State OLLORS Assignment 5 uses of Database Management. Answer​

Answers

Answer 1

Database management has several important applications, including data storage and retrieval, data analysis, data integration, security management, and data backup and recovery.

One of the primary uses of database management is to store and retrieve data efficiently. Databases provide a structured framework for organizing and storing large volumes of data, allowing users to easily access and retrieve information when needed.

Another key application is data analysis, where databases enable the efficient processing and analysis of large datasets to derive meaningful insights and make informed decisions. Database management also plays a crucial role in data integration, allowing organizations to consolidate data from various sources into a single, unified view.

Additionally, database management systems include robust security features to ensure the confidentiality, integrity, and availability of data, protecting against unauthorized access and data breaches.

Finally, databases facilitate data backup and recovery processes, allowing organizations to create regular backups and restore data in the event of system failures, disasters, or data loss incidents.

Overall, database management systems provide essential tools and functionalities for effectively managing and leveraging data in various domains and industries.

For more questions on Database management

https://brainly.com/question/13266483

#SPJ8


Related Questions

You have a Direct Mapped cache with following parameters
Cache Data Size (C) 128
Block Size (b) 4
After partitioning the address, which is 32 bits big, into Tag, Set, and Offset, how many bits will be in each field?

Answers

Yes... so it would be 134 seeing as, 128 and 4 both common denominators.. and the offset would be to the 40%

What is a spreadsheet macro?

A) A small program which performs several steps, which can be recorded and activated using a hot key combination.

B) A tool used to create charts.

C) A feature inside excel that makes your work look better.

D) A formula to complete calculations.

Answers

Answer:

Macros are code that automate work in a program—they let you add your own tiny features and enhancements to help you accomplish exactly what you need to do, quickly with just a click of a button.

Explanation:

5. What are Excel cell references by default?
Relative references
Absolute references
Mixed references
Cell references must be assigned

Answers

Answer: relative references

Explanation:

By default, all cell references are RELATIVE REFERENCES. When copied across multiple cells, they change based on the relative position of rows and columns. For example, if you copy the formula =A1+B1 from row 1 to row 2, the formula will become =A2+B2.

Decide what activity is most appropriate based on the temperature. If the temperature is greater than 80 degrees, then display the message "Go swimming." If the temperature is between 60 and 80 degrees, display the message "Go biking". If the temperature is less than 60 degrees, display the message "Go for a walk". The input will be the temperature.

Answers

Answer:

Here is the C++ program:

#include <iostream> //to use input output functions

using namespace std; //to access objects like cin cout

int main(){// start of main function

   int temp; //declare a variable to store value for temperature

   cout<<"Enter temperature: "; //prompts user to enter temperature

   cin>>temp; //reads value of temp from user

   if(temp>80) //if temperature is greater than 80 degrees

     { cout<<"Go swimming";    } //displays Go swimming

   else if(temp<=80&&temp>=60) //if temperature is between 60 and 80

         {   cout<<"Go biking";    } //displays Go biking

   else //if temperature is less than 60 degress

   cout<<"Go for a walk"; } //displays Go for a walk

Explanation:

The program prompts the user to enter value of temperature. It stores the value of temperature in temp variable. Then the first if condition checks if the value of temp is greater than 80. If it evaluates to true, then the print statement inside the body of this if statement executes which is "Go swimming". If this condition evaluates to false then program moves to the else if condition which checks if the value of temp is between 60 and 80. There is a logical operator AND (&&) is used between both expressions to check temperature between two ranges. If it evaluates to true, then the print statement inside the body of this if statement executes which is "Go biking". If this condition evaluates to false then program moves to the else part which has a print statement that displays "Go for a walk" on output screen. The screenshot of program along with its output is attached.

Decide what activity is most appropriate based on the temperature. If the temperature is greater than

Name the processes that the information processing cycle consist of:​

Answers

Answer:

Hello Dear!...

Explanation:

The information-processing cycle consists of four basic operations: input, processing, output, and storage.

Hope that helps you Buddy..

Buhbye!

Take care!

Given storeMonthlySales NUM STOREST[NUM MONTHST[NUM DEPTS] is a three-dimensional array of floating point values. Write a C++ function, printMonthlySales, to calculate and print the total value of sales during a specific month by each department and in each store plus totals by store and department and overall sales. The return type of the function is void and the function must have 2 input parameters Sales array and the month the user specified (edit for correct month values!). The constants NUM STORES, NUM_MONTHS, and NUM_DEPTS must be accessed globally by defining the following global variables #define NUM DEPTS 2 #define NUM STORES 2 #define NUM-MONTHS 12 or const int NUM-MONTHS-12; or const in NUM_DEPTS 2; or const int NUM_STORES 2; The array Sales is initialized by the following statement within main() float storeMonthlySales[NUM STOREST[NUM MONTHS1[NUM DEPTS]- 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0, 3.1,3.2, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 4.0, 4.1, 4.2, 2.1, 2.2,2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0, 3.1, 3.2 Output: Sales for month of value (where value represents "January", "March", etc.) Dept # value value col value sum Dept # Store Total Store # value row value sum tore # value row value sum Dept Total col value sum total overall sales User enters a new month as many times as they wish and run printMonthlySales against the new month alue Validate user input ("y" or "n") when asking if the user wants to enter a new set of values

Answers

Answer:

Y

Explanation:

YEZ

sheila makes to do list below she then mages some changes and revises the to-do list which actions did sheila have to take to make the changes observed

Answers

Answer: Assign or Edit a task in a task list

Explanation:

Tap more then tap the Tasks tab    

Go to the list where you want to edit a task

Tap the task you want to edit.                                                                          

PLEASE HELP
Find five secure websites. For each site, include the following:

the name of the site

a link to the site

a screenshot of the security icon for each specific site

a description of how you knew the site was secure

Use your own words and complete sentences when explaining how you knew the site was secure.

Answers

The name of the secure websites are given as follows:

wwwdotoxdotacdotuk [University of Oxford]wwwdotmitdotedu [Massachusetts Institute of Technology]wwwdotwordbankdotorg [World Bank]wwwdotifcdotorg [International Finance Corporation]wwwdotinvestopediadotorg [Investopedia]

Each of the above websites had the security icon on the top left corner of the address bar just before the above domain names.

What is Website Security?

The protection of personal and corporate public-facing websites from cyberattacks is referred to as website security.

It also refers to any program or activity done to avoid website exploitation in any way or to ensure that website data is not accessible to cybercriminals.

Businesses that do not have a proactive security policy risk virus spread, as well as attacks on other websites, networks, and IT infrastructures.

Web-based threats, also known as online threats, are a type of cybersecurity risk that can create an unwanted occurrence or action over the internet. End-user weaknesses, web service programmers, or web services themselves enable online threats.

Learn more about website security:
https://brainly.com/question/28269688
#SPJ1

PLEASE HELPFind five secure websites. For each site, include the following:the name of the sitea link

Question 11 (2.5 points)
A start-up company has hired you to implement an email strategy for its organization.
The company wants all of its employees to have an enterprise-level email client and
is considering Windows Live Essentials. They ask you if there are any limitations
about this email solution. Which of the following is a major limitation?

Answers

Answer:

the dot

Explanation:

the dot is a good day forecast for a bit

What is one myth a typist might believe about looking at their hands?

Question 1 options:

A. I type slower when I look at my hands.

B. I make more mistakes when I look at my hands.

C. It's easier to type if you don't look down

D. My hands are too big.
HELP!!!!!!

Answers

Answer:

D. My hands are too big

Explanation:

This one seems to be the most likely.

C, as its easier to type looking down then it is looking up as you can press wrong keys way more often, hope this helps!

Data entered in a cell will appear in the bar, found about the worksheet
a.status Bar
b.Equation Bar
c.Formula Bar
d.Data Entry Bar

Answers

Answer:

formula bar

Explanation:

The formula bar in Excel is located next to the name box

and above the worksheet area. It displays the data stored in

the active cell. The formula bar is used to view, enter, and

edit values and formulas in cells.

You are the senior food production manager at a global organization that is famous for its deep-fried chicken.
If someone asked you for the recipe, you would refuse because the recipe is a

patent
trade secret
copyright
trademark

Answers

Answer:

trade secret

Explanation:

Which HTML tag is used to add an ordered list to a web page?

Answers

Answer:

<ol> Defines an ordered list

Answer:

<ol>

Explanation:

Write code in MinutesToHours that assigns totalHours with totalMins divided by 60

Given the following code:

Function MinutesToHours(float totalMins) returns float totalHours
totalHours = MinutesToHours(totalMins / 60)
// Calculate totalHours:
totalHours = 0

Function Main() returns nothing
float userMins
float totalHours

userMins = Get next input
totalHours = MinutesToHours(userMins)

Put userMins to output
Put " minutes are " to output
Put totalHours to output
Put " hours." to output

Answers

Answer:

Function MinutesToHours(float totalMins) returns float totalHours

   // Calculate totalHours:

   totalHours = totalMins / 60

   return totalHours

End Function

What describes an original image that has text added and is shared freely online, usually for humor?
O A. remix
О в. meme
O C.
O D.
mashup
derivative
Reset
Next

What describes an original image that has text added and is shared freely online, usually for humor?O

Answers

Answer:

b

Explanation:

you make an api call using the aws command line interface (cli) to request credentials from aws security token service (aws sts). which of the following elements is needed to make this api call?

Answers

Answer:

To make an API call using the AWS Command Line Interface (CLI) to request credentials from AWS Security Token Service (AWS STS), you will need the following elements:

AWS CLI installed on your computer, you can install it by following the instruction from here: https://docs.aws.amazon.com/cli/latest/userguide/install-cliv2.html

Access keys for an AWS Identity and Access Management (IAM) user or role that has permissions to call the STS API. To get the access keys, you can create an IAM user with the proper permissions and then generate an access key and secret access key. https://docs.aws.amazon.com/general/latest/gr/aws-sec-cred-types.html#access-keys-and-secret-access-keys

The AWS CLI command for requesting temporary security credentials, which is "aws sts assume-role".

The ARN (Amazon Resource Name) of the IAM role you want to assume. The ARN is a unique identifier for the role and it will be in the format of "arn:aws:iam::account-id:role/role-name"

The duration of the session, which is the amount of time that the temporary security credentials are valid. It is expressed in seconds or as a duration string (for example, 1h, 12h, or 3600s).

Example:

aws sts assume-role --role-arn arn:aws:iam::1234567890:role/ExampleRole --role-session-name ExampleSession --duration-seconds 3600

This command requests temporary security credentials for the role "ExampleRole" with a session name "ExampleSession" and a duration of 3600 seconds (1 hour).

Once you have all these elements, you can make the API call using the command prompt or terminal, and the output will be the temporary security credentials (access key, secret access key, session token) that you can use to access AWS resources.

You need to create the app service plans for the web apps.

What is the minimum number of app service plans that should be created?

Answers

Given that you need to create the app service plans for the web apps.

In this situation, each App Service Plan on the App Service Environment will require a minimum of three instances in order to be distributed across zones.

What is a web app?

A web application is software that can be accessed using a web browser. Web apps are supplied to users with an active network connection over the World Wide Web.

Mobile applications must be downloaded from the app store, however web applications may be accessed via any browser and hence do not require installation. Mobile applications can be accessible even while not connected to the internet, however online applications cannot be used without an internet connection.

Learn more about web apps. at:

https://brainly.com/question/28431103

#SPJ1

LAB: Count multiples (EO)
Complete a program that creates an object of the Count class, takes three integers as input: low, high, and x, and then calls the countMultiples() method. The countMultiples() method then returns the number of multiples of x between low and high inclusively.
Ex: If the input is:
1 10 2
countMutiples() returns and the program output is:
5
Hint: Use the % operator to determine if a number is a multiple of x. Use a for loop to test each number between low and high.
Note: Your program must define the method:
public int countMultiples(int low, int high, int x)
Count.java
1 import java.util.Scanner;
2
3 public class Count {
4
5 public int countMultiples(int low, int high, int x) {
6 /* Type your code here. */
7
8 }
9
10 public static void main(String[] args) {
11 Scanner scnr = new Scanner(System.in);
12 /* Type your code here. */
13 }
14)
15

Answers

Following are the Java Program to the given question:

import java.util.Scanner; //import package for user-input

public class Count  //defining a class Count  

{

   public static int countMultiples(int low,int high,int x)//defining a method countMultiples that takes three integer parameters

   {  

       int c=0,i; //defining integer variables that hold value

       for(i=low;i<=high;i++)//defining loop that iterates value between low and high  

       {  

           if(i%x==0)//defining if block that uses % operator to check value

           {

               c+=1; //incrementing c value

           }

       }

       return c; //return c value

   }

   public static void main(String[] args)//main method  

   {  

       int l,h,x;//defining integer variable

       Scanner scnr=new Scanner(System.in); //creating scanner class object  

       l=scnr.nextInt(); //input value

       h=scnr.nextInt();//input value

       x=scnr.nextInt();//input value

       System.out.println(countMultiples(l,h,x)); //calling method and print its value

   }

}

Output:

Please find the attached file.

Program Explanation:

Import package.Defining a class "Count", and inside the class two method "countMultiples and main method" is declared.In the "countMultiples" method three integer parameter that are "low, high, and x".Inside this method a for loop is declared that uses the parameter value and use conditional statement with the % operator and check and return its values.Inside the main method three integer variable is declared that uses the scanner class to input the value and pass to the method and print its calculated value.  

Learn more:

brainly.com/question/16106262

What kind of material is used for DRAM (dynamic random-access memory)?

Answers

The kind of material that is used for DRAM (dynamic random-access memory) is metal-oxide-semiconductor.

What is DRAM?

DRAM was invented in 1968. It is a type of RAM used in modern computers and laptops. It is a type of random access memory. Its name is dynamic random access memory.

Metal-oxide-semiconductor is used in making the transistors and capacitors of the DRAM, which are used to store the data. They hold a bit of the data in these capacitors and transistors.

Thus, the material that is used is metal-oxide-semiconductor to make DRAM (dynamic random-access memory).

To learn more about DRAM, refer to the link:

https://brainly.com/question/20216206

#SPJ1

Choose the odd one. The key ICT driven Green Growth initiatives in terms of their impact on reducing GHG emissions and fossil fuel consumption are:
O a. Smart motors
O b. Smart grids
O c. Smart buildings
d. Smart bicycles and tricycles
O e. Smart transportation

Answers

The odd one in the key ICT driven Green Growth initiatives in terms of their impact on reducing GHG emissions and fossil fuel consumption are is option b: Smart grids.

What is Green Growth initiatives?

The goal of the green growth work is to make sure that natural assets are said to be deliver into their full economic output in regards to a sustainable basis.

Note that id you look at the options, they are all talking about transportation except grid.

Therefore, The odd one in the key ICT driven Green Growth initiatives in terms of their impact on reducing GHG emissions and fossil fuel consumption are is option b: Smart grids.

Learn more about GHG emissions from

https://brainly.com/question/9912932

#SPJ1

: "I have a customer who is very taciturn."

: "I have a customer who is very taciturn."

Answers

The client typically communicates in a reserved or silent manner

B. He won't speak with you.

Why are some customers taciturn?

People who are taciturn communicate less and more concisely. These individuals do not value verbosity. Many of them may also be introverts, but I lack the scientific evidence to support that assertion, so I won't make any inferences or make conclusions of that nature.

The phrase itself alludes to the characteristic of reticence, of coming out as distant and uncommunicative. A taciturn individual may be bashful, naturally reserved, or snooty.

Learn more about taciturn people here:

https://brainly.com/question/30094511

#SPJ1

A Microsoft word user clicks insert pictures what happens next

Answers

Explanation:

When you insert a picture, Word for the web places the picture in your document and displays the Picture Tools ribbon with the Format tab. Tip: To open the Picture Tools ribbon anytime you're in Editing View, select the picture. To change the picture's size or style or to add alt text, on the Format tab.

When you insert a picture, Word for the web places the picture in your document and displays the Picture Tools ribbon with the Format tab. Tip: To open the Picture Tools ribbon anytime you're in Editing View, select the picture.

What is Microsoft word?

Microsoft. Microsoft Word is a component of the Microsoft Office suite of productivity software, but can also be purchased as a stand-alone product.

Microsoft Word was initially launched in 1983, and has since been revised numerous times. It is available for both Windows and Apple operating systems.

Microsoft Word is often called simply Word or MS Word. In 1981, Microsoft hired Charles Simonyi to develop a word-processing application. The first version was released in 1983.

Initially, MS Word was not very popular, owing to its radically different look compared to WordPerfect, the leading word processor at that time. However, Microsoft improved Word continually over the years, including a 1985 version that could run on a Mac.

Therefore, When you insert a picture, Word for the web places the picture in your document and displays the Picture Tools ribbon with the Format tab.

To learn more about Microsoft word, refer to the link:

https://brainly.com/question/26695071

#SPJ2

The issue “when a user deletes the data, whether all the copies are deleted or not is something that every needs to have a clear answer to” comes under which of the following?

Answers

The issue “when a user deletes the data, whether all the copies are deleted or not is something that every needs to have a clear answer to” comes under aspect of data deletion and data lifecycle management.

What is the deletion?

One need rules and practices to delete data to follow privacy laws, protect data, and meet user expectations. When a user gets rid of data, it is important to check if all copies of that data have been effectively removed from the system or storage.

Data Retention Policies: Organizations must create clear rules about how long they will keep certain data before getting rid of it.

Read more about deletion here:

https://brainly.com/question/30280833

#SPJ1

How many total cells can a worksheet window contain? If columns are labelled alphabetically, what will be the label for the cell in row 1, column 16,384?

Answers

Answer:

\(5815 {20 \frac{55}{ \\ hii \: \\ \\ } }^{?} \)

When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and frameworks

Answers

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

I really need help the correct answers ASAP!!! with CSC 104 Network Fundamentals

The Questions:

17. What is a Variable Length Subnet Mask (VLSM), and how is it created?

18. What are some of the different reasons to use VLANs?

Answers

Answer:

17. A Variable Length Subnet Mask (VLSM) is a technique used to allocate IP addresses to subnets of different sizes. It allows for more efficient use of IP address space by creating subnets with different sizes, rather than using a fixed subnet mask. VLSM is created by dividing the network into smaller subnets with different subnet masks, depending on the number of hosts required in each subnet.

18. There are several reasons to use VLANs, including:

Security: VLANs can be used to isolate traffic and prevent unauthorized access to sensitive data.

Performance: VLANs can be used to segment traffic and reduce network congestion, improving performance

Management: VLANs can simplify network management by grouping devices with similar functions or requirements

Flexibility: VLANs can be used to easily move devices between physical locations without changing their IP addresses

Explanation:

The more employees can do, the less they have to be managed by supervisors.


Please select the best answer from the choices provided

T
F

Answers

False
Don’t take me too seriously cause I could be wrong, but I think it’s false. Unless the employees are like the best hardworking employees, they will likely slack off the second they get the chance. The more they can do just means that they can do more, it doesn’t necessary mean they need less supervision

Answer:

True

Explanation:

How could you use a spreadsheet you didn't like to simplify access also the problem

Answers

Answer:

Explanation:

......

HELP PLEASE

Today, not only do companies employ public relations managers but so do many
celebrities and politicians. Research and explain what the role of a public relations
manager is and see if you can think of the reasons why many public figures seem
to find them useful.

Answers

Answer: The role of a public relations manager is to keep the image of a celebrity, politician, ect. good so that they can keep their career going while constantly in the eye of the public. Public figures may find this useful because it can help them keep their record clean and have a personal life while also making it seem like they are perfect people to their audience, which in hand can help with business.

Explanation:

the characteristics of Computer Graphics

FUEL YOUR
GREATNESS​

Answers

Computer graphics are graphics created using computers and, more generally, the representation and manipulation of image data by a computer with help from specialized software and hardware.

The development of computer graphics has made computers easier to interact with, and better for understanding and interpreting many types of data. Developments in computer graphics have had a profound impact on many types of media and have revolutionized animation, movies and the video game industry.

Hopefully this helps you out

Other Questions
I 3.7.3 Quiz: Long Division with Two-Digit DivisorsQuestion 2 of 10What is the quotient of the following division problem?136 / 21 = ?A. 6 r11B. 5 r9C. 6 r10710 Pls help me Ill brainlest what fraction is equal to 0.7 with a line over 7 Manage CertificatesYou work as the IT Administrator for a growing corporate network. You manage the certification authority for your network, which uses smart cards for controlling access to sensitive computers. Currently, the approval process dictates that you manually approve or deny smart card certificate requests. As part of your daily routine, you need to perform several certificate management tasks. Complete the following tasks on CorpCA: Approve the pending certificate requests for smart card certificates. Deny the pending Web Server certificate request for CorpSrv16. User bchan lost his smart card. Revoke the certificate assigned to bchan. CorpNet. Com using the Key Compromisereason code. Unrevoke the CorpDev3 certificate. Task SummaryApprove pending certificate requests for smart card certificates Hide DetailsIssue the tsutton. Corpnet certificateIssue the mmallory. Corpnet certificateDeny the CorpSrv16 certificate requestRevoke the bchan. Corpnet. Com certificate Hide DetailsRevoke the certificateUse Key Compromise for the reasonUnrevoke the CorpDev3 certificateExplanationIn this lab, you perform the following: Approve the pending certificate requests for smart card certificates from tsutton and mmallory. Deny the pending web server certificate request for CorpSrv16. Revoke the certificate assigned to bchan. CorpNet. Com using the Key Compromise reason code because bchan lost his smart card. Unrevoke the CorpDev3 certificate. Complete this lab as follows:1. From Server Manager, select Tools > Certification Authority. 2. Expand CorpCA-CA. 3. Approve a pending certificate as follows:a. Select Pending Requests. B. Maximize the dialog so you can see who the requests are from. C. Right-click the tsutton certificate request and select All Tasks > Issue. D. Right-click the mmallory certificate request and select All Tasks > Issue. 4. Deny a pending certificate request as follows:a. Right-click the CorpSvr16 request and select All Tasks > Deny. B. Click Yes to confirm. 5. Revoke a certificate as follows:a. Select Issued Certificates. B. Right-click the bchan certificate and select All Tasks > Revoke Certificate. C. From the Reason code drop-down list, select the reason code. D. Click Yes. 6. Unrevoke a certificate as follows:a. Select Revoked Certificates. B. Right-click the CorpDev3 certificate and select All Tasks > Unrevoke Certificate If you get 210 utility points from consuming 3 Krystal burgers per week: A) and receive 250 utility points from consuming 4 Krystal burgers per week, the marginal benefit of the 4th burger was 40 utility points B) and received 250-utility points from consuming 4 Krystal burgers per week, then the marginal benefit of consuming all 4 burgers must be 460 utility points. C) and receive 250 utility points from consuming 4 Krystal burgers per week, the marginal benefit of the 4th burger must be higher than the 3rd burger D) and receive 250 utility points from consuming 4 Krystal burgers per week, you should obviously keep eating more this week since it appears that the total benefit of eating them rises. The poisonous gas hydrogen sulfide, H2S, can be neutralized with a base such as sodium hydroxide,NaOH. The unbalanced equation for this reaction follows:NaOH(aq) + H25(e) Na2S(aq) + H2O(1)A student who was asked to balance this equation wrote the following:Na2OH(aq) + H2S(g) Na2S(aq) + H2O(Is this equation balanced? Is it correct? Explain why or why not, and supply the correct balancedequation if necessary. 1. lingering antagonism despite the settlement Which of the following would most likelybe a Christian belief?A. Jesus said to pray to Brahman.B. Jesus said to follow the Caste System.C. Jesus said to know your place in the wheel of samsara.D. Jesus performed miracles of healing. Week 71st March 2021Write a letter to a friend in another school describing a teacher in your school you consider funny How do muscle fibers produce ATP?A) From creatine phosphate.B) Through anaerobic cellular respiration.C) Through aerobic cellular respiration.D) A and B are correct.E) A, B, and C are correct. the equilibrium price for parking in the downtown area of a large city is about $35 a day, this is represented by pe in the graph above. the city council is looking at ways to resolve parking complaints in the city and one councilperson suggests that the maximum people should be forced to pay is $25 a day. would this help relieve parking congestion in the city? why or why not? To sides of a triangle have lengths of 15 inches and 12 inches what are the possible length of the third side In early 2016, the same Germany machinery company has interest from four prospective clients from emerging markets: Indonesia, Brazil, Russia, and South Africa. They all want to buy ten machines, but the factory can only produce ten in time. Therefore, the company has to choose only one client. Given the volatility of the domestic currencies of the four prospective clients, the CFO would like to choose the client which is least likely to cancel the order due to currency volatility. The invoice comes due on June 30, 2016. According to volatility alone, which prospective client would be most likely to cancel the order? A) RussiaB) BrazilC) IndonesiaD) South Africa To USE ThE DEFINITION OF DERIVATIVE to Find f(X) WHEN f(x) = 4x^2 -7X Find y' : ] A)Y^2x^3 e^5x2B)Y=tan^-1 (3x^2+5)C)y = sin4 (X^2 + 1)D)y=x^3+2 / x^2+5x the nurse is assessing an elderly client in the emergency department. there are many bruises present on the client's body in varying stages of healing. after documenting the bruising in the assessment, what should the nurse do next? Concentrated aqueous ammonia has a molarity of 14.8m and a density of 0.90g|ml. calculate : 1 the molarity of the solution 2 the mole fraction of ammonia 3 the weight percent of ammonia 11) Assume earthquake applies a dispiacersent of 0.116sin(9.5t) In meter to a single degree of freedom stoucture. Natural frequency of the structure is 3radls and its mass is 3875 kg what is numeric value of maximum displacement in meter in this structure ? Which statement correctly describes how a reader can identify character motivations Why do you think cartilage and not bone connects the two os coxae in the front? In what country do the three largest shareholders control, on average, about 60 percent of the shares of a public company?a. Great Britainb. Italyc. United Statesd. Canada