is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions

Answers

Answer 1

[tex]\boxed{Data \:anomaly}[/tex] is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.

[tex]\red{\large\qquad \qquad \underline{ \pmb{{ \mathbb{ \maltese \: \: Mystique35}}}}}[/tex]


Related Questions

Select the correct answer. Which input device uses optical technology?
A. barcode reader
B. digital pen
C. digital camera
D. joystick​

Answers

Answer:

barcode reader is the correct answer

What is computer code?
A. Java Script
B. XML
C. HTML
D. Any programming language

Answers

Answer:

D

Explanation:

Choose a topic related to a career that interests you and think about how you would research that topic on the Internet. Set a timer for fifteen minutes. Ready, set, go! At the end of fifteen minutes, review the sources you have recorded in your list and think about the information you have found. How w

Answers

Answer:

Following are the solution to the given question:

Explanation:

The subject I select is Social Inclusion Management because I am most interested in this as I would only enhance my wide adaptability and also people's ability to know and how I can manage and understand people.

Under 15 min to this location. The time I went online but for this issue, I began collecting data on the workability to tap, such as a connection to the monster, glass doors, etc.

For example. At example. I get to learn through indeed.com that the HR manager's Avg compensation is about $80,600 a year. I can gather from Linkedin data about market openings for HR at tech companies like Hcl, Genpact, etc. Lenskart has an HR director open vacancy.

This from I learns that for qualified practitioners I have at least 3 years experience in the management of human resources & that I need various talents like organizing, communications, technical skills, etc.

How do you find the average length of words in a sentence with Python?

Answers

Answer:

split() wordCount = len(words) # start with zero characters ch = 0 for word in words: # add up characters ch += len(word) avg = ch / wordCount if avg == 1: print "In the sentence ", s , ", the average word length is", avg, "letter." else: print "In the sentence ", s , ", the average word length is", avg, "letters.

LAB: Divide input integers
Write a program using integers userNum and divNum as input, and output userNum divided by divNum three times. Note: End with a newline.
Ex: If the input is:
2000 2
the output is:
1000 500 250
Note: In Java, integer division discards fractions. Ex: 6 / 4 is 1 (the 0.5 is discarded).
import java.util.Scanner;
public class LabProgram {
public static void main(String[] args) {
/* Type your code here. */
}
}
(My professor wants us to use this temple and I'm not sure how I should start typing the code were it says "type code here". I've tried differnt forms like the one provided below but they all have errors according to the program. it tells me that i have to place ; .
import java.util.Scanner;
public class LabProgram {
public static void main(String[] args) {
userNum= int(input())
divNum= int(input())
# calculating the division three times
userNum=userNum//divNum
#i have used end=' ' so that it does not produce new line
# instead of that it produce space
print(userNum,end=' ')
userNum=userNum//divNum
print(userNum,end=' ')
userNum=userNum//divNum
print(userNum,end=' ')
}
}
Errors:
Program errors displayed here
LabProgram.java:5: error: '.class' expected userNum= int(input()) ^ LabProgram.java:5: error: ';' expected userNum= int(input()) ^ LabProgram.java:6: error: '.class' expected divNum= int(input()) ^ LabProgram.java:6: error: ';' expected divNum= int(input()) ^ LabProgram.java:7: error: illegal character: '#' # calculating the division three times ^ LabProgram.java:7: error: ';' expected # calculating the division three times ^ LabProgram.java:7: error: ';' expected # calculating the division three times ^ LabProgram.java:9: error: illegal character: '#' #i have used end=' ' so that it does not produce new line ^ LabProgram.java:9: error: ';' expected #i have used end=' ' so that it does not produce new line ^ LabProgram.java:9: error: ';' expected #i have used end=' ' so that it does not produce new line ^ LabProgram.java:9: error: ';' expected #i have used end=' ' so that it does not produce new line ^ LabProgram.java:9: error: ';' expected #i have used end=' ' so that it does not produce new line ^ LabProgram.java:9: error: ';' expected #i have used end=' ' so that it does not produce new line ^ LabProgram.java:10: error: illegal character: '#' # instead of that it produce space ^ LabProgram.java:10: error: ';' expected # instead of that it produce space ^ LabProgram.java:10: error: ';' expected # instead of that it produce space ^ LabProgram.java:10: error: ';' expected # instead of that it produce space ^ LabProgram.java:11: error: ';' expected print(userNum,end=' ') ^ LabProgram.java:12: error: ';' expected userNum=userNum//divNum ^ LabProgram.java:13: error: ';' expected print(userNum,end=' ') ^ LabProgram.java:14: error: ';' expected userNum=userNum//divNum ^ LabProgram.java:15: error: ';' expected print(userNum,end=' ') ^ 22 errors

Answers

Mark Brainliest please


Answer:
# The user is prompted to enter number as dividend
# The received number is assigned to userNum
userNum = int(input("Enter the number you want to divide: "))
# The user is prompted to enter number as divisor
# The divisor is assigned to x
x = int(input("Enter the number of times to divide: "))
# divideNumber function is defined to do the division
def divideNumber(userNum, x):
# counter is declared to control the loop
counter = 1
# the while-loop loop 3 times
# the division is done 3 times
while counter <= 3:
# integer division is done
# truncating the remainder part
userNum = userNum // x
# the result of the division is printed
print(userNum, end=" ")
# the counter is incremented
counter += 1
# the divideNumber function is called
# the received input is passed as parameter
# to the function
divideNumber(userNum, x)
# empty line is printed
print("\n")
Explanation:
The // operator in python works like the / operator in C. The // operator returns only the integer part of division operation. For instance 6 // 4 = 1. The fraction part is discarded

In the given code you include two languages, that's why it will give the error messages, and for better understanding, we give the program into two languages:

Following are the Java and Python Program to these questions:

Java Program:

import java.util.*;//import package

public class LabProgram  //defining a class LabProgram  

{

public static void main(String[] ar)//defining main method  

{

int userNum,divNum;//defining integer variable

Scanner on=new Scanner(System.in);//defining Scanner class Object for user-input

userNum=on.nextInt();//input value

divNum=on.nextInt();//input value

for(int i=0;i<3;i++)//defining loop to divide value 3 times

{

userNum=userNum/divNum;//dividing userNum by divNum and store its value into userNum

System.out.println(userNum);//print userNum value

}

}

}

Python Program:

userNum= int(input())#input integer value

divNum= int(input())#input integer value

# calculating the division three times

userNum=userNum//divNum#using userNum that divides userNum by divNum and store its value

print(userNum)#print userNum value

userNum=userNum//divNum#using userNum that divides userNum by divNum and store its value

print(userNum)#print userNum value

userNum=userNum//divNum#using userNum that divides userNum by divNum and store its value

print(userNum)#print userNum value

Output:

Please find the attached file.

Learn more:

brainly.com/question/21661364

Used for monitoring web activity by users to make sure that sensitive information won't leave the building.

A, Web server
B, FTP server
C, POP server
D, Proxy server ​

Answers

Answer: PROXY

Explanation:

The basic objective of the web server is to store, process and deliver web pages to the users.

FTP server is to allow users to upload and download files. An FTP server is a computer that has a file transfer protocol (FTP) address and is dedicated to receiving an FTP connection. FTP is a protocol used to transfer files via the internet between a server (sender) and a client (receiver)

pop provides access via an Internet Protocol (IP) network for a user client application to a mailbox (maildrop) maintained on a mail server

proxy server is a system that isolates internal clients from the servers by downloading and storing files on behalf of the clients. it intercepts requests for web-based or other resources that come from

Write an algorithm that accepts two numbers,
divide the first number by the second and display the
quotient

Answers

Let’s write the algorithm in the form of a pseudocode!

Pseudocode:Quotient_of_Two_Number
Declare: num1, num2, quotient
START
Display (Enter a number)
Read num1
Display (Enter a number)
Read num2
quotient = num1/num2
Print (“Quotient”)
STOP

Write an application that inputs a five digit integer (The number must be entered only as ONE input) and separates the number into its individual digits using MOD, and prints the digits separated from one another. Your code will do INPUT VALIDATION and warn the user to enter the correct number of digits and let the user run your code as many times as they want (LOOP). Submit two different versions: Using the Scanner class (file name: ScanP2)

Answers

Answer:

The program in Java is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

 int n, num;

 Scanner input = new Scanner(System.in);

 System.out.print("Number of inputs: ");

 n = input.nextInt();

 LinkedList<Integer> myList = new LinkedList<Integer>();

 for(int i = 0; i<n;i++){

     System.out.print("Input Integer: ");

     num = input.nextInt();

     while (num > 0) {

     myList.push( num % 10 );

     num/=10;

     }

     while (!myList.isEmpty()) {

         System.out.print(myList.pop()+" ");

     }

     System.out.println();

     myList.clear();

 }

}

}

Explanation:

This declares the number of inputs (n) and each input (num) as integer

 int n, num;

 Scanner input = new Scanner(System.in);

Prompt for number of inputs

 System.out.print("Number of inputs: ");   n = input.nextInt();

The program uses linkedlist to store individual digits. This declares the linkedlist

 LinkedList<Integer> myList = new LinkedList<Integer>();

This iterates through n

 for(int i = 0; i<n;i++){

Prompt for input

     System.out.print("Input Integer: ");

This gets input for each iteration

     num = input.nextInt();

This while loop is repeated until the digits are completely split

     while (num > 0) {

This adds each digit to the linked list

     myList.push( num % 10 );

This gets the other digits

     num/=10;

     }

The inner while loop ends here

This iterates through the linked list

     while (!myList.isEmpty()) {

This pops out every element of thelist

         System.out.print(myList.pop()+" ");

     }

Print a new line

     System.out.println();

This clears the stack

     myList.clear();

 }

What does the abbreviation BBC stands for?

Answers

Answer:

British Broadcasting Corporation Microcomputer System

Explanation:

The British Broadcasting Corporation Microcomputer System, or BBC Micro, is a series of microcomputers and associated peripherals designed and built by the Acorn Computer company in the 1980s for the BBC Computer Literacy Project.

Answer:

British Broadcasting Corporation

Explanation:

This is a UK company which provides television and radio news in over 40 languages. This is the computer related meaning, there are other meanings to the abbreviation but they seem irrelevant in this case.

Hope this information was of any help to you. (:

1.               The smallest unit in a digital system is a​

Answers

Answer:

a bit

Explanation:

<3

which function would ask excel to average the values contained in cells C5,C6,C7, and C8

Answers

Answer:

=AVERAGE(C5:C8)

Explanation:

The function calculates the average of the values in the cell range C5:C8 - C5, C6, C7, C8.

Exercise#1: The following formula gives the distance between two points (x1, yı) and (x2, y2) in the Cartesian plane:
[tex] \sqrt{(x2 - x1) ^{2} + (y2 - y1) ^{2} } [/tex]
Given the center and a point on circle, you can use this formula to find the radius of the circle. Write a C++ program that prompts the the user to enter the center and point on the circle. The program should then output the circle's radius, diameters, circumference, and area. Your program must have at least the following methods: findDistance: This mehod takes as its parameters 4 numbers that represent two points in the plane and returns the distance between them. findRadius: This mehod takes as its parameters 4 numbers that represent the center and a point on the circle, calls the method findDistance to find the radius of the circle, and returns the circle's radius. circumference: This mehod takes as its parameter a number that represents the radius of the circle and returns the circle's circumference. area: This mehod takes as as its parameter a number that represents the radius of the circle and returns the circle's area. .​

Answers

Ddgdgdgdfdgdfdgdgdgdgdgdgdgdggdgdgdgdgg

seven and two eighths minus five and one eighth equals?

Answers

Answer: 2.125

Explanation

Although it is not a term Excel uses, how do most people think of Excel?

Answers

Answer:

People think of Excel as a Spreadsheet.

What is the meaning of negative impact in technology

Answers

Answer:

the use of criminal thought by the name of education

Any help , and thank you all

Answers

Answer:

There are 28 chocolate-covered peanuts in 1 ounce (oz). Jay bought a 62 oz. jar of chocolate-covered peanuts.

Problem:

audio

How many chocolate-covered peanuts were there in the jar that Jay bought?

Enter your answer in the box.

Explanation:

how to make an app according to peoples will

Answers

Answer:

Follow these steps to create your own app:

1)Choose your app name.

2)Select a color scheme.

3)Customize your app design.

4)Choose the right test device.

5)Install the app on your device.

6)Add the features you want (Key Section)

7)Test, test, and test before the launch.

8)Publish your app.

Explanation:

(!!_!!)

Unlike the collapse of Enron and WorldCom, TJX did not break any laws. It was simply not compliant with stated payment card processing guidelines.
a) true
b) false

Answers

I think the answer is A) true

The statement "Unlike the collapse of Enron and WorldCom, TJX did not break any laws. It was simply not compliant with stated payment card processing guidelines" is definitely true.

What was the cause of the TJX data breach?

The major cause of the TJX data breach was thought to be the hack that wasn't discovered until 2007, hackers had first gained access to the TJX network in 2005 through a WiFi connection at a retail store.

These situations were eventually able to install a sniffer program that could recognize and capture sensitive cardholder data as it was transmitted over the company's networks. They should be required to change the encryption methodology of the data they are using to save the personal identification information of their customers.

Therefore, the statement "Unlike the collapse of Enron and WorldCom, TJX did not break any laws. It was simply not compliant with stated payment card processing guidelines" is definitely true.

To learn more about, TJX data, refer to the link:

https://brainly.com/question/22516325

#SPJ2

_ is a term used for license like those issues by creative commons license as an alternative to copyright

Answers

, . , .

Explanation:

'

Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and information security infrastructure elements. Group of answer choices True False

Answers

Answer:

True

Explanation:

It is TRUE that Internal monitoring is accomplished by inventorying network devices and channels, IT infrastructure and applications, and information security infrastructure elements.

The above statement is true because Internal Monitoring is a term used in defining the process of creating and disseminating the current situation of the organization’s networks, information systems, and information security defenses.

The process of Internal Monitoring involved recording and informing the company's personnel from top to bottom on the issue relating to the company's security, specifically on issues about system parts that deal with the external network.

Write a function:
class Solution { public int solution (int) A); }
that, given a zero-indexed array A consisting of N integers representing the initial test scores of a row of students, returns an array of integers representing their final test scores in the same order).
There is a group of students sat next to each other in a row. Each day, students study together and take a test at the end of the day. Test scores for a given student can only change once per day as follows:
• If a student sits immediately between two students with better scores, that student's score will improve by 1 when they take the test.
• If a student sits between two students with worse scores, that student's test score will decrease by 1.
This process will repeat each day as long as at least one student keeps changing their score. Note that the first and last student in the row never change their scores as they never sit between two students.
Return an array representing the final test scores for each student once their scores fully stop changing. Test Ou
Example 1:
Input: (1,6,3,4,3,5]
Returns: (1,4,4,4,4,5]
On the first day, the second student's score will decrease, the third student's score will increase, the fourth student's score will decrease by 1 and the fifth student's score will increase by 1, i.e. (1,5,4,3,4,5). On the second day, the second student's score will decrease again and the fourth student's score will increase, i.e. (1,4,4,4,4,5). There will be no more changes in scores after that.

Answers

Answer:

what are the choices

:"

Explanation:

Frames control what displays on the Stage, while keyframes help to set up

Answers

Answer: A keyframe is a location on a timeline which marks the beginning or end of a transition. So for example, you have a movie and it transitions to another scene, keyframes tell it when and where to start the transition then when and where to stop the transition.

Write a program that accepts inputs, outputs them and exits correctly when - 1
is pressed

Answers

Answer:

Explanation:

The following program is written in Python. It simply creates an endless loop that continously asks the user for an input. If the input is not -1 then it outputs the same input, otherwise it exists the program correctly. A test output can be seen in the attached image below.

while True:

   answer = input("Enter a value: ")  

   if answer != "-1":

       print(answer)

   else:

       break

In this module you learned about advanced modularization techniques. You learned about the advantages of modularization and how proper modularization techniques can increase code organization and reuse.
Create the PYTHON program allowing the user to enter a value for one edge of a cube(A box-shaped solid object that has six identical square faces).
Prompt the user for the value. The value should be passed to the 1st and 3rd functions as arguments only.
There should be a function created for each calculation
One function should calculate the surface area of one side of the cube. The value calculated is returned to the calling statement and printed.
One function should calculate the surface area of the whole cube(You will pass the value returned from the previous function to this function) and the calculated value results printed.
One function should calculate the volume of the cube and print the results.
Make a working version of this program in PYTHON.

Answers

Answer:

Following are the code to the given question:

def getSAOneSide(edge):#defining a method that getSAOneSide that takes edge patameter

   return edge * edge#use return to calculate the edge value

def getSA(SA_one_side):#defining a method that getSA that takes SA_one_side patameter

   return 6 * SA_one_side#use return to calculate the SA_one_side value

def volume(edge):#defining a method that volume that takes edge patameter

   return edge * edge * edge#use return to calculate edge value

edge = int(input("Enter the length of edge of the cube:\n"))#defining edge variable that input value

SA_one_side = getSAOneSide(edge)#defining SA_one_side that holds getSAOneSide method value

print("Surface area of one side of the cube:", SA_one_side)

surfaceArea = getSA(SA_one_side)#defining a surfaceArea that holds getSA method value

print("Surface area of the cube:", surfaceArea)#print surfaceArea value

vol = volume(edge)#defining vol variable that holds Volume method value

print("Volume of the cube:", vol)#print vol Value

Output:

Please find the attached file.

Explanation:

In the code three method "getSAOneSide, getSA, and volume" method is declared that takes a variable in its parameters and use a return keyword that calculates and return its value.

In the next step,edge variable is declared that holds value from the user and defines three variable that holds method value and print its value with the message.

As a CISO, you are responsible for developing an information security program based on using a supporting framework. Discuss what you see as some major components of an information security program.

Answers

Answer:

The CISO (Chief Information Security Officer) of an organization should understand the following components of an information security program:

1) Every organization needs a well-documented information security policy that will govern the activities of all persons involved with Information Technology.

2) The organization's assets must be classified and controlled with the best industry practices, procedures, and processes put in place to achieve the organization's IT objectives.

3) There should be proper security screening of all persons in the organization, all hardware infrastructure, and software programs for the organization and those brought in by staff.

4) Access to IT infrastructure must be controlled to ensure compliance with laid-down policies.

Explanation:

As the Chief Information Security Officer responsible for the information and data security of my organization, I will work to ensure that awareness is created of current and developing security threats at all times.  I will develop, procure, and install security architecture, including IT and network infrastructure with the best security features.  There will good management of persons' identity and controlled access to IT hardware.  Programs will be implemented to mitigate IT-related risks with due-diligence investigations, and smooth governance policies.

Which of the following statements regarding the SAP Hana product implemented by Under Armour is NOT true?
A. All of the statements are true.
B. The program allows legacy silos to remain intact.
C. The program can run across platforms and devices.
D. The program provides real-time results.

Answers

Answer:A

Explanation:i need points

Select which is true for for loop​

Answers

Answer:

i dont understand what you mean and what you are asking in the qestion

Explanation:

How could you use your technology skill and Microsoft Excel to organize, analyze, and compare data to decide if a specific insurance is a good value for the example you gave

Answers

Answer:

The summary of the given question would be summarized throughout the below segment.

Explanation:

"Insurance firms voluntarily assume our charge probability," implies assurance undertakings will compensate including all our devastations throughout respect of products for something we have health coverage and that the vulnerability for both would be equivalent.If somehow the client receives significant losses, the firm must compensate that kind of money as well as, if there are no failures, it can invest earnings or rather an investment.

Assign sum_extra with the total extra credit received given list test_grades. Iterate through the list with for grade in test_grades:. The code uses the Python split() method to split a string at each space into a list of string values and the map() function to convert each string value to an integer. Full credit is 100, so anything over 100 is extra credit.Sample output for the given program with input: '101 83 107 90'Sum extra: 8(because 1 + 0 + 7 + 0 is 8)user_input = input()test_grades = list(map(int, user_input.split())) # test_grades is an integer list of test scoressum_extra = 0 # Initialize 0 before your loop''' Your solution goes here '''print('Sum extra:', sum_extra)

Answers

Answer:

Replace ''' Your solution goes here '''

With

for i in test_grades:

   if i > 100:

       sum_extra+=i - 100

Explanation:

This iterates through the list

for i in test_grades:

This checks for list elements greater than 100

   if i > 100:

The extra digits (above 100) are then added together

       sum_extra+=i - 100

You are the IT administrator for a small corporate network. The employee in Office 1 needs your assistance managing files and folders. Your task is to use the command prompt to complete the following:

a. Create the D:​\​utilities​\​recover directory. Use the md or mkdir command to create (make) a directory.
b. Delete the D:​\​software​\​arch98 directory and all of its files.
c. Use the rd command to delete (remove) a directory.
d. Use the /s switch to remove the directory and all of its contents at once.

Answers

Answer:

(a) mkdir /d D:\utilities\recover    

     or

    mkdir D:\utilities\recover    

(b) rd  /s  D:​\software​\arch98

Explanation:

(a) To make a new directory we use the md or mkdir command followed by the name of the directory as follows;

mkdir [name_of_directory]

The name of the directory could also be a relative or absolute path depending on the request.

In the task, the specified directory uses an absolute path given as D:​\​utilities​\​recover. This path is in a drive D. Therefore, if you are in another drive different than D, to run this command, it is a great idea to do that with the /d switch.

In summary:

i. if in drive D, to make a directory D:\utilities\recover, type the following command;

mkdir  D:\utilities\recover    

ii. if otherwise in a different drive, type the following command.

mkdir /d D:\utilities\recover

(b) To delete a directory, we use the rd or rmdir command. If the directory has contents that also need to be deleted, we use the switch /s alongside the rd or rmdir.

In the task given, the directory to be deleted is D:\software\arch98. This includes deleting all of its files too. To do this, type the following command;

rd /s D:\software\arch98

Other Questions
Sasha just read a writing prompt, and she is not sure what to write about. In order to write a strong essay, Sasha should firstdecide on a specific structure.brainstorm different topics.create an outline.choose an audience. Find the equation of a line with a slope of 1/2 that passes through the point 4, 10 he fell off his bike change into negative.? Which country started the Industrial Revolution, and why?A) Germany, because it won recent wars in Europe against other great powers.B) Russia, because it was the most powerful country in the world.C) The United States, because it was the worlds fastest-growing country.D) Britain, because it had a growing population and large deposits of coal and iron. Qu consecuencias tuvo la Reforma protestante?A. La prdida de poder de la Iglesia catlica y el movimiento de ContrarreformaB. El aumento de poder de la Iglesia catlica y la creacin de nuevas religionesC. La prdida de poder de la Iglesia catlica y la creacin de la figura papalD. La instauracin de la Inquisicin y las expediciones comerciales a Amrica 2b to the third power +5 when b=3I need the answer like now pls Consider the following stock price and shares outstanding data: Stock Name Price per Share Shares Outstanding (Billion) Lowes $28.80 1.53 Wal-Mart $47.90 4.17 Intel $19.60 5.77 Boeing $75.00 0.79 If you are interested in creatinga value-weighted portfolio of these four stocks, then the percentage amount that you would invest in Lowes is closest to: A) 25% B) 11% C) 20.0% D) 12% E) 8% subtract 8x-8y+9 from 5x-8y-z what are the importance of doctor Gillian swears her computations for thefollowing equations prove they do notintersect. Her brother who just finishedlearning about intersecting lines told her theydefinitely intersect because the slopes aredifferent. Gillian remembered that logic fromclass and then decided she needed to be ableto prove intersection by using algebra.Although there are multiple strategies, howmight she prove intersection without graphingof the following equations?4x +3y = 6 and 6x + 2y = 10 Why are there no significant changes in the seasons in the Caribbean region? 4. What accounted for the different types of products created in each of the early ancient egypt nile river valley civilizations? 20 points what are alleles mutations in the dna PLS HELP ASAP!!! I WILL MARK BRAINLIEST la. A man was traveling by sie is allowed a maximum of 20kg luggage. The manweighing 3.5kg, 15kg.2kg and 15kgFind the excess weight of his luggage.Express the excess weight as a percentage of the maximum weight allowed hola genteee ayuda me pueden decir 5 propiedades fsicas y 5 propiedades qumicas del cido sulfrico porfa es urgente ! CHAPTER ONE THE CHEMICAL COMPONENTS OF THE CELL Biology Form Three Student Book1. What is the percentage by mass of oxygen, carbon, hydrogen, nitrogen,phosphorus and sulfur in the earth and in the human body? What do youobserve?(MB2. Which elements have a higher percentage in the nature and in the humanbody? State some compounds that contain these elements in their struc-ture.3. Many chemical substances enter the structure of the of the cell. In youropinion, what is the importance of these substances? Why have you select-ed these substances?4. There are other elements that exist in a fewer percentage, search theseelements and state the percentage abundance of each in the cells of livingorganisms. Which of the following organelles is properly matched to it's function?lysosome: storageendoplasmic reticulum: movementlysosome: digestionchloroplast: making proteins PLEASE HELP ASAP FOR 25 POINTS!! :D6 Identify) What particle increases in number when a base is dissolved in water?A: OHB: H3O+C: H2OD: H' Its volume is 20 cm3, and its mass is 100 grams. What is the samples density?