Answer True or False to these questions
a. Schedules under strict 2PL do not allow dirty reads.
b. Every serializable schedule is conflict serializable.
c. An index containing ‘data records’ in ‘data entries’ can be unclustered.
d. Using an unclustered index speedups range search.
e. If all operations of transactions are read-only, then every schedule is serializable.
f. 2PL allow deadlocks and strict 2PL avoids deadlocks.
g. Only one transaction can hold a shared lock at any time.

Answers

Answer 1

Answer:

a. True: Schedules under strict 2PL do not allow dirty reads.

b. False: Every serializable schedule is conflict serializable.

c. False: An index containing ‘data records’ in ‘data entries’ can be unclustered.

d. False: Using an unclustered index speedups range search.

e. True: If all operations of transactions are read-only, then every schedule is serializable.

f. False: 2PL allow deadlocks and strict 2PL avoids deadlocks.

g. False: Only one transaction can hold a shared lock at any time.


Related Questions

Write a program that prompts the user for a radius and then prints for python

•The area and circumference of a circle with that radius

•The volume and surface area of a sphere with that radius

Answers

Lol ur mad hehehe lol

Write the Python code for a program called MarathonTrain that asks a runner to enter their name, and the maximum running distance (in km) they were able to achieve per year, for 4 years of training. Display the average distance in the end. 4​

Answers

Your question has not been processed through Brainly. Please try again

Explain the three major Subassembly
of a computer Keyboard​

Answers

The keyboard is divided into four sections: alphabetical keys, function keys, cursor keys, and the numeric keypad.  Additional special-purpose keys perform specialized functions.  The mouse is a pointing device used to input data.  Input devices enable you to input data and commands into the computer.

The  three major Subassembly of a computer Keyboard​ are as follows;  alphabetical keys, function keys, and the numeric keypad.

What are the three major Subassembly of a computer Keyboard​?

The keyboard is divided into four components as; alphabetical keys, function keys, cursor keys, and the numeric keypad.

An Keyboard is an input Device used to enter characters and functions into the computer system by pressing buttons.

An Keyboard is a panel of keys that operate a computer or typewriter.

Additional special-purpose keys perform specialized functions.

The mouse is a pointing device used to input data.

The Input devices enable to input data and commands into the computer.

The  three major Subassembly of a computer Keyboard​ are as follows;  alphabetical keys, function keys, and the numeric keypad.

Learn more about the keybord here;

https://brainly.com/question/24921064

#SPJ2

What are the basic steps in getting a platform up and running?

Answers

The basic steps in getting a platform up and running are:

Set and know your intended community. Then Define the features and functions to be used.Select the right technology and create a structure. Then set up Activity Stream.Make Status Update Features.

How do I build a platform for business?

There are a lot of key principles to look into when making a platform.

Note that the very First step in platform creation is that one need to start with the aim of helping in the interaction between people or users, the producer and the consumer.

Thus,  It is the exchange of value that tends to bring more users to the platform.

Therefore, The basic steps in getting a platform up and running are:

Set and know your intended community. Then Define the features and functions to be used.Select the right technology and create a structure. Then set up Activity Stream.Make Status Update Features.

Learn more about platform  creation from

https://brainly.com/question/17518891

#SPJ1

Which of the following are used to compare performance & efficiency of algorithms? (PROJECTSTEM 3.6 Lesson Practice Question #1

Which of the following are used to compare performance & efficiency of algorithms? (PROJECTSTEM 3.6

Answers

The option that can be used to compare the performance and  efficiency of algorithms:

Speed of the Algorithm (Option B); andMemory Use of the Algorithm (Option F).

How do you use the above to check the performance of an Algorithm?

Time, complexity and space complexity are the two basic metrics of an algorithm's efficiency, although they cannot be directly compared. As a result, time and space complexity are taken into account for algorithmic efficiency.

It should be emphasized that the faster an Algorithm executes, the more efficient it is. Furthermore, the less RAM space an algorithm uses during execution, the better it is.

Learn more about Algorithms:
https://brainly.com/question/22984934
#SPJ1

When turning on any circuit breaker , you should always stand A. At arm’s length from the load center
B.in front of the device
C. To the side of the load center
D . About two feet from the device

Answers

Answer:C. To the side of the load center

Explanation:

The following code will not display the results expected by the programmer. Can you find the error? Declare Real lowest, highest, average Display "Enter the lowest score." Input lowest Display "Enter the highest score." Input highest Set average = low + high / 2 Display "The average is ", average, "."

Answers

Based on the information given, the first error in the code is that the Variable name is lowest, NOT low, and Set average = low + high / 2.

How to find the error in the code.

For Error 2: Variable name is highest, NOT high and Set average = low + high / 2

For Error 3 : Set average = low + high / 2. Thus, you will need to add the lowest and highest, then perform the division by 2

Set average = (lowest + highest) / 2 is the the correct statement.

Learn more about codes on:

https://brainly.com/question/25875879

Which of the following is NOT a computer hardware?

Question 2 options:

Monitor


Internet


Keyboard


Mouse

Answers

Answer:

Internet

Explanation:

please make my answer as brainelist

Words that when clicked on can link to another website are called:

Answers

Answer:

hyperlink

Explanation:

youwelcome:)

FILL IN THE BLANK. The file's ____ indicates what type of program uses the data by looking at the ____

Answers

Answer: association; extension

Explanation:

The file's association indicates what type of program uses the data by looking at the extension.

In Python, when converting a string value into a numeric value that is a positive or negative whole number, the int() function is used.


True

False

Answers

Answer:

True

Explanation:

The Int  Variable can handle Positive and Negative Numbers, it just can't handle decimal numbers.

The statement "In Python, when converting a string value into a numeric value that is a positive or negative whole number, the int() function is used" is true.

What is python?

Python is a popular computer programming language used to create software and websites, automate processes, and analyze data. Python is a general-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues.

Python is a great programming language for experienced developers as well. It's one of the most widely used programming languages in the world, maybe as a result of how simple it is for novices to learn. Python is one of the most approachable programming languages due of its simple syntax and lack of complexity.

Therefore, the statement is true.

To learn more about python, refer to the link:

https://brainly.com/question/18502436

#SPJ5

Design a pda (pushdown automata) of the following:
a^n b^n c^m d^4m

Answers

Answer:

Explanation:

Here is the design of a Pushdown Automaton (PDA) for the language L = {a^n b^n c^m d^4m}:

1. The PDA has a stack to store symbols.

2. The initial state is q0 and the initial stack symbol is Z0.

3. The transitions are defined as follows:

- Transition from q0:

 - Read 'a' from the input, push 'A' to the stack, and remain in q0.

 - Read 'b' from the input, pop 'A' from the stack, and transition to q1.

 - Read 'c' from the input, push 'C' to the stack, and transition to q2.

 - Read 'd' from the input, push 'D' to the stack, and transition to q3.

- Transition from q1:

 - Read 'b' from the input, pop 'A' from the stack, and remain in q1.

 - Read 'c' from the input, push 'C' to the stack, and transition to q2.

 - Read 'd' from the input, push 'D' to the stack, and transition to q3.

- Transition from q2:

 - Read 'c' from the input, push 'C' to the stack, and remain in q2.

 - Read 'd' from the input, pop 'C' from the stack, and transition to q2.

 - Read 'd' from the input, pop 'D' from the stack, and transition to q2.

 - Read end of input, pop 'Z0' from the stack, and transition to q4 (final state).

- Transition from q3:

 - Read 'd' from the input, push 'D' to the stack, and remain in q3.

 - Read end of input, pop 'Z0' from the stack, and transition to q4 (final state).

4. The PDA accepts the input string if it reaches the final state q4 with an empty stack.

Note: This PDA design assumes that n and m are positive integers. If n or m can be zero, some modifications to the transitions may be needed to handle those cases.

PLEASE HELP
What's considered a benefit of virtual computing?

All virtual machines use the same operating system.
Internet speed is increased on virtual machines.
It offers secure file backups.
It allows users to access multiple resources on one machine

Answers

Answer:

It allows users to access multiple resources on one machine is considered a benefit of virtual computing.

Explanation:

Virtual computing allows multiple virtual machines to run on a single physical machine, which means that users can access multiple resources on that single machine. This can increase efficiency and productivity, as users can run different operating systems and software on different virtual machines without having to switch between physical machines. It can also save space, as multiple virtual machines can be stored on a single physical machine. Additionally, virtual machines can be easily copied and moved to other physical machines, making it easier to manage and backup files. Overall, virtual computing provides a flexible and efficient way to use and access multiple resources on a single machine.

Answer:

- Virtual Computing Offers secure file backups.

- It allows users to access multiple resources on one machine

Explanation:

1. Virtual Computing with Data backup software installed in the virtual machine can help you protect and restore your data when something goes wrong.

2. By default Default the reason for virtual computing is accessibility, virtual-based applications and data are accessible from virtually any internet-connected device, Virtual Computing allows computer users remote access to software applications and processes when they need it and this could be done simultaneously.

Complete the code to check whether a string is between seven and 10 characters long. # Is the password at least six characters long? lengthPW = len(pw) if lengthPW : message = "Your password is too long." valid = False elif lengthPW : message = "Your password is too short." valid = False

Answers

Answer:

lengthPW = len(pw)

if lengthPW > 10:

   message = "Your password is too long."

   valid = False

elif lengthPW < 7:

   message = "Your password is too short."

   valid = False

Explanation:

You change the conditions to check if length is greater than 10 or less than 7, if it's greater than ten then it says your password is either too long or short depending on its length, then invalidates it.

What are the core steps to add revisions or features to a project?(1 point)
Responses

Evaluate feasibility of the goals, create a list of functionality requirements, and develop the requirements of the feature.

Evaluate feasibility of the goals, develop programming solutions, and evaluate how well the solutions address the goals.

understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature.

Communicate with the client, create a sprint backlog, develop the project, and evaluate how well the solution fits the requirements.

Answers

The core steps to add revisions or features to a project are ""Understand the goals, evaluate the impact on the project, create a list of functionality requirements, and develop the requirements of the feature." (Option C)

How  is this so?

 

The core steps to add revisions or features to a project include understanding the goals,evaluating the impact on   the project, creating a list of functionality requirements,and developing   the requirements of the feature.

These steps ensure that the goals are clear, the impact is assessed, and the necessary functionality is identified and implemented effectively.

Learn more about project management at:

https://brainly.com/question/16927451

#SPJ1

Consider the following calling sequences and assuming that dynamic scoping is used, what variables are visible during execution of the last function called? Include with each visible variable the name of the function in which it was defined.a. Main calls fun1; fun1 calls fun2; fun2 calls fun3b. Main calls fun1; fun1 calls fun3c. Main calls fun2; fun2 calls fun3; fun3 calls fun1d. Main calls fun3; fun3 calls fun1e. Main calls fun1; fun1 calls fun3; fun3 calls fun2f. Main calls fun3; fun3 calls fun2; fun2 calls fun1void fun1(void);void fun2(void);void fun3(void);void main() {Int a,b,c;…}void fun1(void){Int b,c,d;…}void fun2(void){Int c,d,e;…}void fun3(void){Int d,e,f;…}

Answers

Answer:

In dynamic scoping the current block is searched by the compiler and then all calling functions consecutively e.g. if a function a() calls a separately defined function b() then b() does have access to the local variables of a(). The visible variables with the name of the function in which it was defined are given below.

Explanation:

In main() function three integer type variables are declared: a,b,c

In fun1() three int type variables are declared/defined: b,c,d

In fun2() three int type variables are declared/defined: c,d,e

In fun3() three int type variables are declared/defined: d,e,f

a. Main calls fun1; fun1 calls fun2; fun2 calls fun3

Here the main() calls fun1() which calls fun2() and fun2() calls func3() . This means first the func3() executes, then fun2(), then fun1() and last main()

Visible Variable:  d, e, f        Defined in: fun3

Visible Variable: c                 Defined in: fun2 (the variables d and e of fun2  

                                                                                                     are not visible)

Visible Variable: b                  Defined in: fun1 ( c and d of func1 are hidden)

Visible Variable: a                 Defined in: main (b,c are hidden)

b. Main calls fun1; fun1 calls fun3

Here the main() calls fun1, fun1 calls fun3. This means the body of fun3 executes first, then of fun1 and then in last, of main()

Visible Variable: d, e, f           Defined in: fun3

Visible Variable:  b, c              Defined in: fun1 (d not visible)

Visible Variable:  a                  Defined in: main ( b and c not visible)

c. Main calls fun2; fun2 calls fun3; fun3 calls fun1

Here the main() calls fun2, fun2 calls fun3 and fun3 calls fun1. This means the body of fun1 executes first, then of fun3, then fun2 and in last, of main()

Visible Variable:  b, c, d        Defined in: fun1

Visible Variable:  e, f             Defined in: fun3 ( d not visible)

Visible Variable:  a                Defined in: main ( b and c not visible)

Here variables c, d and e of fun2 are not visible

d. Main calls fun3; fun3 calls fun1

Here the main() calls fun3, fun3 calls fun1. This means the body of fun1 executes first, then of fun3 and then in last, of main()

Visible Variable: b, c, d     Defined in: fun1  

Visible Variable:   e, f        Defined in:  fun3   ( d not visible )

Visible Variable:    a          Defined in: main (b and c not visible)

e. Main calls fun1; fun1 calls fun3; fun3 calls fun2

Here the main() calls fun1, fun1 calls fun3 and fun3 calls fun2. This means the body of fun2 executes first, then of fun3, then of fun1 and then in last, of main()

Visible Variable: c, d, e        Defined in: fun2

Visible Variable:  f               Defined in: fun3 ( d and e not visible)

Visible Variable:  b               Defined in:  fun1 ( c and d not visible)

Visible Variable: a                Defined in: main ( b and c not visible)

f. Main calls fun3; fun3 calls fun2; fun2 calls fun1

Here the main() calls fun3, fun3 calls fun2 and fun2 calls fun1. This means the body of fun1 executes first, then of fun2, then of fun3 and then in last, of main()

Visible Variable: b, c, d       Defined in: fun1  

Visible Variable: e               Defined in: fun2  

Visible Variable: f                Defined in: fun3  

Visible Variable: a               Defined in: main

What is better to use for start Python or Java?

Answers

Answer:

here is your answer ......

hope it helps......

What is better to use for start Python or Java?

Answer:

python is better

Explanation:

because its my favourite

How many minutes are there from 8:00 am to 1:00 pm?

How many minutes are there from 8:00 am to 1:00 pm?

Answers

Well it’s 5 hours so you take 5 times 60m for each hour and you get 300m

Answer:300 minutes

Explanation:

from 8 to 1 is 5 hours so you do 5*60= 300

Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1. g

Answers

Answer:

The program in Python is as follows:

string = input("String: ")

chr = input("Character: ")[0]

total_count = string.count(chr)

print(total_count,end=" ")

if total_count > 1:

   print(chr+"'s")

else:

   print(chr)

Explanation:

This gets the string from the user

string = input("String: ")

This gets the character from the user

chr = input("Character: ")[0]

This counts the occurrence of the character in the string

total_count = string.count(chr)

This prints the total count of characters

print(total_count,end=" ")

If the count is greater than 1

if total_count > 1:

Then it prints a plural form

   print(chr+"'s")

If otherwise

else:

Then it prints a singular form

   print(chr)


What are the reasons why organizations opt for a certificate
issued by third party commercial certification authorities to
secure their web server? [Choose two that applyl.
To secure browsing of social media sites.
To secure data transfer, transactions and logins to the
website.
To securely redirect a customer to a third party
a
website.
lling
To run a trusted web site that conduct business with
the general public.

Answers

The reasons that organizations opt for a certificate issued by third party commercial certification authorities to secure their web server are option B and D:

To secure data transfer, transactions and logins to the website.To run a trusted web site that conduct business with the general public.What Is a Certification Authority?

A certificate authority is a third-party organization that operating systems and web browsers trust to generate and distribute digital certificates.

However, they must perform this task for businesses and websites that they have vetted, which is why CAs are crucial to modern digital security (and internet security). These certificates are essentially short data files with verified organization identification information.

What we now usually refer to as a certificate authority or a CA was originally known as a "certification authority." Therefore, you may occasionally encounter them referred to by these many names.

Therefore, When a product is third-party certified, it signifies that an independent body has examined the product's production process and has independently found that the final product complies with certain safety criteria.

Learn more about certification authorities from

https://brainly.com/question/17011621
#SPJ1

What is a website query

Answers

A website query, also known as a web query or web search query, refers to a specific request or question submitted by a user to a search engine or a website's search function. It is a way for users to find information, resources, or specific content on the internet.

create survey result using microsoft excel with twenty 20 respondents teacher and student use another sheet of coupon bond

Answers

To create a survey result using Microsoft Excel. Here's a step-by-step guide:

Step 1: Open Microsoft Excel and create a new workbook.

Step 2: Rename the first sheet as "Survey Results" and the second sheet as "Coupon Bond."

Step 3: In the "Survey Results" sheet, create the following column headers in cells A1 to E1: "Respondent ID," "Name," "Role," "Question 1," and "Question 2."

Step 4: Enter the data for each respondent in columns A to E, starting from row 2. For example, enter the respondent ID in column A, name in column B, role in column C, and the responses to question 1 and question 2 in columns D and E, respectively. Repeat this process for all 20 respondents.

Step 5: In the "Coupon Bond" sheet, you can design the coupon bond as per your requirements. Add text, graphics, or any other formatting elements as desired. You can use the drawing tools in Excel to create a visually appealing design.

Step 6: Print the "Coupon Bond" sheet onto a coupon bond paper.

Now created a survey result using Microsoft Excel with the data stored in the "Survey Results" sheet and a separate sheet containing the coupon bond design.

Learn more about Microsoft Excel on:

https://brainly.com/question/30750284

#SPJ1

Does anyone know soul land?​

Answers

Yes!!!!!! I know soul land!

All changes
1.(01.01 LC)
To make sure you do not get too tired when using the computer for long periods of time, how often should you get up to stretch and move? (5 points)
O Every hour
O Every 10 minutes
O Every 30 minutes
O Every two hours

Answers

You should get up and move every 30 minutes

Hope  this helps

-scav

Answer:

C

Explanation:

In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.

Answers

Answer: Excel Average functions

Explanation: it gets the work done.

Answer:

excel average

Explanation:

Your company has three divisions. Each group has a network, and all the networks are joined together. Is this still a LAN?

Answers

No, this is not a LAN anymore (Local Area Network). A local area network, or LAN, is a type of network that links devices in a restricted region, like a campus or a single building.

Which kind of network connects a business?

Several LANs are linked together by a WAN, or wide area network. It is perfect for businesses as they expand because it is not location-restricted in the same way that LANs are. They make it possible to communicate with various audiences and might be crucial for global businesses.

If your client just has a small number of computer units, what kind of network would you suggest?

This paradigm works well in contexts where tight security is not required, such as tiny networks with only a few computers.

To know more about LAN visit:-

https://brainly.com/question/13247301

#SPJ1

How can we work together to fix problems with our websites?

Answers

i think this is or what hihi

Explanation:

The value proposition, or mission statement, tells the visitor what you do and why you do it.

Put your value proposition on your home page, in your headline if possible. Add it to your blog or about page. Let the visitors know exactly what they will be getting if they hire you, buy your product, subscribe to your newsletter or read your blog.

Order the steps to successfully create a data table.
Answer: Write the formula used to create table values
Select the range
Select the Data tab and What-If Analysis
Select Data Table
Select the values for row/column input.

Answers

Here are the steps to successfully create a data table:

Select the range.Select the Data tab and What-If Analysis.Select Data Table.Write the formula used to create table values.Select the values for row/column input.

How to create the data table

For achieving the desired outcome of generating a data table, it is suggested to adhere to the following measures:

Choose the cells group in which you intend to generate the data table. Include both the cells for input and presentation of results in the specified range.

Provide the equation that you intend to apply for computing the figures enlisted in the data chart. This equation must refer to the designated cells and yield the intended outcome.

Access the What-If Analysis feature by navigating to the Data tab within your spreadsheet program. To access the menu, simply click on it.

Choose the Data Table option from the What-If Analysis menu. This action will trigger the appearance of a dialog box or prompt that will require you to input the required details.

Determine the desired input values for either the row or the column in the data table dialogue box. The table's outcomes will be computed based on these values.

By adhering to these guidelines, you can produce a chart of data that exhibits computed figures derived from various input situations, aiding you in scrutinizing and comprehending the ramifications of different factors on your data.

Read more about data tables here:

https://brainly.com/question/32534586

#SPJ1

list at five emergency technology in health care with in it's factions​

Answers

Answer:

1.Predictive Analytics to Minimize Outbreaks

2. Telehealth to Streamline Care Coordination

3.Satellite Mapping to Determine Disaster Areas

4. Chatbots to Help Treat Symptoms at Home

5. E-Triage Systems for Better Resource Allocation

Explanation:

Hope it helps have a good day:D

Discuss and compare the course of the American, the French, and the Chinese
revolutions and analyze the reasons for and significance of the different outcomes
of these three revolutions?

Answers

The American, the French, and the Chinese revolutions have different outcomes.

Freedom from British rule inspired the American Revolution, whilst abolishing the French Monarchy inspired the French Revolution. Economic tensions and progressive ideas drove the American and French Revolutions in the eighteenth century.

The French Revolution, which took place within French boundaries, posed a direct danger to the French monarchy. The Chinese Revolution was brought on by the communists' defense of the peasants and the assassination of a political party.

Both the American and French Revolutions were heavily influenced by ideas of liberty and equality. Both countries want to be free. America was making an effort to become independent of British laws and taxation.

1917 saw the Russian Revolution, and there was just one year between then and the end of World War II.

To know more about American revolution, check out:

brainly.com/question/18317211

#SPJ1

Other Questions
pls help i am in k12 What is the mass of the bowling ball is ____The height of the building is _______Question 2 options:Blank # 1 Blank # 2 Which of these phylogenetic trees depicts a different evolutionary history in the others? An isosceles triangle has equal sides where PQ = PR and base angles of 65. QX = XR = 2.64 cm. Find a) PQ b) PX The mean free path is the average distance traveled by a particle between collisions with other particles. Calculate the mean free path of air at room temperature, =69.8 F. Air is mostly nitrogen, so assume that the collisions are between moving N2 molecules. The diameter of N2 is =1.581010 m and the gas is at atmospheric pressure, =101325 Pa Which of the following are progressive era social reform topics? Select all that apply.A child laborB. prohibitionC. county unit systemD. muckraking In 3 paragraphs write about being a 17 year indigenous 500 years ago, explain your cultural identity including limitations placed on being indigenous, explain which of those limitations that continue to exist then explain the possibilities, then explain what are the characteristics you want to retain and how you can strengthen your identity.(Chicano Literature) what will you see on the next line after the following lines of code? >>> aList = [9, 2, 3.5, 2] >>> aList.remove(2) >>> aList[9, 3.5][9, 3.5, 2][9, 2, 3.5, 2] First source of energy in living things. A solid of constant density is bounded below by the plane z=0 , above by the cone z=2r ,r=0 , and on the sides by the cylinder r=1 . Find the center of mass.The centre of mass is (x,y,z) = (__,___,___) Which of the following situations involves Transgenics? A. Human insulin being produced from bacteria. B. Gene for human antibodies being introduced to goats. C. Modifying lettuce to be frost resistant. D. Creating potatoes that are toxic to beetles. Question 16 Which of the following is true? Pentatonic scales are made up of seven unique notes. Pentatonic scales are never used in popular music. Pentatonic scales are often used in popular music. Pentatonic scales are rarely used in popular music. How do l do this Im so confused a car travels 156 miles in 3 hours and 15 minutes. how many miles does it travel per hour According to the liberal view, __________.a. the workplace should operate with no government involvementb. government must regulate the workplace in order to protect the interests of workersc. government regulation inevitably reduces economic productivity, hurting the interests of workersd. the employer is best able to regulate workplace conditions Suppose you randomly select a family with three children. Assume that births of boys and girls are equally likely. a. How many birth orders are possible? List them in a probability distribution table. b. What is the probability of two boys and a girl? c. What is the probability of two girls and a boy in that order? d. What is the probability of at least one gir? e. What is the probability of at least two boys? a. How many birth orders are possible? 234Review the diagram.Social Hierarchy inAntebellum Mississippi56AB7D89TIME REMAININ1043:28Which letter shows the position that non-slaveholdingwhites occupied on the social hierarchy in antebellumMississippi?OAOBOCOD Chairs invested $140 she earned a simple interest of 3% per year on the initial investment. If no money was added or removed from the investment what was the amount of interest chairs received at the end of two years. URGENT PLEASE HELP 15pts can you answer this please How did most Cherokee travel on the trail? by foot by horse by wagon. Barium sulfate should be mixed with water at what temperature for a barium enema? a. 100 c b. 75 f c. 85 c d. 100 f