What type of record access can an Administrator grant through sharing rules?

Answers

Answer 1

An Administrator can grant Read-Only or Read/Write access through sharing rules.

Sharing rules are a tool in Salesforce that allow Administrators to grant specific types of access to particular records, based on defined criteria.

By setting up sharing rules, an Administrator can either grant Read-Only access, which permits users to view but not edit the records, or Read/Write access, which allows users to both view and modify the records.

These rules help maintain data security while also enabling collaboration between users who may not be in the same role hierarchy or group.

Overall, sharing rules are essential for ensuring appropriate access levels to sensitive data in Salesforce.

To know more about data security visit:

brainly.com/question/29618852

#SPJ11


Related Questions

a laser printer is printing images with ghost images. what parts of the laster printer are most likely the source of the problem

Answers

A laser printer experiencing ghost images can be caused by several components. The most likely sources of the problem are the photoconductor drum, fuser assembly, and toner cartridge.

The photoconductor drum, which transfers the toner to the paper, may have surface wear or be improperly cleaned, causing residual toner to create ghost images.

The fuser assembly, responsible for melting and bonding the toner to the paper, may have a worn or damaged heating roller, leading to uneven heat distribution and ghosting.

Lastly, the toner cartridge could be leaking or have poor quality toner, resulting in image artifacts. Addressing these components should help resolve the issue.

Learn more about laser printer at

https://brainly.com/question/30188042

#SPJ11

Which two actions describe how web filters work? (Choose
two.)
Select one or more:
â« Web filters filter sites by keywords and predefined content. â« Web filters consult URL deny lists and allow lists.
⢠Web filters consult a threat actor database.
â« Web filters apply heuristic analysis.

Answers

Two actions that describe how web filters work are Web filters consult URL deny lists and allow lists, and Web filters sites by keywords and predefined content. The correct options are a and b.

What is a web filter?

Online filtering software keeps track of and controls where people are browsing on the Internet.

This allows a company to approve or block web traffic to enact corporate policy and safeguard against potential dangers.

Therefore, the correct options are:

a. Web filters filter sites by keywords and predefined content.

b. Web filters consult URL deny lists and allow lists.

To learn more about web filters, refer to the link:

https://brainly.com/question/14298646

#SPJ1

assume that a vector named numbers has been declared of type integer. also assume that numbers.size() is equal to 10.we want to add the value 7 to the vector. how can an 11th element be added to the vector?

Answers

To add an 11th element to the vector, we can use the push_back() method in C++. This method adds an element to the end of the vector. In this case, we can add the value 7 to the vector by calling numbers.push_back(7). This will increase the size of the vector to 11 and add the value 7 as the last element.


To add an element to a vector in C++, we can use the push_back() method which adds an element to the end of the vector. In this scenario, an 11th element needs to be added to a vector named numbers of type integer with a size of 10. This can be achieved by calling numbers.push_back(7) which will increase the size of the vector to 11 and add the value 7 as the last element. The push_back() method is a convenient way to add elements to a vector without having to worry about manually resizing the vector or specifying the index of the new element. Overall, the push_back() method is a useful tool for manipulating the size and contents of a vector in C++.

In conclusion, to add an element to a vector in C++, we can use the push_back() method which adds an element to the end of the vector. In this case, to add the value 7 to the vector named numbers with a size of 10, we can call numbers.push_back(7) to increase the size of the vector to 11 and add the value 7 as the last element.

To know more about vector visit:

brainly.com/question/24256726

#SPJ11

What are the disadvantages of using a page description diagram?
A.
They lack flexibility.
B.
Only an experienced designer can create an effective PDD.
C.
They are difficult to understand.
D.
Web developers cannot combine them with wireframes.

Answers

A disadvantage of using a page description diagram is that: B. only an experienced designer can create an effective PDD.

What is PDD?

PDD is an acronym for page description diagram and it can be defined as a type of diagram which is used to outline the content and elements on webpages, especially by organizing their elements into low, medium, and high priority.

In Computer technology, a disadvantage of using a page description diagram is that: B. only an experienced designer can create an effective page description diagram (PDD).

Read more on web diagrams here: https://brainly.com/question/16418487

#SPJ1

The path MTU is the largest MTU on a path from sender to receiver. a. True
b. False

Answers

The PMTU refers to the maximum packet size that can be transmitted without fragmentation over a network path, while the MTU represents the maximum size of a data unit that can be transmitted over a network.

What is the relationship between PMTU and MTU in terms of network transmission?

The statement is true. The Path Maximum Transmission Unit (PMTU) refers to the maximum packet size that can be transmitted without fragmentation over a particular network path from the sender to the receiver.

The MTU (Maximum Transmission Unit) is the maximum size of a data unit that can be transmitted over a network.

The PMTU is determined by finding the smallest MTU value among all the links and network devices along the path.

It ensures that the packet size does not exceed the limitations of any link or device in the path, preventing fragmentation and optimizing network performance.

Learn more about PMTU

brainly.com/question/31948883

#SPJ11

who is he can anyone help me​

who is he can anyone help me

Answers

This person is Elon Musk, the owner of Tesla :)
The person in the photo is Elon Musk. He’s the CEO of SpaceX and CEO and product architect of Tesla, Inc.,founder of The Boring Company, co-founder of Neuralink, and co-founder and initial co-chairman of OpenAI.

In object-oriented languages, which type of cast is considered safe and does not need to be made explicit? a) Upcast b) Downcast c) Static cast d) Dynamic cast

Answers

In object-oriented languages, the type of cast that is considered safe and does not need to be made explicit is an upcast.

a) Upcast: An upcast refers to casting an object to one of its parent classes or interfaces. It is considered safe because it involves treating a derived class object as an instance of its base class. Upcasting is implicit and does not require an explicit cast operator in many object-oriented languages.

b) Downcast: A downcast involves casting an object to one of its derived classes. It is considered potentially unsafe because it assumes that the object is actually an instance of the derived class. Downcasting requires an explicit cast operator and may result in runtime errors if the object is not of the expected derived class type.

c) Static cast: Static cast is a general-purpose cast operator that can perform a wide range of conversions between related types. It requires an explicit cast operator and may or may not be safe depending on the specific conversion.

d) Dynamic cast: Dynamic cast is used for casting between classes with polymorphic behavior. It checks the validity of the cast at runtime and can handle both upcasting and downcasting. Dynamic cast requires an explicit cast operator and is safer than a static cast, but it incurs additional runtime overhead.

To learn more about upcast, refer:

https://brainly.com/question/32094130

#SPJ11

Create a paper of at least 1,800 words describing the situation you selected and explaining the logic that would support an array.

Answers

Answer:

I dont know about 1800 words but I sure can tell you abit about array

Explanation: Array in simple sense refers to a collection of similar data. It holds data which is homogeneous in nature, meaning they are all alike. The use of array provide a lot of advantages in the fields of computer programming. When you declare a variable for an array, you can store as much data as you wish in the same variable without having to declare many variables. A 2X2 dimensional array can also be used in programming which represents matrices as well. The search process in an array too is really convenient and time saving. Also in an array, accessing an element is very easy by using the index number.

Es la actividad que posibilita comunicar gráficamente ideas, hechos y valores procesados y sintetizados en términos de forma y comunicación, factores sociales, culturales, económicos, estéticos y tecnológicos

Answers

Answer:

La estadística es una rama de las matemáticas aplicadas que se ocupa de la recopilación, evaluación, análisis y presentación de datos o información. El trabajo también utiliza elementos de cognición, psicología, informática y ciencias de sistemas, cálculos numéricos y contribuciones de otras materias que tratan de matemáticas, datos y métodos informáticos intensivos.

El resultado, también llamado estadística, a menudo se presenta en forma numérica en números absolutos, números de frecuencia, números proporcionales, promedios, en tablas con series de tiempo o con otros números comparativos y a menudo también se ilustra en diagramas o figuras. El resultado se usa en parte para mostrar cómo se maneja algo en este momento y en parte como una herramienta para predecir eventos futuros mediante inducción. La estadística se utiliza en muchas disciplinas científicas, desde las ciencias naturales hasta las humanidades, pero también en la política y los negocios.

A promising start-up wants to compete in the cell phone market. The start-up believes that the battery life of its cell phone is more than two hours longer than the leading product. A recent sample of 120 units of the leading product provides a mean battery life of 5 hours and 31 minutes with a standard deviation of 32 minutes. A similar analysis of 121 units of the start-up’s product results in a mean battery life of 8 hours and 1 minutes and a standard deviation of 56 minutes. It is not reasonable to assume that the population variances of the two products are equal.

Answers

The  start-up's cell phone has a significantly longer battery life than the leading product.

To determine if the start-up's claim of having a battery life more than two hours longer than the leading product is valid, we can conduct a hypothesis test. Since the sample sizes are relatively large (120 and 121), we can use the z-test.

First, we set up the null and alternative hypotheses:

Null hypothesis (H 0): The start-up's cell phone battery life is not more than two hours longer than the leading product.

Alternative hypothesis (Ha): The start-up's cell phone battery life is more than two hours longer than the leading product.

Next, we calculate the test statistic, which is the difference in sample means divided by the standard error of the difference:

Test statistic = (8 hours and 1 minute - 5 hours and 31 minutes) / sqrt[(56 minutes)^2/121 + (32 minutes)^2/120]

Using the test statistic, we can determine the p-value, which represents the probability of observing a test statistic as extreme as the one calculated under the null hypothesis. If the p-value is less than a chosen significance level (e.g., 0.05), we reject the null hypothesis in favor of the alternative hypothesis.

If the null hypothesis is rejected, it provides evidence that the start-up's cell phone indeed has a significantly longer battery life than the leading product.

To learn more about battery  click here

brainly.com/question/13092565

#SPJ11

Which of the following items are likely to be displayed in the notification area of a computer running the Windows operating system? (Select two.)
Icons representing all currently open documents.
A volume control.
Shortcuts to launch recently used applications.
The current time.
Shortcuts to open recently used documents.
Icons representing all currently open applications

Answers

The items likely to be displayed in the notification area of a computer running the Windows operating system are:

A volume control.

Icons representing all currently open applications.

The notification area, also known as the system tray, is located in the taskbar of the Windows operating system. It displays various icons and notifications to provide quick access to system functions and applications.

Among the options provided, the two likely items to be displayed in the notification area are a volume control and icons representing all currently open applications. The volume control icon allows users to adjust the system's audio settings, such as volume level and mute/unmute. The icons representing open applications typically appear as a minimized version of the application's window, providing quick access to switch between different running programs.

The other options mentioned, such as icons representing open documents or shortcuts to launch recently used applications or documents, are typically not displayed in the notification area. Instead, they are usually accessed through other parts of the user interface, such as the desktop or Start menu.

Learn more about system tray here:

https://brainly.com/question/29750251

#SPJ11

A noncompete agreement is used to _____. Select 3 options.
ensure that legal information can be disclosed in the company at any time via email


ensure that if dismissed, an employee cannot compete with the employer

ensure that if dismissed, the employee can compete at any time with the employer

ensure ethical behavior when an employee is employed or dismissed

ensure that when someone is employed, they will not compete with their employer

Answers

A noncompete agreement is used to:

Ensure that if dismissed, an employee cannot compete with the employer.Ensure that if dismissed, the employee can compete at any time with the employer.Ensure ethical behavior when an employee is employed or dismissed.

What is Non-compete agreement?

A  non-compete clause is one that has a restrictive covenant. It is a type of clause under which one of the party is said to agrees not to enter into or start a similar trade.

In this type of noncompete agreements, the employer often control its former employees' work or actions long after they leave the firm.

Learn more about A noncompete agreement from

https://brainly.com/question/20800769

Answer: Below

Explanation: don´t worry the one in yellow is right

A noncompete agreement is used to _____. Select 3 options.ensure that legal information can be disclosed

Name the tag and attribute used to align a heading to the center of a
webpage

Answers

Answer:

To first create the header you will user the <h1></h1> tag

Then you will use css to align it to the center h1 {text-align: center;}

Explanation:

When a device sends a RS NDP packet, looking for a new local IPv6 router, which destination address would be involved in this request

Answers

The destination address would be involved in this request is the Address Resolution Protocol (ARP)

How does NDP functions in IPv6?

In IPv6, the Address Resolution Protocol (ARP) is known to be the one that often is replaced by the Neighbor Discovery Protocol (NDP).

The IPv4 command is one that depicts the fact that ARP has been replaced by the IPv6 command . The information that is often shown by this command are the IP address, the MAC (Link Layer) address, etc.

Learn more about  destination address  from

https://brainly.com/question/24930846

what report can help show the duration between a user's first exposure and their subsequent conversion?

Answers

The Time Lag report can help show the duration between a user's first exposure and their subsequent conversion in online advertising or marketing campaigns.

The Time Lag report provides insights into the time duration or lag between a user's initial interaction or exposure to a marketing touchpoint (such as an ad, email, or website visit) and their subsequent conversion, which could be a purchase, sign-up, or any desired action.

By analyzing the Time Lag report, marketers can understand how long it takes for users to convert after their initial engagement. This information is valuable for optimizing marketing strategies, understanding the customer journey, and determining the effectiveness of different touchpoints and channels.

The Time Lag report typically presents data in a distribution or histogram format, showing the number or percentage of conversions occurring within specific time ranges or intervals. This allows marketers to identify patterns and trends in user behavior, such as whether conversions tend to occur quickly or if there is a longer decision-making process involved.

Overall, the Time Lag report provides valuable insights into the duration between a user's first exposure to a marketing touchpoint and their subsequent conversion, helping marketers make informed decisions and optimize their campaigns accordingly.

Learn more about  marketing campaigns here :

https://brainly.com/question/30237897

#SPJ11

Final answer:

A Time Lag Report can show the duration between a user's first exposure and their subsequent conversion. It's useful in observing the customer journey and improving marketing strategies by revealing behavior patterns.

Explanation:

The report that can help show the duration between a user's first exposure and their subsequent conversion is called a Time Lag Report. The Time Lag Report is an aspect of digital marketing analytics, particularly useful in observing the customer journey. It measures the time taken between a user's initial interaction with an online ad or website and the point when the user makes a 'conversion' or desired action, such as making a purchase, signing up for a newsletter, or filling out a form.

This report can be beneficial to businesses as it provides insights into consumer behavior patterns and the effectiveness of their marketing strategies. By analyzing this data, a business may adjust its strategies to shorten this duration and increase conversion rates.

Learn more about Time Lag Report here:

https://brainly.com/question/33709594

Which type of database program is Microsoft Access 2016?

O knowledge
O local data
O relational
O flat-file

Answers

Answer:

O relational

Explanation:

If I'm wrong I'm so so sorry! But form my research it keeps saying its relational.

If I'm right please give me brainliest I really need it to level up so please help me!

If you don't know how to give brainliest there should be a crown underneath my answer you just have to click it.

Thank you and have a wonderful night,morning,afternoon/day! :D

Answer:

Which type of database program is Microsoft Access 2016?

relational

Explanation:

Which office setup would be difficult to host on a LAN?
hardware.

RAM.

storage.

software.

Answers

The office setup would be difficult to host on a LAN  is option C: storage.

What is the office LAN setup like?

A local area network (LAN) is a network made up of a number of computers that are connected in a certain area. TCP/IP ethernet or Wi-Fi is used in a LAN to link the computers to one another. A LAN is typically only used by one particular establishment, like a school, office, group, or church.

Therefore, LANs are frequently used in offices to give internal staff members shared access to servers or printers that are linked to the network.

Learn more about LAN   from

https://brainly.com/question/8118353
#SPJ1

During user tests for a new app, the users couldn't figure out which buttons to push, even though the design team thought it was obvious. What's the BEST way for the design team to deal with this problem?

Answers

Answer:

add text that describes what the buttons do.

Explanation:

1. as a computer engineer, briefly explain any two types of CPU scheduling mechanisms available in modern operating systems
2. Discuss any two scheduling algorithms available in an operating system

Answers

1 Two types of CPU scheduling mechanisms available in modern operating systems are:

a) Preemptive Scheduling:

b) Non-preemptive Scheduling

Two scheduling algorithms available in operating systems are:

a) Round Robin Scheduling

b) Priority Scheduling:

a) Preemptive Scheduling: In preemptive scheduling, the operating system interrupts a running process and moves it back into the ready queue in order to allow another process to execute. This is done at regular intervals or when higher priority processes arrive. Preemptive scheduling ensures that no single process can monopolize the CPU for an extended period of time.

b) Non-preemptive Scheduling: In non-preemptive scheduling, a running process must voluntarily release the CPU by either blocking itself or completing its execution before another process can execute. This type of scheduling is also known as cooperative scheduling because each process cooperates by releasing the CPU when it's done with its work.

Two scheduling algorithms available in operating systems are:

a) Round Robin Scheduling: In round-robin scheduling, each process is given a fixed time slice or quantum within which it must complete its execution. If the process completes its execution within the allotted time, it is moved to the end of the ready queue. If the time slice expires and the process is not complete, it is preempted and moved to the end of the ready queue.

b) Priority Scheduling: In priority scheduling, each process is assigned a

priority level based on factors like its importance or resource requirements. The process with the highest priority is given access to the CPU first. If two or more processes have the same priority, they can be scheduled using other algorithms, such as round-robin. This algorithm is useful in situations where some processes are more important than others, such as real-time systems.

Learn more about CPU  here:

https://brainly.com/question/21477287

#SPJ11

How
would I change the user owner and group owner on the shadow file in
linux?

Answers

In order to change the user owner and group owner on the shadow file in Linux, you can use the `chown` command.

Here's how you can do it:

Open the terminal and type the following command: `sudo chown username:groupname /etc/shadow`.

Replace `username` with the desired user's username and `groupname` with the desired group's name.

For example, if you want to change the owner to user "john" and group "admin", the command would be `sudo chown john:admin /etc/shadow`.

Note: Be very careful when making changes to system files, as incorrect changes can cause serious issues. Always backup important files before making any changes.

Learn more about command at

https://brainly.com/question/32148148

#SPJ11

What piece of equipment changes the signal from the television camera into an electronic signal?
receiver
transducer
transponder

Answers

Answer:

Transponder

Explanation:

Transponder - a device for receiving a radio signal and automatically transmitting a different signal.

Answer:

transponder isnt correct i took the quiz its one of the other 2

Explanation:

the correct answer is transducer

After creating a WBS and a network diagram for her project, Lin
calculated three different work paths.
ABC = 10 days
ADE = 12 days
BFG = 9 days
The critical path of this network is
The slack time for

Answers

The critical path of this network is ADE, which has a duration of 12 days.

The critical path in a project represents the longest sequence of dependent activities that determine the overall duration of the project. It is the path that must be completed within the shortest time in order to prevent delays in the project completion. In this case, the three work paths provided are ABC, ADE, and BFG, with their respective durations of 10 days, 12 days, and 9 days.

To determine the critical path, we look for the longest duration among the work paths. Here, the ADE path has a duration of 12 days, which is the longest among the three. Therefore, the critical path for this network is ADE.

Now, regarding the slack time for the non-critical paths, the question does not provide any information. Slack time refers to the amount of time an activity can be delayed without affecting the overall project duration. It is calculated by finding the difference between the total project duration and the duration of each non-critical path. However, since the slack time is not given, we cannot determine the exact slack time for the non-critical paths in this case.

Learn more about critical path

brainly.com/question/16519233

#SPJ11

Name at least 5 components/features that should be on any map and give a brief description of the importance of each.

Answers

Five essential components/features: title, legend/key, scale, compass rose, and labels. Each component serves a specific purpose in providing important information and enhancing the usability of the map.

1. Title: The title of a map provides a brief description or name of the area represented, allowing users to quickly identify the subject of the map. It helps establish context and aids in understanding the purpose of the map.

2. Legend/Key: The legend or key is a critical component that explains the symbols, colors, and patterns used on the map. It provides a guide to interpret the map's features, such as landmarks, roads, bodies of water, or thematic information. The legend enhances the map's clarity and ensures proper understanding.

3. Scale: The scale on a map represents the relationship between the measurements on the map and the corresponding distance on the ground. It helps users understand the actual size or distance of features on the map. A scale is crucial for accurate measurement, navigation, and estimating travel times or distances.

4. Compass Rose: The compass rose is a graphical representation of the cardinal directions (north, south, east, west) and intermediate directions (northeast, southeast, southwest, northwest). It provides orientation and helps users understand the directionality of the map.

5. Labels: Labels are text-based identifiers placed on the map to indicate the names of places, landmarks, geographical features, or other relevant information. Labels help users navigate and locate specific areas or objects on the map, improving the map's usability and understanding.

By including these essential components/features on a map, users can quickly grasp the subject, interpret symbols and colors, understand distances and directions, and locate specific places or features. These elements contribute to effective communication and usability, making the map informative and user-friendly.

To learn more about labels visit:

brainly.com/question/32060242

#SPJ11

Which set of symbols encloses an if-then code block? Choose the best answer.

straight brackets []
curly brackets {}
backslashes \\
vertical bars ||

Answers

Here's some code that might help, assuming that you are using JavaScript.

e = "Hello"

if(e === "Hello"){

    alert(":D")

}else{

    console.log("Um.")

}

I think that the answer is curly brackets.

What should you install on an operating system to prevent potentially harmful network packets from entering or leaving the os?

Answers

Answer:

A host-based firewall.

Explanation:

Firewalls monitor incoming and outgoing network traffic, and are either network-based or host-based. As you are trying to protect the OS, a host-based firewall is used as it runs on the host itself, rather than on the network.

What will be assigned to the variable s_string after the following code executes? special = '1357 country ln.' s_string = special[ :4] '7' 5 '1357' '7 country ln.'

Answers

Answer:

1357

Explanation:

s_string = special[ :4]

"[:4]" means the first character up to the third character

in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4

Answers

Answer:

c)4

Explanation:

Hope it could helps you

rotate object while holding the shift key. what does it do?

Answers

Answer:

It rotates it 45 degrees in a direction

The uploaded file exceeds the upload_max_filesize directive in php. Ini.

Answers

Increase the value of "upload_max_filesize" in php.ini file.

What is the meaning of life?

The error message "The uploaded file exceeds the upload_max_filesize directive in php.ini" means that the file you are trying to upload exceeds the maximum file size allowed by your PHP configuration file (php.ini).

By default, the maximum file size is usually set to 2MB or 8MB. If you try to upload a file that is larger than this size limit, you will receive this error message.

To fix this issue, you can increase the maximum file size allowed by editing the php.ini file and changing the "upload_max_filesize" and "post_max_size" directives to a larger value.

Alternatively, you can also try uploading a smaller file or contacting your web host to increase the maximum file size limit for you.

Learn more about php.ini file

brainly.com/question/31767642

#SPJ11

What is the most popular type or method of guaranteed reservation where booking transactions will be charged automatically?

Answers

Answer:

Credit cards.

Explanation:

When booking a reservation, the most popular type or method of making sure the reservation is guaranteed where booking transactions are charged automatics is the use of credit cards.

Why this is popular is because, the hotel, reserve or suite that is about to be booked will still receive their money even if the person that booked didn't show up.

Other Questions
what do you think are the most important qualities for a best friend to have? what would he or she be like? write at least three sentences in Spanish. Kim is cutting construction paper into rectangles for a project. She needs to cut one rectangle that is 9 inches 13 1 3 inches. She needs to cut another rectangle that is 10 1 4 inches by 10 1 3 inches. How many total square inches of construction paper does Kim need for her project 2.One way to use compensation is to adjust a number to make it easier to add.then adjust the other number in the opposite way.198+34=? To adjust 198 to 200,add 2To compensate what's the other number 34 by subtracting ___________ Who sang heard it through the grapevine Marvin Gaye? Please help!!! I need this ASAP The hypothalamus controls excretions from the pituitary gland. It causes the release of hormones from the pituitary by direct nervous control, and by secreting substances that stimulate the pituitary to secrete hormones. Which best describes the hypothalamus. The speed of sound in dry air at 68 degrees F is 343.2 meters per second. Which of the expressions below could be used to compute the number of kilometers that a sound wave travels in 10 minutes (in dry air at 68 degrees F)? Which of the following is a capital budgeting decision?a. Determining how many shares of sock to issue.b. Deciding whether or not to purchase a new machine for the production line.c. Deciding how to refinance a debt issue that is maturing.d. Determining how much inventory to keep on hand.e. Determining how much money should be kept in the checking account A marble statute is exposed to the weather, within a few years in order for a public opinion poll to accurately generalize to the entire population, the survey must How does the structure of the female reproductive system differ from the male reproductive system? Consider the following question with regard to Cournet model. P = 60-Q, Where Q = Q1 +Q2, and assume MC = 0. (a) : Find out Nash Equilibrium Price and quantity (b) : Also Explain What will happen if both firm collide with each other, in terms of Price and quantity? . A population of N = 100 scores has mean = 30 and standard deviation = 4. Whatis the population variance?A) 2B) 4C) 8D) 16 cellular respiration .help with chart read the passageHow does the symbol of the statue and ts magery contribute to the meaning ofOxymandias Use evidence trom the text to support your responseOur response should be at least two complete paragraphs. Why did George Washington develop a Cabinet during his presidency?It was required by the Constitution.He needed people to spy on powerful state governors.He was fulfilling a campaign promise to his constituents that he would delegate powers.He understood that there were people with more expertise in areas needed to run the government. A four pack of batteries costs $3.45. A six pack of batteries costs $4.80. Which is a better deal? Unit price. I'd really appreciated it if you could help Diseconomies of scale exist for all of the following reasons except: a.failures in information flows b.firm size is too smallc. bureaucratic inefficienciesd. organizational problems.e. management problems. PLz need help fastIn The Tragedy of Macbeth, Act II, Scene ii, Lady Macbeths purpose in drugging the servants is a. so they will commit King Duncans murder. b. so they will sleep through King Duncans murder. c. to erase their memory of the night. d. to kill them for their knowledge of the crime.