1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkinab [10]
2 years ago
8

Identify the equation that translates Y = In(x) five units down.​

Computers and Technology
1 answer:
Tatiana [17]2 years ago
4 0
Y=In(x)-5
hopefully it’s right :)
You might be interested in
The principal objectives of computer security are to prevent unauthorized users from gaining access to resources, to prevent leg
Lena [83]

Answer:

True is the correct Answer for the above question.

Explanation:

  • Computer security is a security in which data of the computer is secured from the access of unauthorized users. It is primarily achieved to stop the access grant to the unauthorized user.
  • It means that there is an authorization point which decides that the user is authorized or not. If the user is authorized then only he can enter the system otherwise he can not able to enter the system.
  • It helps to secure the data and the data is the important point of the computer system.
  • The question also states the same which is described above. Hence true is the correct answer.

3 0
3 years ago
8. What do you believe: should husbands make decisions for their wives.
nirvana33 [79]

Answer:

No.

Explanation:

Because wives should make decisions for their life themselves.It helps them be self dependent so that they won't have to depend on their husbands. By letting them make decisions themselves they can get a successful career on their own effort and decisions.

3 0
2 years ago
Make absolutely no changes to main(). Change function backwards so that the elements of the array are swapped in order for eleme
makkiz [27]

Answer:

i got you hold on.

Explanation:

5 0
2 years ago
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
kumpel [21]

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

8 0
3 years ago
Francis works in the human resources division of a large oil and gas company in Texas. Francis' tasks include maintaining payrol
KiRa [710]

Answer: Information MIS infrastructure

Explanation: Information MIS infrastructure is the company model that is used for supporting the task functioning . The main aim of this tool is to be used in backing -up , plan of diasater recovery and plan of business continuity.

These objectives are achieved by availability, portability , scalability , accessibility, maintainability etc characteristic. Francis is also involved in information MIS infrastructure by maintaining the payroll, records,history of employment  etc, securing the information,etc.

4 0
3 years ago
Other questions:
  • 1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
    6·1 answer
  • Explain the role of the domain name system
    15·1 answer
  • A university wants to install a client-server network. Which feature do you think is important for them as they set up the netwo
    7·1 answer
  • A bicycle combination lock has four rings with numbers 0 through 9. Given the actual numbers and the combination to unlock, prin
    13·1 answer
  • A network administrator for a small company is contemplating how to scale the network over the next three years to accommodate p
    13·1 answer
  • Which of the following is not considered format?
    8·2 answers
  • Design the logic for a program that allows a user to enter 20 numbers, then displays each number and its difference from the num
    13·1 answer
  • A teacher wants to create a list of students in her class. Using the existing Student class in this exercise. Create a static Ar
    14·1 answer
  • Which of the following should you consider when choosing a file format?
    9·2 answers
  • Anyone else having problems with edg?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!