In 2011, a company called RSA, which provides security services, acknowledged its proprietary authentication system, which is employed by some defense contractors and other high-security industries, was compromised. As a result, the attackers were also able to log into systems at Lockheed Martin, and other companies, using the stolen credentials of legitimate users. This is an example of violation of ___________________.

Answers

Answer 1

Answer:

The answer is "Authentication"

Explanation:

The attacker had the opportunity to log into the legitimate users' stolen credentials in Boeing systems and other firms in this question. That's an example of a verification violation.

This is a recognition of the identification of a user. Various students typically require various kinds of certificates in order to create the identity of the user. The credentials are frequently a passcode that only people and the computer know and seem to be confidential.


Related Questions

What is the cpu used for

Answers

Answer:

A central processing unit (CPU), also called a central processor, main processor or just processor, is the electronic circuitry that executes instructions comprising a computer program. The CPU performs basic arithmetic, logic, controlling, and input/output (I/O) operations specified by the instructions in the program.

How long you plan to keep your investments in your portfolio refers to:
A. Time horizon
B. Asset allocation
C. Personal financial health
D. Risk tolerance

Answers

Answer:

A, because it has to do with the amount of time you have it in your portfolio.

an_is a sepuence of precise instructions which result in a solution​

Answers

Answer:

algorithm.

Explanation:

An algorithm can be defined as a standard formula or procedures which comprises of set of finite steps or instructions for solving a problem on a computer. The time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the input.

Furthermore, the processing symbols and their functions used in developing an algorithm are oval (start or stop), diamond (decision-making), circle (on-page connector), parallelogram (input and output), rectangle (calculation), arrow (flow or direction) and pentagon (off-page connector).

Some of the characteristics of an algorithm include the following;

I. An algorithm can be written using pseudocode. A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language.

II. An algorithm can be visualized using flowcharts. A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

In conclusion, an algorithm is a sequence of precise instructions which result in a solution​ for solving problems using a computer system.

You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2016. Windows Server Update Services (WSUS) is installed on two servers, SERVERA and SERVERB. SERVERA receives software updates from Microsoft Windows Update servers. You manually synchronized SERVERB with the Windows Update servers, and now you need to complete the WSUS configuration on SERVERB. Which of the following is not a step you might take to complete the configuration of WSUS on SERVERB?
A. Approve the current updates.
B. Set SERVERB to receive updates from SERVERA and automatically synchronize with approved updates on SERVERA.
C. Set SERVERB to draw updates automatically from whichever sources SERVERA is set to draw from.
D. Set SERVERB to receive daily updates automatically at a given time

Answers

Answer:

The answer is "Choice C"

Explanation:

The server is a computer or network which supplies other devices called clients through a net with resources, data or applications, or programs. Source Server allows a client can retrieve the cells are attached to the source code for a program. All required source control files were retrieved by the source server. Its app must've been indexed to source in enabled to use source server.

Which option is not available in the Presenter view of a presentation?

Answers

Group of answer choices.

A. Next Slide Preview

B. Pen/Laser Pointer tools

C. Open Slide Show

D. Navigation Controls

Answer:

C. Open Slide Show

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

Basically, the views that are available on the Microsoft PowerPoint application includes;

1. Slide Sorter.

2. Notes Page.

3. Reading Pane.

4. Presenter view.

Presenter view avails the user an ability to use two monitors to display his or her presentation. Thus, one of the monitors displays the notes-free presentation to your audience while the other monitor lets you view the presentation with notes that you have added to the slides, as well as the navigation and presentation tools.

Furthermore, the Presenter view was developed by Microsoft Inc. to have the following options;

I. Next Slide Preview.

II. Pen/Laser Pointer tools.

III. Navigation Controls.

However, Open Slide Show is an option which is not available in the Presenter view of a presentation.

In today's digital world, companies have created software that makes business communication and productivity more efficient and effective. Explain why it is important for you to know how to use business communication tools such as the Microsoft Office Suite (i.e., Word, PowerPoint, Excel, etc.).


Include examples of some scenarios you faced or may face in the future (as both a student and in your career) that will require you to use these business communication tools.
300 + words

Answers

Answer:

Business communications tools are widely used and the world is becoming increasingly digital so not having those skills will hinder you.

Explanation:

Many jobs require knowledge of Microsoft tools as a qualification. By not having that expertise, I will be viewed as less qualified for a position and may be passed up for job. In corporate America, presentations are a staple and Microsoft PowerPoint is the primary software. If I deliver a poor presentation due to inexperience, I will make myself look bad and as a result get a bad quarterly review and possibly stunted any future promotions. On the flipside, as a business owner Excel is a handy tool for tracking expenses. Very customizable, quick and easy to understand.

Q.No.2. A study of the effect of smoking on sleep patterns is conducted. The measure observed is the time, in minutes, that it takes to fall asleep. These data are obtained: [3] Smokers:69.3 56.0 22.1 47.6 53.2 48.1 52.7 34.4 60.2 43.8 23.2 13.8 Non Smokers: 28.6 25.1 26.4 34.9 28.8 28.4 38.5 30.2 30.6 31.8 41.6 21.1 36.0 37.9 13.9

Answers

Answer:

(a) [tex]\bar x_1 = 43.7[/tex]     [tex]\bar x_2 = 30.25[/tex]

(b) [tex]\sigma_1 = 16.93[/tex]    [tex]\sigma_2 = 7.14[/tex]

(c) Smoking increases the time to fall asleep

Explanation:

Solving (a): The sample mean of each group

Mean is calculated as:

[tex]\bar x = \frac{\sum x}{n}[/tex]

So, we have:

Smokers

[tex]n_1= 12[/tex] and

[tex]\bar x_1 = \frac{69.3 +56.0+ 22.1 +47.6+ 53.2+ 48.1+ 52.7 +34.4+ 60.2 +43.8 +23.2 +13.8}{12}[/tex]

[tex]\bar x_1 = \frac{524.4}{12}[/tex]

[tex]\bar x_1 = 43.7[/tex]

Non Smokers

[tex]n_2 = 15[/tex] and

[tex]\bar x = \frac{28.6 +25.1 +26.4 +34.9 +28.8 +28.4 +38.5 +30.2 +30.6 +31.8 +41.6 +21.1 +36.0 +37.9 +13.9}{15}[/tex]

[tex]\bar x_2 = \frac{453.8}{15}[/tex]

[tex]\bar x_2 = 30.25[/tex]

Solving (b): The standard deviation of each group

This is calculated as:

[tex]\sigma = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

For smokers

[tex]n_1= 12[/tex]

So:

[tex]\sigma_1 = \sqrt{\frac{(69.3 -43.7)^2+(56.0-43.7)^2+..........+(13.8-43.7)^2}{12-1}}[/tex]

[tex]\sigma_1 = \sqrt{\frac{3152.04}{11}}[/tex]

[tex]\sigma_1 = \sqrt{286.5491}[/tex]

[tex]\sigma_1 = 16.93[/tex]

For non-smokers

[tex]n_2 = 15[/tex]

So:

[tex]\sigma_2 = \sqrt{\frac{(28.6 -30.25)^2+(25.1 -30.25)^2+..........+(13.9 -30.25)^2}{15-1}}[/tex]

[tex]\sigma_2 = \sqrt{\frac{713.2575}{14}}[/tex]

[tex]\sigma_2 = \sqrt{50.9469}[/tex]

[tex]\sigma_2 = 7.14[/tex]

Solving (c): Impact of smoking on time to sleep

In (b), we have:

[tex]\sigma_1 = 16.93[/tex] --- smokers

[tex]\sigma_2 = 7.14[/tex] --- non-smokers

Smokers have larger standard deviation (i.e. large variability) than non-smokers. This means that smokers require more time to fall asleep.

Nyatakan dua maklumat yang perlu dilabelkan pada lakaran perkembangan idea.

1.______________________________________________.
2._____________________________________________.​

Answers

Answer:

i don't understand a thing

One of the following is NOT a type of Intellectual Property

Answers

Group of answer choices.

a) Copyright

b) Trademark

c) Trade Secrets

d) Privacy​

Answer:

d) Privacy​

Explanation:

An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect.

Simply stated, an intellectual property is an intangible creation of the human mind, ideas, thoughts or intelligence. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.

Generally, there are different types of intellectual property (IP) and this includes;

a) Copyright

b) Trademark

c) Trade Secrets

However, privacy is a type of intellectual property.

name any three data items that can be you can be encoded using magnetized ink ​

Answers

Answer:

U+2446 ⑆ OCR BRANCH BANK IDENTIFICATION.

U+2447 ⑇ OCR AMOUNT OF CHECK.

U+2448 ⑈ OCR DASH (corrected alias MICR ON US SYMBOL)

U+2446 ⑆ OCR BRANCH BANK IDENTIFICATION, U+2447 ⑇ OCR AMOUNT OF CHECK and U+2448 ⑈ OCR DASH (corrected alias MICR ON US SYMBOL) are the three data items that can be encoded using magnetized ink ​

What is meant by encoded?

Encoding is the process of arranging a string of characters letters, numbers, punctuation, and some symbols in a particular format for quick transmission or storage. The process of converting an encoded format back into the original string of characters is known as decoding.

Thus, the item is mentioned in the above statement.

For more details about encoded, click here:

https://brainly.com/question/18182530

#SPJ2

Hadoop is : open source software framework designed for distributing data-processing over inexpensive computers. data mining platform designed for storing and analyzing big data produced by web communications and transactions. high-speed platform used to analyze large data sets pre-configured hardware-software system designed for analyzing big data. NoSQL database technology that stores both data and procedures acting on the data as object

Answers

Answer: open-source software framework designed for distributing data-processing over inexpensive computers.

Explanation:

Hadoop refers to the collection of open-source software utilities which are important in facilitating the use of a network of several computers to solve big data.

It provides huge storage for different kinds of data, and the ability to handle concurrent tasks virtually. Therefore, the correct option is "open-source software framework designed for distributing data-processing over inexpensive computers".

How do you debug an Xcode project?

A.
by selecting the Debug option in the Tools menu
B.
by clicking on the Debug Navigator
C.
by clicking on the Run button
D.
by clicking on the Debug button on the bottom right

Answers

Answer:

in my opinion i think it is "C" by clicking on the run button...

Ana is a music lover. She loves to download songs and videos on her computer every time she hears a new song. One day, her computers started to malfunction, and all her files were no longer accessible. What do you think happened to Ana’s computer and what can you do to avoid the same problem​

answer pleasssseeee

Answers

Answer:

Storage outage

As many new songs are released to the Internet every day, Anna might have download thousands of them, which made her computer ran out of storage and RAM(random access memory )

Realiza una tabla acerca de los escenarios de usos más comunes de Excel.

Answers

Answer:

Microsoft Excel es una hoja de cálculo producida por Microsoft. La aplicación es ampliamente utilizada en empresas e instituciones, así como por usuarios domésticos. Su uso principal es realizar cálculos (por ejemplo, gastos) compilados en forma tabular. Para este uso, se aplican numerosas funciones matemáticas, financieras y de base de datos disponibles en el programa. La duplicación semiautomática de las fórmulas creadas con el uso de diferentes variantes de direccionamiento (direccionamiento relativo, direccionamiento absoluto, direccionamiento mixto) también es de gran importancia. Microsoft Excel también se utiliza para crear muchos tipos de gráficos, útiles, entre otros, en física, matemáticas y economía. También incluye un sistema para la elaboración de informes utilizando el llamado tablas dinámicas, utilizadas en la realización de análisis comerciales.

Which of the components of the systems model provides information so
the system can adjust its function? *
A. input
B. feedback
C. process
D. output

Answers

Answer: Feedback

Explanation:

The input components of the systems model can consist of resources like people, energy, tools, capital, etc.

The feedback components of the systems model provides information so

the system can adjust its function. An example of the feedback mechanism for a system is the progress bar which shows when one is downloading a file on iTunes.

Which is a true statement about automation?

A)human intervention is needed to control all sequences of operations of a task.

B)human intervention is not needed at anytime in initiating or controlling sequences of operations.

C)using computer to control sequences of operations without human intervention.

D)computers are not needed to initiate or control any sequence of operations of a task.

Answers

Answer:

im guessing its a?

Explanation:

5.2
Explain ONE reason why the special equipment is used when
testing eyesight for a driver's licence.
(2)​

Answers

Answer:

In order to reduce the risk of accidents on the roads.

Explanation:

The special equipment is used when  testing eyesight for a driver's license in order to reduce the risk of accidents on the roads. Good eyesight is very important for good and safe driving so to find out the eyesight of the driver, the license officer used special equipment in order to check driver's eyes. If the eyesight is good, the officer provide license to the person otherwise not so that no accidents happen on the road.

I just need some help working out this Java code! I can list the instructions below:
Modify the CountSpaces program so that contains a String that holds your favorite inspirational quote. Pass the quote to the calculateSpaces method and return the number of spaces to be displayed in the main method.

We're given this to start however I have been struggling as there are two classes and it's been confusing me. Thanks so much for any help! All good and God Bless!

public class CountSpaces
{
public static void main(String[] args)
{
// write your code here
}
public static int calculateSpaces(String inString)
{
// write your code here
}
}

Answers

Answer:

public class CountSpaces

{

   public static void main(String[] args)

   {

       String quote = "The concept of infinity is meaningless inside of an insane human mind.";

       int nrSpaces = calculateSpaces(quote);

       System.out.println("Nr spaces in your quote is " + nrSpaces);

   }

   

   public static int calculateSpaces(String inString)

   {

       int count = 0;

       

       for (int i = 0; i < inString.length(); i++) {

           if (inString.charAt(i) == ' ') {

               count++;

           }

       }

       return count;

   }

}

Explanation:

In this example there is only one class, and since all methods are static the true concept of the class is not even being used.

Which area of Xcode provides controls to navigate breakpoints? CORRECT

Answers

Answer:

see your answer with full detail in pdf file please download

mark me brainlist

a. a large central network that connects other networks in a distance spanning exactly 5 miles. b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings. c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 10 miles with common carrier circuits.

Answers

Complete Question:

A local area network is:

Answer:

b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings.

Explanation:

A local area network (LAN) refers to a group of personal computers (PCs) or terminals that are located within the same general area and connected by a common network cable (communication circuit), so that they can exchange information from one node of the network to another. A local area network (LAN) is typically used in small or limited areas such as a set of rooms, a single building, school, hospital, or a set of well-connected buildings.

Generally, some of the network devices or equipments used in a local area network (LAN) are an access point, personal computers, a switch, a router, printer, etc.

what is an operating system​

Answers

Answer:

An operating system is the primary software that manages all the hardware and other software on a computer. The operating system, also known as an “OS,” interfaces with the computer’s hardware and provides services that applications can use.

the software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals

Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens it, he was directed to a site and logged using his credit card number. After a few days,he learned that his card was use by someone in purchasing an expensive item. What internet threat did Kiko experience and what can you do to avoid it.​

Answers

He experienced phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

Here are some measures to avoid phishing. You can pick up the one you liked the most

Always check the spelling of the URLs in email links before you click or enter sensitive informationWatch out for URL redirects, where you're subtly sent to a different website with identical designIf you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply. Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media

A ____ is an icon that does not directly represent a file, folder or application but serves as a link to it?​

Answers

Answer:

Shortcut

Explanation:

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

Generally, all files are identified by a name, icon, size, and type (format) such as audio, image, video, document, system, text, etc.

Furthermore, files are organized or arranged in directories. These directories are paths that describes the location wherein a file is stored on a computer system.

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem. Thus, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

In Computer science, it's possible to create a shortcut in several directories (locations) on a computer, so as to reference a file, folder or software application and serve as an executable link.

Hence, a shortcut is an icon that does not directly represent a file, folder or application but serves as a link to it.

Additionally, deleting the shortcut of a data file, folder or software application would not permanently delete or uninstall the main data file respectively.

discuss why ergonomics is important?​

Answers

Answer: Ergonomics are important because when you're doing a job and your body is stressed by an awkward posture, extreme temperature, or repeated movement your musculoskeletal system is affected.

PLEASEEEE HELPPP!!!!! Which graphic design tool should you use to achieve the effect in the image shown here?

A. Move
B. color and painting tools
C. Layers
D. Marquee
E. Crop

Will give brainlist if right!!! Thx

Answers

Answer:

I think the answer is b yep b

What is the explanation of line 21-25

Answers

Answer:

The code is checking if a word in the word list matches a certain length and the first letter matches a certain letter... the for loop is what increments through the word list checking each word one by one for the specified conditions. If the word meets the conditions it is added to an array called filteredWordList.

Explanation:

Suppose a large group of people in a room were all born in the same year. Consider the following three algorithms, which are each intended to identify the people in the room who have the earliest birthday based on just the month and day. For example, a person born on February 10 is considered to have an earlier birthday than a person born on March 5. Which of the three algorithms will identify the correct people?
I. All the people in the room stand up. All standing people form pairs where possible, leaving at most one person not part of a pair. For each pair, the person with the earlier birthday remains standing, while the other person in the pair sits down. If there is a tie, both people sit down. Any individual not part of a pair remains standing. Continue doing this until only one person remains standing. That person has the earliest birthday.
II. All the people in the room stand up. All standing people form pairs with another standing person that they have not previously been paired with where possible, leaving at most one person not part of a pair. For each pair, the person with the earlier birthday remains standing, while the other person in the pair sits down. If there is a tie, both people in the pair remain standing. Any individual not part of a pair remains standing. Continue doing this until only one person remains standing or all persons standing have the same birthday. Anyone still standing has the earliest birthday.
III. Beginning with the number 1, ask if anyone was born on that day of any month. Continue with the numbers 2, 3, and so on until a positive response is received. If only one person responds, that person has the earliest birthday. If more than one person responds, determine which person was born in the earliest month, and that person or those persons have the earliest birthday.

Answers

Answer:

II is correct.

Explanation:

Algorithm is a computer program which solves complex problems within minutes. The algorithms has different variants which are used according to user demand. In the given scenario the choice no II is correct. All standing people can form a pair with another standing person and the person standing in the last will have the earliest birthday.

of the following potential benefits, which is LEAST likely to be provided by the upgraded system?
A Human representatives will not be needed to respond to some inquiries.
B
The company will be able to provide a human representative for any incoming call.
с
Customers are likely to spend less time listening to information not relevant to their issue.
D
Customers will be unable to mistakenly select the incorrect department for their particular issue.

Answers

Answer:

The company will be able to provide human representative for any incoming call

Explanation:

The upgrade of a system is meant to resolve identified issues in an initial system and given that the available human representative is usually less than the number of incoming call at a given time, due to a constant drive for a larger customer base, we have;

The upgraded system will provide technologies such that human representative will not be required for some inquiries, customers will listen to mainly relevant information with regards to their issues and customers will be properly directed to the correct department that are concerned with their current issue

Therefore, the LEAST likely goal of the upgraded system from among the options and therefore the least likely to be provided by the upgrade is the company will be able to provide human representative for any incoming call

spam and i report
Maurice wants to create a variable to store the name of the second-best taco place. Maurice writes the line of code as 2ndtaco = "Tio Dan's" but gets an error message. What is the problem with Maurice’s code?

A.
There can’t be an apostrophe ' in a variable name.

B.
The equals sign should be a dash.

C.
The type of variable wasn’t specified.

D.
A variable name can’t begin with a number.

Answers

Answer:

option d is the correct answer

Answer:

For your other question I think it's true

Explanation:

Fill in the blanks
A dash is a human-readable description in the source code of a computer program
Python has dash standard data types
A dash contains items separated by commas and enclosed within square brackets
A dash consists of key-value pairs
dash cannot be changed and use parentheses

Answers

Answer:

1. Comment

2. Five (5).

3. Line.

4. Tuple; that

Explanation:

1. A comment is a human-readable description in the source code of a computer program. Thus, it's an annotation or description in the source code of a software program that is readable by humans.

2. Python has five (5) standard data types, these includes; number, string, list, dictionary and tuple.

3. A line contains items separated by commas and enclosed within square brackets i.e [ ]. Thus, it's simply an ordered collection of one or multiple data items.

4. A tuple consists of key-value pairs

that cannot be changed and use parentheses. For example, Newtuple = ("strawberry", "apple", "mango", "banana", "orange").

Other Questions
Mr.flood records that 48% of his class do their homework on time. What decimal represents the percent of students who hand it late Solve the equation. 9a = 81 what does a equal What are two pull factors that have drawn immigrants of the past and present to the United States?Choose two correct answers.A overpopulationB job opportunitiesC equal rights How did the war in Europe come to an end?a- Allied forces seized Germany from the east and west, forcing a surrender.b- Allied forces seized Italy, forcing Mussolini to surrender his forces.c- The German military overthrew Hitler and surrendered to Allied forces.d- The German government negotiated a cease-fire with the Allies. Which of these citations is correct how did the religions of Judaism and Zoroastrianism differ during the rise of early civilizations? I WILL GIVE YOU BRAINLYEST if you answerPLSS HELP I suck at math its easy If is an angle in standard position and its terminal side passes through the point (6,1), find the exact value of secsec in simplest radical form. HELP I will give brainliest I am begging you only a few questions Which of the following is Not a correct plural form of a noun? A) companies B) tomatoes C) leafs D) crises im in need of help for this problem (listing BRAINLIST and giving points) :) *HELPP ANSWER NEEDED ASAPWhat group of people coined this dance style as "Salsa"?A. Cuban musiciansB. Jazz musiciansC.American musiciansD.Puerto Rican musicians Marcus wants to end the semester with at least an 85 test average in his math class. On his first 3 tests, he earned 83, 97, and 80. What will he have to earn on his fourth test to have at least an 85 average? Let g represent the grade needed on his fourth test. Write an inequality that models the situation. In 1852, the famed Cumberland Road, or National Road, was finallycompleted. It stretched from Maryland to Illinois, covering nearly600 miles and five states. How do you think the towns along thehighway benefited from the new traffic? Explain your answer inparagraph form. Which womens suffrage leaders led the Seneca Falls Convention?A.Susan B. Anthony and Carrie Chapman CattB.Alice Paul and Lucy BurnsC.Elizabeth Cady Stanton and Lucretia MottD.Woodrow Wilson and Susan B. Anthony HELP! POTATOooooooooooooooooooooooo plz the cost price of a dress is $640. At a sale 20% discount is given. What is the selling price of the dress. A. $128, B.$512 C. $660, D. $768 Write a Java method that prints a list of characters using the following header:public static void printChars (char ch1, char ch2, int numPerLine)This method prints chars between ch1 and ch2 (inclusive); the number of chars per-line is specified by int variable numPerLine. Then write and test Java programs that printa) characters from 1 to Z (uppercase), ten chars per line; b) all lowercase letters followed by all uppercase letters, 13 per line (Hint: you may want to call the method printChars twice in this second part)Consecutive characters on the same line should be separated by exactly one space. An architect drew plans for an office building.The building will have the dimensions shown.Building is made up of 2 cuboids. First cuboid has length as 10 ft, height as 12 ft and width as 10ft. Second cuboid has length as 10 ft, height as 30 ft and width as 10 ft.Part AWhich is an expression for the total volume of the building? A. (20 10 30) + (12 10 10) B. (10 10 30) + (10 10 12) C. (30 10 10) + (10 10 20) D. (10 20 30) + (10 12 20)Part BWhat is the volume of the building? Enter your answer in the box. ft3 Bunkhouse Electronics is a recently incorporated firm that makes electronic entertainment systems. Its earnings and dividends have been growing at a rate of 36.0%, and the current dividend yield is 8.00%. Its beta is 1.32, the market risk premium is 14.00%, and the risk-free rate is 2.80%.Required:a. Use the CAPM to estimate the firms cost of equity. (Do not round intermediate calculations. Enter your answer as a percent rounded to 2 decimal places.)b. Now use the constant growth model to estimate the cost of equity. (Do not round intermediate calculations. Enter your answer as a whole percent.)c. Which of the two estimates is more reasonable?