A relation is said to be in second normal form if the primary key consists of a combination key, and the non key attributes are partially dependent on the primary key.

a. True
b. False

Answers

Answer 1

The given statement "A relation is said to be in second normal form if the primary key consists of a combination key, and the non key attributes are partially dependent on the primary key" is FALSE.

What is Second Normal Form (2NF)?

The Second Normal Form (2NF) rule is a part of the database normalization process that aims to decrease data redundancy in a table and boost data integrity by making certain that the table meets certain requirements.

A relation is in second normal form (2NF) if it satisfies the following conditions:

The table must already be in first normal form (1NF).Each non-primary key column is determined solely by the primary key, which means that every non-primary key column is determined by the whole primary key or by some combination of columns within the primary key.

There are no partial dependencies in the table, which means that a non-primary key column is never dependent on just a portion of the primary key.If a table does not have any non-prime attribute or has only one key attribute, it is automatically in second normal form (2NF).

Learn more about database at:

https://brainly.com/question/29869926

#SPJ11


Related Questions

. The lightness or brightness of a color is the _______.

Answers

Answer: Value

Explanation:

Value is your answer

Sort The Weight You have N watermelons each weighing a[i] (1<=k=N) Kgs . You have got K boxes to pack these watermelons. Each box can have at most 2 watermelons only. Your task is to use maximum possible boxes but minimize the maximum weight among all the boxes . Inputs : First line consists of N and K representing the total number of watermelons and boxes respectively. Next line will have N space separated integers (a[i],K=i

Answers

The task is to pack N watermelons into K boxes, with each box being able to hold at most 2 watermelons.

The objective is to maximize the number of boxes used while minimizing the maximum weight among all the boxes. The inputs include the total number of watermelons (N), the number of boxes (K), and the weights of the watermelons.

To solve this problem, you can follow a greedy approach. First, sort the weights of the watermelons in non-decreasing order. Then, iterate through the sorted list and pack the heaviest and lightest watermelons together in each box. By doing so, you ensure that the weight difference within each box is minimized.

Algorithm:

1. Sort the list of watermelon weights in non-decreasing order.

2. Initialize variables: `i` as the starting index of the sorted list, `j` as the ending index of the sorted list, and `boxes` as 0 (to count the number of boxes used).

3. While `i <= j`, do the following steps:

  a. If the weight of the watermelon at index `j` plus the weight of the watermelon at index `i` is within the weight limit, increment `boxes` by 1.

  b. Increment `i` by 1 and decrement `j` by 1.

4. Output the value of `boxes`.

The approach guarantees that the maximum weight among all the boxes is minimized while using the maximum possible number of boxes.

Learn more about the greedy algorithm here:

https://brainly.com/question/32558770

#SPJ11

What type can generic type t be java.

Answers

Answer:

Generic type t can be the type of the class of interface that the current instance of class represent

Decimal numbers are based on __________. letters (a and b) 16 digits 10 digits two digits (1s and 0s)

Answers

Answer:

10 digits.

Explanation:

Decimal numbers are based on 10 digits.

Simply stated, decimal numbers comprises of the digits ranging from 0 to 9 i.e 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9. Thus, all decimal numbers are solely dependent on the aforementioned 10 digits.

Hence, decimal numbers are considered to be a normal (standard) number system because they are based on 10 digits (0 through 9) and as such they are the numbers used in our everyday life across the world.

This ultimately implies that, any normal number to be written as decimal numbers can only use or combine the 10 digits (0 - 9).

Answer:

D:  two digits (1s and 0s)

Explanation:

All numbers in general in coding are based on ONES and ZEROS.

Which of the following encryption mechanisms offers the least security because of weak keys?
TwoFish
AES
DES
IDEA

Answers

Due to its weak keys, DES provides the least security. Because the key is just 56 bits long, it is susceptible to brute-force attacks. The encryption algorithms TwoFish, AES, and IDEA are all more secure than DES.

Why is the key for DES 56 bits?

DES encrypts groups of 64 message bits, or the equivalent of 16 hexadecimal integers, in order to function. DES employs "keys" that are also reportedly 16 hexadecimal integers long, or reportedly 64 bits long, to do the encryption. The DES algorithm, however, ignores every eighth key bit, making the actual key size 56 bits.

What is the main factor that makes DES 56-bit no longer regarded as secure?

Despite the fact that its 56-bit key length renders it too unsafe for current.

To know more about encryption  visit:-

https://brainly.com/question/17017885

#SPJ1

You replaced the ink cartridges in a color inkjet printer. Users are now complaining that print quality has degraded, lines are fuzzy, and the colored areas in images are starting or stopping before they should. Which inkjet maintenance task do you need to perform

Answers

You need to perform print cartridge calibration.

I just need some help working out this Java code! I can list the instructions below:
Modify the CountSpaces program so that contains a String that holds your favorite inspirational quote. Pass the quote to the calculateSpaces method and return the number of spaces to be displayed in the main method.

We're given this to start however I have been struggling as there are two classes and it's been confusing me. Thanks so much for any help! All good and God Bless!

public class CountSpaces
{
public static void main(String[] args)
{
// write your code here
}
public static int calculateSpaces(String inString)
{
// write your code here
}
}

Answers

Answer:

public class CountSpaces

{

   public static void main(String[] args)

   {

       String quote = "The concept of infinity is meaningless inside of an insane human mind.";

       int nrSpaces = calculateSpaces(quote);

       System.out.println("Nr spaces in your quote is " + nrSpaces);

   }

   

   public static int calculateSpaces(String inString)

   {

       int count = 0;

       

       for (int i = 0; i < inString.length(); i++) {

           if (inString.charAt(i) == ' ') {

               count++;

           }

       }

       return count;

   }

}

Explanation:

In this example there is only one class, and since all methods are static the true concept of the class is not even being used.

What are the different types of peripherals and give some examples in each category? What do you think would be a really cool type of peripheral that could be developed in the future?

Answers

Explanation:

Remember, peripheral devices are portable devices connected to a computer in other to add more functionality to the computer system such as a printer, mouse, hard drive, CD-ROM, etc.

A really cool type of peripheral that could be developed in the future is a voice-enabled mouse that can perform normal operations on the computer.

Where does Reiner take eren after they have a fight?

Answers

Answer:

So Reiner And Bertoldt wanted to take Eren and Ymir to Marley, a nation on the other side of the ocean so they can be devoured and there power can be given to a warrior canidate.

Answer:

what season tho?

Explanation:

Reiner took eren to the Forest

Given a portion of Binary image; ((x,y), with Is referring to thewhite pixels and Os referring to black pixels. The structural element h(xy) is alsogiven. The rule for the resulting center pixel is:g(x, y) = 1iffI'm=-1 Ene-1 f(a + m, y + n) h (m,n) > 2Draw the resulting image g(,y). [2 Bonus points if you can also remove border effect]No MATLAB function can be used in solving this question!

Answers

The resulting image g(x, y) can be obtained by applying the given rule to each center pixel (x, y) of the binary image, using the structural element h(m, n).

If the sum of the products of the neighborhood pixels f(a + m, y + n) and the corresponding structural element h(m, n) is greater than 2, then the center pixel g(x, y) is set to 1; otherwise, it is set to 0.

To remove the border effect, we can ignore the pixels at the image edges or pad the image with appropriate values before applying the rule. This ensures that the structural element can be fully applied to all center pixels, even those at the borders, resulting in a proper and accurate image transformation.

Learn more about binary image here:

https://brainly.com/question/13441304

#SPJ11

Which service provides dynamic global ipv6 addressing to end devices without using a server that keeps a record of available ipv6 addresses?.

Answers

The service that provides dynamic global ipv6 addressing to end devices without using a server that keeps a record of available ipv6 addresses is: Stateless Address Autoconfiguration SLACC.

What is Stateless Address Autoconfiguration?

SLAAC is an acronym that stands for Stateless Address Autoconfiguration, and the name pretty well sums up what it accomplishes.

It is a method that allows each host on the network to automatically configure a unique IPv6 address without the need for any device to keep track of which address is allocated to which node.

It should be noted that in an IPv6 network, this is the recommended way of allocating IP addresses. SLAAC devices request the network prefix from the router, and the device generates an IP address using the prefix and its own MAC address.

Learn more about SLACC:
https://brainly.com/question/29349998
#SPJ1

PowerPoint Online automatically saves your presentation to what Office Online application? OneDocument OneDrive OneNote OneWay

Answers

Answer:

OneDrive

Explanation:

OneDrive is Microsoft cloud storage service. so it makes sense it would save it their :)

Answer:One DriveExplination:

Write a C++ program (or Java program) called hw1_1.cpp (or hw1_1.java) that reads input numbers from a user and displays the number that occurs most frequently among all the input numbers.
Input format: This is a sample input from a user.
5
7
-7
20
7
15
The first number (= 5 in the example) indicates that there will be five integer numbers in the input. Then, all numbers from the second line (= 7 in the example) to the last line (15 in the example) are actual numbers. Thus, your program should read them and display the most frequent number among 7, -7, 20, 7, and 15. Because the number 7 appears twice in the input, your answer should be 7. If you have more than one number that occurs most often, you have to display the largest number.
Sample Run 0: Assume that the user typed the following lines.
5
7
-7
20
7
15
This is the correct output of your program.
Number:7
Frequency:2
Sample Run 1: Assume that the user typed the following lines.
10
-1
20
-15
5
72
20
5
20
5
30
This is the correct output of your program. Note that the frequencies of 5 and 20 are 3. But since 20 is bigger than 5, the correct number should be 20.
Number:20
Frequency:3
Sample Run 2: Assume that the user typed the following lines.
2
2
1
This is the correct output of your program.
Number:2
Frequency:1

Answers

Here's a C++ program that meets the requirements of the prompt:

c++

#include <iostream>

#include <unordered_map>

using namespace std;

int main() {

   int n;

   cin >> n;

   

   unordered_map<int,int> freq;

   for (int i = 0; i < n; i++) {

       int num;

       cin >> num;

       freq[num]++;

   }

   

   int most_frequent_num = -1;

   int max_frequency = -1;

   for (auto it = freq.begin(); it != freq.end(); it++) {

       if (it->second > max_frequency) {

           most_frequent_num = it->first;

           max_frequency = it->second;

       } else if (it->second == max_frequency && it->first > most_frequent_num) {

           most_frequent_num = it->first;

       }

   }

   

   cout << "Number:" << most_frequent_num << endl;

   cout << "Frequency:" << max_frequency << endl;

   

   return 0;

}

The program stores the input numbers in an unordered_map that tracks the frequency of each number. Then, it iterates through the map to find the number with the highest frequency. If there are multiple numbers with the same highest frequency, it picks the largest one.

Note that this program assumes that all inputs are valid integers. Without further error checking, the program may produce unexpected results if the user inputs non-integer values or too few values.

Learn more about program   here:

https://brainly.com/question/14368396

#SPJ11

Suppose x is 5 and y is 7. Choose the value of the following expression:

(x != 7) && (x <= y)
Pilihan jawaban
false
true
0
null

Answers

x is 5 and y is 7, This statement expression was False.

What is meant by Expression ?

A syntactic item in a programming language that may be evaluated to discover its value is known as an expression in computer science.

An expression is a statement in a computer Programme that results in a certain value.

The result of a Boolean expression is either true or false. Expressions have a distinct meaning, whereas assertions have two possible outcomes.

For instance, whereas go() may or may not be executed, 1 has a specific value. Expressions serve as the building blocks, whilst statements make up the entire framework.

An example of a statement is a line or block of code.

A mathematical expression can only result in one mathematical value.

To learn more about Expression refer to

https://brainly.com/question/1859113

#SPJ4

How does the recent use of the filibuster compare to how it was used in the past.

Answers

How the filibuster work is put few restrictions on the debate; in general, if no other senator is speaking, a senator who seeks recognition means entitled to speak for as long as they wish.

Filibusters prevent to be particularly useful to southern senators who sought to block civil rights legislation, including anti-lynching bills. Not until 1964 did the Senate successfully overcome a filibuster to pass a major civil rights bill. A filibuster means a strategy that used in the U.S. Senate to delay or block a vote on a measure by preventing the debate on it from ending. The modern English form "filibuster" was borrowed in the early 1850s from the Spanish filibustero (lawless plunderer).

You can learn more about filibusters at https://brainly.com/question/2118564

#SPJ4

Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy of it on her website with an attached Creative Commons license. Which of the following best describes who owns the photo?

Beatrice owns the photo because only holders of a Creative Commons license can own works online.

Arman owns the photo because he was the original creator and did not license the work.

Arman owns the photo because it was granted a Creative Commons license by another person online.

Both own the photo because creating a copy makes it her intellectual property.

Answers

Answer:

Arman owns the photo because he was the original creator and did not license the work.

Explanation:

Explain the expression below
volume = 3.14 * (radius ** 2) * height

Answers

Answer:

Explanation:

Cylinder base area:

A = π·R²

Cylinder volume:

V = π·R²·h

π = 3.14

R - Cylinder base radius

h - Cylinder height

1).
What is a resume?
A collection of all your professional and artistic works.
A letter which explains why you want a particular job.
A 1-2 page document that demonstrates why you are qualified for a job by summarizing your
skills, education, and experience.
A 5-10 page document that details your professional and educational history in great detail.

Answers

Answer:

option 1

Explanation:

its not a job application cause your not appling for a job, a resume is a list of all the things you have done that would be beneficial to a job. for example, previous jobs, skills you have, hobby that pertain to a job you want, education and other professional things.

Hope this helps:)

A type of chart that shows the contribution of each item for a total of 100% is called a a.bar chart b.column chart c.line chart d.pie chart

Answers

Answer:

D. Pie Chart

Explanation:

A pie chart is a circle that has a percentage of certain things. For instance, if you were making a pie chart of what colors your family liked, let's say you have 5 other members in your family. 2 of them like the color blue, 1 likes the color red, 1 likes yellow, and 1 likes green. Your pie chart would be partitioned like a fraction model, and you would put 20% for green, 20% for yellow, 20% for red, and 40% for blue.

Hope this helps! <3

~Sakura Hitoroku

Which of the following security goals are met by the OTP XOR encryption scheme? a) Availability Ob) Integrity O c) Authenticity Od) Confidentiality Computationally Secure Encryption Schoma

Answers

The OTP XOR encryption scheme meets the security goal of confidentiality. Tthe OTP XOR encryption scheme meets the security goal of confidentiality by using a one-time pad and the XOR operation to protect information from unauthorized access or disclosure.


Confidentiality refers to the protection of information from unauthorized access or disclosure. The OTP XOR encryption scheme ensures confidentiality by using a one-time pad (OTP) and the XOR operation.

In the OTP XOR encryption scheme, a one-time pad is a randomly generated key that is used only once. The key is as long as the message to be encrypted. The XOR operation is a bitwise operation that combines the bits of the message with the corresponding bits of the key.

The XOR operation provides a high level of security because it is reversible and produces ciphertext that appears random. Without the correct one-time pad, it is computationally infeasible to decipher the encrypted message and obtain the original plaintext.

To illustrate this, let's consider an example. Suppose we have a message "HELLO" and a one-time pad "WXYZ." Each character in the message is represented by its ASCII value, which is converted to binary for encryption.

H (72 in ASCII) = 01001000
E (69 in ASCII) = 01000101
L (76 in ASCII) = 01001100
L (76 in ASCII) = 01001100
O (79 in ASCII) = 01001111

X (88 in ASCII) = 01011000
W (87 in ASCII) = 01010111
Y (89 in ASCII) = 01011001
Z (90 in ASCII) = 01011010

Performing the XOR operation:

01001000 XOR 01011000 = 00010000
01000101 XOR 01010111 = 00010010
01001100 XOR 01011001 = 00010101
01001100 XOR 01011010 = 00010110
01001111 XOR 01011000 = 00010111

The resulting ciphertext is: 00010000 00010010 00010101 00010110 00010111

Without the one-time pad, it is virtually impossible to determine the original message from the ciphertext. This ensures the confidentiality of the information being encrypted.

Learn more about encryption here :-

https://brainly.com/question/30225557

#SPJ11

What computer would I need to set up my oculus quest 2 aka make my oculus quest 2 link to a computer?

Answers

Answer:

Any computer would do as long as it isn't slow and has a good fps to render the games you plan to connect with. Make sure you have the correct cable though.

I recommend a 1660 and up, it is the best graphics card for the price. I have a 1660 super and can run most big VR games on high setting. Make sure your pc has a usb C port too.

Which task is considered part of network performance management?
connecting network servers to a gateway
protecting the network from unwanted intruders
installing and configuring the network operating system
monitoring the speed of the network’s Internet connection

Answers

The task that is considered part of network performance management is to monitor the speed of the network’s Internet connection. Thus, the correct option for this question is D.

What are the tasks of network performance management?

The tasks of network performance management are as follows:

It controls the management of local networks.It involves the methodology of gathering, estimating, and diagnosing all the metrics of each component of a network.It regulates the management of internet connection.

Apart from this, the strategy of installing, configuring, and maintaining the operating systems and IT infrastructure services are also included under the responsibilities of this professional of network performance management (NPM).

Therefore, the task that is considered part of network performance management is to monitor the speed of the network’s Internet connection. Thus, the correct option for this question is D.

To learn more about Network Performance Management, refer to the link:

https://brainly.com/question/27961985

#SPJ1

A smart card is?

a) the brain of the computer
b) a device about the size of a credit card that stores and processes date
c) a library card
d) a device inside the body of the computer used to store data​

Answers

Answer:

i think....(b)

Explanation:

please say yes or no answer....

Leslie has not properly bugeted for savings, retirement, or debt repayment

Answers

Savings, debt repayment, and retirement are the areas of Leslie's budget that are being negatively impacted by her underspending.

What happens if you don't budget correctly?A financial projection of a person, business, or government's earnings and expenses is simply referred to as a budget.It should be emphasized that the areas of Leslie's budget that her underspending is impacting include savings, debt reduction, and retirement. The most frequent effects of not budgeting are, in brief, a lack of savings, diminished financial stability, unrestrained spending, a greater risk of incurring debt, and increased financial stress. It will be challenging to live the same lifestyle in retirement as you had while working if you don't have any money.You might need to make changes like downsizing your house or apartment, giving up luxuries like cable television, an iPhone, or a gym membership, or driving a less expensive vehicle.

To learn more about budget refer

https://brainly.com/question/15464516

#SPJ1

Describe a situation in which you would want to use integer division in a program. Then, write the line of code that would use integer division.

Answers

The description of a situation in which you would want to use integer division in a program is that they would give you the exact answer you want when performing addition, division, etc, and is more reliable than using floating point math.

What is Integer Division?

This refers to the term that is used to describe the operator divides two numbers and returns a result and its symbol is %

The Program that uses an integer division is given below:

int a = 25;

int b = 5;

int c = a / b ;

System. out. println(c);

Read more about integer division here:

https://brainly.com/question/28487752

#SPJ1

Computerized spreadsheets that consider in combination both the
risk that different situations will occur and the consequences if
they do are called _________________.

Answers

risk assessment spreadsheets or risk analysis spreadsheets

Both answers are correct

The given statement refers to computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do which are called decision tables.

A decision table is a form of decision aid. It is a tool for portraying and evaluating decision logic. A decision table is a grid that contains one or more columns and two or more rows. In the table, each row specifies one rule, and each column represents a condition that is true or false. The advantage of using a decision table is that it simplifies the decision-making process. Decision tables can be used to analyze and manage complex business logic.

In conclusion, computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do are called decision tables. Decision tables can help simplify the decision-making process and can be used to analyze and manage complex business logic.

To know more about spreadsheets visit:

https://brainly.com/question/31511720

#SPJ11

There is a new product launched and its customer ratings are being recorded in an array. the ratings are being monitored and analyzed if there is any decrease in the ratings. find the number of periods in which the rating is consecutively decreasing.

example - ratings = [4,3,5,4,3]
periods (in other words sub arrays in which ratings are decreasing):
one day periods = [4],[3],[5],[4],[3] (count of subarrays is 5)
two day periods = [4,3],[5,4],[4,3] (count of subarrays is 3)
3 day periods = [5,4,3] (count of subarrays is 1)
so, the output for this example will be 9 (5 + 3 + 1)

Answers

The program to find the number of periods in which the rating is consecutively decreasing is; As written in the attached file

What is the program array?

What we are required to do to find the number of elements in decreasing part. For example;

4,3 means One decreasing part and has 2 elements

5, 4, 3 means second decresing part and has 3 element.

Thereafter, we just add n*(n + 1)/2 to result.

where;

n = number of elements in any part

n*(n + 1) /2 is number of decreasing subarray that can be made

For the second decreasing part which is [5, 4, 3];

number of sub arrays you can make = 3 * 4/2 = 6

Thus, we have;

[5], [4,], [3], [5,4],[4,3],[5,4,3]

The program to find the number of periods in which the rating is consecutively decreasing is as follows in the attached file;

Read more about program array at; https://brainly.com/question/16266708

There is a new product launched and its customer ratings are being recorded in an array. the ratings

how would one declare a variable err that can appropriately receive returned value of a cuda api call?

Answers

A person can declare a variable err that can appropriately receive returned value of a CUDA API call by the use of cudaError t_err;

What is Proper CUDA Error Checking?

Proper CUDA error checking is known to be very vital for creating the CUDA program development to be very smooth as well as to be successful.

Note that Missing or incorrectly found CUDA errors could lead to problems in the making as well as waste a lot of time of one trying to debug.

Therefore, A person can declare a variable err that can appropriately receive returned value of a CUDA API call by the use of cudaError t_err;

Learn more about programming from

https://brainly.com/question/16936315

See full question below

How would one declare a variable err that can appropriately receive returned value of a CUDA API call?

int err;

cudaError err;

cudaError t_err;

cudaSuccess t_err;

Consider the following code segment. int x = 1;while ( /* missing code */{System.out.print ( x + "" "");x = x + 2;

Answers

To complete the code segment, one needs to add a condition to the while loop. The condition will determine when the loop should continue iterating and when it should stop. This would result in the output: 1 3 5 7 9.

Based on the provided code snippet, it appears that the intention is to print the value of x and update its value by adding 2 in each iteration of the loop.

If one want to print the value of x until it reaches a certain threshold, such as 10, the missing code in the while loop condition could be:

while (x <= 10) {

   System.out.print(x + " ");

   x = x + 2;

}

With this code, the loop will continue executing as long as x is less than or equal to 10. In each iteration, it will print the current value of x, followed by a space, and then update x by adding 2. The loop will terminate when x exceeds 10.

This would result in the output: 1 3 5 7 9.

Leran more about the code segment here

https://brainly.com/question/28343520

#SPJ4

An attacker has been successfully modifying the purchase price of items purchased at a web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the IDS logs and found no attacks that could have caused this.
What is the mostly likely way the attacker has been able to modify the price?
A. By using SQL injection
B. By changing hidden form values in a local copy of the web page
C. By using cross site scripting
D. There is no way the attacker could do this without directly compromising either the web server or the database

Answers

the correct answer is b
Other Questions
if a juggler throws a ball straight up at a speed of 25 m/s, how long will it take to come back down? i literally need help w every question .. what is different of the four shapes? the united states, like many other industrialized nations, is shifting toward a In bronfenbrenner's bioecological model of development, which system reflects the dynamic qualities of the other systems? A cylindrical container of three rubber balls has a height of 27 centimeters and a diameter of 9 centimeters. Each ball in the container has a radius of 4.5centimeters. Find the amount of space in the container that is not occupied by rubber balls. Round your answer to the nearest whole number. Minstrel Manufacturing uses a job order costing system. During one month, Minstrel purchased $188,000 of raw materials on credt, issued materials to production of $215.000 of which $10,000 were indirect. Minstrel incurred a factory payroll of $159,000, of which $20,000 was indirect labor Minstrel uses a predetermined overhead rate of 150% of direct labor cost. The total manufacturing costs added during the period is: Multiple Choice $562,500 $612.500 $552,500 $582.500 $602,500 1. Use "American Apple" to answer questions 1-6.The author uses a simile to describe the apples in paragraph 2 to convey -their mythic appealthe advertising techniques used in foreign magazinesOtheir universal symbolismthe contrast between Chinese and foreign supermarkets The delgates that were chosen to revise/write a new plan for national government were called Kareem was doing research for a report about the longest rivers on Earth. He read that the Nile River is 4.16 10 miles long. How should Kareem write the length of the Nile River in standard form on his report? How did Kenya gain its independence? A. NegotiationB. ImperialismC. Peace treatiesD. Armed revolution A student slides her 80.0-kg desk across the level floor of her dormitory room a distance 2.00 m at constant speed. If the coefficient of kinetic friction between the desk and the floor is 0.400, how much work did she do? helppppppt ......... Characteristics used to describe matter are you called Bibek went to the swimming pool. he saw the pool to be shallower and is redy to jump into the swimmingpool . is it proper for him to jump? if not why ? How can you find the sum of the interior angle measures in any polygon with N sides? Can u guys pls help me on this question and pls explain how u got the answer For each of the following: state whether or not the linear congruence relation has a unique solution and explain why or why not. If it has a unique solution or multiple solutions, find the solutions.(c) 5x7(mod14) (d) 5x1(mod14) \True or false: Commercial certificates of deposit (CDs) work exactly the same way consumer CDs work, except that commercial CDs are issued in large dollar amounts. Generally, investors interpret the announcement of an increase in dividends as: (hint: think how shares may be valued) A. bad news and the stock price drops B. a non-event and does not affect the stock price C. good tax management by the company D. good news and the stock price increase