A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like to know the operating system of a target device and scan for commonly used ports. Select the nmap commands that will be useful in this case. (Select all that apply.)

Answers

Answer 1

The Network Mapper (Nmap) commands that would be useful on this test network are:

nmap xxx.xxx.x.x -pnmap xxx.xxx.x.x -A

What is a penetration test?

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities in the following:

Operating systemWeb softwareHost deviceNetwork

This ultimately implies that, a penetration test avails an tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the system.

The Network Mapper (Nmap) commands.

In this scenario, the Network Mapper (Nmap) commands that would be useful on this test network are:

nmap xxx.xxx.x.x -pnmap xxx.xxx.x.x -A

Read more on penetration test here: https://brainly.com/question/25813524


Related Questions

14. My computer “boots-up” (aka activates and starts running) but it tells me that it cannot find the data to start the operating system, and I hear a subtle clicking noise coming from my computer. What physical component of the computer do you believe is defective? Defend your answer.

Answers

For this computer, the hard drive is the physical component that is defective.

What is a physical component?

A physical component can be defined as a component (hardware) of an computer system or information technology (IT) that can be seen and touched.

The physical components of a computer.

Some examples of the physical components of a computer system include:

MotherboardCentral processing unit (CPU)KeyboardMonitorMouseHard drive

The hard drive refers to an electromagnetic data storage device that is typically used for storing and retrieving digital data such as an operating system (OS) on a computer system.

Generally, a computer would make a subtle clicking noise when it finds it difficult to read or retrieve the data stored on its hard drive.

Read more on physical components here: brainly.com/question/959479

Processor speed is a measurement of what?


How fast the ROM loads and executes the operating system

How fast the chip processes the instructions it receives in binary code

How fast the power supply processes alternating current into direct current

How fast data travels along the internal and external buse

Answers

Answer:the number of cycles your cpu executes per second

Explanation:

Using the Mclaurin’s series only, prove categorically that e=2.71828

Answers

Answer:

import math

e = n = 0

while(round(e, 5) != 2.71828):

 e = e + 1/math.factorial(n)

 print(n, e)

 n = n + 1

Explanation:

Above McLaurin series implementation shows that you approximate e to 5 decimals already after 8 iterations.

What is introduction to total quality management?

Evaluation of the concepts of quality.

Answers

Answer:

Total Quality Management, TQM, is a method by which management and employees can become involved in the continuous improvement of the production of goods and services. It is a combination of quality and management tools aimed at increasing business and reducing losses due to wasteful practices.

Explanation:

"web browsers cant be downloaded for free? TRUE OR FALSE​

Answers

Answer:

false

Explanation:

there are lots of free browsers:

chrome

brave

opera

etc

In statistics, when a set of values is sorted in ascending or descending order, its median is the middle value. If the set contains an even number of values, the median is the mean, or average, of the two middle values. Write a function that accepts as arguments the following:

a. An array of integers
b. An integer that indicates the number of elements in the array

The function should determine the median of the array. This value should be returned as a double. (Assume the values in the array are already sorted.) You’ll create two arrays: one with three elements (e.g. 1, 3, 7) and one with four elements (e.g. 2, 4, 5, 9).

Answers

The program is an illustration of methods

What are function?

Function are collections of named code blocks, that are executed when called or evoked.

The median function

The median function written in Python, where comments are used to explain each line is as follows:

#This defines the function

def medianValue(myList, n):

   #This determine the median element for odd list elements

   if n%2 == 1:

       medianElement = float(myList[int((n - 1)/2)])

   #This determine the median element for even list elements

   else:

       medianElement = (float(myList[int(n/2)]) + float(myList[int(n/2) - 1]))/2

   #This returns the median element

   return medianElement

Read more about functions at:

https://brainly.com/question/26180959

importance of ethical rules in new technologies?

Answers

Answer:

Ethical rules in the sphere of all technologies are imperative.

Explanation:

Ethical rules for technologies limit the information gathered, what can be done with the gathered data, the disclosure of what is collected and used/sold, and the restriction of technology that is dangerous to humans (bio-technologies).

How is technology powerless?

Answers

Answer:

Bluetooth

Explanation:

I am not fully aware of what the full quisten is but I think this is the answer you are looking for

Her computer is always freezing. Just __________ again and it should work

Answers

Answer:

restart

Explanation:

i think it will help it

Today
ABCDEFGH. What letter comes three to the right of the
letter that comes immediately to the left of the letter
that comes three to the right of the letter immediately
to the left of the letter B?

Answers

Answer:

Ourr letter is D. On three positions right, the letter is G. → Thus, our answer is G. So, G is the letter which is three to the right of the letter immediately to the left of the letter three to the left of the letter two to the right of letter F.

Explanation: hope it helps friend

Drawing board rough surfaces needs _____.
A. cleaning
B. oiling
C. tightening
D. sharpening

NEED ANSWER ASAP

Answers

Answer: d

Explanation: because like sand paper when you rub against it while drawing  it creates rough surfaces.

#include <iostream>
using namespace std;

int main()
{
int num1, num2,r,i;

cout<<"Enter a start: ";
cin>>num1;
cout<<"Enter an end: ";
cin>>num2;
cout<<"\n\nODD NUMBERS\n";

for(i=num1; i<=num2; i++){
r=i%2;
if(r==1)
cout<<" "<<i;

}
cout<<"\nEVEN NUMBERS\n";

for(i=num1; i<=num2; i++){
r=i%2;
if(r==0)
cout<<" "<<i;
}
if(num1>num2){
cout<<"ERROR! Starting Number is GREATER THAN the Ending Number!!!";
return 0;
}
}

Using while loop, do while and for loop write a C++ program that lets you input a starting and ending integer (range) then display all the odd integers and the even integers within the range then compute the sum of each set of integers.:

If the starting number is greater than ending number, the program should display “ERROR! Starting Number is GREATER THAN the Ending Number!!!”.

Sample output:

Enter a start: 1

Enter an end: 10

ODD NUMBERS

1 3 5 7 9 Sum: 25

EVEN NUMBERS

2 4 6 8 10 Sum: 30


the attached pic has been my progress so far. please help me reach the expected output.​

Answers

Explanation:

...........................

What does this mean startUp()

Answers

Answer: a startup or start-up is a company or project undertaken by an entrepreneur to seek, develop, and validate a scalable business model.

Explanation:

Designing a medium to large network requires a combination of technologies and there isn't one "right way." Think about the technologies you would need to deploy to implement a college campus network with multiple buildings, hundreds of faculty and staff, and dozens of computer-equipped - classrooms and labs. Think of the ancillary technologies you might need to integrate into the network such as data projectors, smart whiteboards, campus security systems, and so forth. Consider consulting with the IT staff at your school or another school to see what technologies they use. Instructions: Write a post of at least four paragraphs outlining the technologies you would use to connect student and faculty computers, servers, multiple buildings and so forth.​

Answers

Technology allows for easy accessibility, communication and information technology could connect student and faculty computers and servers.

What is computer networking?

It is the ability of computers to communicate with one another. It makes use of a communication technology that would allow different computers to be connected to each other.

Technologies that will be used include,

Communication technologyInformation technology

The different types of networking systems that can be used for communication and information include,

Local area networkWide area networkComputer area network

Local Area Network (LAN):  It is a computer network that can be used in a small confined area such as a school, laboratory, office, or group of buildings.

Thererfore, technologies you would use to connect student and faculty computers, servers, multiple buildings include communication and information technology.

Learn more on technology here,

https://brainly.com/question/23418761

3. (A) Differentiate between RAM & ROM.
(B) What is a virtual memory and how it is different
from cache memory?
(C) Discuss Primary memory and different types of pri-
mary memory
4. (A) What is Mail Merge? Explain the process to create
Mail Merge
(B) What is chart in Ms - Excel? Discuss the creation
of various charts in Ms - Excel.
(C) Explain the process of making a power point pre-
sentation?
5. (A) What is Internet? Discuss how internet is useful in
Business?
(B) Write a detail note on search engines.
(C) Write short Notes on -
(1) Server
(ii) e-Paper
(iii) Domain Name.

Answers

Answer:

RAM Data can be changed while ROM its content can be read but cannot be changed during normal computer operations

Why do i do this XD trolling be like

Answers

Answer:

Explanation:

Note : Each question carry three parts (A), (B), (C) out of
which attempt any two parts. All questions carry
equal marks.
1. (A) What do you mean by computer? Discuss the use of
computer in daily life.
(B) Differentiate between computer hardware & Software.
(C) Describe about the different types of computer
peripherals and memory devices.
2. (A) What is a printer? Explain different types of printer.
(B) What are scanning devices? Explain any four scan-
ning devices.
(C) What is CPU? Discuss components of CPU.

Answers

Answer:

1)a)the electronic device that helps us to read write listen music entertainment play games etc.Use of computer in our life is incredibly necessary. ... Computers have taken industries and businesses to a worldwide level. They are used at home for online education, entertainment, in offices, hospitals, private firms, NGOs, Software house, Government Sector Etc.

b)Hardware is a physical parts computer that cause processing of data. Software is a set of instruction that tells a computer exactly what to do. ... Hardware can not perform any task without software. software can not be executed without hardware.

c)Personal Computer (PC)

2 Workstation

3 Minicomputer

4 Main Frame

2)a)Printers are one of the common computer peripheral devices that can be classified into two categories that are 2D and 3D printers.Laser Printers.

Solid Ink Printers.

LED Printers.

Business Inkjet Printers.

Home Inkjet Printers.

Multifunction Printers.

Dot Matrix Printers.

3D Printers.

b)an electronic device which scans artwork and illustrations and converts the images to digital form for manipulation, and incorporation into printed

c)A central processing unit, also called a central processor, main processor or just processor, is the electronic circuitry that executes instructions comprising a computer program.

A packet contains three parts: header, payload, and trailer.
Choose the answer.
True
False

Answers

Answer:

True

Explanation:

I took the quiz

1.) Which three Windows 10 editions allow you to restrict updates to only security updates?
2.) Which method of backing up system files was available in Windows 7 and is now available again in Windows 10?
3.) Following a failed attempt to upgrade Windows 8 to Windows 10, which two folders on drive D: might contain log files to help you troubleshoot the problem when Windows setup files are stored on drive D:?
4.) Under what circumstances might the product key for Windows be stored on firmware on the motherboard?
5.) Windows 10 has become corrupted and you decide to reinstall the OS. Will the setup process request a product key during the install? Why or why not?

Answers

Answer:

1. Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education.

2.  Backup and Restore Center

3. I'm not sure

4. I'm not sure

5. Yes it will ask for it, but you'll have the option to choose to do it later. When you are loaded into Windows, it will automatically detect your computer and activate. The reason for this is that you might be trying to download a new version of Windows such as Pro.

Components of a network

Answers

Answer:

4 basic components

Explanation:

Networks are comprised of four basic components: hardware, software, protocols and the connection medium. All data networks are comprised of these elements, and cannot function without them.

why are men more exposed to mass media?

Answers

Answer:

because they like exploring

I hope this helps :) it should give an idea on how to answer your question!

An array of integers can be assigned to a memory address in the ...
An array of integers can be assigned to a memory address in the .datanumbers
section of a MIPS assembly language program as show below. Here the length of the array is stored first, and then the elements of the array next.

Implement a MIPS assembly language program to perform the functionality of the following C program and print the updated array content, by listing each integer in it.

It should ask a user to enter three integers, a starting index, an ending index, and an integer to use for a comparison. It should examine only the elements in the array located from the entered starting index, to the entered ending index to check if each of them is greater the last entered integer, then if it is, subtract 3*the last entered integer to each such element in the array.

For instance, if a user enters 2, enters 9, then enters 3, then the output will be the following:

45

-6

14

-7

6

-17

2

-4

14

-26

2

19





i.e., the numbers that are located between the index 2 and 9 are examined to see if each of them is greater than the last entered number (3 in this case),

then each of such element is subtracted with 3 times that number (3 in this case) if it is.

If the entered ending index is larger than 11, then the program should exam elements in the array until the end, and if the entered starting index is less than 0, then it should start examining elements from the first one in the array.

.data

numbers_len: .word 12

numbers: .word 45, -6, 23, -7, 15, -17, 11, -4, 23, -26, 2, 19}





The following shows how it looks like in a C program:


int numbers[12] = {45, -6, 23, -7, 15, -17, 11, -4, 23, -26, 2, 19};

int startIndex, endIndex, num1;
int j;

printf("Enter a starting index:n");

//read an integer from a user input and store it in startIndex
scanf("%d", &startIndex);


printf("Enter an ending index:n");

//read an integer from a user input and store it in endIndex
scanf("%d", &endIndex);

printf("Enter an integer:n");

//read an integer from a user input and store it in num1
scanf("%d", &num1);

if (startIndex < 0)
startIndex = 0;


for (j = startIndex; j <= endIndex && j < 12; j = j+1)
{
if (numbers[j] > num1)
{
numbers[j] = numbers[j] - (3 * num1);
}
}


printf("Result Array Content:n");
for (j = 0; j < 12; j = j+1)
{
printf("%dn", numbers[j]);
}




The following is a sample output (user input is in bold):

Enter a starting index:

2

Enter an ending index:

9

Enter an integer:

3

Result Array Content:

45

-6

14

-7

6

-17

2

-4

14

-26

2

19

Please make sure it can output like the sample above

Answers

Answer:

A :)

Explanation:

1. What is a situation—other than developing software—where it would be useful to follow the software development life cycle? Describe what this process might look like.

2. In this unit, you learned about four types of operating systems. Imagine that you had been hired as a consultant to a new start-up that was going to create and sell a new emergency medical device. Which kind of operating system would you recommend to them? As part of your answer, explain why the other three types of operating systems would be less appropriate.

3. Describe three different software applications that you have used recently.

4. In this unit, you learned about procedural, object-oriented, and event-driven programming. Describe an example of each one in commonly used software.

5. Many people express frustration when they have to contact customer support for help with their software. Describe two things that companies can do to make customer support a more pleasant experience for its users.

Answers

There are different kinds of software. Requirement Gathering and also designing is another stage where it would be useful to follow the software development life cycle.

Why is important to know the software development life cycle?

The software development life cycle is said to be one that increase the value to software development as it helps to give an efficient structure and method to create software applications.

Windows operating systems is the one I would recommend to them as it is much easier to operate than other types.

The three different software applications that you have used mostly are  Electronic Health Record (EHR) Software, Medical database software and Medical imaging software. They are often used in the healthcare system on daily basis.

Event-driven programming software is the often used in graphical user interfaces and other kinds of system applications such as JavaScript web applications. They are based on carrying out some task in response to user input.

Companies can make customer support a more better by actively to them especially their complains and make sure it is handled immediate. They should also list out the cases of high priority and work on them.

Learn more about Developing software from

https://brainly.com/question/22654163


When using VLOOKUP we can search for information from more than one spreadsheet.
True or False

Answers

heyy man it's true for sure

one example of requirement verification techniques

Answers

Answer:

The four fundamental methods of verification are Inspection, Demonstration, Test, and Analysis. The four methods are somewhat hierarchical in nature, as each verifies the requirements of a product or system with increasing rigor.

Explanation:

Why is it important to act according to a code of ethics?

Answers

Answer:

because it clearly lays out the rules for behavior and provides the groundwork for a preemptive warning

what is computer science and what kinds of there jobs?

Answers

Answer:

Careers in Computer Science

One of today’s most popular and lucrative fields of study amongst international students is the field of computer science. In fact, computer science is the third most popular area of study for international students coming to the United States. While the reasons for this are many, the exceptional prospects for careers in computer science play a key role in drawing students to the field. Aside from being one of the best funded and most internationally renowned fields of study within US academics, careers in computer science are among the most in-demand, lucrative, and stable options for today’s college graduates.

Careers in Computer Science

Computer science jobs are in high demand in every industry. Additionally, the high standing of computer science schools in the US has led to increased funding for these computer science departments. This increase in funding translates into a series of implications for international students within the computer science field, including the noteworthy diversification and specialization of the career field. The computer science field offers many potential applications for the degrees international students will be receiving.

What Salary Can You Expect

In addition to the numerous applications of these degrees, computer science graduates are among the highest paid majors, according to Money Magazine. Some example careers in computer science and their national median salaries are:

Software Developer $80,500Software Test Engineer (STE) $84,000Senior Software Engineer $98,000Software Development Manager $115,000Software Architect $116,000Programmer Analyst $74,800Systems Developer $93,800Web Developer $58,000Software Development Engineer, Test (SDET) $82,000Application Support Analyst $69,000Computer Systems Analyst $68,300Database Administrator (DBA) $85,100Systems Administrator $62,900Systems Engineer (IT) $83,300Systems Analyst $81,900Network Administrator, IT $59,000Network Engineer, IT $83,900Business Analyst, IT $81,500Program Manager, IT $111,000Information Technology Specialist $64,200

In addition to the exceptional starting salaries and highly diverse range of applications of computer science jobs, computer science is a highly stable career field. Not only are computer science degrees needed for a number of applications across nearly every industry, but the total number of computer science jobs has also been steadily increasing. In fact, according to the U.S. Department of Labor Bureau of Labor Statistics projection for 2002-2012, 6 of the 10 occupations in the country with the most new jobs are in the field of computer science.

Each Internet location has a unique______address.
Choose the answer.
TCP
RAM
OSI
IP​

Answers

Answer:

IP

Explanation:

Whenever you are connected to the Internet always you have two ip addresses. Your public ip and your private ip. Your ip address has to be unique for you to access the Internet. For example, if you have multiple computers within your home, they most likely each have their own private IP address.

The answer would be IP address

#Python: The given program reads a list of single-word first names and ages (ending with -1), and outputs that list with the age incremented. The program fails and throws an exception if the second input on a line is a string rather than an integer. At FIXME in the code, add try and except blocks to catch the ValueError exception and output 0 for the age.

Ex: If the input is:

Lee 18
Lua 21
Mary Beth 19
Stu 33
-1
then the output is:

Lee 19
Lua 22
Mary 0
Stu 34

"# Split input into 2 parts: name and age
parts = input().split()
name = parts[0]
while name != '-1':
# FIXME: The following line will throw ValueError exception.
# Insert try/except blocks to catch the exception.
age = int(parts[1]) + 1
print('{} {}'.format(name, age))

# Get next line
parts = input().split()
name = parts[0]"

Answers

The program illustrates the use of catching exceptions.

What are exceptions?

Exceptions are program statements that are used to control program errors, and prevent a program from crashing.

How to fix write the exception

The statements that catch the exception in the program are:

try:

       age = int(parts[1]) + 1

       print('{} {}'.format(name, age))

       # Get next line

       parts = input().split()

       name = parts[0]

   except ValueError:

       print('Invalid value!')

       # Get next line

       parts = input().split()

       name = parts[0]

The complete program

The complete program is as follows:

# Split input into 2 parts: name and age

parts = input().split()

name = parts[0]

while name != '-1':

   # FIXME: The following line will throw ValueError exception.

   # Insert try/except blocks to catch the exception.

   try:

       age = int(parts[1]) + 1

       print('{} {}'.format(name, age))

       # Get next line

       parts = input().split()

       name = parts[0]

   except ValueError:

       print('Invalid value!')

       # Get next line

       parts = input().split()

       name = parts[0]

Read more about program exceptions at:

https://brainly.com/question/25012091

Write a program to calculate the angle of incidence (in degrees) of a light ray in Region 2 given the angle of incidence in Region 1 and the indices of refraction n1 and n2. (Note: If n2>n1, then for some angles 1, Equation 2 will have no real solution because the absolute value of the quantity will be greater than 1. When this occurs, all light is reflected back into Region 1, and no light passes into Region 2 at all. Your program must be able to recognize and properly handle this condition.) The program should also create a plot showing the incident ray, the boundary between the two regions, and the refracted ray on the other side of the boundary. Test your program by running it for the following two cases: (a) n1= 1.0, n2 = 1.7, and 1= 45°. (b) n1 = 1.7, n2 = 1.0; and 1= 45°

Answers

The program is an illustration of conditional statements

What are conditional statements?

conditional statements are statements that are used to make decisions

The main program

The program written in Python, where comments are used to explain each line is as follows

#This imports the math module

import math

#This get sthe refraction index 1

n1 = float(input("Refraction index 1: "))

#This get sthe refraction index 2

n2 = float(input("Refraction index 2: "))

#This gets the normal angle of incidence in region 1

theta1 = float(input("Normal of incidence in region 1 (degrees): "))

#If n1 is greater than n2, then there is no real solution

if n1 > n2:

   print("No real solution")

#If otherwise

else:

   #This calculates the angle of incidence

   theta2 = math.asin(n1/n2 * math.sin(math.radians(theta1))) * (180/math.pi)

   #This prints the angle of incidence

   print("Angle of incidence",round(theta2,2),"degrees")

Note that the program only calculates the angle of incidence, it does not print the plot

Read more about conditional statements at:

https://brainly.com/question/24833629

Other Questions
When creating the final version of your action plan all of the following are true EXCEPT:A.all of the goals that you created for yourself are realistic and can be metB.all of the goals reflect the same specific topicC.you have created a time frame for yourself in which to achieve your goalsD.each goal is flexible and can be easily modifiedPlease select the best answer from the choices provided.ABCD When we seeks to discover the best in others', we somehow bring out the best inourselves. For problems 12-17, write each number as a percent. which is greater 4/9 or 12/18 When houses are being built or renovated the electrical must meet a certain code to ensure it is both safe and efficient. In oneto two sentences explain how electricians make sure the wiring is safe and efficient will not cause fires, and will keep a housewarm and well lit 2 points) EssayHow did the idea of reincarnation affect the caste system in Indus Valley civilization? Explain and provide some examples. What are 3 examples of figurative language in this text?May this be the dayWe come together.Mourning, we come to mend,Withered, we come to weather,Torn, we come to tend,Battered, we come to better.Tethered by this year of yearning,We are learningThat though we weren't ready for this,We have been readied by it.We steadily vow that no matterHow we are weighed down,We must always pave a way forward.This hope is our door, our portal.Even if we never get back to normal,Someday we can venture beyond it,To leave the known and take the firststeps.So let us not return to what was normal,But reach toward what is next.What was cursed, we will cure.What was plagued, we will prove pure.Where we tend to argue, we will try toagree,Those fortunes we forswore, now thefuture we foresee,Where we weren't aware, we're nowawake;Those moments we missedAre now these moments we make,The moments we meet,And our hearts, once all together beaten,Now all together beat.Come, look up with kindness yet,For even solace can be sourced fromsorrow.We remember, not just for the sake ofyesterday,But to take on tomorrow.We heed this old spirit,In a new day's lyric,In our hearts, we hear it:For auld lang syne, my dear,For auld lang syne.Be bold, sang Time this year,Be bold, sang Time,For when you honor yesterday,Tomorrow ye will find.Know what we've foughtNeed not be forgot nor for none.It defines us, binds us as one,Come over, join this day just begun.For wherever we come together,We will forever overcome. Bill wants to calculate the width of each interval by using the approximation formula. He first created a frequency distribution with 5 intervals. The minimum and maximum for the variable are -32.4 and 65.09 respectfully. Calculate the width of each interval for Bill. A. 13.018 B. 6.480 C. 19.498 D. -19.498 The main conflict between European colonists and Native Americans was over land. What principle refers to peaceful seizure of land that was considered to be underutilized by the indigenous people 2 to the 1st power times 30 NEED HELP! SCIENCE HW IS DUE IN 1 HOUR!!!!!!!!What type of changes are these and why?Ctting hair is a (physical/chemical) change.Cooking is a (physical/chemical) change.Ice cream melting in the sun is a (physical/chemical) change.Options for Reasons1. Change of state2. Changes what object is3. Causes a reaction (signifies chemicals change) I need help1.)how are shellfish different from finfish?2.)why is it important to know the difference between shellfish and finfish? 7 pounds of plums make 8 rolls of fruit leather. If every batch of fruit leather requires the same amount of plums, how many pounds of plums are required to make 20 rolls of fruit leather? HELP FAST PLS YOU GUYS Daniel and Saquon are each saving money.Daniel starts with $50 in his savings account and adds $8 per week.Saquon starts with $65 in his savings account and adds $5 each week.QUESTION: After how many weeks will Daniel and Saquon have the same amount of money in their savings account? Immediately after a forest fire, the primary consumers in the area will compete most for which biotic factor?FoodSpace (its for Science not social studies)OxygenSunlight (please hurry) A phone line runs east along a field of 1 miles and then north along the edge of the same field for 3 miles. If the phone line cost 3500 per mile to install, how much could have been saved if the phone line had been installed diagonally across the field? Which lines from the poem best expresses the speaker's attitude toward oppression?A"From awakening eyes in a black face " ( Line 2)B"I look then at the silly walls" ( Line 6)C"I look at my own body" ( Line 11)D"Then let us hurry, comrades" ( Line 15) Trina runs 4 laps around a park. each lap is 1/3 of a mile. trina wants to know how many total miles she runs oihyg8yib8yby8bybjnoniniob