Answer:
uh
Explanation:
By Using the following schema, answer the following SQL queries and commands: Product(P_code.P_name, P_price, P_on_hand,vend_code) Vender(vend_code, vend_fname, vend_areacode, vend_phone) 1- find the venders names who sell products in TN-5 area and their names include "dan". 2- find the code, name and vender code of product that has price between 1500S and 2500S and the product that has price between 48005 and 5600S. 3- Find the name, and code of venders who had 5 microwaves that has price less than 3500S. 4- Find the phone numbers of venders who sell Televisions. 5- Delete the records of venders who their first name is 'smith'
Explanation:
answer me pls i need sol bbbd
how did hitles rules in nazi germany exemplify totiltarian rule?
Answer:
hope this helps if not srry
Write a program named lastname_firstname_cities.py that works with information about large cities. Your program will open the cities.txt downloadfile. Each line in the file has the name of a city, its country, and its population. The first few lines of the file look like this:
Answer and Explanation:
Open your text editor and open new file. Save new file file as lastname_firstname_cities.py. The program will open the file cities.txt downloadfile hence :
dfile= open(cities.txt, "r")
If we write this into our lastname_firstname_cities.py file it will open our cities.txt downloadfile in read mode and text mode(by default unless we specify binary mode which is for images)
Type the correct answer in the box. Spell all words correctly.
Which testing requires coding the test cases into a scripting language?
testing requires coding the test cases into a scripting language.
Answer:
sorry I forgot it
Explanation:
because I am now in a last position
How to prepare and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50
Answer:
Create boxes with the following content
Initialize sum to 0, product to 1 and number to 1Check if number is a prime. If yes, update sum += number and product *= numberIncrease number by 1If number is <= 50, go back to "check" block.The check block has a diamond shape.
At the "yes" branch of the check block, you can create separate blocks for updating the sum and the product.
Connect the blocks using arrows.
Indicate the start and the end of the flow using the appropriate symbols.
The block to check if a number is a prime you could further decompose into the steps needed to do such a check.
Write a program that asks the user to enter in a username and then examines that username to make sure it complies with the rules above. Here's a sample running of the program - note that you want to keep prompting the user until they supply you with a valid username:
user_in = input ("Please enter your username: " )
if user_in in "0123456789":
print ("Username cannot contain numbers")
elif user_in in "?":
print ("Username cannot continue special character")
else:
print (" Welcome to your ghetto, {0}! ".format(user_in))
Write a program that reads in an integer, and breaks it into a sequence of individual digits. Display each digit on a separate line. For example, the input 16384 is displayed as 1 6 3 8 4 You may assume that the input has no more than five digits and is not negative.
Answer:
The program in Python is as follows:
num = int(input())
for i in str(num):
print(int(i))
Explanation:
This gets input for the number
num = int(input())
This converts the number to string and iterates through each element of the string
for i in str(num):
This prints individual digits
print(int(i))
Explain the purpose of the open() and close() operations.
Answer:
The open() operation notifies the system that the named file is about to become active. The close() operation notifies the system that the named file is no longer in active use by the user who issued the close operation.
hi, please help me.solution.
Answer:
aahdbdnsjajaissjdjdhskakwjdhbebs
In the home tab under the paragraph group of options what are you unable to do?
An error due to wrong input by the user
Answer:
when did it take place..
Argue whether we can infer anything about a candidate’s ability to work in a professional environment based on his or her resume’s formatting.
Compare how you would address a resume with wacky fonts to how you would respond to grammatical errors in a resume.
Answer:
when dressing feaded back is postive and then list areas of inprovmenr to met the job requirements
Explanation:
T
N
O
?
You can insert only the row
only to
True or false
false
Explanation:
good luck bro
have a great day
Answer:
false
Explanation:
I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right back and does not transfer. What is the likely cause of this issue?
a. hard drive is full
b. photos were taken in a different country
c. USB port is broken
d. the file structure of the 2 hard drives are not compatible
The answer is D, What is the likely cause of this issue is that the file structure of the two hard drives are not compatible.
The file structure or file system, of a hard drive, tells the disk how to read, write and store information on the drive. Some file systems do not allow the disk to store any files and often do not display error messages. If we try to drag a file onto a hard drive with this kind of file structure, the action would simply not be performed. This can be fixed by formatting the disk partition into a new file system.
Option B states that the issue may be that the photos were taken in a different country. This is not the cause of the problem because regardless of where the pictures are taken, they are all stored in common formats such as:
JPEGPNGJFIFAny external hard drive capable of storing images will have the ability to receive files in these formats as well as many other image formats. For this reason, option B is False.
The question states that you were able to connect the external Hard drive and drag files onto it, though unsuccessfully. This tells us that the USB port is working as intended, if it were not working, it would not display the Hard drive onto the computer and we would not be able to drag files to it. Therefore, option C is false
Insufficient Hard drive storage space is a common issue in not being able to transfer files between hard drives. However, if this were the case, the user would be shown a message displaying the error. The message may look like:
"Insufficient space on the disk.""The Disk is full.""Not enough memory to complete this action"The exact wording may vary depending on the operating system in use. Since the question states that the files simply "bounces back" without an error message displaying, we can infer that option A is false.
For more help with Hard drive issues see: https://brainly.com/question/14254444?referrer=searchResults
If you are to enhance the ICT used by your teachers, how will ypu do it? Will you use the same ICT or will you modify how it was integrated?
To enhance the ICT (Information Communication Technology) used by teachers, I will modify how the ICT was integrated.
The modification of how ICT is integrated will change the culture that places teaching over technology. Then, teachers will be taught how to use ICT to:
improve learning so that teachers become learning facilitatorsmotivate learners by fostering learning autonomy, making students less dependent on the teacherengage the learners by creating collaborative learningdiminish content learning so that students learn to think, create, and communicate effectivelymake learning a lifetime culture enhance the learning environment so that teachers become collaborators and co-learners with students.Thus, I will enhance the ICT used by teachers by modifying its integration to achieve better results for both teachers and learners.
Learn more about the importance of ICT here: https://brainly.com/question/13724249
e) Point out the errors( if any) and correct them:-
class simple
{
inta,b,c;
double sumNumber
{
int d = a + b + c;
double e = d/5.6;
return e;
}
void show Number()
{
a = 10, b = 20, c=5;
System.out.println(d);
double f = sumNumber(a,b,c);
System.out.print(e);
}
}
Explanation:
double e-d/5.6;is wrong it should return to c
Which of the given assertion methods will return true for the code given below? Student student1 = new Student(); Student student2 = new Student(); Student student3 = student1;
The Student class is as follows.
public class Student{
private String name;
}
a. assertEquals(student1, student2);
b. assertEquals(student1, student3);
c. assertSame(student 1, student3);
d. assertSame(student1, student2);
Answer:
The true statements are :
A. assertEquals(student1,student2)
C. assertSame(student1,student3)
Explanation:
AssertEquals() asserts that the objects are equal, but assertSame() asserts that the passed two objects refer to the same object or not, if found same they return true, else return false.
Methods are collections of named code segments that are executed when evoked
The assertion method that will return true for the given code is: assertEquals(student1,student2)
The code segment is given as:
Student student1 = new Student();
Student student2 = new Student();
Student student3 = student1;
In Java, the assertEquals() method returns true if two objects have equal values.
Assume student1 and student2 have equal values, the statement assertEquals(student1,student2) will return true
Read more about java methods at:
https://brainly.com/question/15969952
Which one is the result of the ouWhen you move a file to the Recycle Bin, it will be immediately deleted from your computer.
A. True
B. Fals
Answer:
B => false
Explanation:
it just keep it on recycle bin => not being removed
Select the correct statement(s) regarding IP addressing.
a. IPv4 and IPv6 addressing is fully compatible with one another.
b. CIDR address format represents a Class C network only used within an intranet.
c. Subnet masks are used with both class and classless IP addresses.
d. all statements are correct.
Subnet masks are used with both class and classless IP addresses is the correct statement. Therefore, the correct option is C.
What is an IP address?A device on the internet or a local network may be identified by its IP address, which is a special address. The rules defining the format of data delivered over the internet or a local network are known as “Internet Protocol,” or IP.
Only C is correct, rest other statements are incorrect because:
a. IPv4 and IPv6 addressing is fully compatible with one another is incorrect. While IPv4 and IPv6 can coexist on the same network, they are not fully compatible with one another.
b. CIDR address format represents a Class C network only used within an intranet is incorrect. Classless Inter-Domain Routing (CIDR) is a technique used to allocate IP addresses more efficiently.
Therefore, subnet masks are used with both class and classless IP addresses is the correct statement. Therefore, the correct option is C.
Learn more about, here
https://brainly.com/question/3805118
#SPJ6
What do you do if your computer dies/malfunctions? Reboot (Restart) Shut Down Recovery CD and Recover your system Call a person to fix it
Answer:
Restart
Explanation:
Simply I may restart my pc if it dies/malfunctions. I'll not restart immediately, I'll wait for an hour and do restart my computer. If it doesn't work then maybe I'll Call a person to fix it.
Write a program that randomly chooses among three different colors for displaying text on the screen. Use a loop to display 20 lines of text, each with a randomly chosen color. The probabilities for each color are to be as follows: white 30%, blue 10%, green 60%. Suggestion: Generate a random integer between 0 and 9. If the resulting integer falls in the range 0 to 2 (inclusive), choose white. If the integer equals to 3, choose blue. If the integer falls in the range 4 to 9 (inclusive), choose green. Test your program by running it ten times, each time observing whether the distribution of line colors appears to match the required probabilities.
INCLUDE Irvine32.inc
.data
msgIntro byte "This is Your Name's fourth assembly extra credit program. Will randomly",0dh,0ah
byte "choose between three different colors for displaying twenty lines of text,",0dh,0ah
byte "each with a randomly chosen color. The color probabilities are as follows:",0dh,0ah
byte "White=30%,Blue=10%,Green=60%.",0dh,0ah,0
msgOutput byte "Text printed with one of 3 randomly chosen colors",0
.code
main PROC
;
//Intro Message
mov edx,OFFSET msgIntro ;intro message into edx
call WriteString ;display msgIntro
call Crlf ;endl
call WaitMsg ;pause message
call Clrscr ;clear screen
call Randomize ;seed the random number generator
mov edx, OFFSET msgOutput;line of text
mov ecx, 20 ;counter (lines of text)
L1:;//(Loop - Display Text 20 Times)
call setRanColor ;calls random color procedure
call SetTextColor ;calls the SetTextColor from library
call WriteString ;display line of text
call Crlf ;endl
loop L1
exit
main ENDP
;--
setRanColor PROC
;
; Selects a color with the following probabilities:
; White = 30%, Blue = 10%, Green = 60%.
; Receives: nothing
; Returns: EAX = color chosen
;--
mov eax, 10 ;range of random numbers (0-9)
call RandomRange ;EAX = Random Number
.IF eax >= 4 ;if number is 4-9 (60%)
mov eax, green ;set text green
.ELSEIF eax == 3 ;if number is 3 (10%)
mov eax, blue ;set text blue
.ELSE ;number is 0-2 (30%)
mov eax, white ;set text white
.ENDIF ;end statement
ret
setRanColor ENDP
What is indirect program memory addressing? Explain the working of the following instructions?
a) JMP AX
b) JMP LIST[DX]
c) JMP NEAR PTR[DI+3]
The instructions operate as follows:
a)
JMP AX :
The JMP instruction is being used to execute an unconditional jump.AX is indeed the label's name. JMP AX codes are being used to transfer control of the flow program to the AX label.b)
JMP LIST:
The JMP command can be used to execute an unconditional jump, JMP LIST[DX] is the label's name. The JMP LIST[DX] program is being used to transfer control of its flow programs to the specified section. It is the segment to which the flow control is transmitted.c)
JMP NEAR PTR[DI+3]:
Unconditional jumps could be done with the JMP command as you'll see, the label is JMP NEAR PTR[DI+3]. It's being used to transmit flow control to a particular section, throughout this case [DI+3]. The close keyword indicates that perhaps the code segment would be in the line of code being nearby.Learn more:
brainly.com/question/20320915
when was first generation of computer invented?
Chất xơ có nhiều trong thực phẩm nào?
Answer: rau củ quả đều có lượng chất xơ nhiều hơn so với các loại thực phẩn khác
Explanation:
5. Which events is used to code on any form load
a) Form Text b) Form Code c) Form Load d) Form Data
Answer:
I think b is correct answer
Describe two types of storage devices?
Answer:
Central Process Unit and Random Access Memory
PartnerServer is a Windows Server 2012 server that holds the primary copy of the PartnerNet.org domain. The server is in a demilitarized zone (DMZ) and provides name resolution for the domain for Internet hosts.
i. True
ii. False
Answer:
i. True
Explanation:
A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.
This ultimately implies that, a DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.
Windows Server 2012 is a Microsoft Windows Server operating system and it was released to the general public on the 4th of September, 2012, as the sixth version of the Windows Server operating system and the Windows NT family.
PartnerServer is a Windows Server 2012 server that was designed and developed to hold the primary copy of the PartnerNet dot org domain.
Typically, the server is configured to reside in a demilitarized zone (DMZ) while providing name resolution for the domain of various Internet hosts.
In order to prevent a cyber attack on a private network, end users make use of a demilitarized zone (DMZ).
A demilitarized zone (DMZ) is a cyber security technique that interacts directly with external networks, so as to enable it protect a private network.
What’s cloud-based LinkedIn automation?
Answer:
Cloud based LinkedIn automation includes tools and software that run through the cloud-system and are not detectable by LinkedIn. Cloud based LinkedIn automation tools are becoming the favorite among B2B marketers and sales professionals as they are giving the desired outcomes without any effort.
Instructions
Create a multimedia project that contains the text element and all the contents that you have studied about that element
Answer:
iiiio888887776558777u765
Select the scenario that describes a top-down approach to data warehouse design.
Cathy’s Cards and Gifts, which has three stores, creates data marts for its sales, marketing, and delivery departments to study the possibility of establishing a new store.
Crawford's Fabrics, which wants to expand its operations, combines data from the purchasing and sales departments into a central database, to be divided into new data marts as needed.
Cynthia’s Florals, which is dealing with debt, creates new data marts for the service, delivery, and sales departments to develop a strategy to stay in business.
Connor’s Meat Market, which just opened, creates data marts to track the sale of each of the following meats: beef, pork, lamb, and fish.
Answer:
Crawford's Fabrics, which wants to expand its operations, combines data from the purchasing and sales departments into a central database, to be divided into new data marts as needed.
The scenario defines a top-down approach to data warehouse design as "Crawford's Fabrics, which wants to expand its operations, combines data from the purchasing and sales departments into a central database, to be divided into new data marts as needed".
What is a top-down approach to data warehouse design?In the "Top-Down" method system, a data warehouse exists defined as a subject-oriented, time-variant, non-volatile, and integrated data storage for the entire business data from various sources exist validated, reformatted, and saved in a normalized (up to 3NF) database as the data warehouse.
Therefore, the correct answer is option b) Crawford's Fabrics, which wants to expand its operations, combines data from the purchasing and sales departments into a central database, to be divided into new data marts as needed.
To learn more about warehouse design
https://brainly.com/question/25885061
#SPJ2