SlideShare a Scribd company logo
1 of 20
Name:____________________________________________
Date:__________________________________________
Real world Situations
Directions:Write and solve each equation from the given word
problem on a blank sheet of paper. Write your answers in a
complete sentence on this page.
Show Your Work!!!!!
Level One: One/Two Step Real-World Application
1.) Maria combines her 39 seashells with Jacob’s seashells for
a total of 173 seashells. Find how many seashells Jacob had
before the collections were combined.
2.) The gym teacher divided a class into four teams with 7
students per team. How many students are in the class?
3.) An emergency plumber charges $65 as a call-out fee plus an
additional $75 per hour. He arrives at a house at 9:30 and works
to repair a water tank. If the total repair bill is $196.25, at what
time was the repair completed?
4.) To convert temperatures in Fahrenheit to temperatures in
Celsius, take the temperature in degrees Fahrenheit, subtract 32,
and then divide the result by 1.8. This gives the temperature in
degrees Celsius. Write an equation that shows the conversion
process.
4a.) Convert 50 degrees Fahrenheit to degrees Celsius.
4b.) Convert 25 degrees Celsius to degrees Fahrenheit.
5.) Jasmin’s dad, Andrew, is planning a surprise birthday party
for her. He will hire a bouncy castle, and will provide party
food for all the guests. The bouncy castle costs $150 for the
afternoon, and the food will cost $3 per person. Andrew has a
budget of $300. Write an equation and use it to determine the
maximum number of guests he can invite.
Name:____________________________________________
Date:__________________________________________
Real world Situations
Directions:Write and solve each equation from the given word
problem on a blank sheet of paper. Write your answers in a
complete sentence.
Show Your Work!!!!!
Level Two: Multiple-Step Real-World Application
6.) The speed of a body is the distance it travels per unit of
time. That means that we can also find out how far an object
moves in a certain amount of time if we know its speed: we use
the equation “distance = time x speed” Shanice’s car is
traveling 10 miles per hour slower than twice the speed of
Brandon’s car. She covers 93 miles in 1 hour 30 minutes. How
fast is Brandon driving?
7.) The electrical current, I (amps), passing through an
electronic component varies directly with the applied
voltage, V (volts), according to the
relationship V=I⋅ R where R is the resistance measured in
Ohms (Ω).
a. A scientist is trying to deduce the resistance of an unknown
component. He labels the resistance of the unknown
component x Ω. The resistance of a circuit containing a number
of these components is (5x+20) Ω. If a 120 volt
potential difference across the circuit produces a current of 2.5
amps, calculate the resistance of the unknown component.
8.) A factory manager is packing engine components into
wooden crates to be shipped on a small truck. The truck is
designed to hold sixteen crates, and will safely carry a 1200 lb
cargo. Each crate weighs 12 lbs empty. How much weight
should the manager instruct the workers to put in each crate
in order to get the shipment weight as close as possible to 1200
lbs?
9.) The lifespan of a guinea pig is 6 years less than that of a
giraffe. The lifespan of a tiger is 4 times that of the guinea pig.
If the total lifespan of the animals is 30 years, calculate the
longevity for the giraffe.
Name:____________________________________________
Date:__________________________________________
Real world Situations
Directions:Write and solve each equation from the given word
problem on a blank sheet of paper. Write your answers in a
complete sentence.
Show Your Work!!!!!
Level Three: ALL Real-World Applications
10.) Danielle baked macaroni for her children for which she
used up 1/9 th of a jug of milk. She also poured 20.5 ounces of
milk into a bowl of cornflakes. If 25.5 ounces of milk remain in
the jug, how much milk did the jug originally contain?
11.) Katrina’s uncle loaned her $1200 to buy a computer.
Katrina plans to pay her uncle $75 per month until the loan is
paid off. How many months will it take Katrina to pay back the
money?
12.) A medical center is planning to hire a total of 54 nurses
and CNAs (Certified Nursing Assistants). If the center needs
twice as many CNAs as nurses, how many of each should they
hire?
13.) A company is ordering 350 t-shirts to sell at a fundraiser.
The company wants to order the same number of large size t-
shirts as medium size t-shirts, but only half as many small t-
shirts. How many of each size should they order?
14.)
The perimeter of the triangle shown to the right is 26
inches. Determine the length of each side of the triangle.
image1.jpeg
image2.png
Thumbnails/thumbnail.png
Cristian DeWeese
Dr. Rutherford
Hardening Operating Systems
11/12/2022
“Attack on Microsoft systems using the Internet ”
1. Following are the some of the Microsoft system attacks;
MItM Attack:
Because of the vulnerability, an off-site attacker is able to get
access to the compromised system. Within the Windows LSA
service is where the vulnerability may be found. (Kumar &
Surisetty, 2011) An adversary operating from a distant location
has the ability to trick a domain controller into providing
NTLM authentication to them by calling a method on the
LSARPC interface. As a consequence of this, an adversary may
gain credentials and compromise the vulnerable system via the
use of the NTLM Relay Attack.
DDos:
During a DDoS attack, users are unable to connect to the
targeted service. During a distributed denial of service attack,
all of an app's available resources are used up. Attackers flood a
site with fake users to slow it down or bring it down entirely.
(Gomez & Valdez, 2006) The frequency and severity of these
episodes are both rising. According to statistics compiled by
Azure Networking, DDoS assaults will raise by 25% in the first
half of 2021 compared to the last quarter of 2020. In 2021,
Azure prevented 359.713 assaults on its worldwide
infrastructure, up 43 percent from the previous year. (Wu &
Sun, 2010) Regardless of industry or location, businesses of any
size are vulnerable to DDoS attacks. Internet gambling sites,
online stores, and telecommunication companies are frequent
targets of cybercriminals.
2. Following are the main 5 concerns;
Initial Breach Targets: Nobody hacks IT. Built Active Directory
forests are clean and updated. New OSes and programs emerge
throughout time. As Active Directory's administrative
advantages are recognized, more information is provided, more
PCs or programs are connected, and domains are altered to suit
new Windows capabilities. Even when new infrastructure is
introduced, other elements may not be maintained as well,
systems and applications may be neglected, and organizations
may forget they still have legacy infrastructure. Older, bigger,
more complex ecosystems are more vulnerable.
Disabling Security Features: Many businesses don't utilize
Windows Firewall with Advanced Security (WFAS) because
they feel it's too complicated to set up. Starting with Windows
Server 2008, the Windows Firewall is automatically configured
to provide just the minimum permissions required for each role
or functionality to function. When WFAS is turned off (and no
other host-based firewall is used), Windows becomes more
vulnerable. Firewalls at the network's perimeter protect against
attacks from the Internet but not from drive-by downloads or
compromised intranet systems.
Gaps in antivirus & Antimalware Deployments: Most
workstations in a company will have antivirus and antimalware
software installed, activated, and up-to-date, according to an
analysis of antivirus and antimalware deployments. With a few
notable exceptions, such as seldom connected workstations and
staff devices, antivirus and antimalware software is often easily
deployed, configured, and updated across the board.
Incomplete patching: Microsoft publishes security updates
regularly on the second Tuesday of every month, however in
severe circumstances when vulnerability is believed to represent
an imminent hazard to client systems, an update may be
delivered outside of the monthly security update schedule.
Whether a company is small and uses Windows Update to
handle system and application patching or large and uses
management software like System Center Configuration
Manager (SCCM) to deploy patches according to detailed,
hierarchical plans, a large number of customers patch their
Windows infrastructures in a timely fashion.
Misconfiguration: Even in environments where systems are
often kept up to date and patched, we regularly discover
vulnerabilities or misconfigurations in the operating system,
applications, and Active Directory. Depending on the nature of
the configuration problem, the attack may just affect the local
workstation, but in many cases, an attacker may actively seek to
"manage" further systems and eventually get access to Active
Directory.
3. There are three essential parts to every network;
Routers
Switches
Firewalls
Switches:
A switch is required to connect many computers together. While
PCs are the most common device that switches link, they are not
the only device that switches may connect. After a device is
connected to a switch, its Media Access Control (MAC) address
is revealed and used for routing. The switch includes the MAC
address in outgoing packets so that other network nodes may
determine which device generated them.
Routers:
In order to connect local area networks to the wider web,
routers are required. Packets with an IP address are sent further
by this L3 device. A router is a device that allows for
communication across different networks. With the help of
Dynamic Host Configuration Protocol, a router may give out IP
addresses to computers and other devices that are linked to it.
After then, the information may enter and leave the network as
needed. In order to connect to the web, NAT is essential.
Firewalls:
When a firewall is set up, it may either allow or prevent
information from accessing a network. As an example, a
firewall may be set up to allow only traffic from a limited range
of IP addresses and ports that have been verified as secure.
(Archiveddocs , nd) On the other hand, a firewall may monitor
the IP address of the source of a packet that is being sent
several times per second. Maybe there was a distributed denial
of service attack that would be weird (DDoS)
References:
Kumar, S., & Surisetty, S. (2011). Microsoft vs. Apple:
Resilience against distributed denial-of-service attacks.
IEEE Security & Privacy,
10(2), 60-64.
Kumar, S., Azad, M., Gomez, O., & Valdez, R. (2006,
February). Can microsoft's Service Pack2 (SP2) security
software prevent SMURF attacks?. In
Advanced Int'l Conference on Telecommunications
and Int'l Conference on Internet and Web Applications and
Services (AICT-ICIW'06) (pp. 89-89). IEEE.
Lobo, D., Watters, P., Wu, X. W., & Sun, L. (2010, July).
Windows rootkits: Attacks and countermeasures. In
2010 Second Cybercrime and Trustworthy
Computing Workshop (pp. 69-78). IEEE.
Archiveddocs. (n.d.).
Install and Deploy Windows Server 2012 R2 and
Windows Server 2012. Learn.microsoft.com. Retrieved
November 8, 2022, from https://learn.microsoft.com/en-
us/previous-versions/windows/it-pro/windows-server-2012-r2-
and-2012/hh831620(v=ws.11)#windows-server-2012-r2
Points
Actual
Comments
Title Page
10
8
Agenda
10
6-8 pages
30 (6x5)
Content
30 (6x5)
Conclusion
10
0
5 References
10 (5x2)
Total
100
88
Name________________________
SLOPE OF A LINE #2
Directions: For the problems below, find the slope of the line
between each of the two given points. Write your
answer in simplest form. To do this without graphing the
points, use the formula: slope =
12
12
xx
yy
−
−
Examples: (1,2) and (3,4) = 1
2
2
13
24
==
−
− (1,0) and (8,10) =
7
10
18
010
=
−
−
1) (2,6) and (6,15) = ______________________ 2) (1,5) and
(4,11) = ______________________
3) (3,6) and (7,13) = ______________________ 4) (0,5) and
(5,17) = ______________________
5) (0,5) and (8,8) = ______________________ 6) (11,4) and
(15,7) = ______________________
7) (1,9) and (6,11) = ______________________ 8) (7,5) and
(13,10) = ______________________
9) (11,9) and (12,9) = ______________________ 10) (0,0)
and (7,8) = ______________________
Copyright © 2022 McGraw Hill - ALEKS® is a registered
trademark of ALEKS CorporationSolving Inequalities with
Word Problems #1 Page 1 / 5
Solving Inequalities with Word Problems #1
Student Name : _____________________ Class Name : 7th
Period Algebra I Gifted
Number of Questions: 10 Instructor Name : Ms. Jeffcoat
Question 1 of 10
Jina's fish tank has liters of water in it. She plans to add liters
per minute until the tank has more
than liters. What are the possible numbers of minutes Jina
could add water?
Use for the number of minutes.
Write your answer as an inequality solved for .
Question 2 of 10
Solve the inequality for .
Simplify your answer as much as possible.
Question 3 of 10
Solve the inequality for .
Simplify your answer as much as possible.
Question 4 of 10
Solve the inequality for .
Simplify your answer as much as possible.
Question 5 of 10
14 5
74
t
t
x
≤3 +5x 9 +7x 11
x
<+−3
x
5
2
x
≤−−
5
2
x 1 +
9
2
x
7
4
Copyright © 2022 McGraw Hill - ALEKS® is a registered
trademark of ALEKS CorporationSolving Inequalities with
Word Problems #1 Page 2 / 5
Write inequalities to represent the situations below.
To be eligible for the senior admission rate, a visitor must not
be less than 55 years old.
Use y to represent the age (in years) of a visitor who gets the
senior rate.
At the airport, each piece of luggage to be checked in must
weigh at most 40 pounds.
Use w to represent the weight (in pounds) of a piece of luggage
that can be checked in.
Question 6 of 10
Ann is pumping water into a tank at a rate of liters per minute.
Since she started pumping water,
liters has splashed out of the tank. Her goal is given by , where
is the number of
minutes she pumps water into the tank.
Complete the parts below.
(a) Solve the given inequality and graph the solution on the
number line below.
(b) Choose and complete the statement that best describes the
solution.
To meet the goal, the tank will have at least _____ liters of
water in it.
This will take at most _____ minutes.
To meet the goal, the tank will have at most _____ liters of
water in it.
This will take at most _____ minutes.
To meet the goal, the tank will have at most _____ liters of
water in it.
This will take at least _____ minutes.
Question 7 of 10
Write an inequality for the graph shown below.
Use for your variable.
17 12
≤−17x 12 90 x
x
2 4 6 8 10 12 14 16 18 20 22 24 26 28 300
1 2 3 4 5 6 7 8 9 10 110-1-2-3-4-5-6-7-8-9-10-11 x
Copyright © 2022 McGraw Hill - ALEKS® is a registered
trademark of ALEKS CorporationSolving Inequalities with
Word Problems #1 Page 3 / 5
Question 8 of 10
Graph the inequality below on the number line.
Question 9 of 10
Translate the sentence into an inequality.
Ten subtracted from the product of and a number is at most .
Use the variable for the unknown number.
Question 10 of 10
Frank is going to rent a truck for one day. There are two
companies he can choose from, and they have
the following prices.
Company A charges and allows unlimited mileage.
Company B has an initial fee of and charges an additional for
every mile driven.
For what mileages will Company A charge less than Company
B?
Use for the number of miles driven, and solve your inequality
for .
≥b 10
3 24
c
$82
$55 $0.90
m m
1 2 3 4 5 6 7 8 9 10 110-1-2-3-4-5-6-7-8-9-10-11
12/20/22, 10:17 AM Solving Multiple-Step Inequalities
https://quizizz.com/print/quiz/6387a5070e8913001e250b33 1/2
Solving Multiple-Step Inequalities
10 Questions
NAME :
CLASS :
DATE :
1. Solve the inequality.
A x > B x > -7
C x < -7 D x <
2. Solve the inequality.
A b > 6 B b > 20
C b > 20 D b > 14
3. Solve for k.
7k – 2 ≥ -9
A k≤1 B k ≥ -1
C k ≤ -1 D k≥1
4. 14 < -2a + 6 - 2a
A a < 2 B a > 2
C a > -2 D a < -2
−5x − 7 < 28
5
21
5
−21
2 b − 8 > ( ) 12
12/20/22, 10:17 AM Solving Multiple-Step Inequalities
https://quizizz.com/print/quiz/6387a5070e8913001e250b33 2/2
5. Solve and graph.
k - 13 > -51
A A B D
C B D C
6. Solve:
4(2a + 3) < 3(a - 1)
A a<-3 B a>3
C a<3 D a>-3
7. Pick the correct inequality.
A A B C
C B D D
8. Graph after solving:
A B
C D
9. You flip an inequality symbol when you...
A subtract B multiple or divide by a negative number
C subtract or multiple by a negative number D multiply and
divide by any number
10. Graph after solving:
A B
C D Set of all Reals
4 x − 12 >( ) −24
7 2x + 1 −( ) 3 x − 1 ≤( ) 43

More Related Content

Similar to Name____________________________________________Date______.docx

Simplified Data Processing On Large Cluster
Simplified Data Processing On Large ClusterSimplified Data Processing On Large Cluster
Simplified Data Processing On Large Cluster
Harsh Kevadia
 

Similar to Name____________________________________________Date______.docx (20)

Os sample mid exam
Os sample mid examOs sample mid exam
Os sample mid exam
 
6620handout4o
6620handout4o6620handout4o
6620handout4o
 
Simplified Data Processing On Large Cluster
Simplified Data Processing On Large ClusterSimplified Data Processing On Large Cluster
Simplified Data Processing On Large Cluster
 
Sec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.comSec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.com
 
Distributed Systems at Scale: Reducing the Fail
Distributed Systems at Scale:  Reducing the FailDistributed Systems at Scale:  Reducing the Fail
Distributed Systems at Scale: Reducing the Fail
 
Mca2010 – operating system
Mca2010 – operating systemMca2010 – operating system
Mca2010 – operating system
 
Mca2010 – operating system
Mca2010 – operating systemMca2010 – operating system
Mca2010 – operating system
 
Sec 572 Effective Communication / snaptutorial.com
Sec 572  Effective Communication / snaptutorial.comSec 572  Effective Communication / snaptutorial.com
Sec 572 Effective Communication / snaptutorial.com
 
Mit201– operating system
Mit201– operating systemMit201– operating system
Mit201– operating system
 
Network and Internet Security.docx
Network and Internet Security.docxNetwork and Internet Security.docx
Network and Internet Security.docx
 
dist_systems.pdf
dist_systems.pdfdist_systems.pdf
dist_systems.pdf
 
lec6a.ppt
lec6a.pptlec6a.ppt
lec6a.ppt
 
Sec 572 Enhance teaching / snaptutorial.com
Sec 572  Enhance teaching / snaptutorial.comSec 572  Enhance teaching / snaptutorial.com
Sec 572 Enhance teaching / snaptutorial.com
 
CrawlerLD - Distributed crawler for linked data
CrawlerLD - Distributed crawler for linked dataCrawlerLD - Distributed crawler for linked data
CrawlerLD - Distributed crawler for linked data
 
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
RESILIENT VOTING MECHANISMS FOR MISSION SURVIVABILITY IN CYBERSPACE: COMBININ...
 
SEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.comSEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.com
 
Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior
 
F4 learning-area-3-commputer-networks
F4 learning-area-3-commputer-networksF4 learning-area-3-commputer-networks
F4 learning-area-3-commputer-networks
 
Mca2010 – operating system
Mca2010 – operating systemMca2010 – operating system
Mca2010 – operating system
 
master_seminar
master_seminarmaster_seminar
master_seminar
 

More from pauline234567

Journeys of Paul REL3034.E1Assignment OneWrite about half.docx
Journeys of Paul  REL3034.E1Assignment OneWrite about half.docxJourneys of Paul  REL3034.E1Assignment OneWrite about half.docx
Journeys of Paul REL3034.E1Assignment OneWrite about half.docx
pauline234567
 
JW House FundraiserJourney Through the Enchanted Forest Ga.docx
JW House FundraiserJourney Through the Enchanted Forest Ga.docxJW House FundraiserJourney Through the Enchanted Forest Ga.docx
JW House FundraiserJourney Through the Enchanted Forest Ga.docx
pauline234567
 
JP Morgan Chase The Balance Between Serving Customers and Maxim.docx
JP Morgan Chase The Balance Between Serving Customers and Maxim.docxJP Morgan Chase The Balance Between Serving Customers and Maxim.docx
JP Morgan Chase The Balance Between Serving Customers and Maxim.docx
pauline234567
 
Interpret a Current Policy of Three CountriesInstructionsAs .docx
Interpret a Current Policy of Three CountriesInstructionsAs .docxInterpret a Current Policy of Three CountriesInstructionsAs .docx
Interpret a Current Policy of Three CountriesInstructionsAs .docx
pauline234567
 
INTRODUCTIONWhen you think of surveillance, you may picture tw.docx
INTRODUCTIONWhen you think of surveillance, you may picture tw.docxINTRODUCTIONWhen you think of surveillance, you may picture tw.docx
INTRODUCTIONWhen you think of surveillance, you may picture tw.docx
pauline234567
 
Interviews and Eyewitness Identifications AP PhotoMat.docx
Interviews and Eyewitness Identifications AP PhotoMat.docxInterviews and Eyewitness Identifications AP PhotoMat.docx
Interviews and Eyewitness Identifications AP PhotoMat.docx
pauline234567
 
Interview Presentation QuestionsTo prepare · I.docx
Interview Presentation QuestionsTo prepare         · I.docxInterview Presentation QuestionsTo prepare         · I.docx
Interview Presentation QuestionsTo prepare · I.docx
pauline234567
 
INT 220 Business Brief Template Course Project.docx
INT 220 Business Brief Template Course Project.docxINT 220 Business Brief Template Course Project.docx
INT 220 Business Brief Template Course Project.docx
pauline234567
 
Instructor Name Point Value 30Student NameCATEGORY .docx
Instructor Name Point Value 30Student NameCATEGORY .docxInstructor Name Point Value 30Student NameCATEGORY .docx
Instructor Name Point Value 30Student NameCATEGORY .docx
pauline234567
 
InstructionsA SWOT analysis is used as a strategic planning tech.docx
InstructionsA SWOT analysis is used as a strategic planning tech.docxInstructionsA SWOT analysis is used as a strategic planning tech.docx
InstructionsA SWOT analysis is used as a strategic planning tech.docx
pauline234567
 
InstructionsRead two of your colleagues’ postings from the Di.docx
InstructionsRead two of your colleagues’ postings from the Di.docxInstructionsRead two of your colleagues’ postings from the Di.docx
InstructionsRead two of your colleagues’ postings from the Di.docx
pauline234567
 
InstructionsRespond to your colleagues. Respond with a comment .docx
InstructionsRespond to your colleagues. Respond with a comment .docxInstructionsRespond to your colleagues. Respond with a comment .docx
InstructionsRespond to your colleagues. Respond with a comment .docx
pauline234567
 
InstructionsPart Four of Applied Final Project,Playing with Ge.docx
InstructionsPart Four of Applied Final Project,Playing with Ge.docxInstructionsPart Four of Applied Final Project,Playing with Ge.docx
InstructionsPart Four of Applied Final Project,Playing with Ge.docx
pauline234567
 
InstructionsClients come to MFTs because they want to change, .docx
InstructionsClients come to MFTs because they want to change, .docxInstructionsClients come to MFTs because they want to change, .docx
InstructionsClients come to MFTs because they want to change, .docx
pauline234567
 
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docxINST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
pauline234567
 
Insert Prename, Surname of all studentsWinter Term 202223Theo.docx
Insert Prename, Surname of all studentsWinter Term 202223Theo.docxInsert Prename, Surname of all studentsWinter Term 202223Theo.docx
Insert Prename, Surname of all studentsWinter Term 202223Theo.docx
pauline234567
 
Informative SpeechCourse COM103 Public SpeakingCriteria.docx
Informative SpeechCourse COM103 Public SpeakingCriteria.docxInformative SpeechCourse COM103 Public SpeakingCriteria.docx
Informative SpeechCourse COM103 Public SpeakingCriteria.docx
pauline234567
 

More from pauline234567 (20)

Journeys of Paul REL3034.E1Assignment OneWrite about half.docx
Journeys of Paul  REL3034.E1Assignment OneWrite about half.docxJourneys of Paul  REL3034.E1Assignment OneWrite about half.docx
Journeys of Paul REL3034.E1Assignment OneWrite about half.docx
 
JW House FundraiserJourney Through the Enchanted Forest Ga.docx
JW House FundraiserJourney Through the Enchanted Forest Ga.docxJW House FundraiserJourney Through the Enchanted Forest Ga.docx
JW House FundraiserJourney Through the Enchanted Forest Ga.docx
 
JP Morgan Chase The Balance Between Serving Customers and Maxim.docx
JP Morgan Chase The Balance Between Serving Customers and Maxim.docxJP Morgan Chase The Balance Between Serving Customers and Maxim.docx
JP Morgan Chase The Balance Between Serving Customers and Maxim.docx
 
Interpret a Current Policy of Three CountriesInstructionsAs .docx
Interpret a Current Policy of Three CountriesInstructionsAs .docxInterpret a Current Policy of Three CountriesInstructionsAs .docx
Interpret a Current Policy of Three CountriesInstructionsAs .docx
 
INTRODUCTIONWhen you think of surveillance, you may picture tw.docx
INTRODUCTIONWhen you think of surveillance, you may picture tw.docxINTRODUCTIONWhen you think of surveillance, you may picture tw.docx
INTRODUCTIONWhen you think of surveillance, you may picture tw.docx
 
Interviews and Eyewitness Identifications AP PhotoMat.docx
Interviews and Eyewitness Identifications AP PhotoMat.docxInterviews and Eyewitness Identifications AP PhotoMat.docx
Interviews and Eyewitness Identifications AP PhotoMat.docx
 
Interview Presentation QuestionsTo prepare · I.docx
Interview Presentation QuestionsTo prepare         · I.docxInterview Presentation QuestionsTo prepare         · I.docx
Interview Presentation QuestionsTo prepare · I.docx
 
INT 220 Business Brief Template Course Project.docx
INT 220 Business Brief Template Course Project.docxINT 220 Business Brief Template Course Project.docx
INT 220 Business Brief Template Course Project.docx
 
Instructor Name Point Value 30Student NameCATEGORY .docx
Instructor Name Point Value 30Student NameCATEGORY .docxInstructor Name Point Value 30Student NameCATEGORY .docx
Instructor Name Point Value 30Student NameCATEGORY .docx
 
InstructionsThere are two high-level types of distribution cha.docx
InstructionsThere are two high-level types of distribution cha.docxInstructionsThere are two high-level types of distribution cha.docx
InstructionsThere are two high-level types of distribution cha.docx
 
InstructionsNOTE If you have already reviewed this presentation.docx
InstructionsNOTE If you have already reviewed this presentation.docxInstructionsNOTE If you have already reviewed this presentation.docx
InstructionsNOTE If you have already reviewed this presentation.docx
 
InstructionsA SWOT analysis is used as a strategic planning tech.docx
InstructionsA SWOT analysis is used as a strategic planning tech.docxInstructionsA SWOT analysis is used as a strategic planning tech.docx
InstructionsA SWOT analysis is used as a strategic planning tech.docx
 
InstructionsRead two of your colleagues’ postings from the Di.docx
InstructionsRead two of your colleagues’ postings from the Di.docxInstructionsRead two of your colleagues’ postings from the Di.docx
InstructionsRead two of your colleagues’ postings from the Di.docx
 
InstructionsRespond to your colleagues. Respond with a comment .docx
InstructionsRespond to your colleagues. Respond with a comment .docxInstructionsRespond to your colleagues. Respond with a comment .docx
InstructionsRespond to your colleagues. Respond with a comment .docx
 
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docxInstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
InstructionsProcurement Outsourcing (PO) StrategiesPO strat.docx
 
InstructionsPart Four of Applied Final Project,Playing with Ge.docx
InstructionsPart Four of Applied Final Project,Playing with Ge.docxInstructionsPart Four of Applied Final Project,Playing with Ge.docx
InstructionsPart Four of Applied Final Project,Playing with Ge.docx
 
InstructionsClients come to MFTs because they want to change, .docx
InstructionsClients come to MFTs because they want to change, .docxInstructionsClients come to MFTs because they want to change, .docx
InstructionsClients come to MFTs because they want to change, .docx
 
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docxINST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
INST560, Internet of Things (IoT)UNIVERSITY OF NORTH AMERICA.docx
 
Insert Prename, Surname of all studentsWinter Term 202223Theo.docx
Insert Prename, Surname of all studentsWinter Term 202223Theo.docxInsert Prename, Surname of all studentsWinter Term 202223Theo.docx
Insert Prename, Surname of all studentsWinter Term 202223Theo.docx
 
Informative SpeechCourse COM103 Public SpeakingCriteria.docx
Informative SpeechCourse COM103 Public SpeakingCriteria.docxInformative SpeechCourse COM103 Public SpeakingCriteria.docx
Informative SpeechCourse COM103 Public SpeakingCriteria.docx
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Name____________________________________________Date______.docx

  • 1. Name:____________________________________________ Date:__________________________________________ Real world Situations Directions:Write and solve each equation from the given word problem on a blank sheet of paper. Write your answers in a complete sentence on this page. Show Your Work!!!!! Level One: One/Two Step Real-World Application 1.) Maria combines her 39 seashells with Jacob’s seashells for a total of 173 seashells. Find how many seashells Jacob had before the collections were combined. 2.) The gym teacher divided a class into four teams with 7 students per team. How many students are in the class? 3.) An emergency plumber charges $65 as a call-out fee plus an additional $75 per hour. He arrives at a house at 9:30 and works to repair a water tank. If the total repair bill is $196.25, at what time was the repair completed? 4.) To convert temperatures in Fahrenheit to temperatures in Celsius, take the temperature in degrees Fahrenheit, subtract 32, and then divide the result by 1.8. This gives the temperature in degrees Celsius. Write an equation that shows the conversion process.
  • 2. 4a.) Convert 50 degrees Fahrenheit to degrees Celsius. 4b.) Convert 25 degrees Celsius to degrees Fahrenheit. 5.) Jasmin’s dad, Andrew, is planning a surprise birthday party for her. He will hire a bouncy castle, and will provide party food for all the guests. The bouncy castle costs $150 for the afternoon, and the food will cost $3 per person. Andrew has a budget of $300. Write an equation and use it to determine the maximum number of guests he can invite. Name:____________________________________________ Date:__________________________________________ Real world Situations Directions:Write and solve each equation from the given word problem on a blank sheet of paper. Write your answers in a complete sentence. Show Your Work!!!!! Level Two: Multiple-Step Real-World Application 6.) The speed of a body is the distance it travels per unit of time. That means that we can also find out how far an object moves in a certain amount of time if we know its speed: we use the equation “distance = time x speed” Shanice’s car is traveling 10 miles per hour slower than twice the speed of Brandon’s car. She covers 93 miles in 1 hour 30 minutes. How fast is Brandon driving? 7.) The electrical current, I (amps), passing through an electronic component varies directly with the applied voltage, V (volts), according to the relationship V=I⋅ R where R is the resistance measured in Ohms (Ω). a. A scientist is trying to deduce the resistance of an unknown component. He labels the resistance of the unknown
  • 3. component x Ω. The resistance of a circuit containing a number of these components is (5x+20) Ω. If a 120 volt potential difference across the circuit produces a current of 2.5 amps, calculate the resistance of the unknown component. 8.) A factory manager is packing engine components into wooden crates to be shipped on a small truck. The truck is designed to hold sixteen crates, and will safely carry a 1200 lb cargo. Each crate weighs 12 lbs empty. How much weight should the manager instruct the workers to put in each crate in order to get the shipment weight as close as possible to 1200 lbs? 9.) The lifespan of a guinea pig is 6 years less than that of a giraffe. The lifespan of a tiger is 4 times that of the guinea pig. If the total lifespan of the animals is 30 years, calculate the longevity for the giraffe. Name:____________________________________________ Date:__________________________________________ Real world Situations Directions:Write and solve each equation from the given word problem on a blank sheet of paper. Write your answers in a complete sentence. Show Your Work!!!!! Level Three: ALL Real-World Applications 10.) Danielle baked macaroni for her children for which she used up 1/9 th of a jug of milk. She also poured 20.5 ounces of milk into a bowl of cornflakes. If 25.5 ounces of milk remain in
  • 4. the jug, how much milk did the jug originally contain? 11.) Katrina’s uncle loaned her $1200 to buy a computer. Katrina plans to pay her uncle $75 per month until the loan is paid off. How many months will it take Katrina to pay back the money? 12.) A medical center is planning to hire a total of 54 nurses and CNAs (Certified Nursing Assistants). If the center needs twice as many CNAs as nurses, how many of each should they hire? 13.) A company is ordering 350 t-shirts to sell at a fundraiser. The company wants to order the same number of large size t- shirts as medium size t-shirts, but only half as many small t- shirts. How many of each size should they order? 14.) The perimeter of the triangle shown to the right is 26 inches. Determine the length of each side of the triangle. image1.jpeg image2.png Thumbnails/thumbnail.png Cristian DeWeese Dr. Rutherford
  • 5. Hardening Operating Systems 11/12/2022 “Attack on Microsoft systems using the Internet ” 1. Following are the some of the Microsoft system attacks; MItM Attack: Because of the vulnerability, an off-site attacker is able to get access to the compromised system. Within the Windows LSA service is where the vulnerability may be found. (Kumar & Surisetty, 2011) An adversary operating from a distant location has the ability to trick a domain controller into providing NTLM authentication to them by calling a method on the LSARPC interface. As a consequence of this, an adversary may gain credentials and compromise the vulnerable system via the use of the NTLM Relay Attack. DDos: During a DDoS attack, users are unable to connect to the targeted service. During a distributed denial of service attack, all of an app's available resources are used up. Attackers flood a site with fake users to slow it down or bring it down entirely. (Gomez & Valdez, 2006) The frequency and severity of these episodes are both rising. According to statistics compiled by Azure Networking, DDoS assaults will raise by 25% in the first half of 2021 compared to the last quarter of 2020. In 2021, Azure prevented 359.713 assaults on its worldwide infrastructure, up 43 percent from the previous year. (Wu & Sun, 2010) Regardless of industry or location, businesses of any size are vulnerable to DDoS attacks. Internet gambling sites, online stores, and telecommunication companies are frequent targets of cybercriminals. 2. Following are the main 5 concerns; Initial Breach Targets: Nobody hacks IT. Built Active Directory forests are clean and updated. New OSes and programs emerge throughout time. As Active Directory's administrative advantages are recognized, more information is provided, more PCs or programs are connected, and domains are altered to suit
  • 6. new Windows capabilities. Even when new infrastructure is introduced, other elements may not be maintained as well, systems and applications may be neglected, and organizations may forget they still have legacy infrastructure. Older, bigger, more complex ecosystems are more vulnerable. Disabling Security Features: Many businesses don't utilize Windows Firewall with Advanced Security (WFAS) because they feel it's too complicated to set up. Starting with Windows Server 2008, the Windows Firewall is automatically configured to provide just the minimum permissions required for each role or functionality to function. When WFAS is turned off (and no other host-based firewall is used), Windows becomes more vulnerable. Firewalls at the network's perimeter protect against attacks from the Internet but not from drive-by downloads or compromised intranet systems. Gaps in antivirus & Antimalware Deployments: Most workstations in a company will have antivirus and antimalware software installed, activated, and up-to-date, according to an analysis of antivirus and antimalware deployments. With a few notable exceptions, such as seldom connected workstations and staff devices, antivirus and antimalware software is often easily deployed, configured, and updated across the board. Incomplete patching: Microsoft publishes security updates regularly on the second Tuesday of every month, however in severe circumstances when vulnerability is believed to represent an imminent hazard to client systems, an update may be delivered outside of the monthly security update schedule. Whether a company is small and uses Windows Update to handle system and application patching or large and uses management software like System Center Configuration Manager (SCCM) to deploy patches according to detailed, hierarchical plans, a large number of customers patch their Windows infrastructures in a timely fashion. Misconfiguration: Even in environments where systems are often kept up to date and patched, we regularly discover vulnerabilities or misconfigurations in the operating system,
  • 7. applications, and Active Directory. Depending on the nature of the configuration problem, the attack may just affect the local workstation, but in many cases, an attacker may actively seek to "manage" further systems and eventually get access to Active Directory. 3. There are three essential parts to every network; Routers Switches Firewalls Switches: A switch is required to connect many computers together. While PCs are the most common device that switches link, they are not the only device that switches may connect. After a device is connected to a switch, its Media Access Control (MAC) address is revealed and used for routing. The switch includes the MAC address in outgoing packets so that other network nodes may determine which device generated them. Routers: In order to connect local area networks to the wider web, routers are required. Packets with an IP address are sent further by this L3 device. A router is a device that allows for communication across different networks. With the help of Dynamic Host Configuration Protocol, a router may give out IP addresses to computers and other devices that are linked to it. After then, the information may enter and leave the network as needed. In order to connect to the web, NAT is essential. Firewalls: When a firewall is set up, it may either allow or prevent information from accessing a network. As an example, a firewall may be set up to allow only traffic from a limited range of IP addresses and ports that have been verified as secure. (Archiveddocs , nd) On the other hand, a firewall may monitor the IP address of the source of a packet that is being sent several times per second. Maybe there was a distributed denial of service attack that would be weird (DDoS)
  • 8. References: Kumar, S., & Surisetty, S. (2011). Microsoft vs. Apple: Resilience against distributed denial-of-service attacks. IEEE Security & Privacy, 10(2), 60-64. Kumar, S., Azad, M., Gomez, O., & Valdez, R. (2006, February). Can microsoft's Service Pack2 (SP2) security software prevent SMURF attacks?. In Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06) (pp. 89-89). IEEE. Lobo, D., Watters, P., Wu, X. W., & Sun, L. (2010, July). Windows rootkits: Attacks and countermeasures. In 2010 Second Cybercrime and Trustworthy Computing Workshop (pp. 69-78). IEEE. Archiveddocs. (n.d.). Install and Deploy Windows Server 2012 R2 and Windows Server 2012. Learn.microsoft.com. Retrieved November 8, 2022, from https://learn.microsoft.com/en- us/previous-versions/windows/it-pro/windows-server-2012-r2- and-2012/hh831620(v=ws.11)#windows-server-2012-r2 Points Actual Comments Title Page
  • 9. 10 8 Agenda 10 6-8 pages 30 (6x5) Content 30 (6x5) Conclusion 10 0 5 References 10 (5x2) Total 100 88 Name________________________ SLOPE OF A LINE #2
  • 10. Directions: For the problems below, find the slope of the line between each of the two given points. Write your answer in simplest form. To do this without graphing the points, use the formula: slope = 12 12 xx yy − − Examples: (1,2) and (3,4) = 1 2 2 13 24 == − − (1,0) and (8,10) = 7 10 18 010 = −
  • 11. − 1) (2,6) and (6,15) = ______________________ 2) (1,5) and (4,11) = ______________________ 3) (3,6) and (7,13) = ______________________ 4) (0,5) and (5,17) = ______________________ 5) (0,5) and (8,8) = ______________________ 6) (11,4) and (15,7) = ______________________ 7) (1,9) and (6,11) = ______________________ 8) (7,5) and (13,10) = ______________________ 9) (11,9) and (12,9) = ______________________ 10) (0,0)
  • 12. and (7,8) = ______________________ Copyright © 2022 McGraw Hill - ALEKS® is a registered trademark of ALEKS CorporationSolving Inequalities with Word Problems #1 Page 1 / 5 Solving Inequalities with Word Problems #1 Student Name : _____________________ Class Name : 7th Period Algebra I Gifted Number of Questions: 10 Instructor Name : Ms. Jeffcoat Question 1 of 10 Jina's fish tank has liters of water in it. She plans to add liters per minute until the tank has more than liters. What are the possible numbers of minutes Jina could add water? Use for the number of minutes. Write your answer as an inequality solved for . Question 2 of 10
  • 13. Solve the inequality for . Simplify your answer as much as possible. Question 3 of 10 Solve the inequality for . Simplify your answer as much as possible. Question 4 of 10 Solve the inequality for . Simplify your answer as much as possible. Question 5 of 10 14 5 74 t t x ≤3 +5x 9 +7x 11 x <+−3 x 5 2
  • 14. x ≤−− 5 2 x 1 + 9 2 x 7 4 Copyright © 2022 McGraw Hill - ALEKS® is a registered trademark of ALEKS CorporationSolving Inequalities with Word Problems #1 Page 2 / 5 Write inequalities to represent the situations below. To be eligible for the senior admission rate, a visitor must not be less than 55 years old. Use y to represent the age (in years) of a visitor who gets the senior rate. At the airport, each piece of luggage to be checked in must weigh at most 40 pounds. Use w to represent the weight (in pounds) of a piece of luggage that can be checked in. Question 6 of 10 Ann is pumping water into a tank at a rate of liters per minute. Since she started pumping water,
  • 15. liters has splashed out of the tank. Her goal is given by , where is the number of minutes she pumps water into the tank. Complete the parts below. (a) Solve the given inequality and graph the solution on the number line below. (b) Choose and complete the statement that best describes the solution. To meet the goal, the tank will have at least _____ liters of water in it. This will take at most _____ minutes. To meet the goal, the tank will have at most _____ liters of water in it. This will take at most _____ minutes. To meet the goal, the tank will have at most _____ liters of water in it. This will take at least _____ minutes. Question 7 of 10 Write an inequality for the graph shown below. Use for your variable. 17 12 ≤−17x 12 90 x
  • 16. x 2 4 6 8 10 12 14 16 18 20 22 24 26 28 300 1 2 3 4 5 6 7 8 9 10 110-1-2-3-4-5-6-7-8-9-10-11 x Copyright © 2022 McGraw Hill - ALEKS® is a registered trademark of ALEKS CorporationSolving Inequalities with Word Problems #1 Page 3 / 5 Question 8 of 10 Graph the inequality below on the number line. Question 9 of 10 Translate the sentence into an inequality. Ten subtracted from the product of and a number is at most . Use the variable for the unknown number. Question 10 of 10 Frank is going to rent a truck for one day. There are two companies he can choose from, and they have the following prices. Company A charges and allows unlimited mileage. Company B has an initial fee of and charges an additional for every mile driven. For what mileages will Company A charge less than Company
  • 17. B? Use for the number of miles driven, and solve your inequality for . ≥b 10 3 24 c $82 $55 $0.90 m m 1 2 3 4 5 6 7 8 9 10 110-1-2-3-4-5-6-7-8-9-10-11 12/20/22, 10:17 AM Solving Multiple-Step Inequalities https://quizizz.com/print/quiz/6387a5070e8913001e250b33 1/2 Solving Multiple-Step Inequalities 10 Questions NAME : CLASS : DATE : 1. Solve the inequality. A x > B x > -7
  • 18. C x < -7 D x < 2. Solve the inequality. A b > 6 B b > 20 C b > 20 D b > 14 3. Solve for k. 7k – 2 ≥ -9 A k≤1 B k ≥ -1 C k ≤ -1 D k≥1 4. 14 < -2a + 6 - 2a A a < 2 B a > 2 C a > -2 D a < -2 −5x − 7 < 28 5 21 5 −21 2 b − 8 > ( ) 12
  • 19. 12/20/22, 10:17 AM Solving Multiple-Step Inequalities https://quizizz.com/print/quiz/6387a5070e8913001e250b33 2/2 5. Solve and graph. k - 13 > -51 A A B D C B D C 6. Solve: 4(2a + 3) < 3(a - 1) A a<-3 B a>3 C a<3 D a>-3 7. Pick the correct inequality. A A B C C B D D 8. Graph after solving: A B C D 9. You flip an inequality symbol when you... A subtract B multiple or divide by a negative number
  • 20. C subtract or multiple by a negative number D multiply and divide by any number 10. Graph after solving: A B C D Set of all Reals 4 x − 12 >( ) −24 7 2x + 1 −( ) 3 x − 1 ≤( ) 43