plzzzz help!!!


Drag the tiles to the appropriate buckets.
Which functions do each of the following perform?

Plzzzz Help!!!Drag The Tiles To The Appropriate Buckets.Which Functions Do Each Of The Following Perform?

Answers

Answer 1

Answer:

Record:

"Contains information related to a specific person or other entity"

Report:

"Is generated by running a query"

"Can be in the form of a table or a graph"

Querie:

"Is used to retreieve information from a database"

"Can contain filters"

"Appears horizontally in a table"

Explanation:

THE ONES THAT I UNDERLINED ARE THE ONES IM UNSURE ABOUT

Answer 2

Answer:

Record -

Contains information related  to a specific person or  other entity

Appears horizontally in a table

Report -

Is generated by running  a query

Can be in the form of a table  or a graph

Querie -

Is used to retrieve information  from a database

Can contain filters

Explanation:

I got it right on the Edmentum test.


Related Questions

What is the average rate of change of h(x)=2^{x+1}h(x)=2 x+1 h, (, x, ), equals, 2, start superscript, x, plus, 1, end superscript over the interval [2,4][2,4]open bracket, 2, comma, 4, close bracket?

Answers

Answer:

Average Rate = 12

Explanation:

Given

h(x) = 2^(x + 1)

Interval = [2,4]

Required

Determine the average rate of change

The average rate of change of h(x) is calculated using.

Average Rate = (h(b) - h(a))/(b - a)

Where

[a,b] = [2,4]

Meaning a = 2 and b = 4

So, the formula becomes:

Average Rate = (h(4) - h(2))/(4 - 2)

Average Rate = (h(4) - h(2))/2

Average Rate = ½(h(4) - h(2))

Calculating h(4)

h(4) = 2^(4+1)

h(4) = 2⁵

h(4) = 32

Calculating h(2)

h(2) = 2^(2+1)

h(2) = 2³

h(2) = 8

So, we have:

Average Rate = ½(h(4) - h(2))

Average Rate = ½(32 - 8)

Average Rate = ½ * 24

Average Rate = 12

Hence, the average rate of change is 12

Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk. Even though the risk was migrated, Robert observes some remaining risk linked with access control. What type of risk has been observed by Robert

Answers

Answer:

Disruption of computer service

Explanation:

Access control is a method or technique used by network administrators to organize and limit access to resources in a network. In a computer network, there several threats and risk experienced by users and technician, that threatens the confidentially of information and other resources.

The configured badge reader system needs data and draws bandwidth. When this bandwidth is in use, it reduces the network efficiency and computer services causing low productivity in the organization.

Can someone give me the code for the edhesive 3.7 code practice for python? Thanks. The first person to give a correct answer will get brainlyist.

Answers

Answer:

Try

568458

448952

123456

Also just keep hitting keys till u get it :)

Explanation:

Hope this helps u plz mark brainliest



The admission booth at the show requires each person to enter their age. Then the following program executes (See image.): When age = 16, what action would the program execute?



A. print “16”
B. print “Student price is $8.”
C. print “14”
D. print “Student price is $14.”

Answers

the data represented by numeric whole-number values, either positive or negative, that do not have decimal points

A. Boolean

B. string

C. Float

D. integer

What is another name for repetition in programming?

A. duplication

B. replication

C. redundancy

D. iteration

All of the following are types of errors in a computer program EXCEPT

A. syntax

B. parameter

C. semantic

D. logic

17.

What is one way that programmers insert explanatory statements in their code?

A. for loops

B. compiling code

C. use comments

D. create variables

18.

Why is readable code important? Choose all that apply.

A. It is more fun to write.

B. It makes the purpose and flow of a program easier to understand and follow.

C. Anyone needing to work with the code in the future will have an easier time.

D. It will save time when it is time to update the program.  (MAYBE D AS WELL) if u are allowed to select more than 2

19.

All of the following are true about debugging except

A. debugging is not a necessary process

B. it is a process of identifying and eliminating errors in a software program

C. it is essential to produce high-quality programs

D. eliminating bugs is an important part of the program development cycle

20.

The type of conditional statement that tests if a condition is true or false

A. if

B. not

C. or

D. and

24.

Which best describes a computer bug?

A. a piece of computer hardware that is out of date or has a newer version

B. a piece of computer software containing defects that prevent a program from running properly

C. a piece of computer hardware that is being used improperly

D. a piece of computer software that is out of date or has a newer version

25.

Which set of variables will make code easier to understand?

A. a, b, c

B. sum, price, count

C. xii, xix, xxi

D. x, y, z

23.

An argument is different from a parameter in that an argument

A. refers to a piece of data to be supplied.

B. is a placeholder for a constant value.

C. is the data passed into a parameter.

D. is always variable.

Answer:

B. print "Student price $8."

Explanation:

B

Why is cyberbullying so devastating to many people beyond just the victim?

Answers

Answer: If the situation goes undetected, it can lead to serious situations, self-harm, and damaged relationships. According to Superintendent Alex Geordan, some common long-term effects of cyberbullying include depression, low self-esteem, unhealthy addictions, trust issues, and poor mental health.

List any ten keyboard symbols.​

Answers

Answer:

Esc- Esc (escape) key.

F1 - F12 What are the F1 through F12 keys?

F13 - F24 Information about the F13 through F24 keyboard keys.

Tab Tab key.

Caps lock- Caps lock key.

Shift- Shift key.

Ctrl - Control key.

Fn- Function key.

Alt- Alternate key (PC only; Mac users have an Option key).

Spacebar- Spacebar key.

Hope this helps, have a great day/night, and stay safe!

Compare and contrast the advantages and disadvantages of the Windows, Apple and Linux operating systems.

Answers

In apple, you may do other things that windows can not provide. Yet, Windows are good aswell since it has better things than apple. I’m so sorry if i’m wrong.

How would a person giving a persuasive speech use projection to make a key point?

a. by talking at a faster pace
b. by using a louder voice
c. by pronouncing words clearly
d. by using an upward intonation

Answers

Answer:

B: by using a louder voice

Explanation:

if Edge quiz then B

Answer:

B: by using a louder voice

Explanation:

correct on e2020 :)

What is a product of respiration

Answers

Answer:

carbon dioxide and water

Explanation:

I just downloaded this song and if any one wants to listen to it then go ahead and do that. It’s called Trap Music 2018 âa bass boosted trap mix.

Answers

Answer:

ok

Explanation:

Sam recorded himself practicing a speech. He watched the recording and observed the behaviors. Which behaviors should Sam try to change? Check all that apply.

varying his rate in different parts of the speech
saying "like" several times a minute
demonstrating enthusiasm for the topic
pausing frequently in the middle of sentences
having a rising intonation at the end of many statements

Answers

Answer:

b d e

Explanation:

Answer:

b d e

Explanation:

when is mail merge an effective productivity tool

Answers

Answer:

When a lot of letters with the same body text need to be personalized.

Explanation:

Answer: Mail merge would be the most effective when a lot of letters with the same body text need to be personalized.

Explanation: Ape x

How many passes will it take to find the five in this list? 1, 5, 10, 15, 20, 22, 30 edgenutiy 2020​

Answers

Answer:

1

Explanation:

Answer:

The answer is 2

Explanation:

edge 2020

Which types of watermarks are discussed in the paragraph below?
The watermark can be of different types depending on the application. A
However, a
watermark will not resist tampering.
watermark will resist manipulations of the media.

Answers

Answer:

Blank #1: B. Robust

Blank #2: C. Fragile

Explanation:

I took the test and this was the correct answer! Please like and mark my answer the brainliest if this helped you! :)

A robust watermark will not resist tampering.

A fragile watermark will resist manipulations of the media.

What is a watermark?

A faint design made in paper during manufacture that is visible when held against the light and clearly identifies the maker.

The watermark can be of different types depending on the application.

A robust watermark will not resist tampering.

A fragile watermark will resist manipulations of the media.

Learn more about watermark.

https://brainly.com/question/26321908

#SPJ2

Mary is a student that's always been helpful to other students and plays her part when group assignment is given and ensures that the group work is complete. Mary display good __________ skills.

Answers

Explanation:

..................are there no options?

Teamwork skills I would guess

Out of these video games which one do you think is the best
(dont answer if you have never played at least 3 of these games)
Rivals of Aether
Super smash bros ultimate
Smash flash 2
Project M

Answers

Answer:

Tbh Rivals of Aether was pretty good but I gotta go with SMBU

Explanation:

SMBU was lit that's all there is to it

Answer:

Super smash bros ultimate

Explanation:

its ultimate

Jared has trouble remembering when his assignments are due, and he wants to keep reminders on his computer. Which online note-taking tool would be the best one to use?

Answers

Answer and Explanation:

Google Keep & Google Reminders

Google Keep is an online stick-note tool, that also has an online reminder tool as well. You can also use another platform for reminders such as Google Reminders. Both platforms are easy, online and simple to use!

Answer: electronic sticky notes

Explanation:

:)

QUICKLY PLEASE!!!

Respond to the following in three to five sentences.

What is the purpose of netiquette guidelines?

Answers

Answer: As the conventional etiquette, which lays out rules of ethics in social contexts, the purpose of netiquette is to help create and sustain a friendly, relaxed and productive atmosphere for online contact, as well as to avoid putting pressure on the system and creating tension between users.

Explanation:

What do microphone means

Answers

Answer:

A tiny phone

Explanation:

It means a tiny phone

A material systems developer typically combines the skills of a programmer with the multitasking expectations of a
.

Answers

Explanation:

Material systems developer typically combines the skills of a programmer with the multitasking expectations of developing 3 dimensional models of objects, enhancing the graphical effects.

don't delete my answer this time i try to help ppl

Can someone help me and make a code for this in PYTHON, please? I would be very grateful!
It is estimated that China on July 1, 2019. had 1,420,062,022 inhabitants. The population of China increases by 0.35% every year. Assuming that the annual population growth in China will not change, show the expected population of China in the next ten years.
Please... Thanks in advance!

Answers

Code:

next_ten_years = 1420062022*1.0035**10

print(next_ten_years)

Output:

1470554353.1178253

Explanation:

Since the population of inhabitants increases by [tex]0.35\%[/tex] each year, the total population must be [tex]100.35\%[/tex] of the previous year's population (since it includes the previous size of the population and the [tex]0.35\%[/tex] increase of the population)

The math:

Expected population in next 10 years = [tex]1420062022 \times 1.0035^{10}[/tex]  ([tex]100.35\%[/tex] is [tex]1.0035[/tex])

Code:

Looking at the code above, the '**' raises the power of a number to the number you put after the operator, so 1.0035**10  is [tex]1.0035^{10}[/tex]. The '*' operator multiplies the two numbers that are placed before and after the operator, so 1420062022*1.0035 is [tex]1420062022\times 1.0035[/tex].

The expected population in the next ten years is 1,470,554,353 (if we round to the nearest inhabitants since there can't be a decimal amount of inhabitants).

Hope this helps :)

Hi I will Venmo or cash app 50$ to whoever can get all my school work in a week 8th grade btw.

Answers

Answer:

i gotchu dawg

Explanation:

Answer:

UwU Can't, thanks for le points sowwy

Explanation:

how to get to meters to kilometer

Answers

Answer:

The length in kilometers is equal to the meters divided by 1,000.

Explanation:

The length in kilometers is equal to the meters divided by 1,000.

Just divide it by 100

La sección de lectores de un diario de la ciudad impone como única restricción para la publicación de las cartas, que el texto debe ser de 1500 caracteres. ¿Cuál será el tamaño en KB de un archivo txt que contenga ese texto?

Answers

Answer:

El tamaño de un archivo .txt que contenga esa cantidad de texto será de 1.46 KB.

Explanation:

Se entiende que todo caracter informático posee un tamaño de 1 byte, con lo cual en total el texto no puede superar los 1,500 bytes de tamaño.

Ahora bien, un kilobyte es una unidad de medida informática superior, que se compone de 1,024. Por lo tanto, dado que 1,500 - 1,024 es igual a 474, el tamaño del archivo será de 1 KB y 474 bytes. Así, para calcular el tamaño total del archivo en KB, se debe realizar el siguiente cálculo:

1,024 = 1

474 = X

((474 x 1) / 1,024) = X

0.46 = X

Así, el tamaño de un archivo .txt que contenga esa cantidad de texto será de 1.46 KB.

Which the following is true of functions?

A. Programs written with functions more quickly

B. Function can help remove repeated code from a program

C. Replacing repeated code with a function will reduce the number of commands the computer needs to run.

D. Functions are called once but can be declared many times

Answers

The answer you are clocking for is B. Hope this helped!

One advantage of putting information into a database is that you can filter the data.
O True
O False

Answers

Answer:

True.

Explanation:

One of the purposes of databases is to allow data lookup through queries, which is basically filtering data, using efficient algorithms too.

Answer:

True

Explanation:

Alexandra wants to create a math game in which users have to correctly answer mathematical problems. She wants the game to solve a randomly created problem and then indicate if the player's answers are correct or incorrect. How is Alexandra getting the program to solve mathematical problems?

Answers

Answer:

The way Alexandra will get the program to solve mathematical problems is for her to write an algorithm, so that the computers can follow  series of step-by-step instructions to get the equation solved

Explanation:

From the question, we are informed about Alexandra who  wants to create a math game in which users have to correctly answer mathematical problems. She wants the game to solve a randomly created problem and then indicate if the player's answers are correct or incorrect. In this case the way Alexandra will get the program to solve mathematical problems is for her to write an algorithm, so that the computers can follow  series of step-by-step instructions to get the equation solved. An algorithm  in computer is often created as function, it can be regarded as a step-by-step instructions that are put in place to carry out specific task. This can range from simple process to complex operation, simple operation such as addition or multiplication of numbers and complex operation that involves playing of video file that is compressed.

HELP!!!
To help ensure that an HTML document renders well in many different web browsers, it is important to include which of the following at the top of the file.

A) an tag
B) a doctype declaration
C) a tag
D) a tag

Answers

Answer: B

Explanation:

I did not get why there 3 of the same question

Answer:

I think it is:

B. a doctype declaration

Explanation:

Describe the scope of the variables in this code.

class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName

def __str__(self):
return self.species + " named " + self.petName

def changeName(self, newName):
self.petName = newName

class petCarrier:
size = 'medium'
color = 'red'

The scope of petName ______.

The scope of color is ______.

Accessible to the entire program
limited to the petCarrier class
limited to the pet class


(both of the blanks need one of those answers)

Answers

The scope of petName is local to the class pet.

The scope of color is accessible by all parts of the program.

How to interpret programming variables?

The variable petName is local to the class; This isdue to the fact that the variable was created in a function whose name begins with two underscores.

The variable color; This is created in the petCarrier class and is accessible to the entire function. This was not created in a function whose name begins with an underscore.

Read more about programming variables at; https://brainly.com/question/9238988

#SPJ2

Answer:

The scope of petName limited to the pet class

The scope of color is accessible to the entire program

Explanation:

edge

Makayla is cre iting a brochure for her computer consulting company. She designed the layout and placed a banner containing the
company name in the center of the page. Being unsatisfied with the effect, she has decided to move the text box containing the name
to the top of the page. In 3-5 sentences, describe the procedure Makayla will use to move the banner.

Answers

The procedure depends on the software and methods she uses.

In photoshop or InDesign she might need to fdrag and drop the title to the new location.

In Word/Publisher she has to cut and paste the title to the new location or to drag the box to the top.

Other Questions
is your last chance to make sure your document is ready to carry your message-and your reputation to the intended audience. please help mea piece of wire is 28cm in length is cut into two parts, each part bend to make a square. given that area of square is 416m^2. find the perimeter of each square. What was invented during the Han dynasty to show direction?compassBsextantCwheelbarrowDsilk Oedipus Rex Lines 850-1251 In the lines before this part, what were Oedipus and Creon arguing about? Most Indian religionsA. Emphasized monotheism B. Were not very important to their culture C. Were tied closely to the natural worldD. Used totem poles in ceremonies The perimeter of the picture is36 inches. What is the height ofthe picture?8 inches Find the slope of UV.*S(1, 4)4T(5, 3)V-1, 2)U(3, 1)-2.N.46 x Write the following in slope-intercept form. How does Arizona's constitution compare to the U.S. Constitution? Give examples.please help me Question toQuestions of 8 Page 3Lights on the Lake charges $10 per car plus $2 for every person in the car. If thetotal charge is represented by T, and the number of people in the car is representedWrite an equation for the cost of each car . Use impressment in a sentence about Washingtons presidency. Line m has the equation y = 1/2x - 4If lines m and n are parallel to each other, which of the following equations could represent line n? 2x+y=4 2x-y=4 X+2y=4 X-2y=4 Find the value of 2x+y when x=4 and y3 Which of the following grievances did the new Constitution fail to address?Outlawing the quartering of soldiers.Establishment of a representative government.Right of due process under the law.Establishment of a judicial branch. Where is the dividingline after the KoreanWar? When can your freedom of religion be abridged? 1 3 movie tickets cost $36. At this rate, what is the cost per ticket? I'LL GIVE BRAINLIEST A photograph of two peoples' silhouettes kissing. There are images of hands over the faces.This photograph has elements of ____________, although it is specifically an example of rayograph.a.Surrealismc.ilfochromeb.montaged.Dada artPlease select the best answer from the choices providedABCD Tell whether the triangles are similar.Explain. HOLY MOLY I LOVE GUACOMLY.