Object Oriented Databases (OODBs) were once considered a competitor to relational databases until what limitation was discovered?

Answers

Answer 1

Object-oriented databases (OODB) were considered competitors to relational databases until the limitations discovered: The complexity of the OOB model

Why did object-oriented databases fail?

Object-oriented databases failed because they failed to meet the need for easy access to raw data, but they continued to use object-oriented languages ​​and thinking tools, all the while continuing to transform data in all interfaces. Unfortunately, the advent of microservices has exacerbated this problem.

What's the problem with OODBMS?

OODBMS have the following drawbacks: No universal data model: OODBMS do not have a universally accepted data model, and most models lack a rationale. This shortcomings are considered significant shortcomings and are comparable to per-relational systems.

To learn more about Object Oriented Database visit:

https://brainly.com/question/29642352

#SPJ4


Related Questions

What is the confirmation or validation of an event or object?

Answers

Confirmation or validation of an event or object is the act of verifying that it is genuine and legitimate. This can include verifying the authenticity of a document, the accuracy of a piece of information, or the credibility of a source.

Confirmation and Validation of Events and Objects

Confirmation or validation of an event or object is an important step in ensuring the accuracy and legitimacy of any information or process. It involves verifying the authenticity of a document, the accuracy of data, or the trustworthiness of a source. This process is often used in business and legal settings to ensure the accuracy and legality of a document, transaction, or other process. It can also be used to ensure the validity of a report or other information. Confirmation or validation is often done through a process of inspection and verification.

Learn more about Validation of Events: https://brainly.com/question/17342801

#SPJ4

a database server stores encrypted credit card numbers on a hard disk. which term best describes this data?

Answers

Answer:

Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.

which tool should an administrator use to better understand all of the configurations changes that have been made

Answers

The Salesforce Setup Audit Trail tool should be used by an administrator to better comprehend all configuration changes made between January 1 and July 1.

What is an audit trail for setup?

Salesforce's Setup Audit Trail feature lets you closely monitor your organization's changes. It keeps track of all changes to your Salesforce organization's administration, customization, security, sharing, data management, development, and more.

When you have multiple administrators managing your Salesforce environment, this feature helps you keep track of all of the changes that have been made in the past six months. It includes information about what was changed, who made the change, and when it was made. But it's hard to constantly look for threats to your Salesforce environment in all of this information.

This issue is solved by Cloud Security Plus, which generates comprehensive reports with useful insights and collects and analyzes Salesforce data every five minutes. It gives you a sweeping view of everything going on in your Salesforce environment.

To learn more about audit trail visit :

https://brainly.com/question/28232324

#SPJ4

could not initialize class org.codehaus.groovy.vmplugin.v7.java7

Answers

The error Can Not Initialize Class org.codehaus.groovy.vmplugin.v7.java7 occurs when we use the Gradle build tool. The error happens when using a newer version of JDK with an old version of Gradle.

For instance, if the JDK version is 14 and the Gradle version is 6.2, they would not be compatible. You must use a version of Gradle which is compatible with JDK.

Here is a solutions in which this error will happens:

You should trying do a build using the Gradle version 6.2 with JDK 14.Check if Gradle works accurately using the instruction gradle -version.Now, the Could Not Initialize Class org.codehaus.groovy.vmplugin.v7.java7 error can immediately occur when we try to run a Gradle task. The exception will look something

Error can be defined as an act or condition of ignorant or imprudent deviation from a code of behavior. Error also can be described as an act involving an unintentional deviation from truth or accuracy.

Here you can learn more about error in the link brainly.com/question/19575648

#SPJ4

. (a)a police database that provides information on stolen automobiles. (b)the computer system controlling the panama canal locks. (c)an automatic teller machine. (d)anti-lock brake system

Answers

Real-time systems have predictable response times.

Real-time systems: what are they?

The production, gathering, and analysis of exponentially more data is being driven by increasing global connectivity, shifting consumer demands for always-available data, and always-on, sensor-enabled enterprise environments. IDC predicts that 79.41 zettabytes of data will be generated by 2025, and that nearly 30% of it will need real-time processing made possible by real-time systems.

For companies in robotics, manufacturing, healthcare, and high-precision industries like oil and gas and power that depend on real-time data for continuous improvement in safety, efficiency, and reliability, real-time processing is especially important.

To learn more about real time systems refer to:

https://brainly.com/question/14611916

#SPJ4

what do audit logs that track user activity on an information system provide? question 10 options: identification authorization accountability authentication

Answers

The audit logs that track user activity on an information system provide is  accountability.

What are audit logs?

The technique of recording activities inside the software systems utilized throughout your firm is known as audit logging. Audit logs keep track of when an incident happened, who was in charge or what service was involved, and who was affected. Your network's hardware, cloud services, and apps all produce logs that can be analyzed for auditing purposes. An audit trail is a collection of audit logs that displays a chronological record of every activity on a particular system. Systems administrators can monitor user activity by looking at audit logs, and security teams can look into breaches and make sure that regulations are being followed.

In light of query, the audit log which track user activity on an information system is accountability.

To know more about audit logs visit:

https://brainly.com/question/30194849

#SPJ4

what kind of relationship does a network data model represent? multiple choice one-to-one relationship one-to-many relationship many-to-one relationship many-to-many relationship

Answers

A network data model represents a many-to-many relationship.

In a network data model, records can be linked to multiple other records, and multiple records can be linked to one record. This type of relationship is known as a many-to-many relationship. In this model, data is represented in the form of nodes and links. Each node represents a record and links represents the relationships between the records.

which statement best defines the application protection (shielding) feature in mcafee endpoint security?

Answers

Services, the system registry, and applications are protected from malicious activities.

What functions does application control provide in endpoint protection?

For particular users or endpoints, it can be used to restrict application usage to a predetermined set of applications. It not only prevents hostile insiders from downloading threats into the network but also blocks unwanted malicious downloads.

Against what does endpoint security guard?

Endpoint security is the technique of preventing hostile actors and campaigns from exploiting endpoints or entry points of end-user devices, such as PCs, laptops, and mobile devices. These endpoints on a network or in the cloud are protected against cybersecurity threats by endpoint security systems.

To know more about Endpoint Security visit:

https://brainly.com/question/28221902

#SPJ4

How can you find text without using the find and replace dialog box?

Answers

We can use the navigation pane to find text instead of the Find and Replace dialog box.

How does a navigation pane work?

The navigation pane is the name given to Windows Explorer's left window. This, as the name suggests, will make it easier to navigate Windows Explorer. Items with arrows pointing in that direction indicate that they contain expandable objects.

Click in the Navigation pane's search field and begin typing the search criteria to locate an item. Word begins to display items in the Results tab of the Navigation pane as it finds matches. The buttons will then allow you to move on to the next or previous result in the list. Click the item in the list that you want to go to.

To learn more about navigation pane visit :

https://brainly.com/question/29910888

#SPJ4

a specialized computer used to collect, store, and report all the information about a sales transaction.

Answers

Answer:

Point-of-sale (POS) terminal

Explanation:

a(n) language allows the programmer to create very powerful and complex programs without knowing how the cpu works.

Answers

The main advantage of high-level languages is that they are easier to read and understand than assembly language, which is a low-level language.

What is language?

Computer language is a form of programming language that is used to write instructions for a computer to execute. It is also referred to as a programming language as it is used to write instructions for the computer to follow. The instructions written in a computer language are referred to as source code. These instructions are written in a specific syntax that the computer can understand and execute. Computer languages are used to create software programs, games, and websites, among other things. They are also used to control computers and their components, such as robots, monitors, and other hardware. Popular computer languages include C++, Java, Python, and JavaScript. They are used to create complex applications and algorithms.

To learn more about language
https://brainly.com/question/16936315

#SPJ4

elizabeth is explaining various hacking terms to a class. she is in the process of discussing the history of phone system hacking. what is the term for hacking a phone system?

Answers

To a group of students, Elizabeth is defining several hacking concepts. She is currently talking about the background of phone system hacking. Phreaking is the phrase for breaking into a phone system.

What is the name of the hacking approach that involves convincing someone to divulge information?

Attacks by Phishers: Phishing attackers act as a reliable organization or person in an effort to get you to reveal personal information and other valuables. Phishing attacks are focused in one of two ways: Mass phishing, often known as spam phishing, is a common attack that targets numerous victims.

Pharming is a sort of phishing attack that switches users from a trustworthy website to one that is fraudulent by poisoning the DNS cache. This is done in an effort to deceive people into entering their personal login information on the bogus website.

To learn more about hacking visit:

brainly.com/question/14835601

#SPJ4

a data analyst creates data visualizations and a slideshow. which phase of the data analysis process does this describe? 1 point prepare process act share

Answers

Making data visualizations, putting together a presentation, and presenting your results to stakeholders are all part of the share phase.

What steps make up the data visualization process?

The graphic display of information and data is known as data visualization. Data visualization tools offer an easy approach to observe and analyze trends, outliers, and patterns in data by utilizing visual elements like charts, graphs, and maps.

What kind of analysis is data visualization?

Data visualization is the graphic depiction of information and data. Data visualization tools offer a simple approach to spot and comprehend trends, outliers, and patterns in data by utilizing visual elements like charts, graphs, and maps.

Which four categories of data analysis are there?

Descriptive, Diagnostic, Predictive, and Prescriptive analytics are the four different categories.

To know more about data analyst visit:

https://brainly.com/question/30165861

#SPJ4

true or false? metadata describes data about information, such as disk partition structures and file tables.

Answers

Metadata, or information about material, such as file tables and disk partition structures are also examined by forensic analysts.

Why is metadata required? What does it mean?

Data that characterizes other data is known as metadata. Digital items including files, photos, movies, and webpages may all be identified, located, and described using it. Experts understand its capacity to help consumers find, organize, and utilise information, making it just as valuable as data.

Why do you use the term metadata?

There are several ways to explain metadata: informational data about other informational data. The basic information about material is condensed into metadata, which facilitates identifying and interacting with specific instances of data.Metadata can be created manually for increased accuracy or automatically with much more basic information.

To know more about metadata visit:

https://brainly.com/question/14699161

#SPJ4

you manage the westsim domain. all servers run windows server, and all workstations run windows 10. members of the sales team have been issued laptops that they use both to connect to the local network and dial in when they are on the road. a single dhcp server at the main office assigns ip addresses on the 192.168.1.0/24 subnet. your company has just opened a new branch office, which the sales team uses when they are traveling. they can go to the branch office and plug in their laptops for internet access and to read email. because the office is small, you decide not to use a dhcp server. you select 10.0.0.0/24 for the network address. the sales team complains that when they are at the branch office,they are unable to access the internet through the network. you ask one of them to run ipconfig, and you note the ip address is 169.254.12.4. you want to enable access on both the main office and the branch office. what should you do?

Answers

You should configure an alternative IP configuration on each laptop. IP configuration configures Internet Protocol parameters so that the device can send and receive IP packets.

What are IP addresses and types?

Internet Protocol (IP) addresses allow computers to send and receive information. In its factory default configuration, the switch operates as a multiport learning bridge with network connectivity provided by the ports of the switch. There are four types of IP addresses: Public, Private, Static, Dynamic.

How do I configure IP?

Set an IP address on your PC or mobile computer:

Click Start > Settings > Control Panel.

In Control Panel, double-click Network Connections.

Right-click Local Area Connection. Click Properties.

Select Internet Protocol (TCP/IP) and click Properties.

Select Use the following IP address.

To learn more about IP address visit:

https://brainly.com/question/28332850

#SPJ4

A sequence of instructions to solve a problem. A computer programmer writes a solution in the form of an algorithm before coding it into a computer language.
algorithmic graphic
an allegory
a process

Answers

algorithmic graphic A set of instructions for solving a problem. A computer programmer creates a solution in the form of an algorithm before coding it into a computer language.

Languages spoken by people cannot be directly understood by computers. So, in order to speak to a computer, we need a language. As a means of computer communication, we created various languages. Computer languages are, put simply, languages that are used to communicate with computers.

A set of instructions used to build computer programs is known as a computer language. This is a summary of computer languages. Achieving human-computer interaction is the key objective.

Low Stakes Language: Only 1s and 0s are used in low-level computer languages. Computers from the first and second generations both used this language. A low-level language is simple for a machine to understand but difficult for humans to comprehend.

Low-level languages are made to communicate with computer hardware.

Learn more about computer language here:

https://brainly.com/question/28266804

#SPJ4

write the command that moved the cursor one cell yo the right when navigating in a table

Answers

The command that moved the cursor one cell to the right when navigating in a table is:

Alt + Page Up — move to the first cell in the column. Shift + Tab — move one cell to the left. Up Arrow — moves up one row. Alt + Home — moves to the first cell in the row.

What are commands?

A command is a word or phrase that instructs the computer to carry out a specific action, whether typed or spoken. For instance, the user would get a listing of directories and files in the current directory after typing the "dir" command at an MS-DOS prompt and pressing Enter.

Therefore, the command is Alt + Page Up — move to the first cell in the column. Shift + Tab — move one cell to the left. Up Arrow — moves up one row. Alt + Home — moves to the first cell in the row.

To learn more about commands, refer to the link:

https://brainly.com/question/3632568

#SPJ1

which generation of data model was used mainly on ibm mainframes and managed records, not relationships?

Answers

First generation of data model was used mainly on ibm mainframes and managed records, not relationships.

What is data model?

Data models are visual representations of an organization's data elements and their relationships. Models aid in the development of effective information systems by assisting in the definition and structuring of data within the context of relevant business processes. They enable business and technical resources to collaborate on how data is stored, accessed, shared, updated, and leveraged throughout an organisation.

Data models are critical in bringing all segments of an enterprise - IT, business analysts, management, and others - together to design information systems collaboratively (and the databases they rely on).

These systems necessitate properly defined and formatted data, and models illuminate what data is required and how it must be structured to support the desired business processes.

To know more about data model visit:

brainly.com/question/13788727

#SPJ4

The Winklevoss twins came up with the idea of HarvardConnection. What made this idea unique from MySpace and Friendster?

Answers

The idea that makes them unique from MySpace and Friendster is the sacrifices of Mark for his business and his love for programming.

What is "The social network"?

The social network is a story about Mark. His real-life story and the formation of Face-book.

Mark seems driven, but also fixated on attaining his objectives. The movie demonstrates his willingness to sacrifice both his friendship with his closest buddy and his relationship with his girl-friend in order to further his business.

He is devoted to programming and believes that joining the right "club" will help him succeed. He has a strong desire to excel.

Therefore, the idea that makes them unique from MySpace and Friendster is the sacrifice of Mark for his business and his love for programming.

To learn more about "The social network", refer to the link:

https://brainly.com/question/6886851

#SPJ1

greg williams now has the buying power to purchase the desktop computer that he has wanted for the last six months. greg's want now has become a(n) .

Answers

Greg Williams now has the buying power to purchase the desktop computer that he has wanted for the last six months. Greg's want now has become demand.

What is demand in purchase?

Demand is an  profitable notion that refers to a consumer's desire to buy products and services and  amenability to pay a given price for them. The  volume demanded of an item or service  generally decreases as its price rises, the  quantum demanded will rise in response to a  drop in the cost of a commodity or service.   Because it makes sense and organically happens throughout nearly any day, demand is a conception that both consumers and businesses are  largely familiar with, customers  who are keeping an eye on certain  particulars may buy  further of them when the prices are low. Shoppers buy smaller  particulars or  occasionally none at  each when anything occurs that increases the price(  similar as a change in season.)

To know more about desktop visit:

https://brainly.com/question/30052750

#SBJ4

Where is allowance for doubtful accounts on balance sheet?

Answers

The area of a company's balance statement devoted to contra assets includes allowance for doubtful accounts. The estimated dues they anticipate their clients will pay are subsequently added to their overall AR.

What is Allowance?

An allowance is a sum of money that is granted or allotted, typically on a regular basis for a particular purpose. Parents may give their children an allowance for errands and other personal expenses while they are young. An allowance in the construction sector is a sum of money assigned to a particular task as part of a larger contract. Usually, the individual giving the allowance tries to regulate when or how money is used by the receiver so that it serves their purposes. For instance, a parent's allowance may be unconditional or linked to the accomplishment of certain grades or the performance of certain chores, with the goal of teaching the child money management.

To know more about Allowance visit:

https://brainly.com/question/29353025

#SPJ4

UEFI Secure Boot support is one of the requirements for Windows 11, which is a new hardware need for installing Windows 11 on your PC. T/F

Answers

The statement is True. UEFI Secure Boot is a requirement for installing Windows 11 on a PC. UEFI (Unified Extensible Firmware Interface) Secure Boot is a feature that ensures that only signed, trusted software can be loaded during the boot process.

UEFI helps to protect the system from malicious software, such as bootkits and rootkits, that can be used to compromise the system's security. Windows 11 requires that the PC's firmware supports UEFI Secure Boot, and that the firmware is configured to use it. This means that in order to install Windows 11 on a PC, the PC must have firmware that supports UEFI Secure Boot and it must be enabled.

Learn more about UEFI, here https://brainly.com/question/14353510

#SPJ4

silas has an amd-based motherboard with two sticks of ddr3 ram installed in two of the three ram slots, for a total of 8 gb of system memory. when he runs cpu-z to test the system, he notices that the software claims he's running single-channel memory. what could be the problem?

Answers

The problem that Silas had is Move one of the installed sticks to a different slot. It is because there may be damage or error in one slot when read the memory.

In technology, Memory generally can be defined as the electronic holding place for the instructions and data  computer needs to reach quickly. Memory also can be defined as a place or things where information is stored for immediate use. Memory is one of the important things through the running of software or computer,   because without it, a computer would not be able to function properly. Memory is also used by a computer's hardware, operating system,  and software.

Here you can learn more about memory in the link brainly.com/question/28754403

#SPJ4

to get good performance when working binary search trees (bst), we must consider the probability of producing completely degenerate bsts (where each node in the bst has at most one child). if the integers 1 through n are inserted in arbitrary order into a bst (where each possible ordering is equally likely), what is the probability (as an expression in terms of n) that the resulting bst will have completely degenerate structure?

Answers

Since arbitrary insertions may result in degeneracy, the order in which the nodes are inserted into a binary search tree affects ,Worst-case performance is guaranteed for several binary search tree variations.

What's a binary?

Gottfried Leibniz created the binary system, which is a base-2 number system with just two numbers or digits: 1 (one) and 0 (zero). All binary code, which is used to write digital data like everyday computer processor instructions, is based on this numbering system.

Gender binarism, for instance, may make the assumption that a male will have a masculine appearance, possess masculine character traits and behaviors, and have a heterosexual attraction to females when he is born. The numbering system known as binary has only two possible values for each digit: 0 or 1.

Learn more about binary search trees:

brainly.com/question/30391092

#SPJ4

which information is required to be on an order ticket prior to entry of the order? i customer name or account number ii customer address iii customer social security number iv registered representative name or number

Answers

The execution amount and time of ultimate disposition following the execution of an order or if it is terminated

Describe the executed order.

The act of receiving and completing a sell or buy order there in exchange on a client's behalf is known as order execution. Depending on the restrictions or constraints the account holder has placed on the order, order execution may be done manually or electronically.

What is executed out by law?

The definition of execute includes the following clauses: (1) to handle out, perform, or comprehensive as necessary, typically to fulfill a duty, such as enforcing a contract but rather order; (2) to sign and otherwise complete all formalities required to conclude a contract or file effective, including signing, stamping, or supplying; and (3) to execute, as determined by a court.

To know more about executed visit:

https://brainly.com/question/29677434

#SPJ4

With reference to Figure 19-7, determine how much the transmission line current would be if 10 megawatts of power were transmitted over a 60,000 volt transmission line.

Answers

In an electric power system, transmission lines move electric energy between several points. Direct current, alternating current, or a system that combines both are all possible to carry through them. Furthermore, overhead or subsurface wires can both transport electric current.

How much current is in A transmission line?However, the average current in a normal circuit is more like 700 A, even though the largest transmission lines in use have a rating of over 4000 A per circuit. Common currents in distribution lines are in the hundreds of A range or less.In order to limit the power loss in power transmission cables, voltage and current are kept high. Due to P=I2R and P=VI, this is the case. P=I2R requires that we decrease I in order to decrease power loss (R is obviously a constant). Moreover, since P must be a constant (P=VI), increasing V is required to decrease I.

To Learn more About transmission lines refer To:

https://brainly.com/question/28778953

#SPJ1

Incorporating, paraphrasing, restating or generating in a new form information that is already classified and marking the newly developed material consistent with the markings that apply to the source informatio is the meaning of ____

Answers

Information that has already been classified and marked is incorporated, paraphrased, restated, or generated in a new way.

The newly created content complies with the original document's categorization markers. When derivative classifiers incorporate classified information from an approved source into a new document and no further interpretation or analysis is required to ascertain the classification of that information, the concept of "contained in" is applicable. This paragraph would be marked with the letter "S" in parenthesis if it contained any "Secret" information. The paragraph would be marked with the label "C" in parentheses if it contained "Confidential" information.

Learn more about information here-

https://brainly.com/question/15709585

#SPJ4

which material design feature explores the interactive building blocks for creating user interfaces, and features items such as date pickers, data tables, and menus?

Answers

Date pickers, data tables, and menus are among of the interactive building blocks that are explored in the component's material design feature.

How does material 3 design work?

With enhanced theming, components, and Material you customization tools like dynamic colour, Material 3 is compatible with the new visual language and system user interface on Android versions 12 and higher. Note: "Material Design 3," "Material 3," and "M3" are all equivalent words.

Which of the aforementioned forms of disability ought to be taken into account while improving the accessibility of your website?

This can include those who are blind or have low vision, those who are deaf or have hearing impairments, those who are physically or mentally challenged, and more.

To learn more about user interfaces visit:

brainly.com/question/15704118

#SPJ4

Illustrate the difference between an idea and a physical result by doing the following: a. Provide 1 reason for creating a conceptual data model. B. List 1 example of conceptual models and physical models

Answers

1. The purpose of creating a conceptual data model is to establish entities, their attributes, and relationships.

2. Conceptual model - Selecting products, providing a check for payment to a person, and having a person assist with carrying the products out of the store.

Physical implementation - Automated vending system requiring payment for each prod-uct distributed.

What is Data Modelling

Data modeling is the process of creating a data model for the data to be stored in a database. This data model is a conceptual representation of Data objects, the associations between different data objects, and the rules.

Data modeling helps in the visual representation of data and enforces business rules, regulatory compliances, and government policies on the data. Data Models ensure consistency in naming conventions, default values, semantics, security while ensuring quality of the data.

Data Models in DBMS

The Data Model is defined as an abstract model that organizes data description, data semantics, and consistency constraints of data. The data model emphasizes on what data is needed and how it should be organized instead of what operations will be performed on data. Data Model is like an architect’s building plan, which helps to build conceptual models and set a relationship between data items.

The two types of Data Modeling Techniques are

Entity Relationship (E-R) ModelUML (Unified Modelling Language

Learn more about conceptual model at https://brainly.com/question/30067449.

#SPJ4

will clearing cache and cookies resolve this issue

Answers

Answer:

not all of them no but it will help

Explanation:

Other Questions
How do you write vertex and Y intercept from vertex form? due to earths ________, the sun heats earths surface unevenly. article 3 us constitution summarized Please help! Mildly confused on how to solve it Does Dr. Phineas Culpepper exist? Is he a medical doctor (an M.D.)? A 68 kg hiker walks at 5. 0 km/h up a 9 % slope. The indicated incline is the ratio of the vertical distance and the horizontal distance expressed as percentage. What choice did many African Americans have to make during the American Revolution? What does the rabbit represent? What does the snake represent? Why is the rabbits offensive equipment practically nil? What does that mean? How does the rabbit plan to calm the snake? What is the message of this cartoon? PLEASE HELP THESE QUESTIONS ARE DUE TODAY 10. 74=u(11)minus, 10, point, 74, equals, u, minus, left parenthesis, minus, 11, right parenthesis As a population approaches its carrying capacity, how does its growth change?The growth rate stays the same.The growth rate slows until N is close to r.The growth rate slows until N is 0.r changes until it is close to K.The growth rate slows until N is close to K. containing a negative consequence for the stability of the social system. What is an example of 1 solution? What's a good word for evil? if one liter of a solution has 58.44 g of salt dissolved in it, how many grams of salt are dissolved in 3.1 ml of the solution? express your answer in grams using the correct number of significant figures. do not enter your answer using scientific notation. how many people attended the i have a dream speech ? How do you write an argumentative essay that effectively support your claims? What is the reason for the existence of the gap between the rich and the poor country? fungi and bacteria are among the most important environmental organism this able to infect plants when they reach a suitable host plant by producing certain enzymes or toxins candidates that aid in the penetration of or ingestion through plant surfaces. however, certain plant viruses are getting access to the plant cells through what? a 30 kilogram penguin slides on its belly on a horizontal surface with coefficient of kinetic friction 0.08 at an initial speed of 12 meters per second. how far will the penguin slide before coming to a stop? write a letter to the editor to inform the condition education of Goverment school which lies in your community