In information security, following someone through a secure door without using your own ID card for access is often referred to as _____. Group of answer choices door hacking social engineering piggybacking shoulder surfing pretexting

Answers

Answer 1

In information security, following someone through a secure door without using your own ID card for access is often referred to as piggybacking. Piggybacking is when an unauthorized individual follows an authorized individual into a restricted area after the authorized person opens the door, thereby gaining access to the restricted area.

The unauthorized individual does not have to use their own access card, they can piggyback or tailgate off the authorized person. The primary objective of access control systems is to prevent unauthorized individuals from entering a protected area. These systems work by requiring individuals to provide some form of identification such as a card or a code. Tailgating or piggybacking undermines the security provided by these systems by allowing unauthorized people to access the protected area.

Furthermore, this type of activity is a significant threat to organizations' information security as it can be utilized in the commission of various crimes, including espionage, theft, sabotage, and others. Organizations can protect against piggybacking by educating their employees about the danger and implementing security measures, including electronic access systems, surveillance cameras, and guards.

To know more about information security visit:-

https://brainly.com/question/31561235

#SPJ11


Related Questions

in conducting a computer abuse investigation you become aware that the suspect of the investigation is using abc company as his internet service provider (isp). you contact isp and request that they provide you assistance with your investigation. what assistance can the isp provide?

Answers

ISPs can provide assistance in a computer abuse investigation by disclosing user information, providing connection logs, email records, internet usage data, network logs, and complying with legal processes.

What assistance can the ISP provide?

When we contact an internet service provider for help in a case of computer abuse investigation, they can help us through;

1. User Information: Using ISP, it can help to expose the information of the subscriber that is connected to the suspect's account. This can help track the suspect.

2. Connection Logs: This can help to keep records of internet connections which includes the IP addresses, timestamps and the duration of the sessions.

3. Email and Communication Records: It can also help to provide the content of the suspect email record and the timestamps between each message.

4. Internet Usage Data: It also help to track down the internet usage of the suspect such as browsing details, bandwidth usage etc.

5. Network Logs and Monitoring: In some cases, ISPs may have network monitoring systems in place that can capture traffic data, including packet captures, to help investigate network-related abuses or attacks. They can provide relevant logs or assist in analyzing network traffic.

6. Compliance with Legal Processes: ISPs must comply with lawful requests for assistance in investigations.

Learn more on ISP here;

https://brainly.com/question/19561587

#SPJ4

Most hard drives are divided into sectors of 512 bytes each. Our disk has a size of 16 GB. Fill in the blank to calculate how many sectors the disk has. Note: Your result should be in the format of just a number, not a sentence.
disk_size = 16*1024*1024*1024
sector_size = 512
sector_amount =
print(sector_amount)

Answers

The answer is pretty simple to achieve for this question. Multiply the disk size and then divide by the sector size - this will result in the total number of sectors. The reason the disk size shows “16*1024*1024*1024” is because there are 1024 bytes (B) in one kilobyte (1KB), and 1024KB in one megabyte (1MB), and 1024MB in one gigabyte (1GB). So, once you find out how many total bytes you have and then divide the total number of bytes by sector size (512), you will arrive at the answer.

Why did KDKA start with a K and not a W?

Answers

The reason why KDKA start with a K and not a W is because it is used as K based on the region that it is been used.

Why do radio stations in Pittsburgh begin with K?

While the letters "K" and "W" were distributed for commercial usage, the letters "N" and "A" were awarded to military stations. Radio stations required to begin their call letters with "W" for stations east of the Mississippi and "K" for stations west of the Mississippi.

Actually, the majority of western radio stations in America will begin with a K, while the others will begin with a W. (most stations in the east). When a station receives a license, they are allotted.

Learn more about commercial from

https://brainly.com/question/14227079
#SPJ1

What is the missing function name so that the output is: Cairo New York Paris Sydney?
cities = ['Sydney', 'Paris', 'New York', 'Cairo']
for c in _____(cities):
print(c, end=' ')

Answers

The missing function name in the code snippet should be "sorted".

What function can be used to arrange the cities in alphabetical order?

In the given code, the function "sorted" is used to iterate over the list of cities in alphabetical order. The "sorted" function takes an iterable (in this case, the list of cities) and returns a new list with the elements sorted in ascending order. By using "sorted(cities)" in the for loop, the program will print each city in the sorted order, resulting in the desired output: "Cairo New York Paris Sydney".

The "sorted" function in Python is a built-in function that can be used to sort elements in a list, tuple, or any other iterable. It returns a new sorted list while leaving the original list unchanged. Sorting can be done in ascending or descending order, and the function also allows for custom sorting based on specific criteria. By using the "sorted" function, programmers can easily organize and manipulate data in a desired order

Learn more about code

brainly.com/question/17204194

#SPJ11

websites that are designed to adapt gracefully to any screen size use a technique called

Answers

Websites that are designed to adapt gracefully to any screen size use a technique called responsive web design. Responsive web design is an approach that allows websites to automatically adjust and adapt their layout, content, and elements based on the user's device screen size and orientation.

Responsive web design utilizes a combination of flexible grids, fluid images, and media queries to create a dynamic and responsive layout. The flexible grid system allows the content to automatically resize and reflow to fit different screen sizes, while fluid images ensure that images scale proportionally without breaking the layout. Media queries enable the website to apply different styles and rules based on specific screen dimensions or device capabilities. By implementing responsive web design, websites can provide optimal user experiences across various devices, including desktop computers, laptops, tablets, and smartphones.

Learn more about responsive web design here:

https://brainly.com/question/32340232

#SPJ11

Select the correct answer from the drop-down menu.
How would you access documents stored on a "cloud?"
To access documents stored on a "cloud", you'll

A.use a laptop without an Internet connection
B.use a desktop with an Internet connection
C. send a text message from your cell phone
D. make a voice call from your smartphone

Select the correct answer from the drop-down menu.How would you access documents stored on a "cloud?"To

Answers

the answer is B. use a desktop with internet connection

Explanation:

I think

c is an object-oriented programming language, which means the basic unit of programming are . a. functions b. variables c. if-statements d. classes

Answers

Since it is an object-oriented computer program, functions serve as the fundamental building block of programs. The cornerstone of object-oriented programming is this. That is a function that uses data as well as data itself.

Who are you to speak about programming?

Computer programming is the process of creating instructions and coding to enable certain tasks in a laptop, application, or software program.

How challenging is programming?

It is well known that one of the hardest subjects to master is programming. It is not difficult to understand why some people find it challenging to learn how to code given how different it is from conventional educational methods, even bachelor degrees in computer science.

To know more about Programming visit :

https://brainly.com/question/11023419

#SPJ4

A company has a popular gaming platform running on AWS. The application is sensitive to latency because latency can impact the user experience and introduce unfair advantages to some players. The application is deployed in every AWS Region it runs on Amazon EC2 instances that are part of Auto Scaling groups configured behind Application Load Balancers (ALBs) A solutions architect needs to implement a mechanism to monitor the health of the application and redirect traffic to healthy endpoints.
Which solution meets these requirements?
A . Configure an accelerator in AWS Global Accelerator Add a listener for the port that the application listens on. and attach it to a Regional endpoint in each Region Add the ALB as the endpoint
B . Create an Amazon CloudFront distribution and specify the ALB as the origin server. Configure the cache behavior to use origin cache headers Use AWS Lambda functions to optimize the traffic
C . Create an Amazon CloudFront distribution and specify Amazon S3 as the origin server. Configure the cache behavior to use origin cache headers. Use AWS Lambda functions to optimize the traffic
D . Configure an Amazon DynamoDB database to serve as the data store for the application Create a DynamoDB Accelerator (DAX) cluster to act as the in-memory cache for DynamoDB hosting the application data.

Answers

Yetwywywywywywyyw would

internet connectivity issues can cause the received message to differ from what was sent. under the process model of communication, this is known as

Answers

In the context of the process model of communication, internet connectivity issues causing the received message to differ from what was sent is known as noise.

Noise refers to any factor that interferes with the accurate transmission or reception of a message. In this case, the noise comes in the form of technical issues related to internet connectivity, such as weak Wi-Fi signals or network congestion.

The process model of communication consists of several components, including the sender, message, channel, receiver, and feedback. The sender encodes a message, which is transmitted through a channel (e.g., internet) to the receiver, who then decodes the message. Feedback may be sent back to the sender to indicate if the message was understood. During this process, noise can disrupt the accurate transfer of information, leading to miscommunication or misinterpretation of the message.

Internet connectivity issues, as a form of noise, can alter the message content, delay its transmission, or even cause it to be lost entirely. This may result in the receiver getting an incomplete or distorted message, affecting their understanding and response. To mitigate these issues, it is essential to ensure a reliable internet connection and use error-correcting techniques to minimize the impact of noise on communication.

Learn more about communication here: https://brainly.com/question/28153246

#SPJ11

What tool can you use to identify a secure location.

Answers

The tools used to identify secure location are Sucuri SiteCheck, Mozilla Observatory, Detectify, SSLTrust and WPScan.

What is website security check tools?

The Website Security Check tool is used to scan and check safety of the websites and to look after the websites related problems faced by the users.

It also helps the users in whether the website is safe to visit or not and to share the information with.  

Sucuri SiteCheck, Mozilla Observatory, Detectify, SSLTrust, and WPScan are some of the tools used to determine secure locations.

Learn more about  website security here:

https://brainly.com/question/12588992

#SPJ1

How do I slow down my sprite in scratch?

Answers

Answer:

you a smaller star when drinking you staw it will last longer

Explanation:

upload your excel file here. Please use all the cell reference and time value functions to do all the calculations inside the excel. Please lay out your input information separately and label it clearly. You are reviewing a new project and have estimated the following cash flows: Year 0: CF=−165,000 Year 1: CF=63,120;NI=13,620 Year 2: CF=70,800;NI=3,300 Year 3: CF=91,080;NI=29,100 Average Book Value =72,000 Your required return for assets of this risk level is 12%. The company will accept a project that is paid off within 3 years. Should we adopt this new project? Make your decision based on different decision rules (NPV, IRR, payback period, average account return and profitability index).

Answers

When making investment decisions, multiple capital budgeting techniques are utilized by various companies to determine which investments to adopt.

Such techniques help in assessing the projects’ value based on the net present value (NPV), the internal rate of return (IRR), profitability index (PI), payback period, and the average accounting rate of return (AAR). Below is a breakdown of the application of the different decision rules to assess whether to accept or reject the new project based on the cash flows provided above.

Net Present Value (NPV)This is the present value of future cash flows minus the initial investment cost. It helps in measuring the amount by which the investment increases or decreases the shareholders’ wealth. If the NPV is positive, then it is profitable to invest in the project.

On the other hand, if the NPV is negative, then the project should be rejected as it will lead to a decrease in shareholders’ wealth.

NPV= CF0+ (CF1/1+r) + (CF2/ (1+r)2)+ (CF3/(1+r)3)NPV= -$165,000 + ($63,120/1.12) + ($70,800/1.125) + ($91,080/1.12)NPV = $3,231IRR.

This is the rate that equates the present value of the project’s cash inflows to the initial cost of investment. If the IRR is greater than the required rate of return, then the project should be accepted. However, if the IRR is less than the required rate of return, the project should be rejected. IRR = 15.4% > 12% Payback Period.

This technique measures the number of years required to recover the initial investment cost. If the payback period is less than the required payback period, then the project should be adopted. However, if the payback period is greater than the required payback period, then the project should be rejected.

PPB = 2 years, 2 months, 21 days < 3 yearsAverage Accounting Return (AAR)This method computes the average annual accounting profit earned over the investment period. If the AAR is greater than the target rate of return, then the project should be accepted.

However, if the AAR is less than the target rate of return, then the project should be rejected.

AAR = (13,620+3,300+29,100) / 3Average Book Value = 72,000AAR = 16.8% > 12% Profitability Index (PI).

This technique measures the ratio of the present value of future cash flows to the initial investment. If the PI is greater than 1, the project should be accepted.

However, if the PI is less than 1, the project should be rejected.

PI = (PV of future cash flows) / (Initial investment)PI = ($3,231+ $70,800+ $91,080) / $165,000PI = 1.59.

Conclusion: From the above analysis, the project should be accepted since all the decision rules used to approve the investment returned positive results. Therefore, the company should adopt the project to increase the shareholders’ wealth.

To know more about investment visit:

https://brainly.com/question/14921083

#SPJ11

If Paula requests an extension to file her individual tax return in a timely manner, the latest she could file her return without a failure-to-file penalty is:

Answers

September 15th is the latest that Paula would be able to file her return without a failure-to-file penalty.

What is the individual tax return?

This is the terminology that is used to address the official form that a person would have to fill which they would need to submit to the national , state or to the local taxing agencies in the area. The statement is known to contain the taxable income that they have received over a period of time.

The income that is usually specified would be the one that was made in a previous year by the individual. Hence if If Paula requests an extension to file her individual tax return in a timely manner, the latest she could file her return without a failure-to-file penalty is September 15th.

Read more on tax return here: https://brainly.com/question/27536662

#SPJ1

the command tools in microsoft excel are found on the _____.

A.tool tips
B.dialog box launcher
C.ribbon
D.status bar

Answers

Answer:

the command tools in microsoft excel are found on the tool tips

What is the process of tracking multiple versions of a file?

is the process of tracking multiple versions of a file.

Answers

The process of tracking multiple versions of a file is called version control. It helps manage changes to documents, source code, or any digital content, allowing users to track revisions, compare differences, and revert to previous versions when necessary.

The process of tracking multiple versions of a file is commonly referred to as version control. Version control systems (VCS) like Git, SVN, or CVS allow users to create different versions of a file and keep track of changes made to it over time. When a user makes changes to a file, they create a new version of the file, which is stored in the VCS along with a message describing the changes. Users can then compare different versions of the file to see what changes were made, when they were made, and who made them. This helps ensure that all team members are working with the most up-to-date version of the file and that changes can be rolled back if needed. Version control also makes it easier to collaborate on files with multiple people working on them simultaneously.

Learn more about  Version control systems (VCS) here;

https://brainly.com/question/29468480

#SPJ11

You need a 65% alcohol solution. On hand, you have a 450
mL of a 40% alcohol mixture. You also have 95% alcohol
mixture. How much of the 95% mixture will you need to
add to obtain the desired solution?​

Answers

Answer:

375 ml of 95%  is what we need to obtain the desired solution

Explanation:

Solution

Now

450 ml of 40% alcohol mixture +95% mix of x = 65% (450 +x)

Thus

0.40 * 450 +0.95 x = 0.65 (450 + x)

180 + 0.95 x =0.65 (450 +x)

180 +0.95 x = 292.5 + 0.65 x

So,

0.95 x - 0.65 x = 292.5 - 180

= 0.3 x = 112.5

x =112.5/0.3

x= 375 ml

Therefore, we will need 375 ml of 95% solution

NEED THIS ASAP!!) What makes open source software different from closed source software? A It is made specifically for the Linux operating system. B It allows users to view the underlying code. C It is always developed by teams of professional programmers. D It is programmed directly in 1s and 0s instead of using a programming language.

Answers

Answer: B

Explanation: Open Source software is "open" by nature, meaning collaborative. Developers share code, knowledge, and related insight in order to for others to use it and innovate together over time. It is differentiated from commercial software, which is not "open" or generally free to use.

what do you do when ur grounded from all electronics and can't go outside and have t clean all day

Answers

Answer:

read, write, draw!

Explanation:

It would be fun!

What are the four conditions to help determine whether a website is a good source for information?

Answers

Answer:

1. Credible Websites are Registered with Legitimate Institutions 2. Watch out for Dummy Content for Website Credibility Check 3. Watch out for Scam Advertisements to Verify Website Credibility 4. Professional Designs Mean Everything

Explanation:

Answer: BDEG

Explanation:

Machine learning systems analyze patterns in data to improve their performance automatically.
True
False

Answers

Note It is TRUE to state that Machine learning systems analyze patterns in data to improve their performance automatically.

What is a Machine learning System?

Machine learning is a branch of artificial intelligence that is widely described as a machine's capacity to mimic intelligent human behavior. Artificial intelligence systems are used to do complicated tasks in a manner comparable to how people solve issues.

There are three forms of machine learning: supervised, unsupervised, and reinforcement learning.

Machine learning is used in search engines, email filters to filter out spam, websites to create personalized recommendations, banking software to detect anomalous transactions, and many apps on mobile phones, such as voice recognition.

Learn more about Machine Learning Systems:
https://brainly.com/question/28470561
#SPJ1

Seeing her Daughter graduate from college is most likely a short term goal for a person of which of these ages ? A) 24 years old , b) 4 year old , c) 54 years old , d) 14 years old

Answers

c because you can’t graduate at 4 or 14 and if your kid is graduating when you’re 24 then that means you have birth at 7 years old which isn’t possible.

Answer:

54

Explanation:

at 4 years old you're a child. At 14 you're worried about a partner or grades. 24 is around the age you have a baby.

this site isn't letting me add my ans and wut should I do?

Answers

You can probably refresh or log out or something.

you want to give all managers the ability to view and edit a certain file. to do so, you need to edit the discretionary access control list (dacl) associated with the file. you want to be able to easily add and remove managers as their job positions change. what is the best way to accomplish this?

Answers

Since you want to give all managers the ability to view and edit a certain file. to do so, the best way to accomplish this is option A: Create a security group for the managers. Add all users as members of the group. Add the group to the file's DACL.

What does a security group in the cloud mean?

By regulating the traffic that is permitted to enter your EC2 servers, AWS Security Groups assist you in securing your cloud environment. You may make sure that all communication flowing at the instance level only uses your pre-established ports and protocols by using Security Groups.

The traffic that is permitted to enter and exit the resources with which it is associated is controlled by a security group. For instance, once a security group is linked to an EC2 instance, it has control over the instance's inbound and outbound traffic. A default security group is provided with a VPC when it is created.

In AD, the way one can make a security group is by:

For Active Directory to add a new membership groupActive Directory Users and Computers should be opened.Choose the container in which you wish to store your group from the navigation pane.Click Action, New, and Group before clicking Action.Enter the name of your new group in the text box labeled "Group name."

Learn more about security group from

https://brainly.com/question/14932412
#SPJ1

See full question below

.

You want to give all managers the ability to view and edit a certain file. To do so, you need to edit the discretionary access control list (DACL) associated with the file. You want to be able to easily add and remove managers as their job positions change.

What is the BEST way to accomplish this?

answer choices

Create a security group for the managers. Add all users as members of the group. Add the group to the file's DACL.

Add each user account to the file's DACL.

Add one manager to the DACL that grants all permissions. Have this user add other managers as required.

Create a distribution group for the managers. Add all users as members of the group. Add the group to the file's DACL.

The cathode ray tube eventually was eventually used for what entertainment device?

Answers

\(\huge\underline{\underline{\boxed{\bm {Answer:}}}}\)

\( \large\bm{Television}\)

\(\huge\underline{\underline{\boxed{\bm {Explanation:}}}}\)

The cathode ray tube can be said to be a vacuum tube which contains one or more electric guns. This tube produces images when an electron beam strikes a phosphorescent surface. This tube produces pictures as a form of video signals. The entertainment device, which the cathode ray tube was eventually used for since it produces pictures, is a television set.

what is the combination of your attitudes, behaviors, and characteristics.

Answers

Answer:

Your personality.

Explanation:

Hope this helps:) Have a good day!

Answer:

Your personality

Explanation:

This is what makes you, you! have a good day!

You are using Firefox as your
default browser and you want to customize it to better suit your browsing habits. What extensions specific to Firefox can
you use to accomplish this?

You are using Firefox as your default browser and you want to customize it to better suit your browsing

Answers

Answer:

B. firefox add-ons..............

what is role can ICT play in helping school take part in social responsibility

Answers

Answer:

The answer is below

Explanation:

Given that Social responsibility deals with ideas that individuals or groups of people are expected or bound to work in alliance with other individuals or groups of people in favor of the generality of society.

Hence, some of the role ICT can play in helping school take part in social responsibility are:

1. Helps students to have independent access to knowledge

2. It assists the students with special needs

3. It helps the teachers to teach outside the comfort of the classroom only.

4. It exposes teacher and students to more knowledge and opportunities

5. The school governing body can access people and the community's opinions about ways to improve the school better.

6. It exposes the school to more ideas and opportunities.

7. It can be used to assist the school in improving the quality of education, both for the teachers and students side.

Explain the four basic operation performed by every computer​

Answers

Answer:

computer is a machine that, under a program's direction, performs four basic operations: input, processing, output, and storage. A program is a list of instructions that tells a computer how perform the four operations.

Answer:

A computer is a machine that, under a program's direction, performs four basic operations: input, processing, output, and storage. A program is a list of instructions that tells a computer how perform the four operations.

Explanation:

CORRECT ANSWER GETS BRAINLIEST!!!
Which area of engineering focuses on the study of materials, products, and structures that may cause injury or damage?
forensic engineering
mechanical engineering
biomedical engineering
materials engineering

Answers

Answer:

Forensic engineering

Explanation:

Forensic engineering matches the definition of "a area of engineering that focuses on the study of materials, products, and structures that may cause injury or damage"

(Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?

Answers

Upon connecting your Government-issued laptop to a public wireless connection, Disconnect from the public wireless connection, run a malware scan, and change all passwords.

When connecting to a public wireless network, you are at a higher risk of exposing your device to malicious code or malware. Therefore, it is crucial to disconnect from the network immediately and run a malware scan to check for any potential threats. Changing all your passwords is also important as it can prevent hackers from accessing your personal and sensitive information. By taking these precautionary measures, you can protect yourself and your device from potential cyber attacks that could compromise your data and compromise the security of your Government-issued laptop.

learn more about laptop here:

https://brainly.com/question/31115377

#SPJ11

Other Questions
a constant current of 0.912 a is passed through an electrolytic cell containing molten mgcl2 for 17.5 h. what mass of mg is produced? There are certain things, like renting a car or booking a hotel room, that you cannot do without having a credit card.a. Trueb. False Although the blouse cost too much it does look lovely with that skirt is it vague prounoun note the number of atoms of carbon in pyruvic acid and explain why three molecules of carbon dioxide are produced. Cyclohexane may adopt a number of different conformations. The most stable of these is the chair conformation.Move the cyclohexane structure about so that you get a feel for the symmetry of the molecule.Now rotate the structure so that one carbon is directly behind an adjacent carbon.How are the C-H bonds of the two carbons arranged according to the findings of the minnesota study of twins reared apart identical twins, whether raised together or apart have personalities cuny.edu. Assuming that the ring is small enough compared to the depth of the river to be treated as a point and that depth of the Rhine where the ring goes in is 12.3 m , what is the area of the largest circle at the surface of the water over which light from the ring could escape from the water? show that the minimum polynomial of a block diagonal matrix B= [B11 0 0 B22] is the least common multiple of the minimum polynomials of the diagonal blocks. Yida is suffering from binge eating disorder. Ali is afraid of spiders. Ting Wei was just diagnosed with schizophrenia. Marta has attention-deficit/hyperactivity disorder. Which person would a psychodynamic therapist take on as a client? Which statements about Mycenaean, Teotihuacn, and Japanese face masks are true?Choose all answers that are correct.A. They are lifelike and resemble specific people.B. They could be made with beaten gold, carved wood, or tesserae in the mosaic technique.C. Some were placed in tombs or worn during theater performances.D. They were decorative rather than functional works of art.SOMEONE HELP ME PLSSSSSSSSSSSSS Which pair of words BEST describes the character of Mrs.Comstock?4x A compassionate, but concernedBC4x Dsupportive, but anxiousfearful and jealousharsh and bitter One restaurant you know of offers a "cash discount" and another charges a "credit card fee." Even though you end up paying the same amount for your meals at both restaurants, you feel like the cash discount is a good deal and that the credit card fee is unjust. This is due to which decision making bias?A. Framing EffectsB. Base Rate BiasC. Misconceptions of chanceD. Misunderstanding Conjunctive Even If class has a single constructor that takes an argument, which of the following statements will produce an error? None of them Card top; Card* top; Card top (1); Candtop()Card* top=newCard(1); All of them What does the following statement do? Deck hand(); Given the following statement: Card* top; What is the value of the variable? A Card object stored on the stack A Card object stored on the heap NULL Undefined Error Describe three steps that can be used to identify a material One leg of a right triangle is 2 feet longer than the other leg. The hypotenuse is 10 feet long. Find the length of the legs of the triangle? Modifications in usual methods and interpretation of growth are needed in conditions known to influence growth and development. True False When Mansa Musa reigned over the West African kingdom of Mali, he made a pilgrimage called a hajj. Where did Mansa Musa take this pilgrimage to? the last time I felt valued thoughts: Hi help!!! please!!!Which of the following statements is incorrect concerning BaF2?Question 2 options:The total number of fluoride ions present in one formula unit is 2(6.022 x 1023).The total number of fluoride ions present in three moles of BaF2 is equal to 6 x (6.022 x 1023).The mass of 0.600 moles of BaF2 is 105 grams.0.600 moles of BaF2 is equivalent to 3.61 x 1023 formula units of BaF2. the first step in the controlling process is to monitor and record the actual results. t or f