What file organization would you choose to maximize efficiencyin terms of speed of access, use of storage space, and ease ofupdating ( adding/deleting/modifying) when the data are:
a. Updated infrequently and accessed frequently in randomorder?
b. Updated frequently and accessed in its entirety relativelyfrequently?
c. Updated frequelntly and accessed frequently in randomorder?

Answers

Answer 1

A. For data that are updated infrequently and accessed frequently in random order, a hash file organization would be the most efficient. This is because hash tables provide fast and direct access to the data by using a hash function to compute the location of the data in memory.

B. For data that are updated frequently and accessed in its entirety relatively frequently, a sequential file organization would be the most efficient. This is because sequential files are easy to maintain and provide fast access to the data when it is read in its entirety.

C. For data that are updated frequently and accessed frequently in random order, an indexed file organization would be the most efficient. This is because indexed files provide fast access to the data by using an index to locate the data in memory, while also allowing for efficient updates and deletions.

You can learn more about file organization at

https://brainly.com/question/29353432

#SPJ11


Related Questions

1.why does program execution speed generally increase as the number of general-purpose registers increases?

Answers

            More data items can be held in registers as the number of general-purpose registers increases, reducing the need to access memory for these items. Memory accesses avoided by using additional registers reduce CPU memory access delays, increasing programme execution speed.

What are General purpose registers ?

            General purpose registers are additional registers found in CPUs that are used to store memory addresses or data as needed. For example, when there is an interruption, the current register content is saved.

     Registers are typically made up of a small amount of fast storage, but some registers have specific hardware functions and may be read-only or write-only. Normally, registers are measured by the number of bits they can hold, such as a "8-bit register," "32-bit register," or "64-bit register."

AX : This is a 16-bit accumulator that is divided into two 8-bit registers, AH and AL, to perform 8-bit instructions. It is commonly used for arithmetic and logical instructions, but in 8086 chips, an accumulator as the target operand is not required.

BX : This is the base register of 16 bits and is separated into two 8-bits registers BH and BL to likewise perform 8-bits instruction. It stores the value of offset.

CX : This is the counter register of 16 bits and is separated into two 8-bits registers CH and CL to likewise perform 8-bits instruction. It is generally utilized for looping and rotations.

To learn more about registers refer :

https://brainly.com/question/28335173

#SPJ4

Can someone help me I am coding.

Answers

Answer:

i will help u

Explanation:

what did you want

for binary data, define a glm using the log link. show that effects refer to the relative risk. why do you think this link is not often used

Answers

A Generalized Linear Model (GLM) using the log link is a type of GLM that uses the natural logarithm to link the predicted probability of an outcome to the explanatory variables. The log link is not often used because the interpretation of the relative risk can be more difficult to interpret than the interpretation of a GLM with another link function.

Binary data is a type of data in which each observation can only have two possible outcomes (usually 0 or 1). It is often used to measure the relative risk associated with a particular explanatory variable, as it allows for the effects of the explanatory variable to be expressed in terms of the odds ratio (i.e., the ratio of the probability of one outcome to the probability of the other).

Additionally, the log link does not allow for an easy comparison of relative risk for different explanatory variables since it does not produce results in terms of the relative risk ratio.

You can learn more about Generalized Linear Model at: brainly.com/question/30584334

#SPJ11

What can you do to help create a safe online environment?

Answers

Answer:

by not adding a scam proof app

Explanation:

because thats life

Be mature, be careful with who you have on social media and watch for scams

which network topology uses a token-based access methodology?

Answers

The network topology that uses a token-based access methodology is called a Token Ring network.

Which network topology uses a token-based access methodology?

In a Token Ring network, the computers or devices are connected in a ring or circular fashion, and a special message called a "token" circulates around the ring.

The token acts as a permission mechanism, allowing devices to transmit data when they possess the token.

In this network topology, only the device holding the token can transmit data onto the network. When a device wants to transmit data, it waits for the token to come to it, and once it receives the token, it attaches its data to the token and sends it back onto the network. The token continues to circulate until it reaches the intended recipient, who then extracts the data and releases the token back onto the network.

This token-based access methodology ensures that only one device has the right to transmit data at any given time, preventing collisions and ensuring fair access to the network. It was commonly used in early LAN (Local Area Network) implementations but has been largely replaced by Ethernet-based topologies like star and bus configurations.

Learn more about network topology at:

https://brainly.com/question/29756038

#SPJ4

A number of your clients seem to be abusing the change request process. You have seen an increase in the number of frivolous requests. These, of course, must be researched and resolved, and that takes away from the time that your team members can do actual project work. From a process point of view what might you do? Be specific.
2. What are the advantages and disadvantages of checking upon the accu- racy of status reports filed by your team members?

Answers

To address the abuse of the change request process and the increase in frivolous requests, specific actions can be taken from a process point of view.

To address the abuse of the change request process, several specific steps can be taken. First, stricter guidelines can be established for submitting change requests, including clear criteria for what constitutes a valid request.

Second, a review committee can be formed to assess and evaluate each change request, ensuring that only legitimate and impactful requests proceed.

Third, improving communication and education about the change process can help educate clients on the importance of valid requests and discourage frivolous submissions.

Finally, consequences can be implemented for submitting frivolous requests, such as additional fees or limitations on future requests, to deter abuse.

Checking the accuracy of status reports filed by team members has advantages and disadvantages. On the positive side, it ensures transparency and accountability within the team, as it allows project managers to verify the progress and accuracy of reported information.

It provides an opportunity to identify and address any discrepancies or issues promptly. However, there are also disadvantages to consider. Checking status reports can be time-consuming, especially if the team is large or if reports need to be reviewed frequently.

It may also create a sense of mistrust or micromanagement within the team if not handled carefully. Balancing the need for accuracy with trust and empowerment is crucial to maintain a positive team dynamic.

learn more about guidelines here:

https://brainly.com/question/31575794

#SPJ11

consider a method that is provided a numerical grade (0 - 100) as a parameter and returns a corresponding letter grade (a - f). which collection of values would be the most appropriate for testing the method?

Answers

Answer: You would want to test from values [-1:101] inclusive and non numeric characters.

Explanation:
You want to test the expected input of [0:100] to ensure that you have the expect results of a letter A through F.

You will also want to test outside of that numeric range (i.e., -1 and 101) to see the behavior of your method and insure proper error handling.

Additionally, you will want to test non numeric characters to ensure that the input is not accepted and proper error handling occurs.

If these test cases are passed and the errors handled as expected, your method can be considered viable.

Cheers.

15 POINTS
Which statement best describes what hardware is?

the electronic and mechanical parts of a computer device

the components that receive data from a computer

the electronic circuitry that executes instructions

the components that transform data into human-readable form

Answers

Answer:

A

Explanation:

The first statement "the electronic and mechanical parts of a computer device" best describes what hardware is.

Hardware refers to the physical components of a computer system, such as the motherboard, CPU, RAM, hard drive, and peripherals like the keyboard and mouse. These components are made up of electronic and mechanical parts that work together to receive, process, store, and output data.

leave a comment

A system failure has occurred. Which of the following restoration processes would result in the fastest restoration of all data to its most current state?Restore the full backup and the last incremental backupRestore the full backup and all differential backupsRestore the full backup and the last differential backupRestore the full backup and all incremental backups

Answers

In order to restore all data to its most current state, the fastest restoration process would be to restore the full backup and the last differential backup.

System failure refers to an event in which a system ceases to function properly. It occurs when a computer's hardware or software malfunctions, resulting in system instability. A system failure can result in data loss, system downtime, and lost productivity, among other things.

The fastest restoration process to restore all data to its most current state is to restore the full backup and the last differential backup. A differential backup is a backup that contains all data changed since the last full backup. This means that the most current version of the data is stored in the differential backup, and by restoring the full backup and the last differential backup, all data can be restored to its most current state. Other restoration processes such as restoring the full backup and all differential backups or all incremental backups may take longer because they require more backups to be restored.

To learn about restoration process:https://brainly.com/question/27795470

#SPJ11

A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.

Answers

Answer:

Hybrid

Explanation:

Hybrid cloud is a solution that combines a private cloud with one or more public cloud services, with proprietary software enabling communication between each distinct service.

Topic: Looking around: D&S Theory as Evidenced in a Pandemic News Article Description: In this reflection you are to find a news article from the pandemic on the web that has some connection to Canada. The goal will be to analyse the change in demand and/or supply of a good/service during the pandemic. Read the article and address the following questions/discussion points: 1. Briefly summarize the article and make note about how your article connects with the theory of supply and demand. 2. Based on the article, what kind of shift or movement along the demand and/or supply curve would be expected? Make sure to explain your reasoning and draw a Demand and Supply graph with the changes shown. Also, address the change in equilibrium price and quantity. 3. How, in the limited amount of economics we have covered thus far, has your perspective on how the economy works changed? Include either a copy of your article in your submission, or a hyperlink embedded in your submission for your professor to access the article. Your reflection should be between 250 and 300 words or one page double spaced, 11 or 12 pt font.

Answers

Article summaryThe article “Canadian small business owners frustrated with customers refusing to wear masks” by Karen Pauls published in CBC News on August 14, 2020.

The article shows how small business owners are grappling with the balance between health and safety for their customers and workers and the economic impact of the pandemic on their businesses. The article connects with the theory of supply and demand as it highlights how the change in demand for products and services offered by small businesses is influenced by changes in customer behaviour and attitudes towards the mandatory use of masks.2. Shift or movement along the demand and/or supply curve

The mandatory use of masks by customers in small businesses would lead to a decrease in demand for products and services offered by the small businesses, resulting in a leftward shift of the demand curve. The decrease in demand would lead to a decrease in the equilibrium price and quantity of products and services. For instance, in the case of small businesses, this would mean a decrease in the quantity of products sold and the price charged for the products.

To know more about article visit:

https://brainly.com/question/32624772

#SPJ11

When an object is acted on by unbalanced forces, the object will always

Answers

Answer:

If an object has a net force acting on it, it will accelerate. The object will speed up, slow down or change direction. An unbalanced force (net force) acting on an object changes its speed and/or direction of motion. An unbalanced force is an unopposed force that causes a change in motion.

Explanation:

Explain the concept of Internet.​

Answers

Answer:

The Internet is a global network of billions of computers and other electronic devices. With the Internet, it's possible to access almost any information, communicate with anyone else in the world, and do much more. You can do all of this by connecting a computer to the Internet, which is also called going online.

:)

What is the main idea that an argument wants you to believe called?

Answers

An argument in academic writing is typically a main idea, also known as a "claim" or "thesis statement," supported by relevant evidence.

What is an argument? Your capacity to do this well will distinguish your papers from those of students who see assignments as merely an accumulation of information and specifics. You will typically need to make a claim and provide supporting details in college papers. In other words, gone are the days when you were given a "subject" to write about. It's time to express one's opinion and provide justifications for doing so. We ask that you consult our thesis statement handout.Claims could be as simple as, "Protons are positively charged and electrons are negatively charged," and be backed up by data like, "In this experiment, protons and electrons behaved as such and such. Claims may also be more complex and supported by evidence, such as "Defying genre expectations can create a complete apocalypse of story form and content, leaving us stranded in a sort of genre-less universe," and "Genre is the most important element of the contract of expectations between filmmaker and audience." In either scenario, the remaining paragraphs of your essay will describe the logic and supporting details that made you think your position was the most logical.

To Learn more About argument refer to:

https://brainly.com/question/3775579

#SPJ1

Purpose. We are building our own shell to understand how bash works and to understand the Linux process and file API. Instructions. In this assignment we will add only one feature: redirection. To direct a command's output to a file, the syntax "> outfile" is used. To read a command's input from a file, the syntax "< infile" is used. Your extended version of msh should extend the previous version of msh to handle commands like these: $./msh msh >1 s−1> temp.txt msh > sort < temp.txt > temp-sorted.txt The result of these commands should be that the sorted output of "Is -l" is in file temp-sorted.txt. Your shell builtins (like 'cd' and 'help') do not have to handle redirection. Only one new Linux command is needed: dup2. You will use dup2 for both input and output redirection. The basic idea is that if you see redirection on the command line, you open the file or files, and then use dup2. dup2 is a little tricky. Please check out this dup2 slide deck that explains dup2 and gives hints on how to do the homework. Starter code. On mlc104, the directory /home/CLASSES/Bruns1832/cst334/hw/hw5/msh4 contains the file msh4.c that you can use as your starting point. Note that this code is a solution to the previous msh assignment. Testing your code. On mlc104, the directory /home/CLASSES/Bruns1832/cst334/hw/hw5/msh4 contains test files test*.sh and a Makefile. Copy these to the directory where you will develop your file msh.c. Each test should give exit status 0 , like this: $./ test1.sh $ echo \$? You need to run test1.sh first, as it will compile your code and produce binary file 'msh' that is used by the other tests. To use the Makefile, enter the command 'make' to run the tests. If you enter the command 'make clean', temporary files created by testing will be deleted.

Answers

The purpose of building our own shell is to understand how bash works and to gain knowledge about the Linux process and file API.

The extended version of msh (shell) should include the functionality to handle redirection. Redirection allows us to direct a command's output to a file using the syntax "> outfile" and to read a command's input from a file using the syntax "< infile".

For example, to store the sorted output of the command "ls -l" in a file named "temp-sorted.txt", we can use the command "ls -l > temp-sorted.txt".

It is important to note that your shell built-ins, such as 'cd' and 'help', do not need to handle redirection. Only external commands should support redirection.

To implement redirection, you will need to use the Linux command 'dup2'. 'dup2' is used for both input and output redirection.

The basic idea is that when you encounter redirection in the command line, you open the specified file(s) and then use 'dup2' to redirect the input/output accordingly.

However, please note that 'dup2' can be a bit tricky to use correctly.

You can start with the file 'msh4.c', located in the directory /home/CLASSES/Bruns1832/cst334/hw/hw5/msh4,

which can serve as your starting point for implementing the extended version of msh.

For testing your code, you can find test files named test*.sh and a Makefile in the directory /home/CLASSES/Bruns1832/cst334/hw/hw5/msh4.

Each test should produce an exit status of 0.

For example, to run the first test, you would enter the command:

$ ./test1.sh

To check the exit status of a test, you can use the command 'echo $?'.

To run all the tests conveniently, you can use the provided Makefile by entering the command 'make'. If you want to remove any temporary files created during testing, you can use the command 'make clean'.

Learn more about Linux from the given link:

https://brainly.com/question/12853667

#SPJ11

Quick!! I'm TIMED!!!
Cloud suites are stored at a(n) ________ on the Internet, rather than on your microcomputer.

blog site

macrocomputer

pod site

server

Answers

Cloud suites are stored at a(n) option d. server on the Internet, rather than on your microcomputer.

What is a cloud at the Internet?

"The cloud" refers to servers which might be accessed over the Internet, and the software program and databases that run on the ones servers. Cloud servers are positioned in facts facilities all around the world.

A cloud suite is a cloud computing version that shops facts at the Internet via a cloud computing company who manages and operates facts garage as a service. It's brought on call for with just-in-time capability and costs, and gets rid of shopping for and handling your very own facts garage infrastructure.

Read more about the cloud suites :

https://brainly.com/question/5413035

#SPJ1

Which of the following Office Online apps is most effective for creating spreadsheets?

Answers

Answer:

Excel

Explanation:

It allows you to make spreadsheets.

Animal wisdom/ the last wolf .compare and contrast the overall feeling of each poem

Answers

List the poem please. I won’t be able to answer without it.

An algorithm is a repeatable process that produces the same result when it receives the same input. (True or False)

Answers

The statement "An algorithm is a repeatable process that produces the same result when it receives the same input" is true.

An algorithm is a set of instructions or steps that solve a particular problem or perform a specific task. It takes in input data and processes it in a specific way to produce a desired output. The key characteristic of an algorithm is that it is deterministic, meaning that it will always produce the same output for the same input. This is important because it ensures that the algorithm is reliable and consistent, which is essential for many applications, such as data analysis, machine learning, and computer programming. By having the same input produce the same output, algorithms can be tested and verified for accuracy and efficiency. This predictability also allows for the development of automated systems that can perform tasks without human intervention. In summary, algorithms are repeatable processes that follow a set of instructions to produce a specific output and will always produce the same result when given the same input.

Learn more about algorithm here-

https://brainly.com/question/22984934

#SPJ11

.You have an existing computer running Windows 7 Enterprise. You want to configure a RAID 1 array in the computer. You install two new SATA drives, then use the RAID controller integrated in the motherboard to define a RAID 1 array using them. When you boot the computer, Windows does not show the logical RAID drive. What should you do?

Answers

To resolve the issue of Windows 7 Enterprise not showing a logical RAID 1 array, enable RAID mode in the BIOS, install the appropriate RAID controller drivers, and restart the computer.

If you have installed two new SATA drives and configured them with the integrated RAID controller but Windows 7 Enterprise is not showing the logical RAID 1 array, there are a few steps you can take to resolve the issue. First, check your BIOS settings to ensure that RAID mode is enabled. If it is already enabled, you may need to install the appropriate RAID controller drivers for your motherboard within Windows 7 Enterprise. Once you have installed the drivers, restart your computer to allow the changes to take effect. After following these steps, Windows should now recognize and display the logical RAID 1 drive, resolving the issue.

Learn more about Windows 7 here;

https://brainly.com/question/31524055

#SPJ11

Discuss how technology can be used as a tool of abuse. Emphasize that technology and communication are not bad, but that they enable constant communication and monitoring that can lead to abuse, if clear boundaries are not discussed and respected. What are some warning signs of abuse using technology? Address monitoring and stalking behavior, as well as sharing passwords in your answer. Be sure to document your research.

Answers

Technology can be used as a tool of abuse when boundaries are not discussed and respected, enabling constant communication, monitoring, and stalking behaviors.

Technology, along with its many benefits, has also provided new avenues for abuse and control in relationships. It is important to recognize that technology itself is not inherently bad, but rather the misuse and abuse of it can cause harm. The constant connectivity and accessibility offered by technology can enable individuals to maintain control and exert power over others, leading to abusive behaviors.

One of the warning signs of abuse using technology is excessive monitoring. Abusers may use various digital tools to track and monitor their victims' activities, such as constantly checking their messages, calls, and online presence. This behavior invades the victim's privacy and creates a sense of constant surveillance, leading to feelings of fear and powerlessness.

Stalking through technology is another alarming form of abuse. Abusers can use social media platforms, geolocation services, or spyware to track the movements and interactions of their victims. This digital stalking can be incredibly invasive, causing the victim to constantly fear for their safety and well-being.

Sharing passwords can also be a warning sign of abuse. In some cases, abusers may demand or coerce their victims into sharing their passwords for various accounts, such as email or social media. By gaining access to these accounts, the abuser can manipulate or control the victim's online presence, spreading false information, or isolating them from their support networks.

It is crucial to establish clear boundaries and have open discussions about the use of technology within relationships. Respect for privacy, consent, and autonomy should be prioritized. If you suspect you or someone you know is experiencing abuse through technology, it is essential to seek support and guidance from professionals or helplines specializing in domestic violence.

Learn more about Digital abuse

brainly.com/question/14477313

#SPJ11

Need the answer ASAP plz !!!!!

Need the answer ASAP plz !!!!!

Answers

Performance would be the answer

Which of the following is true about the Linux OS?
a. The command line interface is called PowerShell.
b. It is at the heart of many embedded and real-time systems.
c. There is no GUI option for any of the distributions.
d. It is a proprietary OS, developed by Novell.

Answers

D) It is a proprietary OS, developed by Novell. Linux is an open-source operating system.

That means it is available to anyone for free, and it is open to alteration and distribution, as long as the licensing terms and conditions are met. The source code of the Linux operating system is available to the public for inspection, modification, and enhancement.Linux has two main elements: the kernel and the user-level utilities. The kernel is a software program that manages hardware devices and runs applications.

It is the core of the Linux operating system. On the other hand, user-level utilities provide a range of commands and tools that allow users to interact with the kernel and perform tasks.The command-line interface in Linux is referred to as the shell. It is a text-based user interface that allows users to interact with the system using typed commands. The Bash shell is the most common shell in use, but there are several other shells available.Linux is commonly used in embedded and real-time systems.

The operating system is highly customizable, which makes it a popular choice for specialized systems. Moreover, Linux is lightweight, making it suitable for systems with limited resources. Also, there is a GUI option available for many Linux distributions.Novell does not own Linux; it is a free and open-source operating system that is available to the public under the terms of the GNU General Public License.

Learn more about operating system :

https://brainly.com/question/31551584

#SPJ11

What is the result when you run the following program?

print(“2 + 7”)
print(3 + 1)

Answers

Answer:

line 1 = 2+7 (you added quote marks)

line 2 = 4 (you did not add quote marks, which adds both nums together)

Explanation:

What design element includes creating an effect by breaking the principle of unity?

Answers

Answer:

Sorry

Explanation:

Computer chip

jerome wants to search for articles about banana pudding but his web search results also show results for chocolate pudding as well as articles about bananas. what should jerome enter into the search window so that he only finds articles with the words banana pudding in them?

Answers

Jerome should enter Banana pudding into the search window so that he only found articles with the words banana pudding in them.

An article means a kind of written work that is often available in everyday life, both academically and non-academically. The regular purpose of an article is to educate, inform, and entertain the reader. Usually, articles are launched through websites or other digital media.

Based on the content of the article, articles can be divided into several types, namely:

1. Light Article, this article usually consists of light information that is packaged by the author in an entertaining style or inserted with humor.Practical Articles, Practical articles tend to be narrative, and the messages written in them are sorted by time or events.Opinion Articles, the aims of opinion articles is to express neutral and critical opinions with written presentations or evidence.Expert Analysis Article, the general goal of the article is to publish a research result that has been done.Description Articles, description articles are usually written to take a picture of something so that it can be easily understood by readers.

You can learn more about Article here brainly.com/question/14172780

#SPJ4

1. What pricing strategy is used by local electric
distributors/retailers in charging us monthly electric bills?

Answers

Local electric distributors/retailers are the ones that distribute and sell electricity to the consumers.

They need to have a pricing strategy to charge the consumers a fair price for their services. There are different pricing strategies used by these companies to charge the monthly electric bills.One of the most common pricing strategies used by local electric distributors/retailers is the Cost-plus pricing strategy. This strategy involves adding a markup to the total cost of providing the service. The markup is added to cover the expenses and generate a profit for the company. This pricing strategy is commonly used by regulated utilities as the markup is reviewed and approved by the regulatory commission.

The second pricing strategy is the value-based pricing strategy. This strategy involves charging the customers based on the value they receive from the service. For example, a customer who consumes more electricity will be charged more. This pricing strategy is common in competitive markets where different electric distributors/retailers are competing to win customers.The third pricing strategy is the demand-based pricing strategy. This strategy involves charging the customers based on the demand for electricity.

During peak hours, when the demand is high, the price of electricity is high. During off-peak hours, when the demand is low, the price of electricity is low. This pricing strategy is used to encourage the customers to use electricity during off-peak hours and reduce the load during peak hours.In conclusion, local electric distributors/retailers use different pricing strategies to charge the consumers monthly electric bills. The choice of pricing strategy depends on various factors such as the regulatory environment, market competition, and customer demand.

Learn more about customer :

https://brainly.com/question/13472502

#SPJ11

To register your content with the US Copyright Office, visit copyright.gov to get started. Online
registration usually costs between _____ and _____, and you'll have to send a copy of your completed
work to the U.S. Copyright Office either through the mail or via its website. Once your work is
registered, it will be added to the Library of Congress.
$35 and $55
O $25 and $65
O $15 and $35
O $85 and $105

Answers

Answer:

$35 and $55

Explanation:

Online registration usually costs between $35 and $55 , and you'll have to send a copy of your completed work to the U.S. Copyright Office either through the mail or via its website. The correct option is 1.

What is Copyright?

Copyright is a legal concept that grants creators of original works, such as literary, artistic, musical, and other types of intellectual works, exclusive rights.

These rights give the creators the ability to control how their works are used, distributed, and reproduced, as well as receive monetary compensation for their use.

Depending on the type of work and the filing option selected, online registration with the United States Copyright Office typically costs between $35 and $55 for a single work.

It should be noted that these fees are subject to change, and that additional fees may apply for specific services such as expedited processing or special handling.

Thus, the correct option is 1.

For more details regarding copyright, visit:

https://brainly.com/question/22399852

#SPJ6

Your question seems incomplete, the probable complete question is:

To register your content with the US Copyright Office, visit copyright.gov to get started. Online

registration usually costs between _____ and _____, and you'll have to send a copy of your completed

work to the U.S. Copyright Office either through the mail or via its website. Once your work is

registered, it will be added to the Library of Congress.

$35 and $55$25 and $65$15 and $35$85 and $105

A possible consequence of oversharing online might be:
A. receiving a great recommendation from a teacher.
B. getting accepted to the college of your choice.
C. stealing information from friends you do not trust.
D. being incriminated against or fired by an employer.

Answers

Answer:

D

Explanation:

A & B are not consequences

C is a consequence but not directed towards you but your friends

Which computing component is similar to the human brain

Answers

THE CPU ,THERE IS WERE ALL THE INFORMATION IS.
Other Questions
what is the simplified product of 2/9 x 3/8A. 6/72. B. 5/17. C. 3/36. D.1/12 The _________ region stretches from the Canadian border to Oregon border.A.Blue MountainsB.Cascade MountainsC.Columbia BasinD.Okanogan Highlands Which of the following statements best describes recurrent acute pain?A) The pain is constant and varies in severity, typically persists for 6 months or longer, and is relatively unresponsive to treatment. B) The pain typically goes on for 6 months or less and disappears when the tissue damage is repaired. C) It involves constant pain that increases in severity over time, due to a malignant condition, and typically lasts longer than 6 months. D) It involves intermittent episodes of pain that are acute in character but chronic inasmuch as the condition repeats for more than 6 months. What effect did feudalism Initially have on European monarchies?Find the answer in high school US history book chapter 1 lesson 4. called New patterns of Civilization Frodo was the only one present who had said nothing.For some time he had sat silent beside Bilbo's emptychair, and ignored all remarks and questions. He hadenjoyed the joke, of course, even though he had been inthe know. He had difficulty in keeping from laughter atthe indignant surprise of the guests. But at the same timehe felt deeply troubled: he realized suddenly that he lovedthe old hobbit dearly. Most of the guests went on eatingand drinking and discussing Bilbo Baggins' oddities, pastand present; but the Sackville-Bagginses had alreadydeparted in wrath. Frodo did not want to have any moreto do with the party.-The Fellowship of the Ring,J.R.R. TolkienWhich statement best explains how the passage helpsTolkien build a vivid fantasy world?Frodo's conflicting emotions show that the world ofthe story is full of unrealistic contradictionsEven though Frodo is not human, his feelings areunderstandable and believable, which makes himseem realThe detailed descriptions of Frodo's physicalappearance help the reader to visualize andunderstand hobbits. The market price for a good is \( \$ 7 \). A firm's cost function is \( T C=10+9 Q \). How many units should the firm produce? 8 5 As many as possible Zero Plot the image of Figure ABCD after a dilation with scale factor. One of the sideshas been plotted for you.Click twice to plot a segment.Click a segment to delete it.BB'- show that single tape tms that cannot write on the portion of the tape containing the input string recognize only regular languages 29/33>33 Write a logical follow-up to these sentences, using the verbs below in the pass compos.se disputer se rencontrer s'entendre s'amuse se rendrese depecher se retrouver se rappeler s'asseoirMODELEMme Dumas est monte dans le bus fatigueElle s'est assise dans le bus.1. Danid a voulu voir un film la sance de minuit.2. Mes amis ont beaucoup i au parc d'attractions.3. La profet moi, nous avons t d'accord sur le projet.Maman, tu as encore retrouv Mme Perrin au centre commercial.5. Jamila et Erica n'ont pas t d'accord dans la cour de l'cole Rust has the same properties as iron TrueFalse How might some Seminole have managed to avoid relocation after 1842? George makes $345.98 teaching 3 students in an hour. How much does he make per student? Based on the graph, what conclusion can be drawn about Germany? 1.Until 1900, Germany had significantly fewer rail lines than Russia.2.Germany could not afford to build as many rail lines as the United States.3.By 1880, Germany had more rail lines than Great Britain and Russia.4.Germanys economy did not require as many rail lines as Great Britain. A right rectangular prism has a volume of 637 cubic feet. The width of the prism is 12.5 feet, and the height is 6 feet. What is the width of the prism ?Show your work ! In the ecosystem shown here, what represents a producer?a treeagatea mountain a client has been prescribed diclofenac for osteoarthritis. what would the nurse teach this client about this medication? Digestion of dietary fats please help fast will mark brainliest please help i dont understand this given the following cash flows for two mutually exclusive projects, and a required rate of return of 12%, which of the following statements is true? year project a project b 0 -300,000 -300,000 1 150,000 70,000 2 150,000 70,000 3 80,000 120,000 4 80,000 120,000 5 120,000 6 60,000