Answer:
- The graph of the function is attached below.
- The x-intercepts will be: (2, 0), (-2, 0)
- The y-intercept will be: (-20, 0)
Explanation:
Given the function

As we know that the x-intercept(s) can be obtained by setting the value y=0
so

switching sides

Add 20 to both sides


Dividing both sides by 5





so the x-intercepts will be: (2, 0), (-2, 0)
we also know that the y-intercept(s) can obtained by setting the value x=0
so



so the y-intercept will be: (-20, 0)
From the attached figure, all the intercepts are labeled.
Answer:
False
Explanation:
A Domain Based Security. "Domain Based Security", abbreviated to "DBSy", is a model-based approach that is being used in analyzing information security risks in a business context and offers an apparent, understandable and direct mapping among the risks and the security controls needed to handle them.
While A security domain is the list of items a subject is permitted to access. More largely defined, domains are collections of subjects and objects with related security requirements.
The reason for analyzing an algorithm is to discover its characteristics in order to evaluate its suitability for various applications are compared with other algorithms for the same application