an application integrates all of its functionality into a package that is either deployed in its entirety or not at all, and all of its elements use a shared database. which architectural model does the application follow?

Answers

Answer 1

The application will follow the cloud architecture model. You don't have to be an expert to use cloud-based architecture. This monitoring and assistance are part of the deal with cloud servers.

The way technological elements come together to create a cloud, where resources are pooled through virtualization technology and shared across a network, is known as cloud architecture. The elements of a cloud architecture are as follows:

an entrance platform (the client or device used to access the cloud), a supporting platform (servers and storage), an online delivery system, a system.

These technologies work together to build a cloud computing infrastructure on which applications can operate, enabling end users to take use of the strength of cloud resources.

You don't have to be an expert to use cloud-based architecture. This monitoring and assistance are part of the deal with cloud servers. You pay less for it, and it guarantees that someone is always aware of the status of your program. By sharing resources among a group of users, multi-tenant systems also cut costs.

To know more about cloud architecture click here:

https://brainly.com/question/14187559

#SPJ4


Related Questions

Which statements serve as evidence that supports the theme of "The Story of the Fisherman

Answers

The statements that serve as evidence that supports the theme of "The Story of the Fisherman" are:

A. “I conjure you on your honour to tell me if you really were in that vase?”

B. “How could your whole body go in? I cannot believe it unless I see you do the thing.”

E. “‘No,’ answered the fisherman, ‘if I trust myself to you I am afraid you will treat me as a certain Greek king treated the physician Douban.’”

What is the story of the fisherman?

The fisherman's tale is that there once was a fisherman who was so old and so indigent that he could hardly provide for his wife and three children. He set a rule not to throw his nets more than four times each day and left very early for fishing each day. He set out one morning during the full moon and arrived at the seashore.

The lesson does the tale of the fisherman and the fish teach us is that you are still better than nothing at all, no matter how small you are. A modest victory is more valuable than a huge promise.

Learn more about Story of the Fisherman from

https://brainly.com/question/28178281
#SPJ1

See full question below

Which statements serve as evidence that supports the theme of "The Story of the Fisherman"? Check all that apply. "I conjure you on your honour to tell me if you really were in that vase?" "How could your whole body go in? I cannot believe it unless I see you do the thing." "I rebelled against the king of the genii. To punish me, he shut me up in this vase of copper." "The fisherman was very unhappy. ‘What an unlucky man I am to have freed you! I implore you to spare my life.'" "‘No,' answered the fisherman, ‘if I trust myself to you I am afraid you will treat me as a certain Greek king treated the physician Douban.'"

Fred tells you that he is finally getting rid of his old computer. He has some sensitive information on it, and since you seem like someone who knows about IT, he asks you what he should do with it. What would you recommend?


Throw it in a Dumpster.


Erase the hard drive.

Write over the hard drive.


Give it away to a trusted friend for safekeeping.

Answers

Answer:

write over the hard drive, then physically destroy it (e.g., drill holes in it).

Explanation:

This minimizes the possibility for data recovery.

kristin's position in it focuses on using antivirus, anti-spyware, and vulnerability software patch management to maintain security and integrity. which it infrastructure domain is she protecting? question 2 options: user domain workstation domain lan domain lan-to-wan domain

Answers

She protecting LAN-to-WAN domain data link. Personal computers and workstations can share information, resources, and software thanks to the local area network, or LAN, which links network devices.

The process of providing and implementing software updates is known as patch management. These patches are frequently required to fix faults or errors (sometimes known as "vulnerabilities" or "vulnerabilities") in the software.

The technical framework that links a company's local area network to its wide area network is referred to as the LAN-to-WAN domain (WAN). Controlling network traffic between the private network, or LAN, and the public network, or WAN, is the key issue. For many enterprises, the LAN-to-WAN domain designates their connection to the Internet. There is a big risk associated with this link.

The configuration of devices in LAN-to-WAN security standards is frequently centered on preserving message and transaction integrity. Securing point-to-point connections is a crucial aspect of connectivity over the Internet.

To know more about LAN-to-WAN click on the link:

https://brainly.com/question/18850995

#SPJ4

star technology is working on a project that needs a communication mode specializing in encryption, where only authorized parties should understand the information. the company also requires accuracy, completeness, and reliability of data throughout the project. the company has contacted you for an ideal cipher mode solution without using a counter. which mode should you suggest?

Answers

Block-chaining cipher (CBC) In cipher block chaining mode, the plaintext of one block is encrypted by using an exclusive or (xor) operation to join it with the ciphertext of the preceding block.

The AES's first generation is essentially represented by the ECB (Electronic Codebook). This type of block cipher encryption is the most fundamental. An enhanced type of block cipher encryption is called CBC (Cipher Blocker Chaining). Each ciphertext block processed in CBC mode encryption depends on all plaintext blocks processed prior to it. The main distinction between CFB mode and CBC mode is that CFB is a stream mode. When utilized in stream modes, feedback—also known as chaining—is used to break patterns. Similar to CBC, CFB employs an initialization vector, obliterates patterns, and causes errors to spread.

Learn more about cipher encryption here-

https://brainly.com/question/13906205

#SPJ4

you need to implement a wireless network link between two buildings on a college campus. a wired network has already been implemented within each building. the buildings are 100 meters apart. which type of wireless antennae should you use on each side of the link? (select two.) answer normal-gain directional high-gain bridge omni-directional

Answers

Since you need to implement a wireless network link between two buildings on a college campus, the type of wireless antennae should you use on each side of the link are option C and E. high-gain  and Parabolic.

How does a parabolic reflector provide very high gain?

High gain: Parabolic reflector antennas have a very high gain capability. The gain increases with the size of the wavelength "dish." High directivity: The parabolic reflector or dish antenna can offer high levels of directivity, just like it does with gain.

Gain is the volume of a signal at the input before it is amplified or processed by a computer. The signal is louder the higher the gain. For instance, you will need to increase gain if a microphone's sensitivity is low in order for the amplifier to amplify the sound louder.

Therefore, Two or more devices are connected over a brief distance using a wireless local area network (WLAN).

Learn more about wireless network link from

https://brainly.com/question/26956118

#SPJ1

See full question below

you need to implement a wireless network link between two buildings on a college campus. a wired network has already been implemented within each building. the buildings are 100 meters apart. which type of wireless antennae should you use on each side of the link? (select two.) answer normal-gain directional high-gain bridge omni-directional parabolic

While performing research for a school writing project, you discover a website that contains exactly the information you think will nicely round out your paper. Describe how you will incorporate the information into your project and the steps you will take to ensure you give proper credit to the author.

Answers

While conducting research for a school writing project, you locate a website that contains exactly the details you think will nicely round out your paper. The best way to incorporate the information into your project and the steps you will take to ensure you give proper credit to the author are

given as follows: You must ensure that you give credit in the following ways:

Introduce the author and or the title of the source; Cite the link; and Make use of footnotes at the end of the bibliography. Why significant to give recognition to an author whose text you have quoted?

The law of copyright prevents an author's work from being duplicated without permission. To comply with this you must always credit the source. If you plagiarize a work, the author may sue you or you may fail your course.

Citations are vital because they assist others in finding the material you utilised. They contribute to the credibility of your own study. They relate your research to the research of other researchers.

Learn more about giving proper credit:
https://brainly.com/question/15082562
#SPJ1

Which kind of GIMP tool is used for editing tasks such as cropping or rotating an image?

Question 8 options:

A) paint tools


B) transform tools


C) selection tools


D) miscellaneous tools

Answers

The kind of GIMP tool that is used for editing tasks like cropping and many more is selection tools. The correct option is C.

What is GIMP tool?

GIMP is a cross-platform editing software that is readily accessible for GNU/Linux, macOS, Windows, and other platforms. Because it is free software, you are free to modify it and distribute your changes.

GIMP shines when it comes to photo enhancement and editing. It provides a comprehensive set of tools for correcting mistakes made during the capture process.

The purpose of selection tools is to select regions from the active layer so that you can work on them without affecting the unselected areas.

Thus, the correct option is C.

For more details  regarding GIMP tool, visit:

https://brainly.com/question/11033532

#SPJ1

you want a security solution that protects the entire hard drive and prevents access even if the drive is moved to another system. which solution should you choose?

Answers

A smart way to keep your private information safe from prying eyes is to encrypt your hard disk. Naturally, if our careless, it could also serve to hide our info from us.

In contrast to an unencrypted computer, our data cannot be easily recovered if we forget your password. Hard-disk encryption is a method that employs complex mathematical operations to encrypt the data kept on a hard drive. Anyone without the necessary key or password cannot access the data on an encrypted hard drive. Regularly backup and save our files in several secure locations. before we see the first indicators of a failing hard drive, create an image backup. Update our anti-virus software.

Learn more about unencrypted here-

https://brainly.com/question/11083372

#SPJ4

Help asap need to turn it in

Answers

Answer:

11. Firewall

12. True

13. True

Explanation:

As based on experience

you're configuring a failover cluster and want a quorum configuration in which cluster quorum data is located in a shared folder on a server in another location. which quorum configuration should you choose?

Answers

Quorum configuration should Node and File Share Majority.

What is Quorum?
A quorum is the minimal number of participants required to do business in a plenary session (a body that follows parliamentary process, such as a legislature). The necessity for a quorum provides protection against entirely unrepresentative action taken in the name of a body by an excessively small number of people, as according Robert's Rules of Succession Newly Revised. A plenum, in contrast, is a gathering of the entire (or, very rarely, almost entire) body. If a quorum is present, a body, meeting, or vote of it is quorate (or casts valid votes). The Latin word quorum, which means "of whom" and is the genitive plural of qui, "who," is the source of the Middle English phrase of the commission that was once given to justices of the peace.

To learn more about Quorum
https://brainly.com/question/2639652
#SPJ4

the memory architecture of a machine x has the following characteristics: virtual address 54 bits; page size 16 k bytes; pte size 4 bytes. assume that there are 8 bits reserved for the operating system functions (protection, replacement, valid, modified, and hit/miss- all overhead bits) other than required by the hardware translation algorithm. derive the largest physical memory size (in bytes) allowed by this pte format. make sure you consider all the fields required by the translation algorithm

Answers

The memory address space is 128 MB, so 227. However, each word is 8 (23) bytes, so there are 224 words. This means that log2 224 or 24 bits are required to address each word.

Therefore, each entry is at least 44 bits long (6 bytes if byte aligned, 8 bytes if word aligned). So each top-level page table is 256 * 6 = 1536 bytes (256 * 8 = 2048 bytes). Pages are typically between 512 and 8192 bytes, with 4096 being a common value. Page sizes are almost always powers of 2 for reasons explained below. The loadable module is also divided into several side frames. A page frame is always the same size as the page in memory.

A 128 x 8 RAM chip can be written as 27 x 8. Each RAM chip requires a 7-bit address.

Learn more about address here-

https://brainly.com/question/20012945

#SPJ4

walkthroughs combine​ observation, inspection, and inquiry to assure that the controls designed by management have been implemented. question content area bottom part 1 true false

Answers

True, walkthroughs combine​ observation, inspection, and inquiry to assure that the controls designed by management have been implemented.

What is a walkthroughs?

A walkthrough is a term in internal control used to describe a situation whereby the auditor selects one or a few document(s) for the initiation of a transaction type and traces them through the entire accounting process using a combination of  observation, inquiry,  and inspection to assure that the controls designed by management have been implemented. Auditing standards require the auditor to perform at least one walkthrough for each major class of transactions

Learn more on walkthrough from:

https://brainly.com/question/15831196?referrer=searchResults

#SPJ4


What is the output of the attached code? *

Square s1 = new Square (4);
Square s2 = new Square (4);
s1.setRadius (2) ;
System.out.println("The area is " + (s2.getLength()*s2.getLength (
O The area is 4
O The area is 2
The area is 16
O The area is 6
O The area is 8

Answers

S1 B. Is the answer
Ur welcome

Masks can be:

Question 6 options:

any color.


black, white, or gray.


black or white.


warm or cool.

Answers

Answer:

last answer

Explanation:

Some experts believe that the internet is a vulnerable resource. Describe some significant ways your life would change if the internet as we know it ceased to exist.

Answers

Some of the significant ways one's life could be altered if the internet as we know it today ceased to exist are:

One there would be serious disruptions in the world's economy because a lot of banking and financial systems are not wired over the backbone of the internet.It would also affect aviation, there would be canceled flights, and transportation systems would be seriously affected for the same reason stated above.Perhaps the worst of it all would be that information flow will be stifled.

What is the internet?

The Internet comprises a vast network that links computers all over the world. People can interchange information and talk over the Internet from anywhere with an Internet connection.

The Internet is made up of technology created by many individuals and organizations:

Robert W. Taylor, who directed the creation of the ARPANET (an early version of the Internet), andVinton Cerf and Robert Kahn, who invented the Transmission Control Protocol/Internet Protocol (TCP/IP) technology, are important people.

Learn more about the Internet:
https://brainly.com/question/28843367
#SPJ1

if public concern and interest in data security issues increased after a number of television and newspaper stories about "hacking," it would be an example of the media’s

Answers

If the general public concern and interest in data security issues increase after certain television and newspaper stories about hacking, it is an example of the media’s indexing power.

The indexing power of media is the capacity through which it influences the opinions, actions, and decisions of the general public. Media platforms such as television and newspapers are integral parts of today’s era that can influence the concerns and interests of the public almost about all things/matters by delivering the latest news and stories about them.

For example, when the news and stories relating to issues of ha-cking are delivered to the public through newspapers and television constantly, it makes people more concerned and interested in the security of their data when using the internet.

You can learn more about influence of media at

https://brainly.com/question/24236735

#SPJ4

in this micro-assignment, you will be implementing some missing code for a class bst template provided. you must work within your linux environment. please use the project given on canvas. specifically, you will need to implement code for the following 4 functions in bst.h and make sure all existing test cases in main() have the correct outputs. the only file you need to change is bst.h.

Answers

Applications employ Linux environment variables, which are variables having a name and a corresponding value, to obtain information about the environment.

An environment in computer operating systems is a section that houses data on how particular programs and applications behave. Linux user environments make it easier to find the command you require and do a lot without knowing the specifics of how the system is set up. Another issue is where the settings originate from and how they can be changed. Applications launched in shells or subshells employ environment variables, which are dynamic values saved on a system and used by such programs. These variables have respected names and values. The environment variable alters the system's functionality and an application's behavior.

Learn more about environment here-

https://brainly.com/question/13107711

#SPJ4

a b -tree is to be stored on disk whose block size is 3096 bytes. the data records to be stored are 36 bytes, and their key is 4 bytes. determine the values for m and l for the b -tree. assume pointers are 4 bytes each.

Answers

NARA's technical research staff conducted a nationwide survey of federal agencies to identify existing optical digital data disc installations.

This data collection process provided a modern user experience and helped system administrators gather insight into their institutions' plans to adopt optical digital disc technology. Small systems are defined as systems with fewer than 20 optical digital discs, few image capture and user workstations, and no jukeboxes. In practice, smaller systems are often pilot projects that have not yet been fully scaled, or serve as research test platforms. Larger systems, on the other hand, typically store optical digital data discs in jukeboxes, use network communications to link multiple image processing and user retrieval workstations, and are equipped with high-speed image capture equipment.

Learn more about research here-

https://brainly.com/question/18723483

#SPJ4

Which key combination can a user press to toggle between formula view and normal view within excel?.

Answers

The user can press the "Ctrl" and "~" keys at the same time to toggle between formula view and normal view.

What is toggle?
In general computing, a toggle is a switch from one setting to another. The name suggests that it is a switch with only two options: on or off, or A or B. A list of options or preferences can be found in practically every computing-related element. Toggles are any option items that may be toggled on or off. A toggle can be used to switch hardware or software. For instance, the Caps Lock & Num Lock keys on the keyboard serve as toggles for those particular features. When one of these keys is depressed once, it activates the corresponding function, but when it is depressed twice, it turns it off. These functions are initially off.

To learn more about toggle
https://brainly.com/question/28776085
#SPJ4

problem 2 (38 points): write a c program to prompt the user to enter a number between 1 and 15462. the final goal is to display the individual digits of the numbers on a line with three spaces between the digits. the first line is to start with the right-most digit and print it five times; the second line is to start with the second digit from the right and print it four times, and so forth. in order to do that, you must first separate the digits. no conversion from string to integers is allowed, neither are arrays. for example, if 1234 is entered, the following should be printed: 4 4 4 4 4 3 3 3 3 2 2 2 1 1 0 then, write c code to accomplish a similar print, where the digits are displayed flush left and in order. again, the digits must be separated programmatically. no conversion from string to integers is allowed, neither are arrays. for example: 0 1 2 3 4 0 1 2 3 0 1 2 0 1 0

Answers

#include <bits/stdc++.h>

std::string f;

void fi(int d) {

   std::cout << "First step:\n";

   if(d<5) {

       for(int i=5-d; i>0; i--) {

           f.insert(0,"0");

       }

   }

   for(int n=5;n>0;n--) {

       for(int m=n;m>0;m--) {

           std::cout << f.at(n-1) << "   ";

       }

   }

   std::cout << std::endl;

}

void se(int d) {

   std::cout << "Second step:\n";

   int n = 5;

   if(d<5) {

       for(int i=5-d; i>0; i--) {

           f.insert(0,"0");

       }

   }

   do{

       for(auto const& m: f) {

           std::cout << m << "   ";

       }

       f.pop_back();

       n--;

   }while(n>0);

   std::cout << std::endl;

}

int main(int argc, char* argv[]) {

   std::cin>>f;

   fi(f.size());

   se(f.size());

   return 0;

}

an attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. the attacker sent data that was able to manipulate the return address that is reserved to store expected data. which vulnera

Answers

A buffer overflow exploit resulted from the attacker's actions.

What is buffer overflow?

A buffer overflow, also known as a buffer overrun, is an anomaly in information security and programming that occurs when a programme, when writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations. Buffers are memory spaces set aside to keep data while it is being moved from one component of a programme to another or between applications. Buffer overflows are frequently caused by faulty inputs; if the buffer is established with the assumption that all inputs will be lower than a given size, then an unusual transaction that produces more data may lead it to write past the end of the buffer.

Attackers take advantage of buffer overflow flaws by overwriting an application's memory. This alters the program's execution route, resulting in a response that damages files or exposes confidential information.

To learn more about buffer overflow

https://brainly.com/question/9906723

#SPJ4

excluding $0.00, what is the minimum bi-weekly high rate of pay (please include the dollar sign and decimal point in your answer)? the code has been started for you, but you will need to add onto the last line of code to get the correct answer.

Answers

Given the last line of code stated in the question:

Select Biweekly _ high _ Rate

From salary _ range _ by _ job _ classification

ORDER BY LENGTH ( Biweekly _ high _ Rate ) ASC , Biweekly _ high _ Rate ASC ;

The minimum bi-weekly high rate of pay when we exclude $0.00 is stated below:

The SQL Code

SELECT

MIN ( Biweekly _ high _ Rate )

FROM salary _ range _ by _ job _ classification

WHERE Biweekly _ High _ Rate < > ' $ 0 . 00 '

ORDER BY Biweekly _ High _ Rate ASC ;

The given SQL code allows you to select the min Biweekly _ high _ Rate FROM the table Using WHERE < > ' $ 0 . 00 ' you are excluding values that are equal to zero.

Then you are ORDERING by the Biweekly _ High _ Rate to get the first value correct.

Read more about SQL here:

https://brainly.com/question/27851066

#SPJ1

a type of memory that can hold data for long periods of time, even when there is no power to the computer, is called .

Answers

A type of memory that can hold data for long periods of time, even when there is no power to the computer, is called secondary storage.

What is computer?

A computer is a digital electrical machine that may be programmed to automatically perform arithmetic or logical operations (computation). Programs are generic collections of operations that modern computers can do. These programmes allow computers to do a variety of jobs.

ROM is a sort of non-volatile memory, which implies that the data contained in it persists even when no power is applied to it, such as when the computer is turned off. In this regard, it is analogous to secondary memory, which is utilised for long-term storing.

To learn more about computer

https://brainly.com/question/24540334

#SPJ4

you have assigned a junior administrator to create a windows server 2016 failover cluster. the administrator does not have the create computer objects permission in active directory. what should you tell the junior administrator to do?

Answers

         Microsoft's server operating system is Microsoft Windows Server 2016. (OS). It was created with the intention of acting as a platform for networked applications. Windows Server 2016 was created concurrently with Windows 10 and made generally available on October 12, 2016.

What capability of Windows Server 2016 tries to stop a split vote from happening?

       Split-brain situations, which can occur when a network is divided and portions of the nodes are unable to communicate with one another, are avoided by quorum. Due to this, both groups of nodes may attempt to control the workload and write to the same disk, which can result in a number of issues.

       You can use the Cluster-Aware Updating (CAU) capability in Windows Server 2012 R2. On clustered servers, CAU automates software updating while preserving availability.

      The same version of Windows Server 2016 must be used by all servers. An Active Directory domain must be joined by all servers. Hardware components must be the same across all servers.

To Learn more About Windows Server 2016, Refer:

https://brainly.com/question/14526761

#SPJ4

What is utility software ​

Answers

Answer:

Explanation: Utility software is software designed to help analyze, configure, optimize or maintain a computer. It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users.

write a java program that convert a positive number into a negative number and negative number into a positive number using switch statements

Answers

import java.util.Scanner;

class convertint {

   public static void main(String[] args) {

       Scanner f = new Scanner(System.in);

       System.out.println("Enter a number to convert: ");

       int s = f.nextInt();

       int check = (s>0) ? 1 : (s==0) ? 0 : -1;

       switch(check) {

           case 1:

               System.out.println(s*-1);

               break;

           case 0:

               System.out.println("0");

               break;

           case -1:

               System.out.println(s*-1);

               break;

           default:

           ;;

       }

   }

}

explain what is meant by the term conditionally executed. 2. you need to test a condition and then execute one set of statements if the condition is true. if the condition is false, you need to execute a different set of statements. what structure will you use? 3. if you need to test the value of a variable and use that value to determine which statement or set of statements to execute, which structure would be the most straightforward to use? 4. briefly describe how the and operator works. 5. briefly describe how the or operator works. 6. when determining whether a number is inside a range, which logical operator is it best to use? 7. what is a flag and how does it work

Answers

The decision to execute an instruction or not is made by conditional execution. The majority of instructions contain a condition attribute that, depending on the value of the condition flags, decides whether the core will execute them.AND. This operator logically joins two Boolean expressions together. The AND operator gives True if both expressions are True. The AND operator yields False if either, or both, of the phrases evaluate to False.One or more data bits used to record binary values as particular program structure indicators are referred to as flags. A flag is a part of the data structure of a programming language.

learn more about the program here:

https://brainly.com/question/24833629

#SPJ4

you're installing a new linux server that will be used to host mission-critical database applications. this server will be heavily utilized by a large number of users every day. which distributions would be the best choices for this deployment? (choose two.)

Answers

Use the printenv command to display the values of environment variables. When the Name parameter is specified, the system only prints the value corresponding to the variable you asked for.

Libraries - Libraries are collections of ready-made code that programmers may incorporate into their programs. Asynchronous JavaScript with XML is referred to as AJAX. Due to the compelling user experience it offers, it has gained popularity quickly despite being built on a blend of already-existing Web standards like HTML, JavaScript, CSS, XML, and SOAP. The environment variables in the current shell are displayed using the printenv command-line tool. On the command line, we can specify one or more variable names to print only those particular variables.

Learn more about command here-

https://brainly.com/question/14548568

#SPJ4

What happens at the end of each iteration of the repeat loop in this code?

A. The program pauses for 2 seconds.
B. The shark's position on the screen changes.
C. The number of sharks increases
D. The shark follows the fish at a speed of 2000

Answers

Answer:

B. The shark's position on the screen changes.

a type of database that is used for strategic analysis is called what? online transaction processing database online enterprise resource database online strategic resource database online analytical processing database

Answers

The type of database that is used for strategic analysis is called an online analytical processing database.

What do you mean by database?

A database is a structured collection of data that is stored and retrieved electronically in computing. Small databases can be kept on a file system, whereas large databases are kept on computer clusters or in the cloud. Database design encompasses both formal techniques and practical factors, such as data modelling, efficient data representation and storage, query languages, sensitive data protection and privacy, and distributed computing issues such as concurrent access and fault tolerance.

An OLAP database is an online database which is used to generate faster and more efficient reports and analysis than traditional databases. An OLAP database stores multidimensional cubes of aggregated data that may be analysed using numerous data properties.

So, D is the right answer.

To learn more about database
https://brainly.com/question/22080218

#SPJ4

Other Questions
Why is Uk's weather not Antarctica's Enter your plan for fitness improvement PLOT THE POINTS FOR BRAINLIST HELPPPP y=(x-5)^2 quadratic function and state the functions domain and graph Usain Bolt is considered to be the fastest person on earth. He holds the record for the fastest 100 m (meters), ,which he ran in 9.58 s (seconds), in 2009. We'll assume that Bolt ran the race at a constant speed.Which of the following equations, where t represents time in seconds and d represents distance in meters, describe a speed greater than Bolt's record-breaking speed in 2009?Choose all answers that apply!A. d=10tB. d=10.2tC. d=10.4tD. d=10.45tKhan Academy - Rates & proportional relationships How has the sun caused changes in global and hemispheric temperatures over the past millennium?. Find the APR (rounded to the nearest tenth of a percent) for the loan. Purchase a living room set for $3,600 at 8 % add- on interest for 3 years. Solve the equation.3x^2 + 12 = 0 a 0.755g sample of hydrated copper (ii) sulfate, cuso4 x h2o was heated carefully until it had changed completely to anhydrous copper (ii) sulfate, cuso4, with a mass of 0.483 g. determine the value of x. . 2 1 3 LAU 5 16 7 DO If angle 1 is x+74 and angle 8 is 2x - 1, what are the measures of angle and 87 Which of the following statements is false?A. A rhombus is a quadrilateral.B. A quadrilateral is a polygon with four angles.C. In quadrilateral PQRS, P and S are opposite angles.D. The diagonals of a rhombus are perpendicular and bisect each other. if 6 bushels of apples is equal to 24pecks of apples,what is the ratio of bushels of bushels to pecks? What type of energy is the sum of kinetic and potential energy in an object that is used to do work?. Write 3/10 + 7/100 as a single fraction using decimal notation pllllllllssss need it In a minute its urgent The range of F(x) = 7.4* is all positive real numbers. Why did the Meii reformers want to modernize Japan? problem 3 how many rearrangements of are there in which no two adjacent letters are also adjacent letters in the alphabet? for example, no such rearrangements could include either or . Employee/working conditions fact? Which arrangement shows 5 1/2 , 5 , 6.4 , and 26/4 in order from least to greatest? Every time you eat cotton candy, you are reminded of the time you went to a carnival with your best friend and ate cotton candy and rode a roller coaster. In this scenario, the cotton candy represents.