MULTIPLE CHOICE Which of the following is an example of Network Security that an NOS can provide to protect computer users?

A user authentication
B. viruses
с encryption
D. phishing​

Answers

Answer 1

Answer:

User Authentication

Explanation:

Because it prevents other users from being able to access other's accounts in the network. This prevents users from seeing each other's data.


Related Questions

Sharon must give an informative presentation to a group of teenagers about cultivating earthworms for use in home gardening. Which of the following is the best approach she could take?
a.
She could begin with a funny story about her adventures as a young girl digging up worms with her father and all the wonderful things he taught her about gardening.
b.
She could give a lengthy and detailed lecture about all the major gardening techniques and show several graphs demonstrating the benefits of cultivating earthworms.
c.
She could bring in actual worms for the audience to handle and observe, and actual soil samples for them to touch and smell.
d.
Both a. and c. would be effective approaches for Sharon to take.

Answers

Answer:

D

Explanation:

edg2021

The best approach in the above scenario is to follow both option a. and c. as it would be the effective approaches for Sharon to take.

What is vital in a presentation?

For one to be able to get the attention of the audience, the right thing to do is  to have a good body language in any presentation.

Conclusively, Sharon could start with a funny story about her adventures as a young girl digging up worms with her father and all the wonderful things he taught her about gardening.

Learn more about presentation  from

https://brainly.com/question/24653274

#SPJ2

Which of the following is the keyboard command for "paste"?This question is required. *
A
Ctrl + V / Command + V
B
Ctrl + P / Command + P
C
Ctrl + C / Command + C
D
Ctrl + A / Command + A

Answers

Answer:A: Ctrl + V / Command + V

Explanation:

Question 10 of 10
What information system would be most useful in determining what direction
to go in the next two years?
A. Decision support system
B. Transaction processing system
C. Executive information system
D. Management information system
SUBMIT

Answers

Answer: C. Executive information system

Explanation: The information system that would be most useful in determining what direction to go in the next two years is an Executive Information System (EIS). An EIS is designed to provide senior management with the information they need to make strategic decisions.

An Executive Information System (EIS) would be the most useful information system in determining what direction to go in the next two years. So, Option C is true.

Given that,

Most useful information about determining what direction to go in the next two years.

Since Executive Information System is specifically designed to provide senior executives with the necessary information and insights to support strategic decision-making.

It consolidates data from various sources, both internal and external, and presents it in a user-friendly format, such as dashboards or reports.

This enables executives to analyze trends, identify opportunities, and make informed decisions about the future direction of the organization.

EIS typically focuses on high-level, strategic information and is tailored to meet the specific needs of top-level executives.

So, the correct option is,

C. Executive information system

To learn more about Executive information systems visit:

https://brainly.com/question/16665679

#SPJ6

The ribbon in Excel is a
tab based user interface.
True
False

Answers

Answer:

Explanation:

This should help i think it is true just read this first "Like any other application, Excel has a basic workspace called the user interface. ... The Ribbon is the name given to the row of tabs and buttons you see at the top of Excel. The Ribbon's tabs and buttons bring your favorite commands into the open by showing multiple commands grouped in specific categories."

Answer:

True

Explanation:

We love him, because he ."

Answers

We love him, because he “is everything I need.” I’m kinda confused on the answer lemme know if you need help

Answer:

first, loved, us

Explanation:

Real Answer!

What is the relationship between the data life cycle and the data analysis process coursera.

Answers

Answer:

The data life cycle deals with transforming and verifying data; data analysis is using the insights gained from the data. The data life cycle deals with the stages that data goes through during its useful life; data analysis is the process of analyzing data.

Explanation:

The main advantage of second messengers in cellular signaling are that they ___ the original signal and increase the ___ of intracellular signaling.

Answers

Second messengers have the advantage of quickly amplifying and transmitting signals received at the enhanced of their cell surface to intracellular target molecules in the cytosol or nucleus.The main advantage of second messengers in cellular signalling are that they amplify the original signal and increase the speed of intracellular signalling.

What advantage second messengers in cellular signalling?

Secondary messengers' main characteristic is their capacity to egress from the cell membrane and pass through the phospholipid bilayer by being specifically hydrophilic or -phobic.

Therefore, The main advantage of second messengers in cellular signalling are that they amplify the original signal and increase the speed of intracellular signalling.

Learn more about cellular signalling here:

https://brainly.com/question/14156143

#SPJ1

What is the part of a CSS declaration that describes the HTML tag?
A.the selector
B.the pointer
C.the value
D.the property

Answers

Answer:

a selector

Explanation:

Answer:

A. the selector

What is the part of a CSS declaration that describes the HTML tag?A.the selectorB.the pointerC.the valueD.the

was considered an operating environment, not an operating system.
ANSWER FAST

Answers

Answer: windows 1.0

Explanation: Why was Windows 1.0 considered an operating environment rather than an operating system. Because it was only a shell; MS-DOS was still the operating system. ... One difference between Windows 3.0 and Windows 2.0 was that users could no longer use MS-DOS commands to operate their computers.

How are the aims of science and technology different?

Answers

Answer:

goal of technology is to create products that solve problems and improve human life.

Explanation:

The words science and technology can and often are used interchangeably. But the goal of science is the pursuit of knowledge for its own sake while the goal of technology is to create products that solve problems and improve human life.

Some of the latest smartphones claim that a user can work with two apps simultaneously. This would be an example of a unit that uses a __________ OS.

Answers

Answer:

MULTITASKING OS

Explanation:

MULTITASKING OPERATING SYSTEM is an operating system that enables and allow user of either a smartphone or computer to make use of more that one applications program at a time.

Example with MULTITASKING OPERATING SYSTEM smartphones user can easily browse the internet with two applications program like chrome and Firefox at a time or simultaneously

Therefore a user working with two apps simultaneously is an example of a unit that uses a MULTITASKING OS.

A __________ search engine focuses on a specific subject.

answer : Specialized

Answers

Answer:

Specialized fr just want point lol

Explanation:

which of the following is not a valid reason to conduct reverse engineering? A. to allow an attacker to spot vulnerabilities in an executable B. to determine how a piece of malware operates C. to allow the software developer D. to spot flaws in their source code E. to commit industrial espionage

Answers

Option A and E are not valid reasons to conduct reverse engineering. Reverse engineering is the process of analyzing a product or system to understand its design and functionality. It can be done for a variety of reasons, both legitimate and illegitimate. Some of the valid reasons to conduct reverse engineering are:

To understand how a product or system works: Reverse engineering can be done to gain insight into the design and functionality of a product or system. This can be useful for improving the product or system, identifying potential issues, or creating compatible products or systems.To improve compatibility: Reverse engineering can be used to make a product or system compatible with other products or systems. For example, reverse engineering can be used to create a driver for a piece of hardware that is not supported by the operating system.To create backup or replacement parts: Reverse engineering can be used to create backup or replacement parts for a product or system. This can be useful for products or systems that are no longer manufactured or supported.To ensure compliance: Reverse engineering can be used to ensure compliance with regulations or standards. For example, reverse engineering can be used to ensure that a product or system meets safety or environmental standards.

On the other hand, reverse engineering can also be done for illegitimate reasons such as committing industrial espionage, stealing intellectual property, or creating malware or exploits. Therefore, options A and E are not valid reasons to conduct reverse engineering.

Learn more about reverse engineering here brainly.com/question/31179848

#SPJ4

Dealerships for Subaru and other automobile manufacturers keep records of the mileage of cars they sell and service. Mileage data are used to remind customers of when they need to schedule service appointments, but they are used for other purposes as well. What kinds of decisions does this piece of 486 data support at the local level and at the corporate level? What would happen if this piece of data were erroneous, for example, showing mileage of 130,000 instead of 30,000? How would it affect decision making? Assess its business impact.

Answers

The kinds of decisions does this piece of 486 data support at the local level and at the corporate level is least servicing.

What is the issue about?

The Dealerships for Sabaru and other automobile manufacturers is one that needs the ability to be able to know the brand of car that has the least requirement for servicing.

Note that On the other-hand, at the corporate level, the records is one that can afford them the ability to be able to  know the automobile manufacturers that they will keep on trading with under dealership as a result of the  feedback from their customers.

Hence, The kinds of decisions does this piece of 486 data support at the local level and at the corporate level is least servicing.

Learn more about Mileage data from

https://brainly.com/question/10093236

#SPJ1

A(an)_______is built-in preset calculation.
formula
function
equation
AutoSum​

Answers

Answer:

Hello! The answer to your question is function I had the same question and got it right!

Explanation:

Hope this helped:)

You are getting a page that cannot be displayed but your modem is online. You run a ping test and are able to receive the results below but still can't browse. Will clear cache and cookies resolve this issue?

You are getting a page that cannot be displayed but your modem is online. You run a ping test and are

Answers

Since  You run a ping test and are able to receive the results below but still can't browse. the act of clearing the cache and cookies will not resolve this issue so the response is NO.

Can ping but the page won't show up?

Due to the fact that the DNS servers of the Internet service provider are said to be down, this problem is one that is frequently brought on by a DNS resolution issue.

It can also be brought on by issues with security software (generally a firewall) operating on the machine that is known to be trying to access the Internet.

Hence, based on the fact that You run a ping test and are able to receive the results below but still can't browse. the act of clearing the cache and cookies will not resolve this issue so the response is NO. The issue will not change.

Learn more about cache from

https://brainly.com/question/6284947
#SPJ1

Draw the resulting image on the grub below using the following rules: it

Draw the resulting image on the grub below using the following rules: it

Answers

Explanation:

I just answered this.

I cannot draw here.

but it will mark all dots, where row number = column number.

and all dots, where row number + column number = 8.

this will create a giant X.

the 2 lines go from (0, 8) to (8, 0), and from (0, 0) to (8, 8) with (4, 4) being the central intersection point.

_______ are the best visual aids for showing the relationship between ideas in a presentation.

Answers

Answer:

A graphic organizers

Explanation:

Graphic users are the best visual aids for showing the relationship between ideas in a presentation.

What are Graphic user?

By the use of menus, icons, and other visual cues or representations, a user interacts with electronic devices like computers and smartphones using a graphical user interface (GUI) (graphics).

Unlike text-based interfaces, where data and commands are purely in text, GUIs graphically show information and related user controls. A pointing device, such as a mouse, trackball, stylus, or a finger on a touch screen, is used to manipulate GUI representations.

The first keyboard input and prompt system was used for the human-computer text interaction (or DOS prompt). At the DOS prompt, commands were entered to request responses from a computer.

Therefore, Graphic users are the best visual aids for showing the relationship between ideas in a presentation.

To learn more about Graphic user, refer to the link:

https://brainly.com/question/14758410

#SPJ6

Charles wants to work for himself in the Transportation and Logistics career cluster. Which lists the jobs with the best
chance self-employment from highest to lowest?
O Brownfield Redevelopment Specialists – Taxi Drivers - Mechanics - Logisticians
O Taxi Drivers - Brownfield Redevelopment Specialists - Logisticians - Mechanics
O Logisticians - Mechanics - Taxi Drivers - Brownfield Redevelopment Specialists
O Mechanics - Logisticians - Brownfield Redevelopment Specialists – Taxi Drivers

Answers

Answer:

i think its b

Explanation:

makes the most sense

Answer:

B: offices

Explanation:

Hope you get 100 on your test

Can someone give me an example of code of any cartoon character using java applet please help me i need to make my project please☹️​

Answers

The Java code for a cartoon character using java applet is

import java.applet.Applet;

import java.awt.*;

public class CartoonCharacter extends Applet implements Runnable {

   Thread t;

   int x = 0;

   int y = 100;

   

   public void init() {

       setSize(500, 500);

       setBackground(Color.white);

   }

   

   public void start() {

       if (t == null) {

           t = new Thread(this);

           t.start();

       }

   }

   

   public void run() {

       while (true) {

           x += 10;

           repaint();

           try {

               Thread.sleep(100);

           } catch (InterruptedException e) {}

       }

   }

   

   public void paint(Graphics g) {

       g.setColor(Color.red);

       g.fillOval(x, y, 50, 50);

   }

}

How does the code work?

Note that the cartoon character is made like a red circle that navigates accross the screent.

The init() method sets the size of the applet and its background color,    while the      start( ) method creates a new thread and starts the animation loop in the run() method

Learn more about Java Code at:

https://brainly.com/question/29897053

#SPJ1

What is a function in Microsoft Excel?
Question 1 options:

A holding area for the clipboard

A tool for creating charts

A method for checking spelling

A predefined calculation

Answers

Answer:

Tool for creating charts.

Explanation:

MS excel is clearly used for designing charts and spreadsheet in our daily life.

how are headers and footers are useful in presentation​

Answers

Answer:

Explanation:

PowerPoint is a software that allows user to create headers as well as footers which are information usually appears at the top of the slides and the information that appears at the bottom of all slides. Headers and footers are useful when making presentation in these ways:

✓ Both provide quick information about one's document/ data clearly in a predictable format. The information that is provided by the Header and footers typically consist of ;

©name of the presenters,

©the presentation title

©slide number

©date and others.

✓ They help in setting out different parts of the document.

✓Since the Headers and footers can appear on every slide, corporate confidentiality as well as copyright information can be added to footer area to discourages those that can steal ones secrete.

Python coding.............

Python coding.............

Answers

Answer:

# Take in four positive integers

num1 = int(input("Enter the first number: "))

num2 = int(input("Enter the second number: "))

num3 = int(input("Enter the third number: "))

num4 = int(input("Enter the fourth number: "))

# Initialize the count of odd numbers

odd_count = 0

# Check each number for oddness

if num1 % 2 != 0:

   odd_count += 1

if num2 % 2 != 0:

   odd_count += 1

if num3 % 2 != 0:

   odd_count += 1

if num4 % 2 != 0:

   odd_count += 1

# Output the total count of odd numbers

print("The number of odd numbers is:", odd_count)

Explanation:

Enter the first number: 1

Enter the second number: 2

Enter the third number: 3

Enter the fourth number: 4

The number of odd numbers is: 2

Define basic logical gates with its symbol, algebraic expression and truth table.​

Answers

Answer:

A truth table is a good way to show the function of a logic gate. It shows the output states for every possible combination of input states. The symbols 0 (false) and 1 (true) are usually used in truth tables. The example truth table shows the inputs and output of an AND gate.

Explanation:

2. To publish your slide show as movie what should you click on first? (1 point)
O File
O Animations
O Slide Show
O View

Answers

To publish your slide show as movie we click on Slide show first.

What do you know about PPT?

A PowerPoint slideshow (PPT) is a presentation made using Microsoft software that enables users to include audio, visual, and audio/visual features. It is regarded as a multimedia technology that also serves as a tool for sharing and collaborating on content.

What is Slide show?

A slide show (slideshow) is a presentation of a series of still images (slides) on a projection screen or electronic display device, typically in a prearranged sequence.

To start your slide show, on the Slide Show tab, select Play From Beginning.

To manage your slide show, go to the controls in the bottom-left corner

To skip to any slide in the presentation, right-click the screen and select Go to Slide. Then, enter the slide number you want in the Slide box, and select OK.

Learn more about SlideShow click here :

https://brainly.com/question/27363709

#SPJ1

Write a C program that implements matrix multiplication in a multi-threaded environment. Please check the Lab document for pseudo code and details on how to perform matrix multiplication. You may use the following definitions and function prototypes: //N threads pthread_t threads
[N]
; //A, B, C matrices //function prototypes int main(int argc, char *argu[]) //read
N,M
, and L as command-line arguments void initializematrix(int
r
, int
c
, double
∗∗
matrix); //initialize matrix with random values void printmatrix(int
r
, int
c
, double

matrix); //print matrix void *multiplyRow (void* arg) //thread multiply function //creating
N
threads, each multiplying ith row of matrixA by each column of matrixB to produce the row of matrixc for
(i=0;i pthread_create (\&threads [i], NULL, multiplyRow,
(v 0


d ⋆
)
(size_t)i); When your program compiles and runs successfully without errors and warnings, upload and demo to the TA for different numbers of N, M, and L. Try
N=1024,M=512
, and
L=1024
. Modify your program in Step 4 to create
N ∗
L
threads, each computing
i th row multiplied by
j th column. When your program compiles and runs successfully without errors and warnings, upload and demo to the TA for large numbers of
N,M
, and
L
. Try N, M, and L each has 1024 value.

Answers

The following C program implements matrix multiplication in a multi-threaded environment.

What is multi-threaded?

Multi-threading is a programming technique that enables a single process to execute multiple threads of execution concurrently, allowing multiple parts of a program to run simultaneously within a single process.

First, you would need to define your matrix structures and allocate memory for them.

#define MATRIX_SIZE 1000

type def struct {

   int rows;

   int cols;

   double *data;

} matrix;

matrix A = {MATRIX_SIZE, MATRIX_SIZE, malloc(MATRIX_SIZE * MATRIX_SIZE * sizeof(double))};

matrix B = {MATRIX_SIZE, MATRIX_SIZE, malloc(MATRIX_SIZE * MATRIX_SIZE * sizeof(double))};

matrix C = {MATRIX_SIZE, MATRIX_SIZE, malloc(MATRIX_SIZE * MATRIX_SIZE * sizeof(double))};

{ {

           double sum = 0.0;

         }

           C.data[i * C.cols + j] = sum;

       }

   }

}

pthread_t threads[NUM_THREADS];

typedef struct {

   int start_row;

   int end_row;

   matrix A;

   matrix B;

   matrix C;

} thread_data;

thread_data data[num;

{

   int start_row = i * MATRIX_SIZE / NUM_THREADS;

   int end_row = (i + 1) * MATRIX_SIZE / NUM_THREADS;

   data[i] = (thread_data) {start_row, end_row, A, B, C};

   pthread_create(&threads[i], NULL, &matrix_multiply_thread, &data[i]);

}

for (i = 0; i < num; i++) {

   pthread_join(threads[i], NULL);

}

void* matrix_multiply_thread(void* arg) {

   thread_data* data = (thread_data*) arg;

   for (i = data->start_row; i < data->end_row; i++) {

       for (j = 0; j < data->B.cols; j++) {

           double sum = 0.0;

           for ( k = 0; k < data->A.cols; k++) {

               sum += data->A.data[i * data->A.cols + k] * data->B.data[k * data->B.cols + j];

           }

           data->C.data[i * data->C.cols + j] = sum;

       }

   }

   pthread_exit(NULL);

}

to know more about programming visit:

https://brainly.com/question/14368396

#SPJ1

Select each procedure that could harm the computer and cause it to work improperly.

Answers

There are numerous actions that could potentially harm a computer and cause it to function improperly. Some of the most common ones are given below.

What is the actions that can harm a computer?

Installing untrustworthy software or malware that can damage system files and slow down the computer's performance or steal personal information.Physically damaging the computer by dropping it, spilling liquids on it, or exposing it to extreme temperatures, which can cause hardware components to malfunction or fail entirely.Modifying or deleting system files, which can lead to system crashes and data loss.Overclocking or overheating the computer's CPU or GPU, which can cause hardware damage and potentially void any warranties.Failing to update software regularly, which can leave vulnerabilities in the system that hackers can exploit.Using unlicensed or pirated software, which can introduce viruses and other malware into the system.Opening suspicious emails or clicking on links from unverified sources, which can result in malware infections and data breaches.

Learn more about computer at:

https://brainly.com/question/21080395?

#SPJ1

help with these 2 questions srry for the horrible pic​

help with these 2 questions srry for the horrible pic

Answers

Answer:

the first one is email address nd the second one is semi-blocked letters ? sorry if im wrong.

Explanation:

Answer:

I cant read

Explanation:

What problem does Mitra identify in education? How can the internet and social media influence this problem?

Answers

The problem that Mitra identifies in education is that kids don't go to school, don't know what a computer or the internet is. Teachers don't want to go to places where they're needed the most.

Answer:

     The problem that Mitra identifies in education is that kids don't go to school, don't know what a computer or the internet is. Teachers don't want to go to places where they're needed the most. The Internet and Social Media can influence problems because kids and young adults could be focusing on social media and relying on the internet more than actually focusing on there school work and working in general.

Define a function below, filter_only_strs, which takes a single argument of type list. Complete the function so that it returns a list that contains only the strings from the original list and no other data. It is acceptable to return an empty list if there are no strings in the original list.

def filter_only_strs(1st):
for x in lst:
if isinstance(x,str)==False:
lst.remove(x)
return ist Restore original file

Answers

Answer:

Explanation:

The code provided aside from some minor errors (fixed version down below) is correct, but it will never be able to accomplish what is being asked in the question. This is because this code is simply copying and returning the exact same list that is passed as an argument, because it is looping through it and comparing its own elements. In order to accomplish what is asked in the question, two lists need to be passed as parameters. The first would be the original list, and the second would be a list of test elements that will be used to compare and see if they exist in the original list. This would allow us to create a new list with only the elements that existed in the original list.

def filter_only_strs(lst):

   for x in lst:

       if not isinstance(x, str):

           lst.remove(x)

   return lst

Other Questions
What is the unit cost for Brand A that cost $3.84 for 16 oz?$0.25/oz$0.24/oz$0.33/oz Whether managers are trying to increase productivity or decrease turnover rates, it is good to get a sense of how employees feel they are being treated. True or false? Read the legend titled "The Bird Chief."All the birds were called together. To them was said, Whichever one of you can fly farthest into the sky shall be chief.All the birds flew to a great height. But Wren got under the thick feathers of Eagle and sat there as Eagle flew. When all the birds became wing-tired, they flew down again; but Eagle flew still higher. When Eagle had gone as far as he could, Wren flew still higher.When all the birds reached the ground, Eagle alone returned, after a great while. Behold! Wren only was absent. So they awaited him. At last he returned. Eagle had too highly been thinking of himself, being sure of being made chief; and behold! Wren was made chief.The purpose of this legend is most likely to teach a lesson related tothe intelligence of different birds.the dangers of being too proud.the importance of doing your best.the thrill of getting ahead in life. Do you give and get presents ____ Christmas day?Seleccione una:a. on b. at c. ind. I dont know WEach statement is true of the Enlightenment EXCEPT: A. It sought to justify the divine right of kings. B. It influenced the American Founding Fathers. C. It began in Western Europe in the 18th century. D. It was heavily influenced by the histories of ancient civilizations.Hich statement BEST describes the philosophy of John Locke laughlin company reported the following year end information beginning work in process inventory 1 million 08000 beginning raw materials inventory 300,000 ending work in process inventory 900,000 ending raw materials inventory 480,000 raw materials purchased direct labor manufacturing overhead last minute company's cost of good manufactured for the year is Find the average circumference of the two balloons with each amount of sugar. Show your work. No sugar: Some sugar:More sugar: good night everyone sweet dreams and take care preganglionic fibers leave the cns and then synapse on visceral reflex responses. postganglionic fibers. motor neurons. afferent neurons. ganglionic neurons. In one to two sentences give one reason reactants might not equal visible products after a chemical reaction Mimi is an attorney in France. Mimi is representing a client in a dispute over a franchise agreement. The judge wants to decide which witnesses to call and interrogate the witnesses. Is this proper? O No. France follows the adversarial system. Yes, but only since 2017 when Emmanuel Macron became President of France and the French system changed from a common law system to a Civil Code legal system. OYes. France follows the inquisitorial system. O No. In France, the entire trial process is controlled by the huissiers. O No. In France, the judge often decides which witnesses are relevant, but only the lawyers may interrogate the witnesses and investigate the facts. Which of the following is an example of information that is NOT required to be included in the articles of incorporations for the February Corp.? O The name of the corporation will be ABCD, Corp. The registered agent is Marcus Finochio, located at 124 Main Street, Gainesville FL. O The corporation is authorized to issue 15,000 shares. The process of shareholder inspection of records. The two incorporators are Sylvester Lapse at 123 Main Street, Gainesville FL, and Jenny Lapse at 123 Main Street, Gainesville FL. An example of a ____ is an airline's practice of awarding customers points for miles traveled that can be turned in for free airline trips. a. Loyalty programb. Tebatec. Price-off pckd. premum How many apps and core services are included in Office 365? if the user enters "y" at the prompt, what does the program print to the console? which clinical indicator would the nurse monitor to determine if the client's simvastatin is effective the process of separating a liquid/solid mixture by slowly pouring the liquid component into a new vessel as the solid settles to the bottom of the original vessel is known as a. maryann company's august 31 bank reconciliation shows deposits in transit of $2,250. the general ledger cash in bank account shows total cash receipts during september of $86,050. the september bank statement shows total cash deposits of $87,000 (and no credit memos). what amount of deposits in transit should appear in the september 30 bank reconciliation? What is the area of the region on the xy-plane which is bounded from above by the curvey=e*, from below by y = cos x and on the right by the vertical line X = ? (a) 2 cos(e* - 5) (b) 14.80 (c) 27/3 (d) 22.14 (e) 31.31 [10 Marks] An article in the Journal of Database Management ["Experimental Study of a Self-Tuning Algorithm for DBMS Buffer Pools" (2005,Vol:. 16,pp. 1-20)]provided the workload used in the TPC-C OLTP Transaction Processing Performance Council's Version C On-Line Transaction Processing) benchmark; which simulates a typical order entry application: Transaction Frequency Selects Updates Inserts Deletes Non-Unique Selects Joins New Order 43 26 12 Payment 44 9. Order Status 7.9 10 Delivery 126 84 10 Stock Level The frequency of each type of transaction (in the second column) can be used as the percentage of each type of transaction The average number of "selects" operations required for each type oftransaction is shown Let A denote the event of transactions with an average number of selects operations of 12 or fewer: Let B denote the event of transactions with an average number of updates operations of 12 or fewer: Calculate the following probabilities Round your answers to four decimal places (e.g: 98.7654). what is bigger -1/2 or -7/10