security director: what does this look like on a practical level? does all of the security camera data go to the cloud service provider's location for analysis? you: actually, we need something faster than that. by employing select , camera feeds can be partially processed by the devices themselves, and lower priority data is sent to the cloud provider for processing and storage.

Answers

Answer 1

Your cloud-based apps and data are kept on a server that is housed in a data centre or server farm. You have exclusive use of the area, which is physically segregated from the rest of the house.

What data go to the cloud service provider's for analysis?

A company providing cloud platform, infrastructure, application, or storage services is referred to as a cloud service provider.

Similar to how a homeowner would pay for a utility like gas or electricity, businesses often only have to pay for the cloud services they actually utilize because of their specific business requirements.

Therefore, The cloud also needs to include extra features that address the enterprise's best-in-class requirements, like security, real-time availability, and performance.

Learn more about cloud service here:

https://brainly.com/question/29531817

#SPJ1


Related Questions

Precisez la nature de l'information logique ou analogique pour chaque exaple ci dessous

Answers

Answer:

Bonjour pourriez vous m'aider svp ?

Précisez la nature de l'information (logique ou analogique pour chaque exemple ci dessous:

a) poids

b) conformité d'une pièce de monnaie

c) niveau d'eau dans une bouteille

d)porte ouverte ou fermée

e) force de pression

f) présence d'une personne dans une pièce

g)position angulaire

h) température inférieur ou supérieur à 15°C

i) vitesse du vent

j) présence de matériaux métallique à proximité

in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4

Answers

Answer:

c)4

Explanation:

Hope it could helps you

What is the purpose of a hyperlink in a presentation?
A to add a joke to a presentation
B to create an attractive image
C to connect a user to a new slide, a file, or a webpage
D to keep track of the order of slides

Answers

Answer:

Answer:c to connect a user to a new slide, a file, or a webpage

Explanation:

Explanation:c

Answer:

c

Explanation:

The value that excel displays for a cell is always the precise value you enter in the spreadsheet or the precise value resulting from a formula in that cell that is stored by the software.a. Trueb. False

Answers

This claim is untrue since Excel should always show the exact number that you enter into the column or the exact value that results from a calculation that is placed in that cell.

What are a few illustrations of spreadsheet applications?

A type of computer application called a technology program may be used to organise, store, and analyse data in a tabular format. The application can imitate digital versions of paper accounting spreadsheets. They could also have several connected sheets with content is shown text, statistics, or graphics.

Which spreadsheet programme is the most straightforward?

LibreOffice Arithmetic or Apache Avian influenza viruses Calc offline may indeed be adequate if you simply need a basic computer for straightforward administrative tasks, such as calculations. if you desire more complex features.

To know more about Spreadsheet visit:

https://brainly.com/question/8284022

#SPJ4

* What was the most remarkable discovery during the second computer generation ​

Answers

The most remarkable discovery during the second computer generation was the invention of the transistor in 1947.

During the second computer generation, which spanned from the late 1950s to the mid-1960s, the most remarkable discovery was the development of the concept of the transistor.

This tiny semiconductor device, which replaced the bulky and unreliable vacuum tubes used in first-generation computers, allowed for the creation of smaller and more powerful computers.

The first transistor was invented in 1947, but it was during the second computer generation that the technology became widely adopted.

The development of the transistor paved the way for the creation of more advanced computers, and it marked a major milestone in the history of computing.

For more such questions on Computer generation :

https://brainly.com/question/30995425

#SPJ11

Within a ________ all interactions among computing devices are defined in a formal, standardized way.

Answers

Within a cloud design philosophy all interactions among computing devices are defined in a formal, standardized way.

Basically, cloud computing is the use of servers for databases, storage, applications, or anything else over the internet. The possibility for cost savings is one of cloud computing's main draws for enterprises. Elasticity, the capacity to automate infrastructure management, increased reliability, and lower cost are some of cloud computing's intrinsic advantages.

A good cloud architecture is safe, cost-effective, high-performing, and most importantly, reliable.

With only a very slight performance hit, a well-designed cloud system should be able to expand and contract as the number of users increases or declines. When more resources are automatically provided via AWS load balancing, linear scaling ought to be possible.

To know more about cloud click here:

https://brainly.com/question/17219264

#SPJ4

Will MARK BRAINLIEST TO WHOEVER GETS THIS CORRECT, PLS HELP!! PLS WRITE CODE IN PYTHON. CHECK THE IMAGE I PUT THERE.

Will MARK BRAINLIEST TO WHOEVER GETS THIS CORRECT, PLS HELP!! PLS WRITE CODE IN PYTHON. CHECK THE IMAGE

Answers

Answer:

def findLastBinary(s):

 binaryString = ""

 for c in s:

   binaryString += bin(ord(c))[2:].zfill(8)

 n = 0

 while(bin(n)[2:] in binaryString):

     n = n + 1

 return n-1

s = input("Enter a string: ")

n = findLastBinary(s)

print("The highest binary string found is", bin(n)[2:])

Explanation:

bin(n) converts an integer to binary

the [2:] index is to skip the "0b" prefix that is otherwise prepended.

zfill(8) left fills the ASCII number with zeros

discuss the various computer generation along with the key characteristics of computer of each generation​

Answers

Explanation:

Here are some pic . hope it may help you.

discuss the various computer generation along with the key characteristics of computer of each generation
discuss the various computer generation along with the key characteristics of computer of each generation
discuss the various computer generation along with the key characteristics of computer of each generation
discuss the various computer generation along with the key characteristics of computer of each generation
discuss the various computer generation along with the key characteristics of computer of each generation

Server Selection The developers of Hackerland want to build a distributed system. It is represented as a grid of
n
rows and
m
columns where
n≥m
and each cell is a server. The vulnerablility of the
f th server in the
f th column is vulnerability[i][i]. The net vuinerability of a system Is the minimum vuinerabilitis of the maximum vulnerabilities of the servers in all the columns. In other words, Create a set of maximum vuinerabilities from each column of the grid and find the minimum of this set. They want to consider only a subset of
m
rows to increase net vulnerability. Find the maximum possible value of net vulnerablility that can be achieved by choosing exactly
m−1
rows from the grid. Example Suppose,
n=4,m=3
, vulnerabilicy
=[[1,3,1]
,
[3,1,1]
,
[1,2,2]
,
[1,1,3]]
We can choose
m−1=2
rows only. It is optimal to choose the
2 nd and
3 rd row to make a new grid. Our new vulnerability
=[[3,1,1]
,
[1,2,2]]
The maximum of the respective columns is
(3,2,2)
and the minimum of this set is 2. Hence we report 2 as our answer. Functon Descriptlon Complete the function getMaxNetVulnerability in the editor below. getMaxNetvulnerability has the following parameter(s): vulnerablilig][n][m]; a 2-dimensional array described in statement Function Description Complete the function getMaxNetVulnerability in the editor below. getMaxNetVulnerability has the following parameter(s): vulnerability[n][m]: a 2-dimensional array described in problem statement Returns int: the maximum possible net vulnerability using exactly
m
- 1 rows Constralnts -
2≤m≤n≤1000
-
1≤
vulnerability[ij[i]
≤10 6
Input Format For Custom Testing Sample Case 0 Sample Input For Custom Testing Sample Output 2 Explanatlo[s We can select at most
m−1=2
rows. We select the first and the second row. Our new vulnerabllisy
=[[5,1,3]
,
[5,2,1]]
The maxima of the columns are
(5,2,3)
and the minimu Sample Case 1 Sample Output 2 Explanation We can select at most
m−1=2
rows. We select the first and the second row. Our new vulnerability
=[[5,1,3]
,
[5,2,1]]
The maxima of the columns are
(5,2,3)
and the minimum of these is 2 . - Sample Case 1 Sample Input For Custom Testing Sample Output 4 Explanation We can select at most
m−1=2
rows. We select the first and the second row. Our new vulnerabilisy
=[[5,3,3]
,
[3,4,6]]
The maxima of the columns are
(5,4,6)
and the minimum

Answers

Hackerland's creators intend to create a distributed system. It is shown as a grid with n rows & m columns, where each cell represents a server and nm.

A network server is what?

Dedicated machines that are a part of a network and run programs designed to handle client requests and deliver pertinent answers are known as network servers. The physical machine that this application is operating on is normally included in a network server, while the software itself may be referred to as the server in some cases.

What does a server do primarily?

A server sends, receives, and stores data. In essence, by offering services, it "serves" another goal. A server may be a computer, piece of software, or a storage device, and it may offer one.

To know more about  server visit:

https://brainly.com/question/30168195

#SPJ4

Which phrase best describes a spreadsheet?
оооо
a computer file that is created and saved by a word-processing software program
a computer file that presents information on slides using text, images, and video
a computer file that does not have any built-in data organization functions or methods of making calculations
a computer file that uses rows and columns to organize, analyze, store, and manipulate data

Answers

Answer:

  (d) a computer file that uses rows and columns to organize, analyze, store, and manipulate data

Explanation:

A spreadsheet program and its associated data structure (a spreadsheet) are intended to emulate the appearance of a ledger that is organized into rows and columns.

Answer:

D. computer file that uses rows and columns to organize, analyze, store, and manipulate data.

What are the typical steps in an MBO program? 7. Describe Locke and Latham's goal-setting model. 8 Explain total quality management and how it can be used to improve quality and productivity. 9₁ How can managers develop an organizational culture that encourages a high-performing system or a learning organization? 10 How does the culture affect an organization's ability to change?

Answers

Typical steps in an MBO program include goal setting, action planning, performance monitoring, and performance review and feedback.

In an MBO (Management by Objectives) program, the first step is goal setting. This involves defining clear and specific objectives that align with the overall organizational goals. These objectives should be measurable and achievable.

The next step is action planning, where employees and managers collaborate to determine the necessary actions and strategies to achieve the set goals. This includes identifying tasks, allocating resources, and setting timelines.

Once the action plans are in place, the program moves to performance monitoring. This step involves tracking progress towards the goals and regularly assessing performance. Key performance indicators (KPIs) and metrics are used to measure and evaluate the achievement of objectives.

The final step is performance review and feedback. This includes formal evaluations where managers provide feedback to employees about their performance, strengths, and areas for improvement. It also involves recognizing achievements and providing guidance for future development.

Overall, an MBO program follows a systematic approach to goal setting, planning, monitoring, and performance review, with a focus on aligning individual and team objectives with organizational goals.

Learn more about MBO program

brainly.com/question/31854301

#SPJ11

if you have made a web purchase such as with amazon you have experienced some of the functionality of a crm system where the vendor keeps track of your name, address, and purchases. true or false

Answers

The given statement, "if you have made a web purchase such as with amazon you have experienced some of the functionality of a CRM system where the vendor keeps track of your name, address, and purchases" is True.

What exactly is a web purchase?

A web purchase is an online transaction for a product or service. Because of the ease they provide, web purchases have grown in popularity. Customers may browse for things from the convenience of their own homes, and the items are subsequently delivered to their door.

CRM is an abbreviation for customer relationship management. A CRM system is a tool for managing an organization's customer relations. It keeps track of a customer's interactions with the company, such as purchase history, support tickets, and other types of engagement.

A CRM system may help a company better understand its customers' demands and enhance its interactions with them. Because the business has a complete picture of each customer's history with the firm, it can customize its approach to each client and improve their experience.

Learn more about CRM systems:

https://brainly.com/question/14394997

#SPJ11

Given what you know about the formation of photochemical smog, in which of the following situations is it most likely to occur?
Rural area in a low-sunshine location
Rural area in a high-sunshine location
Urban area in a high-sunshine location
Urban area in a low-sunshine location

Answers

Photochemical smog is formed when sunlight interacts with certain air pollutants, such as nitrogen oxides (NOx) and volatile organic compounds (VOCs), in the presence of sunlight.

Therefore, it is most likely to occur in an urban area in a high-sunshine location.

In an urban area, there are typically higher concentrations of vehicles, industrial emissions, and other human activities that release NOx and VOCs into the air. These pollutants can accumulate in the urban atmosphere, and when exposed to sunlight, they can undergo photochemical reactions that result in the formation of photochemical smog.

High levels of sunlight are necessary for the formation of photochemical smog because the reactions that produce smog require energy from sunlight to occur. In rural areas or low-sunshine locations, the availability of sunlight may be limited, which reduces the likelihood of photochemical smog formation. However, in urban areas with high levels of sunlight, combined with significant emissions of NOx and VOCs, the conditions for photochemical smog formation are more favorable.

learn more about    photochemical smog  here:

https://brainly.com/question/15728274

#SPJ11

which of the following graphic file formats uses a lossy compression algorithm, does not support animation, but offers continuous tone images

Answers

JPEG uses a lossy compression algorithm, does not support animation, but offers continuous tone images

JPEG is an abbreviation for "Joint Photographic Experts Group." It is a common picture format for storing lossy as well as compressed image data. Regardless of the significant reductions in file size, JPEG photos retain acceptable image quality.

Because of this distinctive compression capability, JPEG files may be widely utilized on the Internet, computers, and mobile devices.

JPEG picture sharing is speedy as well as efficient.

In addition, a huge number of JPEG picture files may be saved in a little amount of storage space.

JPEG files can also include high-quality picture data compressed without loss. JPEG is a widely used format for saving modified photos in PaintShop Pro.

Learn more about JPEG here: https://brainly.com/question/5029762

#SPJ4

What is one advantage of taking a course online instead of onsite?

A.
It is easier to access the printed course materials.

B.
You can usually do the coursework when it’s convenient.

C.
The quality of teaching is typically a little better.

D.
You can communicate with your teacher more effectively.

Answers

i’d say B, it sounds correct. sorry if it’s not right tho!

i am making a project i have to advertise a product i picked a futureistic car
can any one halp me with a unknown name that is cool plss

Answers

Answer:

The Futuristic Car. That name is bussin

A Computer Processing Factory Rationing (CPFR) is dependent on technology. Answer: true or FALSE

Answers

The statement given "A Computer Processing Factory Rationing (CPFR) is dependent on technology. " is false because a CPFR is not dependent on technology.

CPFR is actually an acronym for Collaborative Planning, Forecasting, and Replenishment.  It is a business process that involves the collaborative efforts of trading partners in the supply chain to improve planning, forecasting, and inventory replenishment. While technology can support and facilitate CPFR implementation, the success of CPFR primarily relies on effective collaboration, communication, and information sharing between trading partners.

CPFR emphasizes the importance of collaborative decision-making and synchronized planning to optimize supply chain efficiency and reduce inventory costs.

You can learn more about business process at

https://brainly.com/question/28489310

#SPJ11


Security is essential to keep in mind when doing business online. Select three tips for keeping customers' private
information secure.
R
0 Always use a reputable web server and ask about their security.
C Store customer information In the same place as other business information.
0 Make sure credit card processing uses a digital certificate to verify the processing site.
O Always run virus protection and use firewalls.
Trust your merchant accounts and companies that process payment

Answers

Make sure credit card processing uses a digital certificate to verify the processing site

Security is essential to keep in mind when doing business online. Three tips for keeping customers' private information secure is

Always use a reputable web server and ask about their security.

Make sure credit card processing uses a digital certificate to verify the processing site.

Always run virus protection and use firewalls.

What is an online business?Online business is a platform where business takes place over the internet.It includes the activity of buying and selling products on an online service. An online business can increase brand awareness and customer engagement. The main advantage of using online businesses is less expensive operating costs than traditional businesses. the main types are e-commerce, digital marketing, etc.

To learn more about online business refer to:

https://brainly.com/question/27602536

#SPJ2

What was the name of the 1st testing fear?

Answers

Answer: Test Anxiety-

Explanation:

Basically it is called that because you dont know if the answers are correct or not and you will be unable to know until you find out at the very end. Its very nerve wracking

referencing the lakehouse: what scale is indicated on the following view of the lakehouse? sections & details: wall section

Answers

The scale indicated on the view of the lakehouse wall section is 1/4 inch equals 1 foot.

The scale indicated on the view of the lakehouse wall section is 1/4 inch equals 1 foot. This means that every 1/4 inch on the drawing represents 1 foot in real-life dimensions. The scale is used to accurately depict the size and proportions of the wall section in relation to the actual dimensions of the lakehouse.

By using a scale, architects and designers can effectively communicate the design details to contractors, builders, and other professionals involved in the construction process. It ensures that everyone understands the measurements and specifications of the wall section, including the height, width, and thickness of the walls, as well as the placement of windows, doors, and other elements.

The 1/4 inch equals 1 foot scale is commonly used in architectural drawings and provides a good level of detail while still allowing for clear representation on standard-sized drawing sheets. It strikes a balance between providing sufficient information and keeping the drawing manageable and easy to read.

Learn more about Lakehouse

brainly.com/question/31169807

#SPJ11

Compare and contrast three applications or services that you can use to backup photos from your mobile phone or tablet to the cloud. Which one would you choose and why?

Answers

There are many applications and services available to backup photos from mobile devices to the cloud, including Go o gle Photos, iCloud, and Dropbox.

What do they offer?

Go o gle Photos offers unlimited storage and automatic backup, while iCloud offers seamless integration with Apple devices and 5GB of free storage.

Dropbox offers the ability to sync files across multiple devices and 2GB of free storage. Ultimately, the choice depends on individual needs and preferences.

I suggest evaluating the storage capacity, ease of use, and integration with your devices before making a decision.

Read more about cloud services here:

https://brainly.com/question/9759640
#SPJ1

Which of these is a biotic factor in a forest?
Will
O A. Climate
O O
O B. Terrain
O C. Trees
O D. Water​

Answers

Answer: trees

Explanation:

what is prepositions? explain with the help of an example.​

Answers

Answer:

The definition of a preposition is a word or phrase that connects a noun or pronoun to a verb or adjective in a sentence. An example of preposition is the word "with" in the following; "I'm going with her."

hope this somewhat helped:)

2
ng and Upgrading Computers: Mastery Test
Select the correct answer.
Which of the following can computer maintenance software determine?
O A.
O B.
O C.
O D.
whether your hard drive is about to fail
whether your monitor or screen is drawing too much power
the humidity inside your desktop computer
the amount of dust inside your laptop
Reset
Next

Answers

whether your hard drive is about to fail can computer maintenance software determine.

What is computer maintenance software ?

Software that centralises maintenance data and streamlines maintenance operations is known as a computerised maintenance management system, or CMMS. It aids in maximising the use and accessibility of tangible assets like machines, transportation, communications, plant infrastructures, and other assets. CMMS systems, also known as computerised maintenance management information systems (CMMIS), are used in the manufacturing, energy, transportation, building, and other sectors where physical infrastructure is essential.

A CMMS's database is its fundamental component. The information regarding the assets that a maintenance organisation is responsible for maintaining, as well as the tools, supplies, and other resources needed to do so, are organised using a data model.

Read more about computer maintenance software:

https://brainly.com/question/28561690

#SPJ1

Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.

Answers

Answer:

Following are the letter to this question:

Explanation:

Dear Raju:

For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.  

For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.

And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.  

If you determine that option fits your needs, let me learn and I'll support you there.

Yours sincerely,

Dev

An important executive wants the developers to take in a highly critical feature in the current sprint. The Developers
a) Should work on that since the organization's priority is more important.
b) Should ask the executive to work with the Product owner
c) As an empowered team they should ask the executive to select the work to be removed so that there will be the same amount of work in the sprint.

Answers

The best option for the developers in this situation is (b) Should ask the executive to work with the Product owner.

In a Scrum framework, the Product Owner is responsible for managing the product backlog and prioritizing features according to the organization's needs. The developers should not directly take orders from the executive as it could disrupt the planned sprint and compromise the Scrum process.

By involving the Product Owner, the developers ensure that the prioritization and backlog management remain consistent, while still addressing the executive's request.
To maintain the integrity of the Scrum process and effectively manage priorities, developers should direct the executive to work with the Product Owner to include the critical feature in the sprint.

For more information on scrum framework kindly visit to

https://brainly.com/question/30456684

#SPJ11

What is a CMOS Battery slot

Answers

What is a CMOS battery?
(complementary metal-oxide-semiconductor)

It is a chip on the motherboard that contains BIOS configuration, date, time and other information that the computer needs during startup. Normally, this information would be lost when the computer is shut down or loses power for some reason (dead battery, power failure, etc.). The CMOS battery supplies power to the CMOS chip, even when the computer is shut down. This battery is usually a watch type battery which can supply power for a year or more.
_____________________________________________________
Learn more about CMOS battery's:
https://brainly.com/question/14767803

Have a WONDERFUL day! (:

How is video compression accomplished?
Video compression works by making the pixel size smaller.
Video compression works by removing the sound.
Video compression works by smoothing the pixels.
Video compression works by removing unnecessary parts of frames

Answers

Video compression works by making pixels smaller, so A.

Answer:

A. Video compression works by making the pixel size smaller.

Explanation:

E2020!

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

upon conducting a visual inspection of the server room, you see that a switch displays led collision lights that are continually lit. you check the led on the corresponding workstation and see that it is flashing rapidly even though it is not sending or receiving network traffic at that time.

Answers

A router connects different networks and routes traffic between them. The network number or network address is a distinctive identifier used to identify each network connected by a router.

The physical topology for LANs that is most commonly used is star topology. ARCNET introduced the star, and Ethernet later adopted it. An Ethernet crossover cable is a type of twisted pair Ethernet cable used to connect computing devices that would typically be connected via a network switch, Ethernet hub, or router, such as directly connecting two personal computers via their network adapters. Each node is connected directly to a central device such as a hub or a switch.

Learn more about Ethernet here-

https://brainly.com/question/13441312

#SPJ4

Other Questions
the stop value passed as an argument to the range function is not included in the range produced. true false a u.s. company builds a new customer call center near chicago, even though it would be cheaper to outsource the call responses to a foreign service provider. this is an example of? A. on-shoring. B. offshoring. C. near-shoring. D. next-shoring. The variable Weight (lb. or kg) is measured on a ___________ scale of measurement Interval Ratio Nominal Ordinal. PLSSS HELPPPP COUNTS BIG GRADE!!!!! can anyone please help!!!!! one end of a string is attached to a vertical pole with the other end of the string attached to a ball that swings in a horizontal circular path, as shown. which of the following free body diagrams represents the forces exerted on the ball? Find the magnetic force(both magnitude and direction) acting on a proton if its velocity is v=3.610^6J m/s and it is in a magnetic field of B=2i+2J+7kT What does the wall symbolize? Can someone pls give me an example of human geography in everyday life? your brother has written to you telling you of his plan to learn a trade, write back back to him giving him reason why he should further his education up to university level Methamphetamine is a notorious street drug. One synthesis involves reductive amination of benzyl methyl ketone with methylamine. Indicate the reactions and give the structure of methamphetamine Which are reasons why artists create works of art? Multiple select question. To create aesthetically pleasing pieces of art To commemorate a special event To turn an ordinary object into something unexpected To express their feelings visually to the public A mortgage of $177,000 is to be repaid by making payments of$1,031 at the end of each month. If interest is 4.67 % per annum compounded semi-annually, what is the term of themortgage? State your answer in years and months (from 0 to 11months).The term of the mortgage is __ year(s) and __ month(s). Which of the following is not a language commonly used for web programming? PHP Assembly Java Python Why is determining the AVR important How many times does the company expect the album to be downloaded in the 11th month? find expressions equivalent to -8(3x-2) Is it dangerous to remove gunpowder from firecracker If there was a disease that caused a person to lose the function of their Golgi complex, the direct outcome would be? (select the best answer) none of these are correct failure of endocytosis failure to allow for movement of proteins into a cell failure to move synthesized proteins out of a cell. The cell membrane (plasma membrane) of the animal is hydrophobic only hydrophilic only hydrophobic and hydrophilic neither hydrophobic or hydrophilic find the solution for the system of linear equations:y=3x+4 and y=x+2. explain how you found the solution