Define the following terms: data model, database schema, database state, internal schema, conceptual schema, external schema, data independence, DDL, DML, SDL, VDL, query language, host language, data sublanguage, database utility, catalog, client/server architecture, three-tier architecture, and n-tier architecture.

Answers

Answer 1

Answer:

Following are the solution to the given terms:

Explanation:

Data Model: A set of concepts that are ideal for describing the layout, computational tools, relations, semantics, constraints on accuracy.

Database Scheme: It is also known as the overall design of the database.

Database State: It is the data in the database at a particular moment in time.

Internal Schema: The physical structure of the database is defined.

Conceptual Schema: It hides the details of physical storage.

External Schema: It describes the part of the database the user group sees. In other words, we can say that it is a view of the database.

Data Independence: The ability to modify the schema at a single level while modifying the schema at a higher level is often recognized.

DDL: It stands for the Data Definition Language, which is used by DBA and dev use for creating With particular scheme.  

DML: It refers to the Data Manipulation Language, which is used to manipulate, add, recover, insert, remove, and alter data.  

SDL: It stands for the storage definition language, in which the internal schema of the database is applied for storage description.  

VDL: The view definition language specifies the user to view and mapping their conceptual schema.

Query Language: It is just an independent, dynamic, high-level dialect used during manipulation.  

Host Language: It is also the machine language, that would be incorporated into the general programming language by low-level data handling commands.  

Data sublanguage: It uses for embedding in the last language.  

Database Utility: It is a program, which helps to handle the database with DBA's modules.  

Catalog: The entire structure and constraints of the database is defined.

client/server architecture: The design of the database server system that device usability: model user, model server (landless storage) software Government computer design in which many users (remote processors) demand a central server to receive service (host computer).  

Three-tier architecture: It is the application, data, user interface.

n-tier architecture: multiple levels. The nth level must only be able to handle the n+1 application and transmit it to the n-1 point.


Related Questions

1) It is possible to email a document
directly from the Word application.
O FALSE
O TRUE

Answers

Answer:

True

Explanation:

What is the difference between packaged and tailored software ​

Answers

Answer:

Packaged software is a collection of programs that perform similar functions or have similar features to meet various goals and objectives. e.g Microsoft Office While tailored software is software specially developed for some specific organisation or other user. e.g Amazon, Netflix.

How does an online intrusion usually begin

Answers

Answer:

n the first stage of an intrusion, a nation-state attacker works to understand their target. That effort begins with scanning, researching important people and email addresses associated with the target, looking up open-source information regarding the organization or government and documenting everything they find on the network.

Explanation:

Answer:

it begins by gossips from peoples comments

Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.
PH
var num2 = 32;
var num1 = 12;
var rem=num2 % numi;
while(rem > 0)
{
num2 = num1;
num1 = rem;
rem = num2 % num1;
}
document.write(num1);
The output of the document.write statement at the end of this block is

Answers

Answer:

4

Explanation:

Given

The attached code segment

Required

The output

The first and second lines initialize num2 to 32 and num1 to 12, respectively.

Next, the remainder is calculated on line 3

\(rem = 32\%12\)

\(rem = 8\)

Then the while loop is repeated as long as rem > 0.

At first, we have:

\(num2 = 32\)

\(num1 = 12\)

\(rem = 8\)

The first iteration gives:

\(num2 = 12\)

\(num1 = 8\)

\(rem = 12\%8 = 4\)

Is 4 > 0? Yes; The loop is executed again.

This gives:

\(num2 = 8\)

\(num1 = 4\)

\(rem = 8\%4=0\)

Is 0 > 0? No; The loop is executed

The last statement prints the last value of num1;

In the last loop, we have:

\(num1 = 4\)

Hence, the output is 4

Answer:

Below is correct, the answer is 4.

Explanation:

PLATO

Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction

Application of technical writing

Answers

Answer:

python

Explanation:

The applications of technical writing are implied in every field of education. Some of its applications are given below:

The writing of papers, such as laboratory reports and project reports, for other people who are specialists in that field of education. Making the analysis of the research-based topics in the field of work. Performing any survey according to ground reports on the paper in the presence of a large number of people.

What is Technical writing?

Technical writing may be defined as a way of articulating in an apparent and concise way on the basis of some concept, idea, or instructions.

Therefore, it is well described above.

To learn more about Technical writing, refer to the link:

https://brainly.com/question/10652566

#SPJ1

Is it possible to beat the final level of Halo Reach?

Answers

It is impossible to beat this level no matter how skilled the player is.

fill in the blank. a(n)___solution makes all of the computing hardware resources available, and the customers, in turn, are responsible for installing and managing the systems, which they can normally do, for the most part, over the internet.

Answers

The clients are in charge of installing and operating the systems after the cloud solution makes all of the computing hardware resources available, which they can typically accomplish, for the most part, online.

What is hardware
Hardware refers to physical components of a computer system. This includes the internal components such as the motherboard, CPU, memory, and storage, as well as any external peripherals such as a mouse, keyboard, monitor, printer, and scanner. All of these pieces of hardware interact with each other and with the operating system to form a complete computing system. Hardware can also refer to physical objects that are connected to the computer, such as a router, server, or network switch. Computer hardware is necessary for any type of computer system to properly, and it is usually the first step in setting up a computer system.

To know more about hardware
https://brainly.com/question/15232088
#SPJ4

5 ways in which academic library supports teaching learning and research

Answers

The academic library helps support teaching, learning, and research because it allows people to teach themselves and learn by doing their own research. When you go into an academic library, you are able to find the topic that you are struggling with and do your own research and learn more about it. By doing this you are teaching yourself more about the topic that you were struggling with. By allowing students to have an academic library they have more Independence to learn on their own, teach themselves, and do their own research rather than having to ask a teacher for the questions that they have or for the answer.

Create a python program that allows the user to continuously enter numbers until the user enters 0. Output the sum of the numbers

Answers

Answer:

m = 0

summ = 0

n=int(input('Enter a number, 0 to end: '))

while n != 0:

   summ = summ + n

   m = m + 1

   n=int(input('Enter a number, 0 to end: '))

print('You entered',m,'numbers and the sum of the numbers you entered is', summ)

Explanation:

m is used to count the numbers entered, summ is used to store the summation of the numbers, n is used to store the number entered. When a number is entered, it is checked if the number is not equal to 0 using a while loop. If the condition is True, the loop body is executed, which adds the number entered to sum which has an initial value of 0, this is repeated until zero (0) is entered which terminates the loop and prints out the summation of the entered number.

How many passes will it take to find the four in the list 4,5,6,7,8,9,10

Answers

Answer:

1

Explanation:

Which of these ports listed is the fastest? IEEE 1394 USB2.0 FIREWIRE ESATA

Answers

The  port which  is the fastest is  ESATA.

What is ESATA?

eSATA  can be described as the  SATA connector which can be access from outside the computer and it help to give the necessary  signal  connection that is needed for  external storage devices.

The eSATA serves as a version of the eSATA port which is been regarded as the  External SATA port, therefore, The  port which  is the fastest is  ESATA.

Read more on the port here:

https://brainly.com/question/16397886

#SPJ1

Use the drop-down menus to identify the roles that can be granted to a delegate in Outlook.
The
role grants read, create, and modify permissions.
The read-only permission is granted by the
role.
The
v role will allow the user to create new items.

Answers

Answer:

editor

reviewer

author

Explanation:

on edg

Answer:

editor

reviewer

author

Explanation:

Brainy has a computer and wants to perform an upgrade. He has two sticks of RAM of his computer ( total 3 GB) and he noticed it gets very slow. He has also noticed that the sluggishness matches an increase in the hard drive activity. What is likely the cause of Brainy's problem? What can you recommend as a fix ?​

Answers

Brainy's issue is most likely due to a shortage of RAM.

How can this be explained?

The computer's limited 3 GB of RAM may pose a challenge in managing numerous operations, and consequently may heavily depend on virtual memory, causing heightened hard drive activity and a reduction in overall efficiency.

My suggestion to resolve this issue would be to enhance the RAM. By adding more RAM to the computer, its memory capacity will enhance, leading to a reduction in dependence on virtual memory and an enhancement in overall efficiency, as it will be able to stock and access a greater amount of data.

Enhancing the system's memory capacity by installing a RAM of 8 GB or more is likely to alleviate the issue of slow performance.

Read more about memory capacity here:

https://brainly.com/question/28234711

#SPJ1

In her role as an administrative professional, Martina is learning about different types
of business letters she might be asked to type. Which is MOST likely to be requested
by her manager?
acceptance letter
Dear John letter
happy birthday letter
chain letter

Answers

Answer: Acceptance letter

Explanation: I took the test :)

It is most likely that Martina's manager would request her to type an acceptance letter as it is a formal letter used to confirm that an individual or organization has accepted an invitation, a job offer, a proposal or any other request.

Acceptance letters are often required in business settings and can be used for a variety of purposes, such as accepting a job offer, accepting an invitation to a conference or event, or accepting a proposal for a business deal.

This type of letter is professional in nature and requires a specific tone and format, which would be important for Martina to learn as an administrative professional.

Find more on acceptance letter:

https://brainly.com/question/15200765

#SPJ2

1.Create a function that accepts any number of numerical (int and
float) variables as positional arguments and returns the sum ofthose variables.
2.Modify the above function to accept a keyword argument
'multiplier'. Modify the function to return an additional variable
that is the product of the sum and the multiplier.
3.Modify the above function to accept an additional keyword
argument 'divisor'. Modify the function to return an additional
variable that is the quotient of the sum and the divisor.

Answers

Answer:

This function accepts any number of numerical variables as positional arguments and returns their sum:

python

Copy code

def sum_numbers(*args):

   return sum(args)

This function accepts a multiplier keyword argument and returns the product of the sum and the multiplier:

python

Copy code

def sum_numbers(*args, multiplier=1):

   total_sum = sum(args)

   return total_sum * multiplier

This function accepts an additional divisor keyword argument and returns the quotient of the sum and the divisor:

python

Copy code

def sum_numbers(*args, multiplier=1, divisor=1):

   total_sum = sum(args)

   return total_sum * multiplier, total_sum / divisor

You can call these functions with any number of numerical arguments and specify the multiplier and divisor keyword arguments as needed. Here are some examples:

python

# Example 1

print(sum_numbers(1, 2, 3))  # Output: 6

# Example 2

print(sum_numbers(1, 2, 3, multiplier=2))  # Output: 12

# Example 3

print(sum_numbers(1, 2, 3, multiplier=2, divisor=4))  # Output: (8, 3.0)

When a computer is suffering from a virus, you can use a compiler to help remove the virus. True or false?

Answers

True I think because it helps right?

It is true that when a computer is suffering from a virus, you can use a compiler to help remove the virus.

What is a compiler?

Compilers are specialized software tools that convert the source code of one programming language into machine code, bytecode, or another programming language.

Usually, the source code is created in a high-level, readable language for humans, such Java or C++.

Programs that convert source code from a high-level programming language to a low-level programming language (such as assembly language, object code, or machine code) in order to produce an executable program are commonly referred to as "compilers."

The compiler, as we well know, transforms high-level source code into low-level code.

Low-level code is then executed on the target system. You can use a compiler to assist in virus removal when a computer is infected.

Thus, the given statement is true.

For more details regarding a compiler, visit:

https://brainly.com/question/28232020

#SPJ2

With suitable example, illustrate the use of #ifdef and #ifndef.

Answers

Partitions are used to divide storage spaces into manageable segments.

Fixed partitions have a predetermined size, and they are used to allocate storage space based on the needs of an application. Fixed partitions are commonly used in mainframe systems, where applications require predictable amounts of storage.

For example, consider an organization that uses a mainframe system to manage its payroll. In this scenario, the organization may use fixed partitions to allocate storage space to the payroll application, ensuring that it has access to a specific amount of storage space at all times.

On the other hand, dynamic partitions allow the operating system to allocate storage space based on the requirements of an application. With dynamic partitions, the size of the partition is not fixed, and it can grow or shrink based on the needs of an application.

For example, consider a personal computer that is used to store and manage different types of data. In this scenario, dynamic partitions are used to allocate storage space to different applications based on their storage requirements.

As new applications are installed, the operating system dynamically allocates storage space to ensure that each application has sufficient storage space to function properly.

To know more about Partitions visit:

brainly.com/question/31672497

#SPJ1

10) If a citizen wants to learn more about a candidate's background, position on issues, and recent activities, what action will allow the citizen to access the MOST information? A) visiting the candidate's Internet website B) watching the candidate's television advertisment C) listening to what friends say about the candidate D) reading a newspaper article that mentions the candidate

Answers

Answer:

A.) Visiting a candidate's internet website

Explanation:

A.) is correct because this place is entirely dedicated to promoting the candidate. It is in this person's best interest to give as many beneficial facts about themselves here so that their reputation rises. However, because this site is managed by the candidate, it may omit some unflattering information about them.

B.) is incorrect because television advertisements do not have the time to share a lot about a candidate. In many cases, most of this time is spent bashing other candidates. In addition, the information in commercials is usually more sensationalized to quickly grab the audiences' attention.

C.) is incorrect because friends are not the direct source of the information. They received this knowledge from somewhere else that may not be reliable. They may also forget or accidentally change some of the information. Furthermore, they are most likely unaware of the candidate's entire background and political stances.

D.) is incorrect because a mention in the newspaper means that the candidate is only discussed a small amount. Newspapers only have a certain amount of space as well, so they usually do not devote a lot of space to one person.

A collection of programs which make computer work:--------

Answers

This collection of programs, named the operating system, is as important to the process of a computer system as its hardware.

What is a collection of programs known as?A collection of program that governs how your computer system runs and processes information is called Compiler. Computer network A group of. computing devices that are connected in. different ways in order to communicate and. share resources.The another term for computer programs is software system, software program, software package, software, Computer Software, packageWhat is the extensive collection of computer called?

A network is a collection of computers or others types of hardware, which is joined by communication channels that allow sharing of resources and information.

To learn more about operating system, refer

https://brainly.com/question/22811693

#SPJ9

in the lc-3, the sr1 decoder input comes from the sr1mux. what are the two inputs to the sr1mux? (hint: think about the store instructions)

Answers

In the lc-3, the sr1 decoder input comes from the sr1mux. what are the two inputs to the sr1mux is IR[8:6] and IR[11:9]

What functions does the LC 3 ALU support?

A decoder is a device that transforms n lines of input into 2n lines of output and produces the original signal from the coded input signal. The fundamental decoding component can be an AND gate because it only generates a high output when all inputs are high.

Therefore, to examine each type, the operations are possible with the LC-3 ALU. Each operation is represented by a single opcode in the ISA: ADD, AND, and NOT.

Learn more about decoder  from

https://brainly.com/question/4211230
#SPJ1

Which operating system does a driver assist with?

running applications

hardware management

file management

booting

Answers

Answer:

hardware management

Explanation:

Answer:

hardware management

Explanation:

Need help
I need help with this it’s really confusing and I have to send it to my teacher with a file I don’t get it

Need help I need help with this its really confusing and I have to send it to my teacher with a file

Answers

Answer:

100 POINTS MATHEMATICS MIDDLE SCHOOL HOMEWORK.

I will report you if you answer incorrectly or steal my points.

The figure below represents a network of physically linked devices, labeled A through F. A line between two devices indicates a connection. Devices can communicate only through the connections shown.
Which of the following statements are true about the ability for devices A and C to communicate?

Answers

The network is fault tolerant. If a single connection fails, any two devices can still communicate. Computers B and F need to first communicate with at least one other device in order to communicate with each other. The correct statements are I and II.

What is a network?

Computer networking is the term for a network of connected computers that may communicate and share resources.

These networked devices transmit data through wireless or physical technologies using a set of guidelines known as communications protocols.

Local-area networks (LANs) and wide-area networks are two fundamental types of networks (WANs). LANs use links (wires, Ethernet cables, fibre optics, and Wi-Fi) that carry data quickly to link computers and peripheral devices in a constrained physical space, such as a corporate office, lab, or college campus.

The network can withstand errors. Any two connected devices can still communicate even if one connection breaks. In order to communicate with at least one other device, Computers B and F must first communicate with that device.

Thus, both the statements are correct.

For more details regarding networking, visit:

https://brainly.com/question/15002514

#SPJ4

Your question seems incomplete, the complete question is:

The figure below represents a network of physically linked computers labeled A through F. A line between two computers indicates that the computers can communicate directly with each other. Any information sent between two computers that are not directly connected must go through at least one other computer. For example, information can be sent directly between computers A and B, but information sent between computers A and C must go through other computers.

Which of the following statements are true about this network:

I - The network is fault tolerant. If a single connection fails, any two devices can still communicate.

II - Computers B and F need to first communicate with at least one other device in order to communicate with each other.

The figure below represents a network of physically linked devices, labeled A through F. A line between

cisco math using the networks created in the last chapter, identify the network address, first usable address, last usable address, broadcast address for each of the ip addresses.

Answers

All the broadcast address for each of the IP addresses is given below:

Network Address: 192.168.1.0
The network address is the first address in the network. It identifies the network, and all hosts on the network will have the same network portion of their address.

First Usable Address: 192.168.1.1
This is the first address that can be assigned to a device on the network. This address is always one higher than the network address.

Last Usable Address: 192.168.1.254
This is the last address that can be assigned to a device on the network. This address is always 254 lower than the broadcast address.

Broadcast Address: 192.168.1.255

This is the broadcast address for the network. It is used by devices on the network to send messages that are intended for all hosts on the network.

What is IP addresses?

An Internet Protocol (IP) address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two main functions: host or network interface identification and location addressing. IP addresses are written and displayed in human-readable notations, such as 172.16.254.1 in IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6.

The Internet Assigned Numbers Authority (IANA) manages the IP address space allocations globally and delegates five regional Internet registries (RIRs) to allocate IP address blocks to local Internet registries (ISPs) and other networks. IP addresses are divided into two parts: the network prefix and the host number.

To learn more about IP addresses
https://brainly.com/question/6888116
#SPJ4

Question 18
Which of the following is true?
a = 1
b = 10
a b<= a or a >= b
a>bor a == b
a band a == b

Answers

Answer:

None

Explanation:

Logical operators:

'and' indicates that the statement is true if both conditions are true.

'or' indicates that the statement is true if one or both conditions are true.

Given that a = 1 and b = 10:

The first statement is false (1×10 <= 1 is false, 1 >= 10 is also false)

The second statement is false (1>10 is false, a does not equal b)

The third statement is false (a does not equal b)

None of these statements are true.

Hope this helps :)

HURRY MY COMPUTER IS ABOUT TO DIE ILL GIVE BRAINLYESTn

HURRY MY COMPUTER IS ABOUT TO DIE ILL GIVE BRAINLYESTn

Answers

Answer: D, C, E, are the answers! good luck.

Explanation:

Please help out with this question ​

Please help out with this question

Answers

Using a programme that highlights the changes between the two portions, such as a version control tool or a plagiarism checker, is one technique to compare different sections of a work.

What is the plagiarism detection tool?

A plagiarism detector searches for similarities between your content and other texts using sophisticated database tools. Universities employ them to scan student assignments. Additionally, you can utilise paid plagiarism detectors to examine your own work before submission.

What do we call the computer programme that can identify plagiarism by examining the uniqueness of a piece of writing?

Software that detects plagiarism compares uploaded materials to other content databases to determine whether they are plagiarised. Checkers for plagiarism are used by writers and content producers to prevent unintentional

To know more about programme visit:-

https://brainly.com/question/30307771

#SPJ1

BRAINLIEST!!!!!!!!!!!!!!

Which of the following options in Backstage View should be selected if you want to open a new, blank document?

○ Share
○ Open
○ Export
○ New​

Answers

Answer:

New

Explanation:

open just makes you open the last project you were working on, new makes a brand new one.

When you wish to start afresh with a blank document, select new choices in Backstage Views.

Backstage View:

Opening simply opens the last project you were operating on, whereas new creates a whole new one.

This backstage view aids in the creation of new documents, as well as the saving, viewing, printing, and publishing of existing ones.

If you already have a document open, a window will pop up with data on the file, as shown below.

Therefore, the final answer is "New".

Find out more information about the View here:

brainly.com/question/14934880

A(n) ________ event is an alert that is generated when the gossip traffic enables a platform to conclude that an attack is under way
A. PEP
B. DDI
C. IDEP
D. IDME

Answers

Answer:

B. DDI

Explanation:

A(n) DDI event is an alert that is produce or invoke when the gossip traffic allow a platform to conclude that an attack or potential attack is under way.

A device driver is a computer program that operates or controls a particular type of device that is attached to a computer system.

A driver provides or supply a software interface to hardware devices which enable the operating systems and other computer programs to access hardware functions without needing to know the exact details in respect of the hardware being used.

DDI means Device Driver Interface

A driver relate or communicate with the device via the computer bus or communications subsystem to which the hardware is connected. Whenever a calling program invokes a routine in the driver, the driver will subsequently transmit commands to the device.

Which of the following is an example of critical reading?
Select all that apply:
Accepting textual claims at face value Considering an argument from a different point of view
Reviewing an argument to identify potential biases
Skimming a text to locate spelling errors or typos
Looking for ideas or concepts that confirm your beliefs​

Answers

Answer:

Which of the following is an example of critical reading? Select all that apply:

a.Accepting textual claims at face value

b.Considering an argument from a different point of view

c. Reviewing an argument to identify potential biases

d. Skimming a text to locate spelling errors or typos

e. Looking for ideas or concepts that confirm your beliefs

Other Questions
I Need help with this Read this excerpt from Frederick Douglasss speech The Hypocrisy of American Slavery.Fellow citizens, pardon me, and allow me to ask, why am I called upon to speak here today? What have I or those I represent to do with your national independence? Are the great principles of political freedom and of natural justice, embodied in that Declaration of Independence, extended to us? And am I, therefore, called upon to bring our humble offering to the national altar, and to confess the benefits, and express devout gratitude for the blessings resulting from your independence to us?Would to God, both for your sakes and ours, that an affirmative answer could be truthfully returned to these questions. Then would my task be light, and my burden easy and delightful. For who is there so cold that a nation's sympathy could not warm him? Who so obdurate and dead to the claims of gratitude, that would not thankfully acknowledge such priceless benefits? Who so stolid and selfish that would not give his voice to swell the hallelujahs of a nation's jubilee, when the chains of servitude had been torn from his limbs?What effect is achieved by using a series of questions in this speech? Find the economic batch quantity from the following data; Cost of carrying inventory=15% of value per year.Set up cost=3000 per batchAverage yearly consumption=3000unitsCost per unit=100 Which expression finds the length of side y in this right triangle? The York Company has arranged a line of credit that allows it to borrow up to $42 milion at any time. The interest rate is .618 percent per month. Additionally, the company must deposit 4 percent of the amount borrowed in a non-interest bearing account. The bank uses compound interest on its line-of-credit loans. What is the effective annual rate on this line of credit can someone help with 9-12 please ? Which of the following accounts is the least vulnerable to cyberattacks?A. Generic AccountB. Shared accountC. Personal accountD. Guest account In my country, people can vote for the legislators (members of parliament), and those members choose the Prime Minister. What type of government does my country have?A. parliamentary democracyB. presidential democracyC. absolute monarchy hey I wrote an essay can somebody read over it and see if I need to change anything Hi my name is Madelyn Wayne and I used to take electricity for granted then my life went upside down let's just rewind 1 month ago THROW IT THROW IT THROW IT !!, Alexandra yells. It's the bottom of the ninth and 1 point away from winning. I GOT IT I GOT IT!, I shout back. BAM the softball hits me in the head. The world is spinning like it is going down the drain. I fall to my knees and then the ground rushes up to meet me. WAKE UP, someone says. my eyes crack open. a man stands there in weird shoes. I slowly make my way up to my feet. When I looked around there were stone houses. I reach in my back pocket to find my phone (I always carry it with me) instead I pull out a phone shaped rock. Where am I ? I ask. The man replies little city , Alabama and what's your name stranger? the man asks. Madelyn Wayne, what's your name ? I ask. No time to talk, we have to hunt or else we can't have dinner tonight. The man says while running to the woods with a spear Why can't we go and drive to Mcdonalds and get some burgers? I asked. What's that? ``The man freezes in his tracks and drops the spear. Never mind I say as I walk toward the woods .It felt like we were hunting forever. By night I asked him for a flashlight as of course he was confused. I was like where is the electricity? Finally we reached the house. It was really dark there . With only a faint glow in the house. inside the house the man yelled honey I got the food and I brought a guest a woman's voice yelled back bring the meat in here philip Oh and show me the guest I was surprised to see that the floor was dirt and the walls were made of clay and wood. There weren't even lights in the house, only a hay bed, a little stone stove,a pot of water over a fire,and one woman. Hi, my name is Madelyn Wayne. and one question: where is the electricity in this place. I say. Just then a little girl came inside and she had the biggest cut on her left breast area . She was bleeding bad and she was barely conscious too. We all rushed over there to the little girl as she collapsed. She said wolves then fell down . Philip caught her; it looked like it was very deep and it needed a hospital. It was going to get infected . She needs medicine and a doctorI say calmly GET OUT! the man screamed at me . OKI say . Just then his hand came back and smacked me super hard. I stumble back and the world is spinning again. Hey are you OK why did you throw it that hard. I hear a swirl of words. I sit up and say "i had the craziest dream but, I'm fine, let's play" . The End both the kush and the maurya experienced a decline in their empires caused by Help asap :)Are the following functions inverses of one another ? Use function composition to explain your answer :) which control procedure is designed to minimize the threat of posting errors to accounts receivable? I NEED HELP PLEASE I'LL GIVE MORE POINTSReplace the direct object noun with a direct object pronoun.Use LOWER case only, accents are not required.T compras "los refrescos". T _____ compras.1 pointT y yo comemos "langostas". T y yo _____ comemos.1 pointEllos quieren "la cuenta". Ellos _____ quieren.1 pointQuin bebe jugo de "toronja"? Quin _____ bebe?1 pointAna cocina "un pastel y unas galletas". Ana _____ cocina.1 point . Look up current ocean pH values. How do the current values compare to those from previous years? ((my answer: 8.1 pH today and 8.2 pH previously (slightly basic with a 0.1 pH drop). This represents a 25% increase in acidity over the last 2 centuries.)). Next, consider what you have just learned about algae and how the chemistry of the indicator used in the experiments you just performed works. Hypothesize why oceans are at their current pH. How is the pH of the ocean changing and why? How might this affect the organisms that live in the ocean? What are the different types of discrimination What are the quotient and remainder of (3x - 2x - 8) + (x + 5)?a.3x - 17x+85; 433b. 3x - 17x+85; -433C.d.O AOBO COD3x - 15x+85; 4333x - 15x+85; -433Please select the best answer from the choices provided PLEASE HELP with the question 7 When a food source is missing an essential amino acid it is called a _____________amino acid. The essential amino acid _____________is not common in foods. Week Five Discussion Assignment 120120 unread replies.120120 replies. Please select from one of the following questions. Your initial response should be made by Thursday at 11:59 pm. It should be a minimum of 250 words and supported by citations from the text and other course materials. Make sure to properly cite your citations and references using APA format. Students should also reply to three of their fellow students posts by Sunday at 11:59 PM. The responses should be substantial and add value to the discussion. Consider referring to the ABC Method of Posting Download ABC Method of Postingto help with substantial posts. Challenge the Process Discuss a time when you challenged the process in your workplace. What worked and what didnt? Support your discussion with specific concepts from the textbook and make sure to cite them. Your initial post should be a minimum of 250 words and is due by Thursday at 11:59 pm. Respond to at least three of your fellow students posts by Sunday at 11:59 PM. Your posts should be substantial and add value to the discussion. Please label your post with the appropriate subject line. Super, Super Leader Think of a person you know that you consider to be a super, super leader. This person can be from an organization where you have worked that includes: a corporation, school, community group, and church (to name a few). What made them a super, super leader? Please tie your discussion to the Leadership Practices from the text and from other content shared in the class. Your initial response should be a minimum of 250 words. Make sure to cite the specific information that you use to support your discussion. Please respond to at least three of your fellow students by Sunday at 11:59 pm. Your responses should be substantial and add value to the conversation. Mos Restaurants and Cindy McIntee Watch the video clip on Cindy McIntee and Mos Restaurant. How would you describe Cindys leadership style and approach? Is Cindy an effective leader? Why or why not? Please tie to the Leadership Practices from the text as well as other course materials. Click on the following link to access the video: https://youtu.be/fD9ipxQZY0QLinks to an external site.. Your initial response should be a minimum of 250 words and posted by Thursday at 11:59 pm. You should make three substantial replies to your fellow students by Sunday at 11:59 pm. Note: Cindy McIntee is the owner of Mos Restaurants at the Oregon Coast. I have taken several of my classes to visit Cindy and her crew at her restaurants and chowder factory. While this video is several years old, I still find it very applicable to current leadership practices. The knights of labor suffered a steady decline in membership and influence due to lost strikes and.