Describe the Audit Activity/ Process that ISO 27000-series goes through.

Answers

Answer 1

The audit process ISO 27000-series goes through involves a series of steps that are designed to ensure compliance with the requirements of the standard. This includes a review of the organization's policies, procedures, and controls to ensure that they are aligned with the ISO 27000-series standards.

ISO 27000-series is a family of international standards that provides a framework for information security management. To achieve certification under these standards, an organization must go through an audit process to demonstrate that it has implemented and maintains effective information security management systems (ISMS).

The audit activity starts with a pre-assessment phase, in which auditor and the organization agree on the scope and objectives of the audit. The auditor then conducts an initial review of the organization's documentation to gain an understanding of its ISMS.

Next, the auditor performs an on-site audit, which includes interviews with personnel, observation of processes, and examination of documentation and records.

Based on the findings of the audit, the auditor prepares a report that outlines the organization's compliance with the standard and any areas where improvement is needed.

Finally, the organization must implement the recommended improvements and undergo a follow-up audit to demonstrate that the issues identified during the initial audit have been addressed. If the auditor is satisfied, they will issue a certificate of compliance.

In summary, the audit process for ISO 27000-series standards is a rigorous and thorough process that ensures organizations have implemented effective information security management systems.

The audit process helps to identify areas for improvement and provides a roadmap for organizations to enhance their security posture.

For more question on "Audit Process" :

https://brainly.com/question/14541181

#SPJ11


Related Questions

power supply, keyboard, monitor, mouse,ROM,CPU are belongs to Output, Input or Storage device​

Answers

Answer:

Keyboard :Input

Monitor: Output

Mouse:Input

ROM:Storage

CPU: Processing device

pls, help it's urgent... 44 points plsssssssssssssssss

Write an algorithm and Flowchart for reversing a Number eg. N=9486.

Answers

The steps to reverse a number is given below:

The Algorithm

Step 1 Start

step 2 Read a number n

Step 3 a=n/1000

step 4 calculate b=(n%1000)/100

step 5 calculate c= (n%100)/10

step 6 calculate d = n%10

step 7 calculate reverse = a+(b*10)+(c*100)+(d*1000)

step 8 display reverse

step 9 stop

Read more about algorithms here:

https://brainly.com/question/24953880

#SPJ1

HELP ME PLZZZ
What are the special concerns about cyberbullying?

Answers

Answer:

a. Low self-esteem

b. Weight loss or change appearance

the first generation of computers used microprocessors.T/F

Answers

FalseEvolution of computing: from vacuum tubes to microprocessors

The first generation of computers, which began in the 1940s and 1950s, did not use microprocessors. They were large, room-sized machines that used vacuum tubes as the main components for processing. We primarily used them for scientific and military calculations.

Microprocessors, small integrated circuits containing the central processing unit (CPU) of a computer, were developed in the 1970s. The use of microprocessors in computers marked the beginning of the second generation of computers and led to the development of smaller, more affordable, and more powerful computers.

Select the correct answer.

What is the drawback of the linear model?

A. communication is only in one direction

B. too much noise is created

C. no feedback is sent on receiving the message

D. long travel between the sender and the receiver

I NEED this asap
20 points

Answers

long travel between the sender and the receiver

Answer:

D. long travel between the sender and the receiver

Explanation:

assume that t1:bh t2:bh. describe an n/-time algorithm that finds a black node y in t1 with the largest key from among those nodes whose blackheight is t2:bh.

Answers

This algorithm ensures that 'y' will be the black node with the largest key among nodes with black height 't2:bh' in 't1'.

Can you explain what is meant by 'black height' in a binary tree?

To find a black node 'y' in binary tree 't1' with the largest key among nodes whose black height is 't2:bh', we can use an n/-time algorithm as follows:

Start at the root of 't1'.Traverse the tree 't1' in an in-order manner.At each node, check if the black height of the node is equal to 't2:bh'.If it is, compare the key of the current node with the key of the previously found black node 'y' (initially set to negative infinity).If the current node's key is larger, update 'y' to the current node.Continue traversing the tree until all nodes have been examined.Return the black node 'y' with the largest key.

This algorithm ensures that 'y' will be the black node with the largest key among nodes with black height 't2:bh' in 't1'.

Learn more about black height

brainly.com/question/28564798

#SPJ11

while installing a second hard drive in your computer, you realize that your computer does not include a cable to connect the hard drive to the motherboard. how can you determine what type of cable to purchase?

Answers

To determine what type of cable to purchase for connecting your second hard drive to the motherboard, you will need to first identify the type of connector that your motherboard supports.

This can be done by referring to the documentation that came with your computer or by looking up the specifications online.
Once you have identified the type of connector that your motherboard supports, you can then look for a cable that has the appropriate connector on one end and the correct type of connector for your hard drive on the other end. Some common types of connectors include SATA and IDE.
It is important to ensure that the cable you purchase is of high quality and is compatible with your hardware. You may also want to consider purchasing a cable that is longer than you think you need, in case you need to rearrange your hardware in the future.

Learn more about motherboard here:

https://brainly.com/question/29834097

#SPJ11

When installing a second hard drive on your computer, it is important to ensure that you have the necessary cables to connect it to the motherboard.

To determine what type of cable you need, you should first identify the type of connection that your hard drive uses. Most modern hard drives use either SATA (Serial ATA) or PATA (Parallel ATA) connections.
If your hard drive uses a SATA connection, you will need a SATA cable to connect it to the motherboard. SATA cables are typically thin and flat, with a length of approximately 18 inches. They also have a narrow, L-shaped connector at each end that fits into the hard drive and motherboard respectively.
If your hard drive uses a PATA connection, you will need an IDE cable to connect it to the motherboard. IDE cables are typically wider and rounder than SATA cables and have a length of approximately 18 inches as well. They also have a wide, rectangular connector at each end that fits into the hard drive and motherboard respectively.
Once you have identified the type of connection that your hard drive uses, you can purchase the appropriate cable from your local computer hardware store or online retailer. It is important to ensure that the cable is of good quality and is long enough to reach the motherboard from the hard drive location within your computer.

Learn more about the second hard drive:https://brainly.com/question/31052687

#SPJ11

why do maxima (bright spots) and minima (dark spots) appear when light is reflected back from the cd?

Answers

Maxima (bright spots) and minima (dark spots) appear when light is reflected back from the CD due to the interference of the reflected waves.

When light falls on the surface of the CD, it reflects back in all directions. As a result, multiple waves are created, each having a slightly different path length. These waves interfere with each other constructively and destructively. Constructive interference occurs when waves add up, resulting in brighter spots or maxima. Destructive interference occurs when waves cancel each other out, resulting in darker spots or minima.

The distance between these spots is determined by the wavelength of the incident light and the spacing of the tracks on the CD. The track spacing on a CD is uniform, so the distance between the spots is directly proportional to the wavelength of the incident light. This phenomenon is called diffraction grating and is used in many applications, including spectroscopy and optical communication.

To know more about reflected visit:

https://brainly.com/question/29235982

#SPJ11

What is the problem with my python code?

What is the problem with my python code?

Answers

Girl I don’t know figure it out

import math

class TripleAndHalve:

   def __init__(self, number):

       self.__number = number

   def triple(self):

       return self.__number * 3

   def halve(self):

       return self.__number / 2

   def print_number(self):

       return self.__number

t1 = TripleAndHalve(4)

print(t1.triple())

print(t1.halve())

print(t1.print_number())

how do i fix a computer cpu because it says its full

Answers

If your computer CPU is showing that it is full, it could mean that your storage space is running low.


To fix this issue, consider these steps:
1. Check Storage: Assess your storage drive (HDD or SSD) to see if it's near capacity. You can do this by opening File Explorer and clicking on "This PC" or "My Computer."

2. Delete Unnecessary Files: Remove any unwanted or unnecessary files, such as temporary files, downloads, and duplicates. You can use the built-in Disk Cleanup tool or manually search and delete files.

3. Uninstall Unused Applications: Uninstall programs and applications you no longer need through the Control Panel or the Settings app.

4. Cloud Storage: Consider moving files to cloud storage services, like G Drive or Dropbox, to free up space on your computer.

5. External Storage: Transfer some files to an external storage device, like a USB flash drive or an external hard drive.

6. Optimize Storage:
Defragment your hard drive (if using an HDD) by using the built-in Disk Defragmenter tool. This process consolidates fragmented files, improving overall performance.

By following these steps, you can efficiently manage your storage drive and fix the "full" issue. Remember, regular maintenance can prevent such issues in the future

Learn more about CPU at
https://brainly.com/question/31822602
#SPJ11

When would you use an omnidirectional microphone?


when there are three or more actors in a scene

when it is a windy day and you want to reduce the sound of the wind in the recording

when you want to get outdoor sounds that relate to an outdoor scene in a film

when you want to record in surround sound

Answers

Answer:

when it is a windy day and you want to reduce the sound of the wind in the recording

Write output of the given program:

Write output of the given program:

Answers

Answer:

program 655555555555555

Question 1: Update demo account
If you have just completed all the previous questions you need not use this setup button. However, if you have skipped part or all of the previous questions, or when you ran your virtual machine the demo account was missing, then the button below will create the demo account and create the files which the previous questions would have had you create.
By pressing the button below a new account is created called "demo", password is also "demo". Log in using this account and you cannot do any damage. If you mess the account up and want to start again, just press the button again.
Once created, you can log into this account using telnet or ssh, logging into the hostname linuxzoo.net. Remember the username is demo and the password is demo. And remember, you cannot break anything using this account! The account begins with an empty directory, so dont be shocked that "ls" shows nothing...
Question 2: Wild copy
In the demo account, cd to the home directory (/home/demo). From there copy all files using the * wildcard that contain the word file in the filename into the work directory. Confirm this using ls.
Question 3: Duplicate thismonth
Copy the file thismonth to the letters directory and rename it let1.doc. Change the current working directory to the letters directory and copy let1.doc to let2.doc. Copy once more let1.doc to let3.doc. Confirm this yourself using the ls command.
Question 4: Copy and rename
Copy using the ? wildcard the three files let1.doc, let2.doc, and let3.doc from the letters directory to the work/misc directory. Once copied, rename the new files (the ones in the misc directory) into rpt1.doc, rpt2.doc, and rpt3.doc. When renaming, you have to do this explicitly and not try to use a wildcard. It would appear at first that a wildcard could make the renaming easier, but it turns out to be ridiculously hard to use a wildcard in this case.
Question 5: Square Brackets
Using square brackets, move all the files from the misc directory that contain the numbers 2 or 3 into the scripts directory.
Question 6: rm
Remove all files beginning with the letter "r" from the scripts directory. Use the -i option to see what you are about to delete before then agreeing to delete the files involved.
Question 7: Hard link
Create a hard link in progs called biglink, which is a hard link to the bigfile file in your home directory.
In "ls -l bigfile" the hard link count should be 2. If you make mistakes and create links with the wrong name or in the wrong place you will be marked wrong until you fix the problem.
Question 8: Soft link
Create a soft link in progs called mylink, which is a relative soft link to the thismonth file in your home directory.
Question 9: Soft link - absolute
Create a soft link in progs called mylink2, which is a absolute soft link to the thismonth file in your home directory.

Answers

To update the demo account, click the setup button to create a new account called "demo" with the password "demo". Log in using these credentials.



To perform a wild copy, use the following commands:
  ```
  cd /home/demo
  cp *file* work/
  ls work
  ```
To duplicate the "thismonth" file, use these commands:
  ```
  cp thismonth letters/let1.doc
  cd letters
  cp let1.doc let2.doc
  cp let1.doc let3.doc
  ls
  ```
To copy and rename the files, use these commands:
  ```
  cd ..
  cp letters/let?.doc work/misc/
  cd work/misc
  mv let1.doc rpt1.doc
  mv let2.doc rpt2.doc
  mv let3.doc rpt3.doc
  ```
To move files using square brackets, use this command:
  ```
  mv [23]* ../scripts/
  ```
To remove files starting with "r", use this command:
  ```
  cd ../scripts
  rm -i r*
  ```
To create a hard link called "biglink", use this command:
  ```
  ln /home/demo/bigfile /home/demo/progs/biglink
  ls -l /home/demo/bigfile
  ```
To create a relative soft link called "mylink", use this command:
  ```
  ln -s ../thismonth /home/demo/progs/mylink
  ```
To create an absolute soft link called "mylink2", use this command:
  ```
  ln -s /home/demo/thismonth /home/demo/progs/mylink2
  ```

To know more about wild copy, click here:

https://brainly.com/question/29486512

#SPJ11

question 5 which sql tool considers one or more conditions, then returns a value as soon as a condition is met?

Answers

When the first condition is satisfied, the CASE statement iterates over all possible outcomes and produces a result. If a condition is satisfied, CASE will return the specified outcome. It will return the value in the ELSE clause if none of the requirements are met.

Using IF... ELSE, any T-SQL query may be performed conditionally. If the condition is True, T-SQL statements in SQL Server that are followed by an IF condition will be performed. ELSE-followed T-SQL statements will be executed if the condition evaluates to False. A database table's records are retrieved using a SQL SELECT statement in accordance with clauses (such FROM and WHERE) that define criteria. The SQL INSERT statement is used to insert one or more records or tuples in the table. The syntax is: SELECT column1, column2 FROM table1, table2 WHERE column2='value'. The table attribute data is updated using the MODIFY command. So, to modify one or more fields in a record, use the MODIFY command.

To learn more about CASE statement click the link below:

brainly.com/question/14244627

#SPJ4

Which of these might be an example of an advertiser's target group? A. People who watch a variety of TV shows B. People the advertiser knows nothing about C. People who live in the same region of the country D. People who have no access to media

Answers

An example of an advertiser's target group is: B. People the advertiser knows nothing about.

What is an advertisement?

An advertisement can be defined as a group of consumer promotions programs which is designed and developed with the sole intention of making the various goods or services that are being offered by a business firm to become known, popular and familiar to all of its customers and potential customers.

This ultimately implies that, consumer promotions programs such as online display and television advertisements, can help a business firm in the following positive ways:

To generate store traffic.To enhance brand loyalty.To facilitate and influence the final decision of a customer to purchase an item.

In this context, we can infer and logically deduce that an example of an advertiser's target group is people the advertiser knows nothing about.

Read more on advertisements here: https://brainly.com/question/1658517

#SPJ1

(1) describe how you generally use your cellphone on a daily basis (including with whom do you communicate for what purpose with what frequency); (2) read the Supplementary Reading (click here: Does the Internet Make You More or Less Connected?), and discuss how YOUR cellphone use make YOU more or less connected.

Answers

Brainly wasn't letting me answer, so here's an attachment of the answer

when valerie used autofill to copy a formula, excel copied the format and removed shading from some cells. what can she do to prevent the formatting change?

Answers

When using Auto Fill, moving a cell's fill handle copies the contents of the cell or continues a series of data into neighboring cells.

The Office family of business software packages includes Microsoft's Excel spreadsheet program. Spreadsheets can be formatted, organized, and computed by Microsoft Excel users.

By structuring data using programs like Excel, data analysts and other users may make information easier to study when it is added or changed. In Excel, the rectangular containers are known as cells, and they are organized into rows and columns. Data is stored in these cells.

Excel, a component of the Microsoft Office and Office 365 suites, integrates with the other Office applications. On computers running Windows, macOS, Android, and iOS, the spreadsheet program can be used.

To know more about Excel click here:

https://brainly.com/question/3441128

#SPJ4

your friend is setting up a computer and plans to use windows raid striping. he asks you howmany hard drives he should install in the system. what do you tell him?

Answers

For setting up a computer with Windows RAID striping, your friend should install a minimum of two hard drives in the system.

If your friend plans to use Windows RAID striping, he should install at least two hard drives in the system.

RAID striping requires a minimum of two drives, which are then combined to act as one logical drive with increased performance and storage capacity. However, it is recommended to use an even number of drives to get the best performance and avoid potential data loss. So, your friend can install two, four, six, or more drives, depending on his storage and performance needs.Thus, For setting up a computer with Windows RAID striping, your friend should install a minimum of two hard drives in the system. RAID striping (RAID 0) requires at least two drives to distribute data across them for improved performance.

Know more about the Windows RAID striping,

https://brainly.com/question/29039401

#SPJ11

4. Each mobile device described in this chapter requires that the user have a/an ____________________ associated with services offered by the publisher of the mobile OS in use on the device.

Answers

All mobile devices requires that end users have an account that is associated with services offered by the publisher of the mobile operating system (OS) installed on the device.

A mobile device can be defined as a small, portable, programmable electronic device that is designed and developed for the transmission and receipt of data signals (messages) over a network. Thus, a mobile device must be designed as a handheld device with communication capabilities.

Additionally, mobile devices such as smartphones have a mobile operating system (OS) installed on them, so as to enable them perform various tasks such as:

Taking pictures and creating video files.Typing and sending both text and multimedia messages.Browsing the Internet.Making both audio and video calls.

As a general rule, all mobile devices requires that end users have a registered account associated with the services offered by a publisher of the mobile operating system (OS) installed on the device. This registered account serves as a unique identifier and it connects an end user with the publisher of the mobile operating system (OS).

Read more: https://brainly.com/question/4922532

Several small stores rent space within a larger shopping centre. The owners of the shopping centre have provided a physical network throughout the entire centre.
(a) Explain how virtual networking can be used to give each store a private logical network. Diagrams may be used in your answer.

Answers

Answer:

okay so my first question is what is this question for because I cant really answer without more info

I need help with question 2

I need help with question 2

Answers

The missing word is range.

The range function creates a list of numbers from x to y-1, where x is the leftmost number and y is the rightmost.

For instance,

range(1, 6) would be the numbers 1, 2, 3, 4, 5

which network node is responsible for all signaling exchanges between the base station and the core network and between users and the core network. group of answer choices enodeb radio base station mme serving gateway none of the above

Answers

The MME (Mobility Management Entity) is responsible for all signaling exchanges between the base station (eNodeB) and the core network and between users and the core network. The MME is a key component in LTE (Long-Term Evolution) cellular networks, and its main role is to manage user mobility and perform authentication and security functions.

MME is responsible for handling the initial attachment of a user to the network, as well as tracking the user's location and maintaining their context as they move between cells. The MME also communicates with the Serving Gateway (S-GW) to route data between the user and the core network, and it communicates with the eNodeB to control the radio access network and manage user connections. In this way, the MME acts as a bridge between the radio access network and the core network, and it is critical to the smooth operation of LTE networks.

Learn more about network node: https://brainly.com/question/16009226

#SPJ4

Develop an algorithm to print the names of the candidates who should receive a refund. A refund is due if the candidate’s votes received equals or exceeds 20 per cent of the votes cast in the constituency. The algorithm should also determine and print the number of candidates who received a refund. Test the algorithm with data from ten candidates. The algorithm must accept as input the names of the candidates, votes received and the votes cast in the constituency. The algorithm should print the name of the candidate and the words “Refund Due” or “No Refund” and the number of candidates who received a refund.

Answers

Answer:

PROCEDURE calculate_refund(candidates, votes_received, votes_cast)

refund_due = 0

FOR i = 0 TO LENGTH(candidates) - 1

IF votes_received[i] >= 0.2 * votes_cast

PRINT candidates[i] + " Refund Due"

refund_due = refund_due + 1

ELSE

PRINT candidates[i] + " No Refund"

END IF

END FOR

PRINT "Number of candidates who received a refund: " + refund_due

END PROCEDURE

Explanation:

This algorithm takes as input the names of the candidates, the votes received, and the votes cast in the constituency. It loops through each candidate, and if the number of votes received for that candidate is equal to or greater than 20% of the votes cast in the constituency, it prints the candidate name and "Refund Due". If the number of votes received is less than 20% of the votes cast, it prints the candidate name and "No Refund". Finally, the algorithm prints the number of candidates who received a refund.

When entering numbers that start with a zero, apply the _____ number format.
A. Text
B. Context
C. Zero
D. Zero decimal

Answers

Answer:

The Answer is gonna be D. Zero decimal

Directions: All your answers must be on a Word Document with any equations created using the Equation Editor. Verify your answer using Excel and the Constrained Optimization template posted on Canvas, copy and paste your Answer and Sensitivity Reports into the same Word Document and turn in Monday in class. 1) Suppose you are asked to Minimize the following function using the Lagrangian technique for solving for a relative extremum:
Min f(x,y)
s.t. x+y


=x
2
+y
2

=10

a) What is the optimal value of x ? b) What is the optimal value of y ? c) What is the optimal value of λ ? d) What is the mathematical interpretation of λ ? e) Be sure to attach your Answer Report to your Word Document. f) Be sure to attach your Sensitivity Report to your Word Document.

Answers

The problem requires minimizing a function using the Lagrangian technique and solving for a relative extremum. The objective function and constraints are provided, and the optimal values of x, y, and λ need to be determined. Additionally, an Answer Report and Sensitivity Report must be attached to the Word Document.

a) To find the optimal value of x, we need to solve the Lagrangian equation by setting the partial derivative of the objective function with respect to x equal to λ times the partial derivative of the first constraint with respect to x. By solving this equation along with the given constraints, we can determine the optimal value of x.

b) Similarly, the optimal value of y can be obtained by setting the partial derivative of the objective function with respect to y equal to λ times the partial derivative of the first constraint with respect to y and solving the resulting equation along with the given constraints.

c) The optimal value of λ, also known as the Lagrange multiplier, can be determined by solving the system of equations formed by the objective function and the constraints.

d) The Lagrange multiplier λ represents the rate of change in the objective function with respect to a small change in the constraint. It provides information about the sensitivity of the objective function to changes in the constraint.

e) An Answer Report should be generated, summarizing the optimal values of x, y, and λ, as well as the corresponding objective function value.

f) A Sensitivity Report should also be generated, providing insights into the sensitivity of the optimal solution to changes in the constraints and the objective function.

Both the Answer Report and the Sensitivity Report should be attached to the Word Document for submission.

Learn more about  information here: https://brainly.com/question/31713424

#SPJ11

Someone help its about LA Doña 2

so basically I just wanted to know who has seen it all and where i can watch it

Answers

Answer:

If you look on Just watch it will show you the different people that currently have it right now it is sadly not on Netflix from what I could find out but it will probably be added later on.

Explanation:

Netflix sometimes takes its time adding shows which is sad but that is just how they work. I would recommend maybe trying it on a website that Just watch list or just buy the disc from eBay. either way, I wish you luck!

Why do numA and numB have the same scope in the subtract function?

def subtract(numA, numB):
return numA - numB

def divide(numC, numD):
return numC / numD

answer = subtract(24,6)
print (answer)
____________________
CHOICES
Only the subtract function can use or change the values of numA and numB.
numA and numB are both numeric.
numA and numB are similar names.
numA is passed the value 24 and numB is passed the value 6.

Answers

Answer:

Only the subtract function can use or change the values of numA and numB.

Explanation:

'scope' is about the parts of your program where a variable "exists", ie., can be used.

The other statements are factually true, but do not apply to the question.

Only the subtract function can use or change the values of numA and numB. So, the correct option is A.

What is Substract function?

In subtraction, the minuend is the primary number (from which a number must be subtracted) and the subtrahend is the second number (the number which is to be subtracted). The difference is the resultant number. In mathematics, the "minus" (-) operator is positioned in between the minuend and the subtrahend.

Use the minus symbol to carry out a basic subtraction operation (-). This is the simplest subtraction formula in Excel: =number1-number2. For instance, to subtract 10 from 100, write the equation below, which gives the answer of 90: =100-10. The values of numA and numB can only be used or modified using the subtract function.

Therefore, the correct option is A.

Learn more about Subtraction, here:

https://brainly.com/question/2346316

#SPJ2

Assignment 1
Q: In this course, you will be creating an advertising campaign
for an existing product or company-you will not be creating
a new product or company.
An advertising campaign Is created to

Answers

An advertising campaign is created to make a product, service, or brand more popular among the target audience. Its primary aim is to persuade or encourage a specific group of people to buy or take some action toward a product, service, or brand.

In this course, you will be creating an advertising campaign for an existing product or company; you will not be creating a new product or company.

The advertising campaign includes a series of coordinated marketing activities that help to achieve specific business objectives.

These activities can include various forms of media such as print, television, radio, online, and social media.

The advertising campaign is generally created by a team of creative professionals who work to develop a message that is engaging, relevant, and persuasive.

The advertising campaign generally includes a theme or tagline, creative visuals, a target audience, a unique selling proposition, and a specific call to action.

Read more about An advertising campaign.

https://brainly.com/question/11698706

#SPJ11

Which of the following benefits of object-oriented programming refers to objects as separate entities?
Extensibility
Modifiability
Modularity
Maintainability

Answers

Answer: Modularity

Explanation:

Answer:
Modularity

Explanation:
Modularity refers to the benefit of object-oriented programming that refers to objects as separate entities.

Which computer program offers a comprehensive collection of tools for creating digital art by using a variety of shapes, lines, and letters which can be easily measured and formatted?​

Answers

Answer:

LibreOffice Draw

Explanation:

Answer:

A

Explanation:

Other Questions
a client with alzheimer's disease is being treated for malnutrition and dehydration. the nurse decides to place them closer to the nurses' station because of their tendency to How many milligrams are in 6.38 x 10 pounds? 454 g = 1 lb The value of a rare baseball card issued in 1989 is represented by the function )-0.2-252+3x +4 where x represents the number of years since the baseball card was issued. Use the Remainder Theorem to find the value of the card in 1999 SOMEONE PLS HELP ME!!!! In general, the government should finance only those public projects that ____________. define mass poverty "Exchange rates " are the rate at which one currency can be exchanged for another. These "fluctuate", which means? at which level of anxiety is perceptual field greatly reduced and distorted? 04.03 Sparta and Athens What Do I Have To Do? In this lesson, you learned about the city-states of Athens and Sparta. Suppose that you are an Athenian visiting Sparta, or a Spartan who has received permission to visit Athens. You must write a letter to a friend at home telling him or her about your visit. Although Athens and Sparta were both Greek and shared some common elements of Greek culture, they were also very different. a ________ occurs when a muscle goes into an uncontrolled spasm and contraction A. strainB. sprain. What is the ICD-10 diagnosis code for NSTEMI? why do silver mecury cupper gold not react with water This is related to Among Us.Can you make an account? As in with a password?Is there any possible way to link the mobile version to the PC version? Question 9 of 10Solve (x-3) = 5.A. x=-3+5B. x=3+5C. x = 8 and x = -2OD. x=5 3 Question 14 of 25A student drew the following flowchart to show the movement of nutrients.Soil Roots Plants AnimalsWhich process is likely to be occurring in the plant's roots?OA. PhotosynthesisOB. Nitrogen fixationOC. Burning of fossil fuelsO D. Water transpiration Which of the following is the correct abbreviation for the air mass at point C in the diagram below?MTmTMPmP help for 1,2,3 plz ASAP If correct U get brainiest quien quiere ser mi amiga aaa o mi amigoooooo 2x + y = 128x 2y = 12solve using subsitution method, this is systems of equation btw Short description of how the Alexander empire came to power