Name:____________________________________________
Date:__________________________________________
Real world Situations
Directions:Write and solve each equation from the given word problem on a blank sheet of paper. Write your answers in a complete sentence on this page.
Show Your Work!!!!!
Level One: One/Two Step Real-World Application
1.) Maria combines her 39 seashells with Jacob’s seashells for a total of 173 seashells. Find how many seashells Jacob had before the collections were combined.
2.) The gym teacher divided a class into four teams with 7 students per team. How many students are in the class?
3.) An emergency plumber charges $65 as a call-out fee plus an additional $75 per hour. He arrives at a house at 9:30 and works to repair a water tank. If the total repair bill is $196.25, at what time was the repair completed?
4.) To convert temperatures in Fahrenheit to temperatures in Celsius, take the temperature in degrees Fahrenheit, subtract 32, and then divide the result by 1.8. This gives the temperature in degrees Celsius. Write an equation that shows the conversion process.
4a.) Convert 50 degrees Fahrenheit to degrees Celsius.
4b.) Convert 25 degrees Celsius to degrees Fahrenheit.
5.) Jasmin’s dad, Andrew, is planning a surprise birthday party for her. He will hire a bouncy castle, and will provide party food for all the guests. The bouncy castle costs $150 for the afternoon, and the food will cost $3 per person. Andrew has a budget of $300. Write an equation and use it to determine the maximum number of guests he can invite.
Name:____________________________________________
Date:__________________________________________
Real world Situations
Directions:Write and solve each equation from the given word problem on a blank sheet of paper. Write your answers in a complete sentence.
Show Your Work!!!!!
Level Two: Multiple-Step Real-World Application
6.) The speed of a body is the distance it travels per unit of time. That means that we can also find out how far an object moves in a certain amount of time if we know its speed: we use the equation “distance = time x speed” Shanice’s car is traveling 10 miles per hour slower than twice the speed of Brandon’s car. She covers 93 miles in 1 hour 30 minutes. How fast is Brandon driving?
7.) The electrical current, I (amps), passing through an electronic component varies directly with the applied voltage, V (volts), according to the relationship V=I⋅R where R is the resistance measured in Ohms (Ω).
a. A scientist is trying to deduce the resistance of an unknown component. He labels the resistance of the unknown component x Ω. The resistance of a circuit containing a number of these components is (5x+20) Ω. If a 120 volt potential difference across the circuit produces a current of 2.5 amps, calculate the resistance of the unknown component.
8.) A factory manager is packing engine components into wooden crates.
1. Name:____________________________________________
Date:__________________________________________
Real world Situations
Directions:Write and solve each equation from the given word
problem on a blank sheet of paper. Write your answers in a
complete sentence on this page.
Show Your Work!!!!!
Level One: One/Two Step Real-World Application
1.) Maria combines her 39 seashells with Jacob’s seashells for
a total of 173 seashells. Find how many seashells Jacob had
before the collections were combined.
2.) The gym teacher divided a class into four teams with 7
students per team. How many students are in the class?
3.) An emergency plumber charges $65 as a call-out fee plus an
additional $75 per hour. He arrives at a house at 9:30 and works
to repair a water tank. If the total repair bill is $196.25, at what
time was the repair completed?
4.) To convert temperatures in Fahrenheit to temperatures in
Celsius, take the temperature in degrees Fahrenheit, subtract 32,
and then divide the result by 1.8. This gives the temperature in
degrees Celsius. Write an equation that shows the conversion
process.
2. 4a.) Convert 50 degrees Fahrenheit to degrees Celsius.
4b.) Convert 25 degrees Celsius to degrees Fahrenheit.
5.) Jasmin’s dad, Andrew, is planning a surprise birthday party
for her. He will hire a bouncy castle, and will provide party
food for all the guests. The bouncy castle costs $150 for the
afternoon, and the food will cost $3 per person. Andrew has a
budget of $300. Write an equation and use it to determine the
maximum number of guests he can invite.
Name:____________________________________________
Date:__________________________________________
Real world Situations
Directions:Write and solve each equation from the given word
problem on a blank sheet of paper. Write your answers in a
complete sentence.
Show Your Work!!!!!
Level Two: Multiple-Step Real-World Application
6.) The speed of a body is the distance it travels per unit of
time. That means that we can also find out how far an object
moves in a certain amount of time if we know its speed: we use
the equation “distance = time x speed” Shanice’s car is
traveling 10 miles per hour slower than twice the speed of
Brandon’s car. She covers 93 miles in 1 hour 30 minutes. How
fast is Brandon driving?
7.) The electrical current, I (amps), passing through an
electronic component varies directly with the applied
voltage, V (volts), according to the
relationship V=I⋅ R where R is the resistance measured in
Ohms (Ω).
a. A scientist is trying to deduce the resistance of an unknown
component. He labels the resistance of the unknown
3. component x Ω. The resistance of a circuit containing a number
of these components is (5x+20) Ω. If a 120 volt
potential difference across the circuit produces a current of 2.5
amps, calculate the resistance of the unknown component.
8.) A factory manager is packing engine components into
wooden crates to be shipped on a small truck. The truck is
designed to hold sixteen crates, and will safely carry a 1200 lb
cargo. Each crate weighs 12 lbs empty. How much weight
should the manager instruct the workers to put in each crate
in order to get the shipment weight as close as possible to 1200
lbs?
9.) The lifespan of a guinea pig is 6 years less than that of a
giraffe. The lifespan of a tiger is 4 times that of the guinea pig.
If the total lifespan of the animals is 30 years, calculate the
longevity for the giraffe.
Name:____________________________________________
Date:__________________________________________
Real world Situations
Directions:Write and solve each equation from the given word
problem on a blank sheet of paper. Write your answers in a
complete sentence.
Show Your Work!!!!!
Level Three: ALL Real-World Applications
10.) Danielle baked macaroni for her children for which she
used up 1/9 th of a jug of milk. She also poured 20.5 ounces of
milk into a bowl of cornflakes. If 25.5 ounces of milk remain in
4. the jug, how much milk did the jug originally contain?
11.) Katrina’s uncle loaned her $1200 to buy a computer.
Katrina plans to pay her uncle $75 per month until the loan is
paid off. How many months will it take Katrina to pay back the
money?
12.) A medical center is planning to hire a total of 54 nurses
and CNAs (Certified Nursing Assistants). If the center needs
twice as many CNAs as nurses, how many of each should they
hire?
13.) A company is ordering 350 t-shirts to sell at a fundraiser.
The company wants to order the same number of large size t-
shirts as medium size t-shirts, but only half as many small t-
shirts. How many of each size should they order?
14.)
The perimeter of the triangle shown to the right is 26
inches. Determine the length of each side of the triangle.
image1.jpeg
image2.png
Thumbnails/thumbnail.png
Cristian DeWeese
Dr. Rutherford
5. Hardening Operating Systems
11/12/2022
“Attack on Microsoft systems using the Internet ”
1. Following are the some of the Microsoft system attacks;
MItM Attack:
Because of the vulnerability, an off-site attacker is able to get
access to the compromised system. Within the Windows LSA
service is where the vulnerability may be found. (Kumar &
Surisetty, 2011) An adversary operating from a distant location
has the ability to trick a domain controller into providing
NTLM authentication to them by calling a method on the
LSARPC interface. As a consequence of this, an adversary may
gain credentials and compromise the vulnerable system via the
use of the NTLM Relay Attack.
DDos:
During a DDoS attack, users are unable to connect to the
targeted service. During a distributed denial of service attack,
all of an app's available resources are used up. Attackers flood a
site with fake users to slow it down or bring it down entirely.
(Gomez & Valdez, 2006) The frequency and severity of these
episodes are both rising. According to statistics compiled by
Azure Networking, DDoS assaults will raise by 25% in the first
half of 2021 compared to the last quarter of 2020. In 2021,
Azure prevented 359.713 assaults on its worldwide
infrastructure, up 43 percent from the previous year. (Wu &
Sun, 2010) Regardless of industry or location, businesses of any
size are vulnerable to DDoS attacks. Internet gambling sites,
online stores, and telecommunication companies are frequent
targets of cybercriminals.
2. Following are the main 5 concerns;
Initial Breach Targets: Nobody hacks IT. Built Active Directory
forests are clean and updated. New OSes and programs emerge
throughout time. As Active Directory's administrative
advantages are recognized, more information is provided, more
PCs or programs are connected, and domains are altered to suit
6. new Windows capabilities. Even when new infrastructure is
introduced, other elements may not be maintained as well,
systems and applications may be neglected, and organizations
may forget they still have legacy infrastructure. Older, bigger,
more complex ecosystems are more vulnerable.
Disabling Security Features: Many businesses don't utilize
Windows Firewall with Advanced Security (WFAS) because
they feel it's too complicated to set up. Starting with Windows
Server 2008, the Windows Firewall is automatically configured
to provide just the minimum permissions required for each role
or functionality to function. When WFAS is turned off (and no
other host-based firewall is used), Windows becomes more
vulnerable. Firewalls at the network's perimeter protect against
attacks from the Internet but not from drive-by downloads or
compromised intranet systems.
Gaps in antivirus & Antimalware Deployments: Most
workstations in a company will have antivirus and antimalware
software installed, activated, and up-to-date, according to an
analysis of antivirus and antimalware deployments. With a few
notable exceptions, such as seldom connected workstations and
staff devices, antivirus and antimalware software is often easily
deployed, configured, and updated across the board.
Incomplete patching: Microsoft publishes security updates
regularly on the second Tuesday of every month, however in
severe circumstances when vulnerability is believed to represent
an imminent hazard to client systems, an update may be
delivered outside of the monthly security update schedule.
Whether a company is small and uses Windows Update to
handle system and application patching or large and uses
management software like System Center Configuration
Manager (SCCM) to deploy patches according to detailed,
hierarchical plans, a large number of customers patch their
Windows infrastructures in a timely fashion.
Misconfiguration: Even in environments where systems are
often kept up to date and patched, we regularly discover
vulnerabilities or misconfigurations in the operating system,
7. applications, and Active Directory. Depending on the nature of
the configuration problem, the attack may just affect the local
workstation, but in many cases, an attacker may actively seek to
"manage" further systems and eventually get access to Active
Directory.
3. There are three essential parts to every network;
Routers
Switches
Firewalls
Switches:
A switch is required to connect many computers together. While
PCs are the most common device that switches link, they are not
the only device that switches may connect. After a device is
connected to a switch, its Media Access Control (MAC) address
is revealed and used for routing. The switch includes the MAC
address in outgoing packets so that other network nodes may
determine which device generated them.
Routers:
In order to connect local area networks to the wider web,
routers are required. Packets with an IP address are sent further
by this L3 device. A router is a device that allows for
communication across different networks. With the help of
Dynamic Host Configuration Protocol, a router may give out IP
addresses to computers and other devices that are linked to it.
After then, the information may enter and leave the network as
needed. In order to connect to the web, NAT is essential.
Firewalls:
When a firewall is set up, it may either allow or prevent
information from accessing a network. As an example, a
firewall may be set up to allow only traffic from a limited range
of IP addresses and ports that have been verified as secure.
(Archiveddocs , nd) On the other hand, a firewall may monitor
the IP address of the source of a packet that is being sent
several times per second. Maybe there was a distributed denial
of service attack that would be weird (DDoS)
8. References:
Kumar, S., & Surisetty, S. (2011). Microsoft vs. Apple:
Resilience against distributed denial-of-service attacks.
IEEE Security & Privacy,
10(2), 60-64.
Kumar, S., Azad, M., Gomez, O., & Valdez, R. (2006,
February). Can microsoft's Service Pack2 (SP2) security
software prevent SMURF attacks?. In
Advanced Int'l Conference on Telecommunications
and Int'l Conference on Internet and Web Applications and
Services (AICT-ICIW'06) (pp. 89-89). IEEE.
Lobo, D., Watters, P., Wu, X. W., & Sun, L. (2010, July).
Windows rootkits: Attacks and countermeasures. In
2010 Second Cybercrime and Trustworthy
Computing Workshop (pp. 69-78). IEEE.
Archiveddocs. (n.d.).
Install and Deploy Windows Server 2012 R2 and
Windows Server 2012. Learn.microsoft.com. Retrieved
November 8, 2022, from https://learn.microsoft.com/en-
us/previous-versions/windows/it-pro/windows-server-2012-r2-
and-2012/hh831620(v=ws.11)#windows-server-2012-r2
Points
Actual
Comments
Title Page
10. Directions: For the problems below, find the slope of the line
between each of the two given points. Write your
answer in simplest form. To do this without graphing the
points, use the formula: slope =
12
12
xx
yy
−
−
Examples: (1,2) and (3,4) = 1
2
2
13
24
==
−
− (1,0) and (8,10) =
7
10
18
010
=
−
11. −
1) (2,6) and (6,15) = ______________________ 2) (1,5) and
(4,11) = ______________________
3) (3,6) and (7,13) = ______________________ 4) (0,5) and
(5,17) = ______________________
5) (0,5) and (8,8) = ______________________ 6) (11,4) and
(15,7) = ______________________
7) (1,9) and (6,11) = ______________________ 8) (7,5) and
(13,10) = ______________________
9) (11,9) and (12,9) = ______________________ 10) (0,0)
13. Solve the inequality for .
Simplify your answer as much as possible.
Question 3 of 10
Solve the inequality for .
Simplify your answer as much as possible.
Question 4 of 10
Solve the inequality for .
Simplify your answer as much as possible.
Question 5 of 10
14 5
74
t
t
x
≤3 +5x 9 +7x 11
x
<+−3
x
5
2
15. liters has splashed out of the tank. Her goal is given by , where
is the number of
minutes she pumps water into the tank.
Complete the parts below.
(a) Solve the given inequality and graph the solution on the
number line below.
(b) Choose and complete the statement that best describes the
solution.
To meet the goal, the tank will have at least _____ liters of
water in it.
This will take at most _____ minutes.
To meet the goal, the tank will have at most _____ liters of
water in it.
This will take at most _____ minutes.
To meet the goal, the tank will have at most _____ liters of
water in it.
This will take at least _____ minutes.
Question 7 of 10
Write an inequality for the graph shown below.
Use for your variable.
17 12
≤−17x 12 90 x
17. B?
Use for the number of miles driven, and solve your inequality
for .
≥b 10
3 24
c
$82
$55 $0.90
m m
1 2 3 4 5 6 7 8 9 10 110-1-2-3-4-5-6-7-8-9-10-11
12/20/22, 10:17 AM Solving Multiple-Step Inequalities
https://quizizz.com/print/quiz/6387a5070e8913001e250b33 1/2
Solving Multiple-Step Inequalities
10 Questions
NAME :
CLASS :
DATE :
1. Solve the inequality.
A x > B x > -7
18. C x < -7 D x <
2. Solve the inequality.
A b > 6 B b > 20
C b > 20 D b > 14
3. Solve for k.
7k – 2 ≥ -9
A k≤1 B k ≥ -1
C k ≤ -1 D k≥1
4. 14 < -2a + 6 - 2a
A a < 2 B a > 2
C a > -2 D a < -2
−5x − 7 < 28
5
21
5
−21
2 b − 8 > ( ) 12
19. 12/20/22, 10:17 AM Solving Multiple-Step Inequalities
https://quizizz.com/print/quiz/6387a5070e8913001e250b33 2/2
5. Solve and graph.
k - 13 > -51
A A B D
C B D C
6. Solve:
4(2a + 3) < 3(a - 1)
A a<-3 B a>3
C a<3 D a>-3
7. Pick the correct inequality.
A A B C
C B D D
8. Graph after solving:
A B
C D
9. You flip an inequality symbol when you...
A subtract B multiple or divide by a negative number
20. C subtract or multiple by a negative number D multiply and
divide by any number
10. Graph after solving:
A B
C D Set of all Reals
4 x − 12 >( ) −24
7 2x + 1 −( ) 3 x − 1 ≤( ) 43