A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______

Answers

Answer 1

Answer:

Spear-phishing is a type of phishing attack that targets specific individuals or organizations to obtain personal information or data typically through malicious software i.e (emails) .

Answer 2

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called "malware phishing."


Malware phishing is a common technique used by cybercriminals to trick users into unknowingly installing malicious software on their computers. This software can take various forms, such as viruses, Trojans, or spyware, and is designed to steal sensitive information, such as passwords, credit card numbers, or personal identification details.

The malware is often disguised as legitimate software or is hidden within email attachments or links. Once it is installed on the victim's computer, it can begin to collect and transmit data back to the attacker, who can then use it for fraudulent purposes.

Preventing malware phishing requires users to be vigilant when downloading software or clicking on links. They should only download software from trusted sources and should avoid clicking on links from unknown senders. Users should also keep their anti-virus software up-to-date and regularly scan their computers for malware. In general, it's better to err on the side of caution when it comes to suspicious emails or attachments and to delete them immediately rather than risk becoming a victim of malware phishing.

To know more about phishing  visit:-

https://brainly.com/question/32392060

#SPJ11


Related Questions

Use the drop-down tool to select the word or phrase that completes each sentence. Text within a document that is linked to other information available to the reader is called _______. A unique location for a computer on the network is its _______. The ________ is the ability of a network tor cover after any type of failure. The computer that responds to requests from the client computer is known as the ________. A ________ is an ordered list of tasks waiting to be performed.

Answers

Answer:

1. Hyperlink

2. IP address

3. Fault tolerance

4. Server

5. To do list

Explanation:

Text within a document that is linked to other information available to the reader is called HYPERLINK.

A unique location for a computer on the network is its IP ADDRESS.

The FAULT TOLERANCE is the ability of a network to cover after any type of failure.

The computer that responds to requests from the client computer is known as the SERVER.

A TO-DO LIST is an ordered list of tasks waiting to be performed.

Answer:

hypertext

IP address

fault tolerance

server

queue

Explanation:

just did it on edg

What does the Find Duplicates Query Wizard help identify?

records that contain the same data as other records
records that contain errors in their data or formatting
records that are used in relationships with other tables
records that are matched up with too many other tables

Answers

The Find Duplicates Query Wizard helps identify records that contain the same data as other records in a database. This tool can be used to search for duplicate entries in one or more tables, and can be useful for identifying data inconsistencies and errors. Therefore, the correct answer is:

records that contain the same data as other records.

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

Which of the following is constantly changing and advancing?

Innovation

Cell phones

Technology

Computers

Answers

Answer:

Technology

Explanation:

This is because Cell phones ,Innovation ,and Computers ARE changing although they are in the same group of "Technology" so it would be technology.

Any questions?

how can we show that heat is liberated during respiration​

Answers

Answer:

To show that heat is liberated during respiration. Make a hole in the cork and insert a thermometer into cork and see the bulb of the thermometer is in the midst of the seeds. Record the temperature in both the flasks at every two or three hour intervals for about 24 hours.

Explanation:

Hope this helps:)

This is an example of what type of formula?

=(D1+D17)

Question 2 options:

ADDITION


SUBTRACTION


RANGE


AVERAGE

Answers

Answer:

Average

Explanation:

The term 'average' refers to the 'middle' or 'central' point. When used in mathematics, the term refers to a number that is a typical representation of a group of numbers (or data set). Averages can be calculated in different ways - this page covers the mean, median and mode.

Does anybody know the hack on how to be the among us Impostor every time? Please help!!!!

Answers

Answer:

nope.....

Explanation:

bdjsbsijsebdjxh

what 1950s technology was crucial to the rapid and broad success of rock and roll

Answers

The technology that was crucial to the rapid and broad success of rock and roll in the 1950s was the invention and mass production of the Electric Guitar.

The electric guitar allowed musicians to produce a louder, distorted sound, which became a defining characteristic of the rock and roll genre.
Additionally, the electric guitar made it easier for musicians to play solos and create more complex melodies and harmonies.
The use of amplifiers and microphones also played a significant role in the success of rock and roll. These technologies allowed performers to play for larger crowds and reach a wider audience through radio and television broadcasts.
Thus, the widespread availability and use of electric guitars, amplifiers, and microphones were crucial to the rapid and broad success of rock and roll in the 1950s.

Know more about Electric Guitar here,

https://brainly.com/question/30741599

#SPJ11

Standard form
Expanded for
Unit Form
95.7
9.10 - 541-701
9.057
9x150.0172 0.001
0.957
9401 - 50.0172 0.001
9 tenths 5 hundredths 7 thousandths
9 tens 5 ones 7 tenths
9 ones 5 hundredths 7 thousandths
9 ones 5 tenths 7 thousandths

Answers

I need help on this too

The lifetime of a new 6S hard-drive follows a Uniform
distribution over the range of [1.5, 3.0 years]. A 6S hard-drive
has been used for 2 years and is still working. What is the
probability that it i

Answers

The given hard-drive has been used for 2 years and is still working. We are to find the probability that it is still working after 2 years. Let A denote the event that the hard-drive lasts beyond 2 years. Then we can write the probability of A as follows:P(A) = P(the lifetime of the hard-drive exceeds 2 years).By definition of Uniform distribution, the probability density function of the lifetime of the hard-drive is given by:

f(x) = 1/(b - a) if a ≤ x ≤ b; 0 otherwise.where a = 1.5 years and b = 3.0 years are the minimum and maximum possible lifetimes of the hard-drive, respectively. Since the probability density function is uniform, the probability of the hard-lifetime of a new 6S hard-drive follows a Uniform distribution over the range of [1.5, 3.0 years]. We are to find the probability that a 6S hard-drive, which has been used for 2 years and is still working, will continue to work beyond 2 years.Let X denote the lifetime of the hard-drive in years.

Then X follows the Uniform distribution with a = 1.5 and b = 3.0. Thus, the probability density function of X is given by:f(x) = 1/(b - a) if a ≤ x ≤ b; 0 otherwise.Substituting the given values, we get:f(x) = 1/(3.0 - 1.5) = 1/1.5 if 1.5 ≤ x ≤ 3.0; 0 the integral is taken over the interval [2, 3] (since we want to find the probability that the hard-drive lasts beyond 2 years). Hence,P(A) = ∫f(x) dx = ∫1/1.5 dx = x/1.5 between the limits x = 2 and x = 3= [3/1.5] - [2/1.5] = 2/3Thus, the probability that a 6S hard-drive, which has been used for 2 years and is still working, will continue to work beyond 2 years is 2/3.

To know more about Uniform distribution visit:

brainly.com/question/13941002

#SPJ11

What do safeguarding devices do to
protect the worker?

Answers

Safeguarding devices are designed to protect workers from potential hazards and prevent accidents in the workplace. These devices can be physical barriers or electronic systems that are installed on machines or equipment to reduce the risk of injury to workers.

Examples of safeguarding devices include:

Guards: physical barriers that are installed around machinery or equipment to prevent workers from coming into contact with moving parts or hazardous materials.
Interlocks: electronic systems that prevent machines from operating unless all safety requirements are met, such as closing a guard or door.
Presence-sensing devices: electronic systems that detect the presence of workers in hazardous areas and can automatically stop the machine or equipment.
Safety light curtains: electronic devices that use beams of light to detect the presence of workers and can automatically shut down the machine or equipment if the beams are broken.
By using these safeguarding devices, workers can perform their job duties with reduced risk of injury or harm, leading to a safer and more productive workplace

given: a company has 2 locations: orlando and miami the company has 2000 hosts in orlando and 1000 in miami icann assigns 192.100.0.0 as the starting ip address to orlando give your answer in the cidr standard form such as 123.45.67.89/12 - make sure there are no leading zeroes in any of the four octets used in ipv4 format. what is the cidr subnet starting address for orlando?

Answers

The CIDR subnet starting address for Orlando, given the starting IP address of 192.100.0.0 assigned by ICANN, can be determined by considering the number of hosts required in each location.

Orlando has 2000 hosts, and to accommodate this number, we need a subnet that can provide at least 2,000 addresses. A /23 subnet can provide 2^(32-23) = 2^9 = 512 addresses, which is not enough. A /22 subnet can provide 2^(32-22) = 2^10 = 1,024 addresses, which is still not enough. A /21 subnet, however, can provide 2^(32-21) = 2^11 = 2,048 addresses, which is sufficient to accommodate 2,000 hosts. Therefore, the CIDR subnet starting address for Orlando, using the assigned starting IP address of 192.100.0.0, would be 192.100.0.0/21.

The subnet mask is represented by a "slash" in CIDR subnet. This notation shows how many bits in the mask's binary representation are set to 1. For instance, a subnet mask of 255.255.255.0 can be written as "/24" in CIDR notation since the binary representation has 24 bits set to 1. By streamlining the notation of the subnet mask, CIDR notation makes it simpler to express and interact with IP addresses and subnet masks, especially in large networks. in network administration, CIDR notation is frequently used, notably when setting routers, subnets, and routing tables. Given its widespread use in networking and Internet-related technologies, it is a crucial tool for network professionals to comprehend.

Learn more about CIDR subnet here

https://brainly.com/question/31846584

#SPJ11

Fill in the Blank
A band is recording a new song. The sound wave is analog data.
To convert it to digital data, a _____ rate of 44.1 kHz is used.

Answers

To convert it to digital data, a bit rate of 44.1 kHz is used. Hope this helps :)

Write a program that continually reads user input (numbers)
until a multiple of 7 is provided. This functionality must be
written in a separate function, not in main().

Answers

Here is a Python program that continually reads user input (numbers) until a multiple of 7 is provided. This functionality is written in a separate function, not in main(). The program uses a while loop to keep reading input until the user enters a multiple of 7:```def read_until_multiple_of_7():

x = int(input("Enter a number: "))  

while x % 7 != 0:    

x = int(input("Enter another number: "))  print("Multiple of 7 detected: ", x)```Here's how the code works:1. The function `read_until_multiple_of_7()` is defined.2. The variable `x` is initialized to the integer value entered by the user.3. A while loop is used to keep reading input until the user enters a multiple of 7.

The loop condition is `x % 7 != 0`, which means "while x is not a multiple of 7".4. Inside the loop, the user is prompted to enter another number. The input is read as an integer and stored in the variable `x`.5. When the user finally enters a multiple of 7, the loop exits and the function prints a message indicating that a multiple of 7 was detected, along with the value of `x`.Note: Make sure to call the `read_until_multiple_of_7()` function from your `main()` function or from the interactive interpreter to test it out.

To know more about Python visit:

https://brainly.com/question/30391554

#SPJ11

Help me guys..
thankyou​

Help me guys..thankyou

Answers

Answer:

spoon

excess

level

1/2 cup

whatever dry ingredient u have

Explanation:

When using the CLI, what keyboard shortcuts can be used to auto complete a command and scroll backwards and forwards through previous commands used? (choose two)
A. Up/Down Arrow
B. shift
C. tab
D. Left/Right Arrow

Answers

When using the CLI (Command Line Interface), two keyboard shortcuts that can be used are:The Up/Down Arrow keys and the Tab key are used for scrolling through command history and auto-completing commands, respectively.

What are two keyboard shortcuts commonly used in the CLI for auto-completion and scrolling through command history?

When using the CLI (Command Line Interface), two keyboard shortcuts that can be used are:

A. Up/Down Arrow: The Up Arrow key allows you to scroll backward through previously used commands, while the Down Arrow key scrolls forward through the command history.

C. Tab: Pressing the Tab key can be used to auto-complete a command or suggest possible command options based on the entered characters. It helps in quickly typing commands and reduces the chances of errors.

The Up/Down Arrow keys allow you to navigate through the command history, making it easier to access previously executed commands. The Tab key is useful for auto-completing commands, filenames, or directories by suggesting options based on the entered characters.

These keyboard shortcuts enhance productivity and efficiency when working with the CLI.

Learn more about keyboard shortcuts

brainly.com/question/30630407

#SPJ11

Choose the correct option. i) An object thrown from a moving bus is on example of
(A) Uniform circular motion
(B) Rectilinear motion
(C) Projectile motion
(D) Motion in one dimension​
age

Answers

PROJECTILE MOTION

The answer is option C: "Projectile motion."

Projectile motion refers to the motion of an object that is thrown or launched into the air and follows a parabolic path under the influence of gravity. An object thrown from a moving bus is an example of projectile motion because it is launched into the air and follows a curved path due to the force of gravity.

Option A: "Uniform circular motion" refers to the motion of an object moving in a circular path at a constant speed.

Option B: "Rectilinear motion" refers to the motion of an object moving in a straight line.

Option D: "Motion in one dimension" refers to motion that occurs along a single straight line, rather than in two or three dimensions.

Hope This Helps You!

Suppose a program is operating with execution-time binding and the physical address generated is 300. the relocation register is set to 100. what is the corresponding logical address? 200 201 199 300

Answers

Suppose a program is working with execution-time binding and the physical address generated is 300. the relocation record is set to 100 The corresponding logical address is 200 .

What is logical and physical speech?

The logical address does not live physically in the memory whereas physical address is a place in the memory that can be accessed physically. Identical logical addresses are developed by Compile-time and Load time address binding procedures whereas they differs from each other in run-time address binding method

Where is logical address held?

Process's logical address are mapped through this page table to the Physical memory (RAM). Whatever that analytic address is, it gets mapped to Physical address. If the Physical memory gets full, then OS expels some of the less used or new process to Secondary storage and puts the required process in the RAM.

To learn more about  logical addresses, refer

https://brainly.com/question/3937985

#SPJ4

describe a recursive algorithm for finding the maximum element in an array a of n elements. what is your running time and space usage?

Answers

A recursive approach to finding the maximum element in the array is given below:

Approach:  Get the array for which the maximum is to be foundRecursively find the maximum according to the following: Recursively traverse the array from the end

Base case: If the remaining array is of length 1, return the only present element i.e.

arr[0]

if(n == 1)

  return arr[0];

The Program Implementation

// Recursive C++ program to find maximum

#include <iostream>

using namespace std;

// function to return maximum element using recursion

int findMaxRec(int A[], int n)

{

  // if n = 0 means whole array has been traversed

   if (n == 1)

       return A[0];

   return max(A[n-1], findMaxRec(A, n-1));

}

// driver code to test above function

int main()

{

   int A[] = {1, 4, 45, 6, -50, 10, 2};

   int n = sizeof(A)/sizeof(A[0]);

   cout <<  findMaxRec(A, n);

   return 0;

}

Read more about recursive algorithms here:

https://brainly.com/question/489759

#SPJ1

_____ transparency allows a physically dispersed database to be managed as though it were centralized.
a. Distribution
b. Transaction
c. Performance
d. Failure

Answers

Distribution (Option A) transparency allows a physically dispersed database to be managed as though it were centralized.

Distribution transparency refers to the ability to manage a physically dispersed or distributed database system as though it were a centralized system. It allows users and applications to interact with the database without having to be aware of its distributed nature. The distribution transparency hides the complexity of data distribution, replication, and synchronization, providing a unified view of the database to the users. This means that users can interact with the database without needing to know the physical locations of the data, providing a seamless experience.

for further information on the database visit:

https://brainly.com/question/29412324

#SPJ11

Which visual novels do you recommend and why?

Answers

Answer:

I rec recommend Fate/Stay Night. It's honestly so good!

Explanation:

what is DBMS?
create a table emp nd insert values

Answers

Answer:

A database is a collection of related data which represents some aspect of the real world. A database system is designed to be built and populated with data for a certain task.

Explanation:

Basic Syntax for CREATE

CREATE TABLE table_name

(

column1 datatype(size),

column2 datatype(size),

column3 datatype(size),

.....

columnN datatype(size),

PRIMARY KEY( one or more columns )

);

Example

create table emp(

empno number(4,0),

ename varchar2(10),

job varchar2(9),

mgr number(4,0),

hiredate date,

sal number(7,2),

deptno number(2,0)

PRIMARY KEY (ID)

);

Field Type Null Key Default Extra

EMPNO number(4,0) N0 PRI  

ENAME varchar2(10) YES – NULL

JOB  varchar2(9) NO – NULL

MGR number(4,0) NO – NULL

HIRE DATE date NO – NULL

SAL      number(7,2) NO – NULL

DEPTNO    number(2,0) NO – NULL

\( \huge \boxed{ \textbf{ {Answer : }}}\)

A database management system (DBMS) is system software for creating and managing databases. A DBMS makes it possible for end users to create, protect, read, update and delete data in a database.

━━━━━━━━━━━━━━━━━━━━━━━━

Example:-

Emp table :-

[ Create table ]

mysql-›create table emp ( id int ( 10 ) , name char ( 10 ) , sal int ( 10 ));

\( \: \)

Output:-

\(\begin{array}{ | c| c | c| } \hline\ \ \text{ \tt\purple{id} }& \text{ \tt \purple{name}} \text{ }& \text{ \tt \purple{sal} } \\ \hline \tt{}& \tt{}& \tt{} \\ \hline \tt{}& \tt{}& \tt{} \\ \hline \tt{}& \tt{}& \tt{} \\ \hline\end{array}\)

\( \: \)

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

[ Insert value ]

mysql-›insert into table emp ( id, name , sal ) values ( 101 , abc , 2500 ));mysql-›insert into table emp ( id, name , sal ) values ( 102 , xyz , 3500 ));mysql-›insert into table emp ( id, name , sal ) values ( 103 , pqr , 5000 ));

\( \: \)

Output:-

\(\begin{array}{ | c| c | c| } \hline\ \ \text{ \tt\purple{id} }& \text{ \tt \purple{name}} \text{ }& \text{ \tt \purple{sal} } \\ \hline \tt{101}& \tt{abc}& \tt{2500} \\ \hline \tt{102}& \tt{xyz}& \tt{3500} \\ \hline \tt{103}& \tt{pqr}& \tt{5000} \\ \hline\end{array}\)

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

hope it helps ⸙

What is the keyboard shortcut for the Undo command?
Choose the answer.
CTRL+X
CTRL+Z
CTRL+U
CTRL+V​

Answers

Answer:

CTRL+Z is Undo

Explanation:

CTRL+X: Cut

CTRL+Z: Undo

CTRL+U: Underline

CTRL+V: Paste

(1) describe how you generally use your cellphone on a daily basis (including with whom do you communicate for what purpose with what frequency); (2) read the Supplementary Reading (click here: Does the Internet Make You More or Less Connected?), and discuss how YOUR cellphone use make YOU more or less connected.

Answers

Brainly wasn't letting me answer, so here's an attachment of the answer

Help with this please guys<3
here are the things for the answer
Exaggeration
Timing

Help with this please guys&lt;3here are the things for the answer ExaggerationTiming

Answers

Answer: the answer is exaggeration

Which of the following Boolean operators allows you to look for words that are within 10 words of each other?

Answers

The Boolean operators that allows you to look for words that are within 10 words of each other is NEAR. The correct option is 4.

What is Boolean operator?

Boolean operators are straightforward words (AND, OR, NOT, or AND NOT) that are used as conjunctions in searches to combine or exclude keywords, producing more specialized and useful results.

To determine whether relational assertions are true or untrue, C++ utilizes Boolean values.

Boolean values can only yield a 1 if the comparison is successful or a 0 if it is unsuccessful.

Thus, NEAR is a Boolean operator that enables you to search for words that are up to ten words apart from one another.

Thus, the correct option is 4.

For more details regarding boolean operator, visit:

https://brainly.com/question/29590562

#SPJ9

Your question seems incomplete, the probable complete question is:

Which of the following Boolean operators allows you to look for words that are within 10 words of each other?

NOTORANDNEAR

What is HTML? (list down any 5 points)

Answers

Answer:

The HyperText Markup Language, or HTML is the standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets and scripting languages such as JavaScript.HyperText Markup Language (HTML) is the set of markup symbols or codes inserted into a file intended for display on the Internet. The markup tells web browsers how to display a web page's words and images.

Explanation:

If this doesn't answer your question tell me and i'll fix it.

WHAT ARE THE MOST USED AND POPULAR PROCESSOR

Answers

Answer:

i3 processor, i5 processor, AMD Athlon 64

Complete each statement by choosing the correct answer from the drop-down menu.

The data type can hold whole positive and negative numbers.
The terms TRUE and FALSE are usually associated with data types.
Values such as 9.0, –1245.1, and 0.777 are examples of data types.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct matching answers for this question are given below. In this question, it is asked to identify the data type of the given scenario.

Integer short and integer long data type:

These data types can hold whole positive and negative numbers. however, you can also store positive and negative values in float and double data type also.

Boolean data type:

Boolean data type usually stores true or false values such as yer or no, true or false etc. It stores binary values i.e 1 or 0.

Float and Double data type: float and double data type can store positive and negative numbers with decimals. But, the float data type can store 4 bytes of data and sufficient for storing 7 decimal digits. while double data type has a size of 8 bytes of data and sufficient for storing 15 decimal digits.

However, for the given scenario in the question,  the float data type can accomodate these values easily.

Answer: Integer, Boolean, Floating-Point!

Explanation:

I did it edge 2020

Are technological advances in the computer industry good for people in that industry? HUGE HINT: All questions are relevant, and grading will be based on the pros AND cons listed.

Answers

Technological advances in the computer industry offer numerous benefits, including increased efficiency, expanded job opportunities, and streamlined processes. However, they also present challenges such as skill obsolescence, job displacement, and heightened competition.

Technological advances in the computer industry have both positive and negative implications for people working in that industry. Let's explore the pros and cons:

Pros:Increased efficiency and productivity: Technological advancements lead to improved hardware and software, enabling computer professionals to work more efficiently and accomplish tasks faster. This can result in higher productivity and output.Expanded job opportunities: New technologies often create new job roles and specializations. As the computer industry evolves, professionals with skills in emerging technologies have opportunities for career growth and advancement.Automation and streamlining: Technological advancements, such as automation tools and artificial intelligence, can automate repetitive tasks, reducing manual effort and allowing professionals to focus on more complex and strategic work.Cons:Skill obsolescence: Rapid technological advancements may render certain skills obsolete. Professionals must continually update their knowledge and acquire new skills to remain relevant and competitive in the industry.Job displacement: Automation and advancements in artificial intelligence can potentially replace certain job roles. While new opportunities may arise, some individuals may face challenges in adapting to the changing job market.Increased competition: Technological advancements attract more individuals to the computer industry, leading to increased competition for jobs. Professionals need to continually enhance their skills and expertise to stay ahead in a competitive environment.

To know more about Technological advances

brainly.com/question/4717909

#SPJ11

Other Questions
The elastic range of a steel tension test is plotted with point values as follows: a stress of 20,000 psi has 0.051% strain and stress of 50,000psi has 0.151% strain. Calculate the modulus of elasticity in ksi. (a) 27,000ksi (b) 36,000ksi (c) 29.000ksi (d) 30,000ksi Which structure is unique to vertebrates?limbsbrainskinbackbone Which statement accurately explains the Compromise of 1877?It was a compromise between Republicans and moderate Democrats to end a disputed election.It was a compromise between Republicans and the president to establish the Freedmens Bureau.It was a compromise between Republicans and moderate Democrats to establish the Freedmens Bureau.It was a compromise between Republicans and the president to end a disputed election. If the DNA code is CCG-ATT. What does the mRNA will code for? * Prompt: What did you like about snow days? pls help5 pts - topic sentence5 pts - physical activity5 pts - 5 complete sentences5 pts - conclusion sentence5 pts - spellingMy response: Which of the following forms of governments has elected representatives that make decisions on behalf of the people? A. monarchy B. authoritarian regime C. direct democracy D. representative democracy every nine days it eats 4 cupcakes and id like enough for 27 days I needddd helpppppppppppooopp urgentttttt will mark brainliest tell me about a time when you were communicating with someone, and they did not understand you. what did you do? Who ended all persecution for Christians?____ How can they gather more evidence whether lava or water formed a channel on mars. Help how do I do this is the sentence a Value/Thematic Statement or Explanation Which one is the answe "Since Sean was short for his age, Mike and Malik just assumed that Sean could not play basketball." what is the 40th term of the arithmetic sequence 13, 26, 39, 52 The appearance or quality of light reflected from the surface of a mineral is known as ________. I AM CONFUISED I ONLY GOT 1 MIN TIL MY COMPUTER DIES!!!!(This only has 1 answer)You owe some friends $25 and pay them back $18. Which number sentence shows this situation?25 + 18-25 + 18-25 + (-18) doctor es un nombre comn o propio Ashley has 100 books that she wants to give away at the rate of n books per week. Write a recursive function that represents the number of books Ashley has at any time. The recursive function that gives the number of books Ashley has at any time is ____=______, started at ____. What were the Sen kingdom? Where were they located? PLEASE HELP ILL GIVE BRAINIEST