An aviation tracking system maintains flight records for equipment and personnel. The system is a critical command and control system that must maintain a global availability rate of 99%. The entire system is on a cloud platform that guarantees a failover to multiple zones within a region. In addition to the multi-zonal cloud failover, what other solution would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable?

Answers

Answer 1

Answer:

offline backup solution

Explanation:

In such a scenario, the best option would be an offline backup solution. This is basically a local and offline server that holds all of the flight record data that the cloud platform has. This offline backup server would be updated frequently so that the data is always up to date. These servers would be owned by the aviation company and would be a secondary solution for the company in case that the cloud platform fails or the company cannot connect to the cloud service for whatever reason. Being offline allows the company to access the database regardless of internet connectivity.


Related Questions

the user cannot use a computer system without.................... software

Answers

Answer:

the user cannot use a computer system without hardware and software

Answer:

the user cannot use a computer system without.........hardware.....and...... software

Just as SQL is the query language for relational databases, _________ is the query language for Mongo databases.

Answers

Answer:

MongoDB Query Language (MQL)

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

A relational database can be defined as a type of database that is structured in a manner that there exists a relationship between its elements.

A structured query language (SQL) can be defined as a domain-specific language designed and developed for managing the various data saved in a relational or structured database.

Just as structured query language (SQL) is the query language for relational databases, MongoDB Query Language (MQL) is the query language for Mongo databases.

Some of the basic operations used in MongoDB are create, index, update, delete, and find record.

There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____

Answers

Answer:

That would be Bluetooth

Explanation:

As Bluetooth is the most widely used network. It is used to operate many things, such as:

Headphones

Speakers

Remotes

etc.

Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the control plan called: cumulative sequence check batch sequence check suspense file of missing numbers computer agreement of batch totals

Answers

Answer:

batch sequence check.

Explanation:

A batch sequence check can be defined as a strategic and systematic control plan which typically involves the process of inputting a range of numbers comprising a batch and then inputting each serially numbered document.

The steps for checking an event data within a batch using a batch sequence check include the following;

I. You'll enter a range of serial numbers of the document in a batch.

II. You'll enter each serially pre-numbered document one after the other.

III. The input documents are sorted by a computer into a serial (numerical) order, match the sequence number range against the input documents, and then reports any part of the document that is missing, a duplicate and out of range.

what can be the maximum possible length of an identifier 3163 79 can be of any length​

Answers

Answer:

79 characters

Explanation:

The programming language is not stated, but a little search online shows the question is about python programming language

Literally, identifiers are the names given to variables, arrays and functions.

In most programming languages (e.g. python), identifiers are case-sensitive.

i.e. Abc is a different identifier when compared to abc.

Having said that, python allows up to 79 characters to name an identifier.

Meaning that, the length of a variable name (or array, or function, etc.) can be up to 79 characters, and it cannot exceed 79 characters.

Cuá es la relación entre la tecnología  y la vida?

Answers

Answer:

La innovación tecnológica ha permitido que la humanidad avanzara sobre la base de disponer de unas prótesis más potentes en el divagar por la tierra

Explanation:

Hola! Dicho esto en el mundo en que vivimos hoy en día hemos podido con la tecnología inventar cosas que nos ayudan con nuestras vidas cotidianas como son los medios de comunicación, transporte, entre otros. Y para terminar de contestar la pregunta como tal pues sería algo como:

"La relación entre la tecnología  y la vida es que la tecnología ayuda al ser humano en diferentes áreas tales como el transporte y la comunicación que hoy en día son un punto clave para poder vivir mejor."

¡Espero que te haya ayudado mucho!! ¡Bonito día!

The process where the programmer steps through each of the program's statements one by one is called

Answers

The process where the programmer steps through each of the program's statements one by one is called [tex]\sf\purple{hand \:tracing}[/tex].

[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]

Jeffery wants to identify the subject terms being used in APA PsychInfo for articles related to behavior modifications. What is the most efficient and effective search strategy to identify subject terms for a database search

Answers

Group of answer choices.

a. He can look for common related subject terms in a dictionary, thesaurus or encyclopedia.

b. He can look for relevant articles in the results list from a database search and scan the subject terms.

c. He can use Go-ogle Scholar to retrieve relevant articles and find common related subject terms.

Answer:

b. He can look for relevant articles in the results list from a database search and scan the subject terms.

Explanation:

A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.

The most efficient and effective search strategy to identify subject terms for a database search is to look for relevant articles in the results list from a database search and scan the subject terms.

In order to improve the speed of retrieval for a search engine, high frequency words such as if, or, and, at, to, etc., which are generally referred to as stop words are filtered out.

However, AND should be used to combine keywords and phrases when using a "subject search" option to search a database for relevant articles.

What best Describes algorithm bias

Answers

Answer:

E

Explanation:

cause e

A sponsored link was delivered 100 times, and 10 people clicked on it. Calculate the click-through rate.

Answers

Answer:

10%

Explanation:

100 / 10 = 10

c724 wgu True or false. A storage device consists of all the components that work together to process data into useful information

Answers

Answer:

False

Explanation:

A output device consists of all the components that work together to process data into useful information

The DuPage Freight Shipping Company charges the following rates: Weight of Package Rate per Pound 2 pounds or less $1.10 Over 2 pounds, but not more than 6 pounds $2.20 Over 6 pounds, but not more than 10 pounds $3.70 Over 10 pounds $3.80 Design a program that does the following: asks the user to enter the weight of a package and displays the shipping charges. 1. Prompt the user for the weight of a package 2. Determines the rate per pound in a getRate module 3. Calculates and displays the total shipping charge in a getTotal module Hint - you may want to use a global variable for this! Please submit three things:

Answers

Answer:

The program in Python is as follows:

def getRate(weight):

   if weight<=2.0:

       rate = 1.10

   elif weight>2 and weight<=6:

       rate = 2.20

   elif weight>6 and weight<=10:

       rate = 3.70

   else:

       rate = 3.80

   return rate

def getTotal(weight,rate):

   total = weight * rate

   print("Total: ",total)

weight = float(input("Weight: "))

rate = getRate(weight)

getTotal(weight,rate)

Explanation:

This defines the getRate function

def getRate(weight):

The following if conditions determine the corresponding rate based on the value of weight passed to the function

   if weight<=2.0:

       rate = 1.10

   elif weight>2 and weight<=6:

       rate = 2.20

   elif weight>6 and weight<=10:

       rate = 3.70

   else:

       rate = 3.80

This returns the rate back to the main method

   return rate

The getTotal module begins here

def getTotal(weight,rate):

This calculates the total charges

   total = weight * rate

This prints the calculated total

   print("Total: ",total)

The main begins here

This gets input for weight

weight = float(input("Weight: "))

This gets the rate from the getRate function

rate = getRate(weight)

This passes values to the getTotal function

getTotal(weight,rate)

In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs.

Answers

Answer:

The right response is "Robots ".

Explanation:

A robot seems to be an independent machine that can detect its surroundings, conduct simulations, as well as take action throughout the modern or actual environment.It is indeed a piece of computer-controlled equipment, which would also be utilized autonomously for carrying out duties or other hazardous tasks.

Artificial intelligence is a far more superior or complicated aspect of intelligence. They make use of patterns to find solutions to various problems.

Artificial intelligence machines are called robots. These tend to work and perform tasks that are much complex and length within short and simple steps. They can be sued to free the workers and help in any hazardous situation or events. Hence they serve the purpose of bots or robots.

Learn more about the context of applications of artificial intelligence (AI).

brainly.com/question/24259157.

HELPPPPP !!!!!!!!!!!

Answers

Answer:

Computers are developed along two separate engineering paths, producing two different types of computers.

An analog computer operates on continuosly varying data.

A digital computer operates on descrete data.

Data sorting refers to the arrangement of the data records in the ascending or descending order on the basis of numeric of alphabetic fields.

Answer:

hope this will help you friend.

explain the importance of using onedrive in windows 10, and how knowledge of it will have an impact on today's workplace

Answers

Answer:

The importance of using Onedrive it helps save stuff if you have no more room on your computer it helps with schooling and works for jobs you have Microsoft Teams, Onedrive, Outlook, Office 365. It gives all sorts of things that you can use for anything contacts on Outlook and Teams.

IN C++ PLEASE!!!! Define a function FilterStr() that takes a string parameter and returns "Good" if the character at index 4 in the string parameter is uppercase. Otherwise, the function returns "Bad".

Ex: FilterStr("sandwich") returns

Bad

Recall isupper() checks if the character passed is uppercase. Ex: isupper('A') returns a non-zero value. isupper('a') returns 0.

string's at() returns a character at the specified position in the string. Ex: myString.at(3)
)
#include
#include
#include
using namespace std;

/* Your code goes here */

int main() {
string input;
string output;

getline(cin, input);
output = FilterStr(input);
cout << output << endl;

return 0;
}

Answers

Answer:

Replace /*Your code goes here */ with

string FilterStr(string str){

   string retStr= "BAD";

   if(isupper(str.at(4)) != 0){

     retStr = "GOOD";

   }

   return retStr;

}

Explanation:

This defines the function

string FilterStr(string str){

This initializes the return string to BAD

   string retStr= "BAD";

This checks if the string at index 4 is uppercase;

   if(isupper(str.at(4)) != 0){

If yes the return string is updated to GOOD

     retStr = "GOOD";

   }

This returns the return string

   return retStr;

}

See attachment for complete program

how can i get better at typing because i suck

Answers

Answer:

Keep typing until you get used to it ●___●

I tried this technique
I look at the keyboard to type a random word like multiple times and then I would try it without looking. If I did it I go on
Hope this helped *smiles*

what is storage unit in computer and five examples of storage units.

Answers

Answer:

the storage unit of a computer is known as the term which is used to indicate storage capacity.

Explanation:

Five units of storage units are:-

1) byte

2) kilobyte

3) megabyte

4) gigabyte

5) terabyte

Which type of attack cripples the network and prevents legitimate users from accessing network resources

Answers

Answer:

A Distributed Denial of Service (DDoS) attack is a non-intrusive internet attack made to take down the targeted website or slow it down by flooding the network, server or application with fake traffic. When against a vulnerable resource-intensive endpoint, even a tiny amount of traffic is enough for the attack to succeed.

Distributed Denial of Service (DDoS) attacks are threats that website owners must familiarize themselves with as they are a critical piece of the security landscape. Navigating the various types of DDoS attacks can be challenging and time consuming. To help you understand what a DDoS attack is and how to prevent it, we have written the following guidelines.

1

What is a DDoS attack?

1.1 – Understanding a DDoS Attack

The objective of a DDoS attack is to prevent legitimate users from accessing your website. For a DDoS attack to be successful, the attacker needs to send more requests than the victim server can handle. Another way successful attacks occur is when the attacker sends bogus requests.

1.2 – What is the Goal Behind a DDoS Attack?

The main goal of an attacker that is leveraging a Denial of Service (DoS) attack method is to disrupt a website availability:

The website can become slow to respond to legitimate requests.

The website can be disabled entirely, making it impossible for legitimate users to access it.

Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?

Answers

Answer:

Access Quick Access commands using the More button.

Explanation:

To ensure that a command she frequently uses is added to the Quick Access toolbar Robyn would need to "Access Quick Access commands using the More button."

To do this, Robyn would take the following steps:

1. Go / Click the "Customize the Quick Access Toolbar."

2. Then, from the available options, he would click on "More Commands."

3. From the "More Commands" list, click on "Commands Not in the Ribbon."

4. Check the desired command in the list, and then click the "Add" button.

5. In the case "Commands Not in the Ribbon" list, did not work out Robyn should select the "All commands."

Draw a flow chart except the principle, time and date from the user. and display the simple interest and amount as output.​

Answers

Answer:

See attachment for flowchart

Explanation:

The explanation is as follows

1. Start

2. Get input for principal, time and rate

3. Calculate Interest using Interest = Principal * Rate * Time/100

4. Print Interest

5. Stop

1.printer is an example of......... device.

Answers

Printer is an example of output devise.It gives hard copy output on paper .

1. Printer is an example of output device.

I hope it's help you...

1. digital ink pen
a miniature electronic circuit or device that electricity flows through. The circuit is made of silicon. It may also be called a chip
2. Electronic Paper Display
a pocket-sized card that can store data and process information
3. integrated circuit
an automatic identification device that lets you store and retrieve information
4. radio transceiver
a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor
5. RFID
display or sign with the ability to update the information electronically
6. smart card
an electronic device that uses an antenna to read and send information by way of a radio signal

Answers

Answer:

1. Integrated circuit.

2. Smart card.

3. RFID.

4. Digital ink pen.

5. Electronic Paper Display.

6. Radio transceiver

Explanation:

1. Integrated circuit: a miniature electronic circuit or device that electricity flows through. An integrated circuit (IC) is typically of a semiconductor element such as silicon. Also, it may be referred to as a chip.

2. Smart card: a pocket-sized card that can store data and process information. It's usually used in cable television decoder, transportation terminals, e-commerce services, etc.

3. RFID: an automatic identification device that lets you store and retrieve information. RFID is an acronym for radio frequency identification.

4. Digital ink pen: a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor.

5. Electronic Paper Display: display or sign with the ability to update the information electronically.

6. Radio transceiver: an electronic device that uses an antenna to read and send information by way of a radio signal in the field of telecommunications.

what is the use of a piano​

Answers

To produce music using the keys provided with the instrument?
It sharpens fine motor skills, improves dexterity and hand-eye coordination. Music has also been shown to reduce heart and respiratory rates, cardiac complications, and to lower blood pressure and increase immune response. Playing the piano also makes your hands and arm muscles much stronger than the average person.

An item that contains both data and the procedures that read and manipulate it is called a(n) ________.

Answers

Answer:

Object

Explanation:

An item that contains both data and the procedures that read and manipulate it is called an object.

how do you create a formula in excel​

Answers

Answer:

You can create a simple formula to add, subtract, multiply or divide values in your worksheet. Simple formulas always start with an equal sign (=), followed by constants that are numeric values and calculation operators such as plus (+), minus (-), asterisk(*), or forward slash (/) signs.

Let's take an example of a simple formula.

On the worksheet, click the cell in which you want to enter the formula.

Type the = (equal sign) followed by the constants and operators (up to 8192 characters) that you want to use in the calculation.

For our example, type =1+1.

Notes:

Instead of typing the constants into your formula, you can select the cells that contain the values that you want to use and enter the operators in between selecting cells.

Following the standard order of mathematical operations, multiplication and division is performed before addition and subtraction.

Press Enter (Windows) or Return (Mac).

Let's take another variation of a simple formula. Type =5+2*3 in another cell and press Enter or Return. Excel multiplies the last two numbers and adds the first number to the result.

Use AutoSum

You can use AutoSum to quickly sum a column or row or numbers. Select a cell next to the numbers you want to sum, click AutoSum on the Home tab, press Enter (Windows) or Return (Mac), and that's it!

AutoSum on the Home tab

When you click AutoSum, Excel automatically enters a formula (that uses the SUM function) to sum the numbers.

Note: You can also type ALT+= (Windows) or ALT+ COMMAND += (Mac) into a cell, and Excel automatically inserts the SUM function.

Explanation:

HOPE IT HELPS

Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the __________ host.

Answers

The good answer is: Sacrificial

Write a letter of application to your school as a chemistry teacher​

Answers

Answer:

Dear Mr./Mrs (Employer's name), I am writing this in response to the ad, which you have listed in the newspaper (mention the name here) for the post of a chemistry teacher. I believe my extensive knowledge and writing skills make me an excellent candidate for the post.

A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used

Answers

Question options:

State Machine

Flowchart

Sequence

Global Exception Handler

Answer:

Sequence

Explanation:

Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.

Why is data processing done in computer?​

Answers

Answer:

The Data processing concept consists of the collection and handling of data in an appropriate and usable form. Data manipulation is the automated processing in a predetermined operating sequence. Today, the processing is done automatically using computers and results are faster and more accurate.

Explanation:

Data is obtained from sources such as data lakes and data storage facilities. The data collected must be high quality and reliable.By using a CRM, such as Salesforce and Redshift, a data warehouse, the data collected are translated into mask language.The data are processed for interpretation. Machine learning algorithms are used for processing. Their procedure varies according to the processed data (connected equipment, social networks, data lakes).These data are very helpful to non-data scientists. The information is transformed into videos, graphs, images, and plain text. Company members may begin to analyze and apply this information to their projects.The final stage of processing is the use of storage in future. Effective data storage to comply with GDPR is necessary (data protection legislation).
Other Questions
Nasreen considers herself a fashionista and would like to be perceived as more fashion oriented than her friends and family. However, her family and friends feel she dresses just like them. In this case, the perception of Nasreen's friends and family contradicts Nasreen's _______. Which paragraph from the article BEST supports the claim that teachers in Philadelphia are sticking to legal requirements byprotecting immigrant students?(A)Responding to pleas from teachers, advocates and students, the Philadelphia School District this year is implementing mandatory training in keeping the system's tens of thousands of immigrant children safe and supported in the current political climate.(B) Every school-based employee, from principal to cafeteria worker, is to receive instruction in everything from what information to release if immigration agents arrive at a school (none) to how to communicate with parents who speak another language.(C) Most important, ESL teacher Meg Flisek told her colleagues, students are entitled to an educationregardless of immigration status, and federal law prohibits school staff from disclosing any studentinformation, even to U.S. Immigration and Customs Enforcement agents.(D) To officials' knowledge, no ICE agents have ever demanded information of any city schools, But federal agents made inquiries about a student at a New York school this year, and that indicates the kind of climate that worries families, teachers said Monday. To which ethical framework does the following argument MOST CLOSELY apply? The action done by Mr. and Mrs. Nimitz, was done out of love, faith, and the close relationship they shared and the fact that neither wanted to continue without the other. This action was morally correct because it was done out of love and faith because of the close nature of these two people's relationship.a) NATURAL LAWb) CARE/FEMINISTc) UTILITARIANISMd) DIVINE COMMAND Apply the distributive property to create an equivalent expression.4(x - 2 + y) =4(x2+y)=4, left parenthesis, x, minus, 2, plus, y, right parenthesis, equals Read the paragraph from the Inaugural Address.And yet our distress comes from no failure ofsubstance. We are stricken by no plague of locusts.Compared with the perils which our forefathersconquered, because they believed and were notafraid, we have still much to be thankful for Naturestill offers her bounty and human efforts havemultiplied it. Plenty is at our doorstep, but agenerous use of it languishes in the very sight of thesupplyHow does the paragraph add to the development ofthe speech? Select two options.A. It encourages the use of the countrys natural resources.B. It introduces an ongoing comparison to years past.C. It shifts the tone of the address from grim to hopeful.D. It explains the abundance of financial resources.E. It reiterates the poor state of the nations economy. please help! and thank you, if you do! :) a bag contain 3 black balls and 2 white balls. 1. A ball is taken from the black and then replaced, a second is taken. what is the probabilities that.(a) there are both black, (b)one is black one is white, (c) at lease one is black, (d) at most one is one is black. 2. find out if all the balls are chosen without replacement.please kindly solve with explanation. thank you. 9.Find the area of the shaded region.66The exact area is A =square units. An expansion/ boom can be stabilized/fixed by following expansionary fiscal policy. Expansionary monetary policy used to fix stagflation can worsen the problem of inflation. Recession caused by a negative demand shock is fixed by an expansionary monetary policy. A boom can be stabilized/fixed by following contractionary monetary policy. Tango Company is planning to acquire Delta Company. The additional pre-tax income from the acquisition will be $300,000 in the first year, but it will increase by 2% in future years. Because of diversification, the beta of Tango will decrease from 1.2 to 0.8. Currently the return on the market is 9% and the riskless rate is 4%. What is the maximum price that Tango should pay for Delta A box contains 5 orange pencils, 8 yellow pencils, and 4 green pencils.Two pencils are selected, one at a time, with replacement.Find the probability that the first pencil is green and the second pencil is yellow.Express your answer as a decimal, rounded to the nearest hundredth. Mark and John share the cost of a birthday gift. The cost of the gift is $20.48. Mark pays for 2/3 of the gift and John pays for the remaining 1/3. How much did each boy pay? You often get phone calls,______? question tag Calculate the distance travelled by the car in part Q use the equation distance travelled= average speed x time I need help of rewriting these passive sentences to active. The negotiations were thought by the workers to be unfair because they included five management representatives but only one union representative. 1.Sa lugar na ito naganap ang matinding labanan sa kanluran at nagkamit ng unang pagkatalo ang Germany sa digmaan.a.Dunkirkb.Baltic Portc.Marned.Balkan2.Anong bansa ang nakatanggap ng pinakamaraming kabayaran dahil sa sinabing siya ang nagpasimula ng digmaan?a.United States b.Russiac.Germanyd.France3.Alin sa mga sumusunod ang HINDI kabilang sa Axis Powers?a.Russiab.Germanyc.Japand.Italy4.Sino ang pinuno ng Nazi na namuno sa Germany noong Ikalawang Digmaan Pandaigdig?a.Harry Trumanb.Benito Mussolinic.Adolf Hitlerd.Winston Churchill5.Isang lugar sa Czechoslovakia na hinikayat ni Hitler na magkaroon ng awtonomiya dahil tirahan ng maraming Aleman. a.Sudetenb.Austriac.Ethiopiad.Manchuria6.Ang ginamit na paraan para mapasuko ang Japan, ng puwersang Alyado sa Hiroshima.a.Raidersb.Bomba Atomikac.Submarined.Poison Gas7.Ang isang tagumpay ng mga Alyado sa Pasipiko ay naganap sa _____ Oktubre 23- 26 ,1943.a.Battle of the Bulgeb.Battle of the Coral Seac.Battle of the Normandyd.Second Battle of the Philippine Sea8.Isang bagong daigdig ang sumibol paglipas ng Ikalawang Digmaang Pandaigdig. Alin ng hindi kabilang sa mga pangyayari pagkatapos ng digmaan?a.Naitatag ang United Nationsb.Nagkaroon ng World War IIIc.Nagkaroon ng labanan ng ideolohiyad.Nawala ang Nazismo at Pasismo9.Isang Heneral nag wika na I have Returned a.Adm. Doenitzb.Hen. Douglas MacArthurc.Hen Dwight Eisenhowerd.Hen. Montgomery10.Ang paghulog ng bomba atomika sa Nagasaki ay naganap noon?a.Agosto 9, 1945b.Agosto 15, 1945c.Setyembre 2, 1945d.Disyembre 7, 194111.Saan lugar dumaong si Hen. Douglas MacArtur noong Oktubre 1944 ?a.Leyteb.Manilac.Palawand.Quezon12.Ang unang bomba atomika ay ibinagsak ng United States sa Lungsod ng________.a.Tokyob.Hiroshimac.Hokkaidod.Nagasaki13.Ang hindi inaasang pagsalakay sa lugar na ito ay tinawag na Araw ng Kataksilana.Pearl Harborb.Nagasaki c.Hiroshima d.Oklahoma14.Ang labanan sa Dunkirk ay nagpamalas ng kabayanihan ng mga Ingles ay naganap sa ____.a.Himpapawidb.Lupac.Disyertod.Dagat15.Ang pangalan ng barko kung san lumagda ang Japan sa isang walang pasubaling pagsuko.a.Royal Bayb.Lusitaniac.USS Missourid.Atlantic30. Ano ang tawag sa taktikang pandigma na ginamit ng Nazi?a.Luftwaffeb.Biological Warfarec.Trench Warfared.Blitzkrieg Creeds and schools in abeyance,Retiring back a while sufficed at what they are, but never forgotten,I harbor for good or bad, I permit to speak at every hazard,Nature without check with original energyQuestionThe last stanza of section 1 begins with the words "Creeds and schools in abeyance." This indicates that the speakerSelect one:a.is setting aside prior learning to express what is natural.b.wants to explore the ideas he or she learned in school.c.was a poor student and remembers nothing from school.d.regrets that he or she no longer believes in God. What would juliet or romeo write in her or his diary? Find the intersection point between the lines of equations:2x-y+6=0 and 2x+3y-6=0 Help me please I need help 6 The _____ characteristic of a sophisticated intelligent agent demonstrates its ability to interact with users in a more natural language.