what virus modifies the directory table entries so they point to the virus code instead of the actual program?

Answers

Answer 1

There is a type of virus known as a “cluster” virus that infects your files not by changing the file or planting extra files but by changing the DOS directory information so that directory entries point to the virus code instead of the actual program.

What is a directory table virus?

Type of virus which will modify directory table entries so that it points users or system processes to the virus code instead of the actual program. There is only one copy of the virus on the disk infecting all the programs in the computer system.

When does a virus affect a computer?

Some viruses affect computers as soon as their code is executed; other viruses lie dormant until a pre-determined logical circumstance is met. Identify the virus that modifies the directory table entries so that directory entries point to the virus code instead of the actual program.

To know more about cluster visit :-

https://brainly.com/question/15016224

#SPJ4


Related Questions

Which of the following is the best strategy when thinking about what obstacles to include in a game?

A.
Create the hardest obstacles first in the game.
B.
Start with the simplest obstacles first and then progress to more difficult obstacles.
C.
Don’t include any obstacles in the first level.
D.
Make all the obstacles the same so that the player will eventually know what to expect.

Answers

Answer:

B. Start with the simplest obstacles first and then progress to more difficult obstacles.

Explanation:

This approach allows players to become familiar with the game and learn the controls and mechanics before they encounter more challenging obstacles.

Starting with simple obstacles also allows players to develop their skills and confidence before tackling more difficult challenges. This can help to prevent frustration and increase player engagement and enjoyment.

suppose that executives working for two different automobile manufacturers exchange emails in which they discuss jointly increasing prices for their latest hybrid electric suvs.

Answers

The illegal communication would violate the law of the Sherman Antitrust Act of 1890. The correct option is A.

What is the Sherman Antitrust Act of 1890?

The Sherman Antitrust Act of 1890 is a federal statute that forbids practices that impede interstate trade and market competition.

It criminalizes any contract, conspiracy, or combination of corporate interests that restricts foreign or interstate trade. 15 U.S.C. codifies the Sherman Act. A statute to defend trade and commerce from illegal constraints and monopolies.

Therefore, the correct option is A, The Sherman Antitrust Act of 1890.

To learn more about the Sherman Antitrust Act, refer to the link:

https://brainly.com/question/28546811

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Cooperation among oligopolies runs counter to the public interest because it leads to underproduction and high prices. In an effort to bring resource allocation closer to the social optimum, public officials attempt to force oligopolies to compete instead of cooperating.

Consider the following scenario:

Suppose that executives working for two different automobile manufacturers exchange emails in which they discuss jointly increasing prices for their latest hybrid electric SUVS.

This illegal communication would violate which of the following laws?

The Sherman Antitrust Act of 1890

The Celler-Kefauver Act of 1950

The Robinson-Patman Act of 1936

The Clayton Act of 1914

you need to store key-value pairs of users and their high scores for a gaming application. which is the fastest and cheapest storage option for this type of data?

Answers

Amazon S3 - RDS MySQL - DynamoDB - Amazon RedShift is the quickest and least expensive storage solution for gaming application data.

Key-value pair-based items are stored in what form of storage?

A key-value database stores data as key-value pairs, where a key serves as a unique identifier. Anything, from simple items to complex composite ones, can be used as a key or value.

What types of data are supported by S3?

Almost every type of data can be stored in any format. For more information, please see the Amazon Web Services Licensing Agreement. You are permitted to store an infinite number of items and pieces of data.

To know more about application visit:-

https://brainly.com/question/28650148

#SPJ1

What are the components that could be used in a mathematical formula? Check all that apply.

Answers

Answer:

variable

expression

operator

result

"You are trapped step by step to the electronic medicu Justify your answer

Answers

You are trapped step by step in the electronic media when you are consistently using electronic mediums in every area of your life such as your home office and cannot do without them for a single minute.

What is electronic media?

The term "electronic media" refers to any media that are transmitted or stored electronically. This includes various forms of media such as television, radio, the Internet, social media, and other digital platforms.

Some people may feel "trapped" in the electronic media if they spend a significant amount of time using these platforms, possibly to the detriment of their physical and mental health or their relationships with others.

However, it is important to note that electronic media can also provide many benefits and opportunities, such as access to information, communication with others, and entertainment. It is up to the individual to use electronic media in a healthy and balanced way.

Learn more about electronic media from

https://brainly.com/question/25356502
#SPJ1

See correct question below

"you are trapped step by step in the electronic media" . Justify your answer

Please help me with the triangle

Answers

Answer:

class Main {

 public static void main(String[] args) {

   makeATree();

 }

 private static int TREESIZE = 9;

 public static void makeATree() {

   String gap = "";

   for (int row = TREESIZE; row > 0; row--) {

     System.out.print(gap);

     gap += " ";

     for(int col = 0; col < row; col++) {

       System.out.printf("* ");

     }

     System.out.printf("\n");

   }

 }

}

Explanation:

Here you go. The tree size is a magic number, so I isolated that into a static class variable.

the nosql model that includes a simple pair of a key and an associated collection of values is called a:

Answers

The NoSQL model that includes a simple pair of a key and an associated collection of values is called A) key-value store.

What is the purpose of a key-value store?

Key-value stores are frequently used for in-memory data caching to speed up applications by reducing reads and writes to slower disk-based systems, according to the technical side of things. A solution that offers an in-memory key-value storage for quick data retrieval is Hazelcast.

Therefore, in regards to the context above, a key-value database is a kind of nonrelational database that stores data using the straightforward key-value technique. Data is stored in key-value pairs, where a key acts as a unique identifier, in a key-value database. Anything can serve as a key or value, from straightforward things to intricate composite objects.

Learn more about NoSQL model from

https://brainly.com/question/14780974

#SPJ1

See options below

A) key-value store.

B) document store.

C) wide-column store.

D) graph database.

the next thing you review is the file containing pictures of sandwich deliveries over a period of 30 days. what type of data is this?

Answers

The next thing you review is the file containing pictures of sandwich deliveries over a period of 30 days. This is an example of structured data.

What is structured data?

Machine learning algorithms can quickly and readily understand highly organized structured data, which is often characterized as quantitative data. The computer language used to manage structured data is called structured query language (SQL), and it was created by IBM in 1974. Consider the type of information that neatly fits into the fixed fields and columns of relational databases and spreadsheets. Names, dates, addresses, credit card numbers, stock information, geolocation, and other information are examples of structured data. Machine language can quickly and easily comprehend highly ordered data. Unstructured data is a collection of many different forms of data that are saved in their native formats, as opposed to structured data, which is very particular and is stored in a preset manner. This indicates that unstructured data uses schema-on-read and structured data benefits from schema-on-write.

To know more about structured data visit:

https://brainly.com/question/28447743

#SPJ1

What should be entered to make the loop below print

55
60
65

x = 50
while (x < 65):
x = x + ____
print (x)

Answers

Answer:

5

Explanation:

5 is the correct answer because 50 + 5 = 55, 55 + 5 = 60, 60 + 5 = 65

One should enter 5 to make the loop below print 55, 60, and 65.

What is Loop print?

A loop print is a particular kind of conditional in programming that includes expressing an outcome for a piece of code that we want the machine to run repeatedly while we are programming.

This implies that a string can be iterated over character by character.

The values listed in the reference are 55, 60, and 65, which correspond to the query. This indicates that the reference value's difference is found to be 5.

So, when we print this value as an outcome, we will require to follow some steps:

x = 50

while (x < 80):

x = x + 5

print (x).

Thus, the answer is 5.

For more details regarding loop print, visit:

https://brainly.com/question/14722722

#SPJ2

A. Formulate a related decision problem for the independent-set problem, and prove that it is NP-complete. (Hint: Reduce from the clique problem. )

b. Suppose that you are given a "black-box" subroutine to solve the decision prob- lem you defined in part (a).

Give an algorithm to find an independent set of max- imum size. The running time of your algorithm should be polynomial in jV j and jEj, counting queries to the black box as a single step

Answers

If a problem is in NP, then we can verify (ask whether the solution provided is accurate or not) the certificate in polynomial time given a "certificate,”.  Which is a solution to the issue and an instance of the issue (in this case, a graph G and a positive integer k).

What proof that it is NP-complete?

An NP-Complete issue can be solved in polynomial time by a non-deterministic Turing machine. If and only if there is an NP-Complete issue, such as Y, that can be reduced into a NP-Hard concern, X, in polynomial time, can NP-Complete concerns be solved.

Therefore, If a concern is included in both NP and NP-Hard Problems, it is said to be NP-Complete.

Learn more about NP complete here:

https://brainly.com/question/15097934

#SPJ1

A designer creates a mockup of a website homepage for a youth services nonprofit. They incorporate elements that add hierarchy to the design, make text easy to read, and add visual style. What visual design element are they using?.

Answers

I Have No Idea......

What is a standardized visual modeling language for developing computer software?.

Answers

Answer:

UML. Unified Modeling Language

Specify the statement that provides the most control over iteration in a loop structure.

A for statement.
A while statement.
A break statement.
A range statement.

Answers

Answer:

A break statement.

Explanation:

a break statement provides the most control over iteration in a loop structure because it can be used to stop the loop before it has looped through all the items.

during a regional state of emergency, an internet service provider offered three months of free internet access to anyone affected by the crisis. this effort was intended to help reduce the impact of ___________.

Answers

During a regional state of emergency, an internet service provider offered three months of free internet access to anyone affected by the crisis. this effort was intended to help reduce the impact of Digital divide.

Explain what the digital divide is?

The difference between demographic groups and geographic areas with unrestricted access to contemporary information and communications technology (ICT) is known as the "digital divide." The telephone, television, computers, and internet connectivity are examples of this technology.

Therefore, one can say that unfair access to digital devices including laptops, cellphones, tablets, and the internet is known as the "digital divide." The access to resources and information is divided and unequal due to the digital divide.

Learn more about Digital divide from

https://brainly.com/question/7478471
#SPJ1

the operation team is responsible for defining which data gets backed up and how often. which type of backup process backs up files that have been modified since the last time all data was backed up

Answers

Differential process. A differential backup is a type of backup process that backs up only the files that have been modified or created since the last full backup.

What is differential backup ?In a differential backup, the backup software compares the files in the backup set to the files in the previous full backup, and only copies the files that have changed. This means that a differential backup includes all of the changes made since the last full backup, regardless of how many intermediate backups have been performed. Differential backups are often used in conjunction with full backups to create a multi-tiered backup strategy. They can be particularly useful when the operation team needs to recover from data loss quickly, as they only need to restore the most recent full backup and the most recent differential backup to bring the data up to the current state.It is important for the operation team to carefully plan and manage the differential backup process to ensure that all necessary data is included in the backup set and that the backups are performed at the appropriate frequency.

To learn more about full backup refer :

https://brainly.com/question/28282607

#SPJ4

wes is using usmt to migrate user profiles to newly purchased windows 10 computers in the organization. to begin the migration, he executes the scanstate.exe process on the source computers to collect user profile information. where is this information most likely to be stored?

Answers

Answer:

When using USMT (User State Migration Tool) to migrate user profiles, the scanstate.exe process is used to collect user profile information from the source computers. This information is most likely to be stored in a migration store, which is a location on the source computer where USMT stores the data that it collects.

The migration store can be specified by the user when the scanstate.exe process is run, or it can be set to a default location. The default location for the migration store is typically the local drive of the source computer.

Once the user profile information has been collected and stored in the migration store, it can be used to restore the user profiles to the target computers using the loadstate.exe process. The loadstate.exe process reads the data from the migration store and restores it to the target computers, allowing the user profiles to be transferred to the new Windows 10 computers.

Explanation:

there is a spreadsheet function that searches for a value in the first column of a given range and returns the value of a specified cell in the row in which it is found. it is called search. 1 point true false

Answers

This claim is untrue. Vertical lookup is what it is known as. delivers this same value of a specific cell in the row that was discovered after searching down first paragraph of a ranges for a key.

What is the purpose of a spreadsheet?

A worksheet is a piece of software that can store, display, and edit data that has been organized into rows and columns. The spreadsheet is one of the most frequently used tools with personal computers. In general, a spreadsheet is made to store numerical data and text message strings.

Are spreadsheets same to Excel?

The spreadsheet application known as Microsoft Office was developed and is maintained by Microsoft. You can carry out a wide range of tasks with Excel, including doing computations, creating lists, and creating charts.

To know more about Spreadsheet visit :

https://brainly.com/question/8284022

#SPJ4

in healthcare, regulations often dictate that important systems remain unpatched to maintain compliance. which kind of vulnerability does this introduce? answer inherent vulnerabilities weak passwords misconfigurations application flaws

Answers

Application defects are problems with user authentication and authorization. The biggest risk to security in full development comes from these issues.

What does the term "vulnerability" mean?

the attribute of being weak or an object that is weak: the capacity to be easily harmed, swayed, or attacked: A doctor who recognizes the patient's vulnerability is what you want. Attack planners took advantage of weak spots in the country's defenses.

Why is it so frightening to be exposed?

Why do we worry about being exposed? We worry that if someone learns the truth about who we actually are, they won't accept us. In actuality, pretense frequently has the inverse result from what we intend, even if we may strive to appear flawless, powerful, or clever in order to communicate with others.

To know more about vulnerability visit:

https://brainly.com/question/15593733

#SPJ4

What type of cloud infrastructure delivers services based on security requirements, the mission-critical nature of the applications, and other company-established policies that supports organizations that want to maintain higher security standards for some data but have less-sensitive data that does not require intranet-level protection?.

Answers

The type of cloud infrastructure delivers services based on security requirements, the mission-critical nature of the applications, and other company-established policies is Hybrid clouds.

What functions do a hybrid cloud offer?

As with standalone public clouds or private clouds, hybrid clouds make use of several of the same underlying technologies: Multiple computers are connected via networking and/or application programming interfaces (APIs). Resources can be abstracted using virtualization, containers, or software-defined storage.

Therefore, one can say that applications can run on a hybrid cloud, which combines several different environments. Nowadays, nearly no one completely relies on the public cloud, hence hybrid cloud computing strategies are common.

Learn more about Hybrid clouds from

https://brainly.com/question/27838623
#SPJ1

12.57ml ____ tbsp / Given: 1ml = 0.067tbsp I really need the ANSWER. (30 points) with SOLUTION please.

Answers

Answer:

12.57 ml is approximately 0.84 tbsp.

Explanation:

we know 1ml = 0.067tbsp

so,

1ml = 0.067tbsp

12.57ml = x tbsp

cross multiply

x = 12.57 * 0.067

x = 0.84219

x = 0.84 tbsp

Values in the first column of a "table_array" are most similar to what database concept?
a. a key
b. a record
c. a table
d. a database

Answers

A key is the values in the first column of a "table_array" are most similar to what database concept

What is database concept?

A database is a collection of data that has been organized to make it simple to manage and update.

Data records or files containing information, including as sales transactions, customer information, financial data, and product information, are often aggregated and stored in computer databases.

A tuple (or row) in a relation can be uniquely identified by a set of properties called a key in a database management system (DBMS).

A relational database's many tables and columns can be related to one another via keys.

Learn more about database management system at:

https://brainly.com/question/24027204

#SPJ4

Values in the first column of a "table_array" are most similar to " a key database concept.  

Option A is correct.

What is a key?

A key is a unique identifier for a record in a database. Similarly, the first column of a table_array in a lookup function is used to match a lookup_value and return a corresponding value from another column. For example, in the table below, the first column is a key for each student's name and grade.

Name Grade Subject

Alice A Math

Bob B Science

Charlie C English

If we use the lookup function =VLOOKUP(""Bob"", A1:C3, 2, FALSE), we are looking for the value ""Bob"" in the first column of the table_array A1:C3, and returning the value from the second column, which is Bob's grade.

The result is B. The FALSE argument indicates that we want an exact match for the lookup_value. If we use TRUE instead, the lookup function will return an approximate match, which may not be accurate if the first column is not sorted in ascending order."

Learn more about database at: https://brainly.com/question/518894

#SPJ4

what do you enter at the command prompt to prevent the shell from using too much of the system's resources?

Answers

The command to prevent the shell from using too much of the system's resources is: ulimit -t <time limit>. This command sets a time limit for the shell to run. After the time limit is reached, the shell will stop running and will not take up any additional system resources.

The Benefits of Utilizing the ulimit Command

The ulimit command is a powerful tool for managing the resources a shell can consume. By setting a time limit for a shell to run, the ulimit command can help prevent the shell from using too much of the system's resources. This can be beneficial in a variety of ways.

First, setting a time limit for the shell helps ensure that other applications running on the system are not impacted by the shell's resource usage. If the shell is allowed to run indefinitely, it could hog resources that are needed by other applications. This can lead to performance issues, as the shell will be taking up resources that could have been used by other applications. By setting a time limit, the shell will not be able to take up more resources than necessary, and other applications will be able to run smoothly.

Second, the ulimit command can help improve system security. If the shell is allowed to run indefinitely, it could be used by malicious users to launch attacks against the system. By setting a time limit for the shell, malicious users will not be able to use the shell for extended periods of time, which can help protect the system from potential attacks.

Learn more about the system's resources:

https://brainly.com/question/13184036

#SPJ4

Calculate the file size of an audio file with a sample rate of 44,000 Hz and a bit depth of 16 bits that has a duration of 3 minutes.

Answers

The size of the audio file whose sample rate is 44,000 Hz and a bit depth of 16 bits, with a duration of 3 minutes is given as 30.28 MB.

What is a sample rate?

The sampling rate or sampling frequency is the number of samples collected from a continuous signal every second (or another unit) to create a discrete or digital signal.

The sample rate is important for the calculation of audio files. The formula for calculating sample rates is given as:

Audio Size = Sampling Rate x Sample Size x Time x Channel

= 44100 x 16 bits x 180 seconds (that is 3 minutes) x 2

Where 2 is the channel.

Hence we have

= 44100 x 16 bits x 180 seconds (that is 3 minutes) x 2

= 254016000 bits

to convert the above to bytes, we divide it by 8b

= 254016000 / 8

= 31752000 bytes

To convert to Kilobytes, we divide by 1024, hence

= 31752000 / 1024

31007.8125 kb

To convert it to MB we divide it by 1024

= 31007.8125 /1024

= 30.28Mb

Learn more about sample rate:
https://brainly.com/question/18917438
#SPJ1

The Duplicate Slide feature:

A) creates a duplicate of the entire presentation.
B) creates a duplicate of the template.
C) creates a duplicate of one slide.
D) creates a duplicate of the layout but not the content.

Answers

the answer is C creates a duplicate of one side answers:C

which tool in hubspot helps you establish thought leadership in search engines using a topic cluster content strategy?

Answers

A CRM platform called HubSpot brings everything a growing business needs to provide best-in-class customer service together in one location. Our carefully designed, not haphazardly put together solution gives teams the tools they need to develop into stronger, more effective teams.

Is HubSpot an improvement over Salesforce?

Both solutions include crucial CRM features like contact and lead management, email marketing, and sales forecasting. When it comes to customization, analytics, and advanced functionality, Salesforce excels. When it comes to user-friendliness and affordable options, HubSpot beats Salesforce.

Is HubSpot a CMS or a CRM?

One component of HubSpot's comprehensive CRM platform that can help your organization flourish is CMS Hub.

To know more about hubspot visit;

https://brainly.com/question/29488459

#SPJ4

What will this program print if the value of grade is 80?

if(grade > 90)
{
System.out.println("A");
}
else if(grade > 80)
{
System.out.println("B");
}
else if(grade > 70)
{
System.out.println("C");
}


A


B


C


Nothing

Answers

Answer: C

Explanation: The if statement shows that if the grade is higher than 80 then print "B". If the grade is exactly eighty. It will trigger C since it checks if 80 is higher than 80, since 80 is in fact not higher than 80 the statement will return false putting it to the next if statement printing "C".

_____ is the name of an approach to building applications and services specifically for a cloud computing environment.

Answers

Cloud computing is all about providing computer services including databases, software, analytics, servers, storage, networking, and intelligence. Cost reductions, scalability, and accessibility to data centers all over the world are just a few advantages of cloud computing.

What services specifically a cloud computing environment?

There are three main categories of cloud computing services: infrastructure as a service (IaaS), platforms as a service (PaaS), and software as a service.

Therefore, Platform as a Service (PaaS) is a cloud computing concept in which consumers receive hardware and software resources via the internet from a third-party supplier.

Learn more about cloud computing here:

https://brainly.com/question/15705024

#SPJ1

suppose identifiers in a programming language must begin with a letter followed by letters, digits or underscores. how many identifiers of length 3 are possible?

Answers

The variable name must begin with an upper or lower case letter.

What is variable?In programming, a variable is a value that can change, depending on conditions or on information passed to the program. Typically, a program consists of instruction s that tell the computer what to do and data that the program uses when it is running. The data consists of constants or fixed values that never change and variable values (which are usually initialized to "0" or some default value because the actual values will be supplied by a program's user).Usually, both constants and variables are defined as certain data type s. Each data type prescribes and limits the form of the data. Examples of data types include: an integer expressed as a decimal number, or a string of text characters, usually limited in length.In object-oriented programming , each object contains the data variables of the class it is an instance of. The object's method s are designed to handle the actual values that are supplied to the object when the object is being used.

To learn more about object-oriented programming refer to:

https://brainly.com/question/14078098

#SPJ4

a digital scavenger hunt your task is to find and submit a secret message buried in binary. this task emphasizes that binary can encode different types of data depending on the rules for abstraction used to interpret it. what was the final secret message?

Answers

A digital scavenger hunt is a type of scavenger hunt planned and run on a platform like GooseChase that makes use of the technology found on iOS and Android mobile devices to enable players to fulfill their mission lists.

What is a Scavenger Hunt?A scavenger hunt is a cooperative activity in which teams or individuals compete to locate things on a list that the event planner has provided, get to places, and/or solve puzzles. Traditionally, the objects for a scavenger hunt were printed on lists of paper, and participants would use a pen and pencil to fill in the blanks for riddles or mark off the places and things they discovered. In order to receive credit for finding something or getting somewhere, teams and players frequently have to show "evidence" to the game's organizer. Scavenger hunts are preferred by adults as a team-building exercise, orientation activity, or professional engagement tool in addition to being well-liked as a school or youth group activity.Pictures or videos of teams and individuals at certain locations have become a fantastic way to show that players completed scavenger hunt objectives as portable cameras have grown in popularity and accessibility. In recent years, with the growing use of smartphones and tablet computers, this format has only grown in popularity.

To Learn more About digital scavenger hunt refer to;

https://brainly.com/question/22573090

#SPJ4

you have been trying to troubleshoot a user's system all day when it suddenly becomes clear that the data is irretrievably lost. when you inform the customer, they become so angry that they shove you against a wall. what should you do?

Answers

You ought to make an effort to relax the user. If you are unable to accomplish this, you should immediately leave the area and wait until it's safe to do so before coming back.

By data, what do you mean?

Data is data that has been transformed into a format that is useful for transfer or processing in computing. Data is information that has been transformed to binary pdf format for use with modern computers and communication mediums.

How does life use data?

Tracking and keeping track of one's health habits, Epidemic and disease prediction, treatment regimens, and prospective treatments.

To know more about data visit:

https://brainly.com/question/13650923

#SPJ4

Other Questions
a sample of size 115 will be drawn from a population with mean 48 and standard deviation 12 . use the ti-83 plus/ti-84 plus calculator. (b) find the 25th percentile of x . round the answer to at least two decimal places. the 25th percentile is the idler wheel is wiser than the driver of the screw and whipping cords will serve you more than rope will ever do a roulette wheel has 18 red slots, 18 black slots and 1 green slot. a ball is released onto the spinning wheel and lands in one o f the slots. if you bet on te slot the ball lands in you win. a ed on red will pay You have two beakers, one with 45.5 g of Compound A, the other with 55.5 g of Compound B. You measure the temperature of Compound A and record a value of 20.5 C. You mix Compound A and B together and the new temperature is recorded at 5.6 C. If the heat capacity of the new solution is 5.64 J/(g C), determine the heat exchanged (in J) in the reaction.Please help me ASAP, thank you. assuming that these traits are sorting in a mendelian way, and given that you collected 440 flies from your cross, how many flies do you expect that have just bristly hair (1) ; bristly hair and dumpy wings (2) a person has recently eaten some spoiled food. after a night of stomach pain the person vomits. this vomit action is primarily a response by the body to WILL GIVE BRAINLIEST AND 20 POINTS!!!according to commonly held biases, compared to a male leader, when a female leader engaged in dominant behaviors, she is seen as being more _ but less _A. competent; likeableB effective; supportiveC. supportive; effectiveD. likeable; competent Aume that 437. 7 j of heat i added to 5. 00 g of water originally at 23. 0C what would be the final temperature of the water Which of the following elements has the same number of valence electrons as the element boron Shauna borrows $500 from her parents to buy a phone. She agrees to pay them back plus 6% simple interest over one year. Write an equation to represent the total amount Shauna will owe her parents and solve to find the total amount. PLS HELP 20 POINTS IF YOU GET IT RIGHT AND BRAINLSIT. % of possible Genotypes:FF: ? Ff: ? ff: ? % of possible Phenotypes:Black fur: ? Grey fur: ? Suppose potential income is $60 billion, actual income is $40 billion, and expenditures don't vary with income. If the actual budget deficit is $4 billion and the marginal tax rate is 20 percent, the structural deficit:____A. Is zero. B. Is between zero and $4 billion. C. Is $4 billion. D. Cannot be determined from the given information Using evidence from the text please answer the following in 3-4 complete sentences. Why would slave owners intentionally keep their slaves ignorant and refuse to teach them to read and write? the health care provider has ordered intravenous pain medication for a client. why are medications given intravenously? select all that apply. In some countries , many children don't survive their first year of life . How would this MOST likely be reflected in their health statistics ? 1.This would be included in the birth rate . 2.This would be included in the infertility rate . 3.This would be included in the infant mortality rate . 4.This would be included in the life expectancy . For the function: y = startroot x minus 7 endroot minus 1 the domain is : x the range is: y How would you describe the game Space Invaders? A. a modern-day shooter-style game created in the year 2000 B. a classic type of shooter game created in the 1970s C. an educational game about space D. a modern, puzzle-style game Gaspar writes the algebraic expression 5b +3.79.It represents the total cost, in dollars, of buying 5 bagelsand a container of cream cheese. Identify any variables,coefficients, and terms in the expression. Tell whateach represents. Anthony is an employee of a textbook publisher. However, his desire is to establish a home-based business providing his services to a variety of publishers. Anthony's primary motivation is to escape the 9 to 5 world of corporate publishing and to enjoy the opportunity of working for himself. Anthony is an example of a micropreneur. I need help on a question.the picture below should help