Answer:
relating the topic to the audience
Explanation:
Based on the scenario being described within the question it can be said that to gain attention and interest Paul related the topic to the audience. Paul did this by comparing Lou Gehrig to the audiences daily lives at school. By doing this it is catching the audiences attention which in term causes them to be interested in the rest of the speech that Paul is giving.
To find simple interest:
Time = Interest/(Principle)(Rate)
Interest is the amount of interest paid
Principle is the amount you lent or borrow
Rate is the percentage of principle charged as interest each year
Time is the years of the loan
P=Principle amount of $1,500
I=Interest amount of $1,200 (Take the new amount of $2,700 and subtract from the principle that is $1,500 which gives you $1,200)
r= as a decimal .15 (15%/100)
t=unknown
T=I/PR
T=1,200/(1,500)(.15)
T=1,200/225
T=5.3 years
It would take Lance roughly 5.3 years
Answer: Flying cars??
Explanation: Im 99.9% sure it will happen.
Please find attached full question Answera and Explanation:
Risk posture or cybersecurity posture is the general status or overall defense of the cybersecurity program in place in an organization to guard against cyber attacks and data breaches. For a company to maintain reasonable cyber security posture as there is no fool proof cybersecurity posture, there is need for regular continuous assessment of risk exposures and potential loopholes across the company's digital infrastructure. There are different digital and sophisticated infrastructures utilized by am organizations and most if not all are well prone to cyber attacks. These infrastructures are used by employees for work e. g-email, went servers, phones, networking devices and cloud programs etc . Therefore each employee must be educated in the need to safeguard company data by looking out for traps set by cyber attackers such as phishing in email and many other loopholes. Vulnerability tests need to be performed at regular intervals and reports monitored and analyzed to protect against a potential source of cyber attack.
