answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mylen [45]
2 years ago
11

Dr. Robbins wants to know if there are different opinions regarding the value of public school education between Native American

s who have at least one relative who attended Indian Boarding School and Native Americans who have no family experience with Indian Boarding School. Dr. Robbins contacts 35 Native American participants in each group. He wants each group to include younger as well as older adults, and a mix of male and female participants. He asks each person to complete a survey about their attitudes toward public education. In this study, _____ is the independent variable.
Computers and Technology
1 answer:
zmey [24]2 years ago
5 0

Answer:

The independent variable is Native American participants

Explanation:

Why Native Americans is the independent variable is bacause the survey population is Native Americans and the result of the survey won't be affected by the gender and age of the native american participants. So it the independent variable.

You might be interested in
A competitive analysis of Google and Microsoft would look at their ________ . Both pay high salaries and offer great benefits. B
Yuki888 [10]

Answer:

personnel strategy

Explanation:

Competitive analysis is a process that involves relating the company to its environment. Competitive analysis helps identify the strengths and weaknesses of the company, as well as the opportunities and threats that affect it within its target market. This analysis is the basis on which the strategy will be designed, for this we must know or intuit as soon as possible:

The nature and success of the probable changes that the competitor may adopt.

The probable response of the competitor to the possible strategic movements that other companies may initiate.

The reaction and adaptation to the possible changes of the environment that may occur from the various competitors.

The competition is made up of companies that operate in the same market and perform the same function within the same group of customers regardless of the technology used for it. It is not, therefore, our competitor that manufactures a generic product like ours, but one that satisfies the same needs as we do with respect to the same target or consumer audience, for example, cinema can be the theme parks competition, since both are embedded in leisure.

4 0
2 years ago
Shirley was unsure about what career to go into. Her high school counselor suggested a personal assessment to point out Shirley’
Alex73 [517]
<span>I think that she would be well suited in going into law enforcement or fire fighting. Since she loves to stay active and is cool under pressure, both of those jobs would be very well suited for her personality. Those 2 jobs demand to stay cool into delicate situations. Also, she would be able to come in to help people in need.</span>
4 0
2 years ago
Read 2 more answers
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and
gogolik [260]

Answer and explanation:

Authentication:

authentication can be done by using the user id and password, by using social sign in  or by using the biometrics. Authentication means verify the user who they claim they are and to grant them access.  

Authentication works as follows:  

Prompting the user to enter the credentials.  

Send the credentials to the authentication server.  

Match the credentials.  

Authorize the user and grants the acces

External Website security:  

External Website security is important to protect the website from hackers, electronic thieves and to prevent security breach.  

Use of firewall.  

Implement the access control.  

Use of MVC (Model View Controller) to create different view for different type of user.  

Use of encryption.  

Use of SSL certificate.

Use of security plugins.  

Implement tools and techniques for backup and disaster recovery.  

Use of network monitoring team.  

Internal Website security:  

Use of authentication to identify the user identity.  

Use of authorization to provide different user with the specific privileges and access.  

Encrypt or hide sensitive web pages.  

By implementing IT policies.  

Educate the user about the website.  

Remote Access Solution:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway (single tenant or multi-tenant):

VPN(Virtual private network), BGP(Border gateway protocol), hyper-V network can be used to provide the remote access.  

Remote access can be provided by simple configuration. Remote access involves enabling user, managing their access, protecting the assets, use of remote desktop protocol and managing server sessions, remoteApp and personal and pooled desktop.  

Firewall and Basic rules recommendations:  

Firewall is important for managing the traffic and providing external website security.  

Rules to prevent SQL injection and XSS.  

Allow only the specific type of traffic.  

Use access rules for IP security.  

Implement certain IT policies.  

Can implement their own rule.  

Wireless Security:  

Nowadays Wifi is being used in every organization and it prevents the network from malicious and unauthorized access.  

Wireless security can be provided by the use of encryption, decryption, authentication and authorization.  

VLAN configuration:  

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

In the following manner VLAN can be configured for web interface:  

Switching => VLAN => Advanced => VLAN Membership  

Switching => VLAN > Advanced => Port PVID Configuration.  

VLAN web filtering:  

VLAN can be configured between router and firewall, router and gateway, router and switch and by doing so one can filter the web traffic that passes the network.  

Laptop Security Configuration:  

Use of password, VPN and registering the laptop by their MAC address will provide laptop security. Use of security tool for local machine is also a good option. Use of device level authentication by using local username and password is also a good idea.  

Application policy recommendations:  

Application policy includes use of cookies, social media integration, access control, generating notifications and implanting other organization and IT rules.  

Security and privacy policy recommendations:  

It includes the list of security methods to be implemented for traffic filtering, IP spoofing, user authentication and other specific policy for the website.  

Intrusion detection or prevention for systems containing customer data:  

IPS is implemented behind the firewall and it matches the incoming traffic against the security policies. It matches the signature and handles the intrusion if any and generates the log and alerts for the same.  

IDS goal is to identify malicious traffic before it can proceed further into the network. It generates alerts and notification so that the network monitoring team can look after the intrusion.  

Use of anomaly based detection and prevention system is the better choice.

6 0
2 years ago
The c++ operator _______________ is used to destroy dynamic variables.
UNO [17]
<span>The c++ operator delete is used to destroy dynamic variables.</span>
6 0
2 years ago
RADIAC instruments that operate on the ionization principle are broken down into three main categories based on what?
mash [69]

Answer:

Electrical potential.

Explanation:

RADIAC Meter or instruments ( also known as radiation monitoring instruments) are measuring instruments that uses the principles of gaseous ionisation to conduct electricity flow internally to deflect the pointer for its Meter readings. These instruments can be analogue or digital.

They are used in industries to monitor the operation of certain equipments and processes. The level of electrical potential flow in the system determines the state or category of the instrument. Out of six, there are three main categories of electrical potential level.

6 0
2 years ago
Other questions:
  • The tuna marketers' task in the "tunathewonderfish.com" website and related campaign was to ________.
    15·1 answer
  • Which one of the following is the best example of an authorization control? (a)- Biometric device (b)- Digital certificate (c)-A
    11·1 answer
  • What is the first step to apply the line and page breaks options to groups of paragraphs in a Word document?
    8·2 answers
  • A(n) ____ attack is when a system is compromised and used to attack other systems. a. indirect b. direct c. object d. subject
    13·1 answer
  • You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote loca
    5·1 answer
  • An entrepreneur is opening a computer store in a small town and wants to display a few laptops in the store, but is concerned ab
    11·2 answers
  • Create an abstract Division class with fields for a company's division name and account number, and an abstract display() method
    14·1 answer
  • Q3** Write a query to create a new price list for books written by the same author. Allow the user to enter only the first 4 let
    15·1 answer
  • In database software, a record is a
    9·1 answer
  • Write an expression to print each price in stock prices.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!