Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support and asked Paavo’s opinion regarding its security. What would Paavo tell him about USB OTG security

Answers

Answer 1

Answer:

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Explanation:

Since in the question it is mentioned that Paavo reviewed a request by an executive for subnotebook computer i.e new. but he needs to USB OTG support so it is a  USB i.e on the go that links the devices from one device to another

Therefore by links the mobile device to the computer i.e infected that allows malware we called virus so that we are able to send it to that device. By this,  he wants to tell about the USB OTG security


Related Questions

BP measuring machine is an example of __________

A)Computing device
B)Medical device
C)Embedded machine
D)None of these​

Answers

Answer:

I think it is a Medical device.

BP = blood pressure

Explanation:

Asia pacific and Japanese sales team from cloud kicks have requested separate report folders for each region.The VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder. What should a consultant recommended to meet this requirement.

Answers

Answer:

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

Explanation:

Below are the options

A) Create grouped folders, keeping the top region folder sharing settings and limiting the sharing settings for the grouped folders for each region.

B) Create all new regional folders and move the reports to the respective region folder with viewer access.

C) Create all new regional folders and move the reports to the respective region folder with subscribe access.

D) Create subfolders, keeping the top region folder sharing settings and limiting the sharing settings for the subfolders for each region

In order to required reports at one place and also wants to retain the visibility for each folder the consultant should suggest that all new regional folders should be created and afterwards it would be moved to their relevant region folders by involving the viewer access feature so that the VP should access it anytime

Hence, the correct option is B.

Based on the information given, the correct option will be B. Create all new regional folders and move the reports to the respective region folder with viewer access.

From the information given, it was stated that the VP of sales needs one place to find the reports and still wants to retain visibility of the reports in each folder.

Therefore, it's important to create all new regional folders and move the reports to the respective region folder with viewer access.

Learn more about folders on:

https://brainly.com/question/20262915

A user reports that he cleared a paper jam and now cannot print. The technician reseats the paper and then prints a test page from the printer. A test page sent from the workstation does not print. Which of the following actions should the technician take first?
a. Check the printer connection
b. Stop and start the printer
c. Reboot the computer
d. Clear the print queue

Answers

Answer:

d. Clear the print queue.

Explanation:

If a user reports that he cleared a paper jam and now cannot print. Also, the technician reseats the paper and then prints a test page from the printer. A test page sent from the workstation does not print. The first and most appropriate action the technician should take is to clear the print queue.

In computer technology, a printer is an electronic output device (peripheral) that is used for the printing of paper documents (texts and images).

The print queue is the directory or location where the printing sequence for a printer is stored or backed up. If it was ensured that the power cord of the printer is properly plugged in, the paper jam is cleared and the papers are properly seated, then the next action to take is clearing the printing queue. Once, the printing queue is cleared and becomes empty, the printer will begin to print.

A company has a network printer that is utilzed by several departments. Although the printer shows online and other departments can access the printer, the accounting group is unable to print to this network printer. Which of the following would the technician use to resolve the problem?
a. The printer needs a maintenance kit repalced.
b. The TCP/IP print spooler service need to be restarted.
c. The security settings for the print spooler need to be modified to include the department.
d. Replace the network cable on the printer

Answers

Answer: c. The security settings for the print spooler need to be modified to include the department.

Explanation:

The print spooler makes Windows computer enable to interact with the printer, and to commands the printer for print jobs .

If all the other departments can access the printer,  but not the accounting group, then the technician should check the security settings for the print spooler and modify it accordingly to include the accounting group  .

Hence, the correct answer is c. The security settings for the print spooler need to be modified to include the department.

Your program will read in an existing text file. You want the program to terminate if the file does not exist. Which of the following indicates the correct code for the main method header? public static void main(String[] args) throws FileNotFoundException public static void main(String[] args) throws UnknownFileException public static void main(String[] args) public static void main(String[] args) throws FileMissingException

Answers

Answer:

FileNotFoundException

Explanation:

While investigating a 4-year-old PC that is taking an unusually long time to boot, a technician discovers that the BIOS is rediscovering the hardware system at every boot. What should the technician do to resolve the problem

Answers

Answer:

learn and train it to make it boot faster

Explanation:

Well we know that the PC is old and it takes a long time to boot also the BIOS is rediscovering the hardware system at every boot so he should make it reboot and learn and train it to make it boot faster

An Administrator wants to make a list of all prospects who complete the Contact Us form but only wants them to be added the first time they complete the form. If a prospect is ever removed from the list, they shouldn't be able to get added back to it. What is the best way to create this type of list

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The easiest way to build such a list is by using an algorithm rule, where the prospects who complete the form are then matched with the rule and added to the list because the developer would also like to list of the all applicants, who fill out all the contact us Application, but still only prefer to also have them added when they fill-up the form first. When an outlook is ever omitted from the list, it should not be included.

What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible by ten: " + counter); counter++; } else { System.out.println("Counter is not divisible by ten: " + counter); counter++; } Move the duplicated code outside of the if statement Shorten variable names Move the brackets to save several lines of code Add semicolons after the if condition and the else reserved word

Answers

Answer:

Move the duplicated code outside of the if statement

RSA is a public-key cryptosystem developed by MIT professors Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman in 1977 in an effort to help ensure Internet security. RSA uses modular arithmetic and elementary number theory to do computations using two very large prime numbers. Identify the statement which is true for RC6 algorithm:________.
a) Is a variable key-size stream cipher with byte-oriented operations and is based on the use of a random permutation
b) Includes integer multiplication and the use of four 4-bit working registers
c) Is a parameterized algorithm with a variable block size, key size, and a variable number of rounds
d) Is a 64 bit block cipher that uses a key length that can vary between 32 and 448 bits

Answers

The answer is B) includes integer multiplication and the use of four 4-but working registers

Write a pseudocode algorithm which inputs numeric scores and outputs how many of them are over 100. The end of the data is signalled by a user input of -1.

Answers

Answer:

calculateCountGreaterThan100()

{

declare variable count with zero

while True

 {

 input numeric values from user

 if user inputted value > 100

  increment the count

 if user inputted value == -1

  break the loop

 }

print the value of count

}

Explanation:

First of all, let us have a look at the meaning of a pseudocode:

A pseudocode is nothing but a informative way of expressing our code in simple plain English.

It is not written in programming language so it does not have any syntax rules.

Here, we are asked to write pseudocode algorithm for inputting numeric scores and output the number how many of them are greater than 100. The end of numbers is signalled by a user input of -1.

The answer is:

calculateCountGreaterThan100()

{

declare variable count with zero

while True

 {

 input numeric values from user

 if user inputted value > 100

  increment the count

 if user inputted value == -1

  break the loop

 }

print the value of count

}

Here, we have declared a variable with initial count as 0.

Then, in a loop we are taking input from user in which user is giving integer input.

If the value is greater then zero, the count is incremented.

If the value is -1, we come out of the loop and then print the count value.

Pseudocode algorithm are algorithms that are implemented using pseudocodes, and it does not obey the syntax of a programming language.

The Pseudocode algorithm

The pseudocode algorithm is as follows:

count = 0

input num

while num != -1:

    if num > 100:

         count++

print(count)

The flow

The flow of the above pseudocode algorithm is as follows

First, variable count is initialized to 0Next, we take input for numNext, a loop is repeated until the input is -1During each loop, the inputs over 100 are countedLastly, the count of inputs greater than 100 is printed

Read more about pseudocode algorithm at:

https://brainly.com/question/11623795

What did early computers use to store each bit?

Answers

Answer:

A vacuum tube

A vacuum tube I believe

You asked your colleague to provide feedback on a blog post you recently wrote. When they sent you their feedback, they made edits directly in the doc. Is this a best practice for a content editing process?

Answers

Explanation:

This question can have both answers that is yes as well as no.

1.Yes, it can serve as an editor who completes your content and ensures it will read well to others.

2. No, the editor should have tracked changes which would have shown you where they would apply recommended edits.

If you have a 3D printer please show me a vid of you making something because I'm interested in getting one. Ty! Also can someone show me how to put more points in a question that I ask on Brainly?

Answers

Explanation:

Too add more points on your brainly question(phone), type your question

Then, see on your top left, you can see the points. It will show 10,which means you have to lose 10 points which is the minimum points for one question. If you are generous to give more points, click on it the you can scroll till the maximum point which is 100..but each points you give will divide 2.

For example, you just loose 10 points for your question but I only got 5 points

Hope you understand this

I'm not sure with laptop

HAVE A GOOD DAY!

Which of the following patterns should be used for the delimiter to read one character at a time using a Scanner object's next method? Scanner in = new Scanner(. . .); in.useDelimiter("[^0-9]+"); Scanner in = new Scanner(. . .); in.useDelimiter(""); Scanner in = new Scanner(. . .); in.useDelimiter("[^A-Za-z]+"); Scanner in = new Scanner(. . .); in.useDelimiter("[A-Za-z]+");

Answers

Answer:

The method to this question can be defined as follows:

Scanner in = new Scanner(. . .);

in.useDelimiter("");

Explanation:

Following are the code to the question:

import java.util.*;    //import package for user input

public class Main //defining class Main

{    

public static void main(String ax[])//defining the main method

{    

   Scanner in = new Scanner("Database");//crearing Scanner class object that pass value in its parameter  

   in.useDelimiter("");  //using useDelimiter

   System.out.println(in.next()); //use print method to print single character value

}    

}    

Output:

D

Code explanation:

In the above code inside the main method scanner class object "in" is created that pass value "Database" in its parameter.  In the next step, useDelimiter is used that uses the scanner class object and single space n its parameter. In the last print, the method is used that prints object value.  

what is a good electric fan for your room?​

Answers

Answer:  a box fan

Explanation:

the get you really cold easily and its easy to turn off and on

Sniffer turns the NIC of a system to the promiscuous mode so that it listens to all the data transmitted on its segment. It can constantly read all information entering the computer through the NIC by decoding the information encapsulated in the data packet. Passive sniffing is one of the types of sniffing. Passive sniffing refers to:

Answers

Answer:

The right answer will be "Sniffing through a hub".

Explanation:

Packet sniffer seems to be a device that listens for transmitted data on what seems like a channel. Sniffing enables the detection of data by individual people as it has been transferred throughout a cable. Appropriate nodes are using this methodology to make a diagnosis of connection issues, or even just harmful programs to obtain confidential information, like authentication and encryption.

Case-Based Critical Thinking
Ryan is creating a website for an automobile company. He wants to include media files on the web page and make the page appealing to the viewers. 43. Ryan wants a particular embedded media clip to automatically restart when it has finished playing. Which of the following HTML audio and video element attributes must Ryan include in his code to accomplish this?
a. ​src.
b. ​loop.
c. ​controls.
s. ​preload.

Answers

Answer:

B. Loop

Explanation:

The use of loop which is a boolean attribute in HTML is an instruction that specifies a replay of the video once it has ended. It is inputted in this format;

<video controls loop>

<source src="dance.mp4" type=video/mp4">

</video>

To add a video to the HTML web page, the <iframe> element is used. the source would also indicate the video URL. The specification of the dimensions, that is the height and width of the video are also written. The code is now closed with the </iframe> element.

Given the variable ip, already declared as a pointer to an integer, write the code to dynamically allocate memory for a single integer value, assign the resulting pointer to ip, and initialize the integer value to 27.

Answers

Answer:

In C++:

int *ip;

ip = new int;

*ip = 27;

Explanation:

First of all, let us have a look at the methods of memory allocation to a variable.

1. Compile Time: The memory gets allocated to the variable at the time of compilation of code only. It is also called static allocation of memory.

Code example:

int a = 5;

2. Run Time: The memory is allocated to the variable on the fly i.e. during the execution of the program. It is also called dynamic allocation of memory.

Now, we have to write code for a variable ip, which is an integer pointer to dynamically allocate memory for a single integer value and then initialize the integer value 27 to it.

Initializing a variable means assigning a value to variable for the first time.

Writing the code in C++ programming language:

int *ip;      // Declaring the variable ip as a pointer to an integer

ip = new int;    // Dynamically allocating memory for a single integer value

*ip = 27;   // Initializing the integer value to 27.

Write a function, sublist, that takes in a list of numbers as the parameter. In the function, use a while loop to return a sublist of the input list. The sublist should contain the same values of the original list up until it reaches the number 5 (it should not contain the number 5).

Answers

Answer:

Following are the code to this question:

def sublist(l):#defining a method list sublist that accepts a list

   val=[]#defining an empty list

   x=0#defining x variable that store value 0

   while(x<len(l)):#defining loop that check x is lessthen list length  

       if(l[x]==5):#defining if block that checks list value equal to 5

           break#using break keyword  

       val.append(l[x])#add value in val list

       x+= 1#increment the value of x variable by 1

   return val#return val

l=[3,4,7,8,5,3,2]#defining list l

print(sublist(l))#using print method to call sublist method

Output:

[3, 4, 7, 8]

Explanation:

In the above python code, a method "sublist" is declared that accepts a list, inside the method an empty list "val" and an integer variable x is defined that stores "0"  value. In the method, a while loop is declared that checks list length and define if block to checklist element value equal to "5". which the condition is true it will return before values. In the last step, a list "l" is declared that holds value and used the print method to call sublist to prints its return value.

To see the non-printing characters in Writer press ________ + ________keys, together.

Answers

Answer:

Ctrl + *

Explanation:

Non-printing characters are the characters that are not displayed at the time of printing of an document or a spreadsheet. This is used for designing a content

The few are examples like non-breaking space, the pilcrow etc

The shortcut to show or hide the non-printing characters is Ctrl + * i.e Contorl + Star

So press these two keys we can see the non-printing characters

Answer:

Ctrl+F10, is the keys to see the non printing characters in Open Office Writer

Explanation:

The GaVS resource where students can locate information regarding Canvas, student email, registration and O365 is called the: Student Success Site Media Center dashboard Guidance Center

Answers

I Inferred you are referring to the Georgia Virtual School resource program.

Answer:

Guidance Center

Explanation:

Interestingly, the Georgia Virtual School (GaVS) enables students access to Virtual education.

Their resource platform allows students to find information regarding Canvas, student email, registration and Office 365 etc by simply going Guidance Center.

Andy designed a web page for a product-oriented industry using CSS properties. He used several HTML tags to create the web page. He also used tables to ensure that the data is easily managed.
​Andy wants the borders to be distinctly visible for each cell in the product details table. Which of the following properties must Andy add to his code to accomplish his goal?
A. ​border-spacing: length;
B. ​border-collapse: separate;
C. ​border-collapse: collapse;
D. ​border-spacing: initial;

Answers

Answer:

CSS documentation

Explanation:

Use this CSS reference to browse an alphabetical index of all the standard CSS properties, pseudo-classes, pseudo-elements, data types, and at-rules. You can also browse a list of all the CSS selectors organized by type and a list of key CSS concepts. Also included is a brief DOM-CSS / CSSOM reference.

Locatiopn: https://devdocs.io/css/

The properties that Andy must add to his code to accomplish his goal is (B), border-collapse: separate.

What is border-collapse?

The border-collapse property in CSS determines how the borders of table cells are collapsed. The default value of border-collapse is collapse, which means that the borders of adjacent cells are merged together. To make the borders of the cells in Andy's table distinctly visible, he needs to set the border-collapse property to separate.

The other possible answers are incorrect. The border-spacing property determines the amount of space between the borders of adjacent cells. The border-spacing: initial value sets the border spacing to the default value, which is 0 pixels.

Find out more on CSS properties here: https://brainly.com/question/14918146

#SPJ2

CO! Oher...9
pressure
14.
large
The barometric height in a town is 65cmHg. Given that the standard atmospheric pressure
is 76cmHg and density of mercury is 13600kg/m", determine the altitude of the town. (Density of
(3mks)
air is 1.25kg/mº).​

Answers

Answer:

Altitude of the town(h1) = 1,196.8 m

Explanation:

Given:

Height of barometer(h) = 65 cm Hg = 0.65

Standard atmospheric pressure  = 76 cm Hg = 0.76

Density of mercury(Pm) = 13,600 kg/m³

Density of  air (Pa) = 1.25 kg/m³

Find:

Altitude of the town(h1)

Computation:

Pressure due column = Δp mercury column

(Pa)(h1) = (Pm)(h)

(1.25)(h1) = (13,600)(0.76-0.65)

(1.25)(h1) = 1,496

Altitude of the town(h1) = 1,196.8 m

What are the flowchart symbols?​

Answers

Answer:Flowchart use to represent different types of action and steps in the process.These are known as flowchart symbol.

Explanation:The flowchart symbols are lines and arrows show the step and relations, these are known as flowchart symbol.

Diamond shape: This types of  flow chart symbols represent a decision.

Rectangle shape:This types of flow chart symbols represent a process.

Start/End : it represent that start or end point.

Arrows: it represent that representative shapes.

Input/output: it represent that input or output.

What is the port representing buy above symbol?

Answers

Answer:The port representing buy above symbol used in thousands used symbols by computer represent a today.

Explanation:The computer symbol is used to representing a today function,company, warning,specification.Symbol is used to the computer and electronics with each description.

Most symbols are shown below not may match your hardware device and software program.There are many types of symbol :

(1)Keyboard symbol (2)Display symbol (3)Power symbols (4)Sound symbols

(5)E-mail symbol (6)General symbol (7) Drive symbol (8) Network symbol

Symbol is the most commonly full circle and vertical at the top the power.

Suppose you have a tablet with a capacity of gigabytes. For a plain text​ book, one byte typically corresponds to one character and an average page consists of 2000 characters. Assume all gigabytes are used for plain text books. a. How many pages of text can the tablet​ hold? b. How many​ 500-page books can the tablet​ hold?

Answers

Answer:

a. 17,500,000 pages

b. 35,000

Explanation:

The computation is shown below:

As we know that

[tex]1 giga\ bytes = 1 \times 10 ^ {9} bytes[/tex]

So for 35 gigabytes it would be

[tex]= 35 \times 10 ^ {9} bytes[/tex]

And it is given that there is 2,000 characters

a. So the number of text pages would be

Let us assume that

for 2,000 it would be 1 page

So for [tex]35 \times 10 ^ {9} bytes[/tex] it would be x

Now we solve the x which is equal to

[tex]= \frac {35 \times 10 ^ {9} bytes}{2,000}[/tex]

= 17,500,000 pages

b. Now for 500 pages, it would be

[tex]= \frac{17,500,000}{500}[/tex]

= 35,000

urgent ..algorithm and flowchart to check weather a number is odd or even ???​

Answers

Answer:

if it's 0 then the number is even.else number is odd

Explanation:

if it's divisible by 2.then the reminder will be 0,

then the number is even.

thanks

Answer:

Hello!!!

I'm not sure about first one but second is correct one.

no. means number (i didnt had place so)

so, i hope it helps you a little....

why is know app downloading in my android phone even if I have 900 MB ???

Answers

Answer:

May be you have not signed in with Google

Perhaps you are stopping the downloading without knowing

Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode. What can she do to make the games work properly in Windows

Answers

Complete Question:

Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode.

Group of answer choices;

A. Reboot into Safe Mode

B. Run compatibility mode for 640 x 480 resolution.

C. Reduce her screen resolution to 640 x480

D. Reboot into Low Resolution Mode

Answer:

B. Run compatibility mode for 640 x 480 resolution.

Explanation:

In this scenario, Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since the programs are designed only to run in VGA mode. In order to make the games work properly in Windows, Missy should run compatibility mode for 640 x 480 resolution.

The video graphics array (VGA) is the standard graphics or display interface used for computer monitors. It was developed in 1987 by IBM and it had a standard display resolution of 640 x 480 pixels.

Hence, if the output of a software program (games) looks fuzzy or is not being displayed properly, you should run compatibility mode for 640 x 480 resolution. This is to enable low resolution video mode on the computer.

The VGA mode is very basic because only minimal video drivers are being loaded on the windows.

Find dy/dx and d2y/dx2. x = t2 + 5, y = t2 + 5t dy dx = Correct: Your answer is correct. d2y dx2 = Correct: Your answer is correct. For which values of t is the curve concave upward? (Enter your answer using interval notation.) Changed: Your submitted answer was incorrect. Your current answer has not been submitted.

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

Given value:

[tex]x = t^2 + 5......(1)\\\\ y = t^2 + 5t........(2)[/tex]

To find:

[tex]\bold {\frac{dy}{dx} \ \ \ and\ \ \ \frac{d^2y}{dx^2} = ?}[/tex]

Differentiate the above equation:

equation 1:

[tex]\frac{dx}{dt}= 2t.......(1)\\[/tex]

equation 2:

[tex]\frac{dy}{dt}= 2t+5[/tex]

Formula:

[tex]\frac{dy}{dx}= \frac{\frac{dy}{dt}}{\frac{dx}{dt}}\\\\[/tex]

[tex]\boxed{\bold{\frac{dy}{dx}=\frac{2t+5}{2t}}}[/tex]

To calculate the [tex]\bold{\frac{d^2y}{dx^2}}[/tex] we Differentiate the above equation but before that first solve the equation:

Equation:

[tex]\frac{dy}{dx}=\frac{2t+5}{2t}[/tex]

    [tex]=\frac{2t}{2t}+\frac{5}{2t}\\\\= 1+\frac{5}{2t}\\\\=1+\frac{5}{2} t^{-1} \\[/tex]

Formula:

[tex]\bold{\frac{d}{dx} \ x^n = nx^{n-1}}[/tex]

[tex]\frac{dy^2}{dx^2}= 0+\frac{5}{2} (-1 t^{-2})\\\\[/tex]

      [tex]= -\frac{5}{2} t^{-2}\\\\= -\frac{5}{2 t^2} \\\\[/tex]

[tex]\boxed{\bold{\frac{d^2y}{dx^2}=-\frac{5}{2t^2}}}[/tex]

Answer:

d2y dx2

Explanation:

Other Questions
solve the equation 2/3x-2=7 WHAT IS THE ANSWER PLS HELPPPPP!!!!! In triangle ABC, angle B = 90 degrees. Semicircles are constructed on sides AB, AC, and BC, as shown below. Show that the total area of the shaded region is equal to the area of triangle ABC. Rediger Inc., a manufacturing Corporation, has provided the following data for the month of June. The balance in the Work in Process inventory account was $40,000 at the beginning of the month and $26,000 at the end of the month. During the month, the Corporation incurred direct materials cost of $58,600 and direct labor cost of $33,400. The actual manufacturing overhead cost incurred was $54,800. The manufacturing overhead cost applied to Work in Process was $54,600. The cost of goods manufactured for June was: P(x) has factors (x-2), (x+1), and (x-3). Decide if there is only one polynomial that has these factors. Justify your answer. Please help me I am bad at this stuff What is a monomer of a protein? Match these items. 1 . Panic of 1837 was President in 1832 2 . pet banks Jackson's informal advisors 3 . Democratic-Republicans resigned as Vice President 4 . kitchen cabinet supported Jackson 5 . Missouri Compromise federal money was placed in these 6 . Andrew Jackson depression caused by Jackson's policies 7 . John C. Calhoun no slavery above 36 30' line The angle of incidence of a ray of light striking an equilateral triangular prisms ABC of refracting angle 60o is 40o. Calculate: (i)the angle of refraction at the first face (ii)the angle of emergence If f(x) = -8x - 6 and g(x) = x+8 , what is (f g) (- 7) Which of the following can prove that figure ABCD is a square? What term refers to the fit between a persons abilities and the demands of the job and the fit between a persons desires and motivations and the attributes and rewards of a job? A. manager-employee fit B. occupation-group fit C. person-job fit D. employee-environment fit Which of the following is the minor arc for the circle shown below?A. AWRB. AWC. RAWD. RA The management of Arnold Corporation is considering the purchase of a new machine costing $430,000. The company's desired rate of return is 10%. The present value factors for $1 at compound interest of 10% for 1 through 5 years are 0.909, 0.826, 0.751, 0.683, 0.621, respectively. In addition to this information, use the following data in determining the acceptability in this situation: Year Income from Operations Net Cash Flow 1 $100,000 $180,000 2 40,000 120,000 3 20,000 100,000 4 10,000 90,000 5 10,000 90,000 The net present value for this investment is a.negative $25,200. b.negative $124,800. c.positive $152,000. d.positive $25,200. Help me please!!!!!!!!!! Assuming Singapore's population is constant, what can be inferred about Singapore's home ownership rate from the chart above? A. There were more homeowners in 2009 than in 2000. B. There were more homeowners in 2010 than in 1980. C. There were less homeowners in 2005 than in 2009. D. There were more homeowners in 1980 than in 1990. I need help please answer ASAP Have a good explination.Will give brainliest long list of words that included "ship, effort, professor and inquire". He later recalled these words as "boat, work, teacher, and question". This suggests that the four original words were encoded: a. semantically b. visually c. acoustically d. automatically Peter walked 10m from X to Y on bearing 020 and then he turned and walked 20m to Z with bearing 140 of Z from Y. Find the distance between X and Z. Find the bearing of Z from X. Explain why Inuit Eskimos, despite living in polar regions with little sunlight, remaindark-skinned like their equatorial ancestors.