Which query is used to list a unique value for V_CODE, where the list will produce only a list of those values that are different from one another?

a. SELECT ONLY V_CODE FROM PRODUCT;
b. SELECT UNIQUE V_CODE FROM PRODUCT;
c. SELECT DIFFERENT V_CODE FROM PRODUCT;
d. SELECT DISTINCT V_CODE FROM PRODUCT;

Answers

Answer 1

Answer:

d. SELECT DISTINCT V_CODE FROM PRODUCT;

Explanation:

The query basically lists a unique value for V_CODE from PRODUCT table.

Option a is incorrect because it uses ONLY keyword which does not use to list a unique value for V_CODE. Instead ONLY keyword is used to restrict the tables used in a query if the tables participate in table inheritance.

Option b is incorrect because it is a constraint that ensures that all values in a column are unique.

Option c is incorrect because DIFFERENT is not a keyword

Option d is correct because the query uses SELECT statement and DISTINCT is used to select only distinct or different values for V_CODE.

Answer 2

The query that should be used for a unique value is option d.

The following information should be considered:

The query listed the unique value for V_CODE arise from the PRODUCT table.Option A is wrong as it used ONLY keyword that does not represent the unique value. Option B is wrong as it is constraint where the columns values are considered to be unique.Option C is wrong as DIFFERENT does not represent the keyword. Option D is right as query applied SELECT and DISTINCT that represent different values.

Therefore we can conclude that the correct option is D.

Learn more: brainly.com/question/22701930


Related Questions

What are the steps In order that Jonah needs to follow to view the renaissance report ?

Answers

Incomplete question. The full question reads;

Jonah needs to add a list of the websites he used to his report. He opens the "Websites" document and copies the information. He now needs to change his view to the "Renaissance" report to add the information before saving his report.

What are the steps, in order, that Jonah needs to follow to view the "Renaissance" report?

Click on the View tab.

Go to the ribbon area.

Click on the "Renaissance" report.

Click on the Switch Windows tab.

Explanation:

Step 1.

Jonah should⇒ Go to the ribbon area

Step 2.

At the ribbon area, he should find and⇒ Click on the View tab.

Step 3.

Next⇒ Click on the Switch Windows tab.

Step 4.

Lastly, he can then⇒ Click on the "Renaissance" report.

Why would a programmer use a web library?

a
to learn about the history of a programming language
b
to quickly insert functions and code into web pages
c
to find books available in their area
d
to see what websites looked like before they were updated

Answers

A programmer that uses a web library quickly inserts functions and code into a web page. The correct option is b.

What is a web library?

Programming libraries are helpful resources that can speed up the work of a web developer. They offer pre-written, reusable portions of code so that programmers can easily and quickly create apps.

A library is a group of documents, applications, scripts, routines, or other pieces of code that can be used as references in computer programming.

Therefore, the correct option is b. to quickly insert functions and code into web pages.

To learn more about web library, refer to the link:

https://brainly.com/question/30137392

#SPJ1

What common feature of well-made web apps helps them stand out from static email
advertisements?
O They help advertise product.
O You can add a chat window for support.
You can integrate images and text related to your brand.
You can reach more people.

Answers

Answer: You can add a chat window for support.

Explanation:

The answer above is a well known feature in well-made web apps and the only difference between apps and static email advertisements in the options.

Both the apps and the email advertisement work to advertise a product so option A is incorrect.

You can also integrate images and text related to your brand in both the app and email.

Both of them enable you to reach more people as well.

Option B is therefore correct.

Answer:

C) You can integrate images and text related to your brand.

Explanation:

Which situation best illustrates how traditional economies meet their citizens needs for employment and income

APEX!!

A. A parent teaches a child to farm using centuries old techniques.
B. A religious organization selects a young person to become a priest
C. A government agency assigns a laborer a job working in a factory
D. A corporation hires an engineer who has just graduated from college

Answers

The situation that best show how traditional economies meet their citizens needs for employment and income  is that a parent teaches a child to farm using centuries old techniques.

What is a traditional economy about?

A traditional economy is known to be a type of system that depends on customs, history, and time framed/honored beliefs.

Tradition is know to be the guide that help in economic decisions such as production and distribution. Regions with traditional economies are known to depend on agriculture, fishing, hunting, etc.

Learn more about  traditional economies from

https://brainly.com/question/620306

What are the negative impacts of cloud computing? Answer this question using examples, in at least 6-8 full sentences.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

There are many benefits of cloud computing, but despite having benefits, there are many negative impacts of cloud computing.

The most known negative impact of cloud computing are given below:

Data confidentiality risk:

when you are using cloud computing services, that means you are handing over your all information over the internet. There is a risk of data confidentiality in this context, your data's security is totally dependent on the service provider. If your service provider security breaches, then your business reputation will also get impacted because your confidential data is managed and controlled by the service provider whose security is breached by someone or hackers.

Depend on internet connection:

Another disadvantage is that if you are working in a developing or under-developed country and you are using cloud computing services. Then your all business managing is relying on the internet. As you know, in developing countries internet speed does matter 24/7 and it is not as fast as required to use cloud computing services for your business.

Data mobility Issue:

Data mobility refers to sharing data between cloud services and in case if the user terminates their services of cloud computing then how you can handle such a situation.

Live help Issue:

some cloud service providers provide you the services online and help you online if you find any error in your services, imagine if in your company 24/7 IT staffs are working on a project, then how you can handle if an error occurs in your cloud computing services and online help also not available. so in this case cloud computing impact negatively your project and organization.  

There is a company of name "Baga" and it produces differenty kinds of mobiles. Below is the list of model name of the moble and it's price model_name Price reder-x 50000 yphone 20000 trapo 25000 Write commands to set the model name and price under the key name as corresponding model name how we can do this in Redis ?

Answers

Answer:

Microsoft Word can dohjr iiejdnff jfujd and

Microsoft Word can write commands to set the model name and price under the key name as corresponding model.

What is Microsoft word?

One of the top programs for viewing, sharing, editing, managing, and creating word documents on a Windows PC is Microsoft Word. The user interface of this program is straightforward, unlike that of PaperPort, CintaNotes, and Evernote.

Word documents are useful for organizing your notes whether you're a blogger, project manager, student, or writer. Because of this, Microsoft Word has consistently been a component of the Microsoft Office Suite, which is used by millions of people worldwide.

Although Microsoft Word has traditionally been connected to Windows PCs, the program is also accessible on Mac and Android devices. The most recent version of Microsoft Office Word.

Therefore, Microsoft Word can write commands to set the model name and price under the key name as corresponding model.

To learn more about microsoft word, refer to the link:

https://brainly.com/question/26695071

#SPJ5

Order the steps for accessing the junk email options in outlook 2016

Answers

Answer:

1 Select a message

2 Locate the delete group on the ribbon

3 Click the junk button

4 Select junk email options

5 Choose one of the protection levels

Explanation:  

Correct on Edg 2021

Answer:

In this Order:

Select Message, Locate delete group, click the junk, choose one of the...

Explanation:

Edg 2021 just took test

what is the interpretation of this statement " Life is not a grand harmony, conflict exist. we much learn how to live it, use it constructively and minimize it's destructive aspect"

Answers

Answer:

Thats true but thats why we should never give up so we may strive to change the world even if it's a little bit.

Explanation:

Hope this helps! :)

This assignment requires you to write a program to analyze a web page HTML file. Your program will read one character at a time from the file specifying the web page, count various attributes in the code for the page, and print a report to the console window giving information about the coding of the page.
Note that a search engine like Google uses at least one technique along similar lines. To calculate how popular (frequently visited or cited) a web page is, one technique is to look at as many other worldwide web pages as possible which are relevant, and count how many links the world's web pages contain back to the target page.
Learning Objectives
To utilize looping structures for the first time in a C++ program
To develop more sophisticated control structures using a combination of selection and looping
To read data from an input file
To gain more experience using manipulators to format output in C++
To consider examples of very simple hypertext markup language (HTML)
Use UNIX commands to obtain the text data files and be able to read from them
Problem Statement
Your program will analyze a few things about the way in which a web page is encoded. The program will ask the user for the name of a file containing a web page description. This input file must be stored in the correct folder with your program files, as discussed in class, and it must be encoded using hypertext markup language, or HTML. The analysis requires that you find the values of the following items for the page:
number of lines (every line ends with the EOLN marker; there will be an EOLN in front of the EOF)
number of tags (includes links and comments)
number of links
number of comments in the file
number of characters in the file (note that blanks and EOLNs do count)
number of characters inside tags
percentage of characters which occur inside tags, out of the total
Here is an example of a very simple HTML file:

Course Web Page
This course is about programming in C++.
Click here You may assume that the HTML files you must analyze use a very limited subset of basic HTML, which includes only the following "special" items: tag always starts with '<' and ends with > link always starts with " comment always starts with "" You may assume that a less-than symbol (<) ALWAYS indicates the start of a tag. A tag in HTML denotes an item that is not displayed on the web page, and often gives instructions to the web browser. For example, indicates that the next item is the overall title of the document, and indicates the end of that section. In tags, both upper and lowercase letters can be used. Note on links and comments: to identify a link, you may just look for an 'a' or 'A' which occurs just after a '<'. To identify a comment, you may just look for a '!' which follows just after a '' (that is, you do not have to check for the two hyphens). You may assume that these are the only HTML language elements you need to recognize, and that the HTML files you process contain absolutely no HTML syntax errors. Note: it is both good style because readability is increased, and convenient, to declare named constants for characters that are meaningful, for example const char TAG OPEN = ' Sample Input Files Program input is to be read from a text file. Your program must ask the user for interactive input of the file name. You can declare a variable to store the file name and read the user's response Miscellaneous Tips and Information You should not read the file more than once to perform the analysis. Reading the file more than once is very inefficient. The simplest, most reliable and consistent way to check for an end of file condition on a loop is by checking for the fail state, as shown in lectures. The eof function is not as reliable or consistent and is simply deemed "flaky" by many programmers as it can behave inconsistently for different input files and on different platforms. You may use only while loops on this project if you wish; you are not required to choose amongst while, do while and/or for loops until project 4 and all projects thereafter. Do not create any functions other than main() for this program. Do not use data structures such as arrays. You may only have ONE return statement and NO exit statements in your code. You may only use break statements inside a switch statement in the manner demonstrated in class; do not use break or continue statements inside loops. #include // used for interactive console I/O #include // used to format output #include // used to retrieve data from file #include // used to convert data to uppercase to simplify comparisons #include 11 for string class functions int main() { 1 //constants for analysing HTML attributes const char EOLN = '\n'; const char COMMENT_MARK = '!'; const char LINK='A'; //constants to format the output const int PAGEWIDTH = 70; const char UNDERLINE = '='; const char SPACE = const int PCT_WIDTH = 5; const int PCT_PRECISION = 2;

Answers

Answer:

bro it is a question what is this

Explanation:

please follow me

For this lab you will do 2 things:


Solve the problem in an algorithm

Code it in Python

Problem:


Cookie Calories


A bag of cookies holds 40 cookies. The calorie information on the bag claims that there are 10 "servings" in the bag and that a serving equals 300 calories. Write a program that asks the user to input how many cookies he or she ate and the reports how many total calories were consumed.


*You MUST use constants to represent the number of cookies in the bag, number of servings, and number of calories per serving. Remember to put constants in all caps!


Make sure to declare and initialize all variables before using them!


Then you can do the math using those constants to find the number of calories in each cookie.


Make this program your own by personalizing the introduction and output.




Sample Output:


WELCOME TO THE CALORIE COUNTER!!

Answers

Answer:

Here is the Python program:

COOKIES_PER_BAG = 40 #sets constant value for bag of cookies

SERVINGS_PER_BAG = 10 #sets constant value for serving in bag

CALORIES_PER_SERVING = 300 #sets constant value servings per bag

cookies = int(input("How many cookies did you eat? ")) #prompts user to input how many cookies he or she ate

totalCalories = cookies * (CALORIES_PER_SERVING / (COOKIES_PER_BAG / SERVINGS_PER_BAG)); #computes total calories consumed by user

print("Total calories consumed:",totalCalories) #displays the computed value of totalCalories consumed

Explanation:

The algorithm is:

StartDeclare constants COOKIES_PER_BAG, SERVINGS_PER_BAG and CALORIES_PER_SERVINGSet COOKIES_PER_BAG to 40Set SERVINGS_PER_BAG to 10Set CALORIES_PER_SERVING to 300Input cookiesCalculate totalCalories:                                                                                                                       totalCalories ← cookies * (CALORIES_PER_SERVING / (COOKIES_PER_BAG / SERVINGS_PER_BAG))Display totalCalories

I will explain the program with an example:

Lets say user enters 5 as cookies he or she ate so

cookies = 5

Now total calories are computed as:

totalCalories = cookies * (CALORIES_PER_SERVING / (COOKIES_PER_BAG / SERVINGS_PER_BAG));  

This becomes:

totalCalories = 5 * (300/40/10)

totalCalories = 5 * (300/4)

totalCalories = 5 * 75

totalCalories = 375

The screenshot of program along with its output is attached.

You want to look up colleges but exclude private schools. Including punctuation, what would you
type?
O nonprofit college
O college -private
O private -college
O nonprofit -college

Answers

private-college. hope this helped :)

You want to look up colleges but exclude private schools. Including punctuation, The type is private -college. The correct option is c.

What are institutions of higher studies?

The institutions for higher studies are those institutions that provide education after schooling. They are colleges and universities. Universities, colleges, and professional schools that offer training in subjects like law, theology, medicine, business, music, and art are all considered higher education institutions.

Junior colleges, institutes of technology, and schools for future teachers are also considered to be part of higher education. There are different types of colleges, like government colleges and private colleges. Private colleges are those which are funded by private institutions.

Therefore, the correct option is c. private -college.

To learn more about excluding, refer to the link:

https://brainly.com/question/27246973

#SPJ2

When you check to see how much RAM, or temporary storage you have available, you are checking your _____.

primary memory

secondary storage

secondary memory

tertiary storage

Answers

When you check to see how much RAM, or temporary storage you have available, you are checking your primary memory.

The correct option is first.

What is drive?

Drive provides a storage space and speed for processing the data in the drive on the personal computers or laptops at low cost.

RAM, also known as Random Access Memory, is storage drive which is temporary but primary.

So, RAM is considered as primary memory.

Thus, when you check to see how much RAM, or temporary storage you have available, you are checking your primary memory.

Learn more about drive.

https://brainly.com/question/10677358

#SPJ2

Student Generated Code Assignments Option 1: Write a program that will read in 3 grades from the keyboard and will print the average (to 2 decimal places) of those grades to the screen. It should include good prompts and labeled output. Use the examples from the earlier labs to help you. You will want to begin with a design. The Lesson Set 1 Pre-lab Reading Assignment gave an introduction for a design similar to this problem. Notice in the sample run that the answer is stored in fixed point notation with two decimal points of precision. Sample run: Option 2: The Woody furniture company sells the following three styles of chairs: Style Price Per Chair American Colonial $ 85.00 Modern $ 57.50 French Classical $127.75 Write a program that will input the amount of chairs sold for each style. It will print the total dollar sales of each style as well as the total sales of all chairs in fixed point notation with two decimal places.
Sample run:
Please input the first grade 97
Please Input the second grade 98.3
Please Input the third grade 95
The average of the three grades is 96.77

Answers

In python:

first_grade = float(input("Please input the first grade "))

second_grade = float(input("Please input the second grade "))

third_grade = float(input("Please input the third grade "))

print("The average of the three grades is {}".format( round((first_grade + second_grade + third_grade) / 3,2)))

First_ grade = float(input("Please input the first grade ")) and second_ grade = float(input("Please input the second grade ")), third_ grade = float(input("Please input the third grade.

What is Program?

A computer utilizes a program, which is a collection of instructions, to carry out a particular task. A program is like a computer's recipe, to use an analogy.

It has a list of components (known as variables, which can stand for text, graphics, or numeric data) and a list of instructions (known as statements), which instruct the computer on how to carry out a certain operation.

Programming languages with particular syntax, like C++, Python, and Ruby, are used to develop programs. These high level programming languages are writing and readable by humans.

Therefore, First_ grade = float(input("Please input the first grade ")) and second_ grade = float(input("Please input the second grade ")), third_ grade = float(input("Please input the third grade.

To learn more Programming, refer to the link:

https://brainly.com/question/11023419

#SPJ2

Assignment 3 chatbot edhesive

Answers

Answer:

name1=input("What is your first name? ")

name2=input("What is your last name? ")

print("Hi there, "+ name1+" "+name2 +" ,nice to meet you!")

print("How old are you?")

age = int(input(" "))

print(str(age) + " is a good age.")

if(age >= 16):

   print("You are old enough to drive. \n")

else:

   print("Still taking the bus, I see. \n")

   

print("So, " + name1 + ", how are you today?")

feel=input("")

print("You are " + feel),

if(feel== "Happy"):

   print("That is good to hear.")

elif(feel == "Sad"):

   print("I'm sorry to hear that. ")

else:

   print("Oh my!")

   

print("Tell me more. \n")

next=input("")

import random

r = random.randint(1, 3)

if(r==1):

   print("Sounds interesting. \n")

elif(r==2):

   print("That's good to hear. \n")

else:

   print("How unusual. \n")

print("Well, " + name1 + ", it has been nice chatting with you.")

Explanation:

To what does the term "versioning information" refer?
O the version of software that a system is running
the version of your monitor
the number of versions of a virus you have
the version of your PC

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The versioning information refers to the version of the software that a system is running. Versioning of software is the creation and managing of multiple releases of software that all have the same general functionality but improved, modified, upgraded, and customized.

so the correct answer to this question is version information refers to the version of a software that a system is running.  

Other options are not correct, because the term version mostly used for software, web application, and web, API services.

The best term use for a version of monitor and PC is model number and also noted that virus detecting software can have version number but the virus itself doesn't have any version number.

So all other options of this question are incorrect except the first option that is:- Versioning information refers to the version of the software that a system is running.

Compare the ufw status verbose command output with Windows Firewall with the Advanced Security Windows Firewall Properties you investigated in an earlier lab. Describe the major similarities that you observe.

Answers

Answer:

Following are the solution to this question:

Explanation:

Its common factor between both the ufw state glib collection consisted of times more likely Protection View Firewall Property is that they demonstrate the status of the network. So, the consumer sees that path could go to next.

The following are the command which is defined in the attached file.

Defining the components of the system and how these components are related to each other is part of the:____________.a. architectural design phase.b. detailed design phase.c. requirements phase.d. All of these are correct

Answers

Answer:

a. architectural design phase.

Explanation:

Architectural design phase basically deals with the interaction between the very important and essential modules of the software system that is to be developed.

Hence, defining the components of the system and how these components are related to each other is part of the architectural design phase. These components include the input, process, and output, they are linked to their respective interface in order to establish the functionality and framework of the software system.

Language: C
Introduction
For this assignment you will write an encoder and a decoder for a modified "book cipher." A book cipher uses a document or book as the cipher key, and the cipher itself uses numbers that reference the words within the text. For example, one of the Beale ciphers used an edition of The Declaration of Independence as the cipher key. The cipher you will write will use a pair of numbers corresponding to each letter in the text. The first number denotes the position of a word in the key text (starting at 0), and the second number denotes the position of the letter in the word (also starting at 0). For instance, given the following key text (the numbers correspond to the index of the first word in the line):
[0] 'Twas brillig, and the slithy toves Did gyre and gimble in the wabe;
[13] All mimsy were the borogoves, And the mome raths outgrabe.
[23] "Beware the Jabberwock, my son! The jaws that bite, the claws that catch!
[36] Beware the Jubjub bird, and shun The frumious Bandersnatch!"
[45] He took his vorpal sword in hand: Long time the manxome foe he sought—
The word "computer" can be encoded with the following pairs of numbers:
35,0 catch
5,1 toves
42,3 frumious
48,3 vorpal
22,1 outgrabe
34,3 that
23,5 Beware
7,2 gyre

Answers

The .cpp code is avaiable bellow

Code:

#include <stdio.h>

#include <string.h>

int main()

{

    char **kW;

    char *fN;

    int nW = 0;

    kW = malloc(5000 * sizeof(char*));

    for (int i = 0; i<5000; i++)

    {

         kW[i] = (char *)malloc(15);

    }

    fN = (char*)malloc(25);

    int choice;

    while (1)

    {

         printf("1) File text to use as cipher\n");

         printf("2) Make a cipher with the input text file and save result as output file\n");

         printf("3) Decode existing cipher\n");

         printf("4) Exit.\n");

         printf("Enter choice: ");

         scanf("%d", &choice);

         if (choice == 1)

         {

             nW = readFile(kW, fN);

         }

         else if (choice == 2)

         {

             encode(kW, fN, nW);

         }

         else

         {

             Exit();

         }

         printf("\n");

    }

    return 0;

}

int readFile(char** words, char *fN)

{

    FILE *read;

    printf("Enter the name of a cipher text file:");

    scanf("%s", fN);

    read = fopen(fN, "r");

    if (read == NULL)

    {

         puts("Error: Couldn't open file");

         fN = NULL;

         return;

    }

    char line[1000];

    int word = 0;

    while (fgets(line, sizeof line, read) != NULL)

    {

         int i = 0;

         int j = 0;

         while (line[i] != '\0')

         {

             if (line[i] != ' ')

             {

                  if (line[i] >= 65 && line[i] <= 90)

                  {

                       words[word][j] = line[i]; +32;

                  }

                  else

                  {

                       words[word][j] = line[i];

                  }

                  j++;

             }

             else

             {

                  words[word][j] = '\n';

                  j = 0;

                  word++;

             }

             i++;

         }

         words[word][j] = '\n';

         word++;

    }

    return word;

}

void encode(char** words, char *fN, int nwords)

{

    char line[50];

    char result[100];

    if (strcmp(fN, "") == 0)

    {

         nwords = readFile(words, fN);

    }

    getchar();

    printf("Enter a secret message(and press enter): ");

    gets(line);    

    int i = 0, j = 0;

    int w = 0, k = 0;

    while (line[i] != '\0')

    {        

         if (line[i] >= 65 && line[i] <= 90)

         {

             line[i] = line[i] + 32;

         }

         w = 0;

         int found = 0;

         while (w<nwords)

         {

             j = 0;

             while (words[w][j] != '\0')

             {

                  if (line[i] == words[w][j])

                  {

                       printf("%c -> %d,%d \n", line[i], w, j);

                       found = 1;

                       break;

                  }

                  j++;

             }

             if (found == 1)

                  break;

             w++;

         }

         i++;

    }

    result[k] = '\n';

}

void Exit()

{

    exit(0);

}

Cable television systems originated with the invention of a particular component. What was this component called?​

Answers

Answer:

Cable television is a system of delivering television programming to consumers via radio frequency (RF) signals transmitted through coaxial cables, or in more recent systems, light pulses through fibre-optic cables. This contrasts with broadcast television (also known as terrestrial television), in which the television signal is transmitted over the air by radio waves and received by a television antenna attached to the television; or satellite television, in which the television signal is transmitted by a communications satellite orbiting the Earth and received by a satellite dish on the roof. FM radio programming, high-speed Internet, telephone services, and similar non-television services may also be provided through these cables. Analog television was standard in the 20th century, but since the 2000s, cable systems have been upgraded to digital cable operation.

Explanation:

[tex]hii[/tex]have a nice day ✌️✌️

Cable television systems originated with the invention of a particular component. The component is a coaxial cable. The correct option is A.

What is a cable television system?

Radiofrequency (RF) signals are transferred through coaxial cables, or in more current systems, light pulses are transmitted through fiber-optic cables, to deliver television programming to viewers via cable television networks.

This is in contrast to satellite television, which transmits the television signal via a communications satellite orbiting the Earth and receives it via a satellite dish.

It broadcast television, in which the television signal is transmitted over the air by radio waves and received by a television antenna attached to the television.

Therefore, the correct option is A. coaxial cable.

To learn more about the cable television system, refer to the link:

https://brainly.com/question/29059599

#SPJ2

The question is incomplete. Your most probably complete question is given below:

A. coaxial cable

B. analog transmission

C. digital transmission

D. community antenna

Explain why it is not necessary for a program to be completely free of defects before it is delivered to its customers?

Answers

Answer:

Testing is done to show that a program is capable of performing all of its functions and also it is done to detect defects.

It is not always possible to deliver a 100 percent defect free program

A program should not be completely free of all defects before they are delivered if:

1. The remaining defects are not really something that can be taken as serious that may cause the system to be corrupt

2. The remaining defects are recoverable and there is an available recovery function that would bring about minimum disruption when in use.

3. The benefits to the customer are more than the issues that may come up as a result of the remaining defects in the system.

In ____________, a large IP address block could be divided into several contiguous groups and each group be assigned to smaller networks.

Answers

There are no answers given in this question

The hide/unhide feature only hides in the
_____ view?​

Answers

Answer: main...?

Explanation:

what is a computer ?it types​

Answers

Answer:

A computer is a digital device that you can do things on such as play games, research something, do homework.

Explanation:

Answer:

A computer can be best described as an electronic device that works under the control of information stored in it's memory.

There are also types of computers which are;

Microcomputers/personal computerMini computersMainframe computerssuper computers

Assume you are using an array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements, dequeue 5 elements, and then enqueue 1 more element. Which index of the internal array elements holds the value of that last element you enqueued

Answers

Answer:

The answer is "5".

Explanation:

In the queue based-array, it follows the FIFO method, and in the question, it is declared that a queue has a capacity of 10 elements, and insert the 5 elements in the queue and after inserting it enqueue 5 elements and at the last, it inserts an element 1 more element on the queue and indexing of array always start from 0, that's why its last element index value is 5.

Select the items that you may see on a Windows desktop.
Shortcuts to frequently used programs
System tray
Recycle Bin
Taskbar
O Database
Icons
O Quick Launch

Answers

Answer:

You may see:

The taskbar

The startmenu

Program icons within the taskbar

Shortcuts

Documents

Folders

Media files

Text files

The Recycle Bin

and so on...

Which of the following best describes open-source code software?
O A. a type of software that is open to the public and can be modified
B. a type of software that is free to download, but cannot be modified
C. a type of software that is locked, but can be modified
D. a type of software that has already been modified

Answers

Answer:

A. a type of software that is open to the public and can be modified.

Explanation:

Open-source refers to anything that is released under a license in which the original owner grants others the right to change, use, and distribute the material for any purpose.

Open-source code software is described as a type of software that is open to the public and can be modified. The correct option is A.

What is open-source code?

Open-source software is computer software that is distributed under a licence that allows users to use, study, change, and distribute the software and its source code to anyone and for any purpose.

Open-source software can be created collaboratively and publicly. Open-source refers to anything that is released under a licence that allows others to change, use, and distribute the material for any purpose.

Therefore, open-source code software is defined as software that is freely available to the public and can be modified. A is the correct answer.

To know more about open-source code follow

https://brainly.com/question/15039221

#SPJ6

I need help. People who know computer science. I have selected a word from the first 1000 words in my dictionary. Using the binary search algorithm, how many questions do you have to ask me to discover the word I have chosen?
a. 8 b. 10 c. 12 d. 14

Answers

Answer:

14

Explanation:

Works in the public domain have copyright that are expired or abandoned true or false

Answers

Answer:

False

Explanation:

Only one of the two are true. Works in the public domain have a copyright that has expired only. E.g. Works of classical music artist, are almost always expired, in accorance with American Copyright law. Abandoning a copyright doesn't do anything because so long the copyright has remained unexpired, the copyright remains. Thats why it can take decades for a new movie in a series to release, like "IT" by Stephen King. The copyright hasn't expired but rather was 'abandoned'. Before "IT" 2017 was relasesed, the copyright was abandoned.

________________________ is an information system that stores user data in many different geographical locations and makes that data available on demand.

Answers

Answer:

CDN(content delivery network)

Explanation:

Content delivery network(CDN) which can as well be regarded as Content Distribution Network helps in acheiving high website performance, it essential in reduction of latency, through making the time a request is made using a website to when the website is fully loaded to be short and Minimal. It important in a situation whereby there is traffic loads from the users as well as server. It should be noted that CDN

is an information system that stores user data in many different geographical locations and makes that data available on demand. CDN's usefulness is also found in Cloud computing network such as Software as a service(SaaS). Google doc is an example.

Your program is going to compare the distinct salaries of two individuals for the last 5 years. If the salary for the two individual for a particular year is exactly the same, you should print an error and make the user enter both the salaries again for that year. (The condition is that there salaries should not be the exact same).Your program should accept from the user the salaries for each individual one year at a time. When the user is finished entering the salaries, the program should print which individual made the highest total salary over the 5 year period. This is the individual whose salary is the highest.You have to use arrays and loops in this assignment.In the sample output examples, what the user entered is shownin italics.Welcome to the winning card program.
Enter the salary individual 1 got in year 1>10000
Enter the salary individual 2 got in year 1 >50000
Enter the salary individual 1 got in year 2 >30000
Enter the salary individual 2 got in year 2 >50000
Enter the salary individual 1 got in year 3>35000
Enter the salary individual 2 got in year 3 >105000
Enter the salary individual 1 got in year 4>85000
Enter the salary individual 2 got in year 4 >68000
Enter the salary individual 1 got in year 5>75000
Enter the salary individual 2 got in year 5 >100000
Individual 2 has the highest salary

Answers

In python:

i = 1

lst1 = ([])

lst2 = ([])

while i <= 5:

   person1 = int(input("Enter the salary individual 1 got in year {}".format(i)))

   person2 = int(input("Enter the salary individual 1 got in year {}".format(i)))

   lst1.append(person1)

   lst2.append(person2)

   i += 1

if sum(lst1) > sum(lst2):

   print("Individual 1 has the highest salary")

else:

   print("Individual 2 has the highest salary")

This works correctly if the two individuals do not end up with the same salary overall.

Other Questions
this half my grade i cant fail help What is m Which type of cloud is incorrectly paired with its shape? A. Cirrus: wispy, feathery B. Cumulus: narrow, smoky C. Cumulonimbus: towering with a flat top D. Stratus: flat layers Elsie is playing basketball and decides that she wants to make a shot. She dribbles, stops and shoots the ball. Which are the three main body systems that allowed her to do this? Help!!!! Teah was selling candy bars for a fundraiser. She spent $25 on a box of candy bars and sold each candy bar for $2.50. Her profit was $75. Teah wrote the equation 2.5c25=75 for this situation, and she found c=40.Which statement is true about the solution c=40? 1. The solution c=40 is the amount in dollars that Teah spent on a box.2. The solution c=40 is the number of candy bars Teah sold.3. The solution c=40 is the selling cost of each candy bar, in dollars. (Wrong)4. The solution c=40 is the profit in dollars Teah made from each candy bar.5. The solution c=40 is the selling cost of a box of candy bars, in dollars. x - 4 = -1 whats does x equal According to Masterfoods, the company that manufactures M&Ms, 12% of peanut M&Ms are brown, 15% are yellow, 12% are red, 23% are blue, 23% are orange and 15% are green. [Round your answers to three decimal places, for example: 0.123]Compute the probability that a randomly selected peanut M&M is not yellow.Compute the probability that a randomly selected peanut M&M is brown or red.Compute the probability that three randomly selected peanut M&Ms are all brown.If you randomly select three peanut M&Ms, compute that probability that none of them are blue.If you randomly select three peanut M&Ms, compute that probability that at least one of them is blue. positive decimals less than 2 with an interval of 0.25 between each pair of decimals??? please help me Convert 2 days into months. Round your answer to the nearest hundredth. Is 'Most states require training and tests in bug identification and use of chemicals.' a simple, compound, or complex sentence? Give an example, other than making ice-cream or a slushy, where the effect of salt on the phase change of water is useful in everyday life.ASAP PLS AND THANK YOU 1.la novela de Patricia.2. Tlista? Quiero salir ahora.3. Los pasaportesen tu maleta!4. Las islas Galpagosen el ocano Pacfico.5. La clase de historiamuy aburrida.6. El seor Rivasprofesor de matemticas,7. Maanajueves, no?8. Su autosucio9.21ustedes puertorriqueos?10. Tres? No, hoyel dos de febrero. What is the final proof statement?SASSSSASAAASHL I NEED HELPPPppp!!!! The 5 members of theJackson family wentto a hockey game.They paid $20 forsnacks. In all, thetickets cost 4 timesthe cost of the snacks.How much did a single ticket cost? I NEED HELP ASAP!!!!! PLEASEEEEE A=3b = 2print (a ** b)What is output? Which of the following contributed to the development of mercantilism?A) the desire to eliminate barriers to free tradeB) the scarcity of valuable natural resourcesC) growing opposition to slavery in EuropeD) overcrowding in major European cities HELP ME PLEASE HELP HELP HELP The belief in karma is said to