if you were a database administrator, why might you need several user?

Answers

Answer 1

As a database administrator, you might need several users because of the following reasons:

1. Access control: Having multiple users allows you to set different access levels and permissions for each user. This ensures that each user only has access to the data and functionality they require to perform their tasks, helping to maintain the security and integrity of the database.
2. Task delegation: In large organizations, a single database administrator might not be able to handle all the tasks related to maintaining and managing the database. By creating multiple users, you can delegate tasks to other team members, increasing efficiency and productivity.
3. Audit trails: With multiple users, you can track changes and actions taken by each user, which helps to create a clear audit trail. This can be useful for identifying the source of issues or errors and resolving them quickly.
4. Personalization: Each user can have personalized settings and preferences within the database system, making it easier for them to work with the data and tools they need.
5. Collaboration: When multiple users are working on the same project or database, they can collaborate more effectively by sharing data and resources.

In summary, having several users as a database administrator is important for access control, task delegation, audit trails, personalization, and collaboration.

Learn more about database here:

https://brainly.com/question/30981090

#SPJ11


Related Questions

which application guard settings need to be configured so that any non-corporate approved resources can be accessed using application guard?

Answers

To configure Application Guard settings for accessing non-corporate approved resources, you'll need to adjust certain settings in Windows Defender Application Guard (WDAG). WDAG is a security feature.

in Windows 10 that uses virtualization to create a secure, isolated environment for running potentially risky tasks or browsing non-corporate approved websites. To set up WDAG to allow access to non-corporate approved resources, follow these steps:
1. Windows Defender Application Guard: First, make sure WDAG is enabled on your device. You can do this through Group Policy, Intune, or System Center Configuration Manager.
2. Configure network isolation settings: Specify which domains are considered corporate resources by creating a list of allowed domains. This ensures that non-corporate approved resources are opened in an isolated container.
3. Adjust Application Guard policies: Customize policies to meet your organization's requirements, such as allowing clipboard access, printing, and file downloads from the isolated container. This can be done through Group Policy or MDM (Mobile Device Management) tools like Intune.
4. Configure Application Guard for Microsoft Edge: Configure Edge settings to launch WDAG automatically when browsing non-corporate approved websites. This can be done through Edge's Group Policy settings or MDM tools.
By configuring these settings, you'll create a secure environment that allows access to non-corporate approved resources while minimizing the risk of potential threats.

Delegation of credentials for RDP connections via GPO is possible. Windows by default enables the user to save her RDP connection's password. To accomplish this, the user must open the Remote Desktop Connection (mstsc.exe) client window, input the RDP machine name and user name, and check the Allow storing credentials box.

Learn more about Windows Defender Application Guard here

https://brainly.com/question/30633165

#SPJ11

Lab Goal : This lab was designed to teach you how to use a matrix, an array of arrays. Lab Description: Read in the values for a tic tac toe game and evaluate whether X or O won the game. The first number in the files represents the number of data sets to follow. Each data set will contain a 9 letter string. Each 9 letter string contains a complete tic tac toe game. Sample Data : # of data sets in the file - 5 5 XXXOOXXOO охоохохох OXOXXOX00 OXXOXOXOO XOXOOOXXO Files Needed :: TicTacToe.java TicTacToeRunner.java tictactoe. dat Sample Output : X X X оох хоо x wins horizontally! algorithm help охо охо хох cat's game - no winner! The determine Winner method goes through the matrix to find a winner. It checks for a horizontal winner first. Then, it checks for a vertical winner. Lastly, it checks for a diagonal winner. It must also check for a draw. A draw occurs if neither player wins. You will read in each game from a file and store each game in a matrix. The file will have multiple games in it. охо XXO хоо o wins vertically! O X X охо хоо x wins diagonally!

Answers

`TicTacToe.java` and `TicTacToeRunner.java`. Implement the `determine Winner` method in `TicTacToe.java` to check for a horizontal, vertical, and diagonal winner in a 2D character array. In `TicTacToeRunner.java`, handle file input and output, read the number of data sets, iterate over each game, call `determine Winner`, and print the results. Compile and run `TicTacToeRunner.java`, providing the correct input file name (`tictactoe.dat`), and verify the output matches the expected sample output.

How can you determine the winner of a tic-tac-toe game stored in a file using a matrix in Java?

To solve the lab and determine the winner of a tic-tac-toe game stored in a file using a matrix, follow these steps:

1. Create two Java files: `TicTacToe.java` and `TicTacToeRunner.java`.

2. In `TicTacToe.java`, define a class `Tic Tac Toe` with a static method `determine Winner` that takes a 2D character array as input.

3. Inside `determine Winner`, check for a horizontal, vertical, and diagonal winner, and return the winning symbol with the corresponding message.

4. If no winner is found, return "cat's game - no winner!".

5. In `TicTacToeRunner.java`, handle file input and output.

6. Read the number of data sets from the file and iterate over each game.

7. Read the 9-letter string representing the tic-tac-toe game and store it in a 2D array.

8. Call `determine Winner` for each game and print the game board and the result.

9. Compile and run `TicTacToeRunner.java`, providing the correct input file name (`tictactoe.dat`).

10. Verify the output matches the expected sample output provided in the lab description.

Learn more about determine Winner

brainly.com/question/30135829

#SPJ11

Tim is trying to explain to his aunt how her computer works, but she does not understand what a CPU does. Which description will most likely help Tim’s aunt understand the CPU’s role?

Answers

Answer:

CPU is considered as the brain of the computer. CPU performs all types of data processing operations. It stores data, intermediate results, and instructions (program). It controls the operation of all parts of the computer.

Explanation:

Answer:

The CPU processes commands from software.

Explanation:

Learned on edge

Queries are a very useful object in a database, please explain why.

Answers

Answer:

they tell the producer what to do to make their website better

Explanation:

Lệnh nào dùng để mở hộp thoại Format cells?

Answers

Answer: Huh i don't understand

Explanation:

which tool is used to terminate cables into a 66-block

Answers

Answer: Circuit pairs are connected to the block with a punch-down tool by terminating the tip wire on the leftmost slot of one row and ring wire on the leftmost slot of the row beneath the mating tip wire.

What can cause camera shock?

Answers

The flash of the camera

A name given to a spot in memory is called:

Answers

Answer:

Variable

Explanation:

I'll answer this question in computing terms.

The answer to this question is a variable. Variable can be seen as memory location or spots.

They can be compared to the containers (in real world). Variables are used to store values same way containers are used to store contents.

In computing, a variable must have a

NameTypeSizeetc...

where would I put a semicolon in a line of javascript code

Answers

When writing code in JavaScript, it is common to use semicolons as a means of dividing individual statements.

How to add the semicolon?

Usually, to end a statement in programming, one would use a semicolon at the completion of a line of code. JavaScript has a mechanism known as automatic semicolon insertion (ASI) that allows for the omission of semicolons under specific circumstances, as the interpreter will add them automatically.

If you want to ensure correct syntax and make your code more readable, you can place a semicolon at the end of each line.

An example:

var x = 5;

console.log(x);

In this case, the semicolon is placed after the assignment statement var x = 5; and after the console.log(x); statement.

Read more about javascript here:

https://brainly.com/question/16698901

#SPJ1

can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)

Answers

Yes









Because you didn’t block them
Yeah you can since they aren’t blocked

Most computer processors today have _________________ as one of the instructions that the alu can perform in hardware.

Answers

Most computer processors today have a wide range of instructions that the Arithmetic Logic Unit (ALU) can perform in hardware.

These instructions are the fundamental operations that the processor can carry out, such as addition, subtraction, multiplication, and division. They are built into the processor's design and are executed directly in the ALU.

For example, let's consider the instruction "add." This instruction allows the ALU to take two numbers as inputs, perform the addition operation, and provide the sum as the output. Similarly, the "subtract" instruction performs subtraction, the "multiply" instruction performs multiplication, and the "divide" instruction performs division.

The availability of these instructions in hardware makes the processor capable of performing complex calculations and executing various tasks efficiently. By having these instructions built directly into the ALU, the processor can process data quickly and accurately, which is crucial for the functioning of a computer.

In summary, most computer processors today have a wide range of instructions that the ALU can perform in hardware. These instructions enable the processor to carry out arithmetic and logical operations, which are essential for various computational tasks.

To know more about Arithmetic Logic Unit, visit:

https://brainly.com/question/14247175

#SPJ11

fix the code :)
- # - description of lesson lesson (3.05)

def main():
print("This progam will display a story for you")
print
person = input("Please give me a celebrity name")
setting = input("Please give me your favorite place to go")
time = input("Please give me a time of year")
item = input("please give me the name of your favorite food")
print("Once there was a person by the name of " + person + " who was visting the " + setting + " ." + " decide that
because of quarantine it was so boring and being that it was " + time + " it was time to go eat " + item + ".")

Answers

def main():

   print("This progam will display a story for you")

   person = input("Please give me a celebrity name ")

   setting = input("Please give me your favorite place to go ")

   time = input("Please give me a time of year ")

   item = input("please give me the name of your favorite food ")

   print("Once there was a person by the name of " + person + " who was visting the " + setting + " ." + " decide that because of quarantine it was so boring and being that it was " + time + " it was time to go eat " + item + ".")

main()

You have to indent everything inside the main function and then call the main function. The code runs find after that.

Answer:

def main():

  print("please answer all the qustions for this to work")

  person = input("Please give me your name example ryland")

  setting = input("Please give me where you are example house ")

  time = input("Please give me the time example 12:00 ")

  item = input("please give me the name of your favorite food example tacos ")

  print("Once there was a person who was called " + person + " who was at there " + setting + "." + "  At " + time + " you got hungry it was time to go eat " + item + ")

main()

Explanation:

Hope dis works

jessica has pinned her favorite applications as icons on her desktop .she always clicks on these icons to work them .which user interface is she using here?

Answers

Answer:

Graphical User Interface

Explanation:

Although not an exact equivalent, the first column in a vlookup table_array serves a role that is similar to what database concept?.

Answers

It is most similar to a database primary key.

The first column in a vlookup table_array serves a role that is similar to the concept of A key

What is VLOOKUP?

This is known to be one of the most flexible way to get back data that is often use through the VLOOKUP function.

This is one that shows the value a person want to lookup in a tableThe term VLOOKUP searches for any kind of matching value in the leftmost column of the table, and then gets it back that is that same value in the same row.

Learn more about VLOOKUP  from

https://brainly.com/question/20566143

How many outputs are required for a circuit that multiplies a 3-bit number by a 4-bit number? a 6 b 10 c. 8 d. 5

Answers

The outputs that are required for a circuit that multiplies a 3-bit number by a 4-bit number is 8.

A bit is a unit of digital information that can be stored, transmitted, or processed. The bit is the most basic unit of information in digital computing and communications. The bit's name is derived from the phrase "binary digit," which refers to its binary number system representation. The smallest data unit in a computer is one bit.

Multiplication is a mathematical process in which we combine two or more quantities to get a total or product. A circuit that multiplies a 3-bit number by a 4-bit number requires 8 outputs. As a result, the correct option is c. 8.

You can learn more about 3-bit number at

https://brainly.com/question/15598540

#SPJ11

find the last digit of the following numbers. any solutions which do not show how the answer was computed by hand will receive no credit.a.) 31690b.) 2110

Answers

The last digit of 3¹⁶⁹⁰ is 9 and the last digit of 2¹¹⁰ is 4. The last digit of this type of numbers can be obtained by list out the initial expansions of a power to determine a pattern.

(a)

To find the last digit of the number 3¹⁶⁹⁰, we need to look at the pattern of the last digit when 3 is raised to successive powers as shown below;

3¹ = 3 (last digit is 3)3² = 9 (last digit is 9)3³ = 27 (last digit is 7)3⁴ = 81 (last digit is 1)3⁵ = 243 (last digit is 3)3⁶ = 729 (last digit is 9)3⁷ = 2187 (last digit is 7)3⁸ = 6561 (last digit is 1)

We can observe that after every fourth power, the last digit repeats (3, 9, 7, 1, 3, 9, 7, 1, …). Therefore, we need to divide 1690 by 4 to find the remainder.

1690 ÷ 4 = 422 remainder 2. So the last digit of 3¹⁶⁹⁰ is the same as the second power in the pattern above, which is 9.

Therefore, the last digit of 3¹⁶⁹⁰ is 9.

(b)

To find the last digit of 2¹¹⁰, we also need to look at the pattern of the last digit when 2 is raised to successive powers as shown below;

2¹ = 2 (last digit is 2)2² = 4 (last digit is 4)2³ = 8 (last digit is 8)2⁴ = 16 (last digit is 6)2⁵ = 32 (last digit is 2)2⁶ = 64 (last digit is 4)2⁷ = 128 (last digit is 8)2⁸ = 256 (last digit is 6)2⁹ = 512 (last digit is 2)2¹⁰ = 1024 (last digit is 4)

We can observe that after every fourth power, the last digit repeats (2, 4, 8, 6, 2, 4, 8, 6, …). Therefore, we need to divide 110 by 4 to find the remainder.

110 ÷ 4 = 27 remainder 2. So the last digit of 2¹¹⁰ is the same as the second power in the pattern above, which is 4.

Therefore, the last digit of 2¹¹⁰ is 4.

The numbers in the question should be:

a.) 3¹⁶⁹⁰b.) 2¹¹⁰

To learn more about digit: https://brainly.com/question/2041524

#SPJ11

in python, given x = 10, x = x 1 is a not a legal statement. group of answer choices true false

Answers

The statement "x = x 1" is not a legal statement in Python and this is easily explained.

Why is this not a legal statement in Python?

In Python, the phrase "x = x 1" is an invalid statement.

The reason for this limitation in Python is that variable names are not allowed to have any spaces or special characters, including the numeral 1.

To name a variable correctly, it is necessary to begin with a letter or underscore and include only letters, numbers, and underscores.

Therefore, the accurate response is incorrect.

Read more about python programs here:

https://brainly.com/question/26497128

#SPJ4

How do I change the Java runtime class file version?

Answers

To change the Java runtime class file version, use the Java Compiler with the -target option and specify the desired version number.

What is Java?
Java is a general-purpose, high-level programming language developed by Sun Microsystems (now owned by Oracle Corporation) in the mid-1990s. It is designed to be platform-independent and has gained popularity due to its ability to run on any operating system that supports the Java Virtual Machine (JVM). Java is object-oriented, class-based, and has a syntax similar to that of C++. It is commonly used for developing applications, web and mobile applications, games, and enterprise software. Java also has a large standard library, which provides a wide range of pre-built functionality for developers to use.



To change the Java runtime class file version, you can use the Java Compiler (javac) with the -target option. Here are the steps:

1) Open the command prompt or terminal and navigate to the directory that contains the Java source code file (.java) you want to compile.

2) Type the following command to compile the source code file and specify the target class file version (replace "version" with the desired version number, such as 1.8, 1.7, etc.):

javac -target version filename.java

3) If the compilation is successful, a new class file with the specified version will be created in the same directory as the source code file.

Note that the target version must be compatible with the installed Java Development Kit (JDK) version on your computer. If you don't specify a target version, the default version of the installed JDK will be used.

To know more about programming languages visit:
https://brainly.com/question/30438620
#SPJ1

consider a packet of 4000 bytes (including 20 bytes ip header and 3980 data bytes) that must pass a link with maximum transfer unit (mtu) being 1500 bytes. let x be the 16-bit identifier of the packet. how many fragments will this packet be divided into? give the values of the following fields in the ip header of each fragment packet: length, identifier, fragflag, and offset. (hint: check the pages of ip fragmentation in chap4-5.pptx)

Answers

This process of fragmentation allows packets to be Transmitted across a network despite the limitations of the maximum transfer unit.

When a packet of 4000 bytes with an IP header of 20 bytes and 3980 bytes of data is transmitted through a link with a maximum transfer unit (MTU) of 1500 bytes, it will need to be fragmented into multiple packets. The maximum size of each fragment will be 1480 bytes (1500 - 20 bytes of IP header).

To determine the number of fragments, we first need to calculate the total number of bytes that need to be transmitted (including the IP header). This would be 4020 bytes (4000 + 20 bytes of IP header). Next, we divide this number by the MTU size of 1500 bytes to get the number of fragments required. This comes out to be 3 fragments.

The first fragment will have the length field set to 1500, the identifier field will be set to x, the flag field will be set to 1 (indicating that this is the first fragment), and the offset field will be set to 0.

The second fragment will have the length field set to 1500, the identifier field will be set to x, the flag field will be set to 1 (indicating that this is the second fragment), and the offset field will be set to 1480 (since the first fragment has already taken up the first 1480 bytes of the original packet).

The third fragment will have the length field set to 1040, the identifier field will be set to x, the flag field will be set to 0 (indicating that this is the last fragment), and the offset field will be set to 2960 (since the first two fragments have already taken up the first 2960 bytes of the original packet).

Overall, this process of fragmentation allows packets to be transmitted across a network despite the limitations of the maximum transfer unit. Each fragment is still able to carry all the necessary information and can be reassembled at the destination to form the original packet.

To Learn More About Transmitted

https://brainly.com/question/30244668

SPJ11

A deleted view can be recovered by account administrators within how many days?356595125

Answers

A deleted view can be recovered by account administrators within  Tableau Server allows deleted views to be recovered by account administrators within 28 days (4 weeks) of deletion.

This can be done by going to the "Deleted" tab in the "Views" page and selecting the view to be recovered. After selecting the view, the administrator can click on the "Restore" button to recover the view. If the view was deleted more than 28 days ago, it cannot be recovered and will need to be recreated. A deleted view can be recovered by account administrators within  28 days (4 weeks) of deletion.

learn more about administrators    here:

https://brainly.com/question/5958460

#SPJ11

A graphic that arranges data in columns and rows, allowing you to read down or across to see different relationships, is a __________.

Answers

A graphic that arranges data in columns and rows, allowing you to read down or across to see different relationships, is called a table.

Tables are a common way to organize and present data in a structured format. They consist of rows, which represent individual records or observations, and columns, which represent different attributes or variables.

Tables are widely used in various fields, including scientific research, business, finance, and data analysis. They provide a concise and organized representation of data, making it easier to compare and analyze information.

Tables can accommodate different types of data, such as numerical values, text, dates, or categorical variables.

When reading a table, you can follow the rows to examine specific records or observations, or you can scan across the columns to compare values for different variables.

Tables often include headers for each column, providing labels or descriptions for the data within. This helps users understand the content and meaning of the information presented.

In summary, tables are a valuable tool for organizing and displaying data in a structured format, allowing users to explore relationships and patterns by reading down or across the rows and columns.

For more such questions on graphic,click on

https://brainly.com/question/28807685

#SPJ8

Amelia has two presentations open and wants to view them at the same time. She can click the _____ button on the View tab.

Answers

Or she can do alt+tab

Amelia has to presentation open and can do work on them at the same time by use of the alt+tab view tab.

What is a presentation?

A presentation is a  Microsoft office software issued for presenting the top to the audience and masses. It can be informative, structured and brief. The presentation can be persuasive and decision-making.

The presenter needs to keep track of time and hence need to open two presentations the can do this by making use of the view tab that is alt+tab.

Find out more information about the presentations.

brainly.com/question/9624547

This feature allows you to adjust your view to see the lower and upper part of a document

Answers

Scroll bar i hope this helps :D

Answer: scroll bar

Explanation: It allows you to change your view from side to side and up and down

:D

The _____________________ is a standardized assessment instrument that can be used for program planning and is also used in several states as a data collection tool for case mix reimbursement to ICF/IID organizations.

Answers

The "Minimum Data Set (MDS)" is a standardized assessment instrument used for program planning and case mix reimbursement to ICF/IID organizations.

The Minimum Data Set (MDS) is a comprehensive assessment tool used in healthcare settings, particularly in Intermediate Care Facilities for Individuals with Intellectual Disabilities (ICF/IID). It serves multiple purposes, including program planning and resource allocation. Additionally, in several states, the MDS is utilized as a data collection tool for case mix reimbursement to ICF/IID organizations. This means that the assessment data collected through the MDS is used to determine the level of care and funding provided to these organizations based on the complexity and needs of the individuals they serve. The MDS helps standardize the assessment process and ensures accurate data collection for various purposes in the healthcare field.

To know more about Minimum Data Set click the link below:

brainly.com/question/28403817

#SPJ11

As the different network types have evolved, careers in the Network Systems pathway
have changed over time. Discuss an example of how network system careers have
changed and how those changes have impacted society.

Answers

A network of computers known as a local area network, or LAN, is set up within a boundary, such as a building complex, office, or residential neighborhood. Alternatively, a wide-area network (WAN) is a kind of computer network.

What is a local area network?A local area network (LAN) is made up of several computers that are connected to create a network in a certain area. LANs use TCP/IP ethernet or Wi-Fi to connect the computers.An institution, like a school, office, association, or church, will typically be the only one to use a Network.A local area network (LAN) is a type of computer network that links computers that are near one another, such as those in a home, business building, school, lab, or university campus. A local area network is known as LAN. A LAN is a network that is contained inside a specific geographic region, typically a single building and is distinguished from a network by the number of linked computers it consists of.

To learn more about local area network, refer to:

https://brainly.com/question/8118353

Which of these purchases is most likely to be paid for with a credit card
A. Soda
B. Lotto ticket
C. Parking fee
D. Plane ticket

Answers

Answer:

plane ticket?

Explanation:

With _________, it is easy to target a specific geographic location. Which answer completes the blank in the sentence?
A- Television advertising
B- internet marketing
C- mail marketing
D- newspaper marketing

Answers

It depends how specific of a geographic location you want, mail marketing would be the most geographic specific since you are literally addressing it to peoples doors and you can pick what specific addresses receive the ad (then followed by local newspaper, then local television network, then followed by internet marketing, which can only base it off of IP address but that’s not always super accurate)

television advertising

Explanation:

without adjusting the column widths, guarantee that all columns will print on one page.

Answers

You can try the following parameters to make sure that all columns will print on one page without changing the column widths: Margin adjustments, Lower the font size, Alter the orientation.

In many different kinds of documents, including newspapers, magazines, and reports, columns constitute a basic design component. They offer a framework that divides text into vertical pieces to make it simpler to read and comprehend. Designers can experiment with space, hierarchy, and balance by utilising columns to create various layouts and designs. Also, when there is a lot of content to be presented, columns can help conserve space on a page. To create a layout that is both aesthetically pleasing and useful, considerations like the number of columns, the width of each column, and the spacing between columns must be made.

Learn more about columns here:

https://brainly.com/question/14511970

#SPJ4

50 POINTS!!!! What is HpseuHostLauncher, and can I disable it without any major impact on my laptop?

Answers

Answer:

????????

Explanation:

The _____________ command is used to stop the FOR...NEXT loop prematurely.​

Answers

Answer:

The exit command is used to stop the FOR...NEXT loop prematurely

Other Questions
Choose the best spanish word to complete the sentence. no me _____________. (don't follow me.) seguir = to follow sigue sigas sigo sigamos Earliest sedimentary structure discovered providing clear evidence of life: colin buys a box of pasta that contains 8 2/3 cups of pasta. he uses 2 1/2 cups to make dinner. how much pasta is left? Someone help me pls! Ill give brainliest!!Since the theme for the facts for February is mathematics, Clarita suggests that they write formal definitions of the three rigid-motion transformations they have been using to create the images for the flip-book animation. Carlos and Clarita used these words and phrases in their definitions: perpendicular bisector, center of rotation, equidistant, angle of rotation, concentric circles, parallel, image, pre- image, preserves distance and angle measures within the shape. Use the same words to complete the following definitions. A. A translation of a set of points in a plane. B. A rotation of a set of points in a plane. C. A refelctions of a set of points in a plane. D. Translations, rotations, and reflections are rigid motion transformations because solve and awnser and show steps Discuss the philosophy and benefits of concurrentengineering covering DFA/DFMplease do it in 30 minutes please urgently withdetailed solution... I'll give you up thumb Who is the Prime Minister of Europe need help asap! im confused, i dont get the question. Find x, if 3/7 of x is equal to 21. cells that can become any cell type except placenta are said to be what? What is the probability of rolling a 3 on a six-sided cube AND rolling a 6 on a six-sided cube?ob How many solutions does the equation || 2x 3 |- M |= M? The following reactionKBr + Mg --> awill occur because Mg is more active than K bwill not occur because Mg is more active than K cwill occur because K is more active than Mg dwill not occur because K is more active than Mg For which reason did the United States invade Afghanistan after September 11, 2001, attacks?A) to fight terrorisim by removing Taliban from powerB) to take over and claim Afghanistan as American territory C) to take full control of all of the Middle Easts oil supplyD) the negotiate terrorists and help al-Qaeda with supplies 15=-3(2c+d) solve for c As a general rule, the greatest vulnerability to _____ occurs during the _____ period of prenatal development. What types of organisms containchloroplasts in their cells?A. photosynthetic organismsB. all organismsC. only aquatic organisms You push on a box and are unable to move it. Whatforce opposes your push?Static frictionSliding frictionRoling frictionAir resistance Help please I don't understand how to do it Thinking about our nutritional needs and feeding behavior, propose an evolutionary explanation for why amylase, unlike other digestive enzymes, is secreted into the mouth.