what is the full path to the directory which contains the scripts (or links to the original scripts) to run while the system boots to sysv-init runlevel 2?

Answers

Answer 1

In sysop-unit run level 2, the directory that contains the scripts or links to the original scripts that run during system boot can be found in the /etc/rc2.d/ directories. This directory is part of the system's initialization process and contains the necessary scripts to initialize various services and programs on boot.



The rc2.d directory contains symbolic links to the actual scripts located in the /etc/init.d/ directory. These scripts are responsible for starting and stopping various system services, such as networking, SSH, and cron. The scripts in the /etc/rc2.d/ directory are executed in alphabetical order, and their execution is controlled by the run level.

The run level is a state that the system enters during boot-up or shutdown, and it determines which services should be started or stopped. Run level 2 is a multi-user mode with a graphical interface, and it is the default run level in most Linux distributions.

To check which services are started during run level 2, you can run the command "ls /etc/rc2.d/". This will display a list of symbolic links to the scripts that run during the boot process. The scripts that start with the letter "S" are executed during boot, and those that start with the letter "K" are executed during shutdown.

In summary, the full path to the directory that contains the scripts or links to the original scripts to run during sysv-init run level 2 can be found in the /etc/rc2.d/ directory. These scripts are responsible for starting and stopping various system services during the boot process, and their execution is controlled by the run level.

For such more question on directories

https://brainly.com/question/28391587

#SPJ11


Related Questions

A piece of copper metal is initially at 100.0 ∘
C. It is dropped into a coffee cup calorimeter containing 50.0 g of water at a temperature of 20.0 ∘
C. after stirring, the final temperature of both copper and water is 25.0 ∘
C. Assuming no heat losses, and that the specific heat of water is 4.18 J/g 0
C, what is the heat capacity of the copper? none of these choices is correct 2.79 13.9 3.33 209

Answers

To find the heat capacity of the copper, we can use the principle of heat transfer. The heat lost by the copper is equal to the heat gained by the water.

First, we need to calculate the heat gained by the water using the formula:

Q = m * c * ΔT

Where:

Q is the heat gained by the water

m is the mass of the water (50.0 g)

c is the specific heat of water (4.18 J/g°C)

ΔT is the change in temperature of the water (final temperature - initial temperature)

ΔT = 25.0°C - 20.0°C = 5.0°C

Q = 50.0 g * 4.18 J/g°C * 5.0°C = 1045 J

Since the heat lost by the copper is equal to the heat gained by the water, the heat capacity of the copper can be calculated as:

Q = m * c * ΔT

Rearranging the equation, we get:

Copper heat capacity = Q / ΔT = 1045 J / 5.0°C = 209 J/°C

Therefore, the heat capacity of the copper is 209 J/°C.

To know more about heat transfer visit-

https://brainly.com/question/31778162?referrer=searchResults

#SPJ11

whats happens when you add the numbers 1 and 1 together (1+1)
11
32
2
9

Answers

Answer:

2

Explanation:

The mathematical answer would be 2. To get 11, one would simply put the 1's next to each other but there is an addition symbol. 32 is an irrational number to think of for an answer because there are no other numbers to add or multiply with the 1's to achieve 32. 9 is also irrational for the same reason.

who is the impostor​

Answers

Red is sus. I saw him vent!!!!!!!!!
The imposter is Yellow he is always sus

what is an rfid tag device made up of? group of answer choices battery, reader. chip, antenna. chip, reader. battery, antenna.

Answers

An integrated circuit (IC), an antenna, and a substrate make up RFID tags. The RFID inlay is the area of an RFID tag that encodes personal data. RFID tags can be Active RFID or Passive RFID.

What RFID tag device made up of?

The chip and antenna are often mounted on a PET or paper substrate, with the antenna being formed of etched copper, aluminium, or conductive ink.

An aluminium or carbon fiber layer is used in an RFID-blocking wallet to prevent the electromagnetic signal that is sent by your card. It functions as a Faraday cage, the wallet.

Therefore, It blocks electromagnetic signals and erects a barrier. Whether you have or have not used a contactless payment card, the industry has expanded quickly.

Learn more about tag device here:

https://brainly.com/question/13133908

#SPJ1

a researcher wants to conduct a secondary analysis using a centers for disease control (cdc) database of prostate cancer patients that was collected by the agency. the researcher was not part of the original database creation and the database was originally created to monitor public health and not for research purposes. the database is publicly available. the database does not include any identifiers. consent from the patients is not required because

Answers

Consent from the patients is not required because the database is publicly available.

What is HIPAA?

HIPAA is an abbreviation for Health Insurance Portability and Accountability Act. It was a bill that was enacted by the 104th U.S Congress and signed by President Bill Clinton in 1996, as a federal law to protect sensitive patient health information (PHI) from being disclosed to third-parties without their knowledge, approval (consent) or use and payment of health care insurance for employees.

What is PHI?

PHI is an abbreviation for protected health information and it can be defined as any form of patient health information that mustn't be disclosed without the patient's knowledge, approval (consent) or used for the payment of health care insurance for employees.

In this context, we can reasonably infer and logically deduce that consent or approval from the patients is not required because the database is publicly available.

Read more on PII here: brainly.com/question/24439144

#SPJ1

Typically, in a star schema all ________ are given a simple, non-composite system-generated primary key, also called a surrogate key.

Answers

Typically, in a star schema all dimensions are given a simple, non-composite system-generated primary key, also called a surrogate key.  .

In a star schema, dimensions represent the descriptive attributes of a business process or entity. These dimensions are usually given surrogate keys .

which are artificial keys that are system-generated and used as unique identifiers for each dimension record. Surrogate keys provide a simple and efficient way to identify and relate dimension records in the star schema.

To know more about dimension visit:

https://brainly.com/question/33946851

#SPJ11

what is definition of LAN network?​

Answers

A local area network is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building

Hailey was working on a multimedia presentation that included both video and audio files. The file was huge, and she wanted to send it to her coworker in another office. She needed to reduce the size of the file so that it could be transmitted faster. The utility she used to do this was _____.

Answers

Answer:

a compression software such as WinRar

Explanation:

The utility she used to do this would have been a compression software such as WinRar. This software compresses large files or various files into a single ZIP or RAR file. This compressed file is much smaller than the original files that it contains, which is accomplished through a compression algorithm. This can also be encrypted with a password so that only specific individuals with access can open the file. Once unzipped or extracted, the original files are obtained in its original size.

Which objective of secure communications is achieved by encrypting data?

Answers

Encrypting data is an essential part of secure communications and serves several objectives. The primary objective of encrypting data is confidentiality, which means that only authorized users can access and read the data.

Encryption makes the data unreadable to unauthorized users, as it scrambles the data into a code that can only be decrypted using a key or password known only to authorized users. Encryption also ensures data integrity by preventing unauthorized users from modifying or tampering with the data during transmission or storage. The encrypted data cannot be altered without the knowledge of the authorized user, ensuring that the data remains accurate and reliable. This is particularly important for sensitive data such as financial transactions, personal identification, and medical records.

Additionally, encrypting data can help ensure authenticity by providing a means of verifying the identity of the sender and recipient. Encryption can be used to create digital signatures that allow users to authenticate their identity and verify the integrity of the data they receive. This objective of secure communications is important in situations where the authenticity of the data is critical, such as in online banking, e-commerce, and government transactions. In summary, encrypting data is an essential objective of secure communications as it helps to maintain confidentiality, data integrity, and authenticity, making it a critical tool for safeguarding sensitive information in today's digital age.

Learn more about e-commerce here-

https://brainly.com/question/31260442

#SPJ11

What network problems can be solved on your
end?

Answers

write a python program to initialize the value of two variables then find sum

Answers

Answer:

JavaScript:

Let x = 10

Let y = 10

Console.log(x + y)

//outputs 20

C++:

Let x = 10

Let y = 10

The file is Math.cpp so,

std::cout << "" + y + "" + x

g++ Math.cpp -o Maths

./Maths

//Outputs 20

Answer:

#Ask the user for a number

a = int(input("Enter a number: "))

#Ask the user for a number

b = int(input("Enter a number: "))

#Calculate the sum of a and b

sum = a + b

#print the ouput

print(str(a) + " + " + str(b) + " = " + str(sum))

To step through a program, what status indicator light needs to be on?

Answers

Answer: It should always stay on normal

Explanation:

Hope this helped :)

What are 3 customizations that can be done using the header/footer section in the customize reports tray?.

Answers

The 3 customizations that can be done using the header/footer section are:

One can customize a given data,Also add or delete columns.Also add and also remove information.

What is the function about?

A person can customize and also personalize the font and style of the report through the use of the header/footer section in the customize reports tray.

Therefore, The 3 customizations that can be done using the header/footer section are:

One can customize a given data,Also add or delete columns.Also add and also remove information.

Learn more about header/footer  from

https://brainly.com/question/14379814

#SPJ1

all mortgage companies are willing to loan anyone money regardless of credit scores. True or false?

Answers

Your credit reports and scores will be taken into consideration by lenders when deciding whether you qualify for a loan and what interest rate to offer you.You can have problems getting a loan if your credit report contains mistakes.So, check your credit right away.

Should you check your credit score before applying for a mortgage?

Although a credit score as low as 500 may be acceptable, there are still a number of other conditions to be met before you can receive an FHA loan guarantee.Mortgage insurance, a 10% down payment (or 3.5% if your credit score is above 580), and a monthly payment are all requirements for these loans. When you apply for a traditional loan, it is advised that your credit score be 620 or above.Lenders may not be able to approve your loan or may be forced to offer you a higher interest rate, which could mean higher monthly payments, if your credit score is below 620. A higher score may make you eligible for lower mortgage interest rates and fees because it gives a lender more assurance that you will make payments on time.If you have a great credit score, some lenders may also lower their down payment requirements. By comparing interest rates and costs from lenders who offer loans made for consumers with weak credit, you can obtain a loan despite having a low credit score.And even better, think about repairing your credit before you apply for a loan so you may get better conditions.

       To learn more about mortgage refer

     https://brainly.com/question/1318711  

      #SPJ1

pls help
Question 2 (1 point)
True or false: when you use someone's copyrighted work in something you are
selling, you only have to cite them.

Answers

The given statement of copyrighted work is false.

What do you mean by copyright?

A copyright is a type of intellectual property that grants the owner the exclusive right to copy, distribute, adapt, display, and perform a creative work for a specific period of time. The creative work could be literary, artistic, educational, or musical in nature. The purpose of copyright is to protect the original expression of an idea in the form of a creative work, not the idea itself. A copyright is subject to public interest limitations, such as the fair use doctrine in the United States.

When you use someone's copyrighted work in something you are selling, you must get their permission first.

To learn more about copyright

https://brainly.com/question/357686

#SPJ13

Unauthorized use of information, materials, devices, or practices in completing academic activities is generally considered:

Answers

Answer: Cheating

Explanation: Cheating involves unauthorized use of information, materials, devices, sources or practices in completing academic activities. For example, copying during an exam that should be completed individually is an unauthorized practice, and, therefore, is considered cheating.

Answer:

cheating

Explanation:

Cheating involves unauthorized use of information, materials, devices, sources or practices in completing academic activities. For example, copying during an exam that should be completed individually is an unauthorized practice, and, therefore, is considered cheating

Describe the home keys

Answers

The home keys are where you place your fingers when you are learning to type. The home keys include F, D, S, and A on the left of the keyboard, and J, K, L, and ; (semicolon) on the right of the keyboard.
The home row keys are the row of keys on the computer keyboard you’re fingers rest on when not typing.

Federico is using diagrams in a PowerPoint presentation for his science project. He needs to draw four different circles on one slide. Although the circles should be different sizes, none of them should be stretched like an oval. They must be perfectly round circles.

Which sequence of buttons and keys should Federico press to draw a perfectly round circle?

A. click Design tab → click Shapes in the Drawing group → press and hold Shift → select Oval while holding Shift → left-click on the slide and drag the mouse while still holding Shift

B. click Home tab → click Shapes in the Drawing group → select Oval → press and hold Shift → left-click on the slide and drag the mouse while holding Shift

C. click Design tab → click Shapes in the Drawing group → select Oval → press and hold Shift → right-click on the slide and drag the mouse while holding Shift

D. click Home tab → press and hold Shift → click Shapes in the Drawing group → select Oval while holding Shift → right-click on the slide and drag the mouse while still holding Shift

Answers

Answer:

b

Explanation:

click Home tab → click Shapes in the Drawing group → select Oval → press and hold Shift → left-click on the slide and drag the mouse while holding Shift.

What is Powerpoint Presentation?

A complete presentation graphics suite is PowerPoint. It provides you with everything required to create a presentation that looks polished. Word editing, outlining, sketching, graphing, and presentation management tools are all available in PowerPoint, all of which are simple to use and pick up.

The slides that make up a PowerPoint presentation are what the presentation is built of. The PowerPoint slides you produce can also be shown as overhead transparencies or 35mm slides.

You can print audience handouts, outlines, and speaker's notes in addition to the slides. The robust Slide Master, which will be discussed in the tutorial, can format any slide in a presentation.

Therefore, click Home tab → click Shapes in the Drawing group → select Oval → press and hold Shift → left-click on the slide and drag the mouse while holding Shift.

To learn more about Powerpoint presentation, refer to the link:

https://brainly.com/question/22438059

#SPJ2

Create a while loop to try making a video game turn based battle.
Then have a monster health value and a player health value.
The player can then choose to attack, heal, or do magic.
If they choose to attack, roll one die and take that damage away from the monsters health.
If they choose to heal then add a dice roll to the player's hp.
If they choose magic then take two dice rolls away from the enemy.
The enemy attacks every turn with 1 dice roll.

Answers

import random

monster_health = 20

player_health = 20

while player_health >0 and monster_health>0:

   player_choice = input("Do you wish to attack, heal, or do magic? (type attack, heal, or magic) ")

   if player_choice == "attack":

       damage = random.randint(1,6)

       monster_health -= damage

       print("You attack the monster for",damage,"points of health. The monster has",monster_health,"points of health")

   elif player_choice == "heal":

       heal = random.randint(1,6)

       player_health += heal

       if player_health>20:

           player_health = 20

       print("You heal for",heal,"points of health. Your health is now at",player_health)

   elif player_choice == "magic":

       total = 0

       for x in range(2):

           total += random.randint(1,6)

       monster_health -= total

       print("You attack the monster for",total,"points of health. The monster has",monster_health,"points of health")

   if player_health < 1 or monster_health <1:

       break

   monster_damage = random.randint(1,6)

   player_health -= monster_damage

   print("The monster attacks your for",monster_damage,"points of health. You have",player_health,"points of health remaining.")

if player_health < 1:

   print("You died! Better luck next time!")

elif monster_health < 1:

   print("You defeated the monster! Great job!")

I wrote my code in python 3.8. Best of luck.

Using Microsoft Project or other similar software create a GANTT chart for a hypothetical project that involves at least 7 tasks, and two milestones. In your posting, include enough support material to describe the project, each of the tasks, and to identify the critical path. Be sure to include linkages between tasks other than finish-to-start. (If you absolutely cannot get MS Project to work, you can use another tool to produce your Gantt chart but I would prefer to see it in MS Project.) Create your own Main Topic using your name. Provide supporting documentation in the text box, and a copy of your MS Project or other type of file printed as a pdf so all can read. Provide feedback to the charts of your classmates.

Answers

We have outlined a hypothetical project involving the development of a mobile application for "TechCo." The project consists of seven tasks, including project initiation and planning, UI design, backend development, frontend development, database design, and integration.

Theoretical Undertaking: Description of the Mobile Application Development Project:

A mobile application for a fictional company called "TechCo" is the goal of the project. The goal of the mobile app is to give users a place where they can keep track of their fitness goals, log their workouts, and get customized training plans. Twelve weeks is the estimated duration of the project.

Tasks:

Project Commencement and Arranging:

Create a project plan and schedule, identify stakeholders, and establish the scope and objectives of the project. UI design:

Lead client exploration and investigation

Create wireframes and models

Finish UI plan

Backend Improvement:

Create APIs for retrieving and storing data Develop the application's server infrastructure Implement user authentication and authorization Frontend Development:

Use appropriate programming languages (such as JavaScript and CSS) to implement the UI design. Integrate with backend APIs. Test the responsiveness and functionality of the UI. Database design and integration:

Create the database's schema, implement data models and relationships, and connect the backend to the database.

First step: Project Arranging Total

Assignments 1, 2, and 3 should be finished before Achievement 1 can be reached.

2nd milestone: Before reaching Milestone 2, Application Launch Tasks 4, 5, and 6 must be completed.

Essential Route:

The sequence of tasks that, if delayed, would delay the project's completion as a whole is represented by the critical path. We must identify the tasks with zero slack in order to identify the critical path; any delay in these tasks would have a direct impact on the project timeline.

The critical path for this hypothetical project would likely include Tasks 1, 2, 3, 4, 5, 6, and 7 based on the provided tasks and their dependencies. The completion of one of these tasks is contingent on the completion of the subsequent task, creating a chain.

To know more about Database design, visit

brainly.com/question/13266923

#SPJ11

Write a python program using "Nested if statement" that will

ask the users to enter their age and if they are registered to

vote. Then print a message informing them that they can vote,

or a message explaining why they cannot vote (underage or not.

registered)

They can vote only if they are over 17 years of age and

registered to vote.

o

O

Answers

The Python program using nested if statements that will ask the user for their age and if they are registered to vote. The program will then print a message to inform them if they can vote or not.

The program first asks the user to input their age as an integer using the `input()` function and converting it to an integer using the `int()` function. The program then asks if the user is registered to vote using the `input()` function. The program uses a nested if statement to check if the user is eligible to vote.

The outer if statement checks if the user is 18 years or older. If the user is 18 years or older, the inner if statement checks if the user is registered to vote. If the user is registered to vote, the program prints a message informing them that they can vote. If the user is not registered to vote, the program prints a message explaining why they cannot vote.

To know more about program visit:

https://brainly.com/question/11023419

#SPJ11



what specific advantage does transposition (also called permutation) ciphers have over substitution ciphers?

Answers

As they alter the plaintext's locations rather than the letters themselves, transposition (or permutation) cyphers have an advantage over substitution cyphers.

What is a transposition cipher's benefit?

Transposition cypher has the main advantage over substitution cypher in that it can be used several times. The Double Transposition is this.

What distinguishes transposition cypher from substitution cypher?

Transposition cyphers are distinct from substitution cyphers. The plaintext is moved around in a transposition cypher, but the letters remain the same. A substitution cypher, on the other hand, modifies the letters themselves while keeping the plaintext's letter order constant.

To know more about cyphers visit:-

https://brainly.com/question/14449787

#SPJ1

anyone pls answer this!!!!!!thanks ^-^​

anyone pls answer this!!!!!!thanks ^-^

Answers

Answer:

True

False

False

False

Explanation:

HTML isnt a scripting a scripting language it's a markup language

There are 6 levels of HTML

An empty tag only has a starting tag

What is the importance of effectiveness in communication?
Minimum 2 paragraphs. Be very detailed and support your reasons.

Answers

Answer:

When communication is effective, it leaves all parties involved satisfied and feeling accomplished. By delivering messages clearly, there is no room for misunderstanding or alteration of messages, which decreases the potential for conflict.

Explanation:

you are installing windows server 2019 standard edition. setup has automatically restarted after completing the installation process. what is the first thing that you must perform after restart?

Answers

The first thing you must do after restarting is to log in to the server with the credentials you specified during installation. This will allow you to configure the server and begin using it.

What is the installation ?

Installation is the process of making a software program or hardware device ready for use. It involves the downloading, configuring, and activating the program or device on a computer. The installation process may involve following steps: downloading the software, verifying the integrity of the download, unpacking and copying the files, granting system and user privileges, checking for dependencies, creating configuration files, and setting up the user interface. Installation may also involve the activation of services, such as network connections, or setting up the environment, such as environment variables, which are needed for the program to run correctly. Finally, the installation may include the registration of the software or device with the manufacturer's website.

To learn more about installation

https://brainly.com/question/28479777

#SPJ4

What should a pie chart represent?

data that steadily increases
data that adds up to 100%
a set of unrelated data
a list of items that frequently changes

Answers

Answer:

Data that adds up to 100%

Explanation:

PLease help I dont understand lol.

PLease help I dont understand lol.

Answers

Answer: I believe the answer would be A. List

Explanation: An array is a way to represent multiplication and division using rows and columns. Rows represent the number of groups. Columns represent the number in each group or the size of each group.

¿ Porque la madera presenta mayor resistencia a ser cortada en sentido travesal que en sentido longitudinal

Answers

A medida que crece un árbol, la mayoría de las células de madera se alinean con el eje del tronco, la rama o la raíz. Estas células están compuestas por haces largos y delgados de fibras, aproximadamente 100 veces más largas que anchas. Esto es lo que le da a la madera su dirección de grano.

La madera es más fuerte en la dirección paralela al grano. Debido a esto, las propiedades de resistencia y rigidez de los paneles estructurales de madera son mayores en la dirección paralela al eje de resistencia que perpendicular a él

Which of these jobs would be most appropriate for someone who majors in information systems? A. Managing a group of programers B. Creating a cloud based customer service application app C. Providing telephone tech support D. Designing a database for an online retailer.

Answers

Answer:

B. Creating a cloud based customer service application app

Explanation:

Information Systems is described as an "academic study of various systems encompassing a particular reference associated with the complementary networks and information of the software and hardware that different organizations and people use to collect, create, process, distribute, and filter data.

The information system includes an integrated pair of different components for storing, collecting, and processing data, along with this, it is utilized for providing knowledge, information, and digital products.

In the question above, the correct answer is option-B.

When is it acceptable to use multimedia, such as charts, graphs, photographs, videos, or audio files in your paper or class presentation

Answers

It is acceptable to use multimedia such as charts, graphs, photographs, videos, or audio files in your paper or class presentation under the following circumstances: When it is necessary to include visual representations of data, such as statistics, scientific findings, or other types of data that are difficult to understand when presented in a text-only format, or when it is necessary to provide context or visual aids to help clarify a concept or idea being discussed.

For instance, when presenting on climate change, it would be beneficial to include graphs or charts to show the trend of the changes.
Multimedia can be an effective way to communicate complex information in a more easily digestible and engaging format. Additionally, the use of multimedia can help keep your audience's attention and aid in their understanding of the material. However, it is important to use multimedia sparingly and appropriately.

Only use multimedia when it is necessary and relevant to the topic at hand, and make sure that it is presented in a way that is clear and easy to understand.

To know more about multimedia visit:

https://brainly.com/question/11958117

#SPJ11

Other Questions
write a function that merges two sorted vectors producing a new sorted vector keep an index search for sampaya, peru. zoom out slightly and watch the timelapse of the ucayali river. what stream type does this river have? When graphing y = x2 14x + 24 and y = 20 |x + 3|, which value would be the best minimum x- and minimum y-values for the viewing window so that all intercepts, minimums, maximums, and points of intersection are able to be seen as closely as possible?50452520 Use the Pythagorean Theorem to find the distance between (-3, 4) and (6,1). Show all calculations.Will give brainliest if right Ste am at 35 bar and 300C is supplied to a group of six nozzles. The exit pressure of steam is 8 bar. The steam flow rate is 5.20 kg/s. The expansion of the system can be considered as isentropic. Determine the dimensions of a nozzle exit of rectangular cross-section with a spect ratio of 3.1. Ans: 27.6 mn X 9.2 mn 5x-7=3 whats the answer help me out the number inside the triangle is really throwing me off tbh The compressor power input in kW is a. 2.48 b. 3.10 c. 3.40 d. cannot be determined. wo telephone calls come into a switchboard at random times in a fixed one-hour period. assume that the calls are made independently of one another. what is the probability that the calls are made write as an algebraic expression and then simplify the number that is x more than 2x+1 A study of a population of 1,200 frogs revealed that 12 out of every 180 frogs in the population have spots on their back. Based on the results of this study, how many frogs in the population do NOT have spots on their back? (probability) I need helpThe municipal swimming pool in Charlotte, North Carolina has three different ways of paying for individual open swimming. Nick is trying to decide which way to pay.Early Pay: Pay $110.00 before Memorial Day; swim any number of daysDeposit Plus: $30.00 deposit plus $6.00 per dayDaily Pay: $9.00 per dayWrite an equation for each method of payment. Write your equations in slope-intercept form so that x is the number of days and y is the cost.a. Early Pay:b. Deposit Plus:c. Daily Pay: What are the two official languages in Cameroon? French Spanish English Portuguese According to the paragraph, weather radar does not reliably detect hail because of What are three things that make three a great story and how do they all tie together Which type of taxable income is paid per hour worked? Avery has a loyalty card good for a discount at her local pharmacy. The item she wants to buy is priced at $6, before discount and tax. After the discount, and before tax, the price is $5.04. Find the percent discount. Which expressions are equivalent to 2 (a + 3b)?Mark all that apply.A 2a + 6bB a + (a +6b)C 2b + 3aD a +3b what does a police officer have the right to do if he/she believes you are operating a motor vehicle under the influence of alcohol? according to the hadith reviewed in the textbook, mizmars: group of answer choices a) are halal. b) are haram. c) should be paired with frame drums. d) should be paired with hand drums.