Question 1

Cyberspace is wholly contained within

The internet
The information environment
All networked computers
The logical network
Question 2

This is known as an ecosystem of connected sensors attached to everyday devices and appliances:

TOR
IoT
AI
AoT
Question 3

National cybersecurity is challenging because threats

Mostly happen inside national borders
Usually originate from other nations
Do not abide to national borders
Are almost always international
Question 4

Governance of the Internet is challenging the sovereign rights of states because international law

Recognizes U.S. laws over other states
Recognizes legal and physical control
Is only relevant in some cases
Is irrelevant in cyberspace
Question 5

Which one of the domestic security services groups below is not continuously being monitored in cyberspace?

Terrorists
Criminals
Admins
Spies
Question 6

Which of the following may be considered the most challenging part of cybersecurity?

Viruses
Humans
Malware
Hardware
Question 7

Why is it sometimes difficult to determine if computer problems are due to cyberattack?

Computer malfunctions can be the cause of problems.
Cyberattacks are never aimed at disrupting hardware.
Cyber criminal activities are nearly impossible to detect.
Computer problems are never caused by cyberattack.
Question 8

Which of these is a challenge created by the fast pace of technological changes?

Laws and policies have no influence on technological changes.
Laws and policies change faster than technology.
Laws and policies don’t keep the pace of the technological changes.
Laws and policies constrict the pace of technological changes.
Question 9

Which of these is the condition of being free from observation or disruption by other people?

Politics
Policies
Patience
Privacy
Question 10

Which is a reason IoT devices are a point of weakness in the cybersecurity landscape?

The open source software often used in IoT devices cannot be updated.
IoT devices do not require the same kind of security.
IoT devices’ security vulnerabilities are not easily patched.
IoT devices cannot use two-factor authentication.

Answers

Answer 1

1) Cyberspace is wholly contained within The Internet (Option A)

2) This is known as an ecosystem of connected sensors attached to everyday devices and appliances: IoT (Option B)

3) National cybersecurity is challenging because threats "Do not abide to national borders" (Option C)

4) Governance of the Internet is challenging the sovereign rights of states because international law: "Is irrelevant in cyberspace." (option D)

5) The option that is the domestic security services groups below which is not continuously being monitored in cyberspace is: Admins (Option C)

6) The option that may be considered the most challenging part of cybersecurity is: "Humans" (Option B)

7) It is sometimes difficult to determine if computer problems are due to cyberattacks because: "Computer malfunctions can be the cause of problems." (Option A)

8) The condition of being free from observation or disruption by other people is called: "Privacy" (Option D)

9) One reason IoT devices are a point of weakness in the cybersecurity landscape is: "IoT devices’ security vulnerabilities are not easily patched." (Option C)

What is cybersecurity?

Note that Cybersecurity is the protection of internet-connected systems, including hardware, software, and data, from attacks, theft, and damage.

It involves implementing a variety of measures, such as antivirus software, firewalls, and secure passwords, to ensure the confidentiality, integrity, and availability of information and systems. Cybersecurity is important because it helps to prevent unauthorized access to sensitive information, protect against data breaches, and ensure the continuity of critical systems and services.

Learn more about cybersecurity:
https://brainly.com/question/28112512
#SPJ1


Related Questions

Describe an association or rhyming phrase you have used to remember information. Was this a useful technique for you? Why or why not?

Answers

Answer:

I used the names George Clooney and Tim Allen to remember the pairs of nitrogenous bases in DNA.

Explanation:

DNA is composed of nucleotides, however the nucleotides are formed by nitrogenous bases called Adenine, Guanine, Cytosine and Thymine. Each nucleotide has a nitrogenous base, but these bases form pairs, allowing the nucleotides to come together. The pairs are formed solely by Timine and Adenine or Guanine and Cytosine.

As I needed to remember the formation of the pairs to do my biology test, I associated the first letter of each base, with the initials of two famous names.

As Guanina is paired with Cytosine (G-C), I associated this pair with the initial letters of the name George Clooney. As Timina is paired with Adenina (T-A), I associated this pair with the initials of the name Tim Allen.

Explain what Fahd did wrong in the scenario below. Fahd is running ten programs at once on his laptop when it suddenly freezes up. To fix this problem, Fahd buys a new battery for his laptop.

Answers

Answer:

Well first off. if the laptop froze that doesn't mean the battery is dead to the point where a simple rest of the laptop wouldn't work out.

Write a program that accepts an integer value called multiplier as user input. Create an array of integers with ARRAY_SIZE elements. This constant has been declared for you in main, and you should leave it in main. Set each array element to the value i*multiplier, where i is the element's index. Next create two functions, called PrintForward() and PrintBackward(), that each accept two parameters: (a) the array to print, (b) the size of the array. The PrintForward() function should print each integer in the array, beginning with index 0. The PrintBackward() function should print the array in reverse order, beginning with the last element in the array and concluding with the element at index 0. (Hint: for help passing an array as a function parameter, see zybooks section 6.23) As output, print the array once forward and once backward.

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

void PrintForward(int myarray[], int size){

   for(int i = 0; i<size;i++){        cout<<myarray[i]<<" ";    }

}

void PrintBackward(int myarray[], int size){

   for(int i = size-1; i>=0;i--){        cout<<myarray[i]<<" ";    }

}

int main(){

   const int ARRAY_SIZE = 12;

   int multiplier;

   cout<<"Multiplier: ";

   cin>>multiplier;

   int myarray [ARRAY_SIZE];

   for(int i = 0; i<ARRAY_SIZE;i++){        myarray[i] = i * multiplier;    }

   PrintForward(myarray,ARRAY_SIZE);

   PrintBackward(myarray,ARRAY_SIZE);

   return 0;}

Explanation:

The PrintForward function begins here

void PrintForward(int myarray[], int size){

This iterates through the array in ascending order and print each array element

   for(int i = 0; i<size;i++){        cout<<myarray[i]<<" ";    }

}

The PrintBackward function begins here

void PrintBackward(int myarray[], int size){

This iterates through the array in descending order and print each array element

   for(int i = size-1; i>=0;i--){        cout<<myarray[i]<<" ";    }

}

The main begins here

int main(){

This declares and initializes the array size

   const int ARRAY_SIZE = 12;

This declares the multiplier as an integer

   int multiplier;

This gets input for the multiplier

   cout<<"Multiplier: ";    cin>>multiplier;

This declares the array

   int myarray [ARRAY_SIZE];

This iterates through the array and populate the array by i * multiplier

   for(int i = 0; i<ARRAY_SIZE;i++){        myarray[i] = i * multiplier;    }

This calls the PrintForward method

   PrintForward(myarray,ARRAY_SIZE);

This calls the PrintBackward method

   PrintBackward(myarray,ARRAY_SIZE);

   return 0;}

what is the main reason for adding somebody into the BCC list for an email?​

Answers

Answer:

protecting email address privacy

Explanation:

for securing and privacy reasons and it is for the best

2. Which of the following is not one of the guidelines for using instant messaging?A.You can use in place of all face-to-face communication.
B.Keep messages short.
C.Never text or send an instant message when you are angry.
D.Use it for casual conversations.​

Answers

Answer:

A. You can use in place of all face-to-face communication.

Explanation:

Hope this helps

What do fair use and copyright laws help you understand ?

Answers

Explanation:

we can understand about the systematic laws and surely we can be aware of such things also it promotes the correct use of our technology and innovations.

In its most general sense, a fair use is any copying of copyrighted material done for a limited and “transformative” purpose, such as to comment upon, criticize, or parody a copyrighted work. ... In other words, fair use is a defense against a claim of copyright infringement.

hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me ​

Answers

Answer:

a pseu code is a is an artificial and informal language that helps programmers develop algorithms.

Explanation:

ASKING AGAIN CAUSE I GOT A WEIRD LINK
¸ . ★ ° :. . • ° . * :. ☆¸ . ★ ° :. . • ° . * :. ☆ ¸ . ★ ° :. . • ° . * :. ☆ ¸ . ★ ° :. . • ° . * :. ☆
the purpose of the ___________ element is to group together a set of one or more [h1] element so that theyre treated as a single heading
a. header
b. hgroup
c. h1group
d. group

Answers

Answer: A.) Header
Answer Explanation: Process of elimination

What is the output from main (below) after the following function is called. void calculateCost(int count, double& subTotal, double& taxCost) // definition { if ( count < 10) subTotal = count * 0.50; else subTotal = count * 0.20; taxCost = 0.1 * subTotal; } int main() { double tax = 0.0, subTotal = 0.0; calculateCost(15, subTotal, tax); // function call cout << "The cost for 15 items is " << subTotal << ", and the tax for "<< subTotal << " is " << tax << endl; return 0; }

Answers

Answer:

     

Explanation:

1-DESIGN TAB....................2-LAYOUT TAB .

1-wordart styles,

2-table size,

1-Table styles,

2-alignment,

1-draw borders,

2-rows and columns

Answers

design tab

wordart stylestable stylesdraw border

layout tab

table sizerows and columnsalignment

Answer:

The person above is correct.

Explanation:

grouping keywords into separate lists for different sections for a website is known as

a. researching
b. comparing
c. organizing
d. brainstorming

Answers

Answer:

C

Explanation:

A is when you surf the web for facts.

B is just finding the difference between 2+ things.

D is when you think of a bunch of ideas firsthand before officially planning anything.

Brainliest? (❁´◡`❁)

C++

Assume the existence of a Window class with integer data members width and height. Overload the << operator for the Window class-- i.e., write a nonmember ostream-returning function that accepts a reference to an ostream object and a constant reference to a Window object and sends the following to the ostream: 'a (width x height) window' (without the quotes and with width and height replaced by the actual width and height of the window. Thus for example, if the window had width=80 and height=20, << would send 'a (80 x 20) window' to the ostream object.) Don't forget to have the function return the proper value as well. Assume the operator has been declared a friend in the Window class.

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

class Window //defining a class Window

{

private:

int width, height;//defining integer variable

public:

friend ostream& operator << (ostream& stm, Window& width)//defining a friend function that takes two parameters

{

return stm<<"a ("<<width.width<<" x "<<width.height<<") window"; //use return keyword that return its values

}  

Window(int width, int height): width(width), height(height)//defining parameterized constructor that inherit width and height in its parameters  

{}

};

int main() //Main method

{

Window w(80,90);//calling class constructor

cout<<w;//print object value

return 0;

}

Output:

a (80 x 90) window

Explanation:

In the above code, a class "Window" is defined that uses a friend function "ostream& operator" is declared that uses the "ostrea&" as a data type to hold two-variable "stm and w" in its parameter, and declared the parameterized constructor to hold value by inheriting width and height in its parameters.

Inside the main method, a class object is created that calls the constructor and uses the print method to print object value.

Which of the following traversals would print all of the elements in the 2D array of integers nums
in column-major order?

Answers

Answer:

This is from three days ago im

guessing you got the answer if you can get it to me that would be awesome

The traversals would print all of the elements in the 2D array of integers nums in column-major order is  for(int row = 0; row < nums[0].length; row++) { for(int col = 0; col < nums.length; col++){System.out.println (nums[row][col]); } }. The correct option is c.

What is a 2D array?

A matrix is another name for a 2D array. Look at the example below to learn how to generate a 2D array of integers: integer matrix [2][3] = 1, 4, 2, 3, 6, 8; The first dimension [2] denotes the quantity of rows, and the second [3] the number of columns.

Use the new keyword, a space, the type, the number of rows in square brackets, and the number of columns in square brackets to build an array, as in new int[numRows][numCols]. A 2D array has as many elements as its number of rows twice its number of columns.

Therefore, the correct option is c) for(int row = 0; row < nums[0].length; row++) { for(int col = 0; col < nums.length; col++) { System.out.println(nums[row][col]); } }.

To learn more about a 2D array, visit here:

https://brainly.com/question/27171171

#SPJ6

The question is incomplete. Your most probably complete question is given below:

a) for(int col = 0; col < nums.length; col++) { for(int row = 0; row < nums[col].length; row++) { System.out.println(nums[col][row]); } }

b) for(int row = 0; row < nums.length; row++) { for(int col = 0; col < nums[0].length; col++) { System.out.println(nums[col][row]); } }

c) for(int row = 0; row < nums[0].length; row++) { for(int col = 0; col < nums.length; col++) { System.out.println(nums[row][col]); } }

d) for(int row = 0; col < nums[0].length; col++) { for(int row = 0; col < nums.length; row++) { System.out.println(nums[row][col]); } }

Choose the correct option that completes the sentence.
Cybersecurity measures should promote the
and
of data.

Answers

What are the answer options?

The practice of defending systems, networks, and programs from online threats is known as cybersecurity.

What is Cybersecurity?

These cyberattacks often aim to gain access to, change, or erase private information; demand user ransom; or hinder normal business processes.

Setting up efficient cybersecurity measures is particularly challenging today because there are more devices than people and attackers are becoming more inventive.

A cybersecurity approach provides many degrees of security for the systems, networks, programs, or data that one wants to keep secure. An organization's people, processes, and technology must all work together to provide a solid defense against cyberattacks.

Therefore, The practice of defending systems, networks, and programs from online threats is known as cybersecurity.

To learn more about Cybersecurity, refer to the link:

https://brainly.com/question/27560386

#SPJ2

Note that common skills are listed toward the top and less common skills are listed toward the bottom. According to O*NET, what are some common skills needed by Accountants? Select four options

mathematics
reading comprehension
equipment maintenance
quality control analysis
active listening
writing

Answers

Answer:

I. Mathematics.

II. Reading comprehension

III. Active listening

IV. Writing

Explanation:

O*NET is the short for Occupational Information Network and it is a comprehensive online database that is uniquely designed to provide information about job requirements, staff competencies, work styles, abilities, skills and other resources. Thus, O*NET is the primary source of occupational information for the private and public sector of the United States of America. Also, it helps to identify and develop the work styles, skills, activities and abilities of various occupations of the American workforce.

According to O*NET, some common skills needed by Accountants include the following;

I. Mathematics: an accountant is required to have a good knowledge of different mathematical concepts such as arithmetic, calculus, algebra, statistics, etc., as well as their application to the field of accounting.

II. Reading comprehension: he or she should be able to read and understand the informations contained in all work-related documents.

III. Active listening: accountants are required to pay adequate attention to the informations that are given by the customers without interjections.

IV. Writing: they should be able to compose well-written and clear textual informations about work-related activities.

Answer:

I. Mathematics.

II. Reading comprehension

III. Active listening

IV. Writing

Explanation:

What are some other sites similar to brainly? By similar I mean being able to ask a question and answer them based on categories.

Answers

Answer:

jiskha.com

Explanation:

Answer:

Quora and Yahoo answers are alright

13. Place where names, addresses and email information
is stored

Answers

Answer in ur email

Explanation:

In addition to assessing whether each of your independent variables has an effect on the dependent variable, a factorial ANOVA also allows you to:
A) use multiple dependent measures in a single analysis.
B) control for a third variable that might be related to your dependent measure prior to
investigating the independent variable of interest.
C) determine whether the effects of one factor depend on the other factor.
D) partition out the variability due to individual differences and the variability due to
measurement error.

Answers

Answer:

C) determine whether the effects of one factor depend on the other factor.

Explanation:

ANOVA is analysis of variance which helps to understand whether the population mean are equal or not. It is statistical model which is used by the businessmen to analyze their business performance. ANOVA also determines whether the effect of one factor are related or dependent on other factor.

Which of the following best explains how messages are typically transmitted over the Internet? The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device. The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device. A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. B The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device. The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device. C The message is transmitted as a single file and received in whole by the recipient’s device.

Answers

Answer:

A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.

Explanation:

Network packets are used to send data across a network. These can be routed in any order independently of one another as they will all eventually reach their destination device.

Which of the following is not an example of a source of information that contributes to the accumulation of big data

Answers

Answer:

Law enforcement officials request the driver's license history for a suspect they recently apprehended.

Explanation:

The option that doesn't cause accumulation of big data is that Law enforcement officials request the driver's license history for a suspect they recently apprehended.

What causes accumulation of data?

Data is an information that is processed by a computer and can be stored in the computer for future use or reference purposes.

The quantity of data processed by a computer depends on the volume of the raw data that is collected and prepared before processing takes place.

From the given options;

Law enforcement officials request the driver's license history for a suspect they recently apprehended. This is just the data of a single individual which can not cause big data accumulation.

Receivers in cell phones request position information from nearby cell phone towers, and this location information is communicated to cell phone companies. This involves more that one cell phone company therefore can cause accumulation of big data.

Search engine providers store all search terms entered by users. This can cause accumulation of data.

Hundreds of satellites stationed above the earth capture images of the earth’s surface. This can cause accumulation of data.

Therefore data from a single source cannot cause accumulation of big data.

Learn more about data processing here:

https://brainly.com/question/26642156

One of the disadvantages of cable technology is that: while it works well for television signals, it is ineffective for data transmissions required by the Internet. while it works well for television signals, it is ineffective for data transmissions required by the Internet. none of the available options are true. none of the available options are true. it is incompatible with most modern communication systems. it is incompatible with most modern communication systems. systems used by many providers require customers to share bandwidth with neighbors. systems used by many providers require customers to share bandwidth with neighbors.

Answers

Answer:

systems used by many providers require customers to share bandwidth with neighbors

Explanation:

One of the disadvantages of cable technology is that systems used by many providers require customers to share bandwidth with neighbors. This ultimately causes many problems since cables would need to be extended to reach every single user that will be sharing the bandwidth. This would mean cables all over the place. Also, it is very difficult to limit the bandwidth per person, meaning that if anyone is using up all of the bandwidth through the cable, the rest of the individuals connected would not have the bandwidth that they need or are paying for.

BRAINLIEST WILL BE GIVEN

which technique can you use on your pages to improve ratings in search engines

a. on-page
b. search review
c. off-page
d. off-site

Answers

Answer:

mine is search review

Explanation:

so u can know if its bad or good rewiev s are very helpfull

you would use conditional formatting on a cell when you want to _____

Answers

Answer:

to format a cell based on the value in it

Explanation:

you would use conditional formatting on a cell when you want to format a cell based on the value in it.

Reason -

Conditional formatting allows you to format a cell based on the value in it.

For example, if you want to highlight all the cells where the value is less than 30 with a red color, you can do that with conditional formatting.

How would you highlight cells with negative values in it?

You can use conditional formatting.

In order to multitask, a computer must have two or more processors. True or False

Answers

Answer:

False

Explanation:

:) brainliest pls

Answer:

True

Explanation:

You should contact your references _____ a job interview.


only if the interviewer asks for your references

before and after

before

after

Answers

Answer:

My research suggests that it is before and after.

You should contact your references before and after a job interview.

What is Interview?

A planned interaction in which one party asks questions and the other responds is known as an interview. A one-on-one chat between an interviewer and an interviewee is referred to as a "interview" in everyday speech.

The interviewee answers the interviewer's questions by typically supplying information. Other audiences may utilize or receive that information right away or later.

This characteristic is common to many different types of interviews; even though there may not be any other people present during a job interview or an interview with a witness to an occurrence, the answers will still be given to other people later on in the hiring or investigative process.

Therefore, You should contact your references before and after a job interview.

To learn more about Interview, refer to the link:

https://brainly.com/question/13073622

#SPJ2

1. What is used to change the appearance of a cell's value based on parameters set by the user?

Answers

conditional formatting

Enumerate a couple of reasons why it would be impracticable for the external devices to be connected directly to the processor or the system bus

Answers

Answer:

(a) Difference in data transfer rates

(b) Difference in word lengths

(c) Different peripherals with different modes of operation

Explanation:

There are several reasons. Some of them have been listed in the explanation section. A brief explanation is as follows

(a) Difference in data transfer rates

Some peripherals have fast transfer rate while some have slow transfer rates compared to the processor they are being connected to. This difference in the rates implies that a high speed system bus will find it difficult to communicate with a (say) low speed peripheral.

(b) Difference in word lengths

Another consideration is the word lengths. Often times, peripherals and the bus they are being connected with will have a different word lengths.

(c) Different peripherals with different modes of operation

In computer architecture, a processor can not be used to interact with peripheral of different mode of operations. In other word, each peripheral have its own mode and will require different means of connection.

Select the correct answer.
Which principle of animation is prominent in this picture?
A.staging
B.arcs
C.anticipation
D. timing

Answers

The principle of animation reflected in the image is the arcs principle.

What is animation?

Animation refers to the action of recreating actions and movements by using drawings or models.

What are the principles of animation?Animation is regulated by specific principles, some of them include:Anticipation: Showing the movement or position that anticipates an action.Timing: Making an action fast or slow by using a specific number of frames.Staging: Using specific elements to stage one action and avoiding unnecessary elements.Arcs: Showing the natural movement of a specific action.

Based on this, the principle used in the image is the arcs because it emphasizes the natural curve or natural movement of someone playing golf.

Learn more about draw in: https://brainly.com/question/4853831

Answer:

B. arcs

Explanation:

What happens once the Insert tab is used in PowerPoint to insert a chart into a presentation?
A separate data sheet opens in which to enter data for the chart.
The user is prompted to link to an external Excel spreadsheet
The user can edit the chart directly
Nothing happens

Answers

Answer:

A (because you can't have a chart without information, right?)

brainliest plz

Explanation:

list the first prime minister of St Vincent and the grenadines​

Answers

Robert Milton Cato (June 3rd, 1915 - February 10, 1997)

Other Questions
A rectangular playing field at a scale of 1:1000, 100m 2. Why did the Allies need to be rescued at Dunkirk? Is the following sentence true or false? Topographic maps would be useful forplanning a new highway, Explain you answerHelp please I'll give brainless i need help and please dont give me the site to go to, i cant download it, right answer gets brainliest and free pointsBureaucratic rulemaking is best defined as which of the following?A: The ability to settle debates between states and agencies on how to implement a lawB: The power to make legally binding standards that all persons under the agencys authority must followC: The practice of hiring and promoting individuals based on their qualifications and job performanceD: The authority to decide how to implement a law and decide Congresss intention when it passed the law How to malce Pastillas de lechePastillas de leche are sweet and milky candies that are usually servedafter meal. Make this classic Pinoy dessert recipe in three easy steps! First,combine milk and sugar in a saucepan; bring to a boil and stir constantlyuntil it turns into a paste. Add butter and powdered milk. Mix thoroughly.Next, take the pan off the heat and transfer mixture to a separate bowl. Setaside until pastillas are cool enough to touch but still warm. Dividepastillas into 20 pieces and roll into small cylinders. Finally, roll lightly insugar. Wrap in paper by placing in the center of a square, rolling it into acylinder, and tucking the ends into the roll2. What is the text about?___________3. What do you think will happen if one or two steps are missed?______________________________ The value of y varies directly with x. If x=4, then y=10. a. Find the constant of proportionality. b. Write an equation to represent the situation. How are lysosomes and vacuoles the same? How arethey different? Determine whether the point (7,4) is on the circle, or inside or outside the circle x^2+y^2=62 What is the current flowing through a 10 resistor in a parallel circuit with a 120 V potential difference across it?on someone please help with this math question! ill give brainly if its correct Help! Spanish! (I keep getting the answers wrong) 9. The sum of 10 and 7 times a number is 59. What is thenumber? (Use n as the variable.) PLEASE ANSWER CORRECTLY The picture shows a landform that broke apart and the rock fell into the valley below. The rock was in high mountains, often subjected to harsh weather. The rock was made of solid granite and there were few plants growing on the cliff.Based on the evidence, what most likely caused the rock to fall?Choose the correct answer.1.Acid rain dissolving a fragile portion of the rock2.Freeze-thaw forming cracks in the rock and spreading the cracks over time3.Tree roots growing between cracks in the rock and pushing the rock away from the cliff OR4.Oxidation by oxygen and water creating rust that slowly wore the rock away from the cliff A triangular prism has faces. PLSSSSS HELPPPPPHow did Christianity unite the inhabitants of medieval Europe?(remember to use topic sentence and evidence PLEASE HELP! - I'll MARK BRAINLIEST1. Describe the steps to add integers. 2. Describe the steps to subtract integers.3. Describe the steps to multiply integers.4. Describe the steps to divide integers.directions - just explain how to do each of the things listed above. take your time. I'll mark brainliest to the first person who answers. Thanks! During the school year, 1.3 x 102 students participate in football, and .5 x 102 participate in soccer. What is the total number of students that participate in football 16.BONUS:A lamp produced a shadow of a man standing in the middle of a stage.21 1925 metersHow long is the shadow?; Which expression is equivalent to -4(2k - 6) - 4k claire is writing a report about kangaroos. the report must be two full pages. if she can fit 20 lines on each page with about 20 words per line, approximately how many words in all will claires report be?