Need help ASAP!

Which of the following statements is true?

1) A PCAP format is handy because there is no additional tool to read it.
2) Network traffic can be captured using the Tcpdump protocol analyzer.
3) Normally, traffic inside a network is recorded within a capture file.
4) Sniffer is a program to save the network capture to a specific format.

Answers

Answer 1

The statement that  is true is that  Network traffic can be captured using the Tcpdump protocol analyzer.

How is network traffic captured?

Network traffic can be taken in using the Tcpdump. This is known to be a kind of packet sniffer that is often used to look and record network traffic on an interface.

An example is when a person capture 1,000 packets through the use of tcpdump. One can then analyze network traffic by using actual network traffic analyzer, which is as Wireshark.

Learn more about Network traffic from

https://brainly.com/question/26199042


Related Questions

Mice can be connected to a computer using the _________ or ________ port.​

Answers

Bluetooth or USB port

We will find an video named????
Help us and select once name.
Complete: B__in___t

Answers

Beint cause its cool yea yea
Beinlit (pronounced ben-in-lit)

Given two regular expressions r1 and r2, construct a decision procedure to determine whether the language of r1 is contained in the language r2; that is, the language of r1 is a subset of the language of r2.

Answers

Answer:

Test if L(M1-2) is empty.

Construct FA M2-1 from M1 and M2 which recognizes the language L(>M2) - L(>M1).

COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.

Test if L(M2-1) is empty.

Answer yes if and only if both answers were yes.

Explanation:

An algorithm must be guaranteed to halt after a finite number of steps.

Each step of the algorithm must be well specified (deterministic rather than non-deterministic).

Three basic problems:

Given an FA M and an input x, does M accept x?

Is x in L(M)

Given an FA M, is there a string that it accepts?

Is L(M) the empty set?

Given an FA M, is L(M) finite?

Algorithm for determining if M accepts x.

Simply execute M on x.

Output yes if we end up at an accepting state.

This algorithm clearly halts after a finite number of steps, and it is well specified.

This algorithm is also clearly correct.

Testing if L(M) is empty.

Incorrect "Algorithm"

Simulate M on all strings x.

Output yes if and only if all strings are rejected.

The "algorithm" is well specified, and it is also clearly correct.

However, this is not an algorithm because there are an infinite number of strings to simulate M on, and thus it is not guaranteed to halt in a finite amount of time.

COMMENT: Note we use the algorithm for the first problem as a subroutine; you must think in this fashion to solve the problems we will ask.

Correct Algorithm

Simulate M on all strings of length between 0 and n-1 where M has n states.

Output no if and only if all strings are rejected.

Otherwise output yes.

This algorithm clearly halts after a finite number of steps, and it is well specified.

The correctness of the algorithm follows from the fact that if M accepts any strings, it must accept one of length at most n-1.

Suppose this is not true; that is, L(M) is not empty but the shortest string accepted by M has a length of at least n.

Let x be the shortest string accepted by M where |x| > n-1.

Using the Pumping Lemma, we know that there must be a "loop" in x which can be pumped 0 times to create a shorter string in L.

This is a contradiction and the result follows.

COMMENT: There are more efficient algorithms, but we won't get into that.

Testing if L(M) is finite

Incorrect "Algorithm"

Simulate M on all strings x.

Output yes if and only if there are a finite number of yes answers.

This "algorithm" is well specified and correct.

However, this is not an algorithm because there are an infinite number of strings to simulate M on, and thus it is not guaranteed to halt in a finite amount of time.

COMMENT: Note we again use the algorithm for the first problem as a subroutine.

Correct Algorithm

Simulate M on all strings of length between n and 2n-1 where M has n states.

Output yes if and only if no string is accepted.

Otherwise output no.

This algorithm clearly halts after a finite number of steps, and it is well specified.

The correctness of the algorithm follows from the fact that if M accepts an infinite number of strings, it must accept one of length between n and 2n-1.

This builds on the idea that if M accepts an infinite number of strings, there must be a "loop" that can be pumped.

This loop must have length at most n.

When we pump it 0 times, we have a string of length less than n.

When we pump it once, we increase the length of the string by at most n so we cannot exceed 2n-1. The problem is we might not exceed n-1 yet.

The key is we can keep pumping it and at some point, its length must exceed n-1, and in the step it does, it cannot jump past 2n-1 since the size of the loop is at most n.

 This proof is not totally correct, but it captures the key idea.

COMMENT: There again are more efficient algorithms, but we won't get into that.

   Other problems we can solve using these basic algorithms (and other algorithms we've seen earlier this chapter) as subroutines.

       COMMENT: many of these algorithms depend on your understanding of basic set operations such as set complement, set difference, set union, etc.

Given a regular expression r, is Lr finite?

Convert r to an equivalent FA M.

COMMENT: note we use the two algorithms for converting a regular expression to an NFA and then an NFA to an FA.

Test if L(M) is finite.

Output the answer to the above test.

Given two FAs M1 and M2, is L(M1) = L(M2)?

Construct FA M1-2 from M1 and M2 which recognizes the language L(>M1) - L(>M2).

COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.

Test if L(M1-2) is empty.

Construct FA M2-1 from M1 and M2 which recognizes the language L(>M2) - L(>M1).

COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.

Test if L(M2-1) is empty.

Answer yes if and only if both answers were yes.

What is a fruitful function? Explain with help of programming example?
plz

Answers

These are the functions that return a value after their completion. A fruitful function must always return a value to where it is called from. A fruitful function can return any type of value may it be string, integer, boolean, etc. It is not necessary for a fruitful function to return the value of one variable, the value to be returned can be an array or a vector. A fruitful function can also return multiple values.

what is the meaning of antimonographycationalis​

Answers

Answer:

Although this word was made up in order to be a contender for the longest word in English, it can be broken down into smaller chunks in order to understand it.

Anti- means that you are against something; monopoly means the exclusive control over something; geographic is related to geography; and the remaining part has to do with nationalism.

So this word means something like 'a nationalistic feeling of being against geographic monopoly,' but you can see that it doesn't have much sense.

(answer copied from  Kalahira just to save time)

smaller answer: So this word means something like 'a nationalistic feeling of being against geographic monopoly,' but you can see that it doesn't have much sense.

what represents the amount of data that travels along a network​

Answers

Answer:

byte

Explanation:

Answer:

Bandwidth is measured as the amount of data that can be transferred from one point to another within a network

Explanation:

What two benefits are a result of configuring a wireless mesh network? Check all that apply.
1. Performance
2. Range
3. WiFi protected setup
4. Ad-hoc configuration​

Answers

Answer:

1)PERFORMANCE

2)RANGE

Explanation:

A mesh network can be regarded as local network topology whereby infrastructure nodes connect dynamically and directly, with other different nodes ,cooperate with one another so that data can be efficiently route from/to clients. It could be a Wireless mesh network or wired one.

Wireless mesh network, utilize

only one node which is physically wired to a network connection such as DSL internet modem. Then the one wired node will now be responsible for sharing of its internet connection in wireless firm with all other nodes arround the vicinity. Then the nodes will now share the connection in wireless firm to nodes which are closest to them, and with this wireless connection wide range of area can be convered which is one advantage of wireless mesh network, other one is performance, wireless has greater performance than wired one.

Some of the benefits derived from configuring a wireless mesh network is

1)PERFORMANCE

2)RANGE

Based on the information given, the correct options are performance and range.

It should be noted that a mesh network can be regarded as the local network topology whereby infrastructure nodes connect directly, with other different nodes ,cooperate with one another so that data can be efficiently route from/to clients.

The advantage of configuring a wireless mesh network is that it enhances performance and range.

Learn more about network on:

https://brainly.com/question/1167985

Unchecked exceptions require you surround the code that might throw such an exception with a try block or you must use a throws statement at the end of the method signature. Failure to do one of these two things will result in a compile error.

a. True
b. False

Answers

Answer:

b. False

Explanation:

False, unchecked exceptions do not cause compilation errors and do not require try/catch blocks or throws statements. However, although they are not required it is good programming to include them in order to handle any exceptions that may arise. If you do not include a proper way to handle such an exception the program will still run but may run into an exception during runtime. If this occurs then the entire program will crash because it does not know how to handle the exception since you did not provide instructions for such a scenario.

Given the following tree, use the hill climbing procedure to climb up the tree. Use your suggested solutions to problems if encountered. K is the goal state and numbers written on each node is the estimate of remaining distance to the goal.

Answers

I see that using the hill climbing procedure to climb up a tree

Write a short essay on the importance of information and communication technology (ICT) in the AFN industry. Add suitable examples to substantiate your answer.

Answers

Answer:

computer

Explanation:

is an ICT device that help and makes things or work easy

Use ordinary pipes to implement an inter-process communication scheme for message passing between processes. Assume that there are two directories, d1 and d2, and there are different files in each one of them. Also, each file contains a short-length string of characters. You have to use a parent process that forks two children processes, and have each child process check one of the directories.

Answers

Answer:

Yup

Explanation:

IT specialists must display technical expertise and collaborative proficiency in the workplace. Select the IT specialist who demonstrates a soft skill.

a. Terri uses her Java programming skills to write a key part of the company’s new software.
b. Joyce recruits users to test new software by explaining to them how it will benefit the organization.
c. Chandler evaluates the results of recent user tests of his company's new software.
d. Keith applies a filter to the company’s network that prevents users from accessing social media while they are working.

Answers

Answer:

b. Joyce recruits users to test new software by explaining to them how it will benefit the organization.

Explanation:

Skills can be classified as hard or soft. Hard skills include skills such as technical skills that are acquired through technical knowledge and training.

Soft skills on the other hand are skills exhibited as a result of personality traits, character and behaviours such as time management, leadership, communication and organizational skills.

Some hard skills include;

i. Ability to design banners and posters

ii. Proficiency in using programming languages such as Java to build software applications

iii. Evaluating the result of a test or research.

Some soft skills include;

i. Making public speeches that captivate the audience.

ii. Ability to recruit and test capabilities in others.

iii. Leading a team

So, Joyce recruiting users to test new software by explaining to them how it will benefit the organization is a form of soft skill since it consists, at minimum, of leadership and communication skills

Write a program that reads integers from the user and stores them in a list. Your
program should continue reading values until the user enters 0. Then it should display
all of the values entered by the user (except for the 0) in order from smallest to largest,
with one value appearing on each line. Use either the sort method or the sorted
function to sort the list.

Answers

Answer:

The program in Python is as follows:

numList = []

num = int(input())

while num != 0:

   numList.append(num)

   num = int(input())

   

numList.sort()

for num in numList:

   print(num)

Explanation:

This initializes the list

numList = []

This gets input from the user

num = int(input())

This loop is repeated until the user enters 0

while num != 0:

This appends the user input to the list

   numList.append(num)

This gets another input from the user

   num = int(input())

This sorts the list in ascending order    

numList.sort()

This iteration prints the list elements, each on a line

for num in numList:

   print(num)

Janice is preparing a recipe that calls for 3/4 cup of oil per serving if Janice needs to prepare for 2 / 2 3 servings how many cups of oil would she neex​

Answers

Answer:

Three cups would be needed.

Explanation:

2 2/3 × 3/4 = 8/2 × 3/4 = 24/8 = 3


Can you help me in this question

Answers

Answer:

6 2 and 0

Explanation:

This algorithm doesn't work if the list is not ordered ascending.

In this example it is not, and indeed the item "1" is never found.

first cycle: first=0, last=12 so midpoint=6

second cycle: first=0, last=5 so midpoint=2

last cycle: first=0, last=1 so midpoint=0

then last is assigned -1 so the while statement is no longer true.

Develop an algorithm and write a C++ program that finds the number of occurrences of a specified character in the string; make sure you take CString as input and return number of occurrences using call by reference. For example, Write a test program that reads a string and a character and displays the number of occurrences of the character in the string. Here is a sample run of the program:______.

Answers

Answer:

The algorithm is as follows:

1. Input sentence

2. Input character

3. Length = len(sentence)

4. count = 0

5. For i = 0 to Length-1

 5.1 If sentence[i] == character

    5.1.1 count++

6. Print count

7. Stop

The program in C++ is as follows:

#include <iostream>

#include <string.h>

using namespace std;

int main(){

char str[100];   char chr;

cin.getline(str, 100);

cin>>chr;

int count = 0;

for (int i=0;i<strlen(str);i++){

 if (str[i] == chr){

  count++;} }

cout << count;

return 0;}

Explanation:

I will provide explanation for the c++ program. The explanation can also be extended to the algorithm

This declares the string and the character

char str[100];   char chr;

This gets input for the string variable

cin.getline(str, 100);

This gets input for the character variable

cin>>chr;

This initializes count to 0

int count = 0;

This iterates through the characters of the string

for (int i=0;i<strlen(str);i++){

If the current character equals the search character, count is incremented by 1

 if (str[i] == chr){  count++;} }

This prints the count

cout << count;

Allow the user to enter the names of several local businesses. Sort the business names and display the results. Continue this process until they are out of business names. Please use good functional decomposition to make your development easier. (Perhaps one for sorting a vector of strings, another for swapping two strings, one for As an example the program interaction might look something like (the parts in blue are typed by the user): $ /busisort.out Welcome to the Business Sorting Program!!! Please enter the name of a business: WalMart Your business is: WalMart Another business? y Please enter the name of a business: JC Penney Your businesses are: JC Penney WalMart Another business? Y Please enter the name of a business: Merlin Muffler Your businesses are: JC Penney Merlin Muffler WalMart Another business? yes Please enter the name of a business: Appleby's Your businesses are: Appleby's JC Penney Merlin Muffler WalMart Another business? Yes Please enter the name of a business: Zippy's Your businesses are: Appleby's JC Penney Merlin Muffler WalMart Zippy's Another business?

Answers

Answer:

Here the code is given as follows,

Explanation:

Code:

#include <iostream>

#include <string>

#include <list>  

using namespace std;  

std::string readName ();

void display (list <std::string>);

bool promptContinue ();  

int main()

{

std::string Business = "";

list <std::string> Array;

bool Continue = true;  

do {

//enter input items

Array.push_back(readName ());  

//sort business

Array.sort();  

//display business

display (Array);

   }while(promptContinue ());  

return 0;  

} //end of main function

std::string readName ()

   {

   std::string _Business = "";

   cout << "Please enter the name of a business: ";

   getline (cin, _Business);

   return _Business;

   }  

void display (list <std::string> _Array)

   {

   cout << "Your businesses are: " << endl;

   int i = 0;

   while (i < _Array.size ())

       {

       cout << _Array.front () << endl;

       _Array.push_back (_Array.front ()); // This loops the front of the list to the back this makes it possible to not use an iterator

       _Array.pop_front ();

       i++;

       }

   }  

bool promptContinue ()

   {

   std::string prompt = "";

   cout << "Another Business? ";

   cin >> prompt;

   cin.ignore (); // Clear the whitespace leftover from cin

   return (prompt == "yes");

   }

Several families are planning a shared car trip on scenic drives in New Hampshire's White Mountains. To minimize the possibility of any quarrels, they want to assign individuals to cars so that no two members of a family are in the same car. Explain how to formulate this problem as a network flow problem.

Answers

Answer:

Following are the response to the given question:  

Explanation:

Build a spring, sink, vertices, and vertices for each car for a household. Every unit in the stream is a human. Attach the source from each vertical of a family with such a capacity line equivalent to the family size; this sets the number of members in each household. Attach every car vertices to the sink with the edge of the car's passenger belt; this assures the correct number of people for every vehicle. Connecting every vertex in your household to any vertex in your vehicle with a capacity 1 border guarantees that one family member joins a single car. The link between both the acceptable allocation of people to vehicles as well as the maximum flow inside the graph seems clear to notice.

In this project you will write a set of instructions (algorithm). The two grids below have colored boxes in different
locations. You will create instructions to move the colored boxes in grid one to their final location in grid two. Use the
example to help you. The algorithm that you will write should be in everyday language
(no pseudocode or programming language). Write your instructions at the bottom of the
page.
Example: 1. Move
the orange box 2
spaces to the right.
2. Move the green
box one space
down. 3. Move the
green box two
spaces to the left.
Write your instructions. Review the rubric to check your final work.
Rules: All 6 colors (red, green, yellow, pink, blue, purple) must be move to their new location on the grid. Block spaces are
barriers. You cannot move through them or on them – you must move around them

Answers

Answer:

Explanation:

Pink: Down 5 then left 2.

Yellow: Left 3 and down 2.

Green: Right 7, down 4 and left 1.

Purple: Up 6 and left 9.

Red: Left 7, down 5 and left 1.

You can do the last one, blue :)

Answer:

Explanation:

u=up, d=down, r=right, l=left

yellow: l3d2

pink: d5l2

green: r7d4l1

purple: u6l9

red: l7d5l1

blue: r2u7l5

Write a function addingAllTheWeirdStuff which adds the sum of all the odd numbers in array2 to each element under 10 in array1. Similarly, addingAllTheWeirdStuff should also add the sum of all the even numbers in array2 to those elements over 10 in array1.

Answers

Answer:

The function is as follows:

def addingAllTheWeirdStuff(array1,array2):

   sumOdd = 0

   for i in array2:

       if i % 2 == 1:

           sumOdd+=i

   for i in array1:

       if i < 10:

           sumOdd+=i

   print("Sum:",sumOdd)

   

   sumEven = 0

   for i in array1:

       if i % 2 == 0:

           sumEven+=i

   for i in array2:

       if i > 10:

           sumEven+=i

   print("Sum:",sumEven)

Explanation:

This declares the function

def addingAllTheWeirdStuff(array1,array2):

This initializes the sum of odd numbers in array 2 to 0

   sumOdd = 0

This iterates through array 2

   for i in array2:

This adds up all odd numbers in it

       if i % 2 == 1:

           sumOdd+=i

This iterates through array 1

   for i in array1:

This adds up all elements less than 10 to sumOdd

       if i < 10:

           sumOdd+=i

This prints the calculated sum

   print("Sum:",sumOdd)

   

This initializes the sum of even numbers in array 1 to 0

   sumEven = 0

This iterates through array 1

   for i in array1:

This adds up all even numbers in it

       if i % 2 == 0:

           sumEven+=i

This iterates through array 2

   for i in array2:

This adds up all elements greater than 10 to sumEven

       if i > 10:

           sumEven+=i

This prints the calculated sum

   print("Sum:",sumEven)

this can provide illusion of fast movement it is often used in videos to censor information for security or density​

Answers

Answer:

Blurring can provide the optical illusion of a fast movement. It is often used in videos to hide sensitive or age-inappropriate information, the protection of identities (hence security) or just to provide decency.

Explanation:

Mostly used during animated videos where unlike (real videos) the blur does not occur naturally, the blur is used to make speed believable. Speed invigorates, and highlights intensity. Blurring still images can help to make more realistics motions of speed. An example where lots of blurring is used as prostproduction effects is in Flash.

Cheers

Write a Program that will print all the numbers divisible by 2 between 0 and 100​

Answers

Answer:

//In java

for (int i = 0; i <= 100; i++)

{

if ( i % 2 == 0 )

{

System.out.println( i + " ");

}

}

Write a function called rotateRight that takes a String as its first argument and a positive int as its second argument and rotates the String right by the given number of characters. Any characters that get moved off the right side of the string should wrap around to the left.

Answers

Answer:

The function in Python is as follows:

def rotateRight(strng, d):

   lent = len(strng)

   retString = strng[lent - d : ] + strng[0 : lent - d]

   return retString

Explanation:

This defines the function

def rotateRight(strng, d):

This calculates the length of the string

   lent = len(strng)

This calculates the return string

   retString = strng[lent - d : ] + strng[0 : lent - d]

This returns the return string

   return retString

Addition:

The return string is calculated as thus:

This string is split from the index passed to the function to the last element of the string, i.e. from dth to last.

The split string is then concatenated to the beginning of the remaining string

Write 'T' for true and 'F' for false statements.

1. The CPU is a piece of external hardware.

2. Keyboards can be connected to a computer using USB port.

3. Monitors are connected via the PS/2 port.

4. A computer can function without a CD drive.

5. Printer is an input device.

6. The read write data in magnetic disks.

7. Pen drives are connected to a computer via the USB interface.

NO LINKS​

Answers

1-F
2-T
3-F
4-F
5-F
6 T
7-T

How can we use APC to help with dynamic tracks?

Answers

Answer:

We can use APC to help with dynamic tracks by :-

by finding dynamic tracks. by checking if the dynamic tracks are fully completed.

A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated? Group of answer choices Authenticity Integrity Availability Confidentiality PreviousNext

Answers

Answer:

Confidentiality

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cybersecurity, there are certain security standards, frameworks, antivirus utility, and best practices that must be adopted to ensure there's a formidable wall to prevent data corruption by malwares or viruses, protect data and any unauthorized access or usage of the system network.

In this scenario, a hacker gains access to a web server and reads the credit card numbers stored on that server. Thus, the security principle which is violated is confidentiality.

Confidentiality refers to the act of sharing an information that is expected to be kept secret, especially between the parties involved. Thus, a confidential information is a secret information that mustn't be shared with the general public.

This ultimately implies that, confidentiality requires that access to collected data be limited only to authorized staffs or persons.

What is the output? answer = "Hi mom print(answer.lower()) I​

Answers

As you have included a syntax error inside your question, I will make assumptions on the code. I will assume your code is {
answer = “Hi mom”
print(answer.lower())
}

In this case the output would be “hi mom”. Please make sure to double check your questions before posting.

Answer: hi mom

Explanation: got it right on edgen

Suppose you are collecting money for something.

You need # 200 in all. You ask your parents, uncles

and aunts as well as grandparents. Different people

may give either ` 10, ` 20 or even ` 50. You will collect

till the total becomes 200. Write the algorithm.​

Answers

Answer:

Step 1 : Start

Step 2 : Set target= 0

Step 3 : Use a While loop

Step 4 : input donation

Step 5 : Sum - - > target += donation

Step 6 :, check loop condition

Step 7 : End

Explanation:

Algorithm is a sequence of written instructions or steps which we want the computer to in other to solve a particular problem :

Counter is set at 0

Total amount is initially set to := 0

Using a while loop ;

While target amout is less than 200 ; user inputs the amout to donate and it is added to target amount. This loop continues until target amount is greater than 200. Then the loop terminates.

16. A 6-cylinder engine has a bore of 4 inches and a stroke of 3.5 inches. What's the total piston displacement?

A. 260
B. 263.76
C. 253.76
D. 250

Answers

Answer:

b i just guessed

Explanation:

Assume the variable sales references a float value. Write a statement that displays the value rounded to two decimal points.Assume the following statement has been executed:
number = 1234567.456
Write a Python statement that displays the value referenced by the number variable formatted as
1,234,567.5

Answers

Answer:

The statement is as follows:

print("{0:,.1f}".format(number))

Explanation:

Required

Statement to print 1234567.456 as 1,234,567.5

To do this, we make use of the format keyword, and we set the print format in the process.

To round up number to 1 decimal place, we use the following format:

"{0:,.1f}"

To include comma in the thousand place, we simply include a comma sign before the number of decimal place of the output; i.e. before 1

"{0:,.1f}"

So, the print statement is:

print("{0:,.1f}".format(number))

Other Questions
15. You are watching a baseball game on television that 15being broadcast from 4500 km away. The batter hitsthe ball with a loud "crack" of the bat. A microphoneis located 22 m from the batter, and you are 2.0 m fromthe television set. On a day when sound travels 343 m/sin air, what is the minimum time it takes for you to hearthe crack of the bat after the batter hits the ball? express 0.27272727......... in the form of p/q Change the following algebraic expressions to the statement in words: i. 3mn +7 ii. xy + (x+y) A simple way to describe a Coefficient? Panuto: Punan ang mga kahon ng kahalagahan ng pagkakaroon ng kaalaman sa pagbibigayng pangunang lunas.Kahalagahan ngPagkakaroonng kaalaman saPagbibigay ngPangunang Lunas4 example Please help, how do you write 4.06 in word form and expanded form? 7(x 3) = 5(x+3)Solve for x A 60-year-old man is brought to the ER by ambulance because of slurred speech and left side weakness. His wife states they went to bed at 11pm and woke up at 5am when she noticed his symptoms. He is right handed with a history of coronary artery disease, hypertension, and hypercholesterolemia and a heart attack at age 50. He currently is unable to move his left arm and leg. He had an episode of amaurosis fugux (blindness)in his right eye one month ago that lasted for 5 minutes. Around 3 months ago his wife states he had bilateral pain in his legs while they were on a walk that lasted about 15 minutes. He is taking a baby aspirin a day an ACE inhibitor, and statin as well. He does have a history of alcohol use and smoking in the past but stopped after his heart attack. His blood pressure is 195/118 Pulse 106, Respiratory rate 18, Temperature 99.8, o2 sat is 97% on room air. Although his pupils are equal and reactive, and the ocular movements are intact, he is unable to turn his eyes voluntarily toward the left side. The neck is supple, there is no jugular vein distension, and there are no bruits. The lungs are clear heart sounds regular without murmurs, and abdomen is normal. The limbs are not well perfused distally. The neurologic examination reveals that he is alert and oriented, although he does not recognize he is sick. He shows loss of awareness and attention with respect to objects or stimuli on his left side. He has mild dysarthria but, his speech is fluent, and he understands and follows commands very well. There is mild weakness on the left side of the face and left sided homonymous hemaianopsia, but there is no nystagmus or ptosis, and no tongue or uvula deviation. He is not able to move his left arm and leg, has hyperreflexia, and the left great toe is upgoing.1) What are two questions you would ask this patient?2) Identify the subjective data for this patient.3) Identify the objective data for this patient. 4)What is the likely diagnosis? what does a paralegal do ? Which concept is illustrated in the cartoon? 48:57IAIbeRead Romeo's soliloquy from Act II, scene ii of Romeoand JulietThe purpose of this soliloquy is to help the audienceunderstand Romeo'sBut, soft! what light through yonder window breaks?It is the east, and Juliet is the sun!Arise, fair sun, and kill the envious moon,Who is already sick and pale with grief,That thou her maid art far more fair than she:Be not her maid, since she is envious;Her vestal livery is but sick and green,And none but fools do wear it; cast it off.feelings for Juliet.O feelings for Rosaline.O description of the evening.O description of Juliet's illness.Save and ExitNextSubmitMark this and retum Ball X has a mass of 8kg and is moving toward ball Y (which is sitting still) at 2m/s. After they collide, ball X issitting still. How fast is ball Y moving after the collision if it has a mass of 4kg? which term refers to the plot element that provides back ground information in a story Studies support the claim that volunteering on a regular basis actually benefits ones general physical health. Depending on the needs of an organization, many volunteer opportunities can involve physical movement. Volunteers at a local soup kitchen may, for example, find themselves unloading truckloads of donated supplies. Other research related to volunteering and staying healthy found that volunteers often experienced decreased chronic pain and fewer symptoms of heart disease. Of course, not all volunteer positions involve physical exertion. Tasks involving minimal movement, such as answering phones, filing papers, and/or addressing envelopes, should be combined with some type of physical activity. Using the stairs instead of an elevator or walking to work instead of driving are examples of easy ways to integrate exercise into a daily routine. Which statement most accurately describes the issue(s) in this paragraph? Renegade Publishers Inc. projected sales of 29,000 diaries for 2016. The estimated January 1, 2016, inventory is 1,200 units, and the desired December 31, 2016, inventory is 3,000 units. What is the budgeted production (in units) for 2016 State whether the data described below are discrete or continuous and explain why?The distance between cities in a certain contry.a. The data are discrete because the data can only take on specific values. b. The data are discrete because the data can take on any value in an interval. c. The data are continuous because the data can take on any value in an interval. d. The data are continuous because the data can only take on specific values. also called product or merchandisea.buying b.goodsc.selld.profite.seller Is sodium a metal, nonmetal, or metalloid? Which infinite geometric series diverges?A. S= 4.2 + 3.57 + 3.0345 +...B. S= 262 + 301.3 + 346.5 +...C. S= 6,651 + 729 -- 81 -- ...D. S = 100 + 50 + 25 +... Phn bit chi ph sn xut v gi thnh sn phm?