uppose that the log-based immediate-update technique is employed. describe the recovery process when a system crash occurs at time

Answers

Answer 1

Data backups or recovery methods based on delayed and immediate updates can be employed to prevent data loss.

What are the data-base recovery technique?

Although database systems can fail, just like any other type of computer system, the information contained inside must always be accessible. A database must have the tools necessary for quick recovery in the event of failure. It must also be atomic, meaning that either the transaction has no impact on the database or it is properly finished and committed (the effect is permanently recorded in the database).

Both data backup and recovery from failure conditions can be done in automatic and non-automatic ways. Database recovery procedures are methods for recovering data that has been lost as a result of system crashes, transaction errors, viruses, catastrophic failure, improper command execution, etc.

Therefore, it is possible to apply data backup strategies or recovery methods based on deferred update and immediate update. The availability of a unique file called a system log is crucial for recovery methods.

When a system crashes, item is searched back through the log for all transactions T that have written a start transaction(T) entry into the log but have not yet written a commit(T) entry; these transactions might need to be rolled back in order to reverse their effects on the database during the recovery process.

UndoingPostponed updatecurrent updateCaching/BufferingDark pagingReverse RecoveryMoving Forward

Here are a few examples of backup methods:

a complete database backupcontrasting backupbackup of transaction logs

Hence, Data backups or recovery methods based on delayed and immediate updates can be employed to prevent data loss.

To learn more about data base recover techniques refer to:

https://brainly.com/question/25644005

#SPJ4


Related Questions

a detailed system specification is part of the ____ phase of the sdlc.

Answers

A detailed system specification is part of the requirements phase of the sdlc.Software Development Life Cycle (SDLC) is a method for designing and developing software applications. SDLC provides a method for creating software that ensures efficiency and accuracy.

What is SDLC?

SDLC stands for Software Development Life Cycle. It is a process used by the software industry to plan, design, develop, test, and deploy software. It is a detailed method that assists in the smooth running of software development projects.

What is a system specification?

System specification is a document that describes the functional and non-functional requirements of a software system. The system specification document also outlines the system's architecture, user interface, data structures, algorithms, and security features. In other words, it is a document that provides an overall understanding of the software system.

What is the Design phase of SDLC?

The design phase of the software development life cycle is the third phase after the Planning phase. The objective of this phase is to design a detailed blueprint of the proposed system. This phase is critical because it specifies how the software system will operate. The design phase focuses on creating a blueprint for the software system by defining all of the system's components and how they will interact.A detailed system specification is part of the Design phase of the SDLC. The system specification created in this phase is a critical input for the implementation phase of SDLC.

Learn more about System Development Life Cycle at https://brainly.com/question/28498601

#SPJ11

Detailed system specification is part of the ____ phase of the SDLC.

Which Application program saves data automatically as it is entered?
MS Word
PowerPoint
MS Access
MS Excel

Answers

The application program that saves data automatically as it is entered is the MS Access.

The Application program that saves data automatically as it is entered MS Access. The correct option is C.

What is MS Access?

Microsoft Access is a database management system that includes a graphical user interface, the relational Access Database Engine, and software-development tools.

It is a component of the Microsoft 365 software package and is available as a standalone product or as part of the Professional and higher editions.

Data kept in Access may be found and reported on with ease. Make interactive data entry forms. a variety of data sources can be imported, transformed, and exported.

Access is often more effective at managing data because it makes it easier to keep it structured, searchable, and accessible to several users at once.

MS Access is an application tool that automatically saves data as it is entered.

Thus, the correct option is C.

For more details regarding MS access, visit:

https://brainly.com/question/17135884

#SPJ2

Which Annotation tool provides the ability to convert the mouse icon when giving a presentation to better focus the
audience attention?
O Arrow
0 Ink Color
O Eraser
O Laser Pointer

Answers

Answer:

Laser Pointer

Explanation:

What is the first step when designing an algorithm?

Answers

Answer:

Explanation:

This process requires the following steps:

1. Analysis of the problem.

2. Design or development of an algorithm.

3. Transformation of the algorithm into a program (coding).

4. Program execution and validation

While designing an algorithm the first step will be Analysis of the problem. Than design or development of an algorithm will be the next step.

What is algorithm?

An algorithm is the procedure used for solving the problem or performing a computation. Algorithms act as an exact list of instructions that conduct specified actions step by step in either hardware- or software-based routines.

Algorithms are widely used throughout all areas of IT. In mathematics and computer science, an algorithm usually refers to a small procedure that solves a recurrent problem. Algorithms are also used as specifications for performing data processing and play a major role in automated systems.

An algorithm could be used for sorting sets of numbers or for more complicated tasks, like recommending user content on social media. Algorithms typically start with initial input and instructions that describe a specific computation.

Therefore, While designing an algorithm the first step will be Analysis of the problem. Than design or development of an algorithm will be the next step.

Learn more about algorithm on:

https://brainly.com/question/22984934

#SPJ2

Laura is confused with the spelling of the word pronunciation. She types the word as pronounciation throughout a document. Which feature of the Autocorrect tool should she use, so that the word processor automatically corrects all instances of the word

Answers

Answer:

CHANGE all

Explanation:

i took the test

Laura is confused with the spelling of the word pronunciation, and she can use the "AutoCorrect" feature of the word processor to automatically correct all instances of the misspelled word "pronounciation" to the correct spelling "pronunciation."

What is autocorrect?

The "AutoCorrect" feature in a word processor is a useful tool that automatically corrects common spelling and typing errors, and in this case, Laura misspelled the word "pronunciation" as "pronounciation" multiple times in her document. So for this, she can follow the steps

Opening the word processor and going to "File" > "Options"In the "Options" (or "Preferences") dialog box, selecting "Proofing" or "AutoCorrect Options."In the "AutoCorrect" tab, under "Replace text ," typing "pronounciation" in the "Replace" field and "pronunciation" in the "With" field. Clicking "Add" and then "OK" to save the AutoCorrect entry. and after following all these steps, she can change it.

Hence,  she can use the "AutoCorrect" feature of the word processor to automatically correct all instances of the misspelled word "pronounciation" to the correct spelling "pronunciation."

Learn more about autocorrect here.

https://brainly.com/question/2092079

#SPJ7

help
If we are looking at the predictor "car type," which can take on the values "sedan" "coupe" "truck" "suv" "van" how many binary decision variables would we need to code this data into a usable format?

Answers

If we are looking at the predictor "car type," which can take on the values "sedan" "coupe" "truck" "suv" "van", we would need 4 binary decision variables to code this data into a usable format.

A binary decision variable is a variable with only two possible values: 1 or 0. The variable is referred to as a binary variable, a binary indicator, or a 0-1 variable .The binary variable is used to answer yes/no questions. the binary variable " the binary variable is set to 0.To code the car type data into a usable format, we can use the binary decision variables.

We can use four binary variables to code the data into a usable format. We can use one variable for each category of car type. The values of the binary variables for the different categories are as follows:Sedan - 1000Coupe - 0100Truck - 0010SUV - 0001Using this format, if a car is a sedan, its binary decision variable would be set to 1000. If a car is a coupe, its binary decision variable would be set to 0100, and so on.

To know more about sedan visit:

https://brainly.com/question/24286177

SPJ11

you work as a system administrator for a small company that uses windows 10 for its computers. you want the windows 10 clients to access and get their

Answers

As a system administrator for a small company using Windows 10, there are several ways to ensure that Windows 10 clients can access and retrieve their files. This approach allows for centralized file management and enhances productivity. Here's a step-by-step guide:

1. Set up a file server: Install and configure a file server on your network. This server will store and manage the files that clients need to access.

2. Create user accounts: Set up user accounts for each client on the file server. Assign appropriate permissions and access levels to ensure that clients can only access their own files.

3. Share folders: Share the folders on the file server that contain the clients' files. This can be done by right-clicking on the folder, selecting "Properties," and navigating to the "Sharing" tab.

4. Map network drives: On each Windows 10 client, map the shared folders from the file server as network drives. This allows clients to easily access their files through File Explorer.

5. Access files: Clients can now access their files by opening File Explorer and navigating to the mapped network drive. They can open, edit, and save files as needed.

By following these steps, Windows 10 clients in your small company will be able to access and retrieve their files efficiently.

To know more about administrator visit:

https://brainly.com/question/33766641

#SPJ11

how does air conditioner work
please short answer please​

Answers

It draws the warm/ hot air from inside to outside and the AC unit (usually outside) turns the vapor into a liquid which removes any excess heat. (This is the way I learned it)
The air conditioner in a central heating and cooling system provides cool air through ductwork inside your home, by providing a process that draws out the warm air inside, removing its heat.

Karen wants to create a program that will allow the user to input their age. Which of these lines of code should be used?
print("What is your age?")
age = ("What is your age?")
age = input("What is your age?")
age = ask("What is your age?")

Answers

Answer: age = input("What is your age?")

Explanation: Since this is the syntax for inputing a variable and storing it as age

Answer:

Answer is age=input(what is your age)

Explanation: Its right because age=input your inputting your age and what is asking you hopefully it helped have a good day :)

What are the routes through with Virus transmitted into computer
system?​

Answers

Answer:

Computer viruses usually spread in one of three ways: from removable media; from downloads off the internet; and from email attachments. Although the internet gets a bad rap as a source of viruses, you're no more likely to contract a virus from the Web than you are from packaged software.

Explanation:

can I get brainliest please

which Yandere Simulator update removed the box of matches?

Answers

Answer:

Fixed the glitchy physics of Yandere-chan’s latest hairstyle. Removed exploit that allowed players to keep a character stationary indefinitely by talking to a student about their Task and never dismissing the Task Window. Adjusted the pathfinding grid so that it should be less likely for a student’s path to the male locker room to be blocked.

Explanation:

Answer:

i couldnt find the exact year but heres a list of bug fixes n stuff if this helps

Explanation:

https://yandere-simulator.fandom.com/wiki/Update_History


From Make a standard TM M1 which moves an input string
consisting of a’s and b’s one position to the right. specify the
input string as a language using set-builder notation.

Answers

The question requires us to make a standard TM M1 that moves an input string consisting of a's and b's one position to the right. We need to specify the input string as a language using set-builder notation.

To create a standard TM M1 which moves an input string consisting of a's and b's one position to the right, we need to follow these

1. Let the input string be 'w', and let |w| be its length.

2. Initialize a pointer 'i' to 0.

3. The tape is formatted with a blank symbol 'B' followed by the input string 'w', followed by another blank symbol 'B'. The pointer is initially pointing to the leftmost B symbol.

4. We start from the leftmost end of the string, which is the B on the left.

5. The machine reads the symbol underneath the pointer.

6. If the symbol is 'a' or 'b', the machine moves the pointer one step to the right, writes the same symbol that was read, and then moves one step back to the left.

7. The machine then moves one step to the right and repeats step 6, continuing until it reaches the rightmost end of the string, which is the B on the right.

8. At that point, the machine halts and accepts the input string.

The input string can be specified as a language using set-builder notation as follows:

{w | w = aⁱbʲ, i, j ≥ 0, i + j > 0}

In this notation, 'w' is a string consisting of 0 or more 'a' symbols, followed by 1 or more 'b' symbols.

The requirement that 'i + j > 0' ensures that the string is not empty.

To know more about requires visit:

https://brainly.com/question/2929431

#SPJ11

Which of the following is NOT an advantage of database systems?

Redundant data

Program-data independence

Better data quality

Reduced program maintenance

Answers

Redundant data is NOT an advantage of database systems. Database systems offer numerous advantages for managing data efficiently.

Redundant data, however, is not one of them. Redundancy refers to the duplication of data, which can lead to several problems in a database system. It consumes extra storage space, increases the risk of data inconsistency, and complicates data maintenance and updates. In contrast, database systems aim to minimize redundancy by promoting data normalization and providing mechanisms for data integrity and consistency.

Program-data independence is one of the advantages of database systems. It refers to the separation of the application programs from the physical aspects of data storage and access. This allows for flexibility and scalability, as changes in the database structure do not require modifying all the application programs. It also enables concurrent access to data by multiple users and provides data security and privacy controls.

Better data quality is another advantage of database systems. Centralized data management allows for data validation and integrity checks, ensuring that the data entered into the system is accurate, complete, and consistent. This leads to improved decision-making, as users can rely on the quality of the data stored in the database.

Reduced program maintenance is yet another advantage of database systems. With a well-designed database system, program maintenance becomes easier and more efficient. Changes to data structures or access methods can be handled at the database level without requiring modifications to all the associated programs. This reduces the time, effort, and potential errors associated with program updates and maintenance.

In summary, while redundant data is not an advantage, database systems provide benefits such as program-data independence, better data quality, and reduced program maintenance.

Learn more about Database here:

https://brainly.com/question/29412324

#SPJ11

What can handle work that is hard on a person and could cause repetitive injuries?

Answers

The robot which can handle work that is hard on a person and could cause repetitive injuries is a: Cobot.

Artificial intelligence (AI) is also referred to as machine learning and it can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing and handling tasks that are exclusively designed to be performed by humans or with human intelligence.

A cobot is an intelligent robot that is designed and developed to perform and handle work that may be too hard (difficult) and hazardous for a person or could cause repetitive injuries to him or her.

Read more: https://brainly.com/question/21656851

outline the operation of aes as defined in fips 197. in your outline, list each step in the execution of the algorithm. explain in detail why or why not aes may be considered a feistel network.

Answers

The Advanced Encryption Standard (AES) is a symmetric block cipher defined in the Federal Information Processing Standards Publication 197 (FIPS 197). It operates on 128-bit blocks of data and supports key sizes of 128, 192, and 256 bits. The algorithm consists of four main steps: Key Expansion, Initial Round, Main Rounds, and Final Round.

1. Key Expansion: This step derives round keys from the cipher key. These round keys are used during the encryption process. 2. Initial Round: The input plaintext is XORed with the initial round key. 3. Main Rounds: A series of transformations are applied to the data in each round. These transformations include: a. SubBytes: A non-linear byte substitution using a fixed lookup table called the S-box. b. ShiftRows: A transposition step where each row of the state matrix is shifted by a certain offset. c. MixColumns: A linear mixing operation that combines the data of each column in the state matrix. d. AddRoundKey: The round key is XORed with the state matrix. 4. Final Round: After the last main round, the final round consists of SubBytes, ShiftRows, and AddRoundKey transformations.

AES is not considered a Feistel network because it does not follow the Feistel structure of dividing data into halves and applying a substitution-permutation network. Instead, AES applies a series of operations on the entire data block. Feistel networks provide the advantage of using the same algorithm for both encryption and decryption, while AES requires separate encryption and decryption algorithms due to its design. Thus, AES is a distinct type of block cipher that provides strong security through its non-Feistel structure.

Learn more about Advanced Encryption Standard here-

https://brainly.com/question/31925688

#SPJ11

Why are Quick Parts useful in an Outlook message?

Spreadsheet data sources can be hyperlinked to an email message.
Stored text and graphics can be quickly inserted into an email message.
A gallery of shapes will open up, and you can quickly choose one to insert.
Highlighted parts of Word documents can be inserted into a message body.

Answers

Answer:

I hope the picture helped

Why are Quick Parts useful in an Outlook message?Spreadsheet data sources can be hyperlinked to an email

Answer:

B. stored text and graphics can be quickly inserted into an email message

Explanation:

Edge 2021

A design technique that programmers use to break down an algorithm into functions is known as __________.
a. top-down design
b. code simplification
c. code refactoring
d. hierarchical subtasking

Answers

A design technique that programmers use to break down an algorithm into functions is known as option a. top-down design

What does top-down design mean?

Both top-down and bottom-up information processing and knowledge ordering procedures are employed in a wide range of contexts, including software, humanistic and scientific ideas, management, and organizational structures.

Therefore, in the context of the above, a top-down design is when a system is broken down into smaller pieces to better understand its constituent sub-systems. When a system is planned top-down, its overview is specified but no first-level subsystems are detailed.

Learn more about design technique from

https://brainly.com/question/1246414
#SPJ1

five example of hybrid computer?

Answers

Answer:

gasoline stationelectrocardiogram machine ultrasound machine monitoring machine research and production industries

Explanation:

hope this is useful for u

A favorably adjudicated background investigation is required for access to classified information

a. True
b. False

Answers

A favorably adjudicated background investigation is required for access to classified information: A. True.

What is a classified source material?

In Computer technology, a classified source material is sometimes referred to as classified information and it  can be defined as an information source that comprises very important, restricted, and sensitive information that must only be shared and disseminated secretly with authorized persons.

What is an adjudicative process?

In Computer technology, an adjudicative process can be defined as a strategic process which typically involves an examination and background investigation of a sufficient period of the life of a person, in order to make an affirmative determination that he or she is eligible for a security clearance and access to a classified source material or classified information.  

Read more on classified source material here: brainly.com/question/15346759

#SPJ1

1: the mean time to failure (mttf) of a single disk is 400,000 hours. if a raid 0 array is using 5 such disks, what is the mttf (with failure defined as the loss of any data) of the entire array?

Answers

A single disk's mean time to failure (mttf) is 400,000 hours. The MTTF of the entire array is 80000 hours if a raid 0 array uses 5 such disks.

What is MTTF ?

A maintenance metric called mean time to failure (MTTF) counts how long an unrepairable item typically lasts before failing. MTTF can alternatively be regarded as an asset's average lifespan because it only applies to equipment and assets that cannot or should not be fixed. There are a number of circumstances in which an asset might not be fixed, but the most frequent one is because replacing the asset is less expensive and time-consuming. For instance, it is probably more cost-effective to replace a tire that costs a few hundred dollars in labor and parts than to remove the wheel and attempt to repair it. Simply said, it's not worth the time or money.

To know more about MTTF, visit

https://brainly.com/question/11005847

#SPJ4

What is the default administrative distance of a static route within the PAN‐OS ® software?
A. 1
B. 5
C. 10
D. 100

Answers

The default administrative distance of a static route within the PAN-OS software is D. 100. Administrative distance is a measure of the trustworthiness of a routing protocol or a static route. It is used by routers to select the best path when there are two or more routes to the same destination. A lower administrative distance means that the router trusts the route more than a route with a higher administrative distance.

In the case of the PAN-OS software, the default administrative distance for static routes is 100. This means that if there are two routes to the same destination, one learned from a dynamic routing protocol and one configured as a static route with an administrative distance of 100, the router will choose the dynamic route because it has a lower administrative distance.

It's important to note that the administrative distance can be changed to meet specific requirements. For example, if there is a need to prefer a static route over a dynamic route, the administrative distance of the static route can be lowered to a value of less than 100.

Distance is also an important factor when it comes to routing over a network. Distance refers to the length of the path between two points. In routing, the distance can refer to the number of routers that a packet must pass through to reach its destination. The distance can affect the performance of the network, especially in cases where there are long distances or high network traffic.

Learn more about administrative here:

https://brainly.com/question/31152656

#SPJ11

difference between integrated package and software suite​

Answers

Answer:

1) Low cost. It is affordable for the small business.

2) Convenient. An integrated package lets users juggle multiple tasks with similar ease. Switching between the individual applications in an integrated package usually requires a few keystrokes or mouse clicks.

3)Able to share information between modules. As its name implies that integrated packages typically make it easy to transfer, integrated data from one application to another. For example, after making financial calculations in a spreadsheet, we could copy the results directly into a project proposal being written with the word-processing module.

4)Each individual modules generally share a similar command structure. For this reason, procedures learned in one module can be applied to other activities as well.

Explanation:

Describe how computer simulations have helped to improve mathematical models and the significance they play in developing solutions.

Answers

Answer:

Kindly check explanation

Explanation:

Simulation means the act of using computer programs to generate a replica of real world or intended rela life application which are being tested, monitored and adjusted over time. Simulated models have played a huge role in developing solutions that have been built and refined by these simulation softwares such that it is much more easier to test these models before coming to make a real life match for it. This often save cost and offers a faster way of building models as there is no need for physical coupling before generating the model. In filed such as health, simulation models of body parts and other fragile areas can be made withoutvthe need for a real human during testing or building.

There are different functions of computer. Computer simulations have become a useful part of mathematical modelling because they help in the;

Mathematical modelling of a lot of natural systems that are found in physics, chemistry and biology.

Mathematical modelling of a lot of human systems such as those found in economics, psychology, and social science etc.

They have help us to have a preview or insight into the various work or operation of those systems.

Computer simulations that are build models in science, technology and entertainment has help to save time and money, and allow man to do things that would be impossible to do before.

Learn more about computer simulations from

https://brainly.com/question/24912812

what invention allows people to share more information than just text on the internet?

Answers

The World Wide Web, or simply the web, is a technological advancement that enables individuals to exchange more information than just invention internet. The internet is a network of resources and

An innovation is a brand-new, practical creation or discovery that fills a gap in the market or solves a problem. It might be a tangible thing, a technique, a system, a process, or a concept that is either completely original or enhances one that already exists. Human development has been fueled by inventions, which have also influenced how we   innovation interact with the outside world. They have sparked important developments in a wide range of industries, including technology, health, transportation, and communication. From the wheel to the internet, innovations have influenced our culture and raised our standard

Learn more about  innovation here:

https://brainly.com/question/28453297

#SPJ4

A customer calls you and states that her laptop screen is very dim. In order to avoid going to the client's site, which of the following is the first action you should recommend to the customer to perform?
1. Use function keys
2. Set encryption
3. Restart the system
4. None of above

Answers

it depends on the brand of laptop,If it is standard use function key if not None of the above

what is the range of values used whe setting velocity?

A. 0% to 100%

B. -100% to 100%

C. 0% to 200%

D. -100% to 200%

Answers

Answer:

A. 0% to 100%

Explanation:

Velocity can be defined as the rate of change in displacement (distance) with time. Velocity is a vector quantity and as such it has both magnitude and direction.

Mathematically, velocity is given by the equation;

\( Velocity = \frac{distance}{time} \)

The range of values used when setting velocity is 0% to 100%.

Hence, when working on a virtual reality (VR) robot, you should use a range of 0% to 100% to the set the value of velocity. This range of values are used to denote the rate at which the robot moves i.e its forward and backward motion (movement).

I need to change the subject before they get onto me. I am only revealing info today if you are a friend.

Let's change the subject to the Tillinghan Mystery (Totally not related to the Dad Mystery)

Who is Tillinghan, and what is his website?

Answers

Answer:

uuuuummmm i have no idea what your doing but tillingan is a doctor and his website is to sell children over internet

Explanation:

im scared of myself ik

What is the relationship between technology and the "designed world"?​

Answers

Answer:

both help us to learn how products are designed and manufactured. and also helped us to be innovative,to make creative use of of a vairety of resourses

Explanation:

Write code using the range function to add up the series 15, 20, 25, 30, ... 50 and print the resulting sum each step along the way.
this is for coding please help
Expected Output
15
35
60
90
125
165
210
260

Answers

Answer:

Explanation:

Program (PascalABC) and Result:

Write code using the range function to add up the series 15, 20, 25, 30, ... 50 and print the resulting

Answer:

sum = 0

count = 0

for i in range(15, 55, 5):

   sum = sum + i

   print(sum)

Explanation: python <3

Tom teaches in a high school. He wishes to sort a spreadsheet containing students' marks in various subjects by descending order of total
marks. While sorting the spreadsheet, what do you do before clicking the Sort option from the menu?
OA
filter the data to sort
OB.
arrange the data alphabetically
O c. select the data to sort
OD.
look up the data to sort

Answers

Answer:

Select the data to sort

Explanation:

Other Questions
Why was Delhi a significant location for the sultanate that ruled from 1206 to 1526, especiallyafter the Mongol raids of the 1200s? The two triangles shown are congruent: ABC LMN.Based on this information, which of the following is a true statement?Question 15 options:A) B LB) imageC) A CD) Wait? if its a mitochondria what are the rest? I'm super confused. Elements of the natural law concept were incorporated into. What heading would you put the following excerpt under?My claim had only two trees and a small creek, nothing with which I could build a cabin. The nearest stand of trees was 30 miles away, too far to haul logs for a cabin.placetimekey figures Landscaping A landscape company charges $55 per hour for the work of a designer, $40 per hour for the work of a foreman, and $25 per hour for the work of a laborer. A particular installation required 6 hours of design work, 11 hours from the foreman, and 33 hours of labor. Write out a mathematical statement for calculating the total labor cost and then compute this cost. Choose the orbital diagram that represents the ground state of n Criteria are the goals the design must achieve. Theyre determined by what you want your tool or device to do. List at least two criteria for your tool or device based on the question, What do you want it to do? According to funder, in what way do personality psychologists appreciate individual differences? Becky made 4 stacks of wooden blocks. The first stack was 9 blocks tall. The second stack was 7 blocks taller than the first. The third stack was 8 blocks shorter than the second stack, and the last stack was 7 blocks taller than the third stack. How many blocks did Becky use in all? the natural resources of some companies include a.timber, metal ores, and minerals b.minerals, trademarks, and land c.metal ores, copyrights, and supplies d.timber, equipment, and patents When objects or colors are similar or alike they are considered ___________. a analogous b continuous c monochromatic d secondary Which protocol is open SCADA, operates at OSI layers 1,2 , and 7 , typically used by water and electrical utilities? a.DNP3 b.CIP c.ControlNet d.Devicenet A dearborn company has earning per share of $2.30, it paid a dividend of $1.60 per share, and the market price of the company's stock is $64 per share. The price/earnings ratio is closest to:_______a. 1.29b. 91.43c. 20.65d. 9.60 If the class throws a disguise party,Continue the sentence using if condition Which table represents the graph below?8642864-2X00-2-4do d-8-2 4y=2x36 8X From the maps, whenwas the last time the totalnumber of electoral voteschanged? What causedthis? Simon makes a model of a boat, using a scale of 1:30If the model has a height of 40 cm, find the height of the real boat.give your answers in metres Which artwork was made during the Renaissance? sentences in French and change it into plural