All of the following relate to securing assets EXCEPT:
a. Access to networks
b. Access to end-user devices
c. How third-party vendors ensure security
d. The ease with which the system runs after a failure is corrected
e. Access to servers

Answers

Answer 1

1 a system that often holds the middle tier of a multiple tier system.

 

Usually found on mainframe:  these are found in the legacy systems. As they are used in computers

Old systems that often require hard to use command languages:

Programs are developed by writing instructions in commands , but in legacy it is hard to use

System that most often have detailed information that can be accessed by a system at a higher tier:

Yes it is true , found in all systems Not only in legacy systems.

2) The ease with which the system runs after a failure is corrected

Access to networks: It is security to devices . If no security then it will lead to thread.

Access to end user devices: anyone is using the device can access the information and change. To avoid these threads security to end user DEVICES.

How thrid party vendors ensure security: Security for the thrid party users like controls reports and auditing

Access to servers: it covers all the important data and server resources.

Conclusion:

1. A legacy system is all of the following EXCEPT:

    A system that often holds the middle tier of a multiple-tier system.

2. All of the following relate to securing assets EXCEPT:

   The ease with which the system runs after a failure is corrected.

Answer 2

The option that show a statement that did not relate to securing assets is (a) access to networks .

What is assets and why it is important to secure?

Assets in programming is a folder contains critical information about the website.  To make sure the security of the website, the developer has to ensure all the permitted data to assets is secure. Because of the data that flow the assets are the data from third party, data from end-user and compiler. All of this access need to be checked or secure. The most common way to secure in VMC model are:

Create end-user point for securing assets from end-userCreate server filter for securing assets from any direct access to the serverLearn about stability of third party securityDo not show error message in a run website instead of developing mode.

Learn more about web development here

https://brainly.com/question/13261383

#SPJ4


Related Questions

What is Object Query Language?

Answers

Answer:

Object Query Language is a query language standard for object-oriented databases modeled after SQL and developed by the Object Data Management Group.

Any task a computer performs is called a

Answers

Any task a computer performs is called a process.

About process (computer)

In computing, a process is an object instance of a computer program being executed by one or more threads. It contains the program code along with the activities being performed. An operating system can set a process that consists of several threads execution to run concurrently.

A computer program is a (passive) collection of computer commands, while a process is the actual work of these instructions. Several processes can run from the same program, for example creating multiple instances of the same program usually results in more than one running process.

Dual assignment is a way to allow multiple processes to share a processor (UPS) and system data sources. Each processor core (UPS) performs one task at a time. However, multitasking allows the processor to switch to another task that is currently in progress without having to wait for each task to complete. Task switching can be done when the task is waiting for an input/output operation, when the task is marked as mutable, or when there is a hardware interrupt depending on the operating system implementation.

The general form of multiple assignment is time sharing. Time sharing is a method for increasing the responsiveness of an interactive application. In a time-sharing system, context switching is done quickly so that it seems as if many processes are running simultaneously by the same processor. This is called concurrency.

Learn more about computer processing at https://brainly.com/question/17033890.

#SPJ4

what is the number base of the binary number system?

Answers

2 is the number base of the binary system

how to recover permanently deleted photos on iphone

Answers

Answer:

we can recover it by checking the trash on the phone

what process prepares a hard drive for use by an operating system?

Answers

Prepares a hard drive for use by an operating system is called Disk Formatting process. This process can be applied to magnetic-platter hard drives and solid-state drives.

Disk formatting is a process to prepare a hard drive for use by an operating system. This process can be applied to magnetic-platter hard drives and solid-state drives. By doing this process, the hard drive can be recognized by the operating system, and as a result, the hard drive can be used for storing data.

The following are three parts of the disk formatting process:

a. The formatting comprises low-level formatting.

→ Low-level formatting helps get the storage media's physical structure ready.

b. Partitioning process

→ The hard drive is divided into logical volumes to store data.

c. High-level formatting

→ In the logical volume or inside the disk partition, high-level formatting contributes in the creation of the file system format.

Here to learn more about Disk Formatting Process:

https://brainly.com/question/4716593

#SPJ4

Codio 3. 1. Count from 0 to N

We will pass in a value, N. You should write a program that outputs all values from 0 up to an including N.

Answers

A program that outputs all values from 0 up to an including N is given below:

#import required package

import sys

#get the command line argument

#and store the n value

N = int(sys.argv[1])

#use a temporary value

i=0

#use while loop to compare n

#and iteration value

while i<=N:

   #print the value i

   print(i)

   #increment i value

   i+=1

A computer utilises a collection of instructions called a programme to carry out a particular task. A program is like the recipe for a computer, to use an analogy. It includes a list of components (called variables, which can stand for text, graphics, or numeric data) and a list of instructions (called statements), which instruct the computer on how to carry out a certain activity.

Specific programming languages, such C++, Python, and Ruby, are used to construct programmes. These are high-level, legible programming languages.

Learn more about Program here:

https://brainly.com/question/14618533

#SPJ4

Which algorithms has worst time complexity?

Answers

The best, average, and worst cases of Quicksort's temporal complexity are O(n log n), O(n log n), and O(n log n), respectively. But because it performs the best in the majority of average input cases.

Which sorting method has the highest complexity?

A trustworthy sorting algorithm is the bubble sort. The worst-case temporal complexity of this algorithm is O. (n2). The space complexity of the bubble sort is O. (1). The number of inversion pairs in the provided array is equal to the number of swaps in bubble sort.

What are the of highest possible complexity?

The complexity of a bubble sort is O(n2) in the worst case and O in the best scenario (n). Explanation: When Item is the last element, the worst case scenario in a linear search process occurs.

To know more about algorithm visit:-

https://brainly.com/question/22984934

#SPJ4

date procedures are often more software-specific than other sql procedures.:T/F

Answers

True, date procedures frequently require software that is more specialized than other SQL processes.

How can you avoid running the same SQL query twice?

You can also use the SQL RANK feature to get rid of duplicate rows, according to Delete Duplicate Rows in SQL. The SQL RANK function always produces a distinct row ID for each row, regardless of duplicate rows. Max, Min, and AVG are examples of aggregate functions that you must utilize while performing computations on data.

How can SQL Server duplication be avoided?

Right-click the table that contains the field in the Navigation Pane and select Design View from the menu that appears. Choose the field whose values should all be unique. On the General tab of the Field Properties pane, which is located at the bottom of the Table Design view.

To know more about SQL query visit:-

https://brainly.com/question/14994763

#SPJ4

15.2.6 Configure a Data Backup
You recently upgraded the Exec system from Windows 7 to Windows 10. You need to implement backups to protect valuable data. You would also like to keep a Windows 7-compatible backup of ITAdmin for good measure.

In this lab, your task is to complete the following:
Configure a Windows 7-compatible backup on ITAdmin using the following settings:
Save the backup to the Backup (D:) volume.
Back up all of the users' data files.
Back up the C: volume.
Include a system image for the C: volume.
Do not set a schedule for regular backups.
Make a backup.
Configure the Exec system to create Windows 10-compatible backups using the following settings:
Save the backup to the Backup (E:) volume.
Back up files daily.
Keep files for 6 months.
Back up the entire Data (D:) volume.
Make a backup now.

Answers

Extracting configuration settings from a system and writing them to disc is the process of creating a configuration backup. The system's backup configuration data files are used in the configuration restore procedure to restore a particular system configuration.

How is a data backup server configured?

After opening the Dashboard, select the Devices tab. To select your server in the List view, click it. Click Set up Server Backup in the Tasks pane. Click Customize Backup for the server if you wish to modify the current backup configuration.

What three different types of backups are there?

Full backups, incremental backups, and differential backups are the most typical backup kinds. Mirroring and synthetic full backups are additional backup types.

To know more about configuration settings visit :-

https://brainly.com/question/20374233

#SPJ4

How can I hide computer cables

Answers

Answer:

Use cable ties.

Get a basket.

Try a cable sleeve.

Rugs to the rescue.

Add a cable box to your desk.

Take advantage of furniture legs.

Stow cables away in cabinets.

Consider a cord cover.

Explanation:

all of the following are helpful

Which companies are Accenture's top two competitors in cloud services and why?

Answers

The leading IT companies that compete with Accenture's are McKinsey & Company, Boston Consulting Group, and Bain & Company.

The cloud makes extensive use of multi-tenancy models. This suggests that several users are using the same program. As a result, several users, or "tenants," can alter the application to meet their particular needs without having to make separate copies of it for every single one of them. Cloud platforms offer flexibility.

What distinguishes Accenture from other consulting companies?

You will engage with people from many various backgrounds and nations thanks to Accenture's "One Global Network" and emphasis on cultural diversity as a facilitator of great organizational performance. Your perspective will be widened, and it will improve your consulting abilities.

To know more about Accenture's visit:-

https://brainly.com/question/30059249

#SPJ4

Which of the following is not true about grid computing?
Only desktop or laptop computers are powerful enough to be used for grid computing.
It is also known as distributed computing.
It is a much-less expensive method of obtaining near-supercomputer power.
It is used by many non-profit organizations.

Answers

Only desktop or laptop computers are powerful enough to be used for grid computing.

Grid computing is a method of distributed computing where resources from multiple computers are connected together to solve a problem. These resources can include servers, supercomputers, and even desktop and laptop computers. Grid computing can be used to harness the power of many different types of devices and devices with varying levels of processing power.

It is also known as distributed computing.

It is a much less expensive method of obtaining near-supercomputer power.

It is used by many non-profit organizations. All of the above are true statements about grid computing.

Learn more about grid computing here: https://brainly.com/question/15707178

#SPJ4

Find the General Structure of a C# Program. Copy and paste the general skeleton here:

Answers

The General Structure of a C# Program will be:

// A skeleton of a C# program

using System;

// Your program starts here:

Console.WriteLine("Hello world!");

namespace YourNamespace

{

   class YourClass

   {

   }

   struct YourStruct

   {

   }

   interface IYourInterface

   {

   }

   delegate int YourDelegate();

   enum YourEnum

   {

   }

   namespace YourNestedNamespace

   {

       struct YourStruct

       {

       }

What is a C program?

Microsoft created the programming language C-Sharp, which utilizes the.NET Framework. Web apps, desktop apps, mobile apps, games, and a lot more are all created with C#.

In this case, the basic organization of a C# Program is given above.

Learn more about program in:

https://brainly.com/question/26642771

#SPJ1

Which of the following terms specifically refers to images which are stored as a set of digital values called pixels

Answers

Raster image is the correct term for an image which is stored using pixels

What exactly is a raster image?

Raster Pictures are the images that are created while scanning or photographing an item. Raster pictures are created by combining pixels, or small dots, each of which has unique color and tone information. Raster pictures are resolution dependant since they are pixel-based.

A raster (or bitmap) picture is defined by an array or map of bits contained within a rectangular grid of pixels or dots. Lines, forms, and other graphic image components are used to describe vector graphics, which are saved in a format that includes geometric formulae for displaying the picture parts.

To learn more about raster image to refer:

https://brainly.com/question/28251771

#SPJ4

I need help with this really bad!!​

Answers

Answer:

open

Explanation:

OK so you have $2190.00 of income each month. you was saving 100$ each month and now need 300$ each month which will leave you with $1890 towards bills. so ideally you need to remove non-needed expenses. realistically you can lower such savings but that's not the source. so lets do:
rent- keep its important
$600

=$1290

car payment, insurance, gas- keep, gotta go to work
$475

=$815

renters insurance- needed, very much

$20

=$795

utilities- keep,yet change u need lights, heat, water, garbage but not the most expensive internet plan. so lets do

$200

=$595

groceries, u need food but can be adjusted

$200

=$395

entertainment- not need but useful, can be adjusted

$35

=$360

wanting a new computer, not needed as bad as anything, however you still have enough for 50 for the PC so

$50

= $310

discretionary spending(non essential spending)- this is to spend money on what u want, not need and can be modified at any price

$75

=$235

So all in all after deducting the 300$ for savings straight from monthly income, you still have 235$ worth left over to either save or add to any other expenses

i hope this helps pretty good, maybe you can do more adjusting and figure something new out

what type of social engineering targets senior officialsa. Phishingb. Spear phishingc. Whalingd. ScienceDirect

Answers

Similar to spear phishing, whaling is a type of targeted phishing scam. Social engineers target higher-value targets like CEOs and CFOs when whaling, as opposed to the typical user.

The most likely victim of social engineering is who?

Social engineering attacks target more than simply your personal data. They usually aim for your company or place of employment in order to steal critical data.

What is social engineering when tailgating?

Tailgating is a type of social engineering assault in which an unauthorized individual physically gets entry to a restricted area, maybe one that is password-protected, where they may steal confidential data, cause property damage, compromise user credentials, or even infect machines with malware.

To know more about engineering visit:-

https://brainly.com/question/14094488

#SPJ4

1. Vulnerability Scanner?
2. Ping Scanner?
3. Port Scanner?
4. Network Mapper?
5. Password Cracker?

Answers

The process of finding, evaluating, and reporting on security defects and vulnerabilities is known as vulnerability scanning. To find potential risk exposures and attack vectors throughout an organization's networks, hardware, software, and systems, vulnerability scans are carried out using automated vulnerability scanning technologies.

What sort of vulnerability scanner is an example?

OpenVAS, a system that is free and open source, is a fantastic example of a network vulnerability scanner. This open source software is a part of our collection of hosted online vulnerability scanners. The commercial Nessus and NexPose from Rapid7 are two other well-known examples.

What are the four categories of vulnerability?

The four sorts of vulnerability are physical vulnerability, economic vulnerability, social vulnerability, and environmental vulnerability. These categories are based on the many types of losses.

To know more about vulnerability scanning visit :-

https://brainly.com/question/29853954

#SPJ4

16.
Communication is communication that takes place on the job.
a. Social
b. Professional
c. School
that stands for an idea

Answers

Answer:

a

Explanation: emergence of verbal and nonverbal skills, social interaction, and social cognition.

non-record materials can be comingled with official agency records.

Answers

The statement is true. Non-record materials can be comingled with official agency records because they are not considered official records and do not need to be preserved for a specific period of time or retained for historical or legal reasons.

Non-record materials are items that do not need to be retained for any specific period of time and can be discarded when they are no longer needed. Examples of non-record materials include duplicate copies, drafts, and personal papers. They may include emails, documents, and other materials that are used for reference or informational purposes, but not for the conduct of agency business.

Here is the complete question.

Non-record materials can be comingled with official agency records. True/False.

For further information about agency record, kindly check: https://brainly.com/question/29679099

#SPJ4

/* This program draws a big tower from Karel's starting spot */public class BigTowerKarel extends SuperKarel{public void run()

Answers

The programming for drawing Big Tower from karel's starting spot is given below detailed

/* From Karel's starting position, this programme creates a large tower/

function start(){

if (facingWest()){

turnRight();

}

if (facingSouth()){

turnAround();

}

if (facingEast()){

turnLeft();

}

while(noBallsPresent()){

putBall();

if (frontIsClear()){

move();

}

}

}

function sMart() {

turnLeft();

}

function oK() {

turnRight();

}

Computer programming is the process of creating code that facilitates and directs specified activities in a computer, application, or software programme. Professionals who write and test code that enables apps and software programmes to run effectively are known as computer programmers. They produce instructions for a computer to perform.

Computers are able to do astonishing tasks, from modest laptops with word processing and spreadsheet capabilities to highly complicated supercomputers that handle millions of financial transactions every day and manage the infrastructure that supports contemporary life.

Learn more about Programming here:

https://brainly.com/question/11023419

#SPJ4

Select the correct answer.
Ivan has purchased new hardware to improve his gaming experience by making scenes move more smoothly. What has he purchased?
O A.
OB.
OC.
OD.
a new monitor
a new graphics card
a sound card
a solid-state device

Answers

Ivan has purchased new hardware to improve his gaming experience by making scenes move more smoothly. He has purchased a new graphics card

How could the graphics card help?

A graphics card, also known as a video card or GPU, is a piece of hardware that is responsible for rendering images and videos on a computer.

In a gaming context, a powerful graphics card can greatly enhance the visual experience by increasing the frame rate, resolution, and overall quality of the graphics.

A powerful graphics card can process these elements quickly and efficiently, resulting in a higher frame rate and a smoother overall gaming experience.

Read more about graphics card here:

https://brainly.com/question/30187303

#SPJ1

Selena is beginning a job search, and she needs some advice. What would experts say is the MOST helpful first step she should take in this process?

A.
Learn about herself so she can select jobs that are a good fit for her.

B.
Hire a professional writer to help her create a beautiful resume.

C.
Write several drafts of a cover letter so friends can select the best one.

D.
Fill out job applications for any job opening to get interview experience

Answers

The most crucial aspect of interview preparation is rehearsing how to respond to possible interview questions.

What are the top four things you need to have done to get ready for an interview?

Use the STAR technique to provide answers to questions. Make a friend your practise partner for answering questions. Bring some samples of your work with you. The night before your interview, decide what to wear.

What kind of an initial impact are you hoping to create?

People are more likely to feel at ease around you if their initial impression of you is one of friendliness, competence, and reliability.

To know more about technique visit:-

https://brainly.com/question/30078437

#SPJ1

. Which tag would create the largest text in HTML?
*
A) h1
B) h3
C) h5
D) h6

Answers

Answer:

H1

Explanation:

Out of my time trying to create websites. I've only used H1 for my large text. I could still be wrong though, but this is my answer to the question.

Which career involves analyzing various factors that influence the customer decision making process

Answers

A career that involves analyzing various factors that influence the customer decision making process is called Market Research.

What is Market Research?

Market research analysts study market conditions to examine potential sales of a product or service. They help companies understand what products people want, who will buy them, and at what price.

They also help companies understand how customers use products or services, what changes they would like to see, and what their competitors are doing.

Therefore,  Market research analysts use this information to help companies make more informed business decisions. They also help companies identify and develop new products or services and improve existing ones, and they can help companies decide where to locate new facilities and how to target new customers.

Learn more about customer decision making from

https://brainly.com/question/23176347

#SPJ1

You are a network technician for a small corporate network. Today you moved an unused workstation to the IT Administration office, and now you need to connect the computer to the Ethernet local area network and the internet.

Answers

Connect the patch panel and switch in the networking closet as follows: Spread out Cables on the Shelf. The Ethernet twisted pair cable should be chosen. Drag the connector from the Selected Component pane to the IT Adm port on the patch panel. Drag the additional connector to switch port 5 from the Selected Component pane.

What is necessary to connect a workstation to a network effectively?

In order to connect many computers and other devices to a single Internet connection, also referred to as a home network, you need a router, which is a hardware device.

Why would someone utilize an RJ11 connector?

In analog telephony, RJ11 was frequently used to link the phone device and the cable.

To know more about Ethernet visit :-

https://brainly.com/question/14622272

#SPJ4

Shelley works in a dental office as an administrative assistant and uses a desktop computer for scheduling appointments. What type of keyboard is she most likely to use?.

Answers

according to the question A mechanical keyboard is the one that Shelley is most likely to utilize.

What is mechanical keyboard?

In addition to a wide range of customization possibilities for look and feel, mechanical keyboards provide a noticeably more pleasant typing experience. They are also more robust and simple to fix.

With mechanical keyboards, signal transmission to your computer frequently just requires a half-press of a key, making typing quicker and simpler.

She is an assistant and makes use of a desktop computer to make reservations, hence a mechanical keyboard will be employed in this instance. She refused to utilize virtual keyboards, computers, or tablets. A mechanical keyboard is the one that Shelley is most likely to utilize.

To learn more about mechanical keyboard refer :

brainly.com/question/28866303

#SPJ4

An Introduction to Management Science 13th Edition Solutions Manuals?

Answers

An Introduction to Management Science, 13th Edition Solutions Manual is a guidebook that provides step-by-step solutions to the problems and exercises found in the textbook "An Introduction to Management Science," 13th edition.

 

This manual serves as a useful tool for students, instructors, and professionals who are using the textbook as a resource for learning or teaching management science. The solution manual provides detailed explanations and examples that help to clarify and reinforce the concepts presented in the textbook. It also allows users to check their work and understand where they might have made mistakes. Overall, the An Introduction to Management Science, 13th Edition Solutions Manual is a valuable resource that can help users better understand and apply the concepts of management science.

Learn more about scientific management here: brainly.com/question/13191706

#SPJ4

Hi! Just want to know a cool name suggestion for a game I'm making, I have two options and which one do you think is better?
"CatLit" or "Jumpy Kitty" as the name of a game (quick desc: its an endless game where a cat jumps without stop and aims to move from one block to another while the background scrolls as you go further up, if the cat falls of the screen and has 0 out of 5 lives = gameover)

Answers

Answer:

I like Jumpy Kitty. I think its cute!

Explanation:

Cool that your making a game! Hope it comes out great!

Answer:

I think kitty jump would sound better

Explanation:

because it is an endless game where a cat jumps without stopping

The correct banner for unclassified documents with cui is?

Answers

For unclassified information contained in CUI papers or materials, the unclassified marking "(U)" must be used as a section marking.

What is the proper banner labeling with CUI for unclassified documents?At the very least, the CUI banner marking of "CONTROLLED" or "CUI" must be shown in the top center of any page containing CUI. There are two forward slashes (//) between each marking.Indicates that the section includes Uncontrolled Unclassified Information by placing parenthesis around it. CUI Segment Markings must be used across the whole document and are inserted at the start of the portion to which they pertain.For unclassified information contained in CUI papers or materials, the unclassified marking "(U)" must be used as a section marking. In compliance with the June 4, 2019 ISOO letter, only unclassified information shall be tagged with the "Unclassified" or "(U)" designation in banners, footers, and section marking.

To learn more about CUI refer to:

https://brainly.com/question/29872687

#SPJ4

"Module was compiled with an incompatible version of Kotlin. The binary version of its metadata is 1.5.1, expected version is 1.1.16"
Is it about updating the module? Then how to update it?

Answers

This error message is indicating that a module (a collection of code that provides a specific functionality) in your project was built using a different version of the Kotlin programming language than the version that your project is currently using. Specifically, the module was built with version 1.5.1 of Kotlin and your project is expecting version 1.1.16.

You can update it by follow this steps:

Updating the Kotlin version in your project's build.gradle file.Updating the Kotlin version in the module's build.gradle file.Re-compiling the module with the correct version of Kotlin.Replacing the module with a version that is compatible with your project's Kotlin version.You can check the documentation of the module and your project to see the supported version of Kotlin.

To fix this issue, you will need to update the module to use the same version of Kotlin as your project, or update your project to use the same version of Kotlin as the module. The specific steps to do this will depend on your project's setup and the module in question.

Learn more about Kotlin, here https://brainly.com/question/28078090

#SPJ4

Other Questions
what is good and bad? Math Teacher is giving extra credit to who ever can come up with the best theme for his kids birthday party!!!Has to be a movie!You can chooseA. Hunger GamesB. Men in BlackC. Classic Horror MoviesD. Jurassic ParkOR!!Awnser With your own suggestion!!!!!!! Which short story do you imagine would require the most research on its historical and cultural context? A. a short story set in Alabama in the 1940s B. a short story set in Ethiopia in 1990 C. a short story set in France in 1730 D. depends upon the reader and his/her prior knowledge complete inequality for a graph b. -2 + 3x = -(x + 6)Solve for x plz answer. 6-x=13. please tell fast plzzzzzz 316 students went on a field trip. Six buses were filled and 10 students traveled in cars. How many studentswere in each bus? Scientist use capital letters (H) and lowercase letters (h) to represent genes. What typeof gene is represented by a capital letter?ExpressiveO RegressiveO DominantRecessivePreviousNext > Your school club is selling hotdogs at a basketball game. The supplies cost $120. You charge $2.50 for each hotdog. Write a function you can use for finding the profit y for selling x number of hotdogs. Determine if the point (4, -3) is a solutionto the following system:x - y = 4.2x + y = 5Determine if the point (4,-3) is a solution fault generally occurs at a transform boundary. O A. normal OB. strike-slip O C. thrust O D. reverse The coordinates of the vertices of UVW are U(2,1), V(2,1), and W(2,8). Find the side lengths to the nearest hundredth and the angle measures to the nearest degree. PLEASE HELP!! WILL MAKE BRAINLIEST!! What is..... 3.064 x 1,000 20 POINTS!! WILL GIVE BRAINLY!! how much metal is needed to cast a cubical metal box with outer side 10 inches long if the thickness of its walls should be exactly 2 inches? FINISH THIS SENTANCEThere was this blind man, right? He Was feeling his way down the street with this stick, i just need helppppp Susan said, if I fertilize my geranium plants, they will blossom 1. Listen to Elvis Presley's recording of "Hound Dog," which uses blues changes. Do the changes occur in the expected places? Is the text in typical blues form? Does the song use a twelve-measure phrase? Now listen to Bill Haley's "Rock Around the Clock," and answer the same questions.2. Find examples of the three rhythm patterns mentioned in this chapter. Are there other typical rock 'n' roll characteristics you can discover? List them.3. What sort of dances did the young rock 'n' rollers do? See if you can learn to do the twist. Were these dances mostly couple dances or solo dances?I NEED THE ANSWERS URGENTLY!!!! WILL AWARD BRAINLIEST A rectangle has a length of (x + 6) units and a width of (x - 5) units. What is the area of the rectangle in terms of x?