Son generalmente los objetos,personas o entidades que tienen vida por sí sola y no depende de ninguna otra para existir:


A)Tablas maestro

B)Tablas compuestas

C)Tablas complejas

D)ninguna de las anteriores.



AYUDAAAAAA!!!!

Answers

Answer 1

Answer:

La opción correcta es D. Ninguna de los anteriores, ya que la palabra que describe dicha situación es "autosuficiencia".

Explanation:

La autosuficiencia es una teoría o práctica de cómo los grupos o sociedades pueden mantenerse sin intercambiar bienes o dinero con el mundo exterior. La teoría está algo extendida en ciertos grupos anarquistas y especialmente dentro del anarquismo individualista. Algunos grupos ecologistas también están muy a favor de la autosuficiencia. La autosuficiencia se considera una forma de vida muy original.

Un ejemplo común de autosuficiencia es una persona o familia que vive en una pequeña granja. Aquí se cultiva y produce todo lo necesario para sobrevivir.


Related Questions

An open area is one that has something in the path of travel that blocks the continuation of travel in that lane. a) True b) False 2 Questions 2 A driver's emotions usually have no impacton his or her ability to effectively implement a search system. a) True b) False 3 Question 3 Glare is enhanced by heat and impairs a driver's visibility. a) True b) False 4 Question 4 A driver must maintain which of the following to ensure implementation of an effective space management system

Answers

Answer:

Question 1. B) False

Question 2. B) False

Question 3. A) True

Question 4.

a) Looking ahead

b) Lookout for hazards

c) Focus on the big picture

d) Ensure visibility of her or his vehicle

e) Always have an exit route for safety

Explanation:

Question 1. An open area or condition is a availability of a large area space to drive unrestricted. In an open area, the road ahead is open space and there is continuation of the lane of travel and there is nothing that blocks the road

Therefore, the correct option is B) False

Question 2. A drivers emotion such as anger has remarkable influence on the behavior while driving such that it can impact on his or her ability for appropriate search system implementation which is response based

Therefore, the correct option is B) False

Question 3. Glare sensation is exacerbated by the presence of increased heat, an obstructs the view

Therefore, the correct option is A) True

Question 4. Effective space management is implemented by a driver through;

a) Looking ahead of the vehicles n front

b) Maintaining constant lookout for hazards

c) Ensure that the big picture is in focus

d) Ensure that the vehicle he or she is driving can be seen

e) Ensure that an escape route is always available

A type of sensor used to detect which way around a device is being held. ​

Answers

There’s 3 main ones accelerometer, gyroscope, and magnetometer.

write difference between dvd r and dvd ram( Any 3 points or any a little big paraph for test)

Answers

Answer:

Following are the differences two the given questions:

Explanation:

DVD-R:

DVD-R is a common DVD recordable media that seems like a conventional DVD, and it can only be used once for writing data or analyzing information many times.It is identical to a regular DVD, however, it can be used to record data like a CD-R. Once a DVD-R is "burned," it cannot be read to anymore.There is a 650 nm range recording, nicknamed "Authoring DVD-R." "DVD-R for general" is another format with protection against duplicating, which records at 635 nm. Whilst DVD-R(a) and DVD-R(g) may read forms of one another, they cannot write formats of each other.

DVD-RAM:

This is a technology for optical DVD storage where the information may be read, deleted & written constantly.It offers outstanding integrity of data, preservation, and avoidance of damages that can be used for basic storing data, data preservation, or data backup.Those disc drives can indeed be frequently recorded and deleted, and only compatible with DVD-RAM format devices produced by corporations.

What is difference between base font and font tags​

Answers

Basefont tag is used to define default font, size and color for the whole text in an html document. On the other hand font tag is used to define font, size, color etc for a text which enclosed with in this tag. ... On the other hand you have to enclose the text within the font tag to apply changes.

#LETS STUDY#BRAINLEST LOVE❣️

Information Technology Question

What is the best topic in Information Technology ever?.​

Answers

Answer:

I don't know about others but I like Binary

Answer:

Explanation:

5 Key Actions for IT Leaders for Effective Decision Making

Progressive leaders reengineer data and analytics to turn decision making into a competitive advantage.

This Gartner eBook shows you the power and potential of reengineered decision making and guides you to:

Identify what decisions to reengineer, and why

Prioritize decisions, analytics and data

Fit artificial intelligence into decision making

Rethink your D&A architecture

Build skills, habits and teams geared for effective decision making

Rachel is planning on writing code that will have to do computations with very large
numbers. Which of the following is the most important issue she should check
before writing her code?
PLEASE

Answers

Group of answer choices.

A. Rachel should look up how many bits are used to store integers and floating point numbers in the programming language she is using.

B. Rachel should reset her machine to store data using hexadecimal values instead of binary.

C. Rachel should run a program to ensure that she has enough memory on her machine to write the program itself.

D. Rachel does not have to worry about the size of the numbers

Answer:

A. Rachel should look up how many bits are used to store integers and floating point numbers in the programming language she is using.

Explanation:

In Computer programming, a bit is a short word for the term binary digit and is primarily the basic (smallest) unit measurement of data or information.

A bit is a logical state which represents a single binary value of either one (1) or zero (0). This ultimately implies that, a single bit in computer science represents a boolean value of;

1. True or ON, which is equal to one (1).

2. False or OFF, which is equal to zero (0).

Additionally, a binary numbering represents all numeric values that are to be written in sequences of ones (1s) and zeroes (0s). Therefore, a binary number refers to any numerical value (number) that is expressed in base-2 numerical system; 0s and 1s.

Also, the total numbers which can be represented with an 8 bit binary (base-2) system is 256.

For all computations that would involve the use of very large numbers, it's important to look up how many bits are used to store integers and floating point numbers.

In this context, Rachel should ensure that she check how many bits the chosen high-level programming language uses to store integers and floating point numbers before writing her codes.

list out the application of the computer and explain it?(and as the answer for this question as image) ​

Answers

Answer:

There are several applications of the computer; some of these applications are:

Word processorsGraphics applicationsWeb browsersGamingMedia playersAlarms and tasks schedulersEtc...

Explanation:

The computer system can be applied in various fields (such as medicine, gaming, governments, education, etc.) for various purposes.

Each of these fields require computer software products and/or applications to carry out their activities. I've listed some applications, but there are several other applications.

My explanation could not be submitted; so, I added it as an attachment.

Which of the following statements about RAID is correct? Group of answer choices All RAID configurations provide fault tolerance for up to one disk failure A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration RAID 5 allows up to two disk failures During a RAID 5 disk failure, read performance is not impacted A RAID 1 configuration of four 1TB disks has a storage capacity of 2TB

Answers

Answer:

A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration

Explanation:

Redundant Array of Independent Disks(RAID) are multiple physical drives arranged in logical units to provide data redundancy and increased performance. They are

RAID 1 configuration duplicates data storage, albeit of lower performance than RAID 0. Also called disk mirroring because it mirrors data on two or more disks, it provides at least two drives that are used interchangeably or together.

A RAID 1 is the configuration of the 4 disks that has higher storage capacity than a RAID 0 configuration. This option A is correct.

What is the RAID ?

The RAID is a redundant array of the inexpensive disks and refers to the storage visualization technology that combines multiple physical disk drives. Its contract with earlies highly reliable mainframe disk drives.

The RAID one needs mini of two physical drives as the data is given simultaneously in two places. These drives are mirror images as ne fails the other can take over.

Find out more information about the RAID.

brainly.com/question/26980060.

A college student borrowed his roommate's notebook computer without permission because he needed to write a term paper that was due the next day. While the computer was sitting open on the student's desk overnight, a water pipe in the ceiling began leaking and water dripped down on the computer, rendering it inoperable. A computer repair service estimated that it would cost $500 to repair all the damaged components. At the time it was damaged, the computer was worth $700. If the roommate sues the student for the damage caused to the computer, what will be the extent of his recovery

Answers

Answer: $700

Explanation:

Based on the information given in the question, if the roommate sues the student for the damage caused to the computer, the extent of his recovery will be $700.

In this scenario, the student has committed a conversion as the right of possession of the roommate's computer was interfered with by the student as he took it without the roommate's permission, which later sustained damage that was more than 70% of the computer's value. In such case, the extent of the recovery will be the fair market value which is $700.

How to save a file for the first time?​

Answers

Answer:

i have the website version of word but you want to click file and save as then click whatever option you need to personly if you are submitting online i download it to my computer then I will submit it from downloads. thats how i do it

Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evaluate threats to compliance. Using this framework, Group of answer choices the first step is to discuss the threat with the client's management team. safeguards can be used to eliminate any threat. all threats must be completely eliminated. more than one safeguard may be necessary.

Answers

Answer:

more than one safeguard may be necessary.

Explanation:

The conceptual framework can be used to developed as well as construct through a process of the qualitative analysis. The approach includes the in the frameworks for identifying and evaluating the threats to compliance with the rules.

But since the rules formed cannot always address all the circumstances, the Code includes to evaluate the threats to the compliance of more than one safeguards that are necessary.

Sue follows these steps to create a chart in her presentation.
Step 1: Navigate to the Insert tab.
Step 2: Click the Chart button in the Illustrations command group.
Step 3: Choose the column chart.
Step 4: Click OK.
Which objects appear on the slide after she clicks OK? Check all that apply.
a fully completed table
a fully completed chart
a table with blank values
a chart with blank values
a table with sample values
a chart with sample values

Answers

Answer:

A chart with sample values

Answer:

A table with sample values

A chart with sample values

Explanation:

Argue whether we can infer anything about a candidate's ability to work in a professional environment based on his or her resume's formatting. Compare how you would address a resume with wacky fonts to how you would respond to grammatical errors in a resume.

Answers

Answer:

Candidates resume shows his way of presenting and organizing.

Explanation:

Resume formatting is an important part of a candidate's ability to work. In any professional environment, it's necessary to have a properly formatted resume.  The resume formatting should be up to date with the latest information and data. The formatting involves the borders, headings, grammar, and spelling or typo errors, etc.  But these mistakes can be easily avoided such as proofreading and removing unnecessary details and sloppy fronts.

Phím tắt nào sau đây được sử dụng để chuyển sang các cửa sổ đang mở khác? A. Ctrl+Tab B. Shift+Tab C. Alt+Tab D. Window+Tab

Answers

Câu trả lời:

C. Alt + Tab

Giải trình:

Các phím tắt được sử dụng trên các hệ thống máy tính để điều hướng nhanh chóng chẳng hạn như chuyển đổi giữa các cửa sổ, thực hiện một số tác vụ và hoạt động nhất định, v.v. hoạt động. Trong cửa sổ, người ta có thể dễ dàng điều hướng và di chuyển qua các tab hoặc cửa sổ đang mở khác nhau bằng cách sử dụng nút 'Alt và Tab'. Sau khi nhấn nút Alt, tab sẽ được nhấp để điều hướng qua tất cả các cửa sổ đang mở khác nhau.

i was able to solve the question :))

Answers

Answer:

ill take the points anyway

Explanation:

Question 1 of 30
Match each type of tax with an example of its use.
Consumption tax
?
10% on profits from the
sale of a house
Capital gains tax
6% tax on all sales
Excise tax
$5 tax on a cable
television line
Payroll tax
15% tax to pay for Social
Security

Answers

it’s exercise tax $5 tax on a cable television line

hope this helped

~ mo

Capital gains tax - 10% profits from sale of the house

Consumption tax - 6% tax on all sales

Excise tax - 5$ tax on cable tv line

Payroll tax - 15% tax to pay for social security

Write a program to input value of three sides, to check triangle is triangle is possible to form of not​

Answers

Answer:

Explanation:

import java.util.Scanner;

public class KboatTriangleAngle

{

  public static void main(String args[]) {

      Scanner in = new Scanner(System.in);

      System.out.print("Enter first angle: ");

      int a1 = in.nextInt();

      System.out.print("Enter second angle: ");

      int a2 = in.nextInt();

      System.out.print("Enter third angle: ");

      int a3 = in.nextInt();

      int angleSum = a1 + a2 + a3;

       

      if (angleSum == 180 && a1 > 0 && a2 > 0 && a3 > 0) {

          if (a1 < 90 && a2 < 90 && a3 < 90) {

              System.out.println("Acute-angled Triangle");

          }

          else if (a1 == 90 || a2 == 90 || a3 == 90) {

              System.out.println("Right-angled Triangle");

          }

          else {

              System.out.println("Obtuse-angled Triangle");

          }

      }

      else {

          System.out.println("Triangle not possible");

      }

  }

}

OUTPUT:

The HTML tag for the smallest heading is​ what

Answers

Answer:

The HTML <h1> to <h6> tag is used to define headings in an HTML document. <h1> defines largest heading and <h6> defines smallest heading.

Explanation:

can someone please tell me the name of some of the best driving simulator games?​

Answers

Answer:

Editor's Pick: Assetto Corsa. Assetto Corsa is a highly regarded racing game with a realistic force feedback feel.

Project Cars 2.

Gran Turismo Sport.

F1 2019.

Dirt Rally.

Explanation:

You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following?
a. Identify clusters
b. Identify sequences
c. Classify data
d. Identify associations

Answers

Answer: Identifying sequences

Explanation:

Since the user wants to know if there are any particular activities that the customers engage in, or the types of purchases made in the month before or after purchasing select items from your store, therefore, the data mining software can be used in identifying sequences.

In this case, the data mining software can't be used in classifying data whether into structured or unstructured data. Furthermore, the identification of clusters and associations aren't the correct answers.

Therefore, the best option is B.

A friend was just promoted to a new job that requires part-time travel, and he has also been promised a new laptop after his first month with the company. He needs an easy way to disconnect and reconnect all his peripheral devices to his old laptop. Devices include two external monitors (one HDMI, one DVI), a USB wireless mouse, USB wireless keyboard, Ethernet network, USB printer, headphones, and microphone. He has a budget of $100. What kind of device would best suit his needs

Answers

Answer:

usb-c hub

Explanation:

In this specific scenario, his best option would be a usb-c hub. This is a fairly cheap device which he can get one of many variations for less than $100. This device connects through a single USB-C port on the computer and has multiple USB ports on the hub. This allows you to connect all of your devices to the hub and connect/disconnect all of them instantly from the single USB-C cable connected to the laptop. Thanks to the new USB-C technology these hubs now usually include both HDMI and DVI inputs.

If you forget your privacy password what will you do if the ask this question what is the name of one of your teacher?​

Answers

Explanation:

you write the name of your primary school teacher

A security question is a form of the shared secret used as an authenticator. The answer to questions asked by the system is personalized and can be answered by you only.

What are security questions?

A security question is a form of the shared secret used as an authenticator. It is commonly used by banks, cable companies, and wireless providers as an extra security layer.

When you forget your privacy password, the system tries to help you to get your password back or reset it. But for this, it needs to make sure that it's you. Therefore, whenever you set a privacy password for the first time the system also asks you a few questions these questions are known as security questions and are present in the system for such situations. Therefore, the answer to questions asked by the system is personalized and can be answered by you only.

Learn more about the Security Questions:

https://brainly.com/question/15008697

#SPJ2

Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and right are gone. So "ab*cd" yields "ad" and "ab**cd" also yields "ad". starOut("ab*cd") → "ad" starOut("ab**cd") → "ad" starOut("sm*eilly") → "silly"

Answers

Answer:

Explanation:

The following code is written in Java and uses a for loop with a series of IF ELSE statements to check the next and previous characters in a string. Checking to make sure that there are no asterix. If so it adds that character to the String variable output. Which is returned to the user at the end of the method. Two test cases have been created and the output can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       System.out.println(starOut("sm*eilly"));

       System.out.println(starOut("ab**cd"));

   }

   public static String starOut(String str) {

       String output = "";

       for (int i = 0; i < str.length(); i++) {

           if ((i != 0) && (i != str.length()-1)) {

               if ((str.charAt(i-1) != '*') && (str.charAt(i+1) != '*') && (str.charAt(i) != '*')) {

                   output += str.charAt(i);

               }

           } else {

               if ((i == 0) && (str.charAt(i) != '*') && (str.charAt(i+1) != '*')) {

                   output += str.charAt(i);

               } else if ((i == str.length()-1) && (str.charAt(i) != '*') && (str.charAt(i-1) != '*')) {

                   output += str.charAt(i);

               }

           }

       }

       return output;

   }

}

Pls help me this quation give me the answer Do you think that dealing with big data demands high ethical regulations, accountability, and responsibility of the person as well as the company? Why?

Answers

Answer:

yes, in case of big data demand it's duty of person as well as company to follow ethical principal and adhere the moral standard for keeping the information of the big data company confidential.

Explanation:

may it's help you

grow a sentence frame a small and simple sentence. then expand it. Expand this sentence -I am a gril​

Answers

Answer:

I am a young lady.

Explanation:

simply sentence or expand more:

I am a young lady in my teens. ​I am a young woman in her twenties. ​I am a twenty-year-old lady who is just starting off in life. ​I am a twenty-year-old woman who is just getting her feet wet in the world. ​

Answer:

I am a girl, I love playing games, but before that, I will finish my homework first.

~~~~~~~~~~~~~~~~~~~~

Hope it helps!

#CarryOnLearning

[tex]Park \: Sun-min[/tex]

four example of computer software?​

Answers

answer= safari, ms-word, moviemaker, ms-paint, firefox,etc...

What is a status update?

A. An automatic enhancement to a computer's performance

B. Any new software that can be downloaded for free

C. A short post in which users write what they are doing

D. A news flash that announces new government posts

Answers

It should be letter c i hope this help let me know if you need help
the correct answer should be C above ^

list three social implications of the wider range of piracy​

Answers

Answer:

Street prices are affected by the extent of illegal commercial copying. The availability of inexpensive, high-quality illegal copies reduces the demand for legal copies to the extent that some users buy illegal copies instead of legal ones.

if (accountBalance < 1000.00):
print(“SAVINGS3”)
elif (accountBalance < 2000.00):
print(“SAVINGS2”)
elif (accountBalance < 3000.00):
print(“SAVINGS1”)
else:
print(“SAVINGS”)

Answers

Answer:

See explanation

Explanation:

Given

The code segment

Required

The output

The code segment is incomplete, as the value of accountBalance is not given.

However, I will explain the given segment using few illustrations.

The following will be executed if accountBalance is less than 1000.00

if (accountBalance < 1000.00):

   print(“SAVINGS3”)

Take for instance:

accountBalance = 500.0; "SAVINGS3" will be printed

The following will be executed if accountBalance is less than 2000.00 but more than or equal to 1000.00

elif (accountBalance < 2000.00):

   print(“SAVINGS2”)  

Take for instance:

accountBalance = 1500.0; "SAVINGS2" will be printed

The following will be executed if accountBalance is less than 3000.00 but more than or equal to 2000.00

elif (accountBalance < 3000.00):

    print(“SAVINGS1”)

Take for instance:

accountBalance = 2500.0; "SAVINGS3" will be printed

Lastly, if accountBalance is 3000.00 or greater, the following will be executed

else:

   print(“SAVINGS”)

Take for instance:

accountBalance = 3500.0; "SAVINGS" will be printed

how to convert binary number into decimal number​

Answers

Answer:

Multiplying by 2

Explanation:

The binary num number to decimal conversion is made by making the sum of each binary digits multiplying by 2 with raised to the power of the positional notation of digits .

Hope it is helpful to you

Answer:

HOW TO CONVERT BINARY INTO DECIMAL SYSTEM.

The decimal number is equal to the sum of binary digits (dn) times their power of 2 (2n):

decimal = d0×20 + d1×21 + d2×22 + ...

Example #1.SEE,

Find the decimal value of 1110012:

binary number: 1 1 1 0 0 1

power of 2: 25 24 23 22 21 20

1110012 = 1⋅25+1⋅24+1⋅23+0⋅22+0⋅21+1⋅20 = 5710

Explanation:

YOU WILL LEARN MORE IN HIGHER CLASSES.

Other Questions
Identify the oxidation half-reaction for this reaction:Fe(s) + 2HCl(aq) FeCl2(aq) + H2(g)A. Fe2+ + 2e Fe(s)O B. H2(g) 2H+ + 2eO C. Fe(s) Fe2+ + 2eO D. 2H+ + 2e H2(9) WILL GIVE BRAINLISEST! The polygons are similar. Find the missing side length. Note, the shapes are not oriented the same way. 1) what has the pandemic taught you or shown you. It can be related to family, life etc. (10 marks) Xut khu t bn, lin h vi Vit Nam hin nay What is article 1, section 7 of the constitution explain? How did the Atlantic slave trade impact the Americas role in triangular trade? sexual reproduction drivesa)meoisisb) genetic symmetryc) reproductive strategiesd) genetic diversity Once again another one An ideal gas within a piston-cylinder assembly undergoes a Carnot refrigeration cycle. The isothermal compression occurs at 325 K from 2 bar to 4 bar. The isothermal expansion occurs at 250 K. Determine: a. the coefficient of performanceb. the heat transfer to the gas during the isothermal expansion, in kj per kmol of gasc. the magintude of the net work input, in kj per kmol of gas. Under which of the following headings in the Apollo 13 article could a reader expect to find out how NASA engineers figured out a way to get the crew back to Earth?On the way to the MoonO Solving the CrisisReturning to Earth Find the equation of the straight line whose portion is bisected at (2, 3). If a real estate agent receives 17 percent of the selling price of each house he sells, then what would the agent make if the house sells for $180,000? 10 fracciones que generen decimales exactos 10 fracciones que generen decimales inexactos puros y 10 fraccionarios que generen decimales peridicos mixtos Scientists have developed a new type of margarine that contains plant ingredients. They expect that the margarine will lower blood cholesterol levels. They want to test their hypothesis by comparing the blood cholesterol levels of people who will consume the new margarine with those who will consume regular margarine for a few days. Both groups of people will know which type of margarine they are to consume. Which type of research design will the scientists consider Note: See 1 Submission Instructions for the instructions regarding images in exercise solutions. On the next page is a UML class diagram that shows several classes that are associated in various ways. This class diagram is included in the Homework Assignment 1 zip archive as an Umlet file named class-relation.urf so if you use Umlet, you can load and modify this diagram. If you are using a different UML class diagramming tool, then you will have to create the diagram from scratch. (a) Note that in Course there is 7.2 an instance variable mRoster which is an instance of Roster. When Course object is deleted, the Roster instance mRoster will also be deleted. Given that, what type of class a relationship, if any, exists between Course and Roster? If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity. (b) Note that in Roster there is an instance variable mStudents which is an ArrayList of Student objects. When a Roster object is deleted, mStudents is also deleted, but each Student object within mStudents is not deleted. Given that, what type of class relationship, if any, exists between Roster and Student. If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity. (c) What type of class relationship, if any, exists between Student and UndergradStudent? If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity. (d) What type of class relationship, if any, exists between Student and GradStudent? If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity. (e) What type of class relationship, if any, exists between UndergradStudent and GradStudent? If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity. In Scheme, the form (symbol-length? 'James) will return: Group of answer choices 0 5 6 error message Which of the following describes a challenge presented by Canada's population? Question 5 options: the cost of government-funded health care increased pollution and high crime in cities the cost of child care in rural areas lack of housing in urban areas Joe's manager, Claire, is very busy this week at the warehouse. Joe has been placed in charge of finding room for some new deliveries but he has some questions to ask Claire. Which behavior would demonstrate that Joe respects her time ? a) Calling Claire after work hours to discuss his questions b) Booking a two-hour meeting for tomorrow to discuss all his questions at once c) Emailing Claire a long list of questions d) Booking a ten-minute meeting to discuss his most urgent questions if p is the smallest prime factor of 511, then a. 18 p 23b. 10 p 17c. 3 p 9d. none of these Each day a cashier counts the number of pennies left in the "take a penny, leave a penny" dish. Estimate the probability that there are fewer than 4 pennies on any given day1 3 5 17 4 9 1 9 2 8 20A.11/7 B.4/11 C.7/11 D.3/11