A woman becomes pregnant if the ________________. If the egg is not fertilized, it __________. Then the hormone levels drop, and the _________ is shed during the menstrual period.

A woman becomes pregnant if the ________________. If the egg is not fertilized, it __________. Then the hormone levels drop, and the _________ is shed during the menstrual period.



- egg is fertilized by a man's sperm cell and attached it to the uterine wall.
- it will break apart
- the thickening lining of the uterus

After the egg has left the ovary, it travels ______________. Hormone levels rise and ______________. A woman is most likely to get pregnant during the _________.

After the egg has left the ovary, it travels ______________. Hormone levels rise and ______________. A woman is most likely to get pregnant during the _________.




- down the Fallopian tube into the uterus
- help prepare the uterine lining For pregnancy
- three days before or on the ovulation

Estrogen also makes the lining of uterus _______________. The lining of the womb is a place that nourishes the _____________. At the same times the lining of the womb is growing an _________.

Estrogen also makes the lining of uterus _______________. The lining of the womb is a place that nourishes the _____________. At the same times the lining of the womb is growing an _________.



- grow and thicken
- embryo if a pregnancy occurs
- egg, in one of the ovaries starts to mature

The _________ is the predefined formally documented statement that defines what activities are allowed to take place on an organization's network or on particular hosts to support the organization's requirements.

The _________ is the predefined formally documented statement that defines what activities are allowed to take place on an organization's network or on particular hosts to support the organization's requirements.



Answer: security policy

Developed by IBM and refined by Symantec, the __________ provides a malware detection system that will automatically capture, analyze, add detection and shielding, or remove new malware and pass information about it to client systems so the malware can be detected before it is allowed to run elsewhere.

Developed by IBM and refined by Symantec, the __________ provides a malware detection system that will automatically capture, analyze, add detection and shielding, or remove new malware and pass information about it to client systems so the malware can be detected before it is allowed to run elsewhere.



Answer: digital immune system

A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user's knowledge or consent.

A __________ is when a user views a Web page controlled by the attacker that contains a code that exploits the browser bug and downloads and installs malware on the system without the user's knowledge or consent.



Answer: drive-by-download

_______ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

_______ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.



Answer: idk

In addition to granting and revoking access rights to a table, in a ___________ administration the owner of the table may grant and revoke authorization rights to other users, allowing them to grant and revoke access rights to the table.

In addition to granting and revoking access rights to a table, in a ___________ administration the owner of the table may grant and revoke authorization rights to other users, allowing them to grant and revoke access rights to the table.




Answer: decentralized

There are three key elements to an ABAC model: attributes which are defined for entities in a configuration; a policy model, which defines the ABAC policies; and the __________ model, which applies to policies that enforce access control.

There are three key elements to an ABAC model: attributes which are defined for entities in a configuration; a policy model, which defines the ABAC policies; and the __________ model, which applies to policies that enforce access control.



Answer: idk

A __________ dictates that a user can only be assigned to a particular role if it is already assigned to some other specified role and can be used to structure the implementation of the least privilege concept.

A __________ dictates that a user can only be assigned to a particular role if it is already assigned to some other specified role and can be used to structure the implementation of the least privilege concept.



Answer: prerequisite

An independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, to detect breaches in security, and to recommend any indicated changes in control, policy and procedures is a(n) __________ .

An independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, to detect breaches in security, and to recommend any indicated changes in control, policy and procedures is a(n) __________ .



Answer: audit

________, in the context of passwords, refers to an adversary's attempt to learn the password by observing the user, finding a written copy of the password, or some similar attack that involves the physical proximity of user and adversary.

________, in the context of passwords, refers to an adversary's attempt to learn the password by observing the user, finding a written copy of the password, or some similar attack that involves the physical proximity of user and adversary.



Answer: Eavesdropping

A(n) _________ assessment is periodically assessing the risk to organizational operations, organizational assets, and individuals, resulting from the operation of organizational information systems and the associated processing, storage, or transmission or organizational information.

A(n) _________ assessment is periodically assessing the risk to organizational operations, organizational assets, and individuals, resulting from the operation of organizational information systems and the associated processing, storage, or transmission or organizational information.



Answer: risk

Establishing, maintaining, and implementing plans for emergency response, backup operations, and post disaster recovery for organizational information systems to ensure the availability of critical information resources and continuity of operations in emergency situations is a __________ plan.

Establishing, maintaining, and implementing plans for emergency response, backup operations, and post disaster recovery for organizational information systems to ensure the availability of critical information resources and continuity of operations in emergency situations is a __________ plan.



Answer: contingency

______ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources.

______ is the protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources.



Answer: Computer security

The legislature then ___________ a land - based casino in New Orleans. Controversy developed when the gaming company opened a temporary casino and then said its __________ ________ pay what it owed. They claimed ___________, a legal process that allows a debtor to eliminate some debts.

The legislature then ___________ a land - based casino in New Orleans. Controversy developed when the gaming company opened a temporary casino and then said its __________ ________ pay what it owed. They claimed ___________, a legal process that allows a debtor to eliminate some debts.



Answer: approved, could not, bank robbery

In 2003, Louisiana elected the states first woman governor, Democrat __________ __________. The new governor heard from business people who said the states ________ keep new businesses from coming too Louisiana. One of the first actions of Governor Blanco and the legislature was to begin ___________ these taxes.

In 2003, Louisiana elected the states first woman governor, Democrat __________ __________. The new governor heard from business people who said the states ________ keep new businesses from coming too Louisiana. One of the first actions of Governor Blanco and the legislature was to begin ___________ these taxes.



Answer: Kathleen Blanco, taxes, changing

The idea of David Duke as governor _________ many Louisiana citizens both black and white. Because of this reaction to Duke, Edwin Edwards became governor for the ___________ time in 1992. no one else has __________ elected so many times.

The idea of David Duke as governor _________ many Louisiana citizens both black and white. Because of this reaction to Duke, Edwin Edwards became governor for the ___________ time in 1992. no one else has __________ elected so many times.



Answer: frightened, 4th , ever

In the next primary election ___________ ________ received the highest number of voters; David Duke was _____________ and governor ____________ was third. The runoff election was a race between _____________ and _____________.

In the next primary election ___________ ________ received the highest number of voters; David Duke was _____________ and governor ____________ was third. The runoff election was a race between _____________ and _____________.



Answer: Edwin Edwards, second, Roemer, Edwards, Duke

Edwards problems brought out a long list of ________ in the 1987 election. Because he had lost support, _____________ dropped out of the race entirely. That meant that Roemer became the governor without a run off election.

Edwards problems brought out a long list of ________ in the 1987 election. Because he had lost support, _____________ dropped out of the race entirely. That meant that Roemer became the governor without a run off election.



Answer: opponents, Edwards, Roemer

At the beginning of Green's terms the state was still receiving major ____________ from oil severance _____________ . Because of this, the governor encouraged the state legislature to ____________ the states ___________ tax as a benefit for voters.

At the beginning of Green's terms the state was still receiving major ____________ from oil severance _____________ . Because of this, the governor encouraged the state legislature to ____________ the states ___________ tax as a benefit for voters.



Answer: revenues, taxes, cut, income

To manage risk when driving:

To manage risk when driving:


Answer: It is essential that you remain alert to conditions of objects that can increase levels of risk

Heavy amphetamine use:

Heavy amphetamine use:



Answer: Makes a driver less coordinated and at times more likely to be involved in an accident

If you are driving on a highway having at least four lanes with no fewer than two lanes in the same direction and you approach a stationary emergency vehicle or public safety vehicle on the roadside with lights flashing, you should:

If you are driving on a highway having at least four lanes with no fewer than two lanes in the same direction and you approach a stationary emergency vehicle or public safety vehicle on the roadside with lights flashing, you should:



Answer: Move over to put a lane between you and the stationary vehicle if it is safe to do so or slow down.

How do you know if your trailer is equipped with antilock brakes?

How do you know if your trailer is equipped with antilock brakes?



Answer: Trailers built after 1998 are required to have ABS. One way to check is by looking on the left side of the trailer there should be a yellow ABS malfunction light either at the front or rear of the trailer.

Another way is looking at the brakes them selves if there is any electrical line running to the brakes it most likely is leading to the speed sensor which means those wheels have ABS