a(n) ____ is an ordered arrangement of keys and pointers.

Answers

Answer 1

A Indexes in Relational Model is an ordered arrangement of keys and pointers.

The index key serves as the index's reference point. An index, in more formal terms, is an ordered arrangement of keys and pointers. Each key points to the location of the data that the key identifies. Indexes are used for a variety of purposes in relational databases. A table is thought to be a two-dimensional structure made up of rows and columns. Each table row (tuple) represents a single occurrence of an entity within the entity set. A small table with two columns is used for indexing. 1)Primary Indexing is one of two types of indexing methods. Secondary indexing The Primary Index is a fixed-length, ordered file with two fields. The primary indexing is further classified into two types. 1) Index of Density 2)The Index is sparse.

Learn more about index here-

https://brainly.com/question/14297987

#SPJ4


Related Questions

MS-Word 2016 is the latest version of WORD software. True or False
It's urgent ​

Answers

Answer:

true

Explanation:

Answer: This is True!

I hope you have a nice day

Less congested lanes on an expressway mean there is more room and correct will be followed. a) Space cushions b) Speed limits Passing rules d) None of the above

Answers

Less congested lanes on an expressway mean there is more room and correct will be followed option D: None of the above.

What is the Less congested lanes about?

An exclusive traffic lane designated for the use of cars with a driver and one or more passengers, such as carpools, vanpools, as well as transit buses, is referred to as a high-occupancy vehicle lane. These limitations can be in effect always or just during periods of high travel demand.

Therefore, HOV lanes are utilized for a variety of vehicles with several occupants and are typically less congested than other expressway lanes.

Learn more about expressway from

https://brainly.com/question/27999101
#SPJ1

you are installing an updated driver for a hardware device on your system. a dialog box pops up, indicating that microsoft has digitally signed the driver. what does a digitally signed driver indicate? (select two.)

Answers

A digitally signed driver indicates that Microsoft has verified the driver packages integrity and verified the vendor identity or the software publisher. This is to make sure that the driver isn't modified without permission from the developer.

Digitally signed driver

When you install a driver and a dialog box pops up telling that the driver is digitally signed, this is required in all drivers running on 64 bit versions of Windows. This method is to ensure that you load the original version of the driver without any illegal modification. The advantage is sure: to prevent any malicious software being installed and harm your data and your computer.

Learn more about Windows 10 https://brainly.com/question/15108765

#SPJ4

ipv6 addresses are written using which number system?

Answers

IPv6 addresses are 128 bits long and are represented as a string of hexadecimal digits. A single hexadecimal digit can represent every four bits, for a total of 32 hexadecimal values (016 [00002] through f16 [11112]).

IPv6 addresses are classified into three types: unicast, anycast, and multicast. Unicast addresses are used to identify a single interface. Anycast addresses identify a group of interfaces so that a packet sent to an anycast address is delivered to a member of the group. An IP address is typically written in decimal digits, separated by periods, and formatted as four 8-bit fields. Each 8-bit field corresponds to one byte of the IP address. The dotted-decimal format is a common way of representing the bytes of an IP address.

Learn more about hexadecimal here-

https://brainly.com/question/13041189

#SPJ4

In the 2017 equifax breach, what was the password used to access the portal used to manage credit disputes?.

Answers

Answer:

admin

Explanation:

Both userid and password were admin !!!

what are three ways that media access control is used in networking? (choose three.)

Answers

The three ways are, Ethernet makes use of CSMA/CD, Data placement is provided via media access control and The guidelines for access to various media are set forth in data link layer protocols.

Media access control in wired Ethernet networks is performed using CSMA/CD. CSMA/CA, a comparable technique, is used in IEEE 802.11 wireless networks. Data frames are positioned on the media according to media access control rules.

The family of LAN products protected by the IEEE 802.3 standard, also known as the CSMA/CD protocol, are referred to as Ethernet.

The controlled access method does not use contention-based access to networks; instead, it is deterministic. Collisions do not occur in controlled access networks like traditional Token Ring because each device has its own time to use the medium.

Multiple devices can access a shared media network using a manner enforced by media access control (MAC) protocols. Communication between computing devices had previously been point-to-point before LAN .

In other words, a dedicated channel was used to connect the two machines. LANs are shared media networks where each broadcast is received by all connected devices, who then have to decide which frames to accept. The network's cost was decreased through media sharing, but MAG procedures were also required to manage the medium's use.

To know more about Ethernet click on the link:

https://brainly.com/question/14622272

#SPJ4

What tools can you use to troubleshoot and validate windows updates?

Answers

PowerShell, Windows Update Troubleshooter and Windows Server Update Service are the tools you can to troubleshoot and validate windows updates.

With Windows 11, you control when and how to download the most recent updates to keep your computer safe and operating efficiently. You'll receive the most recent security updates and bug fixes when you update, which will help your device function properly and remain secure. Restarting your device usually completes the update. When you are aware that updates will be deployed, make sure your device is connected in.

When downloading and installing Windows updates, if you encounter an error code, the Update Troubleshooter can assist in fixing the issue. Go to Start > Settings > System > Troubleshoot > Additional troubleshooters.

To know more about windows click on the link:

https://brainly.com/question/13502522

#SPJ4

Possible pathways for acquiring information support and services training now include

Answers

Possible pathways for acquiring information support and services training now include option C. participation in a career and technical student organization (CTSO), such as the Technology Student Association (TSA).

Why is CTSO so important?

Students who participate in CTSOs gain: forming significant, potentially long-lasting corporate alliances. establishing a connection between classroom instruction and practical experiences.

Therefore, A career and technical student organization (CTSO) is an after-school club where students who are pursuing CTE pathways can participate in events, activities, and competitions to advance their knowledge and abilities.

Learn more about pathways from

https://brainly.com/question/13364864
#SPJ1

See full question below

Possible pathways for acquiring information support and services training now include

A. internships

B. part-time jobs

C. participation in a career and technical student organization (CTSO), such as the Technology Student Association (TSA)

D. all of the above

The best way to think about examinations and assessments is that: Question 8 options: they are a tool for others to judge you and your mistakes. they point out what you don't know. they are a learning tool for judging yourself. they point out your failures.

Answers

The best way to think about examinations and assessments is option C:  they are a learning tool for judging yourself.

How do learning tools work?

Learning Tools are a collection of open-source features that support all learners in reading, writing, math, as well as in communication across a variety of platforms.

Note that focusing on one topic for a long time and repeatedly saying words to help you remember them (known as massed practice) frequently going over one subject before switching to another (blocked practice)

Learn more about learning tool from

https://brainly.com/question/8461796
#SPJ1

which observation is true of the agile approach to software development?

Answers

Requirements and solutions are collaboratively developed using the agile methodology for software development.

A project can be managed by segmenting it into different phases using the agile methodology . Continuous improvement is required at every stage, as well as ongoing collaboration with stakeholders. Teams cycle through a process of planning, carrying out, and assessing their work after it has started. Continuous communication with team members and project stakeholders is essential. It requires working in iterations and ongoing collaboration to manage a project. Agile project management is based on the idea that a project may be continuously improved upon throughout its life cycle, with changes being made promptly and in response to the needs of the project.

Due to its adaptability, flexibility, and emphasis on client feedback, agile project management is among the most widely used methods.

Learn more about agile methodology here:

https://brainly.com/question/15320835

#SPJ4

12. What is the purpose of an outline?
(1 point)
A.to present the essay in a different way
B. to analyze the story's narration
C. to make it easier for publishers to develop a table of contents
D.to organize notes and make a plan for writing

Answers

I believe the answer is D.

a key element of systematic decomposition is that the number of entrances into a processing box is exactly and the number of exits out of a processing box is exactly

Answers

A key element of systematic decomposition is that the number of entrances into a processing box is exactly and the number of exits out of a processing box is exactly 1, 1.

What is Systematic Decomposition?

A decomposition term in computer programming is a method for breaking a program down into smaller, independent components. It typically implies a particular structure for the program text. Utilizing a decomposition paradigm typically aims to improve a program complexity measure, such as the program's modularity or maintainability.

Note that a technique to programming is systematic decomposition. The goal is to continuously reduce the task down into simpler tasks until each subtask can be simply represented in a few instructions, starting with a high-level model of the task, typically in a human language.

Therefore, when arranging a program into several sections, a decomposition paradigm is used in computer programming.

Learn more about decomposition from

https://brainly.com/question/27746877

#SPJ1

Crustal movements can be dangerous to humans what evidence from the text supports this
HELP ME ITS DUE ON THE 20TH!

Answers

Crustal movements can be dangerous to humans because of option A) Plate movement at transform boundaries can sometimes cause earthquakes, some quite large and devastating.

How is crustal movement formed?

Convection currents are created by the intense heat and pressure that exists within the earth. The tectonic plates that make up the earth's crust shift as a result of these currents.

In a constrained region where two plates move past one another at a transform plate boundary, sheared-up mountain ridges and valleys develop. And where a plate passes over a hotspot, a mountain range of volcanoes develops; as the volcanoes are moved away from the hotspot by the plate, they age and get lower.

Therefore, very active crustal motions, defined by subsidence and sedimentation in ocean trenches and uplift and erosion in island arcs, occur continuously for a very long time in subduction zones.

Learn more about Crustal movements from

https://brainly.com/question/20882623
#SPJ1

See full question below

Crustal movements can be dangerous to humans.

What evidence from the text supports this conclusion?

A. Plate movement at transform boundaries can sometimes cause earthquakes, some

quite large and devastating.

B. Plate movement at convergent boundaries can result in the formation of mountain

ranges like the Himalayas.

C. The spreading rate of some continents can reach 120 millimeters per year.

D. As solid as the earth may seem, there are always parts of its crust moving at

incredibly slow rates.

what security feature can be used on the pitt fitness access database?

Answers

The security feature that can be used on the pitt fitness access database is revoke a given user's right.

Depending on the use for which it was created, an Access database can hold thousands, hundreds of thousands, or even millions of records. A teacher may have dozens of records in the databases for their classes; a school district may have hundreds or thousands of records to collect and maintain; an organization like IBM will have tens of thousands, perhaps even millions, of records spread across multiple databases that contain information about its employees and other types of data; and a US government agency like the IRS will undoubtedly have database with millions of records.

It is challenging to maintain such vast amounts of data. It's not unexpected that the computer has come to the aid of those of us who want to manage data because it is difficult to keep even tiny amounts of data.

People have come up with the idea of organizing data into records to prevent a hodgepodge of data arranged randomly. Fields are found in records. The fundamental components of data, text and numbers, are entered into each field as entries.

To know more about database click on the link:

https://brainly.com/question/6447559

#SPJ4

say that registers $5 and $6 each contain an ascii character in the low order byte. can the beq instruction be used to compare the characters?

Answers

The machine language instruction known as BEQ (short for "Branch if EQual") branches or "jumps" to the location provided if and only if the zero flag is set.

When the values in the two source registers are equal, beq (branch if equal) branches. When they are not equal, bne (branch if not equal) branches. If the contents of the first source register and the second source register are equal, the BEQ instruction branches the PC. The format is: BEQ branch value, $second source register's address, $first source register's address. If the contents in the two registers are not identical, the branch is taken; otherwise, execution moves on to the next instruction (sometimes called the fall through path).

Learn more about address here-

https://brainly.com/question/29065228

#SPJ4

what can we use to determine what policies will be applied for a given machine?

Answers

We can use a test domain to determine what policies will be applied for a given machine.

In testing the outcome and behavior of group policy configuration options, a test domain could be very useful ; it wouldn't be a good way to figure out the overall list of policies that would be applied, though.

Here's the complete question:

What can we use to determine what policies will be applied for a given machine?

a.gpupdate

b.control panel

c.a test domain

d.an RSOP report

Learn more on policies from:

https://brainly.com/question/28237831?referrer=searchResults

#SPJ4

You have data for Regions, Products, and Customers. Which option on a Pivot Table will you find in the Fields list?
a. Filters
b. Rows
c. Regions
d. Values

Answers

Option C is correct. Regions option on a Pivot Table will you find in the Fields list.

The four pivot table areas are located at the bottom of the PivotTable Field List pane: Report Filter, Column Labels, Row Labels, and Values. If you used a Recommended PivotTable layout, the fields from that layout will appear in those areas. It has four sections (Filters, Columns, Rows, and Values) where you can put different field names to make a PivotTable. The task pane also includes a checklist of fields from which to select data.

Fields and Areas make up the PivotTable Fields Task Pane. The Task Pane is displayed on the right side of the window by default, with Fields displayed above Areas. Fields are checkboxes that represent the columns in your data - range or Excel table.

Learn more about field here-

https://brainly.com/question/28002617

#SPJ4

When a scrum master encounters resistance from outside of the scrum team, what should the scrum master do?.

Answers

When a scrum master encounters resistance from outside of the scrum team, The thing that the master can do is Work in hand with other Scrum Masters to boast the effectiveness of the software of the Scrum in the said Organization.

How do you manage the resistance of a person in Scrum?

Avoiding escalation is the key to dealing with any resistance. Simply pointing out someone's error can result in dispute, which could put the project in jeopardy.

Note that It is your responsibility as a Scrum Master to justify why the team must operate in a specific manner and why their suggestion would not be successful.

Therefore, Having a one-on-one talk with the person is the greatest strategy to overcome this barrier. Don't compel them to defend their resistance to the team or their management in front of a group of people.

Learn more about scrum master from

https://brainly.com/question/4763588
#SPJ1

what are the shared characteristics of different agile methods of software development?

Answers

Agile development methodologies place a strict emphasis on delivering business value as early as possible and continually, with running, tested software serving as the primary gauge.

The team must, therefore, concentrate on using product features as the primary planning, tracking, and delivery unit. The "step by step" dynamic of agile approach is centered on short-term visibility without ever losing sight of the long-term product goal. Scrum, Kanban, Extreme Programming (XP), Lean Development, and Crystal are the five primary Agile techniques. Everyone on the team should strive for constant improvement and have a passion to work together. Communication (often daily), teamwork, problem-solving, technical development abilities, and the desire to increase the team's velocity with each iteration are the foundations of an agile team.

Learn more about Agile here-

https://brainly.com/question/26311169

#SPJ4

you have a remote user who can connect to the internet but not to the office via their vpn client. after determining the problem, which should be your next step?

Answers

Checking the firewall to see which IP addresses are dropped and which are accepted.

Akira made a database to keep track of her books. She wants to create a list that displays only the books by a specific author. This is called a
A: report
B: chart
C: query
D: sort

Answers

Answer:

It's not sort i just took the test

Explanation:

Which of the following statements about PHP arrays is false?

a. Sarr[="foo" is an example of adding an element to the end of an array.
b. Sarr = array("fon"=> 1, 1=> "foo"); is a valid array declaration.
c. foreach($arr as Skey) is an example of iterating through array values.
d. foreach($arr as $key) is an example of iterating through array keys.

Answers

foreach($arr as $key) is an example of iterating through array keys. This statements about PHP arrays is false.

An ordered map is what PHP array considers an array to be. A type that links values and keys together is a map. This type is designed to be used in a variety of situations and can be used as an array, list (vector), dictionary, hash table (an implementation of a map), stack, queue, and presumably other things as well. Trees and multidimensional arrays are also feasible due to the fact that array values may be other arrays. Give a definition of an array.

A collection of identically typed objects arranged in a row or column of memory that can each be independently referred to using an index to a special identifier is known as an array. The declaration of an array for five int values eliminates the need to declare five separate variables.

Learn more about PHP array here:

https://brainly.com/question/16343893

#SPJ4

There are various risks from attacks on wi-fi networks. These include all of the following except _____.

Answers

There are various risks from attacks on wi-fi networks. These include all of the following except creating option d: malware.

What is malware?

This is said to be any program or file that purposefully hurts a computer, network, or server is known as malware, or malicious software.

Note that Computer viruses, worms, as well as Trojan horses, ransomware, and spyware are said to be examples of malware.

Lastly, Malware, often seen as malicious software, is a general word for any program or piece of code written with the intention of causing harm to a computer, network, or server.

Learn more about malware from

https://brainly.com/question/399317
#SPJ1

See options below

Blackbox

Acting

Miracle

Malware

read in a 3-character string from input into variable usercode. declare a boolean variable noalphas and set noalphas to true if usercode does not contain any alphabetic characters. otherwise, set noalphas to false. ex: if the input is %.-, then the output is: passcode accepted note: use getline(cin, usercode) to read the entire line from input into usercode.

Answers

Using the knowledge of computational language in C++ it is possible to describe a boolean variable noalphas and set noalphas to true if usercode does not contain any alphabetic characters. otherwise, set noalphas to false.

Writting the code:

#include <iostream>

#include<cstring>

#include<cctype>

using namespace std;

int main() {

   // declaring userCode variable as a string

   string userCode;

   // declaring isValid boolean variable

   bool isValid;

   // getting the input using getline

   getline(cin,userCode);

   /* cheking char at first position is in uppercase using ascii value,

   similarly checking char at second position and then if it is not true

   then set isValid to true

   */

   if(!((int(userCode[0])>=65 && int(userCode[0])<=90) || (int(userCode[1])>=65 && int(userCode[1])<=90)))

   {

       isValid=true;

   }

   // otherwise false

   else{

       isValid=false;

   }

   // if isValid is true then print Good passcode

   if(isValid==true)

   cout<<"Good passcode";

   // otherwise Bad passcode

   else

   cout<<"Bad passcode";

   

return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

I suck at python someone help me out

Answers

Answer:

The thing is you didn't provide the link. So please provide that.

you have just installed a packet-filtering firewall on your network. which options are you able to set on your firewall? (select all that apply.)

Answers

We can configure rules to allow access only to known and established IP addresses while denying access to all unknown or unrecognized IP addresses.

Packet filters examine the source and destination IP and port addresses in each TCP/IP packet. IP packets are filtered by the packet filtering firewall based on their source and destination IP addresses, as well as their source and destination port. The packet filter may lack logging capabilities, making it impractical for an organization that must adhere to compliance and reporting requirements. Companies use three types of firewalls to protect their data and devices and keep malicious elements out of their networks: packet filters, stateful inspection, and proxy server firewalls.

Learn more about destination here-

https://brainly.com/question/14564689

#SPJ4

performing a forensic analysis of a disk 200 gb or larger can take several days and often involves running imaging software overnight and on weekends. (t/f)

Answers

It can take many days to complete a forensic study of a disk 200 GB or bigger, and it frequently requires running imaging software at odd hours and on the weekends. Taking the Guidance Software Encase training courses is a requirement for taking the EnCE certification exam.

What is EnCase forensic tool?Professionals in the public and private sectors can get certification in the usage of OpenText TM EnCase TM Forensic through the EnCaseTM Certified Examiner (EnCE) program.Professionals who hold an EnCE certification have mastered computer investigation techniques and the usage of Encase software during difficult computer testsQualifications in Training and Experience you must have completed 64 hours of official computer forensic training (online or in a classroom), OR you must have 12 months of relevant job experience.In forensics, Encase is typically used to extract evidence from confiscated hard drives. It helps the investigator to gather evidence including papers, photos, internet history, and Windows Registry data by conducting in-depth research of user files.

To learn more about forensic analysis,  refer to:

brainly.com/question/28445507

#SPJ4

Which of the following is true about the MAC address?

a. it is a 64 bit address
b. it is a 32 bit address
c. it is typically represented by hexadecimal numbers.
d. it is typically represented by octets of decimal numbers between 0-255
e. it is a 48bit address

Answers

Option e is correct. The MAC address is a 48bit address. Ethernet, Wi-Fi, and Bluetooth are just a few of the IEEE 802 networking technologies that frequently employ this application.

A network interface controller (NIC) is given a media access control address (MAC address), which it can use as a network address in communications inside a network segment. Ethernet, Wi-Fi, and Bluetooth are just a few of the IEEE 802 networking technologies that frequently employ this application.

MAC addresses are employed in the data link layer's medium access control protocol sublayer of the Open Systems Interconnection (OSI) network model. MAC addresse can be recognized as six sets of two hexadecimal numbers, usually separated by hyphens, colons, or neither.

MAC addresses are frequently referred to as the burned-in address, Ethernet hardware address, hardware address, or physical address because they are typically assigned by device makers.Each address may be saved either by a firmware mechanism or in hardware, such as the read-only memory on the card.

However, a lot of network interfaces allow you to modify your MAC address. Usually, a manufacturer's organizationally unique identifier is included in the address (OUI). The concepts of the two numbering spaces, EUI-48 (which replaces the archaic designation MAC-48) and EUI-64, controlled by the Institute of Electrical and Electronics Engineers (IEEE), are used to create MAC addresses.

Every NIC on a network node having multiple network interfaces, such as a router or multilayer switch, must have a distinct MAC address. On the other hand, two NICs linked to various networks can share a single MAC address.

To know more about MAC address click on the link:

https://brainly.com/question/25937580

#SPJ4

which generation of controller started to utilize processes similar to modern computers and took advantage of programming languages

Answers

Answer: The third-generation languages

Explanation:

a microprocessor’s instruction set architecture specifies, among other things, which higher level languages can be used to program it.

a. true
b. False

Answers

option b. It is incorrect That a microprocessor's instruction set design dictates, among other things, which higher level languages can be used to program it.

The microprocessor is the main component of a computer system that executes mathematical and logical operations. These operations often involve addition, subtraction, moving numbers from one place to another, and comparing two numbers. It is frequently referred to as a processor, central processing unit, or logic chip. When a computer is turned on, this is essentially what moves the machine—the engine or the brain . The central processing unit's (CPU's) functionalities are merged into a single integrated circuit (IC) in this programmable, versatile device (integrated circuit). A microprocessor takes binary data as input, processes it, and then outputs the results in accordance with the instructions kept in the memory. They use less power and are quick.The two main types of memory used in microprocessor systems are read-only memory and read/write memory, most frequently referred to as ROM and RAM, or "Read Only Memory" and "Random Access Memory," respectively.

Learn more about microprocessor here:

https://brainly.com/question/1305972

#SPJ4

Other Questions
5) Close Reading: Which statement below do you think W.E.B. Du Bois would support? iteevidence from primary source document a and / or b to support your claims: Political power and civil rights must be earned, and they are the results from struggle andself improvement. Political power and civil rights must be demanded. African Americans must seize themfrom American society and should have already earned them by virtue of citizenship. How does Carrie Demers use the story The lady or the tiger to structure her essay Chaos or Calm? ________ bone is remodeled from woven bone and its matrix is arranged in distinct layers or sheets known as lamellae. 2 If we want to test the strength of electrical forces between a pair of charged objects, which of the following questions should we ask? A B How much mass does each object have? D Are the objects made up of the same material? C Does each object sink or float in water? What happens when the objects are moved further apart? Across different situations, the most effective managers_________ decision style. Decomposition is a physical and chemical process by which dead organic matter is broken down. Why is decomposition important to life processes? how did the gulf of tonkin incident basically give johnson the chance to do whatever he wanted in vietnam? valley spa purchased $10,200 in plumbing components from tubman company. valley spa signed a 60-day, 10% promissory note for $10,200. if the note is dishonored, but tubman intends to continue collection efforts, what is the journal entry made by tubman to record the dishonored note? (use 360 days a year.) The given table of values represents a linear equation. What is the slope?X: 3 4 5 6Y: 1 5 9 13A. 3B. 2C. 4D. 5 themes in the book lowboy Use properties to rewrite the given equation. Which equations have the same solution as 2.3p 10.1 = 6.5p 4 0.01p? Select two options. In which of the following situations can you say, without further information, that consumer surplus decreases relative to the market equilibrium level?a. Your state passes a law that pushes the interest rate (i.e., the price) for payday loans below the equilibrium rate.b. The federal government enforces a law that raises the price of dairy goods above the equilibrium.c. Your city passes a local property tax, under which buyers of new houses have to pay an additional 5 percent on top of the purchase price.d.The government lowers the effective price of food purchases through a food-stamp program. The blood platelet counts of a group of women have a bell-shaped distribution with a mean of 259.1 and a standard deviation of 68.2. (All units are 1000 cells/l.) Using the empiricalrule, find each approximate percentage below.a. What is the approximate percentage of women with platelet counts within 3 standard deviations of the mean, or between 54.5 and 463.77b. What is the approximate percentage of women with platelet counts between 122.7 and 395.5?a. Approximately % of women in this group have platelet counts within 3 standard deviations of the mean, or between 54.5 and 463.7(Type an integer or a decimal. Do not round.)PLEASE HELP ASAP 1) Drag and drop the numbers to place them in increasing order.-1.60.6- 1/63/72) Drag and drop the numbers to place them in increasing order.-1.31.4-0.60.7 The outdoor temperature was 8 at midnight the temperature declined 5 during each of the next three hours. What was the temperature at 3 AM? the monetary control act of 1980 extended the fed's authority to a. impose required reserve ratios on all depository institutions. b. control the discount rate. c. control the federal funds rate. d. all of the answers are correct. A polynomial function has zeros at -4 (multiplicity 3), -1 (multiplicity 8) and 2 (multiplicity 1). Which equation couldrepresent this function?Ax)Ax)A.B.C.D.WSelect one:O a. AO b. B. O d. D Jakia is a member of the Usaah club at rshs for the 2020-2021 school year she works at a local fast food restaurant after school and on weekends. She saving for the college tour schedule for December 2021 . Jakia saved 20 in June ,25 in july,30 in August, and plans to continue this pattern each mouth how much money will jakia save in November 2021 Graph the line with slope of 5/3 and goes through the point (2, 1). Which of the following choices is considered to be evidence that evolution takes place?comparative anatomycomparative embryologycomparative biochemistryAll of these choices are correct.