View "The database tutorial for beginners" and discuss how database management systems are different from spreadsheets. Describe one experience you have had working with data.

Answers

Answer 1

Answer and Explanation:

A spreadsheet is an interactive computer application for the analysis and storage of data. The database is a collection of data and accessed from the computer system. This is the main difference between spreadsheets and databases. The spreadsheet is accessed by the user and the database is accessed by the user. The database can store more data than a spreadsheet. The spreadsheet is used for tasks and used in enterprises to store the data. Spreadsheet and database are two methods and the main difference is the computer application that helps to arrange, manage and calculate the data. The database is a collection of data and organized to access easily. Spreadsheet applications were the first spreadsheet on the mainframe. Database stores and manipulates the data easily. The database maintains the data and stores the records of teachers and courses. The spreadsheet is the computer application and analyzing the data in table form. The spreadsheet is a standard feature for productive suite and based on an accounting worksheet.


Related Questions

What are the LinkedIn automation tools you are using?

Answers

Answer:

Well, for me I personally use LinkedCamap to drive more LinkedIn connections, hundreds of leads, sales, and conversions automatically.

Some other LinkedIn automation tools are;

ExpandiMeet AlfredPhantombusterWeConnectLinkedIn Helper

Hope this helps!

A strategy that adopts interface standards that are defined by and widely used throughout industry to facilitate the update of components with new technology is __________. Open systems Non-developmental items Software-embedded systems Automated Information Systems

Answers

Answer:

The right approach is Option d (Automated information systems).

Explanation:

A technology that collects as well as disseminates knowledge or material throughout a range or variety of computerized systems, they are determined as an Automated information system.Oftentimes virtually minimal individual personal interference is necessary except perhaps construction as well as services.

Other choices aren't related to the given scenario. So the above is the appropriate one.

List and explain the type of networking​

Answers

Answer:

Used for everything from accessing the internet or printing a document to downloading an attachment from an email, networks are the backbone of business today. They can refer to a small handful of devices within a single room to millions of devices spread across the entire globe, and can be defined based on purpose and/or size.

We put together this handy reference guide to explain the types of networks in use today, and what they’re used for.

 

11 Types of Networks in Use Today

 

1. Personal Area Network (PAN)

The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around one person in one building. These types of networks are typically found in small offices or residences, and are managed by one person or organization from a single device.

 

2. Local Area Network (LAN)

We’re confident that you’ve heard of these types of networks before – LANs are the most frequently discussed networks, one of the most common, one of the most original and one of the simplest types of networks. LANs connect groups of computers and low-voltage devices together across short distances (within a building or between a group of two or three buildings in close proximity to each other) to share information and resources. Enterprises typically manage and maintain LANs.

 

Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data.

 

3. Wireless Local Area Network (WLAN)

Functioning like a LAN, WLANs make use of wireless network technology, such as Wi-Fi. Typically seen in the same types of applications as LANs, these types of networks don’t require that devices rely on physical cables to connect to the network.

 

4. Campus Area Network (CAN)

Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types of networks are typically seen in universities, large K-12 school districts or small businesses. They can be spread across several buildings that are fairly close to each other so users can share resources.

 

5. Metropolitan Area Network (MAN)

These types of networks are larger than LANs but smaller than WANs – and incorporate elements from both types of networks. MANs span an entire geographic area (typically a town or city, but sometimes a campus). Ownership and maintenance is handled by either a single person or company (a local council, a large company, etc.).

 

6. Wide Area Network (WAN)

Slightly more complex than a LAN, a WAN connects computers together across longer physical distances. This allows computers and low-voltage devices to be remotely connected to each other over one large network to communicate even when they’re miles apart.

 

The Internet is the most basic example of a WAN, connecting all computers together around the world. Because of a WAN’s vast reach, it is typically owned and maintained by multiple administrators or the public.

 

7. Storage-Area Network (SAN)

As a dedicated high-speed network that connects shared pools of storage devices to several servers, these types of networks don’t rely on a LAN or WAN. Instead, they move storage resources away from the network and place them into their own high-performance network. SANs can be accessed in the same fashion as a drive attached to a server. Types of storage-area networks include converged, virtual and unified SANs.

 

8. System-Area Network (also known as SAN)

This term is fairly new within the past two decades. It is used to explain a relatively local network that is designed to provide high-speed connection in server-to-server applications (cluster environments), storage area networks (called “SANs” as well) and processor-to-processor applications. The computers connected on a SAN operate as a single system at very high speeds.

 

9. Passive Optical Local Area Network (POLAN)

As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated into structured cabling to overcome concerns about supporting traditional Ethernet protocols and network applications such as PoE (Power over Ethernet). A point-to-multipoint LAN architecture, POLAN uses optical splitters to split an optical signal from one strand of singlemode optical fiber into multiple signals to serve users and devices.

 

10. Enterprise Private Network (EPN)

These types of networks are built and owned by businesses that want to securely connect its various locations to share computer resources.

 

11. Virtual Private Network (VPN)

By extending a private network across the Internet, a VPN lets its users send and receive data as if their devices were connected to the private network – even if they’re not. Through a virtual point-to-point connection, users can access a private network remotely.

Many companies possess valuable information they want to guard closely (ex. new chip design, competition plans, legal documents). Personal computer hard disks these days are full of important photos, videos, and movies. As more and more information is stored in computer systems, the need to protect it is becoming increasingly important. Which of the following statements is incorrect with respect to Security?
a. security has many facets; three of the more important ones are: the nature of the threats, the nature of intruders, and cryptography
b. data integrity means that unauthorized users should not be able to modify any data without the owner's permission
c. a common category of intruders are driven by determined attempts to make money; for example: bank programmers attempting to steal from the bank they work for
d. in addition to threats caused by malicious users, data can be lost by accident; for example: rats gnawing backup tapes

Answers

Answer: D. in addition to threats caused by malicious users, data can be lost by accident; for example: rats gnawing backup tapes

Explanation:

Data security is essential to protecting unwanted people from having access to ones data, malicious attack should also be prevented and unusual behavior should be monitored.

Data security has many facets such as threat nature, the nature of intruders, and cryptography. Furthermore, data integrity means that unauthorized users should not be able to modify any data without the owner's permission. Also, the statement that a common category of intruders are driven by determined attempts to make money; for example: bank programmers attempting to steal from the bank they work for is correct.

It should be no noted that rats gnawing backup tapes cannot prevent data loss. Therefore, the correct option is D

A ----------------has the least flexibility and is best suited for mass production. It has an arrangement of machines that process identical products in a predefined order, with automatic movement of materials between machines.

Answers

Answer:

Job order production

Explanation:

A job order production has the least flexibility and is best suited for mass production.

It also has an arrangement of machines that process identical products in a predefined order, with automatic movement of materials between machines.

brainleist please..

Answer -------> Transfer line <---------

please click on the picture look at the PICTURE for the correct answer.

Choose all that Apply: Which of the following steps should be performed by the CIS for creating a part dispatch for systemboard through Tech Direct?
a) Enter the customer's contact and email address into the primary contact fields when requesting a systemboard through TechDirect
b) Logging fusion ticket to request DPK via DDL
c) Access the customer's DDL account to retrieve DPK and activate the os for the customer
d) Verify the customer email address

Answers

Answer:

The steps that should be performed by the CIS for creating a part dispatch for system board through TechDirect are:

a) Enter the customer's contact and email address into the primary contact fields when requesting a system board through TechDirect

b) Logging fusion ticket to request DPK via DDL

c) Access the customer's DDL account to retrieve DPK and activate the os for the customer

d) Verify the customer email address

Explanation:

The four steps given above must be performed in the CIS if you want to create a part dispatch for the system board through TechDirect.  TechDirect is a support system that enables one to manage all Dell technologies from a single location. After creating the part dispatch, the customer's contact and email address are entered into the primary contact fields to enable the verification of the customer's email address  through the TechDirect.

What does 32mb SVGA do

Answers

Answer:

hope it helps PLZ MARK ME BRAINLIEST,,!

Explanation:

They stabilize your grpahic image.

Una persona decide comprar un número determinado de quintales de azúcar, ayúdele a presentar el precio de venta al público por libra, considerando un 25% de utilidad por cada quintal.

Answers

I need help with this problem also %


Please help us

Java !!!
A common problem in parsing computer languages and compiler implementations is determining if an input string is balanced. That is, a string can be considered balanced if for every opening element ( (, [, <, etc) there is a corresponding closing element ( ), ], >, etc).
Today, we’re interested in writing a method that will determine if a String is balanced. Write a method, isBalanced(String s) that returns true if every opening element is matched by a closing element of exactly the same type. Extra opening elements, or extra closing elements, result in an unbalanced string. For this problem, we are only interested in three sets of characters -- {, (, and [ (and their closing equivalents, }, ), and ]). Other characters, such as <, can be skipped. Extra characters (letters, numbers, other symbols) should all be skipped. Additionally, the ordering of each closing element must match the ordering of each opening element. This is illustrated by examples below.
The following examples illustrate the expected behaviour:
is Balanced ("{{mustache templates use double curly braces}}") should return true
is Balanced("{{but here we have our template wrong!}") should return false
is Balanced("{ ( ( some text ) ) }") should return true
is Balanced("{ ( ( some text ) } )") should return false (note that the ordering of the last two elements is wrong)
Write an implementation that uses one or more Stacks to solve this problem. As a client of the Stack class, you are not concerned with how it works directly, just that it does work.

Answers

Answer:

Explanation:

import java.util.*;

public class BalancedBrackets {

// function to check if brackets are balanced

static boolean isBalanced(String expr)

{

Stack<Character> stack = new Stack<Character>();

for (int i = 0; i < expr.length(); i++)

{

char x = expr.charAt(i);

if (x == '(' || x == '[' || x == '{')

{

// Push the element in the stack

stack.push(x);

continue;

}

if (stack.isEmpty())

return false;

char check;

switch (x) {

case ')':

check = stack.pop();

if (check == '{' || check == '[')

return false;

break;

case '}':

check = stack.pop();

if (check == '(' || check == '[')

return false;

break;

case ']':

check = stack.pop();

if (check == '(' || check == '{')

return false;

break;

}

}

// Check Empty Stack

return (stack.isEmpty());

}

public static void main(String[] args)

{

Scanner scan = new Scanner(System.in);

System.out.println("\nEnter the expression to check is balanced or not !");

String expr = scan.nextLine();

boolean output;

output = isBalanced(expr);

System.out.println(output);

if (output)

System.out.println("Balanced ");

else

System.out.println("Not Balanced ");

scan.close();

}

}

uuhdcnkhbbbbhbnbbbbnnnnnnnnnfddjkjfs

Answers

Answer:

The answer is "Option c"

Explanation:

In PHP to remove all the session variables, we use the session_destroy() function. It doesn't take any argument is required and then all sessions variables could be destroyed by a single call. If a particular clinical variable is now to be destroyed, the unset() function can be applied to unset a session variable. Its session doesn't unset or unset the session cookie by either of the local variables associated with it.

Batter boards (if properly offset) will allow for the end user to continually re-string the layout to double check accuracy without having to continually set up an instrument True False

Answers

Answer:

The given statement is "True".

Explanation:

Batter panels seem to be platform frames that are used to temporarily suspend foundations plan threads. These same batter board members look like barriers once built.Its positioning is important for creating a foundation precisely as the plans state since some components of their development would have to be accurate. Placed correctly batter panels guarantee that the boundaries seem to be at the appropriate temperatures as well as positions.

Answer to this problem

Answers

Answer:

hi..,.................................................

9. Which of the following prefixes which relate to bytes are arranged from the smallest to the largest? a) mega, giga, tera, kilo b) meqa tera, giga, kilo c) kilo, mega, giga, tera d) kilo, giga, mega, tera​

Answers

Answer:

Explanation:

C

kilo = 1000

mega = 1,000,000

giga = 1 billion = 1 000 000 000

tera = 1 trillion = 1 000 000 000  000

Which of the following terms describes an attacker walking or driving through business areas and neighborhoods to identify unprotected wireless networks from the street using a laptop or a handheld computer?
A. Wi-Fi stealing.
B. Wi-Fi trolling.
C. Wi-Fi jacking.
D. Wi-Fi hacking.

Answers

Answer:

C. Wi-Fi jacking

Explanation:

Answer: yessir b

Explanation:

Write a recursive function that calculates the sum 11 22 33 ... nn, given an integer value of nin between 1 and 9. You can write a separate power function in this process and call that power function as needed:

Answers

Answer:

The function in Python is as follows:

def sumDig(n):

if n == 1:

 return 11

else:

 return n*11 + sumDig(n - 1)

Explanation:

This defines the function

def sumDig(n):

This represents the base case (where n = 1)

if n == 1:

The function returns 11, when it gets to the base case

 return 11

For every other value of n (n > 1)

else:

This calculates the required sum recursively

 return n*11 + sumDig(n - 1)

Select the correct statement(s) regarding DCE and DTE interfaces.

a. DTE and DCE describes the device types (e.g., computers, switches, routers, etc.)
b. distinguishing between DTE and DCE is only required for half-duplex communications
c. DTE and DCE describes the interface and direction of data flow between devices; a single device may have both types of interfaces
d. all statements are correct

Answers

Answer:

The correct statement regarding DCE and DTE interfaces is:

c. DTE and DCE describes the interface and direction of data flow between devices; a single device may have both types of interfaces.

Explanation:

DTE stands for Data Terminal Equipment.  It is a device that initiates or controls a device's serial connection. The term DCE stands for Data Communications Equipment.  It is a device that is used to a modem or other communication interfaces to the DTE device.  DTE is a communication receptor, while DCE is a communication broadcaster or distributor.

Write a Python program square_root.py that asks a user for an integer n greater or equal to 1. The program should then print the square root of all the odd numbers between 1 and n (Including n if n is odd). Print the square roots rounded up with no more than two digits after the decimal point.

Answers

Answer:

import math

n = int(input("Enter n: "))

for number in range(1, n+1):

   if number % 2 == 1:

       print("{:.2f}".format(math.sqrt(number)), end=" ")

Explanation:

In order to calculate the square roots of the numbers, import math. Note that math.sqrt() calculates and gives the square root of the given number as a parameter

Ask the user to enter the n

Create a for loop that iterates from 1 to n+1 (Since n is included, you need to write n+1)

Inside the loop, check whether the number is odd or not using the if structure and modulo. If the number is odd, calculate its square root using the math.sqrt() and print the result with two digits after the decimal

In the forward chaining technique, used by the inference engine component of an expert system, the _____ condition is evaluated first.

Answers

Answer:

"if" is the right response.

Explanation:

Forward chaining is being utilized just to split the logical sequential order down as well as operate throughout every component once the preceding one is accomplished, from start to finish.Its whole algorithm begins with proven information that activates all the rules, which are fulfilled as well as makes established realities even more complete.

Create a variable in php to store your university information and parse using jQuery Ajax and print your name. The variable must contain information about name, roll no, department and CGPA.

Answers

AnswLab giya j ty dy dio:

Explanation:

Trace the evaluation of the following expressions, and give their resulting values. Make sure to give a value of the appropriate type (such as including a .0 at the end of a double or quotes around a String).
4 + 1 + 9 + "." + (-3 + 10) + 11 / 3
8 + 6 * -2 + 4 + "0" + (2 + 5)
1 + 1 + "8 - 2" + (8 - 2) + 1 + 1
5 + 2 + "(1 + 1)" + 4 + 2 * 3
"1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9)

Answers

Answer:

[tex](a)\ 14"."43[/tex]

[tex](b)\ 0"0"7[/tex]

[tex](c)\ 2"8 - 2"611[/tex]

[tex](d)\ 7"(1 + 1)"46[/tex]

[tex](e)\ "1"23"4"30"7"17[/tex]

Explanation:

Required

Evaluate each expression

The simple rules to follow are:

(1) All expressions in bracket will be evaluated based on its data type

(2) Divisions will return only integer values

(3) Integers immediately after string values will be concatenated (not added)

So, the results are as follows:

[tex](a)\ 4 + 1 + 9 + "." + (-3 + 10) + 11 / 3[/tex]

Evaluate till a string is encountered

[tex]4 + 1 + 9 = 14[/tex]

Followed by "."

Then:

[tex](-3 + 10) = 7[/tex]

[tex]11/ 3 = 3[/tex]

[tex]"." + (-3 + 10) + 11/3 = "."73[/tex] -- because expressions after string operations are concatenated.

So, we have:

[tex]4 + 1 + 9 + "." + (-3 + 10) + 11 / 3 = 14"."43[/tex]

[tex](b)\ 8 + 6 * -2 + 4 + "0" + (2 + 5)[/tex]

Evaluate till a string is encountered

[tex]8 + 6 * -2 + 4 =0[/tex]

[tex]"0" + (2 + 5) ="0"7[/tex]

So, we have:

[tex]8 + 6 * -2 + 4 + "0" + (2 + 5) = 0"0"7[/tex]

[tex](c)\ 1 + 1 + "8 - 2" + (8 - 2) + 1 + 1[/tex]

Evaluate till a string is encountered

[tex]1 + 1 = 2[/tex]

[tex]"8 - 2" + (8 - 2) + 1 + 1 = "8 - 2"611[/tex]

So, we have:

[tex]1 + 1 + "8 - 2" + (8 - 2) + 1 + 1 = 2"8 - 2"611[/tex]

[tex](d)\ 5 + 2 + "(1 + 1)" + 4 + 2 * 3[/tex]

Evaluate till a string is encountered

[tex]5 + 2 =7[/tex]

[tex]"(1 + 1)" + 4 + 2 * 3 = "(1 + 1)"46[/tex] --- multiply 2 and 3, then concatenate

So, we have:

[tex]5 + 2 + "(1 + 1)" + 4 + 2 * 3= 7"(1 + 1)"46[/tex]

[tex](e)\ "1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9)[/tex]

Since a string starts the expression, the whole expression will be concatenated except the multiplication and the expressions in bracket.

So, we have:

[tex]"1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9) = "1"23"4"30"7"17[/tex]

Which statement describes data-sharing in a blockchain?

Answers

Answer:

wheres the statement

Explanation:

how many copies of each static variable and each class variable are created when 10 instances of the same class are created

Answers

Answer:

Static variables are initialized only once

Explanation:

Only one copy of static variables are created when 10 objects are created of a class

A static variable is common to all instances of a class because it is a class level variable

The computer that is used in scientific research is ........​

Answers

Answer:

supercomputers are the computer that is used in scientific research.

Answer:

super computer is the right answer

Why is OS important in every data processing system?
Please Answer Fast! ​

Answers

Answer:

Functions of an operating system. An operating system provides three essential capabilities: It offers a UI through a CLI or GUI; it launches and manages the application execution; and it identifies and exposes system hardware resources to those applications -- typically, through a standardized API.

Explanation:

Which devices are managed through device management?

Device management is the process of managing
________devices.

Answers

Answer:

organization

Explanation:

The answer is organization I am thinking.

_________________________ are the countable products resulting from a program, while ________________________ are the changes in clients that are achieved as a result of program participation.

Answers

Answer: Outputs; Outcomes.

Explanation:

Program refers to the collection of instructions which the computer can execute in order to perform a certain task.

Outputs are are the countable products resulting from a program, while on the other hand, outcomes are the changes in clients that are achieved as a result of program participation.

Create a function called GetColors that will accept two parameters. These parameters can only be red, blue or yellow. Your function needs to analyze these two colors and determine the color mix. Make sure your function returns the color mix back to where it was called.

Answers

Answer:

Explanation:

The following code is written in Java. It creates a GetColors method that takes in the two parameter colors of either red, blue or yellow. It combines those colors and returns the mix of the two colors back to the user. A test case has been used in the main method and the output can be seen in the attached image below.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       System.out.println(GetColors("yellow", "red"));

   }

   public static String GetColors(String color1, String color2) {

       if (color1 == "red") {

           if (color2 == "blue") {return "purple";}

           else if (color2 == "yellow") {return "orange";}

           else {return "red";}

       } else if (color1 == "blue") {

           if (color2 == "red") {return "purple";}

           else if (color2 == "yellow") {return "green";}

           else {return "blue";}

       } else if (color1 == "yellow") {

           if (color2 == "red") {return "orange";}

           else if (color2 == "blue") {return "green";}

           else {return "yellow";}

       } else {

           return "Wrong Parameters";

       }

   }

}

Giải thích mục đích của các thao tác open() và close().

Answers

Answer:

Which lan is it

Answer:

Đang học năm nhất trường TDT đúng k bạn :D

Explanation:

A cashier distributes change using the maximum number of five-dollar bills, followed by one-dollar bills. Write a single statement that assigns num_ones with the number of distributed one-dollar bills given amount_to_change. Hint: Use %.
Sample output with input: 19
Change for $ 19
3 five dollar bill(s) and 4 one dollar bill(s)
1 amount_to_change = int(input())
2
3 num_fives amount_to_change // 5
4
5 Your solution goes here
6 I
7 print('Change for $, amount_to_change)
8 print(num_fives, 'five dollar bill(s) and', num_ones, 'one dollar bill (s)')

Answers

Answer:

Explanation:

The code that was provided in the question contained a couple of bugs. These bugs were fixed and the new code can be seen below as well as with the solution for the number of one-dollar bills included. The program was tested and the output can be seen in the attached image below highlighted in red.

amount_to_change = int(input())

num_fives = amount_to_change // 5

#Your solution goes here

num_ones = amount_to_change % 5

print('Change for $' + str(amount_to_change))

print(num_fives, 'five dollar bill(s) and', num_ones, 'one dollar bill (s)')

9.17 LAB: Acronyms An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase and whose output is an acronym of the input. If a word begins with a lower case letter, don't include that letter in the acronym. Assume there will be at least one upper case letter in the input.

Answers

Answer:

Hence the code is given as follows,

import java.util.Scanner;

public class LabProgram {

   public static String createAcronym(String userPhrase){

       String result = "";

       String splits[] = userPhrase.split(" ");

       for(int i = 0;i<splits.length;i++){

           if(splits[i].charAt(0)>='A' && splits[i].charAt(0)<='Z')

               result += splits[i].charAt(0);

       }

       return result;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       String s = scan.nextLine();

       System.out.println(createAcronym(s));

   }

}

Other Questions
Find the value of the constant a for which the polynomial x^3 + ax^2 -1 will have -1 as a root. (A root is a value of x such that the polynomial is equal to zero.) Prepare journal entries for each transaction and identify the financial statement impact of each entry.The financial statements are automatically generated based on the journal entries recorded.Assume Adams Services began the year with the following balances: Cash, $41,000;Accounts receivable, $11,200; and Common stock, $52,200.Jan. 1 Leslie Adams invested $21,200 cash in the company in exchange for common stock.Jan. 2 The company provided services to a client and immediately received $4,500 cash.Jan. 3 The company received $11,200 cash from a client in payment for services to be provided next year.Jan. 4 The company received $5,900 cash from a client in partial payment of accounts receivable.Jan. 5 The company borrowed $11,000 cash from the bank by signing a note payable. Work out3 1/2 X 1 3/5Giveyour answer as a mixed number in its simplest form Globalization have impacted all of the following EXCEPT.*1 pointOur eating habitsOur healthOur overall lifestyleour places of worshipAll of the following are examples of cultural diffusion of the Jamaican culture EXCEPT*1 pointWhites wearing braided hair and beadsWhite RastafariansJapanese Dancehall Queen and Reggae ArtistJamaicans eating ackee and saltfish The sum of four consecutive integers is equal to three times the smallest number. What is the sum of the four integers? write a note on the pandemic and how it impacted everyone globally EH is a diameter of D. The measure of ef is (10x+ 8) and the measure of gh is (11x). Determine the values Write 9/7 as a mixed number. Give your answer in its simplest form. Sidney's retirement party costs $28, plus an additional $1 for each guest she invites. What is the maximum number of guests there can be if Sidney can afford to spend a total of $44 on her retirement party? 2. The process of obtaining and using energy is calledmetabolismO photosynthesisreproductionhomeostasis When an issue creates disagreement among the states, how does federalism solve the problem? pls help meFreedomBY LANGSTON HUGHESFreedom will not comeToday, this yearNor everThrough compromise and fear.I have as much rightAs the other fellow hasTo standOn my two feetAnd own the land.I tire so of hearing people say,Let things take their course.Tomorrow is another day.I do not need my freedom when Im dead.I cannot live on tomorrows bread.FreedomIs a strong seedPlantedIn a great need.I live here, too.I want my freedomJust as you.questions: 1. Describe the speaker of the poem? Is the speaker involved in the action or outside of the action? 2. Does the poem represent the speakers feelings at a particular moment in time or does it seem the speaker has had a chance to reflect on the significance of events? 3. Identify and briefly explain the tension/conflict in the poem. 4. How is the poem organized? Where do the shifts come?5. What is the most important line or sentence in the poem? Why? 6. Do you notice any poetic devices used in the poem? In what lines do they appear? (Metaphor, simile, apostrophe, personification, etc.) Select the correct message.Sheila is a marketing executive at an event management firm. She needs to tell her supervisor, Rhonda, to check a social media post aboutthe firm's services. Select the message that shows Sheila is using the best practices for instant messaging in the workplace. 4. Describe the tales that people tell about the mule after Joe Starks emancipates it. Why do you think the mule captures their imaginations the way it does pls can i know the answers to these homophones questions come and look widely a mistake and chicken A good summary of an informational text mustinclude all the details that the text contains about its subject.state, in the students own words, only the most important ideas.evaluate whether the texts author covered the subject matter well.use phrases and sentences taken directly from the original author. Read the excerpt from activist cesar Chavez 1984 address to the commonwealth club of San Francisco. Which ideas from the excerpt would be most appropriate to include in a summary ?select two options Six engineering students have an idea for a new product that they plan to launch in 3 years after graduation. In three years, each engineer will need $7,500 to begin the venture. How much should be invested by each student each year if the interest rate is 6% What are the countries that form North Africa? Which statement best completes the diagram?