explain three level architecture in DBMS.

ty​

Answers

Answer 1

In a database management system (DBMS), the three-level architecture refers to the way that the DBMS is structured and organized. It consists of three main components:

The external levelThe conceptual levelThe internal level:

What are the levels  about?

The external level: This is the interface between the DBMS and the users or applications that access the database. It defines how users or applications can access and manipulate the data in the database.

The conceptual level: This is the logical view of the database, which represents the data in a way that is independent of the physical storage of the data. It defines the structure of the data and the relationships between different data entities.

Lastly, The internal level: This is the physical view of the database, which represents how the data is actually stored on a storage medium such as a hard drive or a solid-state drive. It defines the specific data structures and storage mechanisms that are used to store and retrieve the data.

Hence, The three-level architecture is designed to provide flexibility and separation of concerns in the DBMS.

Learn more about DBMS from

https://brainly.com/question/13485235

#SPJ1


Related Questions

what is the maximum number of conductors a split bolt connector can connect to unless the labeling indicates that more conductors can be spliced?

Answers

The maximum number of conductors that a split bolt connector can connect to depends on the size of the connector and the size of the conductors being spliced.

What is conductor?

A conductor is a material that allows electricity to flow through it easily. Examples include metals such as copper and aluminum, which are commonly used in electrical wiring and power transmission. Other materials, such as semiconductors, can also be used as conductors under certain conditions.

What is split bolt connector?

A split bolt connector is a type of electrical connector used to splice two or more wires together. It is commonly used in electrical wiring and power transmission. The connector is made up of a metal bolt with a split in the middle, which allows the wires to be inserted into the connector and then tightened down using a tool to create a secure connection. The connector is then typically wrapped with electrical tape or covered with a protective cap to ensure a safe and reliable connection.

To know more about Conductor, visit: https://brainly.com/question/27932945

#SPJ4

Which technology helps create an intelligent classroom environment?
a.
Bring your own device (BYOD) policy
b.
Social networking tools
c.
Online productivity software
d.
Modern, communal seating arrangements

Answers

c)Online productivity software and  a)BYOD (Bring  Your Own Technology) helps create an intelligent classroom environment.

What is the most accurate way to define environment?

Environment can be summed up as the effects of all the alive and non-alive things that have an impact on human life. Non-living or abiotic materials include water, earth, sunshine, rocks, and air, whereas all live or biological components are creatures, flowers, forests, fisheries, and birds.

What components make up the environment?

The lithosphere, which consists of rocks and soil, the hydrosphere, which consists of water, and the biosphere, which consists of the biological component of the environment, are the four basic constituents of the environment.

To know more about environment visit-

https://brainly.com/question/28419698

#SPJ4

Social media targets ads at you based on your history. What do you think about data privacy issues while using social media ?

Answers

The issues of data privacy are extremely in danger while using social media. This is because there is an increased threat of hackers, companies, and malicious interlopers mining your data in ways that undermine personal privacy.

What is the significance of social media?

The significance of social media is determined by the fact that it helps young people develop their interests and find other people who share the same interests. They can help introduce young people to new things and ideas, and deepen appreciation of existing interests.

This becomes more problematic for people because many popular companies of social media companies make a significant portion of their revenue by selling users' data to data collection companies, who then sell it to other third parties for targeted advertisements. This creates insecurity for people.

Therefore, the issues of data privacy are extremely in danger while using social media.

To learn more about Data privacy, refer to the link:

https://brainly.com/question/26824795

#SPJ1

Which of the following really is both an analysis (discovery) and a design process (solution).A) Environment design
B) User interface design
C) System interface design
D) Database design

Answers

User interface design is a process that involves both analysis (discovery) and design (solution).

How do you define systems analysis and design?

systems evaluation. tasks involved in system development that help a person comprehend and specify what a new system should be able to do. creating systems. System development tasks that allow one to precisely outline how the new information system will be put into practice.

What is the primary goal of system design and analysis?

Numerous businesses employ the process of system analysis and design to assess specific company challenges and build solutions that are more effective. Businesses may use this approach to restructure their operations or achieve their growth and profitability goals.

To know more about User interface design visit:-

https://brainly.com/question/13032366

#SPJ4

a solid line that can be drawn at any edge of a paragraph is called a ____.

Answers

A solid line that can be drawn at any edge of a paragraph is called a rule line. A rule line is a line or series of lines that are used to divide or separate different sections or areas within a document or layout.

A rule line, also known as a rule or a ruler, is a straight, thin, rectangular piece of plastic, metal, or wood that is used to measure distances or draw straight lines. It typically has markings along one or both edges, such as centimeters or inches, that allow for precise measurements.

There are several different types of rule lines, including:

Standard rulers: These are the most common type of rule line and are typically 12 inches or 30 centimeters long. They have markings on both edges, and the markings on one edge are typically divided into smaller increments, such as 16th of an inch or millimeters.

Metric rulers: These rulers are designed for use with the metric system and typically have centimeters and millimeters on one edge. They may also have inches on the other edge for convenience.

Triangular rulers: These rulers have three straight edges, with markings on all three edges. They are often used in geometry and technical drawing.

Flexible rulers: These rulers are made of a flexible material, such as plastic, and can bend or curve to fit around objects. They are often used in crafts or to measure circular or irregularly shaped objects.

To know more about Rule line Kindly visit
https://brainly.com/question/11356829

#SPJ4

In the event of a crash or shutdown, the user's browsing session is preserved using the session restore feature.

Most web browsers have an address bar that users can use to type in a website's URL and visit it. The back and advance buttons allow users to navigate to the previous or following page. The refresh button allows you to reload a website. Which web browser do you use? online browser A web browser is a piece of software that enables website viewing and Internet browsing. You are now using a web browser to read this page, even if you weren't aware of it. Although there are many various types of web browsers, Mozilla Firefox and Safari are two of the most popular ones.

Learn more about Web browsers here:

https://brainly.com/question/29753556

#SPJ4

____ is the designation for a digital telephone circuit that transmits voice or data at 1.544 mbps. T/F

Answers

A T-1 carrier, which allows a data throughput of 1.544 Mbps, is a dedicated telephone connection or a time-division-multiplexed digital transmission service.

Is the name given to a digital telephone circuit that sends speech or data at a speed of 1.544 Mbps?

The data rate of the T-1 circuit, also known as DS-1, is 1.544 Mbps. T-1s support 24 concurrent 64 Kbps channels for PCM-based data or voice messaging. Four T-1 connections are multiplexed by T-2 (6.312 Mbps).

What is the name of the circuit that converts digital information between different forms?

An electronic circuit known as a data converter transforms data from one form to another. We must install an interface if we want to connect an analog circuit's output to a digital circuit's input.

To know more about  digital telephone visit:-

https://brainly.com/question/14290869

#SPJ4

A(n) ____ filename is the name that differentiates a file from other files in the same directory.
absolute
relative
short-form
directory

Answers

A(n) relative filename is the name that differentiates a file from other files in the same directory.

A file and a directory are what?

The file system is responsible for controlling information on the disc. Files are used to store information, and directories are used to store files (folders). When directories store information about one another, a directory tree is formed. / is the filesystem's primary root directory. A directory is a unique type of file that only contains the information necessary to access files or other directories. As a result, a directory consumes less storage space than other file types. A file system is made up of collections of folders and the files that reside inside.

To know more about directory visit:

https://brainly.com/question/7007432

#SPJ4

The telephone was an exciting invention. In revolutionized communication. The telephone instantly connected people across the country for the first time. People were concerned there would be negative consequences.

Answers

The sentence can be written as "the telephone was an exciting invention because it revolutionized communication and, for the first time, instantly connected people across the country, but people were concerned about the negative consequences."

What is a sentence?

A complete set of definition assumes of a main clause and one or more subordinate clauses, solution containing a predicate and subject transmitting a statement, question, interjection, or command.

A simple sentence has a subject, which is a person or thing that is doing something, and a predicate, which is a verb or verbal phrase that identifies the action and wants to express a coherent sentence as an independent clause.

There are no dependent and perhaps subordinate clauses in simple sentences.

In the English language, sentences are classified into four types namely declarative, exclamatory, imperative, and interrogatory.

Each sentence type provides a distinct function. Understanding the various sentence types and how to use them will assist you in improving your writing skills.

Thus, the sentence can be written as "the telephone was an exciting invention because it revolutionized communication and, for the first time, instantly connected people across the country, but people were concerned about the negative consequences."

For more details regarding sentence, visit:

brainly.com/question/18728726

#SPJ4

ct and describe a technology other than a smartphone or computer and discuss how you use it or how it affects your daily life. how does your interaction with this technology compare/contrast with how technology in general is presented in this week's readings?

Answers

Calculators are computers, and the mathematical operations they execute might be accomplished using only basic arithmetic calculations. Regularly used digital cameras store images in electronic memory rather than film.

How do technology and computers help you in your daily tasks?

Modern life is impacted by technology in practically every way, from sociability to productivity to food and healthcare access to transportation efficiency and safety. Computers are used at home for a variety of activities, including online bill payment, watching movies or television shows at home, home tutoring, access to social media, playing games, and internet access.

To type documents, send emails, play games, access the web, edit spreadsheets, presentations, and even create films, one uses a computer. Because of the internet's strength, it is now easier to share ideas and resources and to create global communities.

To learn more about technology, visit:

https://brainly.com/question/9171028

#SPJ4

what will the following code display? cout << "monday"; cout << "tuesday"; cout << "wednesday";

Answers

The following code displays the output as Monday, Tuesday, and Wednesday.

What is meant by code display in programming?

Code display in programming may be defined as the set of instructions, or a system of rules that are written in a particular programming language in order to give instructions to the computer.

It is also the term that is significantly utilized for the source code after it has been processed by a compiler and made ready to run on the computer. Cout in C++ is used to display the output to the standard output device i.e. monitor. It is associated with the standard C output stream stdout.

Therefore, the following code displays the output as Monday, Tuesday, and Wednesday.

To learn more about Code in programming languages, refer to the link:

https://brainly.com/question/16936315

#SPJ1

Select a correct statement regarding encryption methods. Multiple Choice O Most companies prefer using asymmetric-key encryption method for data transmission. O Symmetric-key encryption method is used to authenticate trading partners. O Only asymmetric-key encryption method can ensure confidentiality. O Asymmetric-key encryption method is used to create digital signatures.

Answers

The correct answer about encryption method is option (D). Asymmetric-key encryption method is used to create digital signatures.

Asymmetric cryptography or known as asymmetric key encryption or also known as Public-key cryptography generally can be defined as the field of cryptographic systems that use pairs of related keys. A corresponding private key and also a public key is contain in each of asymmetric key encryption. Cryptographic algorithms based on mathematical problems that termed one-way functions is usually used to generated in key pairs. One of the example of asymmetric cryptography is Rivest Shamir Adleman (RSA) the Digital Signature Standard (DSS).

Here you can learn more about Asymmetric-key encryption https://brainly.com/question/8455171

#SPJ4

windows 10 uses a(n) ________ account for easy access and storage of online files.
- OneDrive
- iCloud
- Chrome
- eye OS

Answers

Answer:

OneDrive

Explanation:

A OneDrive (Microsoft) account is used to sign into OneDrive, then you can access the cloud storage

the rows in the tables are called ____________________.

Answers

The vertical arrangement of the number is referred to as a column, while the horizontal groupings are referred to as rows.

What is the name of the row data?

You may think of a row data type as a row of columns with various data types that are stored in a single database table column. Row data types adhere to the same fundamental principles as database tables. A row data type's columns are referred to as fields.

What is the name of a table's first row?

A row at the top of a table that labels each column is known as a table header. For instance, the table below has three columns with the headers "Name," "Date of Birth," and "Phone."

To know more about  horizontal groupings visit:

brainly.com/question/30176893

#SPJ4

Write an algorithm to find the sum of first ten natural numbers. ​

Answers

Answer:

The sum of the first 10 natural numbers is given by the formula: S n = n ( n + 1) 2. Here n = 10. ⇒ S = 10 ( 10 + 1) 2 ⇒ S = 10 × 11 2 ⇒ S = 5 × 11 ⇒ S = 55. Hence, the sum of the first 10 natural numbers is 55

The relationship between record types can be depicted graphically with a(n) _________.
a. d ata archive
b. executive dashboard
c. OLAP
d. ERD

Answers

d. A(n) ERD can graphically represent the relationship between different record kinds.

Is there a relationship between information that is saved in various record types?

A connection, as used in database terminology, is an affiliation between information that is kept in several record types.Relationships in a database system are defined by connecting common data that is recorded in the columns of entries in several tables.

What database tool works best for straightforward flat files with calculations?

Use Excel when your data is primarily numerical and you need a flat and nonrelational representation of it rather to a relational database with many tables.Your data should be subjected to frequent calculations and statistical comparisons.

To know more about ERD visit:

https://brainly.com/question/28096568

#SPJ4

the networks layer of the bull’s-eye is the outermost ring of the bull’s eye. T/F

Answers

The statement "the networks layer of the bull’s-eye is the outermost ring of the bull’s eye" is definitely true.

What is meant by Network layer?

The network layer may be defined as the part of the Internet communications process where these connections occur, by sending packets of data back and forth between different networks.

Examples of network layers may significantly include Physical (e.g. cable, RJ45) Data Link (e.g. MAC, switches) Network (e.g. IP, routers) Transport (e.g. TCP, UDP, port numbers)

The primary function of the network layer is to enable different networks to be interconnected. It does this by forwarding packets to network routers, which rely on algorithms to determine the best paths for the data to travel.

Therefore, the statement "the networks layer of the bull’s-eye is the outermost ring of the bull’s eye" is definitely true.

To learn more about the Network layer, refer to the link:

https://brainly.com/question/14657014

#SPJ1

a hardware component that has its jumper pins set incorrectly is an example of a hardware ____.

Answers

A hardware component that has its jumper pins set incorrectly is an example of a hardware conflict.

A hardware conflict occurs when two or more hardware components are competing for the same resources, such as an interrupt request (IRQ) or memory address, or when a hardware component is improperly configured. Hardware conflicts can cause a variety of issues, including system instability, performance problems, and hardware failure. Some common symptoms of a hardware conflict include system crashes, blue screen errors, and devices not functioning properly.

To resolve a hardware conflict, you may need to reconfigure the jumper settings on the affected hardware component or change the IRQ or memory address assignment in the system's BIOS settings. You may also need to update the device drivers or replace the conflicting hardware component.

if you added a row that should not be in a table, use a remove command to remove it.

Answers

The correct answer is  rm command use a remove command to remove it.

To delete files you no longer require, use the rm command. The rm command eliminates entries for a particular file, group of files, or picky set of files from a directory list. When you use the rm command, user confirmation, read permission, and write permission are not necessary before a file is deleted. Use the REMOVE command to get rid of any rows that you created that are not supposed to be in the table. Columns that cannot have null values are indicated by the NOT NULL clause in a CREATE TABLE statement in SQL. The MySQL shutdown shortcut command is q. For a database, the CREATE DATABASE command is only used once.

To learn more about rm command click the link below:

brainly.com/question/29038897

#SPJ4

audio conferencing is a software-based, real-time audio conference solution for ________ callers.

Answers

Audio conferencing is a software-based, real-time audio conference solution for VoIP callers.

In audioconference, participants from various locations interact in real time using the phone or other devices. There could be as few as 3 people or as many as 100 or more. A synchronous tool is audio conferencing. A basic speakerphone or hands-free audio equipment with sensitive microphones and advanced echo-cancellation software can be used to conduct an audioconference.

By using the voice over Internet protocol (VoIP) technology, you can place voice calls through your broadband Internet connection as opposed to an analog phone line. With some VoIP services, you may be limited to calling just other subscribers, while with others, you may be able to contact any phone number, including local, long distance, mobile, and international ones.

Learn more about software here:

brainly.com/question/1022352

#SPJ4

all primary key entries are unique, and no part of a primary key may be ____.

Answers

Every primary key entry is distinct, and a primary key cannot include any null values. If the foreign key is not a component of the primary key for the table it belongs to, it may contain a null entry.

A primary key is it specific to each record?

Only one primary key is permitted for each database table. In a relational database table, it identifies a record in a certain way. A primary key's value cannot be removed from the tree structure or the parent table.

If there is no primary key, what happens?

Things can quickly become quite messed up without primary keys. I like to argue that without a primary key, all you have is trash instead of data. If none is created in MySQL.

To know more about primary key visit :-

https://brainly.com/question/10167757

#SPJ4

china's high-speed rail network calls for a minimum turn radius of 7.0 km for 350-km/h trains.

Answers

A train traveling at 350 km/h has an acceleration of 0.07g during a 7.0 km turn radius.

Describe acceleration.

The pace at which a speed changes over time is called acceleration. It is known as the rate of change in the velocity of an object with respect to time in physics.

Accelerate—does that mean speed?

An item alters its speed, direction, or both as it accelerates. How are accelerating and decelerating described? Most likely, you picture something racing up when you think about acceleration. But a moving thing accelerates as it slows down.

To learn more about acceleration

brainly.com/question/14344386

#SPJ4

attribute The total quiz points for a student for an entire semester is a(n) A) addressed B derived stored mixed

Answers

attribute The total quiz points for a student for an entire semester is a derived stored mixed of data.

What exactly do you mean by data?

Data in computing refers to information that has been transformed into a format that is effective for transmission or processing. Data is information that has been transformed into binary digital form for use with modern computers and transmission mediums. Data may be used as a solo or plural topic. In the quest of knowledge, data is a collection of discrete values that communicate information, describing amount, quality, fact, statistics, other fundamental units of meaning, or just sequences of symbols that may be further understood. A datum is a unique value included within a group of data.

To know more about data visit:

brainly.com/question/13650923

#SPJ4

The most common type of database used on PCs today is a(n) ____.
a. relational database c. one-dimensional database
b. two-way database d. concurrent database

Answers

"The most common type of database used on PCs today is";

a. Relational database

A relational database is a type of database that stores data in the form of tables, with each table consisting of a set of rows and columns. The rows represent individual records, while the columns represent the fields or attributes of the records. Relational databases use a technique called normalization to minimize data redundancy and improve data integrity.

The most popular relational database management system (RDBMS) for personal computers is Microsoft SQL Server, Oracle Database, MySQL and PostgreSQL. These RDBMSs are widely used in small to large-scale businesses, and are also popular for web development, because of its scalability, reliability, and ease of use.

Additionally, relational databases are considered as the most common type of databases used on PCs today because they allow for easy querying and manipulation of data, and they are compatible with a wide range of programming languages and frameworks. They also support advanced features such as indexing, transactions, and data constraints, which make them a versatile tool for data management and analysis.

To find more about relational databases, click on the below link:

brainly.com/question/13262352

#SPJ4

a dvd-rom uses all of the following to achieve a higher storage capacity than a cd-rom except

Answers

A DVD-ROM uses all of the following to get a higher storage capacity than a CD-ROM except A: "making the disc single-session".

DVD-ROM (Digital Versatile Disk-Read Only Memory) is a read-only DVD which is used to store the files permanently. The stored files in a DVD-ROM cannot be changed, erased, or write-over. A DVD-ROM can be used for allotment of applications requiring a higher storage capacity because DVD-ROM increases the size of a CD-ROM disc.

To achiever a higher storage capacity in compariosn to CD-ROM, a DVD-ROM makes the disc more dense by packing the pits closer together, uses two layers of pits, and be double-sided.

"

Complete question

a dvd-rom uses all of the following to achieve a higher storage capacity than a cd-rom except

A. making the disc single-session

B. make the disc more dense by packing the pits closer together

C. use two layers of pits

D. be double-sided

"

You can learn more about DVD-ROM at

https://brainly.com/question/29340792

#SPJ4

a relational table must not contain ____________________ groups.

Answers

refers to the level of information that the values stored in a table's row attempt to portray. A relational table cannot have groups in it.

How do you use the word portray?

The attorney painted his client as a victim of maltreatment as a child. He presented himself as being the victim. The queen is depicted in the picture wearing a purple robe. Hamlet was superbly performed by Laurence Olivier. McCarten and Lemmons take care to avoid giving Houston a victim-blaming stereotype. In fact, it's been said that Jason Momoa might take on the role of Lobo going forward rather than Aquaman. However, the characters accurately capture Chicano life in Los Angeles.

Know more about  relational Visit:

https://brainly.com/question/15395662

#SPJ4

in the expressions b = 8 and c = --b, what value will be assigned to the variable c?
Select one:
a.8
b.7
c.9
d.10

Answers

The variable c will be given the value 9 in the equations b = 8 and c = —b.

What exactly do Java expressions and assignment statements do?

When you wish to give an expression a value, you utilize the Java Assignment Operators. The lone equal sign = stands for the assignment operator. Any expression may appear on the right side of a Java assignment statement, but the left side must contain a variable name.

Which of the following methods is appropriate for updating a variable?

An increment updates a variable by adding 1; a decrement updates a variable by removing 1. It's also common for programmers to refer to incrementing a variable by 1 as "bumping" it.

To know more about variable visit:-

https://brainly.com/question/14152824

#SPJ4

You have decided to create a template that you will use for all of the presentations you make in class as a college student. Describe at least three features of your template.

Answers

The three features of a template specify the details that go into creating a feature, such as the default building tool, the chosen attributes, and the storage guidelines.

What are templates?

A template is a shape, mold, or design that is used as a blueprint for creating something. Here are a few illustrations of templates:

Designing a website Producing a documentSweater knitting

Although a template's definition in the dictionary is rather simple, templates have a variety of applications.

They might be tangible objects, like paper templates for cutting out fabric pieces, or they can be digital files that can be opened in design software like Photoshop.

Therefore, the qualities that go into constructing a feature, the default construction tool, the recommended attributes, and the storage guidelines are all specified in the three features of a template.

To learn more about templates, refer to the link:

https://brainly.com/question/13566912

#SPJ1

Which of the following types of auditing requires access to source code?
Question options:
1. Use Case Testing
2. Code Review
In order for a subject to be _____, the system must first ____ the subject and then record the subject's actions.
Question options:
1. accountable, identify
2. accountable, authorize

Answers

The correct options are 2 for both the cases i.e., Code Review is the type of auditing requires access to source code and in the second question, for subject to be accountable the system must first be authorized.

What is a system in computer terms?

A computer system is made up of carefully chosen hardware components that work well with the software components or programs that operate on the computer. The main element of software is the operating system, which oversees and provides services for other computer programs.

What function does system software serve?

The computer itself is managed by system software. It functions in the background to maintain the computer's core functions so that users can access higher-level application software to perform particular tasks. In essence, system software provides a framework for using application software.

To know more about system visit-

brainly.com/question/14583494

#SPJ4

all queries have only one intent: know, do, website, or visit-in-person intent. True/False

Answers

It is not necessarily true that all queries have only one intent. It is possible for a query to have multiple intents, or for the intent of a query to be unclear or ambiguous. For example, a query like "What is the weather like today?" could have a "know" intent (to find out the current weather) or a "do" intent (to decide whether to go outside or not). Similarly, a query like "Where is the nearest coffee shop?" could have a "website" intent (to find a website with information about nearby coffee shops) or a "visit-in-person" intent (to actually go to a coffee shop).

It is important to consider the context and the full range of possible intents when interpreting a query. In some cases, it may be helpful to ask the person who made the query for more information or clarification in order to better understand their intent.

access control on a wireless router refers to ________________________.

Answers

Access control on a wireless router refers to the security measures put in place to regulate who can connect to and use the router's network. These measures include setting up a password for the network, using encryption to protect data transmitted over the network, and setting up MAC address filtering to only allow specific devices to connect.

Access control also includes creating a guest network that separates the guest traffic from the rest of the network, and isolating the guest network to prevent them from accessing the sensitive data of the network. Overall, access control on a wireless router is important to ensure that only authorized users can access the network and protect the network from potential security threats.

Learn more about wireless router, here https://brainly.com/question/30079964

#SPJ4

Other Questions
you dont need to show your work i just need and answer ASAP Question 1As a Windows Administrator for a large company, you are asked to grant temporary software installation permissions to the Sales department. Which of the following would be the most efficient method for accomplishing this task? ________ refers to the "bouncing" mode of sand transport in a windstorm or stream. A) Saltation B) Ventifaction C) Siltation D) Deflation A(n) ____ filename is the name that differentiates a file from other files in the same directory.absoluterelativeshort-formdirectory The crowd goes wild.What type is the sentence above? A. imperative sentence B. simple sentence C. compound sentence D. complex sentence Is homework beneficial or not supporting evidence? Scenario: You are finishing high school and have a decision to make about your future-whether or not you should goto college or go to work. Using the ideas of opportunity cost, explain the costs associated with each decision.Costs associated with going to college: A certain species of plant serves as the only food for the young larvae of a particular species of butterfly. In a large field, a disease kills all the members of this plant species. As a result of the plant disease, the butterfly population will most likely. Give steps to simplify in the correct order What happened after Kublai Khan conquered the Song Dynasty?He didn't conquer the Song Dynasty.He ruled all of China and founded the Yuan Dynasty.He worked with his cousins to unite the Khanates.He combined the Chinese Empire with Japan. 29. After a reflection in the y-axis, the quadratic function listed below would have which of thefollowing formulas?f (x) = 2x - 8x +3A. y=-2a + 8x - 3B. y=-2x8x+3C. y = 2x + 8x +3D. y=2x +8x-3 What is an example of traditional mindset for Lean Portfolio Management?a. Rolling-wave planningb. Demand managementc. Centralized annual planningd. Lean budgeting which of the following is most likely to be a first-line management title in a large company?a. Directorb. Supervisorc. Presidentd. Chief Executive Officer Read the following paragraph (adapted from the first paragraph of Emily Bronte's Wuthering Heights):I have just returned from a visit to my landlord. He is my solitary neighbor. This is certainly a beautiful country! Mr. Heathcliff little imagined how my heart warmed towards him.Identify the four simple subjects, four predicate verbs, and two predicate nominatives in the four sentences. Which statement describes the coffee of the state of Lara?El menos delicioso.El ms delicioso.El ms barato.El ms caro. Did Joseph forgive his brothers? Select the verb that is in the future perfect tense. 1. Under what circumstances would the production possibility curve be (a) a straight line; (b) convex towards the origin? Are these circumstances ever likely? 2. Which of the following are macroeconomic issues, which are microeconomic ones and why? a. Low wages in certain service industries. b. The rate of exchange between the pound and the euro. c. Why the price of cabbages fluctuates more than that of cars. d. The rate of economic growth this year compared with last year. e. The decline of traditional manufacturing industries 3. The United States is considered a rich country because Americans can choose from an abundance of goods and services. How can there be scarcity in a land of abundance? 4. Discuss the opportunity costs you incur by attending Madda Walabu University for four years. 5. What are assumptions in Economics? Why do economists make assumptions? How did the European Explorers morality and desire for wealth affect how they interacted with indigenous people Write an algorithm to find the sum of first ten natural numbers.