the three main protocols for encryption for 802.11 wireless networks are ____.

Answers

Answer 1

The three main protocols for encryption for 802.11 wireless networks are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and Wi-Fi Protected Access II (WPA2).Wired Equivalent Privacy (WEP) is a weak security protocol for wireless networking

. WEP is the first security protocol for Wi-Fi (Wireless Fidelity) routers and is not considered secure due to its weak encryption algorithm and security flaws.Wi-Fi Protected Access (WPA) is a security protocol created by the Wi-Fi Alliance to replace WEP. The Wi-Fi Alliance created WPA to enhance the security features of WEP without the need for additional hardware.Wi-Fi Protected Access II (WPA2) is the next generation of security protocol after WPA.

WPA2 is an upgrade to WPA and adds support for AES (Advanced Encryption Standard) and CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol).The above-mentioned protocols are the main encryption protocols used for 802.11 wireless networks. The purpose of these protocols is to secure wireless networks from unauthorized access and attacks.

To know more about protocol visit:

https://brainly.com/question/28782148

#SPJ11


Related Questions

Write a constructor with parameters self, num_mins and num_messages. Num_mins and num_messages should have a default value of 0.

Answers

Write a constructor with parameter

class Messaging:

txt = ""

first = 0

second = 0

 def __init__(self, num_mins=0, num_messages=0):

self.txt = input("Who's plan is this? ")

self.first = num_mins

 self.second = num_messages

 def print_Something(self):

       print(f"{self.txt} Mins: {self.first} Messages: {self.second}")

obj = Messaging(100, 100)

obj.print_Something()

If you want to change what's printed to the console, just manipulate the values in Messaging(). Leave them blank for 0.

To learn more about constructor refer to:

https://brainly.com/question/27727622

#SPJ4

A constructor is referred to as a parameterized constructor if it accepts a predetermined amount of parameters. to initialize class data members with unique values. An integer and a string are passed to the object in the example above.

How to constructor with parameter?

A constructor is referred to as a parameterized constructor if it accepts a predetermined amount of parameters. to initialize class data members with unique values. An integer and a string are passed to the object in the example above.

List of constructor parameters When creating an object, the constructor is employed. The majority of the effort involved in creating an object is completed automatically by Java.

class Messaging:

txt = ""

first = 0

second = 0

def __init__(self, num_mins=0, num_messages=0):

self.txt = input("Who's plan is this? ")

self.first = num_mins

self.second = num_messages

def print_Something(self):

print(f"{self.txt} Mins: {self.first} Messages: {self.second}")

obj = Messaging(100, 100)

obj.print_Something()

If you want to change what's printed to the console, just manipulate the values in Messaging(). Leave them blank for 0.

To learn more about constructor refer to:

brainly.com/question/27727622

#SPJ4

please convert this for loop into while loop

please convert this for loop into while loop

Answers

Answer:

The code segment was written in Python Programming Language;

The while loop equivalent is as follows:

i = 1

j = 1

while i < 6:

     while j < i + 1:

           print('*',end='')

           j = j + 1

     i = i + 1

     print()

Explanation:

(See attachment for proper format of the program)

In the given lines of code to while loop, the iterating variables i and j were initialised to i;

So, the equivalent program segment (in while loop) must also start by initialising both variables to 1;

i = 1

j = 1

The range of the outer iteration is, i = 1 to 6

The equivalent of this (using while loop) is

while ( i < 6)

Not to forget that variable i has been initialized to 1.

The range of the inner iteration is, j = 1 to i + 1;

The equivalent of this (using while loop) is

while ( j < i + 1)

Also, not to forget that variable j has been initialized to 1.

The two iteration is then followed by a print statement; print('*',end='')

After the print statement has been executed, the inner loop must be close (thus was done by the statement on line 6, j = j + 1)

As seen in the for loop statements, the outer loop was closed immediately after the inner loop;

The same is done in the while loop statement (on line 7)

The closure of the inner loop is followed by another print statement on line 7 (i = i + 1)

Both loops were followed by a print statement on line 8.

The output of both program is

*

*

*

*

*

please convert this for loop into while loop

How does the number of jobs in internet media compare to the number of jobs in tv broadcasting and print media?

Answers

The number of jobs in internet media is a lot when compare to the number of jobs in tv broadcasting and print media as people can now work remotely from home.

What is the role of media in entertainment?

The function of mass media in entertainment is mostly to get the people inform and also entertained.

Note that The number of jobs in internet media is increasing daily as people are creating a lot of content when compare to the number of jobs in tv broadcasting and print media as people can now work remotely from home.

Learn more about internet media from

https://brainly.com/question/13467876

#SPJ1

Answer:

There are more employees working in Internet media than print media, but TV broadcasting outnumbers them both

In recent years, there has been a significant shift towards online media consumption, leading to an increase in jobs in the internet media industry. While the number of jobs in traditional TV broadcasting and print media has decreased, they still have a considerable number of employees. However, the number of jobs in internet media has surpassed that of print media, but TV broadcasting still has more employees than internet media.

In the context of the text, how the does the article explore the costs and benefits of technology? Do you think new technology can reverse the damage done by past technology? Why or why not? Cite evidence from this text, your own experience, and other literature, art, or history in your answer.

Answers

Determining whether novel technology can counteract the detrimental consequences of prior engineering is challenging, and much depends on the specific technologies concerned, how extensive the damage may be, and other aspects.

How to explain the technology

However, it is possible that current inventions could contribute to allaying or even inverting some of the casualties of past technologies.

It should be noted that to illustrate, there are systems being created to filter carbon dioxide from the atmosphere, which might further combat climate change caused by the combustion of fossil fuels. Equally, progress in renewable energy innovations may help reduce our reliance upon non-renewable resources and decrease carbon emissions.

Learn more about Technology on

https://brainly.com/question/7788080

#SPJ1

at an irs printing facility, two processes may be used to print forms. process a involves a software setup time of 10 minutes and a run time of 2 seconds. process b involves a software setup time of 20 minutes and a run time of 1 second. what is the smallest batch size for which process b will result in a smaller total processing time than process a?

Answers

To find the smallest batch size where process B is faster than process A, we need to compare their total processing times. Process B's shorter run time makes it faster for batches of 1200 or more forms.

There are two methods that may be utilised to print forms at an IRS facility: process A and process B. Software setup for process A takes 10 minutes, and the run time is 2 seconds, while software setup for process B takes 20 minutes, and the run time is 1 second. We must compare their overall processing times in order to ascertain which technique is quicker for a specific batch size. Process B will be quicker than process A for batches of 1200 or more forms due to its lower run time. Thus, process A will be quicker if the batch size is less than 1200, whereas process B will be quicker if the batch size is 1200 or more.

learn more about processing times here:

https://brainly.com/question/29307330

#SPJ4

do you think fintechs, in general, will make trading markets more or less volatile? be specific and provide solid defense in your post for the position you take

Answers

I believe that overall FinTechs will reduce the volatility of trading markets in the future.

What does reduce volatility means?

Volatility is frequently used to describe the degree of risk or uncertainty associated with the magnitude of variations in a security's value. A security's value may potentially range over a wider range of values if its volatility is higher. This implies that the security's price can fluctuate sharply in either direction over a brief period of time. A security's value will not change significantly and will be more stable if its volatility is lower.

FinTechs employ technology to improve the function of finance and boost the effectiveness of operations in the financial and investing industries. Technology may be employed in financial trading, and it has a lot of benefits and conveniences to offer.

There are benefits in terms of efficiency, accessibility, cost effectiveness, and speed for different trading market participants. The settings and circumstances for market volatility are greatly diminished and diluted by the integration and convergence of all these components.

Additionally, a lot of FinTechs are using blockchain technology, which makes up for the shortcomings of the centralized system it replaces. It should be noted that one of the main causes of market volatility is the use of a centralized system. Blockchain is based on a decentralized system, which significantly reduces market volatility.

Additionally, FinTechs eliminate unnecessary legal and financial red tape, which enables the hosting of real-time secondary markets. FinTechs implement a safe and unquestionable infrastructure based on mathematical principles, which reduces the level of volatility in the trading markets.

Learn more about Volatility click here:

https://brainly.com/question/29394588

#SPJ4

which action allows you to copy a program icon to the taskbar?

Answers

The action that allows you to copy a program icon to the taskbar is called "pinning."

To pin a program icon to the taskbar, you need to follow these simple steps:

1. Locate the program icon that you want to pin to the taskbar. This can be done by searching for the program using the search bar or navigating to its location in the Start menu or on your desktop.
2. Right-click on the program icon.
3. In the context menu that appears, select "Pin to taskbar."

By performing this action, the program icon will now be copied and displayed on your taskbar, providing you with quick and easy access to the program. This feature is especially useful for frequently used applications, allowing you to launch them directly from the taskbar without having to search for the icon or navigate through menus.

To know more about the taskbar, click here;

https://brainly.com/question/31783966

#SPJ11

Write down a scratch program which:
performs the following tasks 5 times:
1. asks the user to input numbers
2. add the numbers in total variable
3. outputs the result

Answers

What computer language?

a network topology in which the central node is connected to two or more subordinate nodes that, in turn, are connected to other subordinate nodes.

Answers

A network structure known as a tree in which the major factor is linked to two or even more auxiliary nodes, which are then linked to other auxiliary nodes.

By topology, what do you mean?

The logical or physical arrangements of links and nodes within a network are referred to as its topology. One may contend that a network's architecture determines how its logic information is shared and how its devices connected are established.

Which are the five topologies of networks?

The variously shaped physical topologies include bus, star, rings, mesh, tree, & hybrid topologies. The functionality of a network can be directly impacted by its architecture.

To know more about topologie visit:

https://brainly.com/question/30354844

#SPJ1

is the principal means of obtaining secure remote access to a linux server?

Answers

The principal means of obtaining secure remote access to a Linux server is through SSH (Secure Shell) protocol.

SSH (Secure Shell) is the primary method for securely accessing a Linux server from a remote location. It provides a secure channel over an unsecured network, allowing users to securely log in to a remote system and execute commands. SSH encrypts all communication between the client and the server, ensuring confidentiality and integrity of the data transmitted.

One of the key advantages of SSH is its strong security measures. It uses cryptographic techniques to establish a secure connection, preventing unauthorized access and eavesdropping. SSH employs public-key cryptography, which involves generating a key pair consisting of a public key and a private key.

The server holds the public key, while the client possesses the private key. This asymmetric encryption ensures that only authorized clients with the correct private key can establish a connection.

Additionally, SSH supports various authentication methods, including password-based authentication and key-based authentication. Password authentication requires users to enter a username and password, while key-based authentication uses the previously mentioned key pair. Key-based authentication is generally considered more secure as it eliminates the risk of password interception or brute-force attacks.

SSH also allows for secure file transfer between the client and the server using protocols like SFTP (SSH File Transfer Protocol) or SCP (Secure Copy). These protocols encrypt the data during transmission, ensuring the confidentiality and integrity of transferred files.

Learn more about Linux server

brainly.com/question/32197199

#SPJ11

Games only recently became a part of human life—in about 1100 CE.

A.
True
B.
False

Answers

Answer:

B. False

Explanation:

Games have been around for a long time. The earliest games were played in ancient Egypt.

how to login qbo online?

Answers

To log in to QBO Online, go to the QBO Online login page, enter your login credentials (username and password), and click "Sign In."

Here's a more detailed explanation on how to log in to QBO Online:

Open your web browser and go to the QBO Online login page at https://qbo.intuit.com/.Enter your QBO Online login credentials (email or user ID and password) and click "Sign In."If you have two-factor authentication enabled, you will be prompted to enter the code sent to your phone or email.If you have forgotten your login credentials, click the "I forgot my user ID or password" link and follow the prompts to reset your login information.Once you are logged in, you will be taken to the QBO Online dashboard where you can manage your finances and access all the features of the software.

Learn more about QBO here:

https://brainly.com/question/27815312

#SPJ4

A camera must gather light rays and them on a light-sensitive material.​

Answers

A camera must gather light rays and focuses them on a light-sensitive material.​

What is the most sensitive part of the camera?

The most sensitive part of the camera is known as the digital sensor. This sensor captures the light coming from the lens to create an image. The digital sensor of a camera is one of its most delicate parts.

In photography, a device for recording an image of an object on a light-sensitive surface. It is essentially a light-tight box with an aperture to admit light focused onto a sensitized film or plate. Inside every lens is a mechanism to control the size of an opening, known as an aperture.

Therefore, a camera must gather light rays and focuses them on a light-sensitive material.​

To learn more about the principles of the camera, refer to the link:

https://brainly.com/question/1599886

#SPJ9

A menu that appears when an object is clicked with the right mouse button is called a tool-tip help menu
a. True
b. False

Answers

Answer:

False

Explanation:

It is just a pop-up bar

var w=20;
var h = 15;
rect (10, 10, w, h);
ellipse (10, 10, w, h);
How tall is each one of the shapes?

Answers

The rectangle is 20 units tall and the ellipse is 15 units tall.

How to calculate the height of each of the shapes?

The height of the rectangle is defined by the variable 'h' and is set to 15. The height of the ellipse is also defined by the variable 'h' and is set to 15. So the height of each shape is 15 units.

What is ellipse ?

An ellipse is a geometrical shape that is defined by the set of all points such that the sum of the distances from two fixed points (the foci) is constant. It can be thought of as an oval or a "squashed" circle. In the context of computer graphics and drawing, an ellipse is often used to represent the shape of an object or an area.

Learn more about ellipse in brainly.com/question/14281133

#SPJ1

There is a weird green and black kinda growth on my screen that moves when I squeeze the screen, it also looks kinda like a glitchy thing too,Please help

Answers

LCD stands for Liquid Crystal Display. So yes, what you're seeing is liquid. it's no longer contained where it needs to be.

How do u create a game

Answers

By making the software deciding what code u want what kind of character and settinf u want and also money and employees

48. an administrator installed a managed package that contains a permission set group. the permission set group that was installed includes delete access on several objects, and the administrator needs to prevent users in the permission set group from being able to delete records.what should the administrator do to control delete access?

Answers

To control delete access, the administrator should remove the "delete" permission from the permission set group. This will prevent users in the permission-set group from being able to delete records.

A permission set group is a collection of permission sets that are grouped together to make it easier to manage multiple permission sets at once. Permission set groups enable administrators to grant a specific set of permissions to a group of users. The permission set group contains one or more permission sets.

In Salesforce, delete access is permission to delete records. This permission grants users the ability to delete records from an object. If users have delete access, they can delete records from the object, but if they do not have delete access, they cannot delete records from the object.

To control delete access for users in a permission-set group, the administrator should remove the "delete" permission from the permission-set group. Here are the steps to do this:

From Setup, enter Permission Sets in the Quick Find box.Select Permission Sets.Click the permission set name.In the System Permissions section, click Edit.Scroll down to the object you want to modify and uncheck the "delete" permission.Click Save.

You can learn more about administrators at: brainly.com/question/29994801

#SPJ11

true | false: secondary storage is always non-volatile and permanent.

Answers

Yes, it’s true that secondary storage allows users to permanently save data on them since they always have non-volatile memory. Storage units that supplement the computer's primary storage, RAM, and cache memory are referred to as secondary storage devices.

The secondary memory is always a non-volatile memory. These memories also go under the moniker of internal memory. Secondary memory is often referred to as backup memory, extra memory, and auxiliary memory. Direct access to data is made by the processing unit.

The information that needs to be processed as well as the instructions are kept in the computer's memory.

Two types of memory exist Memory primary and secondary.

The main memory of the computer is its primary memory. Since the main memory is the internal storage of the computer, accessing data there is quicker.

All secondary storage systems with substantial data capacity are referred to as secondary memory.

To learn more about secondary storage click here:

brainly.com/question/86807

#SPJ4

what is the main purpose of the circulatory system

Answers

The network of blood vessels and the heart that carries blood throughout the body. This system helps tissues get the right amount of nutrients, oxygen, and waste disposal.

The most important component of the circulatory system?

The primary function of the circulatory system is to carry oxygen, nutrients, and hormones to the muscles, tissues, and organs throughout the body. Another role of the circulatory system is to remove waste from cells and organs so that your body can eliminate it.

What is the primary goal of this quiz about the circulatory system?

The circulatory system's job is to provide nutrients and oxygen to body cells while returning carbon dioxide and oxygen-poor blood to the heart and lungs.

To know more about circulatory system visit:-

https://brainly.com/question/29259710

#SPJ4

Atheel tests a program and gets a NameError. How can this be fixed?

Answers

Answer:

You can't call a function unless you've already defined it. Move the def createDirs(): block up to the top of your file, below the imports.

Explanation:

Some languages allow you to use functions before defining them. For example, javascript calls this "hoisting". But Python is not one of those languages.

Answer:

B = Create a variable

Explanation:

First off to understand this question, you need to understand what a NameError is. A NameError is when a function or variable isn't valid, or is not defined. So what you need to do it make a variable that is valid/defined. Therefore the answer is B create a variable

I hope this helps!

Which of the following statements is not true about variables?
They store values that can change as a program executes.
They are declared with the DECLARE statement.
They can be declared with an expression that's used as the default value.
They must have names that are different from the names of any columns used in any SELECT statement within the stored
program.

Answers

They store values that can change as a program executes is not true about variables. Hence option a is correct.

What are variables?

Variables are defined as a value that is subject to vary depending on external factors or input to the program. In any programming language, a variable is a designated chunk of computer memory with some data within.

An element cannot be taken away. A amount is represented by a variable. As a result, X is a quantity that is 1. Variables can only be defined once. The variable cannot be declared again once it has been defined. The overall variable costs vary directly as a function of activity level, or the quantity produced.

Thus, they store values that can change as a program executes is not true about variables. Hence option a is correct.  

To learn more about variables, refer to the link below:

https://brainly.com/question/17344045

#SPJ1

A(n) ______ bus is used to transfer information about where the data should reside in memory.

Answers

A School bus.......

Determining Correct Date Function What function text would you use to put today's date and time in a cell? 0 =TODAYO =NOWO O NOWO) O TODAYO​

Answers

The function text that would you use to put today's date and time in a cell is B. =NOW()

What is a Time and Date Function?

This refers to the command that is given to a computer in order for it to render the correct time and date in a given cell.

Hence, we can see that from the answer choices, the best one that factors in both TIME AND DATE is =NOW() which is option B while option A is for the function that shows only the current date.

Read more about date functions here:

https://brainly.com/question/19416819

#SPJ1

A group of small local businesses have joined together to share access to a cloud-based payment system. Which type of cloud is most likely being implemented?

Answers

The type of cloud that is most likely being implemented when a group of small local businesses has joined together to share access is community cloud service. The correct option is C.

What is cloud service?

Cloud services have a wide variety of services for companies and businesses. They provide applications and software with resources. They provide easy and affordable services.

Community cloud service is a shared type of cloud service that helps banks and heads of trading firms.

Thus, the correct option is C. Community.

To learn more about cloud service, refer to the below link:

https://brainly.com/question/24227961

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Public

Private

Community

Hybrid

Explain• Explain the Inputs and tools and techniques for determine budget with an example of London eye project and burj khalifa

Answers

Answer:

Cost baseline

Project funding requirements

Project resources

Updated project documents

Explanation:

London Eye project and Burj Khalifa are two of finest projects that have been successful in the world. The main reason for their success was well defined planning and accurate budgeting. The input and tools for budgeting are formulation of resource requirements. These resources are financial and human capital which is required to complete the project. The project resources allocation is a major point of concern. Inappropriately allocated resources progress towards failure of project.

Consider the following code:
Using Python
x = 19
y = 5
print (x % y)
What is output?

Answers

In python the % operator is modulo. Modulo returns the remainder of two numbers.

19 % 5 = 4 therefore,

print(x%y) would output 4

Using Python, the output of the code will be 4. The explanation of the problem is shown below.

What is Python?

Python is a high-level, interpreted programming language that was first released in 1991 by Guido van Rossum. It is a general-purpose language that can be used for a wide variety of applications, including web development, scientific computing, data analysis, artificial intelligence, machine learning, and more.

Python is known for its simplicity and readability, making it easy to learn and use. Its syntax is designed to be concise and expressive.The % operator in Python returns the remainder of the division of two numbers.

In this case, x % y is equivalent to 19 % 5, which is 4 since 19 divided by 5 is 3 with a remainder of 4. The print function is used to display the value of the expression x % y on the screen.

Learn more about Python, here:

https://brainly.com/question/30391554

#SPJ3

Anyone here have Tik Tok?I'm just curious. :) my acc is alexlpark1fanaccount btw thanks!

Answers

Haircut is my name on tictok

Answer: oh. Okay..

Explanation:

___________ arrays allow us to reference items in arrays using strings rather than numeric values.

Answers

The answer to your question is associative arrays. Associative arrays allow us to reference items in arrays using strings instead of numeric values.

In traditional arrays, elements are accessed using numeric indices, starting from 0. However, associative arrays, also known as key-value pairs, allow us to use strings as keys to access the corresponding values. This provides more flexibility and readability in our code, as we can use descriptive strings instead of arbitrary numeric indices.

For example, instead of accessing an element using `$array[0]`, we can use `$array['key']`. This makes the code more intuitive and easier to understand, especially when dealing with large arrays.

To use associative arrays, we simply assign values to specific keys. We can then access these values by referencing the keys. Associative arrays are commonly used in programming languages like PHP and JavaScript.

Know more about associative arrays here:

https://brainly.com/question/33548120

#SPJ11

What is the missing line of code?
>>> answer = "happy birthday"
>>> _____
'Happy birthday'

Answers

Answer:

answer = "happy birthday"

answer = answer.capitalize()

print(answer)

Explanation:

Other Questions
Can enemies become friends? In war, is there room for empathy / compassion /understanding so that soldiers can see each other as persons and not targets to be killed? List two ways cities affect the surrounding regions. In other words, whenbegin to develop, how does that hurt the area around the city? If you mutated the laci gene resulting in a mutant lac repressor protein that could bind to the lac operator but not to allolactose, what would be the consequence for transcription of the lac operon?. eory.According to cell theory, which of the following aremade of cells? Check all that apply.O flowersrocksbloodwaterbacteriasugarskinRETRY Describe the arrangement and movement of sodium chloride If m = 12 and n = 11, what is n + m? if the marginal propensity to consume (mpc) is 0.50, the value of the spending multiplier is: how many mL are in there in 1,252 L? How will opportunities at purdue support your interests, both in and out of the classroom?. HELP ME WITH THIS PLEASEE AND THANKSS Determine the upper-tail critical value ta/2 in each of the following circumstances. a. 1 - a=0.95, n = 17 b. 1 - a=0.99, n = 17 c. 1 - a=0.95, n = 36 d. 1 - a=0.95, n = 52 e. 1 - a=0.90, n = 9Critical Values of t. For a particular number of degrees of freedom, entry represents the critical value of t corresponding to the cumulative probability 1 minus alpha and a specified upper-tail area alpha. A certain bookstore chain has two stores, one in San Francisco and one in Los Angeles. It stocks three kinds of books: hardcover, softcover, and plastic (for infants). At the beginning of January, the central computer showed the following books in stock. Hard Soft PlasticSan Francisco 1,000 3,000 6,000Los Angeles 1,000 6,000 3,000Its sales in January were as follows: 700 hardcover books, 1,200 softcover books, and 2,000 plastic books sold in San Francisco, and 400 hardcover, 200 softcover, and 500 plastic books sold in Los Angeles. The bookstore chain actually maintained the same sales figures for the first 6 months of the year. Each month, the chain restocked the stores from its warehouse by shipping 600 hardcover, 1,500 softcover, and 1,500 plastic books to San Francisco and 500 hardcover, 500 softcover, and 500 plastic books to Los Angeles. Required:a. Use matrix operations to determine the total sales over the 6 months, broken down by store and type of book.b. Use matrix operations to determine the inventory in each store at the end of June. 40PT! - Mathematical Proofs: Practice Save and ExitSelect the correct answer from each drop-down menu.Options for first box - transitive property, subtraction property of equality, segment addition, substitution property of equalityOptions for second box - AC does not equal XZ, AC equals XZ, AB equals YZ,AB does not equal YZThankyou! please help me!!how can I make this flow better?-------------------------------------------------------Finally, the Roman empire was affected when the city of Pompeii was destroyed by Mount Vesuvius.The eruption was significantly worse than what it is thought to have been. Pompeii was an important city to Rome because it was a major trading area them. We have learned so much about the Roman lifestyle and life during the eruption due to the ash preserving everything. 1-7 blanks plz help its due soon! What is 20 times 4 thousand Dane sold a television for $35,000.He was paid $1750 in commission forhis sale. At what rate was he paidcommission for the television? Briefly describe two Renaissance advances in painting techniques. Yasmin purchased 6 heads of cabbage that each weighed 2 (3/8) pounds. How much did the cabbage weigh all together? pls help fastttttttttttttttttt Use the long division method to find the result when 12x3 + 4x2 - 23x + 10 isdivided by 3x 2.-