select one or more: group of answer choices it is best practice to create one maintenance plan to support all databases for an instance a database user needs to be a part of the sysadmin role in order to execute sql server agent jobs database maintenance plans do not require sql server agent sql server job schedules can be attached to multiple sql server agent jobs or none at all sql server agent jobs cannot be run simply based on cpu idle time; a specific start time is required each sql server instance has its own sql server agent process database maintenance plans help automate many standard dba maintenance tasks.

Answers

Answer 1

A database maintenance plan is a list of specified, preventative actions that must be taken on a regular basis to maintain the performance and availability of databases.

Open the SQL Server Enterprise Manager, then go to your server using the hierarchy. Expand the Management folder under the server. To launch the Database Maintenance Plan Wizard, right-click Database Maintenance Plans under Management and choose New Maintenance Plan. To guarantee the availability and performance of the database, you must monitor and improve the database server. Updating statistics, tracking database, server, and space usage, and organizing backup and recovery plans are all part of maintaining DB2 and Oracle databases.

Learn more about database here-

https://brainly.com/question/6447559

#SPJ4


Related Questions

Suppose we’ve written a function drawcircle that we want to call every time the mouse is clicked. How can we do this?.

Answers

For the drawcircle function that we want to call every time the mouse is clicked, we can do mouseClickMethod(drawCircle).

To draw a circle we can use the mouse click method, by pressing the left button on the mouse for a long time. While clicking, point the mouse slowly according to the desired circle size this method is called mouseClickMethod(drawCircle).

Click is a click method that is done by pressing the left button on the mouse which is done only once. The function of this command or click button is for example to select or select files, execute certain commands, open links, click buttons in dialogs, and so on.

Double click on the mouse, namely the movement of pressing the front/top left click button on the mouse twice quickly. This gesture is used to open a file or folder. Scroll up, namely the movement of pulling the scroll button on the mouse in a forward direction to pull the active screen up.

Learn more about mouse Click Method here https://brainly.com/question/28208476

#SPJ4

Research the meanings of the following white collar crimes on the web and give a
brief meaning using your own words.
Insider trading
Larceny
Forgery
Counterfeit

Answers

Answer:

Insider trading - persons who have access to sensitive or important non-public information about a corporation trading its securitiesLarceny - the stealing and transporting of personal property without the owner's consent with the purpose to rob like stealing that persons bike shoplifting  Forgery - the fraudulent act of creating, modifying, or imitating (as a document or signature).Counterfeit - an item that unlawfully utilizes the trademark of another without that person's consent. By producing or offering a fake.

   Hope this helped

you have a company network with a single switch. all devices connect to the network through the switch. you want to control which devices will be able to connect to your network. for devices that do not have the latest operating system patches, you want to prevent access except to a special server that holds the patches the computers need to download. which of the following components should be part of your solution? (select two.)

Answers

The components that should be part of your solution are option A and B:

802.1x authenticationRemediation serversIs 802.1X an authentication server?

An authentication mechanism called 802.1X enables a central authority to verify a user's identity. EAPs are frequently used as authentication servers. a wireless network authentication protocol that expands on the PPP's methods, which is a common protocol for connecting computers to the Internet.

The process of remediation entails downloading the payload for fixes that have been found to be missing on one or more target servers, applying the payload to the identified target servers, and then bringing each one up to the necessary level.

Therefore, To specify available servers for the purpose of improving the NAP Clients' state of health, remediation server groups are used. Updates are not the only thing that remediation servers give to noncompliant computers.

Learn more about Remediation from

https://brainly.com/question/28461748
#SPJ1

See options below

you have a company network with a single switch. all devices connect to the network through the switch. you want to control which devices will be able to connect to your network. for devices that do not have the latest operating system patches, you want to prevent access except to a special server that holds the patches the computers need to download. which of the following components should be part of your solution? (select two.)

-802.1x authentication

-Remediation servers

Network Access Protection

does it make sense to chain two different dimensionality reduction algo- rithm?

Answers

Yes, it can absolutely make sense to chain two different dimensionality reduction algorithms.

By obtaining a set of principal variables,  dimensionality reduction is the process of reducing the number of random variables being considered. It can be split into two categories: feature extraction and feature selection.

You can combine two distinct algorithms, such as PCA to quickly eliminate extraneous data and LLE to work more slowly. This will probably result in the same performance but quicker outcomes.

There are frequently too many factors used in machine learning classification problems to make the final classification. These elements are essentially features, which are variables. It becomes more difficult to visualise the training set and then work on it as the number of features increases.

Sometimes, the majority of these features are redundant because they are correlated. Algorithms for dimensionality reduction are useful in this situation.

To learn more about dimensionality reduction click here:

brainly.com/question/17081933

#SPJ4

cloud kicks has created a screen flow for their sales team to use when they add new leads. the screen flow collect name, email and shoe preference. which two things should the administrator do to display the screen flow?

Answers

The two things that the administrator should  do to display the screen flow is option A and D:

Create a tab and add the screen flow to the page.Use a flow element and add the screen flow to the record page.

How do screen flows work?

Users can be guided through a business process using screen flows, which offer instructions or call scripts, urge them to fill up certain fields, and then carry out operations such as Record Create or Record Update behind the scenes.

Lastly, The way to show the flow of screen are:

Creating a Screen Flow in Salesforce: StepsStep 1: Go to Setup > Flows > Select New Flow.Step 2: Next, from all the available options, choose Screen flow.Create the record element that will create the record in step three. Step 4: A success screen that shows information about the success.

Learn more about screen from

https://brainly.com/question/14205713
#SPJ1

See full question below

Cloud Kicks has created a screen flow for their sales team to use when they add new Leads. The screen flow collects name, email, and shoe preference.

Which two things should the administrator do to display the screen flow?

Choose 2 answers

ACreate a tab and add the screen flow to the page.

BInstall an app from the AppExchange.

CAdd the flow in the utility bar of the console.

DUse a flow element and add the screen flow to the record page.

Which of the following inter-facility system would prevent an access cardholder from giving their card to someone after they have gained access?
1)Double entry door
2)Turnstile
3)Anti-passback system
4)Mantrap

Answers

The anti-passback system would prevent an access cardholder from giving their card to someone after they have gained access.

Therefore, the correct option is: 3)Anti-passback system

The anti-passback system:

The anti-passback system is a system that is used to prevent access cardholders from giving their card to someone after they have gained access. This system is used in many different places, such as schools, office buildings, and hospitals. This system is designed to make sure that only the people who are supposed to have access to a certain area are the ones who are able to get in. This system is a very important part of security, and it is used in many different places to keep people safe.

The anti-passback system is a very effective way of keeping people safe. This system is used in many different places, and it is very effective at preventing people from giving their access card to someone after they have gained access. This system is a very important part of security, and it is used in many different places to keep people safe.

Learn more about the Anti-passback system:

https://brainly.com/question/18205955

#SPJ4

you have implemented vlan trunking on your network. you have two switches that are both configured to use dynamic auto mode. you discover that they are not trunking. which of the following trunking configuration options can be used to make these two switches trunk successfully? (select two.)

Answers

The VLAN trunking configuration options that can be used to make these two switches trunk successfully are:

Manually configure trunking on at least one of the switches.Configure at least one of the switches to use the dynamic desirable mode.

What is VLAN Trunking?

The VLAN Trunking Protocol is a Cisco proprietary protocol that spreads the definition of Virtual Local Area Networks over the local area network. VTP does this by delivering VLAN information to all switches in a VTP domain. Advertisements for VTP can be transmitted across 802.1Q and ISL trunks.

The primary function of trunking is to transport traffic between switches while also maintaining VLAN information. The trunk link, unlike an access link, does not belong to a single VLAN but may carry traffic from many VLANs across a point-to-point link between two devices that comprehend the protocol.

Learn more about VLAN Trunking:
https://brainly.com/question/29341191
#SPJ1

REST Basics REST is an architecture for providing access to data over a network through an API. Which of the following are true? Pick ONE OR MORE options REST is strictly a client-server interaction type meaning that the client performs requests and the server sends responses to these requests. REST is a server-server interaction meaning that both sides can make requests and send responses to requests. In REST architecture, a properly designed access endpoint should not specify actions as a part of the resource URI. Instead, actions should be specified using appropriate protocol methods such as GET, POST, PUT, and DELETE over HTTP.

Answers

REST is strictly a client-server interaction type meaning that the client performs requests and the server sends responses to these requests. In REST architecture, a properly designed access endpoint should not specify actions as a part of the resource URI. The correct options are A and C.

What is REST server?

REST is an acronym that stands for Representational State Transfer. By providing a representation for previously defined resources such as Configurations, this interface delegated all calls to the already existing Server APIs.

REST is a client-server interaction type, which means that the client sends requests and the server responds to these requests.

A properly designed REST access endpoint should not include actions as part of the resource URI.

Thus, the correct option is A and C.

For more details regarding REST server, visit:

https://brainly.com/question/20396791

#SPJ1


What is pseudocode?

Answers

Answer:

Explanation:

What is pseudocode?

answer: In computer science, pseudocode is a plain language description of the steps in an algorithm or another system. Pseudocode often uses structural conventions of a normal programming language, but is intended for human reading rather than machine reading.

or

a notation resembling a simplified programming language, used in program

i'm not way to sure but i'm very sure it's B the most possible answers are B and C.

How does the ""using windows and doors for cross-ventilation"" section develop the idea of natural ventilation?.

Answers

Natural ventilation in a space, such as a room, means that air flows in and out without the use of artificial mechanisms (such as fans and air conditioners) that provide and generate air for respiration, breathing, and cooling purposes by the use of windows and doors for cross-ventilation.

What is Natural Ventilation?

Why do managers encourage people to use Natural Ventilation techniques? According to international estimates from the US Office of Technology Assessment, developing countries have the potential to reduce their electricity generation if energy is used more efficiently.

One of these methods is ventilation, particularly natural ventilation. It is a method of introducing fresh air into a home or office space by utilizing passive forces, typically wind velocity or pressure differences both externally and internally.

Natural ventilation refers to the movement of air between the outside and inside of a structure. Natural ventilation is caused by two natural forces: pressure variations caused by wind blowing around the building (wind-driven ventilation) and temperature variations ('stack effect' ventilation).

Natural ventilation is required when using HVAC products. Natural Ventilation systems are available from a wide range of Suppliers and Companies, as well as manufacturers and distributors, and Linquip has a large selection of Natural Ventilation systems for sale.

To learn more about Ventilation, visit: https://brainly.com/question/28483176

#SPJ1

Explain three tasks the section can handle?

Answers

Answer:

<HTML>Tag can handle three tasks

In the table below, there are a few white collar crimes listed. After reviewing the link
above, define each crime and give an example of each white collar crime listed.
Money Laundering
Investment Fraud
Ponzi Scheme
Pyramid Scheme
Promissory Note
Fraud
Commodities Fraud
Broker Embezzlement
Market Manipulation

Answers

Answer:

Money Laundering: The process of hiding the source of illegally-obtained money.

Investment Fraud: A type of fraud that involves convincing a person to invest money in a fake

or worthless investment.

Ponzi Scheme: A type of investment fraud in which a person uses money from new investors

to pay off existing investors.

Pyramid Scheme: A type of investment fraud in which a person uses money from new investors

to pay their own personal expenses.

Promissory Note: A document that promises to pay a certain amount of money to a certain person

by a certain date.

Fraud: A type of white collar crime in which a person lies or uses deception in order to gain

something of value.

Commodities Fraud: A type of fraud that involves illegally manipulating the prices of

commodities.

Broker Embezzlement: A type of fraud in which a broker illegally uses their clients' money

for their own personal gain.

Market Manipulation: A type of fraud in which a person artificially inflates or deflates the

price of a security.

Explanation:

shown below are two plots of residuals remaining after fitting a linear model to two different sets of data. describe important features and determine if a linear model would be appropriate for these data. explain your reasoning.

Answers

A linear model is appropriate for that data, as shown by the residual plot, which shows the points randomly distributed along the horizontal axis.

What is a linear model?

A linear model is described as a function of one or more predictor variables in a linear model. They can assist you in comprehending and forecasting the behavior of complex systems, as well as analyzing experimental, financial, and biological data.

Linear regression is a statistical technique for developing a linear model. The linear model is applied in various ways depending on the context. The most common occurrence is in relation to regression models, and the term is frequently used interchangeably with linear regression models. The term, however, is also used in time series analysis.

The plot on the left shows that the points are not randomly distributed along the horizontal line, indicating that the linear model is inappropriate for this data.

The plot on the right shows that, with the exception of a few points, the other points are more or less randomly distributed along the horizontal line, indicating that the linear model is appropriate for this data.

Learn more about linear model on:

https://brainly.com/question/1312151

#SPJ1

when a data flow diagram (dfd) is exploded, the higher-level diagram is called the child diagram.
a. true
b. false

Answers

It is FALSE to state that when a Data Flow Diagram (DFD) is exploded, the higher-level diagram is called the child diagram. (Option B)

What is a DFD?

A data-flow diagram depicts the movement of data through a process or system. The DFD also contains information on each entity's and the process's outputs and inputs. There is no control flow in a data-flow diagram; there are no decision rules or loops.

A data flow diagram depicts the processing of data inside a system that relies on inputs and outputs. The flow of data, data sources and termini, and where data is kept are all shown visually. Data flow diagrams are frequently used as the initial stage in redesigning a system.

Learn more about Data Flow Diagrams:
https://brainly.com/question/29418749
#SPJ1

think about the assignment and the example source that you just judged. now, select the best way to organize the research for this paper. topical compare/contrast problem/solution

Answers

The best way to organize the research paper is to use the problem-solution approach. (Option C)

What is the Problem Solution Approach to Organizing Essays?

To compose a problem/solution essay, consider an issue you have encountered and how it may be resolved. A problem/solution essay is written to explain a problem's solution(s). This essay might discuss various solutions to the situation you describe or one "perfect" answer.

A problem-solution pattern separates information into two primary pieces, one for the problem and one for the answer. This pattern is commonly employed in persuasive writing when the writer's overall goal is to persuade the reader to endorse a certain course of action.

Problem-Solution essays (also known as Proposing Solutions or Proposal essays) play a vital function. These writings teach readers about problems and offer suggestions for how to solve them.

Learn more about organizing essays:
https://brainly.com/question/9177894
#SPJ1

which is true? javadoc documentation is intended for users of a class. private class member comments are automatically included by the javadoc tool. javadoc comments should be placed directlyaftera class definition.

Answers

author tags are required by the Javadoc tool is True.

What is Java?

Millions of devices, including laptops, smartphones, gaming consoles, medical equipment, and many more, employ the object-oriented programming language and software platform known as Java. Java's grammar and conventions are based on those of the C and C++ languages.

What is Javadoc?

Using the Java programming language, the JavaDoc tool creates standard documentation in HTML format. It produces documentation for APIs. It analyzes the documentation and declarations in a collection of source files that describe classes, methods, constructors, and fields.

You must first include JavaDoc comments /* */ that provide information about the classes, methods, constructors, etc. before utilizing the JavaDoc tool. You must write better comments for each class, method, and constructor in order to create a nice and understandable document API for any java program.

The author tag in Javadoc is used to identify the file's original author as well as potentially all collaborators who made significant changes to the file. To determine whether a string is longer than the allowed number of characters, a validator is utilized.

Learn more about Javadoc click here:

https://brainly.com/question/13089773

#SPJ4

assume the following source code appears in a syntactically correct java class. which instance variable below stores a reference? private int green; private boolean orange; private char blue; private double red; private string purple;

Answers

Class-level instance variables can be declared either before or after they are used. The correct answer is B.  

An instance variable is a variable that is specific to an object. It is listed inside the curly braces of the class, outside of any methods. The value of an instance variable is accessible to all methods of the class, but is not accessible from outside the class. Non-static variables defined outside methods, constructors, or class blocks are known as instance variables in Java. In each instance of the class that is created, this variable exists separately. An instance variable belongs to a class.

Learn more about variable here-

https://brainly.com/question/13375207

#SPJ4

a(n) is a self-describing collection of integrated records. question 15 options: a) data warehouse b) data model c) relational database d) all of the above

Answers

a datasheet is a self-describing collection of integrated records.

What is a datasheet?
The information in a table or the outcomes of a query are visually represented in a datasheet. It presents the records from a table, form, or query result in a tabular (row and column) format with the fields for each entry displayed.
An item's or product's attributes are typically described in a datasheet for commercial or technical communication. It may be released by the producer to assist customers in selecting or utilizing products.

Without disclosing confidential information that might endanger a company's ability to make money, a datasheet can be used as a tool for advancing new technologies.

To learn more about datasheet, use the link given
https://brainly.com/question/2471127
#SPJ4

Looking at the three jobs you listed above in questions 3, 4, and 5, write a paragraph (4-6 sentences) below on how those jobs are connected to each other.

I chose Environmental engineers, Power plant operators, and Biotechnology Research and Development. How are these jobs connected? please help

Answers

The jobs of Environmental engineers, Power plant operators, and Biotechnology Research and Development are connected to one another. This is because all these sectors basically deal with the betterment of the environment for living organisms.

What is the role of Environmental engineers?

The role of environmental engineers is to develop and design the things and solutions to major environmental problems. They unite and work together in order to improve recycling, waste disposal, public health, and the regulation of air and water pollution.

The role of Power plant operators is to monitor plants and dams that significantly coordinate stream flow in order to meet power demands. They also regulate transmission load, frequency, and line voltages.

While Biotechnology Research and Development deals with the production and manufacturing of things that are efficient and helpful for human needs.

Therefore, all these sectors basically deal with the betterment of the environment for living organisms.

To learn more about Environmental engineers, refer to the link:

https://brainly.com/question/1322350

#SPJ1

What is the recommended password policy?

Answers

The recommended password policy is setting a maximum password age limit also helps with network security. Usually, this is set anywhere from 90 days for passwords to 180 days for passphrases.

Define network security.

The integrity, confidentiality, and accessibility of computer networks and data are protected utilizing both software and hardware technologies through a system of regulations and configurations called network security.

The policies, procedures, and procedures used to prevent, detect, and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources are referred to as network security.

Every organization needs to have some level of network security in place to defend it from the wide range of cyber threats that are now out there, regardless of its size, industry, or architecture.

To learn more about network security, use the given link
https://brainly.com/question/28776528
#SPJ4

________ storage stores 1 and 0 values in capacitors.

A. Optical

B. Analog

C. Magnetic

D. Solid-state

Answers

it’s C, am not really familiar

calculate the average waiting time of the processes with a quantum time of 4?

Answers

The average waiting time of the processes with a quantum time of 4 is 3.75 minutes.

What is quantum time?

Quantum time is defined as a unique and discrete "unit" of time, according to a theory that claims that time is not continuous. If time is quantized at all, it will probably be at the level of Planck time.

The average waiting time = 5 + 1 + 6 + 3

                                           = 15 / 4

                                           = 3.75 minutes

Thus, the average waiting time of the processes with a quantum time of 4 is 3.75 minutes.

To learn more about quantum time, refer to the link below:

https://brainly.com/question/14975970

#SPJ1

the electronic communications privacy act applies to . communications and session logs, but not transactional data transactional and session data, but not connections logs subscriber/session information only communications, transactional data, and subscriber/session information

Answers

The electronic communications privacy act applies to option D: communications, transactional data, and subscriber/session information

What is the Electronic Communications Privacy Act?

the 1986 Electronic Communications Privacy Act. prohibits illegal access to stored communications as well as unauthorized wire and electronic communication interception, disclosure, and access. Any intended recipient of an electronic message has the right to reveal it, according to the ECPA.

Therefore, The ECPA, as amended, provides protection for electronic, oral, and wire communications while they are being created, while they are being sent, and while they are being stored on computers. Email, phone calls, and electronically stored data are covered by the Act.

Learn more about electronic communications privacy act from

https://brainly.com/question/14142485
#SPJ1

Some video games can be controlled completely through voice. A. True B. False

Answers

Answer: B False

Fully voice-controlled games are a little rarer. That's because the technology isn't quite there yet. Source:  Quantum Fiber

11.8 lab: exceptions with arraysgiven an array of 10 names, complete the main method that outputs the name specified by the array index entered by the user. use a try block to output the name and a catch block to catch any arrayindexoutofboundsexception. output the message from the exception object if an arrayindexoutofboundsexception is caught. output the first element in the array if the index is negative or the last element if the index is greater than the size of the array.hint: format the exception outputs using the getmessage() method from the exception object. do not hard code the exception messages.ex: if the input of the program is:

Answers

The input used in the program is mentioned as below.

What is Program?

A series of instructions written in a programming language for a computer to follow is referred to as a computer program.

Software, which also contains documentation and other intangible components, comprises computer programs as one of its components. The source code of a computer program is the version that can be read by humans.

The application uses try and catch to demonstrate how to use exception catching.

Exceptions are merely program-crashing errors.

To stop errors from crashing a program, use try and catch.

The necessary try and catch block looks like this:

try {

      System.out.print(names[index]);

  }

  catch (ArrayIndexOutOfBoundsException e) {

 System.out.println(e.getMessage());

}

The flow of the above code segment is as follows:

First, we begin with the try block

try {

Then the program prints the element at the index

      System.out.print(names[index]);     }

If the index does not exist in the array (e.g. -1 or 11), then the catch block is executed

  catch (ArrayIndexOutOfBoundsException e) {

This prints the appropriate exception

 System.out.println(e.getMessage()); }

Learn more about similar programs here:

brainly.com/question/21330187

#SPJ1

Print rows and columns (10 points)
Ask the user for how many columns and then how many rows. Then ask the user for what words they like to print. Print those words in the amount of columns and rows the user wanted.

Answers

Answer:

python

Explanation:

hi again
im assuming you want this in python because you dont specify this in your question

import random

columns = input('How many columns?\n')

rows = input('How many rows?\n')

columns = int(columns)

rows = int(rows)

list_words = []

inputwords = input('Tell me words you want to print separated by spaces\n')

for word in inputwords.split():

       list_words.append(word)

table_data = []

for row in range(rows):

       placeholder_column = []

       for column in range(columns):

               placeholder_column.append(random.choice(list_words))

       table_data.append(placeholder_column)

string_of_format = ""

for iter_column in range(columns):

       string_of_format += "{: >20}"

for iter_row in table_data:

       print(string_of_format.format(*iter_row))

your network administrator has asked you to change the subnet mask of the cisco router used in the organization. which of the following cisco cli modes would you apply in this scenario?

Answers

We use the router configuration mode to change the subnet mask of the cisco router.

What is the subnet mask?
A logical division of an IP network is called a subnetwork or subnet. The subnet is the process of splitting an existing network into two or more separate networks. In their IP address, computers with the same subnet address use the same most significant bit-group.

An IP address can be split into two halves using a subnet mask. Both the host (computer) and the network to which it belongs are identified by separate parts. For instance, 255.255.255.0 is a typical subnet mask for basic home networks. Within the home network, this subnet mask permits up to 254 valid IP addresses.

To learn more about a subnet mask, use the link given
https://brainly.com/question/28256854
#SPJ1


Two benefits for members of the community of
replacing the printed copy with an online version.

Answers

Answer: 1. They will be able to easily cite the online version by copying and pasting.

2. Printed copies have to be searched for manually and it is easier to find the online version

https://brainly.com/question/24791742

to reduce the possibility of security break-ins from unauthorized users, which should be implemented?

Answers

Answer: seguridad en computadoras

Explanation:

para evitar intrusos en los computadores conectados a internet deberíamos de tener implementado en nuestra red un firewall o cortafuegos  en nuestro ordenador y posiblemente un fisico

identify the type of sentence. look out! compound-complex compound sentence simple sentence complex sentence

Answers

Simple sentences are those that contain only one independent clause. A complex sentence consists of an independent clause and one or more dependent clauses.

A compound-complex sentence combines both. Four types of sentences can be distinguished: simple, compound, complex and compound complex. Each sentence is defined by independent and dependent clauses, conjunctions, and subordinate clauses. If there is only one independent clause in a sentence, it is considered simple. In grammar, a sentence is a group of words composed of a subject and a predicate. The word "subject" expresses the subject of the sentence or the person or thing that performs the given action.

Learn more about complicated here-

https://brainly.com/question/13062358

#SPJ4

Other Questions
Dr. Ellison says that the equation y = -3x + 7 has a solution f(2) = 5/3. Is Dr. Ellison right or wrong? determine whether the value is a discrete random variable, continuous random variable, or not a random variable. a. the b. the c. the d. the e. the f. thea. The amount of rain in City Upper B during Aprilb. The number of statistics students now reading a bookc. The eye color of people on commercial aircraft flightsd. The time it takes for a light bulb to burn oute. The square footage of a housef. The time it takes to fly from City Upper A to City Upper B ST has had problems with anxiety and was previously prescribed with Alprazolam 0.75 mg PO. You have on hand Xanax 0.25 mg tablets. How many will you dispense adam frequently plays violent video games. social psychologists would predict that adam would be most likely to Two angles whose sum is 180 degrees are supplementary angles find the measure of the supplementary angle (11x+2) /(8x+7) A musical in which characters sing and dance; a play like Shakespeare's Macbeth because it has a ghost and soliloquies; language that is poetic. These are examples of If x= 1 is a zero of the polynomial function f(x) = 3x+4x - 5x-2, which of the following is another zero of f(x)? (6 points) which of the following suggests that new or conflicting information given to us by the media creates mental discomfort? Why is study past climate changes and their impacts such as the impact from the rapid warming event of the perm so important today Physical evidence that supports the sliding filament theory includes decreased distance between the z-discs during contraction. a. True b. False What are functions of the four macromolecules?For each function listed, choose the correct macromolecule from the drop-down menu.Store and transmit genetic information Nucleic acidsAre primarily used to store energy Help regulate cell processes Are used for main source of energy Find the common difference of the arithmetic sequence -4, 1, 6,... assume mvp contains 410 story points of work. how long will it take to deliver mvp if velocity is 18 story points per sprint and each sprint is two weeks in duration? somebody answer, please?The table displays data collected, in meters, from a track meet.one fourth 6 2 43 two thirds one third nine halvesWhat is the median of the data collected? 2.5 4.5 2 3 a person who brings things into the county illegally A monkeys choosing a circle from an array of geometric shapes in order to be rewarded with a banana is an example of. Based on the root and affixes, what is the best definition of incredible?awesomebelievedgiantunbelievable 4. A chemist is analyzing a sample of an unknown gas. A 0.240-gram sample of a gas has a volume of 336 mL when measured under a pressure of 1520 mm Hg at 273 C. Find the molecular weight (molar mass Find the slope of the line on the graph.Write your answer as a fraction or a wholenumber, not a mixed number or decimal. What is John Doe's blood type? A drop of John Doe's blood wasplaced into each of the four circles on this blood type card.Anti-A serum was addedto this circle - no clumpingmeans his blood doesNOT have A Protein.Anti-D serum was addedto this circle - it clumped!This means John's bloodhas D Drotein (Rh factor).Blood Proteins:ABO+0-94DELLContrDrag the proteins over to the box whichJohn's blood has. This is his blood type!Remember: + means Rh is present,- means there is no Rh.Anti-B serum was addedto this circle - no clumpingmeans his blood doesNOT have B Protein.No clumping in the control showsthere is nothing wrong with the blood!John Doe'sBlood Type:Opls help