Relational databases illustrate relationships between tables. Which fields represent the connection between these tables? Select all that apply.• External keys• Primary keys• Foreign keys• Secondary keys

Answers

Answer 1

The fields that represent the connection between tables in relational databases is primary keys and foreign keys.

What is primary keys and foreign keys?

Primary keys is a set of columns in table of relational database that have unique value to identify a row in table. Primary keys is unique for each row. So only one primary keys in one row of in table of relational database.

Foreign keys is a set of columns in table of relational database that have correspondent values of primary key but in another table.

Since, the foreign keys is have correspondent values of primary key so to add a row with foreign key value there must exist a row in other table that related with same primary key value.

Other key in relation table is surrogate keys. So, only primary keys and foreign keys that applied for represent the connection between table in relational database.

Learn more about surrogate keys here:

brainly.com/question/13398768

#SPJ4


Related Questions

Given integer currentBananas, if the number of bananas is 5 or more but fewer than or equal to 20, output "Allowable batch", followed by a newline.

Ex: If the input is 18, then the output is:

Allowable batch

Answers

To implement this in C++, you can use an if statement to check if the value of currentBananas is within the given range.

How to implement the statement in c++?

A sample code for implementing the check for the allowable batch of currentbananas would be:

#include <iostream>

int main() {

   int currentBananas;

   std::cin >> currentBananas;

   if (currentBananas >= 5 && currentBananas <= 20) {

       std::cout << "Allowable batch" << std::endl;

   }

   return 0;

}

This code takes an integer input for currentBananas and checks if its value is greater than or equal to 5 and less than or equal to 20. If the condition is true, it prints "Allowable batch" followed by a newline.

Find out more on input at https://brainly.com/question/13885665

#SPJ1

In which of the following situations must you stop for a school bus with flashing red lights?

None of the choices are correct.

on a highway that is divided into two separate roadways if you are on the SAME roadway as the school bus

you never have to stop for a school bus as long as you slow down and proceed with caution until you have completely passed it

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

Answers

The correct answer is:

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

What happens when a school bus is flashing red lights

When a school bus has its flashing red lights activated and the stop sign extended, it is indicating that students are either boarding or exiting the bus. In most jurisdictions, drivers are required to stop when they are on the opposite side of a divided highway from the school bus. This is to ensure the safety of the students crossing the road.

It is crucial to follow the specific laws and regulations of your local jurisdiction regarding school bus safety, as they may vary.

Learn more about school bus at

https://brainly.com/question/30615345

#SPJ1

xamine the following output:

Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115

Which of the following utilities produced this output?

Answers

The output provided appears to be from the "ping" utility.

How is this so?

Ping is a network diagnostic   tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).

In this case, the output shows   the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.

Ping is commonly used to troubleshoot   network connectivity issues and measureround-trip times to a specific destination.

Learn more about utilities  at:

https://brainly.com/question/30049978

#SPJ1

What is the HIPAA privacy rule, and why does it affect IT professionals.

Answers

It protects a persons identifiable health information and medical records.

Manufactured computers and cell phones are part of which industry? Electronics Chemicals Machinery Metal products

Answers

Answer:

The correct answer is the electronic industry

Hope this helps

Answer:

Electronics

Explanation:

The COOJA simulator is a utility to simulate wireless sensor systems. It serves as tool
to verify the operability of applications on target systems without having physical
access to these systems. Starting COOJA is as simple as double-clicking the COOJA
symbol on the virtual machine's desktop.
Compiling and running Contiki OS code in COOJA works by creating virtual sensor devices whose behavior can be specified by pointing COOJA to the .c files that
contain the corresponding program code.
a) Create a new simulation in COOJA (Menu item: File → New simulation... ). Enter a name of your choice, leave the default settings unchanged, and click Create. Next, add some motes with the hello-world
implementation to your simulation. To this end, navigate to the following menu item: Motes → Add motes → Create new mote type → Z1
mote. In the appearing window, navigate to the hello-world.c file in
the /home/student/contiki-ng/examples/hello-world directory and click
Compile, then Create. Increase the number of nodes to create to 20, and
keep the option for random positioning. Finally, click Add motes.
Unless already active, activate the Mote IDs option under the View menu
of the simulator's Network window. Twenty numbered circles will now occur, each one representing a single node with the given firmware. The number
in the circle specifies the node address. Furthermore, activate the Radio environment option in the View menu and then click on one of the nodes;
a green circle will appear around it. Click on the start button in the Simulation control window next, let the application run for about ten seconds
while taking note of the speed value displayed in the same window, then
click pause.
b) State an approximate average value of the observed simulation speed. Can
you think of what a speed over 100% might mean, and what speed values below 100% indicate?
c) Deduce from the observations in the Network window what the green circles
around nodes (after having clicked on the node) indicate. Try to drag-and-drop
nodes around to see if/how the circles change. Explain your observations.
d) Create a new simulation in COOJA. This time, load one node with the
udp-server from /home/student/contiki-ng/examples/rpl-udp and five
nodes with the udp-client from the same directory. Run the simulation to
verify that nodes exchange data with each other. For this purpose, set the required options under the View menu.
Using your mouse, drag one of the receiver motes in the Network window
far away from the remaining nodes such that its green and gray circles contain
no other nodes (you may need to enlarge the Network window to this end
and/or move other nodes to accomplish this task). In the Timeline window,
locate the entry for this particular node (hint: Look for the entry with the ID
of the node which you can find in the Network window).
Compare this node's activity (represented by the colors in the timeline and the
log output) with the activity of all other nodes. What are your observations?
Can you explain them? Hint: you may find it useful to enable further event

Answers

a) The simulation speed in COOJA refers to the speed at which the simulation is running compared to real-time. The average value of the observed simulation speed will vary depending on the specifications of the computer being used to run the simulation. A simulation speed over 100% means that the simulation is running faster than real-time. On the other hand, speed values below 100% indicate that the simulation is running slower than real-time.

What is the simulator  about?

b) The green circles around nodes in the Network window indicate the range of the radio signal of each node. The green circle represents the area where other nodes can be reached by a node with the corresponding radio signal. By dragging and dropping nodes, you can observe how the green circle changes to show the new range of the node's radio signal.

c) To verify that nodes are exchanging data with each other, a new simulation was created and one node was loaded with the udp-server and five nodes with the udp-client. By observing the Timeline window, it is possible to locate the activity of each node and compare it to the activity of all other nodes. When a node is dragged far away from the other nodes, the activity of this node (represented by the colors in the timeline and the log output) will be different compared to the activity of the other nodes. This observation can be explained by the fact that the node is now out of range of the radio signals of the other nodes, and therefore cannot exchange data with them.

d) To understand the observations, it is important to keep in mind that COOJA is a tool used to simulate wireless sensor systems, and the data exchange between nodes is simulated according to the specifications defined in the code. The observed differences in activity between nodes can be attributed to differences in the range of their radio signals, as well as other factors such as the timing of the data exchange between nodes.

Learn more about simulator  form

https://brainly.com/question/24912812

#SPJ1

Which famous British physicist wrote A Brief History of Time?​

Answers

Answer:

Stephen Hawking

Question providede in the document please use my provided codes!!

Answers

Answer:

become successful in your Photo to the best of all time favorite

A diagram of a ten-node network that uses ten routers

Answers

The diagram of the of a ten-node network that uses ten routers is given in the image attached.

What is a node in a network?

A network node is known to be be seen as the kind of connection point that is seen amidst some network devices such as routers, printers, etc.

Note that they are known to often receive and send data from one network or endpoint to another.

Therefore, The diagram of the of a ten-node network that uses ten routers is given in the image attached.

Learn more about routers from

https://brainly.com/question/24812743

#SPJ1

A diagram of a ten-node network that uses ten routers
A diagram of a ten-node network that uses ten routers

TO EXIT WORD YOU CLICK WHAT

Answers

File > Close
(Or the X in the corner?)

Answer:

To exit Word, you can click on the "File" menu and then click "Exit" or "Close".

if A = 5 i + j abd B = 2k then A - B in equal to​

Answers

the answer is A-B=5i+j-2k

Your friend Alicia says to you, “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I don’t think I’m going to do that.” How would you respond to Alicia? Explain.

Answers

Since my friend said  “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I will respond to Alicia that it is very easy that it does not have to be hard and there are a lot of resume template that are online that can help her to create a task free resume.

What is a resume builder?

A resume builder is seen as a form of online app or kind of software that helps to provides a lot of people with interactive forms as well as templates for creating a resume quickly and very easily.

There is the use of Zety Resume Maker as an example that helps to offers tips as well as suggestions to help you make each resume section fast.

Note that the Resume Builder often helps to formats your documents in an automatic way  every time you make any change.

Learn more about resume template from

https://brainly.com/question/14218463
#SPJ1

The OpenMP critical-section compiler directive is generally considered easier to use than standard mutex locks, because

Answers

Complete question

A) management of entry and exit code is managed by OpenMP library reducing the possibility of programming errors.

B) programmers don't need to worry about race conditions.

C) a thread cannot block inside a critical section.

D) deadlock cannot occur.

Answer:

A. Management of entry and exit code is managed by OpenMP library reducing the possibility of programming errors

Explanation:

This is a multiple choice question and this is the answer because:

1. OpenMp is inclusive of an APL/compiler directives:

2. any code which follows #pragma omp parallel is a parallel region and it is performed by large number of threads that are same as the number of processing cores that are in the system.

3. The critical-section compiler directive acts more like a binary semaphore or mutex lock,it makes sure that only one thread is active in the critical section at the same time.

Choose all of the items that accurately describe an operating system.

manages a computer’s hardware

implements essential features like file and folder management

is managed by the microprocessor (CPU)

provides the platform that application software runs on

is not necessary on a smartphone

Answers

Answer:

provides the platform that application software runs on, manages a computer's hardware, and implements features like file and folder management.

Explanation:

The operating system manages a computer’s hardware, provides the platform that application software runs on and implements essential features like file and folder management. The correct options are a, b, and d.

What is operating system?

An operating system (OS) is the program that manages all of the other application programs in a computer after being loaded into the computer by a boot program.

The application programs interact with the operating system by requesting services via a predefined application program interface (API).

The operating system (OS) controls all of the computer's software and hardware. It manages files, memory, and processes, handles input and output, and controls peripheral devices such as disk drives and printers.

The operating system manages the hardware of a computer, provides the platform on which application software runs, and implements essential features such as file and folder management.

Thus, the correct options are a, b, and d.

For more details regarding operating system, visit:

https://brainly.com/question/6689423

#SPJ2

state two advantage of using the internet

Answers

Answer:

Seemless communication with other parts of the world

Being able to share files easily

Explanation:

Answer:

communicate with family.

Able to get information from the internet.

Which phrase is the best definition of a transistor?

Answers

Answer: Electronics

Explanation: A semiconductor device that amplifies, oscillates, or switches the flow of current between two terminals by varying the current or voltage between one of the terminals and a third: although much smaller in size than a vacuum tube, it performs similar functions without requiring current to heat a cathode.

Martin plays video games for 9 hours a day. He spends 3 hours sitting on a dining chair playing games on his X-Box Series X, and 6 hours sitting on his bed playing games on his laptop. He has started to complain about excruciating pain in his back. What advice would you give him to reduce this pain, based on his daily gaming activities?​

Answers

Martin seems to play too much on his devices. Furthermore, it isn't shocking to hear his back hurts. I would advise him to cut the game time he exerts in a row. In other words, he needs to stop playing games for that long straight. He should not play for 9 hours straight.

The main reason Martin's back aches is because of the lack of movement and placing his back on a surface for an extended amount of time.

If he takes breaks between his 6-hour game time, he would have done other activities causing him to move around.

I would tell him to sit himself up, get pills, go to the doctor, get some kind of back brace, etc

what is another word for low level language​

Answers

Answer:

machine code or assembly language

Explanation:

Because of the low abstraction between the language and machine language, low-level languages are described as "close to the hardware"

wikipedia

Answer:

Another word for Low Level Language is 'Machine-Oriented Language'.

there are two types of Low Level Languages:

1 ) Machine Language

2) Assembly Language

hope that helps...

pls i need help will hive 10 points

pls i need help will hive 10 points

Answers

Answer:

What exactly do you need help with

Walt needs to ensure that messages from colleague in another organization are never incorrectly identified as spam. What should he do?
- configure a safe recipient
- configure a blocked sender
- configure a safe sender
- do nothing

Answers

Answer:

Configure a safe sender.

Explanation:

Spam is a computer term that designates unwanted messages in an email, as well as advertising messages on websites. The main characteristic of these messages is that they do not respond to any previous action on the part of the receiver, such as a conversation with the sender or an advertisement that arises from search engine algorithms, but is sent randomly by an anonymous sender with objectives that are not entirely clear or legitimate.

Therefore, if Walt wishes that his colleague's messages are not classified as spam, he must categorize this person as a safe sender within his email box.

Multimedia Presentation: Mastery Test
Select the correct answer.
Helen wants to use actual voice testimonials of happy employees from her company in her presentation. What is the best way for her to use these
testimonials in the presentation?
OA. She can provide a link in her presentation where the audience can listen to the testimonials.
She can ask the employees to write down their thoughts for the presentation.
She can record the testimonials directly in her presentation.
D. She can read out the testimonials from a transcript.
B.
O C.
Reset
>
Next

Answers

The best way for Helen to use actual voice testimonials of happy employees from her company in her presentation is A) She can provide a link in her presentation where the audience can listen to the testimonials.

Using actual voice testimonials adds authenticity and credibility to Helen's presentation.

By providing a link, she allows the audience to directly hear the employees' voices and genuine expressions of satisfaction.

This approach has several advantages:

1)Audio Engagement: Listening to the testimonials in the employees' own voices creates a more engaging experience for the audience.

The tone, emotions, and enthusiasm conveyed through voice can have a powerful impact, making the testimonials more relatable and persuasive.

2)Employee Representation: By including actual voice testimonials, Helen gives her colleagues an opportunity to have their voices heard and to share their positive experiences.

This approach emphasizes the importance of employee perspectives and allows them to become active participants in the presentation.

3)Convenience and Accessibility: Providing a link allows the audience to access the testimonials at their own convenience.

They can listen to the testimonials during or after the presentation, depending on their preferences.

It also allows for easy sharing and revisiting of the testimonials.

4)Time Management: Including voice testimonials via a link enables Helen to efficiently manage the timing of her presentation.

She can allocate the appropriate time for other aspects of her talk while still giving the audience access to the full testimonials, without the need to rush or omit important information.

For more questions on presentation

https://brainly.com/question/24653274

#SPJ8

Java Homework:(The Person, Student, Employee, Faculty, and Staff classes) Design a class named Person and its two subclasses named Student andEmployee. Make Faculty and Staff subclasses of Employee. A person has a name, address, phone number, and email address. A student has a class status (freshman, sophomore, junior, or senior). Define the status as a constant. An employee has an office, salary, and date-hired. Define a class named MyDate that contains the fields year, month, and day. A faculty member has office hours and a rank. A staff member has a title. Override the toString method in each class to display the class name and the person's name.
class Person{
//A person has a name, address, phone number, and email address.
String name;
String address;
String phone;
String email;
}
class Student extends Person{
//A student has a class status
//(freshman,sophomore, junior, or senior).
//Define the status as a constant.
final int freshman =1;
final int sophomore =2;
final int junior=3;
final int senior=4;
int status=freshman;
}
class Employee extends Person{
//An employee has an office, salary, and date hired.
String office;
double salary;
java.util.Date dateHired;
}
class Faculty extends Employee{
//A faculty member has office hours and a rank.
String officeHours;
String rank;
}
class Staff extends Employee{
//A staff member has a title
String title;
}
public class ex112{
}
The outline is given above. Fill in between brackets to finish! Thank you :)

Answers

Answer: Wait, so what is the question exactly..?

What is an efficiency target? Give an example of setting an efficiency target

Answers

Answer:

Goals help provide our everyday lives with structure, and operate similarly at the institutional level, offering organizations a low cost method of encouraging motivation, communication and accountability. In short, goals help organizations to achieve a variety of ends—including the reduction of energy waste.

Energy efficiency improvement goals, also known as energy efficiency targets, are intended reductions in energy over a specified time frame that have been defined in a SMART manner. Targets are useful because they can encourage decision makers to improve the use of energy in their communities and operations. Moreover, energy efficiency targets can have short or long term timeframes and can be implemented on various scales, ranging from the national level down to individual buildings. Cities should explore both mandatory public sector targets and voluntary private sector targets to forge energy-efficient communities.

Compression algorithms vary in how much they can reduce the size of a document.
Which of the following would likely be the hardest to compress?
Choose 1 answer:

A. The Declaration of Independence

B. The lyrics to all of the songs by The Beatles

C. A document of randomly generated letters

D. A book of nursery rhymes for children

Answers

b the lyrics to all of the songs by the beatles !

The statement that represents the thing that would likely be the hardest to compress is a document of randomly generated letters. Thus, the most valid option for this question is C.

What is an Algorithm?

An algorithm may be characterized as a type of methodology that is significantly utilized for solving a problem or performing a computation with respect to any numerical problems.

According to the context of this question, an algorithm is a set of instructions that allows a user to perform solutions with respect to several numerical and other program-related queries. It can significantly act as an accurate list of instructions that conduct particular actions step by step in either hardware- or software-based routines.

Therefore, the statement that represents the thing that would likely be the hardest to compress is a document of randomly generated letters. Thus, the most valid option for this question is C.

To learn more about Algorithms, refer to the link:

https://brainly.com/question/24953880

#SPJ3

what is flow chart for which purpose flowchart is use in programmimg

Answers

A flowchart is a visual representation of a process or algorithm. It uses symbols and arrows to show the steps and the flow of the process. In programming, flowcharts are often used to design and document the logic of a program before it is written in code. They can help programmers visualize the structure of the program and identify potential problems or inefficiencies. Flowcharts can also be useful for explaining the logic of a program to others who may not be familiar with the code..

information about computer​

Answers

Answer:

computer is electronic needs battery

Scientist need a computer program that can help them calculate the work done in joules. The program should prompt a scientist to enter an object’s Force in newton and distance in kilogram. The program should keep prompting the user to enter a positive value so long as the value entered for the Force is negative The program should then calculate and displays its workdone . If the workdone more than 5000 joules, display a message indicating that The force is too much, if it is less than or equal to 5000 joules display a message indicating that force is too light.

Write a Pseudocode and draw a flowchart for the program

Answers

The pseudocode and the flowchart based on the question requirements are given below:

Pseudocode:

Prompt the scientist to enter the Force in newtons.

If the entered Force is negative, go back to step 1 and prompt again.

Prompt the scientist to enter the distance in kilograms.

Calculate the work done using the formula: workdone = Force * distance.

If workdone > 5000, display "The force is too much."

If workdone <= 5000, display "The force is too light."

Flowchart:

[Start] -> [Prompt Force]

[Check Force]

[Prompt Distance]

[Calculate workdone]

[Check workdone]

[Display appropriate message]

[End]

Read more about pseudocode here:

https://brainly.com/question/24953880
#SPJ1

what is a survey? plz hel​

what is a survey? plz hel

Answers

Answer:

The act of seeing and recording information.

Answer:

a method of collecting data tell me if  i'm wrong or right plz

Explanation:

Select the correct answer from each drop-down menu.
How would you define the rule of thirds?
The rule of thirds is an important feature of
This rule suggests that you must
This is where you should place the
Reset
Next
portions of text or an image.

Answers

The rule of thirds is an important feature of composition in visual arts, such as photography, painting, and design.

This rule suggests that you must divide an image into nine equal parts by imagining two equally spaced horizontal lines and two equally spaced vertical lines. These lines create four intersection points, known as the power points or points of interest.

This rule emphasizes that you should place the key elements or points of interest in the image along these lines or at the intersection points. By doing so, the composition becomes more visually appealing and balanced. It adds dynamism and guides the viewer's eye through the image, creating a sense of harmony and interest.

The rule of thirds is based on the idea that placing the main subjects or focal points off-center creates a more visually pleasing and engaging composition compared to placing them at the center. It allows for more negative space and encourages the viewer to explore the entire image, rather than focusing solely on the center.

In photography, this rule can be applied to various elements, such as landscapes, portraits, and still life. For example, placing the horizon on one of the horizontal lines rather than in the center can create a more balanced and captivating composition. In portraits, aligning the subject's eyes or face along the vertical lines can enhance the overall visual impact.

In summary, the rule of thirds is a composition guideline that suggests dividing an image into nine equal parts and placing the key elements or points of interest along the lines or at the intersection points. It is a valuable technique used by visual artists to create visually pleasing and well-balanced compositions.

For more questions on  visual arts,

https://brainly.com/question/30828226

#SPJ11

What should you do to avoid cheating in online classes, even if your behavior was unintentional?

Answers

Answer:

answer in picture below for edge 2022

Explanation:

posting because i couldnt find good answers for myself

What should you do to avoid cheating in online classes, even if your behavior was unintentional?
Other Questions
PLEASE HELP ITS DUE SOON, ILL GIVE BRAINLEST Given a || b. please help me on this Which equation represents a line which is parallel to the line 4y-3x=-8 What did the military dictatorships of Germany, Italy, and Japan want to accomplish in the 1930s? the ankle is in plantar flexion at heel strike during normal gait. question 1 options: true false When writing a research-based argumentative essay, it is important to remember thatO people may disagree with the essay's opinion.personal opinions are enough to support a claim.most causes are unpopular with readers.O all readers must agree with the essay's topic. If the amount of greenhouse gases in the atmosphere increases, more heat may be trapped in the atmosphere, resulting in an increase of average surface temperature.1. True2. False What are common consequences of a manager making the wrong decision? (choose every correct answer.) need help with functions A person receives an absorbed dose of protons of 20 millirads. The RBE of protons is 5. What is this person's equivalent dose in rem Here is a picture to show the question: Describe the difficulties Amir faces in his attempt to rescue sohrab (from the time he agrees to go to Afghanistan until sohrab is out of the country ) you must write thesis statement in the first sentence of the first paragraph . Use your own word , and get to the point . don Three kinds of power associated with empowerment Social - access to "bases;" needed to gain political power Political - power of voice and collective action Psychological individual sense of potency . After the battle of the Marne in 1914, German forces realized that victory To receive credit: answer all questions completely and write about 300 words total. (300 words = 2/3 of a page single-spaced,Questions/Prompts: 1. Choose one specific business or brand that you patronize as a customer that falls under 'the creative economy". What is the business/brand and what creative jobs do it support? Specifically, name the network of jobs (think about the network of careers that it takes to make the business or product work) you believe support the brand. Identify how ideas, skilled production, business, and collaboration are an active (or inactive) part of the examples you give.2. What is the role of art education in the creative economy? Do you believe it is important? Why or why not? Cite specific examples from the learning activity to support your argument, or argue against.Image Scavenger Hunt! Requirements: Upload 3 images Write 1-2 sentences per image. Select 3 design principles* from the list below. Search for and embed one image for each selected principal: Balance/Alignment Contrast Emphasis Proportion Pattern/Repetition Gradation Movement *Remember design principles are the recipe! Describe what design elements and/or gestalt principles are present in each image, and how they are working.Design Elements: (These are the ingredients) Line Shape Form Size Space Color Texture Value Gestalt Principles: (An extension of Design Principles)Keywords to include in your analysis: Point Line Direction Weight Gesture Shape Geometric/Regular Organic/Irregular Contrast Juxtaposition Tension Color Hue Saturation Value Composition Radial Symmetrical Asymmetrical Emphasis Focal Point Scale Rhythm Repetition Variation Pattern Repetition Variation Type Serif Sanserif Form - Positive Space Negative Space Texture Matte Glossy Rough Smooth Harmony Simplicity For the first few years, the triazine works well and almost all the pigweed dies; but after several years, the farmer sees more and more pigweed. Which of these explanations best describes this observation? Write a 100- to 150-word paragraph explaining your opinion on the relationship between medievaluniversities and modern universities. Are they more alike to one another, or are they more different? Doyou think that medieval universities were the basis for modern universities? Why or why not? Be sure toinclude facts from your readings in your answer. Find the number of moles in 452L of NH3 atSTP The policy of targeting the leadership of Mexicos drug cartels resulted in the cartels battling within and among themselves to reestablish supremacy. Over 100,000 have been killed in the cartel fighting (many of them civilians, police, politicians, and media) over the last 15 years. Is it more appropriate to address the drug problem of the U.S. from a public health perspective than from a law enforcement perspective? Should we simply end the war on drugs, recognize we have a problem with drug abuse, treat it as a disease, and allow the Mexican supply system to stabilize under new leadership; thereby, bringing to an end the major war (hidden from public view by American media) on our southern border?