A professional educational institution maintains a dedicated web server and database cluster that hosts an exam results portal for modules undertaken by its students. The resource is idle for most of the learning cycle and becomes excessively busy when exam results are released. How can this architecture be improved to be cost-efficient

Answers

Answer 1

Answer:

Answer to the following question is as follows;

Explanation:

A dedicated website and database cluster are maintained by a professional academic institution to host an academic results website for modules completed by its students. During the majority of the learning cycle, the resources are inactive, but when test results are issued, they become extremely busy.Configure virtualized architecture utilising AWS Lambda functions to make this architecture more cost-effective.


Related Questions

hubs hardware advantage's and disadvantages​

Answers

Answer:

answer in picture

hope it's helpful

What term refers to a person using a computer to perform routine tasks other than systems administration

Answers

Answer:

end user

Explanation:

An end user refers to a person using a computer system to perform routine tasks such as listening to music, formatting a document, creating graphic designs, surfing the web, etc., rather than perform systems administration. Thus, an end user is the individual for whom a software application or computer system is created for, especially to perform basic or routine tasks.

For example, a network or system administrator is saddled with the responsibility of implementing changes on an end user's network and network devices in order to get an optimum level of performance.

An aviation tracking system maintains flight records for equipment and personnel. The system is a critical command and control system that must maintain a global availability rate of 99%. The entire system is on a cloud platform that guarantees a failover to multiple zones within a region. In addition to the multi-zonal cloud failover, what other solution would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable?

Answers

Answer:

offline backup solution

Explanation:

In such a scenario, the best option would be an offline backup solution. This is basically a local and offline server that holds all of the flight record data that the cloud platform has. This offline backup server would be updated frequently so that the data is always up to date. These servers would be owned by the aviation company and would be a secondary solution for the company in case that the cloud platform fails or the company cannot connect to the cloud service for whatever reason. Being offline allows the company to access the database regardless of internet connectivity.

You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What is this an example of?

Answers

Answer:

base station is the answer

1,list all data from table customer, sale and product. 2,list Name and sex of all customer. 3,list all male customer. 4,list all male and female customer. 5,list the name and age of male customers. 6,list the name, price and color of the product.​

Answers

Answer:

The SQL queries are as follows:

1. select * from customer

select * from sale

select * from product

2. select name, sex from customer

3. select * from customer where sex = 'male'

4. select name, age from customer where sex = 'male'

5. select name, price, color from product

Explanation:

Given

Tables: customer, sale, product

Required

Answer question 1 to 5

(1) All data in the given tables

To do this, we make use of the select clause to retrieve data from each of the table and * to select all data.

So, we have:

select * from customer --> This lists all data from customer table

select * from sale --> This lists all data from sale table

select * from product --> This lists all data from product table

(2) Selected details from customer table

In (1), we have:

select * from customer --> This lists all data from customer table

To retrieve selected details, we replace * with the field names.

So, we have:

select name, sex from customer

(3) Male customers

In (1), we have:

select * from customer --> This lists all data from customer table

To retrieve male customers, we introduce the where clause

So, we have:

select * from customer where sex = 'male'

(4) Name and age of male customers

In (3), we have:

select * from customer where sex = 'male'

To retrieve the name and age, we replace * with name and age. So, we have:

select name, age from customer where sex = 'male'

(5) Name, price and color of products

In (1), we have:

select * from product --> This lists all data from product table

To retrieve selected details, we replace * with the field names.

So, we have:

select name, price, color from product

what is the fullform of ETA in computer term​

Answers

Answer:

Estimated Time of Arrival.

Question 8 of 10
Which type of computer operating system would be best for a large
corporation?
O A. Single-user, multitasking
B. Multi-user, multitasking
C. Single-user, single-tasking
D. Real-time

Answers

Answer: B. Multi-user, multitasking.

Explanation:

Multiuser/Multitasking operating system refers to an operating system that's powerful and supports more than one user at a time, and can also perform more than one task at a time.

The operating system allows many users to use the programs which are running concurrently on a single network server. It is the computer operating system that would be best for a large corporation. An example is UNIX.

what is the use of a piano​

Answers

To produce music using the keys provided with the instrument?
It sharpens fine motor skills, improves dexterity and hand-eye coordination. Music has also been shown to reduce heart and respiratory rates, cardiac complications, and to lower blood pressure and increase immune response. Playing the piano also makes your hands and arm muscles much stronger than the average person.

In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.

Answers

Answer:

case-based.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

A case-based reasoning application refers to a knowledge-based system that is designed and developed to use previous case scenarios (similar past problems) to interprete or proffer a solution to a problem.

In design and implementation of any case-based reasoning application, there are four (4) Rs involved: retrieve, reuse, revise, and retain.

en que consiste excel

Answers

Answer:

Microsoft Excel es un programa para calcular y simplificar las tareas de administración de datos que forma parte del paquete Microsoft Office de Microsoft Corporation. Microsoft Excel tiene funciones básicas que se pueden usar para trabajar con hojas de cálculo, usando una cuadrícula que consta de celdas. Las funciones también están disponibles para mostrar gráficos y datos visuales similares.

What accesses organizational databases that track similar issues or questions and automatically generate the details to the representative who can then relay them to the customer

Answers

Answer: Call scripting

Explanation:

A script refers to the computer language that has different commands in a file and can be executed without them being compiled.

Call scripting can be used in accessing organizational databases which track identical issues and then automatically generate the details to the representative who can then relay them to the customer.

Communication media that use an antenna for transmitting data through air or water are called _____.

Answers

Answer:

Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable and optical fiber. Unguided media employ an antenna for transmitting through air, vacuum or water. Traditionally, twisted pair has been the workhorse for communications of all sorts.

Explanation:

douc54.cs.edinboro.edu /~bennett/class/csci475/spring2002/notes/chapter4/index.html

copy and paste that it might help!

who invented pascaline and when?​

Answers

Pascaline, also known as Pascal's calculator or arithmetic machine, was invented by [tex]\sf\purple{Blaise\: Pascal}[/tex] between [tex]\sf\red{1642\: and\: 1644}[/tex].

[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]

In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.

Answers

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.

Cuá es la relación entre la tecnología  y la vida?

Answers

Answer:

La innovación tecnológica ha permitido que la humanidad avanzara sobre la base de disponer de unas prótesis más potentes en el divagar por la tierra

Explanation:

Hola! Dicho esto en el mundo en que vivimos hoy en día hemos podido con la tecnología inventar cosas que nos ayudan con nuestras vidas cotidianas como son los medios de comunicación, transporte, entre otros. Y para terminar de contestar la pregunta como tal pues sería algo como:

"La relación entre la tecnología  y la vida es que la tecnología ayuda al ser humano en diferentes áreas tales como el transporte y la comunicación que hoy en día son un punto clave para poder vivir mejor."

¡Espero que te haya ayudado mucho!! ¡Bonito día!

A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used

Answers

Question options:

State Machine

Flowchart

Sequence

Global Exception Handler

Answer:

Sequence

Explanation:

Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.

This sentence is an example of which type of narrative point of view? I did not know what the future held of marvel or surprise for me.​

Answers

Answer: First person

Explanation:

First-person narrative point of view is the mode of storytelling whereby the storyteller recounts the events that occured based on their own point of view. In this case, pronouns such as I, we, our, us and ourselves are used in telling the story.

In the sentence given " I did not know what the future held of marvel or surprise for me" shows that the person is recounting the event based on his or her own point of view. This is therefore, a first person narrative.

Calcula l'energia (Kwh) consumida per una màquina de 30 CV que funciona durant 2 hores.

Answers

Resposta:

44,76 Kwh

Explicació:

1 cavall = 746 watts

Per tant, 30 cavalls es convertiran en:

30 * 746 = 22380 watts

Temps = 2 hores

La quantitat d'energia consumida s'obté mitjançant la relació:

Energia consumida = Potència * temps

Energia consumida = 22380 watts * 2 hores

Energia consumida = 44760 Wh

A quilowatts (Kwh)

44760 Kwh / 1000 = 44,76 Kwh

List three ways of breaking a copyright law with the illegal copy of software.​

Answers

Answer:

Using itSelling it Giving it to someone.

Explanation:

Copyright law protects the unauthorized access to, reproduction and distribution of copyrighted material. The permission of the copyright holders is needed if any of these are to be done.

If copyrighted material is used without permission such as using software without buying it, that is illegal. If that software is sold or given to someone else, that is also illegal because it can only be distributed or redistributed by the copyright owners or people they have given access to.

Why is data processing done in computer?​

Answers

Answer:

The Data processing concept consists of the collection and handling of data in an appropriate and usable form. Data manipulation is the automated processing in a predetermined operating sequence. Today, the processing is done automatically using computers and results are faster and more accurate.

Explanation:

Data is obtained from sources such as data lakes and data storage facilities. The data collected must be high quality and reliable.By using a CRM, such as Salesforce and Redshift, a data warehouse, the data collected are translated into mask language.The data are processed for interpretation. Machine learning algorithms are used for processing. Their procedure varies according to the processed data (connected equipment, social networks, data lakes).These data are very helpful to non-data scientists. The information is transformed into videos, graphs, images, and plain text. Company members may begin to analyze and apply this information to their projects.The final stage of processing is the use of storage in future. Effective data storage to comply with GDPR is necessary (data protection legislation).

If an element is present in an array of length n, how many element visits, on average, are necessary to find it using a linear search

Answers

Answer:

n/2

Explanation:

A linear search starts at the beggining of the array at index 0 and searches for the specific element by analyzing one element at a time. Meaning that if it does not exist in index 0 it moves to index 1 and if its not there it moves to index 2 and so on. If the element is not present in the array it finishes the array and ends, otherwise if it finds the element the search automatically ends. This means that on average the search would end early half of the time. This would mean that on average a total of n/2 elements are visited using a linear search.

Realiza un algoritmo que calcule la edad de una persona y si es mayor = a 18 que imprima mayor de edad de lo contrario que imprima menor de edad

Answers

Answer:

Explanation:

El siguiente codigo esta escrito en Java. Le pide al usario que marque la edad. Despues el programa analiza la edad y imprime a la pantalla si el usario es mayor de edad o menor de edad. El programa fue probado y el output se puede ver en la imagen abajo.

import java.util.Scanner;

class Brainly

{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Cual es tu edad?");

       int age = in.nextInt();

       if (age > 18) {

           System.out.println("Mayor de Edad");

       } else {

           System.out.println("Menor de Edad");

       }

   }

}

MyProgramming Lab

It needs to be as simple as possible. Each question is slightly different.

1. An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers is the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.

Given the positive integer distance and the non-negative integer n, create a list consisting of the arithmetic progression between (and including) 1 and n with a distance of distance. For example, if distance is 2 and n is 8, the list would be [1, 3, 5, 7].

Associate the list with the variable arith_prog.

2.

An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers if the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.

Given the positive integer distance and the integers m and n, create a list consisting of the arithmetic progression between (and including) m and n with a distance of distance (if m > n, the list should be empty.) For example, if distance is 2, m is 5, and n is 12, the list would be [5, 7, 9, 11].

Associate the list with the variable arith_prog.

3.

A geometric progression is a sequence of numbers in which each value (after the first) is obtained by multiplying the previous value in the sequence by a fixed value called the common ratio. For example the sequence 3, 12, 48, 192, ... is a geometric progression in which the common ratio is 4.

Given the positive integer ratio greater than 1, and the non-negative integer n, create a list consisting of the geometric progression of numbers between (and including) 1 and n with a common ratio of ratio. For example, if ratio is 2 and n is 8, the list would be [1, 2, 4, 8].

Associate the list with the variable geom_prog.

Answers

Answer:

The program in Python is as follows:

#1

d = int(input("distance: "))

n = int(input("n: "))

arith_prog = []

for i in range(1,n+1,d):

   arith_prog.append(i)

print(arith_prog)

#2

d = int(input("distance: "))

m = int(input("m: "))

n = int(input("n: "))

arith_prog = []

for i in range(m,n+1,d):

   arith_prog.append(i)

print(arith_prog)

#3

r = int(input("ratio: "))

n = int(input("n: "))

geom_prog = []

m = 1

count = 0

while(m<n):

   m = r**count

   geom_prog.append(m)

   count+=1

print(geom_prog)

Explanation:

#Program 1 begins here

This gets input for distance

d = int(input("distance: "))

This gets input for n

n = int(input("n: "))

This initializes the list, arith_prog

arith_prog = []

This iterates from 1 to n (inclusive) with an increment of d

for i in range(1,n+1,d):

This appends the elements of the progression to the list

   arith_prog.append(i)

This prints the list

print(arith_prog)

#Program 2 begins here

This gets input for distance

d = int(input("distance: "))

This gets input for m

m = int(input("m: "))

This gets input for n

n = int(input("n: "))

This initializes the list, arith_prog

arith_prog = []

This iterates from m to n (inclusive) with an increment of d

for i in range(m,n+1,d):

This appends the elements of the progression to the list

   arith_prog.append(i)

This prints the list

print(arith_prog)

#Program 3 begins here

This gets input for ratio

r = int(input("ratio: "))

This gets input for n

n = int(input("n: "))

This initializes the list, geom_prog

geom_prog = []

This initializes the element of the progression to 1

m = 1

Initialize count to 0

count = 0

This is repeated until the progression element is n

while(m<n):

Generate progression element

   m = r**count

Append element to list

   geom_prog.append(m)

Increase count by 1

   count+=1

This prints the list

print(geom_prog)

write history of computer virus. I will mark as brainliest answer ​

Answers

Answer:

The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US. The first computer virus for MS-DOS was "Brain" and was released in 1986.

Mark Brainliest please

Computer viruses have been around for quite a bit and nearly all of them have been spread through the Internet or its predecessors. Most viruses have been designed to steal users' information, processing power and/or disable the system all together.

The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US.

The first computer virus for MS-DOS was "Brain" and was released in 1986. It would overwrite the boot sector on the floppy disk and prevent the computer from booting. It was written by two brothers from Pakistan and was originally designed as a copy protection.

"The Morris" was the first Computer virus which spread extensively in the wild in 1988. It was written by Robert Morris, a graduate student from Cornell University who wanted to use it to determine the size of the internet. His approach used security holes in sendmail and other Unix applications as well as weak passwords, but due to a programming mistake it spread too fast and started to interfere with the normal operation of the computers. It infected around 15,000 computers in 15 hours, which back then was most of the internet.

Since then, many new viruses have been introduced and the trend is growing exponentially every year.

Infamous viruses of the digital age
Following are some of the most well-known or significant viruses that have grown in step with the role of information technology in society:

In 1991, the "Michelangelo" virus was first discovered in Australia. It would lay dormant until 6th March every year and then overwrite the first one hundred sectors on the storage devices with zeros, preventing the computer from booting. Only 20,000 computers were reported infected.

In 1998, CIH was released. It infected around 60 million computers and caused significant damages by overwriting important system files. It was written by a Taiwanese student.

In 1999, "Melissa" was released. This one, was the first wide spread Word Macro Virus. It was distributed via email and would automatically send itself to the first 50 people in the Outlook address book. It did not harm the computer as it was sending out passwords for some erotic websites which required membership. It caused so much email traffic resulting in email servers to crash.

2000 was the year of "iloveyou". Again, it came via email however it sent itself to all contacts. It also overwrote office, image, and audio files. The virus came from the Philippines and infected over 50 million computers in less than 10 days. Most companies back then decided to turn off their email servers to stop spreading the virus.

Since 2000, so many new viruses have been unleashed to wreak havoc on the world at large that it is difficult to list the most infamous. "Anna Kournikova", Code Red, Nimba, Beast, SQL Slammer, Blaster, Sobig, Sober, MyDoom, Netsky, Zeus, Conficker, Stuxnet, CryptoLocker, Locky, Mirai and WannaCry, are a few examples that come to mind.

Which software system is used to store appointments, scheduling, registration, and billing and receivables

Answers

Answer:

"Practice Management System (PMS)" is the appropriate answer.

Explanation:

It's the kind of technology that has been discovered in healthcare professionals, developed to handle the day-to-day activities utilizing the desktop application.Is therefore typically utilized assurance and consulting tasks, but can also be connected to medical digital records dependent on multiple treatment practices requirements.

Thus the above is the correct answer.

What is the bit pattern (raw binary) of the single precision representation of the decimal number 0.125 following IEEE 754 standard

Answers

Answer:

The three elements that make up the number's 32 bit single precision IEEE 754 binary floating point representation:

Sign (1 bit) = 0 (a positive number)

Exponent (8 bits) = 0111 1100

Mantissa (23 bits) = 000 0000 0000 0000 0000 0000

Explanation:

1. First, convert to the binary (base 2) the integer part: 0.

Divide the number repeatedly by 2.

Keep track of each remainder.

We stop when we get a quotient that is equal to zero.

division = quotient + remainder;

0 ÷ 2 = 0 + 0;

2. Construct the base 2 representation of the integer part of the number.

Take all the remainders starting from the bottom of the list constructed above.

0(10) = 0(2)

3. Convert to the binary (base 2) the fractional part: 0.125.

Multiply it repeatedly by 2.

Keep track of each integer part of the results.

Stop when we get a fractional part that is equal to zero.

#) multiplying = integer + fractional part;

1) 0.125 × 2 = 0 + 0.25;

2) 0.25 × 2 = 0 + 0.5;

3) 0.5 × 2 = 1 + 0;

4. Construct the base 2 representation of the fractional part of the number.

Take all the integer parts of the multiplying operations, starting from the top of the constructed list above:

0.125(10) =

0.001(2)

5. Positive number before normalization:

0.125(10) =

0.001(2)

6. Normalize the binary representation of the number.

Shift the decimal mark 3 positions to the right so that only one non zero digit remains to the left of it:

0.125(10) =

0.001(2) =

0.001(2) × 20 =

1(2) × 2-3

7. Up to this moment, there are the following elements that would feed into the 32 bit single precision IEEE 754 binary floating point representation:

Sign: 0 (a positive number)

Exponent (unadjusted): -3

Mantissa (not normalized):  1

8. Adjust the exponent.

Use the 8 bit excess/bias notation:

Exponent (adjusted) =

Exponent (unadjusted) + 2(8-1) - 1 =

-3 + 2(8-1) - 1 =

(-3 + 127)(10) =

124(10)

9. Convert the adjusted exponent from the decimal (base 10) to 8 bit binary.

Use the same technique of repeatedly dividing by 2:

division = quotient + remainder;

124 ÷ 2 = 62 + 0;

62 ÷ 2 = 31 + 0;

31 ÷ 2 = 15 + 1;

15 ÷ 2 = 7 + 1;

7 ÷ 2 = 3 + 1;

3 ÷ 2 = 1 + 1;

1 ÷ 2 = 0 + 1;

10. Construct the base 2 representation of the adjusted exponent.

Take all the remainders starting from the bottom of the list constructed above:

Exponent (adjusted) =

124(10) =

0111 1100(2)

11. Normalize the mantissa.

a) Remove the leading (the leftmost) bit, since it's allways 1, and the decimal point, if the case.

b) Adjust its length to 23 bits, by adding the necessary number of zeros to the right.

Mantissa (normalized) =

1 000 0000 0000 0000 0000 0000 =

000 0000 0000 0000 0000 0000

12. The three elements that make up the number's 32 bit single precision IEEE 754 binary floating point representation:

Sign (1 bit) = 0 (a positive number)

Exponent (8 bits) = 0111 1100

Mantissa (23 bits) = 000 0000 0000 0000 0000 0000

Write a basic notation for

[tex]a = \frac{(b + d)}{2c} [/tex]
[tex]z = \frac{x}{y + c} [/tex]
[tex] c = \frac{9c + 32}{5} [/tex]





Answers

Answer:

[tex]a = (b + c)/(2 * c)[/tex]

[tex]z = x/(y + c)[/tex]

[tex]c = (9 * c + 32)/5[/tex]

Explanation:

Required

The expression in basic

To do this, we use () to group items, / as divide and * to combine factors

So, we have:

[tex](a)\ a = \frac{(b + d)}{2c}[/tex]

In basic, it is:

[tex]a = (b + c)/(2 * c)[/tex]

[tex](b)\ z = \frac{x}{y + c}[/tex]

In basic, it is:

[tex]z = x/(y + c)[/tex]

[tex](c)\ c = \frac{9c + 32}{5}[/tex]

[tex]c = (9 * c + 32)/5[/tex]

You want to use your Windows workstation to browse the websites on the internet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this

Answers

Answer:

IP

Explanation:

You want to be able to identify the services running on a set of servers on your network. Which tool would best give you the information you need?

Answers

Answer:

Vulnerability scanner

You require a "vulnerability scanner" to provide you with the information to be able to identify the services running on a set of servers on your network.

What is a vulnerability scanner?

Vulnerability scanning, commonly known informally as 'vuln scan,' is an automated technique for finding network, application, and security problems ahead of time. The IT department of a company or a third-party security service provider often does vulnerability scanning. Attackers use this scan to find points of access to your network.

A vulnerability scanner can provide features that a port scanner cannot: sending notifications when new systems are connected to the network.

If you want to be able to identify the services running on a set of servers on your network then you need a "vulnerability scanner" to equip you with the details.

To learn more about vulnerability scanners click here:

https://brainly.com/question/10097616

#SPJ12

When Maggie attempted to reconcile her company's monthly sales revenue, she used a TOTALS query to sum the sales from the invoice line items for the month. But the sum of the sales produced by the query did not agree with the sum of the monthly sales revenue reported on the company's general ledger. This is best described as a problem with

Answers

Answer:

The correct answer is "Consistency".

Explanation:

It should have been continuous to have the information management service. All information must have been linked, gathered using the same technique as well as measurement but also displayed simultaneously frequencies.Throughout this query, Maggie considers the organization proceeds by a system whereby financial transactions online are not influenced by trade payables or rebates as they are separate accounts that are afterward adjusted for the business model.

Thus, the above is the correct answer.

Other Questions
In parallelogram ABCD, what is BDC? When an employer prevents workers from workers entering a display order of numbers are called fill the missing letter b__c__s_. A: I think that the grade my teacher gave me on my test is wrong. B: Realy? you ______ ( ought talk/ should to talk/ ought to talk) to her after class today. A 15.0 cm object is 12.0 cm from a convex mirror that has a focal length of -6.0 cm. What is the height of the image produced by the mirror? -5.0 cm 7.5 cm -7.5 cm 5.0 cm Which points are possible approximations for this system? Select two options. What's easier to learn for a person who knows english. Spanish Or German? Pls explain its for highschool Which expression is the best estimate of the product of 7/8and 8 1/10? Hola! alguien me puede decir cuales son los personajes principales y segundarios de el libro "el ltimo grumete de la baquedano "porfa c: A circular water fountain in the town square has a 112-foot circumference. How far is the center of the fountain from the outer edge? Round to the nearest whole number. Do you believe that the ability to concentrate is hereditary, like having brown eyes or being tall? bhai please mera I'd me kuch bhi nahi hai custom bhai the best way to get the train station A tribe prohibits its members from marrying someone who does not belong to the tribe. This an example of _____.exogamy monogamy endogamy polygyny G is a transformation of f. The graph below shows f as a solid blue line and g as a dotted red line. What is the formula of g in terms of f? Please help I need the answer ASAP!! Correct answer gets 5 star Which of the following statements is false? how many population in the philippines? use different method of depreciation for each of the assests and explain why u used the method (ex : straight line method, double declining method, unit of production method)