Question 1: Update demo account
If you have just completed all the previous questions you need not use this setup button. However, if you have skipped part or all of the previous questions, or when you ran your virtual machine the demo account was missing, then the button below will create the demo account and create the files which the previous questions would have had you create.
By pressing the button below a new account is created called "demo", password is also "demo". Log in using this account and you cannot do any damage. If you mess the account up and want to start again, just press the button again.
Once created, you can log into this account using telnet or ssh, logging into the hostname linuxzoo.net. Remember the username is demo and the password is demo. And remember, you cannot break anything using this account! The account begins with an empty directory, so dont be shocked that "ls" shows nothing...
Question 2: Wild copy
In the demo account, cd to the home directory (/home/demo). From there copy all files using the * wildcard that contain the word file in the filename into the work directory. Confirm this using ls.
Question 3: Duplicate thismonth
Copy the file thismonth to the letters directory and rename it let1.doc. Change the current working directory to the letters directory and copy let1.doc to let2.doc. Copy once more let1.doc to let3.doc. Confirm this yourself using the ls command.
Question 4: Copy and rename
Copy using the ? wildcard the three files let1.doc, let2.doc, and let3.doc from the letters directory to the work/misc directory. Once copied, rename the new files (the ones in the misc directory) into rpt1.doc, rpt2.doc, and rpt3.doc. When renaming, you have to do this explicitly and not try to use a wildcard. It would appear at first that a wildcard could make the renaming easier, but it turns out to be ridiculously hard to use a wildcard in this case.
Question 5: Square Brackets
Using square brackets, move all the files from the misc directory that contain the numbers 2 or 3 into the scripts directory.
Question 6: rm
Remove all files beginning with the letter "r" from the scripts directory. Use the -i option to see what you are about to delete before then agreeing to delete the files involved.
Question 7: Hard link
Create a hard link in progs called biglink, which is a hard link to the bigfile file in your home directory.
In "ls -l bigfile" the hard link count should be 2. If you make mistakes and create links with the wrong name or in the wrong place you will be marked wrong until you fix the problem.
Question 8: Soft link
Create a soft link in progs called mylink, which is a relative soft link to the thismonth file in your home directory.
Question 9: Soft link - absolute
Create a soft link in progs called mylink2, which is a absolute soft link to the thismonth file in your home directory.

Answers

Answer 1

To update the demo account, click the setup button to create a new account called "demo" with the password "demo". Log in using these credentials.



To perform a wild copy, use the following commands:
  ```
  cd /home/demo
  cp *file* work/
  ls work
  ```
To duplicate the "thismonth" file, use these commands:
  ```
  cp thismonth letters/let1.doc
  cd letters
  cp let1.doc let2.doc
  cp let1.doc let3.doc
  ls
  ```
To copy and rename the files, use these commands:
  ```
  cd ..
  cp letters/let?.doc work/misc/
  cd work/misc
  mv let1.doc rpt1.doc
  mv let2.doc rpt2.doc
  mv let3.doc rpt3.doc
  ```
To move files using square brackets, use this command:
  ```
  mv [23]* ../scripts/
  ```
To remove files starting with "r", use this command:
  ```
  cd ../scripts
  rm -i r*
  ```
To create a hard link called "biglink", use this command:
  ```
  ln /home/demo/bigfile /home/demo/progs/biglink
  ls -l /home/demo/bigfile
  ```
To create a relative soft link called "mylink", use this command:
  ```
  ln -s ../thismonth /home/demo/progs/mylink
  ```
To create an absolute soft link called "mylink2", use this command:
  ```
  ln -s /home/demo/thismonth /home/demo/progs/mylink2
  ```

To know more about wild copy, click here:

https://brainly.com/question/29486512

#SPJ11


Related Questions

1 point
If someone wanted a computer to store all of their movies which type of
Hard Drive would be better to get? *
Magnetic
SSD

Answers

Answer:

yes

Explanation:

it very big like my di- hope it helps  

Can anyone please help me on these two questions it would really help xxx

Can anyone please help me on these two questions it would really help xxx

Answers

Answer: No one can interpret or hack it.

Explanation:

Because there is nothing to hack.

take it from someone who hack their teachers laptop as a dare. It was so easy.

a language translator is a ???

Answers

Answer:

Explanation:

speech program

Answer:

hi

Explanation:

language translator is a program which is used to translate instructions that are written in the source code to object code i.e. from high-level language or assembly language into machine language.

hope it helps

have a nice day

Using the Date and Time dialog box, add an automatic date stamp to the header of the document.
Use the July 5, 2019 format, The time X it takes Professor Sawyer to drive to campus on a randomly selected day follows a distribution that is approximately Normal with mean 37 minutes and standard deviation 3 minutes. After parking his car it takes an additional 3 minutes to walk to his classroom and 2 minutes to start the computer. Then he is ready to begin class. Let T = the total time it takes Professor Sawyer to get to his classroom and be ready to begin class. Describe the shape, center, and variability of the probability distribution of T.

Answers

The probability distribution of T is described as follows:

Shape: normal.Center: mean of 42 minutes.Variability: standard deviation of 3 minutes.

What happens to the distribution with the addition of the measure of 5?

The shape of the distribution remains constant, hence it will remain normal.

Then we have to consider that the mean of a data-set is the sum of all observations divided by the number of observations. Each day, a measure of 5 minutes is added to the distribution, hence 5 is added to the mean of the distribution also.

The standard deviation of a distribution is the square root of the sum of the differences squared of each observation and the mean. As the mean is added by 5, as are each observations, the sum of the differences remains constant, hence the standard deviation also remains constant at 3.

More can be learned about probability distributions at https://brainly.com/question/28450969

#SPJ1

Write a VBA Function subroutine called Tax that takes a single argument gross Income of type Currency. It should calculate the tax on any income using the following tax schedule: (1) if income is less than or equal to $15,000, there is no tax (2) if income is greater than $15,000 and less than or equal to $75,000, the tax is 15% of all income greater than $15,000 (3) if income is greater than $75,000, the tax is 15% of all income between $15,000 and $75,000 plus 20% of all income greater than $75,000 Then write a Calc Tax subroutine that asks the user for his income, gets the function subroutine to calculate the tax on this income, and reports the tax in a message box

Answers

An  example of formulated VBA code comprises a function called "Tax" that takes the gross income as an input and employs the given tax schedule to know the tax amount is given below.

What is the VBA Function?

A function in VBA is one that is  like that of a sub procedure, except that the former has the ability to provide an output value while the latter does not have this capability. A code fragment that can be invoked within the VBA Editor, saving one from having to repeat the same lines of code.

In order to make use of the code given, access the VBA editor within Microsoft Excel or other Office programs, generate a fresh module, and insert the code. Next, execute the "CalcTax" subroutine either by pressing F5 or by choosing Run from the menu bar.

Learn more about   VBA Function from

https://brainly.com/question/29442609

#SPJ4

Write a VBA Function subroutine called Tax that takes a single argument gross Income of type Currency.

write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update. ​

Answers

Answer:

A) software

B)assembler

C)operating system

D)system software

E)data base

F)software license

G)machine code

H)ONLINE shopping apps

Write a program that accepts a whole number as input, multiplies that number by 12, and then outputs the product.
Hint: Remember that to think about the data type that the user will input. How can you make sure that their input is entered as a number?

Answers

Explanation:

userInput = input("Enter Number")

try:

val = int(userInput)

except ValueError:

print("That's not an int!")

what will be the output for;
for i in range(1,6):
if i==3:
print('hello')
break
else:
print(i)
print('done')

Answers

The output for; for i in range(1,6): if i==3: print('hello') break else: print(i) print('done') the output for the given Python program is 001020340.

What is range () in Python?

The python range() function creates a collection of numbers on the fly, like 0, 1, 2, 3, 4. This is very useful, since the numbers can be used to index into collections such as string. The range() function can be called in a few different way.

The given program is as:i =0while i < 5print(i)i +=1if i==3 :breakelse:print(0)It will give the following as result 001020340Hence, the answer is 001020340.

Read more bout the python :

https://brainly.com/question/26497128

#SPJ1

A ball is at rest on top of a roof of a car.

Answers

Answer:

When it is in frictional force or in the action of movement varies the speed and if it will stop

Explanation:

If a object is in action a out side force is needed to make it start or stop

Describe a situation in which you would want to use integer division in a program. Then, write the line of code that would use integer division.

Answers

The description of a situation in which you would want to use integer division in a program is that they would give you the exact answer you want when performing addition, division, etc, and is more reliable than using floating point math.

What is Integer Division?

This refers to the term that is used to describe the operator divides two numbers and returns a result and its symbol is %

The Program that uses an integer division is given below:

int a = 25;

int b = 5;

int c = a / b ;

System. out. println(c);

Read more about integer division here:

https://brainly.com/question/28487752

#SPJ1

What does D'Artagnan discover about Milady? d. That she has the mark of a criminal, the fleur- c. That she is secretly working for the queen. de-lis. b. That she is the wife of the Count of Rochefort. d. That she stole the diamonds from the queen.bl​

Answers

the answers is b .....

Answer:

prolly b

srry need tha points

Explanation:

1. Identify about two to four different buine application in your organization (e. G. E-mail, order fulfillment, cutomer ervice, e-procurement, telehealth etc. ). Decribe which buine application are more amenable to cloud computing and why. If you already implemented cloud functionality for ome of the application, preent the reaon why you decided to move to the cloud. Identify which platform (e. G. Amazon AWS or Microoft Cloud) you would ue for cloud implementation

Answers

Four different buine application in your organization are MicsoSoft office 365 (Saas) for Email services, Oracle Netsuite (saas) for order fuifilment, Zen desk for customer service, vitro commerce

let us consider there is an organization That organization Consists of 100 employees.

It require Some business application like,

MicroSoft office 365 (Saas) for Email services

Oracle Netsuite (saas) for order fuifilment

Zen desk for customer service.

vitro commerce e-procurement solution for E - procurement and Aws (paas) for hardware and software solution.

All these business applications are amenable to cloud computing for the organization because of Cost-effectiveness,

steam line the flows of work and services

Time saving

unlimited storage

backup and Mobility.

The on -demand Self-service with advanced online

The term "use" refers to the advantages derived from an item or service. The "application" refers to the usage of the service or product to achieve the advantage in several domains.

Learn more about Application here:

https://brainly.com/question/28650148

#SPJ4

deshaun has to write a complex and lengthy year-end report, which is due by the end of january. which of the following computer tools will help deshaun schedule time to work on this into every business day? question 21 options: a database program a word processing program collaboration software an electronic calendar an outlining program

Answers

The best computer tool for Deshaun to utilize to plan time to work on the year-end report into each business day would be an electronic calendar. A digital calendar, sometimes known as an electronic calendar.

enables users to plan and arrange meetings, activities, and chores. It offers notifications and reminders to make sure that crucial deadlines are reached. Deshaun can utilize the digital calendar to schedule specific time each day to work on the year-end report and prevent scheduling conflicts. A digital calendar may also sync with different devices, so Deshaun can easily check his schedule while on the move on his phone or computer. Also, it is simpler to organize meetings and work together on projects when coworkers can use the same electronic calendar.

learn more about  computer  here:

https://brainly.com/question/21080395

#SPJ4

Which of the following computer tools will be the most helpful for Deshaun to schedule time to work on his complex and lengthy year-end report into every business day?

a) A database program

b) A word processing program

c) Collaboration software

d) An electronic calendar

e) An outlining program.

How to Print a
document

Answers

Answer:

Print a document in Word

1)Click File > Print.

2)To preview each page, click the forward and backward arrows at the bottom of the page. If the text is too small to read, use the zoom slider at the bottom of the page to enlarge it.

3)Choose the number of copies, and any other options you want, and click the Print button.

Answer:

Open the file in your computer by using Microsoft Word Or any other file opener then connect your printer you have to press ‘c t r l‚ and p then some instructions then select your printer select your page then click print

TRUE/FALSE. A field labeled PHONE that accepts data such as (610) 555-1212 would use the Number data type.

Answers

The given statement "A field labeled PHONE that accepts data such as (610) 555-1212 would use the Number data type." is false the Number data type is used for numeric values such as integers or decimal numbers.

The reason for using the Text or String data type is that the phone number format contains not only numeric digits but also special characters such as parentheses and dashes. These characters are part of the phone number's formatting and are not intended to be treated as mathematical values.

The Number data type is generally used for numeric values that can be used in calculations or mathematical operations, such as integers or decimal numbers. However, in the case of a phone number field, it is more appropriate to treat the data as text or a string of characters rather than a numerical value.

Learn more about Number data type: https://brainly.com/question/30154944

#SPJ11

list any four e-commerce website​

Answers

Answer:

Amazon. Founded in the US in 1994, Amazon started as an online bookstore that later diversified to products including media, electronics, apparel, furniture, food, toys, and jewelry.

eBay. ...

Walmart. ...

Etsy. ...

Home Depot. ...

Target. ...

Best Buy. ...

Wayfair.

Answer:

I'm sorry is this a question?

how can i help?

Explanation:

You need to identify the manufacturer of a network interface. Where will you look for this information?The first three octets of a Media Access Control (MAC) addressThe last octet of a Media Access Control (MAC) addressThe first octet of a Media Access Control (MAC) addressThe fourth octet of a Media Access Control (MAC) address

Answers

To identify the manufacturer of a network interface. We will look to the first three octets of a Media Access Control (MAC). The correct option is a.

What is a network interface?

The first six digits of a MAC address, known as OUI, are typically used to identify the manufacturer (Organizational Unique Identifier).

An Ethernet or network adapter over any given network is given a media access control address (MAC address), which is viewed as a distinctive identifier of sorts.

It should be noted that any of their registered vendors have received these MAC prefixes from the IEEE Registration Authority Committee. The rightmost six numbers stands for the Network Interface Controller.

Therefore, the correct option is a, The first three octets of a Media Access Control (MAC).

To learn more about network interface, refer to the link:

https://brainly.com/question/28207436

#SPJ1

write a program that allows the user to enter 10 songs and their artists into a playlist and will sort the entries by artist order. the program should use a 10 element array of structure objects that holds two string variables: artist and title. once the data has been read in and stored, it should sort the entries in ascending order by artist. it should then display the sorted array with appropriate headings.

Answers

Here's an example program in C++ that allows the user to enter 10 songs and their artists into a playlist, sorts the entries by artist order, and displays the sorted array:

#include <iostream>

#include <algorithm>

#include <string>

using namespace std;

// Define a structure to hold song data

struct Song {

   string artist;

   string title;

};

int main() {

   // Define an array of 10 Song objects

   Song playlist[10];

   // Prompt the user to enter the song and artist for each playlist entry

   for (int i = 0; i < 10; i++) {

       cout << "Enter artist for song " << i + 1 << ": ";

       getline(cin, playlist[i].artist);

       cout << "Enter title for song " << i + 1 << ": ";

       getline(cin, playlist[i].title);

   }

   // Sort the playlist entries by artist in ascending order

   sort(playlist, playlist + 10, [](const Song& s1, const Song& s2) {

       return s1.artist < s2.artist;

   });

   // Display the sorted playlist with appropriate headings

   cout << "\nSorted Playlist by Artist\n";

   cout << "-------------------------\n";

   for (int i = 0; i < 10; i++) {

       cout << "Artist: " << playlist[i].artist << endl;

       cout << "Title: " << playlist[i].title << endl;

       cout << "-------------------------\n";

   }

   return 0;

}

In this program, we first define a Song structure to hold the artist and title for each playlist entry. We then define an array of 10 Song objects to store the playlist entries.

We prompt the user to enter the song and artist for each playlist entry using a loop that iterates 10 times. We use the getline() function to read in the user input as a string.

Next, we use the sort() function from the <algorithm> library to sort the playlist entries by artist in ascending order. We use a lambda function as the third argument to the sort() function to specify the comparison logic for sorting the Song objects by artist.

Finally, we display the sorted playlist with appropriate headings using another loop that iterates 10 times. We output each Song object's artist and title fields and a separator to visually distinguish each playlist entry.

For more question on program click on

https://brainly.com/question/23275071

#SPJ11

All of the following are true about in-database processing technology EXCEPT Group of answer choices it pushes the algorithms to where the data is. it makes the response to queries much faster than conventional databases. it is often used for apps like credit card fraud detection and investment risk management. it is the same as in-memory storage technology.

Answers

All of the aforementioned are true about in-database processing technology except: D. it is the same as in-memory storage technology.

What is an in-database processing technology?

An in-database processing technology can be defined as a type of database technology that is designed and developed to allow the processing of data to be performed within the database, especially by building an analytic logic into the database itself.

This ultimately implies that, an in-database processing technology is completely different from in-memory storage technology because this used for the storage of data.

Read more on database here: brainly.com/question/13179611

#SPJ1

Web technologies like Flash, CSS, Java, and HTML often depend on APIs to accomplish what task?

Answers

In Programming, web technologies like the front end part e.g Flash, CSS, Java, and HTML  depends on back end APIs for task like data persistence, sending and getting data e.g post and get request in summary perform CRUD(Create, read, update and delete) operations

The development of web application is basically divider into two

The front end, done basically with technologies like HTML CSS, JavaScriptBack end, this can be done using Python, C#, Java, or any suitable language

Th front end depends on the back end for sending and retrieving information

Learn more:

https://brainly.com/question/8391970

1. What is an AUP? (1 point)
O the abbreviation for the school administrator in an online education environment
a document outlining what is acceptable behavior when using the Internet for schoolwork
a policy outlining the proper formatting to use in Microsoft Office documents for online education
O a short course students can take to understand the school's policies better

Answers

The term AUP is option B: a document outlining what is acceptable behavior when using the Internet for school work.

What is an AUP?

An Acceptable Use Policy (AUP) is a set of rules and guidelines that outline the appropriate and responsible use of a school's computer equipment, networks, and other digital resources. It is designed to protect the school's technology infrastructure, as well as the privacy and security of students, teachers, and other users.

An AUP may include guidelines for a variety of activities, such as:

Accessing and using the school's computer networks and equipmentUsing the Internet for schoolwork, research, and communicationProtecting personal privacy and security onlineUsing social media and other online communication toolsDownloading and installing software and apps

Therefore, based on the context of the above, i can say that an AUP may also specify the consequences for violating the terms of use, which can include disciplinary action, revocation of access to digital resources, and other penalties.

Learn more about Acceptable Use Policy from

https://brainly.com/question/24951641
#SPJ1

refer to the exhibit. a network administrator is connecting a new host to the service lan. the host needs to communicate with remote networks. what ip address would be configured as the default gateway on the new host?

Answers

A new host is being added to the service lan by a network administrator. The host needs to talk to distant networks. On the new host, the default gateway would be set to the IP address 10.27.14.148.

If a host's default gateway address is configured incorrectly, which of the following will take place?

A machine with the wrong default gateway set up can talk to hosts on its own network segment. It will, however, be unable to communicate with hosts on some or all distant networks.

How are data packets forwarded to their destinations by intermediary devices like routers?

If the router has a route, it will send the packet to the next-hop router that provides a connection to the destination network.

To know more about networks visit :-

https://brainly.com/question/24279473

#SPJ4

why might a patient be required to go to a rehabillition center after a hosptial stay

Answers

Answer:

They'd need to get care from someone who speacialized in their illness, surgery recovery or injury

Explanation:

if theyre recovering from a serious illness, surgery, or injury and require a high level of specialized care that generally cannot be provided in that setting

Sami is creating a web page for her dog walking business. Which item will set the theme for her page? Background color Heading color Link color Text color

Answers

Answer:

A Background color

Explanation:

Antes de conectar un receptor en un circuito eléctrico, ¿qué precauciones debemos tomar para evitar riesgos y hacer que el dispositivo funcione correctamente?

Answers

Answer:

Antes de conectar un receptor en un circuito eléctrico, es necesario corroborar que el dispositivo que se va a conectar soporte la misma corriente de voltaje que la del circuito eléctrico. Así, si el circuito tiene un voltaje de 110 voltios, el dispositivo debe tolerar dicha medida; si por ejemplo el circuito tiene un voltaje de 220 voltios y se conecta un dispositivo que tolera 110 voltios, se producirá un cortocircuito que dañará definitivamente el dispositivo, ademas de poder causar accidentes domésticos como el corte del suministro eléctrico o incluso incendios.

use a row level button to collapse worksheet rows to display only subtotals and the grand total. then, use a show details button to display individual records for the eastern region subcategory of data (the top shoe details ( ) symbol)

Answers

To use a row level button to collapse worksheet rows and display only subtotals and the grand total, follow these steps:



1. Select the rows that you want to collapse, which contain the subtotals and the grand total.
2. Right-click on the selected rows and choose "Group" from the context menu.
3. This will collapse the selected rows and display only the subtotal and grand total rows. You can click the minus (-) sign next to the subtotal row to collapse the details further.
4. To create a show details button for the eastern region subcategory of data, first, insert a new button shape or symbol into the worksheet.
5. Right-click on the button and select "Edit Text" to add the text "Show Details" or the top shoe details ( ) symbol inside the button.
6. Right-click on the button again and choose "Assign Macro" from the context menu.
7. In the Assign Macro dialog box, select the macro or function that will display the individual records for the eastern region subcategory of data. If you don't have a macro, you can create one using VBA (Visual Basic for Applications).
8. Click "OK" to save the changes and close the dialog box.
9. Now, when you click the show details button, it will execute the assigned macro or function, which will display the individual records for the eastern region subcategory of data.

Remember to customize the steps according to the specific software or spreadsheet program you are using.

To know more about individual visit:

https://brainly.com/question/32647607

#SPJ11

Katarina is deciding whether to buy a desktop or a laptop computer. What will most likely help Katarina make her decision?

Laptops have touch screens, while desktops require a keyboard.
Laptops use simple software, while desktops are more complex.
Laptops are portable devices, while desktops remain in one place.
Laptops have more memory, while desktops have limited disk space.

Answers

laptops are portable decides , while desktops remain in one plcae

Answer:

C is your answer. Good luck on the test!

Explanation:

What are some potential challenges that society will face given the digital revolution? You may want to think particularly of the news industry. Discuss how these challenges could impact young people such as yourself.

Answers

Answer:

Some said that technology causes more problems than it solves. ... Others said humans' uses and abuses of digital technologies are causing ... Highly technological societies have to be iterative if they hope to ... where we believe we can tell honestly delivered information from fake news and disinformation.

hope this helps...

Explanation:

What of the following are a result of writing programs as one long sequence structure? O Duplicated code makes the program faster to write. O Having a long sequence of statements makes it easy to find errors. O If parts of the duplicated code have to be corrected, the correction has to be made many times. O It does not make use of decision structures.

Answers

As a result of coding programs as one lengthy sequence structure, if portions of the duplicated code need to be corrected, the correction must be made numerous times.

What in programming is a sequence structure?

A sequence structure consists of one or more subdiagrams, also known as frames, that run one after the other. The execution order of nodes is determined by data dependency within each frame of a sequence structure, much like in the rest of the block diagram.

What kind of loop structure keeps the code repeating?

When a condition is no longer met, a while loop runs a block of code an undetermined number of times. A block of code is repeated a predetermined number of times in a for loop, on the other hand.

To know more about programs  visit:-

https://brainly.com/question/14010931

#SPJ1

(cisa exam, adapted) to ensure confidentiality in an asymmetric-key encryption system, knowledge of which of the following keys is required to decrypt the receive message? private public

Answers

To ensure confidentiality in an asymmetric-key encryption system, the knowledge of the private key is required to decrypt the received message. In an asymmetric encryption system, also known as public-key encryption, a pair of keys is used: a private key and a public key.

The public key is used for encryption, and anyone can have access to it. It is used by the sender to encrypt the message before sending it to the recipient. However, the encrypted message can only be decrypted using the corresponding private key, which is kept secret by the recipient.

Therefore, to decrypt the received message and ensure confidentiality, the recipient must possess the private key associated with the public key used for encryption.

Learn more about Encryption here -: brainly.com/question/4280766

#SPJ11

Other Questions
what is science that deals with the phenomenon spelled out crossword clue ? Enrollment numbers at BYU-Idaho over the last four years are as follows: Semester 2018 2019 2020 2021 Winter 15,453 16,235 14,762 15,051 14,500 13,352 13,195 14,232 Spring Fall 17,895 16,191 17,844 16,660 What is the seasonal index for the winter semester? (Display your answer to two decimal places.) Number What is the seasonal index for the spring semester? (Display your answer to two decimal places.) Number What is the seasonal index for the fall semester? (Display your answer to two decimal places.) Number Suppose for the 2022 school year BYU-Idaho is expecting a total of 51,000 students. Based on this projection, how many students should they expect to enroll in the fall semester? (Display your answer to the nearest whole number.) Number Based on the key words in the title and the first few chapters in the table of contents, what is most likely the purpose of the book? As you read, first make sure you understand:a. Connectionsb.the vocabularyc.the structured.author intent I also need help with this too!! Pls help when performing forensic analysis on devices from diverse jurisdiction At Athens-Greece ( = 37 58), what is the solar declination on January 10 PLEASE HELPCompare and Contrast Communism in theory, Communism in practice, and Fascism Babies who show the ________ will spread their arms and quickly pull them back if they feel like they are falling. PLEASE HELP ITS DUE BY 12!! I NEED THIS QUESTION ANSWERED AND I WILL MARK BRAINLIEST1. "Social media has brought an entirely new dimension to information about health. Unfortunately, much of the information on social media is not accurate and much of it is meant to elevate tensions. Give an example of how the health-related messages on social media have had negative consequences for you, a family member, or people you know. How could these messages create health issues for your family?" How did the Pennsylvania Mutiny highlight Congresss weakness under the Articles of Confederation?Congress was unable to help soldiers who wanted payment for service.Congress was unable to help farmers who had fallen into debt.Congress was unable to stop a civil war in Pennsylvania.Congress was unable to give states their own governments. A synthesis reaction takes place when carbon monoxide (CO) and hydrogen gas (H2) react to form methanol (CH3OH). How many grams of methanol are produced when 14 grams of carbon monoxide reacts with 1.5 grams of hydrogen gas please help Finite math 7.Twelve computer disks are randomly selected. Let s represent a good disk and f represent a damaged disk A.How many ways to select twelve computer disks? What counting technique are you applyingM,P,S,or C)? B.How many ways to select five good and seven defective computer disks? What counting technique are you applying M,P,S,or C) Identify the conditions. List a few outcomes i.e., ways of selecting a batch of 12 disks C.How many ways to select three good and nine defective disks or five good and seven defective disks What counting technique are you applyingM,P.S,or C) PROPAGANDA:BATTLING FOR THE MIND by shelby ostergaard 3. How does the author's discussion of North Korea's use of propaganda contribute to the development of ideas in the text (Paragraph 5 )? - A It questions whether or not the US should have used propaganda during the Cold War, given the effect that it has had in North Korea. - B It shows that propaganda is still used today and can leave people misinformed or unaware of important ideas and events. - C It illustrates the dangers of misinformation when two countries are in battle with each other for land. -D It demonstrates the need to keep all citizens informed of propaganda campaigns. What is the value of the underlined digit?5,682, 450,003/////^ that is the underlined digit A. eighty thousand B. eighty million C. eighty-two million D. eighty billion former general electric ceo jack welch was well known for regularly meeting one-on-one with all senior managers and business unit heads. welch was practicing which type of control technique? Which of these statements best describes the cause of this expansion?A. Conductuion of heat from the mantle is expanding the crustal plates that hold the Alantic oceanB. Convection within the mantle is bringing magma up to the crust in the middlw of the Atlantic Ocean,building new sea floorC. As the crustal plates that hold the mainland of North America and Europe get older, they sink, causing the Atlanic Ocean to spreadD. At the mid-Atlantic Ridge, the crustal plates hold North America and Eurioe are colliding together, causing volcanic activivty and earthquakes*I HAVE 6 DAYS UNTIL THIS IS DUE* give 5 characteristics of the soups include two appropriate garnish for each During which decade did transcontinentral rail service begin in the United States? The red-headed league what conclusion can you draw about Mr. Willsons case\