3.1. Define the following terms as they apply to the relational model of data: domain, attribute, n-tuple, relation schema, relation state, degree of a relation, relational database schema, and relational database state. 3.2. Why are tuples in a relation not ordered? 3.3. Why are duplicate tuples not allowed in a relation? 3.4. What is the difference between a key and a superkey? 3.5. Why do we designate one of the candidate keys of a relation to be the primary key? 3.6. Discuss the characteristics of relations that make them different from ordinary tables and files. 3.7. Discuss the various reasons that lead to the occurrence of NULL values in relations. 3.8. Discuss the entity integrity and referential integrity constraints. Why is each considered important? 3.9. Define foreign key. What is this concept used for? 3.10. What is a transaction? How does it differ from an Update operation?

Answers

Answer 1

Domain: In the relational paradigm, the set of all potential values that an attribute might have is referred to as a domain. For instance, any positive integers may be the domain for the attribute "Age".

Attribute: An entity within a relation's attributes might be thought of as a particular quality or trait. It specifies the type of data that can be stored in a column that corresponds to a column in a table.

N-tuple: A row or record, commonly referred to as an n-tuple, is a representation of one instance of a relation. It is made up of a number of attribute values, each of which is associated with a different attribute in the relation.

Learn more about domain here:

brainly.com/question/30133157

#SPJ4


Related Questions

Which of the following types of traffic is not exchange by Remote Desktop clients and servers using the Remote Desktop Protocol (RDP)?a. Keystrokesb. Mouse movementsc. Display informationd. Application data

Answers

The types of traffic that are not exchange by using Remote Desktop Protocol (RDP) is d. Application data.

Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft to provide a graphical interface for remote access to another computer over a network connection. When a user connects to a remote desktop using RDP, they can interact with the remote computer as if they were physically present at that computer.

RDP exchanges various types of traffic between the client and server, including keystrokes, mouse movements, and display information. Keystrokes and mouse movements allow the user to interact with the remote desktop environment, while display information is used to send visual data from the remote desktop to the client computer.

Learn more about Remote Desktop Protocol here:

brainly.com/question/28903876

#SPJ11

Toothpicks are used to make a grid that is60toothpicks long and32toothpicks wide. How many toothpicks are used altogether?

Answers

Answer:

184 toothpicks

Explanation:

60 toothpicks+60 toothpicks+32 toothpicks + 32 toothpicks = 184 toothpicks

Answer:

3932

Explanation:

So, For 60×32 grid toothpicks required = 2x60x32 +60+32 = 3932*

Computer has brought radical change in every field​

Answers

Answer:

Yes it has brought change in every field

Explanation:

In the default configuration of window,how do you open a folder locater on the dektop ?

Answers

To open the folder locator on the desktop, press the Windows key and the letter E together. This will open the Windows Explorer window. Alternatively, you can right-click on the desktop and select "Open Windows Explorer" from the context menu.

The folder locator on the desktop can be accessed in two ways. The first way is to press the Windows key and the letter E together, which will open the Windows Explorer window. The second way to open the folder locator is to right-click on the desktop and select "Open Windows Explorer" from the context menu. This will open a window that contains all the folders and files on the computer. From this window, you can easily locate and open the folder you are looking for. With the folder locator open, you can quickly navigate to the exact folder or file you need.

Learn more about folder locator: https://brainly.com/question/25480553

#SPJ4

Modify the binary search algorithm to take the upper of the two
middle array elements in case the input array has even length. In
other words, in the binary search algorithm, replace
Trace the action

Answers

The binary search algorithm can be modified to handle arrays with even lengths by considering the upper of the two middle elements as the pivot. This modification ensures that the algorithm works correctly and efficiently for arrays of any length.

In the traditional binary search algorithm, the pivot is chosen as the middle element of the array. This works well for arrays with odd lengths, but poses a challenge when the array length is even. In such cases, there is no exact middle element. To address this, we can modify the algorithm to consider the upper of the two middle elements as the pivot.

When dividing the array in half during each iteration, we can calculate the middle index as (low + high) // 2. However, for arrays with even lengths, we can modify this calculation to (low + high + 1) // 2 in order to choose the upper middle element as the pivot. By making this modification, the binary search algorithm can handle arrays of any length correctly. This ensures that the search process efficiently narrows down the search space and accurately finds the target element, regardless of the array's length.

Learn more about array here-

https://brainly.com/question/30757831

#SPJ11

What are the three ways you can add recipients to your marketing emails? Add a list of contacts, add individual contacts, or save the email as a sales email. Add a list of contacts, add individual contacts, or save the email as a services email. Add a list of contacts, add individual contacts, or save the email for automation. Add individual contacts, save the email for auto

Answers

Answer:

Explanation:

The three ways of doing this are to add a list of contacts, add individual contacts, or save the email for automation. The list of contacts would be added as a single file containing a large collection of contacts which would all be imported. Adding individual contacts would be done one by one would need to be done manually. Lastly, we have saving the email for automation which would automatically add the email and the contact info asociated with that email to your marketing emails.

Answer:

add a list of contacts, add individual contacts, or save the email for automation

Explanation:

principles and practice of automatic process control 3rd edition pdf

Answers

Principles and Practice of Automatic Process Control 3rd Edition PDF is a textbook that provides a comprehensive understanding of automatic process control. It is designed for undergraduate students studying chemical engineering, control engineering, and related fields.

What is Automatic Process Control?

Automatic process control refers to the use of a control system to regulate a process without any human intervention. The system is programmed to adjust the process parameters automatically to maintain optimal conditions. The system receives input signals from sensors and sends output signals to actuators to make adjustments to the process variables. The principles of automatic process control are based on the mathematical modeling of the process. The models are used to develop control algorithms that can predict the behavior of the process under different conditions. The algorithms are then implemented in the control system to regulate the process.

The practice of automatic process control involves the design, implementation, and maintenance of the control system. The design phase involves the selection of sensors, actuators, and control algorithms that are appropriate for the process. The implementation phase involves the programming of the control system and the integration of the sensors and actuators. The maintenance phase involves the monitoring of the process and the control system to ensure that they are operating correctly. The Principles and Practice of Automatic Process Control 3rd Edition PDF covers the following topics: Introduction to Automatic Process Control Mathematical Modeling of Processes Dynamic Behavior of Processes Feedback Control Systems Advanced Control Strategies Digital Control Systems Multivariable Control Systems Plantwide Control Systems Applications of Automatic Control

Conclusion The textbook provides examples and case studies that demonstrate how the principles and practices of automatic process control can be applied to real-world situations. The PDF version of the textbook can be downloaded from various online sources.

Learn more on feedback control here: brainly.com/question/16230467.

#SPJ11

Question 6 (2 points)
The recipe for good communication includes these "ingredients":

a.clause, brevity, comments, impact, value

B.clarity, brevity, comments, impact, value

C.clarity, brevity, context, impact, value

D.clause, brevity, context, impact, value

Answers

Answer:

C

Explanation:

i think lng hehehehehe

What is the name of an application that appears to look like a helpful application but instead does harm to your computer

Answers

Trojan horse

Hope this helps (:

Answer:

Trojan Horse

Explanation:

What is the name of an application that appears to look like a helpful application but instead does harm to your computer

TROJAN HORSE

Web design incorporates several different skills and disciplines for the production and maintenance of websites. Do you agree or disagree? State your reasons.

Answers

Answer:

Yes, I do agree with the given statement. A further explanation is provided below.

Explanation:

Web design but mostly application development were most widely included throughout an interchangeable basis, though web design seems to be officially a component of the wider website marketing classification.Around to get the appropriate appearance, several applications, as well as technologies or techniques, are being utilized.

Thus the above is the right approach.

what is the term for a hybrid environment that normally uses a private cloud to run critical applications but will use public cloud services to meet spikes in resource usage?

Answers

The term for a hybrid cloud environment that normally uses a private cloud to run critical applications but will use public cloud services to meet spikes in resource usage is hybrid cloud.

What is hybrid cloud computing?

A hybrid cloud is a type of cloud computing that combines on-premises, private cloud services with third-party public cloud services, allowing for data and applications to be shared between them. A hybrid cloud strategy allows businesses to make the most of their existing infrastructure while also benefiting from the versatility, scalability, and cost-effectiveness of the public cloud.

A hybrid cloud approach is ideal for companies that want to maximize their investment in IT infrastructure while also reaping the benefits of public cloud services. The hybrid cloud provides businesses with the ability to take advantage of public cloud services' scalability and versatility while still keeping mission-critical applications and data on-premises.

Learn more about cloud computing here:

https://brainly.com/question/29737287

#SPJ11

Date Detection Write a regular expression that can detect dates in the DD/MM/YYYY format. Assume that the days range from 01 to 31 , the months range from 01 to 12 , and the years range from 1000 to 2999. Note that if the day or month is a single digit, it'll have a leading zero. The regular expression doesn't have to detect correct days for each month or for leap years; it will accept nonexistent dates like 31/02/2020 or 31/04/2021. Then store these strings into variables named month, day, and year, and write additional code that can detect if it is a valid date. April, June, September, and November have 30 days, February has 28 days, and the rest of the months have 31 days. February has 29 days in leap years. Leap years are every year evenly divisible by 4 , except for years evenly divisible by 100 , unless the year is also evenly divisible by 400. Note how this calculation makes it impossible to make a reasonably sized regular expression that can detect a valid date

Answers

Answer:

Attached is your code, written in Python.

Which utility causes the computer to run slow? defragmentation utility OR compression utility?

Answers

Answer:

compression

Explanation:

does wow presents plus let you screen record someone pls tell me i need to know

does wow presents plus let you screen record someone pls tell me i need to know

Answers

yes it allows you to screen record hope this helps

No, WOW Presents Plus does not let you screen record someone. Screen recording is not a feature of the app.

What is WOW Presents Plus?

WOW Presents Plus is a streaming service that offers exclusive content from World of Wonder, the producers of RuPaul's Drag Race. The app allows you to watch full episodes of RuPaul's Drag Race, Untucked, and other shows, as well as behind-the-scenes content.

However, screen recording is not a feature of the app. This means that you cannot record someone else's screen while they are watching WOW Presents Plus content. This is likely due to copyright and licensing restrictions.

Find out more on streaming service here: https://brainly.com/question/29696509

#SPJ2

______________ refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts while the ______________ refers to an inventory management technique where an incoming train unloads materials directly into outbound trucks.

Answers

Safety stock inventory management  refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts.

What is Safety stock inventory?

Safety stock inventory management is known to be a kind of more or extra inventory that is said to have been ordered way above the expected demand.

Note that this technique is often used to stop or hinder any form of stockouts that is said to have been caused by incorrect forecasting or unforeseen events in customer demand.

Learn more about Safety stock inventory form

https://brainly.com/question/26954616

What are 2 ways to send a message to your client when signed in as an accountant user?.

Answers

Answer:

The use of Ask client and request are 2 ways to send a message to your client when signed in as an accountant user.

in cell D19, write a formula that contains the difference between cells D18 and E18

ans the numbers in D18 and E18 are 9 and 7

in cell D19, write a formula that contains the difference between cells D18 and E18ans the numbers in

Answers

In the Microsoft Excel sheet,  cell D19, you can write the formula =D18-E18 to calculate the difference between cells D18 and E18.

What is the rationale for the above response?

The rationale for this formula is that it subtracts the value in cell E18 from the value in cell D18, giving the difference between the two numbers. In this case, with 9 in cell D18 and 7 in cell E18, the formula will evaluate to 2, which is the difference between the two numbers.

Excel formulas are important because they allow users to perform calculations and analyze data in a spreadsheet. They save time and effort by automating repetitive tasks, and they provide a quick and easy way to make decisions based on data.

Learn more about Excel Formula:

https://brainly.com/question/29280920

#SPJ1

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

Select the correct statement(s) regarding Wide Area Networks (WANs).
a. WANs operate at the OSI Layer 3 (network layer) b. today's WANS only use IPv4 and IPv6 at the OSI network layer
c. WANS operate at the OSI Layer 2 (data link layer)
d. a WAN is a wireless area network, implemented by cellular service providers

Answers

The correct statement regarding Wide Area Networks (WANs) is option

A. WANs operate at the OSI Layer 3 (network layer).Explanation:Wide Area Networks (WANs) can be defined as a telecommunication network that is spread over an extensive geographical area, connecting various Local Area Networks (LANs) together. It is widely used in businesses, schools, and government institutions to ensure a quick and efficient flow of information, making it a vital aspect of modern-day communication and information management systems.Wide Area Networks (WANs) operate at the OSI Layer 3 (network layer), which enables the network to interconnect devices in different geographical locations by providing the means for packet forwarding and routing. WANs utilize a range of technologies and protocols such as Frame Relay, ATM, MPLS, and leased lines to transport data. They can be either private or public, with the latter being the internet. Some examples of WANs include the internet, cable networks, and satellites. Option a is, therefore, the correct statement regarding Wide Area Networks (WANs).Option b is incorrect. Modern-day WANS use a wide range of protocols and technologies to transport data, and these include IPv4, IPv6, Frame Relay, ATM, MPLS, and leased lines. Option c is incorrect. WANS do not operate at the OSI Layer 2 (data link layer) as this layer is responsible for node-to-node communication rather than interconnecting devices in different geographical locations. Option d is incorrect. A WAN is not a wireless area network implemented by cellular service providers but a telecommunication network spread over a wide geographical area.

Learn more about WANs here at brainly.com/question/27616057

#SPJ11

Jason found his father’s old phone . When he looked into the interior circuit of the phone, he found that the storage car was permanently fixed on the primary circuit board of the phone, what type of storage media is this?

Answers

It is a persistent drive

Horizontal and vertical flips are often used to create ___.
(Hint: one word, starts with the letter R, 3 syllables) HELP PLEASE !! PHOTOSHOP CLASS !!

Answers

Answer:

Rotation of an image

Explanation:

The correct answer is -  Rotation of an image

Reason -

When you rotate an object, it moves left or right around an axis and keeps the same face toward you.

When you flip an object, the object turns over, either vertically or horizontally, so that the object is now a mirror image.

3.5 code practice
grade = str(input("What year of high school are you in?: "))

if ("grade ==Freshman"):

print("You are in grade: 9")

elif ("grade == Sophomore"):

print("You are in grade: 10")

elif ("grade == Junior"):

print("You are in grade: 11")

elif ("grade == Senior"):

print("You are in grade: 12")

else:

print("Not in High School")

It keeps printing your are in grade 9. Why?

Answers

The fixed code is shown below. input() function already returns string that's why you don't have to convert string again. Also the syntax in if-else scope is wrong.

grade = input("What year of high school are you in?: ")

if(grade.lower()=="freshman"):

print("You are in Grade 9.")

elif(grade.lower()=="sophomore"):

print("You are in Grade 10.")

elif(grade.lower()=="junior"):

print("You are in Grade 11.")

elif(grade.lower()=="senior"):

print("You are in Grade 12.")

else:

print("Wrong input!")

choose the answer. angie is using a device that transmits information to a specific destination instead of to the entire network. what is this device?

Answers

Angie is using a device named 'switch' that transmits information to a particular destination instead of to the entire network.

A network device named 'switch' connects devices such as computers, printers, and wireless access points, in a network to each other, and allows them to interact by exchanging data packets. Switches can be software-based virtual devices, as well as hardware devices that manage physical networks. In simple terms, switches are networking devices on a computer network that use packet switching to receive and forward data to the specific destination device.

You can learn more about network device at

https://brainly.com/question/28342757

#SPJ4

What is the difference between the two parameter modes updates and replaces?

Answers

The difference between the two parameter modes "updates" and "replaces" lies in how they handle modifications to the data.



In "updates" mode, changes are applied to the existing data by modifying specific attributes or values without completely replacing the original data. This mode is often used when you want to maintain the existing data structure while updating specific parts.


In "replaces" mode, the original data is entirely replaced by the new data, effectively discarding the previous version. This mode is typically used when a complete overhaul of the data is necessary or when the new data is significantly different from the original.


To summarize, "updates" mode modifies the existing data, while "replaces" mode discards the original data and replaces it with new information.

To learn more about Parameters mode, click here:

https://brainly.com/question/13381507

#SPJ11

Fill in the blank to make the following true.
3 ** 2 =

Answers

The statement becomes true applying the exponential operator as follows:

3 ** 2 = 9.

What are the Python Operators?

The Python Operators are listed as follows:

Addition: x + y.Subtraction: x - y.Multiplication: x*y.Division: x/y.Modulus: x % y -> takes the remainder of the division of x by y.Exponential: x ** y -> equivalent to x ^ y.Floor division: x // y -> takes the highest integer that is less than the quotient of x by y.

In this problem, the statement is given as follows:

3 ** 2.

From the list of operators presented above, this is an exponential operation, that can be solved as follows:

3 ** 2 = 3² = 9.

(as the square of 3 is of 9).

More can be learned about Python operators at https://brainly.com/question/17161155

#SPJ1

What frequency band is used by 802.11b, 802.11g, and 802.11n?
A. 1.5 GHz
B. 2.4 GHz
C. 5 GHz
D. 11 GHz

Answers

802.11b, 802.11g, and 802.11n use the 2.4 GHz frequency band.

The 2.4 GHz band is a commonly used frequency band for Wi-Fi communications.

It offers good range and is generally less congested than the 5 GHz band. However, because it is a commonly used band, interference can be a problem in some areas.

Other Wi-Fi standards, such as 802.11a and 802.11ac, use the 5 GHz frequency band, which can offer higher speeds but at the cost of reduced range.

learn more about frequency  here :

https://brainly.com/question/5102661

#SPJ11

which installation method often requires you to immediately install updates from the internet after installation is complete?

Answers

An installation method which often requires an end user to immediately install updates from the Internet after installation is complete is: CD or DVD installation.

What is a software?

A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task and proffer solutions to a particular problem.

What is an installation?

An installation can be defined as a process through which a software application is configured and integrated into the memory of a computer system, in order to make it ready for execution of specific task.

In Computer technology, an installation method which often requires an end user to immediately install updates from the Internet after installation is complete is CD or DVD installation.

Read more on software installation here: https://brainly.com/question/22529307

#SPJ1

Complete Question:

Which installation method often requires you to immediately install updates from the Internet after installation is complete?

answer choices

Internet installation

App Store installation

Software subscription

CD or DVD installation

Most ________ are accompanied by several common utility programs, including a search program, a storage management program, and a backup program.

Answers

Answer:

operating systems

Explanation:

The operating systems is shortly known as OS. It is a system software which manages the software resources of the computer, computer hardware and also provides some common services for the various computer programs.

Most of the operating systems available in the market provides some common utility programs such as the search program, a backup program and a storage management program also.

Some common operating systems are : Linux, Microsoft Windows, Ubuntu, macOS, Unix, and many more.

Write a program that declares a 20-element, one-dimensional int array called commission. Assign the following 20 numbers to the array: 50, 120, 130, 150, 190, 200, 215, 300, 318, 430, 560, 600, 150, 660, 700, 150, 800, 760, 730, 589The program asks the user to enter the amount of the commission from 0 through 1000.It then should display the number of sales people who earned that commission. Use a sentinel value to end the program. The program should answer the following questions:How many salespeople earned a commission of 50How many salespeople earned a commission of 150How many salespeople earned a commission of 430How many salespeople earned a commission of 800

Answers

Here is a program that declares a 20-element int array called commission, assigns the given numbers, and allows the user to enter commission values to find out how many salespeople earned that commission:

```cpp
#include
using namespace std;

int main() {
   int commission[20] = {50, 120, 130, 150, 190, 200, 215, 300, 318, 430, 560, 600, 150, 660, 700, 150, 800, 760, 730, 589};
   int inputCommission = 0;

   cout << "Enter a commission amount between 0 and 1000 (enter -1 to exit): ";
   cin >> inputCommission;

   while (inputCommission != -1) {
       int count = 0;

       for (int i = 0; i < 20; i++) {
           if (commission[i] == inputCommission) {
               count++;
           }
       }

       cout << "Number of salespeople who earned a commission of " << inputCommission << ": " << count << endl;
       cout << "Enter another commission amount (or -1 to exit): ";
       cin >> inputCommission;
   }

   return 0;
}
```

For the specific questions:

- How many salespeople earned a commission of 50: 1
- How many salespeople earned a commission of 150: 3
- How many salespeople earned a commission of 430: 1
- How many salespeople earned a commission of 800: 1

To know more about array, click here:

https://brainly.com/question/30726504

#SPJ11

What does the program print out as a result of the given snippet of code?

supplies = ["pencil", "notebook", "backpack", "calculator", "pen"]
print(len(supplies))
5
8
[‘backpack’, ‘calculator’, ‘notebook’, ‘pen’, ‘pencil’]
[‘pencil’, ‘notebook’, ‘backpack’, ‘calculator’, ‘pen’]

Answers

Answer:

5

Explanation:

well the function len gives the length of the list

so the length of supplies is

5

Answer:

a

Explanation:

edge

Other Questions
List the layers of Earths atmosphere in order of increasing altitude. A. troposphere, stratosphere, mesosphere, thermosphere, exosphere B. exosphere, thermosphere, mesosphere, stratosphere, troposphere C. troposphere, stratosphere, mesosphere, exosphere, thermosphere D. stratosphere, mesosphere, thermosphere, exosphere, troposphere "Many new entrepreneurs have ideas for businesses they want to start, or products they want to create, but don't know how to manage a small business effectively.""However, managing a new venture and managing an existing company requires different methods and principles. ""Through entrepreneurial management, you can manage a growing business without limiting the creativity or passion of a startup."In light of these statements how would an Entrepreneurial manager support (foster) innovation in business? Consider and apply some of the elements of innovation Select the correct answer.Why did the states under the Articles of Confederation want to limit the central government's powers?A. They did not want to share their profits from trade with other states.B. They believed that a strong central government would treat themanfairly as the British did.C. They believed that a central government could not protect their individual cultural identity.D.They did not wanted to take part in any more wars declared by the central government. Compare the following typical responses to trauma, along with risk factors. Which is considered the most common human response? A. resilience B. depression C. acute stress disorder Which of the following is a reason the life cycle stage concept sometimes gets criticism?It assumes that all products and services will eventually get to the decline phase.There should actually be at least five stages, including adolescence.Sometimes an organization skips the growth phase.An organization may never get out of the introduction phase. Which word best describes the organisms role in its ecosystem? What is the primary difference between ribose sugar and deoxyribose sugar?. Plz help due tomorrow What section of the CPT code book is 88307 located in?Select one:a.Path/Labb.Radiologyc.E/Md.Surgerye.Medicine Due to uncertainty during COVID-19 pandemic, households have lower expectations of their futureincome causing them to reduce their autonomous consumption from $500 to $350. Given thesituation, what would happen to the equilibrium level of output? Also, find the value of autonomousconsumption multiplier.2. Thailand is set to run relatively wide budget deficits over the coming years, as the government seeksto support the economy amid the headwinds from the pandemic and a downturn in external demand.If we assume that Thailand is a closed economy, please use both Loanable Funds Market and Marketfor Goods and Services models to explain the effects of a decrease in investment on the Thai economy(;. the real interest rate; ii. national saving; ili. investment; iv. consumption; and v. output.). (5 pts)Can you ans in 5 minutes? how many species do biologists estimate to be currently on earth? Is it legal to own a pavo as a pet, if so what are its living conditions like? (7) Consider a firm with cost function c(y)=200,000,000+0.1y. (a) What is this firm's marginal cost? (b) What is this firms average total cost? (c) Show graphically what the shape of this firm's average total cost curve looks like. What kind of firm is this? an approved epa-registered hospital disinfectant is required for use when: An IF function will be entered into an Excel worksheet to evaluate the contents of two cell locations: A7 and C7. Cell A7 contains the percent change from the cost of an investment to its current value. Cell C7 shows the current profit in dollars for an investment. If either cell A7 is greater than 4% or cell C7 is greater than or equal to 600, the IF function should divide the value in cell A1 by the value in cell B1. Otherwise, the function should leave the cell blank. Write an IF function using the OR function to produce the outputs described above. Write this function as if it is being entered into a cell on an Excel worksheet. Find the perimeter of the trapezoid. A nurse is discussing culturally competent care at a nursing staff in-service. Which of the following information should the nurse include when discussing clients' cultures?A. Nurses should focus on clients cultures, rather than their ethnicity when providing careB. Nonverbal communication is important in a few culturesC. Nurses should expect clients to adapt to the care provided regardless of cultureD. Culture plays no role in determining when a client will seek medical care true or false (a) the total energy of a system cannot change. (b) when you jump into the air, the floor does work on you increasing your mechanical energy ANswer today plz other wise its to late if you answer after 11:59 your to late plz answer before 11:59 (help please.) Daniel reads about the survival and reproductive strategies of animals. He is surprised at the complexity of behaviors different kinds of animals practice. He is especially interested in the musk ox.A group of musk oxen protects their young by forming a circle around them. The adult oxen stand with their heads outward to face an enemy. The young remain protected within the circle.Choose the correct words to finish the sentence.This is an example of a (migratory behavior, fertilization strategy, cooperative behavior, or herd instinct?) in which the musk oxen help protect the (habitat, offspring, food, or mates?) of the other group members.