application, making it ready for deployment or distribution. It ensures that the project's source code is compiled, dependencies are resolved, and the resulting artifacts are produced, preparing the application for further stages or use.

Learn more about Maven build lifecycle here: brainly.com/question/31148033

#SPJ11

Early computing crash course computer science #1 paragraph

Answers

Answer:

But before we get into all that, we should start at computing’s origins, because although electronic computers are relatively new, the need for computation is not.So each bead on the bottom row represents a single unit, in the next row they represent 10, the row above 100, and so on.But if we were to add 5 more after the first 3 we would run out of beads, so we would slide everything back to the left, slide one bead on the second row to the right, representing ten, and then add the final 2 beads on the bottom row for a total of 12.So if we were to add 1,251 we would just add 1 to the bottom row, 5 to the second row, 2 to the third row, and 1 to the fourth row - we don’t have to add in our head and the abacus stores the total for us.Over the next 4000 years, humans developed all sorts of clever computing devices, like the astrolabe, which enabled ships to calculate their latitude at sea.As early computer pioneer Charles Babbage said: “At each increase of knowledge, as well as on the contrivance of every new tool, human labour becomes abridged.”

this concept asks how tied down a language is to a particular platform, can code be distributed easily and can libraries be made and shared group of answer choices reliability readability writeability reusability efficiency

Answers

The concept that asks how tied down a language is to a particular platform, the ease of distributing code, and the ability to create and share libraries is reusability.

Reusability refers to the extent to which code can be used again in different contexts or projects. A language that promotes reusability allows code to be easily shared, distributed, and utilized across different platforms and applications. It enables the creation of libraries and modules that can be readily incorporated into various projects, saving time and effort in development. Languages with high reusability facilitate code sharing and collaboration among developers, promoting the creation of robust and scalable software systems. This concept is particularly important in modern software development, where the ability to reuse existing code and libraries greatly enhances productivity and efficiency.

learn more about distributing code here:

https://brainly.com/question/31797528

#SPJ11

If Tracy is facing right, which of the following commands can be used to turn her to face up?
A. left(90)
B. turn(up)
C. right(-90)
D. setposition(90)



A only


A and C


A, B, and C


A, B, C, and D

Answers

Answer: A. left (90)

Answer: The answer is A, B, and C.

Discuss the types of data that business might collect and how the business could use that data to drive decision-making in a specific area of the business

Answers

Answer:

Answered below

Explanation:

A business such as an online store like Amazon can collect user data like name, address, mouse clicks on products, how long users stay on page viewing a particular product, marital status, education and many more.

These data are used by these businesses to drive decision-making that enhances the sale of their goods. For instance, adverts and search alternatives about a particular good can be shown to people who have looked at them before. A newly married or pregnant woman would be shown baby products etc.

Explain three major concerns in database systems.​

Answers

Answer:

Slow Read-Write Speeds. Performance slowdowns can occur due to high latency for disk read/writes. ...Scaling Problems. ...Incorrect Virtual Machine Setup. ...Lack of Backup and Monitoring. ...Query Performance. ...User and Query Conflicts. ...Configuration. ...Capacity.

Which command(s) can be used to view a routing table on a Linux based machine/OS? Select all that apply. show route tableip route show ip route route route print

Answers

So, the correct options are: ip route show , route , route -n and netstat -r. In Linux-based operating systems, the routing table contains information about how the system should forward network traffic.

The routing table is used by the kernel to determine the best path for packets to reach their destination. To view the routing table, there are several commands available, including:

ip route show: This command shows the routing table using the iproute2 toolset. It displays detailed information about the routing table, including the destination network, gateway, netmask, and interface.route: This command is used to display or manipulate the IP routing table. It displays the kernel routing table, including the destination network, gateway, netmask, and interface.route -n: This command is similar to the route command, but it displays the IP addresses in numeric format instead of resolving them to hostnames.netstat -r: This command shows the kernel routing table in a concise format, including the destination network, gateway, netmask, and interface.

These commands can be useful for troubleshooting network issues and verifying that the routing table is configured correctly.

Learn more about IP addresses :

https://brainly.com/question/16011753

#SPJ4

All types of sciences use the same steps of the scientific method.

True
False

Answers

the correct answer is true

What is the quickest way to remove all filters that have been applied to a worksheet?

Answers

Answer:

Click the Filter button in the Sort & Filter group.

Explanation:

Quizlet

Go to the filter option, click sort/filter and unfilter.

3. Muna Tamang told us about the computers that they were very large like entire building where vacuum tubes were used. a. About which generation she is taking ? b. Write the features of this generation. What was the time period of this generation ? Write major characteristics of these com puters. C.what was the time period of this generation?write major characteristics of these computers.​

Answers

a. She is talking about  first generation of computers.

b. The features of first generation computers were massive, often taking up entire rooms, and utilized vacuum tubes to process data. The time period of this generation was between 1940 and 1956. Some of the major characteristics of these computers included limited programming capabilities, slow processing speeds, and a high rate of failure due to the fragility of the vacuum tubes.

c. The time period of this generation was between 1940 and 1956. Some of the major characteristics of these computers included limited programming capabilities, slow processing speeds, and a high rate of failure due to the fragility of the vacuum tubes.

Other features of this generation included the use of punched cards for input and output, limited storage capacity, and a reliance on machine language for programming. These computers were primarily used for scientific and military purposes, such as calculating ballistics trajectories or breaking codes.

Despite their limitations, the first generation of computers laid the groundwork for future advancements in computing technology, paving the way for the development of smaller, faster, and more powerful computers in subsequent generations.

Overall, the first generation of computers played a significant role in shaping the course of technological progress, and continue to be remembered as a groundbreaking era in the history of computing.

For more such questions on first generation computers, click on:

https://brainly.com/question/31359262

#SPJ11

A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification to fix the issue?

Answers

Answer:

Service record (SRV)

Explanation:

Service records (SRV record) are data records stipulating specifications of the DNS such as the port numbers, servers, hostname, priority and weight, and IP addresses of defined or cataloged services servers.

The SRV record is the source of information and the search site about the

location of particular services as such an application i need of such services will look for a related SRV record

A configured SRV is the source of the ports and personal settings for a new email client, without which the parameters set in the email client will be incorrect.

What is the cpu used for

Answers

Answer:

A central processing unit (CPU), also called a central processor, main processor or just processor, is the electronic circuitry that executes instructions comprising a computer program. The CPU performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions in the program.

Jason is the motion picture projectionist at the local IMAX theater. This means that he runs the huge movie projector so that customers can see the feature on the big screen. What pathway in the Arts, AV Technology, and Communication cluster does he work in? Question 1 options: AV Technology and Film Printing Technology Journalism and Broadcasting Telecommunications

Answers

Answer:

AV technology  i think hopefully im right

Explanation:

K12

Tom walks into the accounting department and walks into a mess! User A can't access the Internet, User B has forgotten her password, User C's system is overheating to the point of smoking and the administrator is worried there might be a virus on all the systems. Whose system should he address first

Answers

Answer:

User C.

Explanation:

As per the given details, the problem of user C's system must be addressed first due to the seriousness of his case. His computer is excessively overheating up to the smoking point and if his problem is not addressed soon, it will damage the vital parts of the computer or may also explode. The other users having the problem of inability to access the internet or issue of forgotten password can be addressed later as these are minor problems that do not have as such consequences. Thus, user C is the correct answer.

Which of the following is the most likely disadvantage caused by the inability to access the internet?

A. inability to access educational and other resources
B. inability to communicate with business partners
C. inability to apply for jobs that use online recruitment
D. inability to relate to others in a social network

Answers

The one that is the disadvantage caused by the inability to access the internet is inability to relate to others in a social network. The correct option is D.

What is social networks?

The use of world wide web social media sites to stay connected with family and friends, community, colleagues, or customers is referred to as social networking.

Through all the sites, online communication can serve a social, business, or both purposes.

The disadvantage caused by a lack of internet access is the inability to interact with others in a social network.

Thus, the correct option is D.

For more details regarding social network, visit:

https://brainly.com/question/14312767

#SPJ1

as federalism has evolved over the years, more power has gone to the federal government . in the modern era, new types of federalism has emerged.

Answers

Over time, power has shifted towards the federal government in federalism. New types of federalism have emerged in the modern era.

The statement is true. Over the years, there has been a trend of increasing power shifting towards the federal government in the United States. This can be observed through the evolution of federalism, which is the distribution of power between the federal government and the states. In the modern era, new types of federalism have emerged as a result of various factors such as changes in societal needs, legal interpretations, and political dynamics. One example of a modern type of federalism is cooperative federalism, which emphasizes collaboration and partnership between the federal government and the states in addressing complex policy issues. These new types of federalism often involve a greater degree of federal involvement and intervention in areas that were traditionally considered within the jurisdiction of the states. This can be seen as a response to the challenges and complexities of a rapidly changing society, as well as the need for a unified approach to address national issues.

learn more about federalism here:

https://brainly.com/question/8305583

#SPJ11

Pituitary dwarfism results from a decreased secretion of ________ , which as a result decreases the rate of cell division of ________.

Answers

Pituitary dwarfism results from a decreased secretion of growth hormone, which as a result decreases the rate of cell division of long bones.

Explanation:

The correct alternative is growth hormone (GH) and long bones.Pituitary dwarfism, also known as growth hormone deficiency, is a condition characterized by inadequate secretion of growth hormone from the pituitary gland.Growth hormone plays a crucial role in stimulating the growth and development of various tissues and organs in the body.Some key points regarding pituitary dwarfism and its impact on cell division include:Decreased secretion of growth hormone leads to a reduced rate of cell division in the long bones of the body.Long bones, such as the bones in the arms and legs, are responsible for longitudinal growth during childhood and adolescence.The decreased rate of cell division in long bones ultimately results in impaired growth and shorter stature, which are characteristic features of pituitary dwarfism.It's important to note that pituitary dwarfism can have other effects on growth and development beyond the long bones, as growth hormone also influences the growth of other tissues and organs in the body.

In summary:

Pituitary dwarfism is caused by a decreased secretion of growth hormone.The decreased secretion of growth hormone specifically affects the rate of cell division in long bones.This leads to impaired growth and shorter stature in individuals with pituitary dwarfism.

For more information about growth hormone, visit:

https://brainly.com/question/21125806

#SPJ11

While working on an investigation, a colleague hands you a list of file creation and access times taken from a compromised workstation. To match the times with file access and creation times from other systems, what do you need to account for

Answers

Answer:

Record time offsets.

Explanation:

In this scenario, to match the times with file access and creation times from other systems, you will need to account for time offsets.

The time offset refers to the time stamp associated with different processes or tasks on a computer in nanoseconds through the operating system.

Since you've been handed a list of file creation and access times taken from a compromised workstation by your colleague, you'll need to match respectively the time the file was created to the time it was accessed by an unauthorized user.

Additionally, the time stamp varies depending on the operating system being used;

- For windows operating system, it uses a 64 bit time stamp.

- For Linux or Unix, it uses a 32 bit time stamp.

Helppppppppppppppppppppppppppppppppp

Helppppppppppppppppppppppppppppppppp

Answers

Answer:

answer below

Explanation:

hope this helps

Helppppppppppppppppppppppppppppppppp

Answer:

word processor........type a business letter

fax machine.........send a copy of documents to another office

3 Select all the correct answers. Ana is creating a list of SMART goals. Which aspects should she pay attention to? The goal's success rate is at least 50%. The goal should be relevant to her career plan. The goal's success rate is more than 50%. The goal should be attainable within a given time frame. The goal to be attained should not be time bound. Jhy Reset Next​

Answers

Ana is creating a list of SMART goals the aspects should she pay attention to are The goal should be relevant to her career plan.,The goal's success rate is more than 50% and. The goal should be attainable within a given time frame.

What are the examples?

The intention of turning into an excessive college math trainer is well-defined. Measurable: Success may be measured via way of means of the range of applications, interviews and activity offers. Achievable: The intention-setter may have the precise diploma for the activity.

The SMART in SMART goals stands for Specific, Measurable, Achievable, Relevant, and Time-Bound. Defining those parameters as they pertain to your intention allows for making sure that your goals are manageable within a sure time frame.

Read more about the SMART goals.:

https://brainly.com/question/8986181

#SPJ1

PLEASE HELP Due Today!
Write a paragraph explaining your opinion about the development of artificial intelligence. Minimum of five sentences.​

Answers

I guess I could just give you my opinion?

Urm, well here!

In my opinion, I think artificial intelligence is helping and destroying our country. I think in a way artificial intelligence helps schools and many others who may have learning disabilities. Having an artificial intelligence can help you answer, when you’re scared. Although, the bad part about artificial intelligence is it taking over. We are humans and we should be the ones learning to become better.

Hope that’s okay luv!

Steps 5 and 6 of the security risk assessment process are to determine the possible ways to accomplish a key task and how feasible each option would be to implement. What is that task? a. cost-benefit analysis b.asset replacement c. threat mitigation d. event identification

Answers

According to the question, the task is cost-benefit analysis is that task.

What is cost-benefit analysis?

Cost-benefit analysis is an economic tool used to evaluate the costs and benefits of a project or investment. It's a systematic approach to determine whether the benefits of a project or investment outweigh the costs. This assessment is done by assigning a monetary value to each benefit and cost and then comparing the total benefits to the total costs. Cost-benefit analysis is used to inform decision making in both the private and public sectors. It can help identify the most cost-effective solution, inform policy decisions, and ensure that resources are used efficiently.

To learn more about cost-benefit analysis

https://brainly.com/question/29316840

#SPJ1

TRUE / FALSE.
views can include website data from before the view was created

Answers

Views can include website data from before the view was created  is a FALSE statement.

What is views?

When you create a view in a database, it will not show any data that was gathered before the view was made. Views are ways to see information that has been organized and created from the tables or other views in a database. When you make a view, it shows you the information that's currently in the tables it's based on.

Views are like questions that don't have answers until you ask them. They don't store any information by themselves, but instead, they search for answers when you open them.

Learn more about  website  from

https://brainly.com/question/28431103

#SPJ4

vmm can be installed in a different forest than the vmm management server, however, this requires a two way trust between the cross forest domains.

a. True
b. False

Answers

Option a is correct. It is true that VMM can be installed in a different forest than the VMM management server, however, this requires a two way trust between the cross forest domains.

Setup will end with a warning if the VMM user installing VMM or performing VMM setup does not have permissions to write the service principal name (SPN) for the VMM server in Active Directory. Other machines running the VMM console won't be able to connect to the management server without the SPN registered, and you won't be able to deploy a Hyper-V host on a bare metal machine within the VMM fabric.

The VMM management server cannot be run on a nano server (applicable to releases prior to 2019).

The name of the management server machine is limited to 15 characters.

On servers running Hyper-V, avoid installing the VMM management server or any other System Center components besides agents.

The VMM management server can be set up on a virtual machine. If you do and use Hyper-Dynamic V's Memory functionality, you must specify the virtual machine's startup RAM to be at least 2,048 megabytes (MB).

To know more about VMM click on the link:

https://brainly.com/question/28271597

#SPJ4

Which of the following statements about meta tags is TRUE?
A.Meta tags are a way of filtering items online so that you only see the items that connect to your interests.
B.Meta tags are large amounts of data that websites collect from their users. C.Meta tags are snippets of text that describe the content of a page or object. D.All of the above are true​

Answers

Answer:

I guess c no. is the answer

Which is an example of pattern recognition in computational problem solving?
a. Comparing two adjacent numbers in the list and placing the larger of the two numbers later in the list will eventually put the largest number at the end of the list.
b. Dividing the list of numbers into two smaller lists of similar size results in two simpler problems.
c. If one number from the list is chosen, all of the other numbers can be classified as being larger or smaller than that number.
d. A list of numbers can be sorted by comparing numbers two at a time.

Answers

An example of pattern recognition in computational problem solving is option c.

If one number from the list is chosen, all of the other numbers can be classified as being larger or smaller than that number.

This is because pattern recognition involves identifying the relationships between elements and using that information to solve a problem.

In this case, the relationship between the chosen number and the other numbers in the list is used to classify them as either larger or smaller, which can aid in solving the problem.

Learn more about computational in:

https://brainly.com/question/28394119

#SPJ11

Other Questions
How much work will be done by electric energy source with a P.d of 4KV that delivers a current of 1 A for 1 minute? How did the natural barriers help the Indus Valley Civiiaztion? themes of transcendentalism When the head is tilted, what are the structures the signal passes through on its way to becoming a fully processed neural signal within the brain?When the head is tilted, the fluid within the_____of the inner ear moves. The exact location of stimulated cells depends on the plane of movement-with each plane being represented by a different part of that structure. The movement of fluid stimulates______which transduce the signal into an electrical signal. This signal travels through the_____nerve to the____nucleus of the_____. Sweet Acacia industries had sales in 2021 of $5,600,000 and gross profit of $1.109.000. Management is considering two alternative budget plans to increase its gross profit in 2022. Plan A would increase the selling price per unit from $8.00 to $8.40. Sales volume would decrease by 10% from its 2021 level. Plana would decrease the selling price per unit by $0.50. The marketing department expects that the sales volume would increase by 100,000 units. At the end of 2021, Sweet Acacia has 39,000 units of inventory on hand. If Plan A is accepted, the 2022 ending inventory should be equal to 5% of the 2022 sales. If Plan B is accepted the ending inventory should be equal to 58,000 units. Each unit produced will cost $1.90 in direct labour, $1.20 in direct materials, and $1.20 in variable overhead. The fixed overhead for 2022 should be $1,898,000. Prepare a sales budget for 2022 under each plan. (Round the selling price per unit to 2 decimal places, s. 15.25.) SWEET ACACIA INDUSTRIES Sales Budget For the Year Ending December 31, 2022 Plan A Plan B Expected sales in units 5 Unit selling price $ $ Total sales Prepare a production budget for 2022 under each plan SWEET ACACIA INDUSTRIES Production Budget For the Year Ending December 31, 2022 Plan A Plan B --/4 Question Part Score - / 13 Calculate the production cost per unit under each plan. (Round answers to 2 decimal places, es 15.25) TH Plan A Plan B Production cost per unit Question Part Score Calculate the gross profit under each plan (Round per unit calculations to 2 decimal places, es 15.25 and final answers to decimal places, eg, 1250 SWEET ACACIA INDUSTRIES Budgeted Gross Profit For the Year Ending December 31, 2022 Plan A Plan Expected sales Budgeted cost of goods sold Gross pront $ Julian quiere comprar una moto y el vendedor le ofrece la siguiente opcin de pago, pagar una cuota inicial del 50|100 del valor de la moto y el resto pagarlo a credito.Julian le dice al vendedor que solo puede pagar la mitad del valor de la moto y el resto en cinco cuotas igualesJulian puede pagar la cuota inicial? under the bush steel tariff, foreign firms selling steel in the u.s. had to pay $_____ per ton to the government for the privilege of importing. What happens to inflation and unemployment in the long-run phillips curve if the fed increases the growth rate of the money supply? QuestionI have a large pot containing 6 liters of soup broth. If I divide the soup broth into 33/3 liters forvegetable soup and 15/8 liters for beef soup, find the leftover liters of soup broth. What is f(0)?12 only2 and 3 only2, 1, 1, and 2 only2, 1, 1, 2 and 12 What are the two methods of contamination removal? Need help ASAP please!!! The formula determines the magnitude of an earthquake, where I is the intensity of the earthquake and S is the intensity of a standard earthquake. How many times stronger is an earthquake with a magnitude of 8 than an earthquake with a magnitude of 6? Show your work. Which sentence is properly punctuated to avoid a run-on sentence?Group of answer choicesI dozed off and fell ten feet to the ground, I landed on my back.If you fail, the problem lies with you; dont blame the test paper.It is not enough to simply plan you must also act.Space X wasnt happy with single-launch rockets because they made space launches unduly expensive, as a result, they innovated and now use reusable rockets. Example 1(a) Consider the pulse rates of two patients in a hospital for ten different days:Patient A: 17 16 70 69 7075 78 70 7169Patient B: 59926080 7165508895 70Find the mean pulse rate for each patient and the corresponding range. GThe school in Kenya described in the online article was very different from a typical school in the United States, but therewere some similarities. All of the following were described in the article exceptA most students live away from their families, either in a dorm or in their own apartmentB. the students go to school in a big cityC. the students help to cook meals in the cafeteriaD. the students' favorite activities include soccer and basketballPlease select the best answer from the choices providedBDSave and Exit At the burger palace, 2 hamburgers and 1 small order of fires cost 6. 9 . The Bureau of Economic Analysis releases last quarter's growth rate in real GDP. This release would most likely have been written by what kind of an economist Is anyone good at geometry if so can someone help me please ?NO LINKS PLEASE 6. As a general, Julius Caesar conquered most of what region? ItalySpainGaulAfrica Let us assume that you are a manager of a small and well-established team in a software house specialised in developing applications (apps) for internet-of-things (IoT) devices. As a software manager, it is your role to cost software projects for clients. For that, you need to calculate how long the project will take and how many people should be required. Based on your past experience, and after analysing the requirements specifications of a new software project, which is an app for interacting with a smart toaster, you estimate that the code to be developed should be around one hundred thousand lines of code. You are asked to calculate how long the project should take in months, how many people should be involved in developing the project, and how many person-months should be budgeted for this new software project.