Why do many question and answer sites require accounts to use and wont show you the answer unless you login? Like quora for example, I HAVE to use my main email just to know the answer to a simple question. I know its not school related but many of the sites for these questions are restricted by the school.

Answers

Answer 1

Answer:t depends on whether or not the website is secure and it's a well-known website. Or it could be a scam. Unfortunately we all have to worry about that now. If ...

4 answers

·

12 votes:

if you give them your email address along with your password of course t

Explanation:


Related Questions

explain the advantage of file-based approach manual data management approach?​

Answers

Answer:

The main advantage of a file-based approach to manual data management is that it is simple and easy to understand. Each file is used to store a specific type of data, and the files are stored in a logical hierarchy. This makes it easy to find the data you need, and it also makes it easy to keep track of the data.

Another advantage of a file-based approach is that it is very flexible. You can easily add new files or modify existing files to meet your needs. This makes it a good choice for small businesses or organizations that need to be able to adapt quickly to changes.

Finally, a file-based approach is very cost-effective. You don't need to purchase any special software or hardware, and you can easily set it up yourself. This makes it a good choice for businesses or organizations that are on a tight budget.

However, there are also some disadvantages to a file-based approach. One disadvantage is that it can be difficult to manage large amounts of data. Another disadvantage is that it can be difficult to keep track of changes to the data. Finally, a file-based approach can be less secure than other methods of data management.

Overall, a file-based approach to manual data management is a simple, flexible, and cost-effective way to store data. However, it is important to weigh the advantages and disadvantages before deciding if it is the right choice for your needs.

Please I need help with the program using Java, it is about the blackjack game and roulette in the casino.
For blackjack, I wrote like this:
int dealer = (int)(Math.random()*10) + 1; // generate random number between 1-10 for dealer
int player = (int)(Math.random()*10) + 1; // generate random number between 1-10 for player
for roulette like this:
int randomNumber = (int)(Math.random()*35) + 1; // generate random number between 1-36
is it correct? If not can you please help me?

Answers

Your written code for generating random numbers for both blackjack as well as roulette is correct.

What is the program  about?

For blackjack, you generate a chance number between 1 and 10 for two together the dealer and the performer using the Math.haphazard() method, and before you increase 1 to the result to get any between 1 and 10. This will work well for the ticket game where the program values are middle from two points 1 and 10, and there is no need to produce numbers above 10.

For roulette, it  will work well for the game of game depending on luck, where practice on the wheel range from 1 to 36.

Learn more about program  from

https://brainly.com/question/23275071

#SPJ1

6.1.1 bricks codehs javascript please

Answers

Answer:

// This code is for the Breakout game in CodeHS.

// Create the canvas.

var canvas = document.getElementById("game-canvas");

// Create the ball.

var ball = {

 x: canvas.width / 2,

 y: canvas.height / 2,

 dx: 5,

 dy: -5

};

// Create the paddle.

var paddle = {

 x: canvas.width / 2,

 y: canvas.height - 20

};

// Create the bricks.

var bricks = [];

for (var i = 0; i < 10; i++) {

 for (var j = 0; j < 5; j++) {

   bricks.push({

     x: 20 + j * 100,

     y: 20 + i * 20

   });

 }

}

// Draw the ball.

function drawBall() {

 var ctx = canvas.getContext("2d");

 ctx.fillStyle = "red";

 ctx.fillCircle(ball.x, ball.y, 10);

}

// Draw the paddle.

function drawPaddle() {

 var ctx = canvas.getContext("2d");

 ctx.fillStyle = "blue";

 ctx.fillRect(paddle.x, paddle.y, 100, 20);

}

// Draw the bricks.

function drawBricks() {

 var ctx = canvas.getContext("2d");

 ctx.fillStyle = "gray";

 for (var i = 0; i < bricks.length; i++) {

   ctx.fillRect(bricks[i].x, bricks[i].y, 100, 20);

 }

}

// Update the ball's position.

function updateBall() {

 ball.x += ball.dx;

 ball.y += ball.dy;

 // If the ball hits the top or bottom of the canvas, reverse its y-direction.

 if (ball.y < 0 || ball.y > canvas.height) {

   ball.dy = -ball.dy;

 }

 // If the ball hits the left or right side of the canvas, reverse its x-direction.

 if (ball.x < 0 || ball.x > canvas.width) {

   ball.dx = -ball.dx;

 }

 // If the ball hits the paddle, reverse its x-direction.

 if (ball.x + 10 > paddle.x && ball.x < paddle.x + 100 && ball.y > paddle.y && ball.y < paddle.y + 20) {

   ball.dx = -ball.dx;

 }

 // If the ball hits a brick, remove the brick and reverse the ball's x-direction.

 for (var i = 0; i < bricks.length; i++) {

   if (ball.x + 10 > bricks[i].x && ball.x < bricks[i].x + 100 && ball.y > bricks[i].y && ball.y < bricks[i].y + 20) {

     bricks.splice(i, 1);

     ball.dx = -ball.dx;

     break;

   }

 }

}

// Start the game loop.

function startGame() {

 // Clear the canvas.

 var ctx = canvas.getContext("2d");

 ctx.clearRect(0, 0, canvas.width, canvas.height);

 // Draw the ball.

 drawBall();

 // Draw the paddle.

 drawPaddle();

 // Draw the bricks.

 drawBricks();

 // Start the game loop.

 setInterval(updateBall, 20);

}

// Start the game.

startGame();

Here is one possible answers for the CodeHS Javascript and Graphics 3.2.4 activity that prints the statement.

What is center of the circle?

The center of a circle is the center point in a circle from which all the distances to the points on the circle are equal. This distance is called the radius of the circle. Here, point P is the center of the circle.

The diameter of a circle is the distance from a point on the circle to a point. radians away, and is the maximum distance from one point on a circle to another. The diameter of a sphere is the maximum distance between two antipodal points on the surface of the sphere.

The Code HS activity may have specific requirements or constraints that this solution does not take into account. It's best to review the instructions and use this as a guide.

Therefore, The distance between the center of the circle to its circumference is the radius.

Learn more about radius on:

brainly.com/question/13449316

#SPJ2

which ine if these is a subtractive theory

Answers

Answer: b I think please correct me if I'm wrong

Explanation:

write algorithm to determine a student final grade and indicate whether it passing or failing the final grade is calculate as the average of four marks

Answers

This approach makes the assumption that the marks have already been entered and are being saved in a list or array. If not, you will need to provide input statements to collect the user's marks.

How do you determine whether a learner has passed or failed an algorithm?

Let's say the passing score in Microsoft Excel is 70. And the student's grades are a B4. Afterward, type the following formula in cell C4: =IF(B470,"FAIL","PASS"). Accordingly, insert the word FAIL in cell B4 if the score in B4 is less than 70, otherwise/otherwise enter the wordPASS.

1. Set sum to zero

2. FOR i = 0 to 3

3. input symbols [i]

4. SET marks[i] = marks + sum

5. END WITH

SET average = total / 4.

7. Set the final grade to the average.

PRINT "Passing" + final_grade IF final_grade >= 50.

10. ELSE

11. PRINT "Failing" followed by the grade

12. END IF

To know more about array visit:-

https://brainly.com/question/13107940

#SPJ9

What is a cross-functional team?

Answers

Answer:

groups consisting of people from different functional areas of the company – for example, marketing.

Chapter 6: Use a list to store the players
Update the program so it allows you to store the players for the starting lineup. This
should include the player's name, position, at bats, and hits. In addition, the program
should calculate the player's batting average from at bats and hits.
Console

====:

MENU OPTIONS
1 Display lineup
2 Add player
3 Remove player
-
4 Move player
5
Edit player position
6 Edit player stats
7 - Exit program
POSITIONS
C, 1B, 2B, 3B, SS, LF, CF, RF, P
=======
Menu option: 2
Name: Mike
Position: OF
Invalid position. Try again.
POSITIONS
C, 1B, 2B, 3B, SS, LF, CF, RF, P
Position: CF
At bats: 4
Hits: 1
Mike was added.
1
2
3
4
Menu option: 1
Player
Baseball Team Manager
Joe
Tom
Ben
Mike
Hits: 3
Mike was updated.
Menu option: 6
Lineup number: 4
You selected Mike AB=0 H=0
At bats: 10
Menu option: 4
Current lineup number: 4
Mike was selected.
New lineup number: 1
Mike was moved.
Menu option: 7
Bye!
POS
P
SS
3B
с
AB
10
11
9
4
H
2431
==================
AVG
Specifications
Use a list of lists to store each player in the lineup.
Use a tuple to store all valid positions (C, 1B, 2B, etc).
Make sure that the user's entry for position is valid, and entries for hits and at bats
make sense.
0.2
0.364
0.333
0.25

Answers

Answer:

Here's the updated program that allows you to store the players for the starting lineup using a list of lists:

POSITIONS = ('C', '1B', '2B', '3B', 'SS', 'LF', 'CF', 'RF', 'P')

lineup = []

def display_lineup():

   print("Player\tPosition\tAt Bats\tHits\tBatting Average")

   for player in lineup:

       name, position, at_bats, hits = player

       if at_bats == 0:

           avg = 0

       else:

           avg = hits / at_bats

       print(f"{name}\t{position}\t\t{at_bats}\t{hits}\t{avg:.3f}")

def add_player():

   name = input("Name: ")

   position = input("Position: ")

   if position not in POSITIONS:

       print("Invalid position. Try again.")

       return

   at_bats = int(input("At bats: "))

   hits = int(input("Hits: "))

   lineup.append([name, position, at_bats, hits])

   print(f"{name} was added.")

def remove_player():

   name = input("Name: ")

   for player in lineup:

       if player[0] == name:

           lineup.remove(player)

           print(f"{name} was removed.")

           return

   print(f"{name} is not in the lineup.")

def move_player():

   name = input("Name: ")

   for i, player in enumerate(lineup):

       if player[0] == name:

           current_index = i

           break

   else:

       print(f"{name} is not in the lineup.")

       return

   new_index = int(input("New lineup number: ")) - 1

   lineup[current_index], lineup[new_index] = lineup[new_index], lineup[current_index]

   print(f"{name} was moved.")

def edit_position():

   name = input("Name: ")

   for player in lineup:

       if player[0] == name:

           position = input("New position: ")

           if position not in POSITIONS:

               print("Invalid position. Try again.")

               return

           player[1] = position

           print(f"{name} was updated.")

           return

   print(f"{name} is not in the lineup.")

def edit_stats():

   name = input("Name: ")

   for player in lineup:

       if player[0] == name:

           at_bats = int(input("At bats: "))

           hits = int(input("Hits: "))

           player[2] = at_bats

           player[3] = hits

           print(f"{name} was updated.")

           return

   print(f"{name} is not in the lineup.")

while True:

   print("""

   MENU OPTIONS

   1 Display lineup

   2 Add player

   3 Remove player

   4 Move player

   5 Edit player position

   6 Edit player stats

   7 Exit program

   """)

   choice = input("Menu option: ")

   if choice == '1':

       display_lineup()

   elif choice == '2':

       add_player()

   elif choice == '3':

       remove_player()

   elif choice == '4':

       move_player()

   elif choice == '5':

       edit_position()

   elif choice == '6':

       edit_stats()

   elif choice == '7':

       print("Bye!")

       break

   else:

       print("Invalid option. Try again.")

The program uses a list of lists to store each player in the lineup. Each sublist contains the player's name, position, at bats

Explanation:

Why is it better for a CPU to have more than one cache?

A. The CPU needs to have backup cache units in case of electrical failure.
B. More cache means more areas to hold data waiting to be processed.
C. More cache units is better for the clock speed of the CPU.
D. The cache units are shared between the CPU and the motherboard.

Answers

Answer:

B. More cache means more areas to hold data waiting to be processed.

Explanation:

It is better for a CPU to have more than one cache because more cache means more areas to hold data waiting to be processed, which can significantly improve the CPU's performance. When the CPU requests data, it first checks the L1 cache, which is the smallest and fastest cache on the CPU. If the data is not found in the L1 cache, the CPU then checks the L2 cache, which is larger and slightly slower than the L1 cache. If the data is still not found in the L2 cache, the CPU then checks the L3 cache, which is even larger and slower than the L2 cache. Having multiple levels of cache allows the CPU to quickly access frequently used data, which can help reduce the amount of time spent waiting for data to be fetched from the main memory.

Can you provide an example of how computer programming is applied in real-
world situations?

Answers

An example of how computer programming is applied in real world situations is the use of traffic lights.

How is this so?

The traffic flow data is processed by the computer to establish the right sequence for the lights at junctions or ramps. The sequencing information is sent from the computer to the signals via communications equipment.

INRIX Signal Analytics is the first cloud-based solution that harnesses big data from linked automobiles to assist traffic experts in identifying and understanding excessive delays at signalized junctions throughout the country — with no hardware or fieldwork required.

Learn more about computer programming:
https://brainly.com/question/14618533
#SPJ1

Fill in the blank: Most vendors or computer hardware manufacturers will assign a special string of characters to their devices called a _____.

Answers

Answer:

hardware ID number

Explanation:

(0) Refer to the states.txt file. (see contents below, manually create this file in your project directory)

(1) Create a program, that uses in a try/except block for file handling operation

(2) Open the file handle variable for reading "states.txt"

(3) Creates a list named states

(4) Store 50 United States state names in the list, one state per element in the list (without a number)

(5) Create a function that prints the content of the list to the screen in the descending order (Z to A).

Answers

First, the program uses a try/except block for file management operations. This is approved to handle potential mistakes that might happen while gap and reading the file.

What is the program about?

If the file is not erect or there is an I/O mistake while education the file, an appropriate error idea is presented. Then, the program opens the file states.txt using the open() function accompanying the 'r' (state) mode, that generates a file object for reading the connotations of the file.

The with declaration is used to certainly close the file when the block is exited.Next, the program reads each line of the file utilizing upper class comprehension, and stores each state name as an part in united states of america list.

Learn more about program from

https://brainly.com/question/26134656

#SPJ1

(c) Assuming Pascal programming language, evaluate the expression; Y sqr(a) + b c mod 4 / d given that a=4, b=6, c=10 and d-3.​

Answers

The value of the expression is 16Y + 0.666..., where Y is the value of the variable Y.

How to evaluate the expression?

To evaluate the expression, we need to substitute the given values of a, b, c, and d into the expression and then perform the arithmetic operations according to the order of operations in Pascal.

The order of operations in Pascal is as follows:

Parentheses

Exponentiation

Multiplication and Division (performed left to right)

Addition and Subtraction (performed left to right)

Using these rules, we can evaluate the expression as follows:

Y sqr(a) + b c mod 4 / d

= Y * sqr(4) + (b * c) mod 4 / 3 //substituting a=4, b=6, c=10, and d=3

= Y * 16 + (60 mod 4) / 3 //evaluating sqr(4) and b*c, and then evaluating mod 4

= Y * 16 + 0.666... //evaluating the division, which is performed before addition

= 16Y + 0.666... //adding the two terms

Therefore, the value of the expression is 16Y + 0.666..., where Y is the value of the variable Y.

Read more about Pascal programming here:

https://brainly.com/question/27918473

#SPJ1

I need mega help ASAP. I need this code in java and I've attempted so many different codes and none work. Please help! This is what I have so far; the instructions are in the image below!




import java.util.Scanner;

public class MyProgram
{
public static void main(String[] args)
{

int num = 0;
Scanner input = new Scanner(System.in);

while(true){
try{
System.out.println("Enter a number.");
num = input.nextInt();
if(num <= 0){
System.out.println("Number must be greater than 0");
continue;
}
break;
}
catch(Exception e){
System.out.println("Print error message here");
input.nextLine();
}

}

//make calculations
//double bmi = 0;
//bmi = (704 * weight) / (height * height);

System.out.println("Program ended");
}
}

Answers

Answer:

import java.util.Scanner;

public class MyProgram {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       // Prompt the user to enter their weight in kilograms.

       System.out.println("Enter your weight in kilograms: ");

       double weight = input.nextDouble();

       // Prompt the user to enter their height in meters.

       System.out.println("Enter your height in meters: ");

       double height = input.nextDouble();

       // Calculate the BMI.

       double bmi = (weight * 703) / (height * height);

       // Print the BMI.

       System.out.println("Your BMI is " + bmi);

       // Classify the BMI.

       if (bmi < 18.5) {

           System.out.println("You are underweight.");

       } else if (bmi < 25) {

           System.out.println("You have a normal weight.");

       } else if (bmi < 30) {

           System.out.println("You are overweight.");

       } else if (bmi < 35) {

           System.out.println("You are obese.");

       } else {

           System.out.println("You are severely obese.");

       }

   }

}

Explanation of how 3D printing gives SpaceX a competitive advantage
and
Discussion of how business intelligence is used or could be used to support SpaceX's 3D printing process

Answers

SpaceX gains a competitive advantage with the implementation of 3D printing technology, which provides an economical solution to producing lightweight and customizable parts that are intricate in design.

How is this so?

The use of this cutting-edge technology facilitates rapid iteration, reducing both developmental costs and time. It enables the company to manufacture these materials in-house, thereby averting external supply chain inefficiencies.

Moreover, by using Business Intelligence tools to analyze data related to some factors as part performance and supply chain logistics, it becomes easier for SpaceX not only to monitor the operational efficiency of its manufactured products but also spot possible optimization opportunities.

Learn more about 3D printing at:

https://brainly.com/question/30348821

#SPJ1

1. A(n) ____ provides good control for distributed computing systems and allows their resources to be accessed in a unified way.

2. The term ____ is used to describe a specific set of rules used to control the flow of messages through the network.

3. A(n) ____ is a data-link layer device used to interconnect multiple networks using the same protocol.

4. A(n) ____ translates one network’s protocol into another, resolving hardware and software incompatibilities.

5. The ____ is the most widely used protocol for ring topology.

6. The ____ makes technical recommendations about data communication interfaces.

7. The term ____ refers to the name by which a unit is known within its own system.

8. The term ____ refers to the name by which a unit is known outside its own system.

9. Which network topology do you think your school employs, and why? Give reasons to support your answer.

10. What is Domain Name Service (DNS)? Describe its functionalities.

Answers

A(n) middleware provides good control for distributed computing systems and allows their resources to be accessed in a unified way.

What is Protocol?

The term protocol is used to describe a specific set of rules used to control the flow of messages through the network.

A(n) bridge is a data-link layer device used to interconnect multiple networks using the same protocol.

A(n) gateway translates one network’s protocol into another, resolving hardware and software incompatibilities.

The Token Ring protocol is the most widely used protocol for ring topology.

The International Organization for Standardization (ISO) makes technical recommendations about data communication interfaces.

The term node refers to the name by which a unit is known within its own system.

The term host refers to the name by which a unit is known outside its own system.

The network topology that my school employs is likely a star topology. This is because a central server likely connects to multiple devices, such as computers and printers, through individual connections rather than a continuous loop like a ring or mesh topology.

Domain Name Service (DNS) is a system that translates domain names into IP addresses, allowing users to access websites using easy-to-remember names rather than numerical addresses. It functions by storing a database of domain names and their corresponding IP addresses, and when a user inputs a domain name into their browser, the DNS system uses this database to provide the corresponding IP address and establish a connection to the website.

Read more about DNS here:

https://brainly.com/question/27960126

#SPJ1

I'm a little confused about how this is worked out. The value on the left is the largest binary value, and the right is the smallest.


0.0011₂ < 0.24₁₀ < 0.0100₂

Answers

The decimal value 0.24 is in the middle and the binary value 0.0100 is the greatest of the three numbers, with binary value 0.0011 being the lowest.

Which decimal binary number is the smallest?

There is only one 4-digit binary number, which is zero. The smaller number in binary, decimal, and hexadecimal bases is actually this one. Therefore, 0 is the smallest 4-digit binary number and it remains 0 when expressed in any other base.

What does 0.1 mean in binary form?

The binary representation of the number 0.1 is 0.00011001100110011... The 0011 pattern is infinitely repeatable. The binary equivalent of 0.1 cannot be stored. 1/10 is equal to 0.1, as we all know.

To know more about binary visit:

https://brainly.com/question/18502436

#SPJ9

Rewrite the program below without using any "for loop"
start = input ( ' Enter the start : ' )
start = int (start)

end = input ( 'Enter the end: ' )
end = int (end)

increase = input ( 'Enter how much i is to be incremented in each iteration: ' )
increase = int (increase)

for i in range (start, end, increase) :
if i %2 == 0 :
print (i, 'is an even number.')
else :
print (i, ' is an odd number.')

Answers

Answer:

start = input('Enter the start: ')

start = int(start)

end = input('Enter the end: ')

end = int(end)

increase = input('Enter how much i is to be incremented in each iteration: ')

increase = int(increase)

i = start

while i < end:

   if i % 2 == 0:

       print(i, 'is an even number.')

   else:

       print(i, 'is an odd number.')

   i += increase

Explanation:

The regression equation for the relationship between age and autonomy (with the latter as the dependent variable) is autonom = 6.964 + 0.06230age r = 0.28
(a) Explain what 6.964 means.
(b) Explain what 0.06230 means.
(c) How well does the regression equation fit the data?
(d) What is the likely level of autonom for someone aged 54?
(e) Using R, how would you generate this regression information?

Answers

(a) 6.964 is the intercept of the regression equation, representing the estimated level of autonomy when age is zero.

What is the slope of the regression equation?

(b) 0.06230 is the slope of the regression equation, representing the estimated change in autonomy for each one-unit increase in age.

(c) The regression equation has a weak positive correlation (r = 0.28) between age and autonomy, indicating that age explains only a small proportion of the variance in autonomy.

(d) The likely level of autonomy for someone aged 54 can be estimated by plugging in 54 for age in the regression equation: autonomy = 6.964 + 0.06230(54) = 10.227.

(e) In R, you could generate this regression information using the lm() function, specifying the dependent variable (autonomy) and the independent variable (age) in the formula argument. The summary() function can be used to obtain the regression coefficients and correlation coefficient (r).

Read more about regression here:

https://brainly.com/question/17004137

#SPJ1

Reflection:
A. What I've learned in media and information literacy​

Answers

Media and information literacy​  enables me to have access, analysis, evaluation & creation of media/information  in various formats.

What is the lesson in media and information literacy​?

The media and information literacy​  a crucial skill in today's society, with prevalent issues like information overload & fake news. MIL helps develop critical thinking, awareness of biases and propaganda, and informed decision making.

So,  It includes info retrieval, media analysis and evaluation, and ethical considerations in media creation. In the digital age, MIL is crucial. People need to spot credible sources and comprehend data presentation across media formats. As tech progresses, we must keep improving our MIL skills for media & info navigation. It's our social duty.

Learn more about media and information literacy​ from

https://brainly.com/question/19037232

#SPJ1

develop an algorithm to add three numbers and convert it into flowcharts​

Answers

Algorithm to add three numbers:

StartInitialize variables num1, num2, num3, sumRead num1, num2, and num3 from the userAdd num1, num2, and num3 and store the result in sumDisplay the sumStop

What is the algorithm?

Flowchart:

sql

Copy code

      +------------+

      |   Start    |

      +------------+

              |

              V

      +------------------+

      | Initialize variables |

      | num1, num2, num3, sum |

      +------------------+

              |

              V

      +-------------------+

      |   Read num1, num2, and num3 |

      +-------------------+

              |

              V

      +------------------+

      |   Add num1, num2, and num3 |

      |    and store in sum |

      +------------------+

              |

              V

      +-------------+

      |  Display sum |

      +-------------+

              |

              V

      +---------+

      |   Stop  |

      +---------+

Therefore, Note: The above flowchart is a simple representation of the algorithm and can be modified as per individual needs.

Read more about algorithm here:

https://brainly.com/question/24953880

#SPJ1

A severe thunderstorm knocked out the electric power to your company's datacenter,
causing everything to shut down. Explain with typical examples the impacts of the
[8 marks]
following aspect of information security
i. Integrity
ii. Availability

Answers

The impacts of the Integrity aspect of information security are:

Data corruptionData alteration

ii. Availability:

System downtimeDisruption to business processes

What is the thunderstorm  about?

Information security's integrity aspect involves data accuracy, completeness, and consistency. Thunderstorm-caused power loss can harm the datacenter's integrity.

Therefore, Examples of integrity impacts include data corruption from sudden power outages leading to inconsistencies or loss of data. A power outage can alter data in a datacenter, impacting its integrity and reliability, which can be detrimental if the data is sensitive or critical to the business.

Learn more about thunderstorm  from

https://brainly.com/question/25408948

#SPJ1

Using access generate sql codes

Answers

Assuming you possess a table entitled "employees" consisting of columns "employee_id", "name", and "salary", to retrieve all employees and their corresponding salaries,

The SQL code is as follows:

SELECT name, salary FROM employees;

To filter by an individual employee_id, utilize:

SELECT name, salary FROM employees WHERE employee_id = [employee_id];

For sorting results in descending order of salary, employ:

SELECT name, salary FROM employees ORDER BY salary DESC;

Read more about SQL here:

https://brainly.com/question/25694408
#SPJ1

Write a Python program that gets a number using keyboard input

Answers

The Python script prompts the user to input a number via keyboard and saves it as "number":

The Python Program

number = input("Enter a number: ")

Keep in mind that the string nature of this input() function implies that you must convert it into a numerical form, such as int() or float(), if mathematical manipulation is desired.

Python is a comprehensive, high-level interpreted programming language that saw its genesis dating back to 1991. Noted for its usability, readability and versatility, this widespread language has established usage in various sectors such as web development, data science, machine learning and more.

What's more, Python has an extensive standard library and an affluent pool off community members who have donated to an array of open-source packages and tools.

Read more about programs here:

https://brainly.com/question/26134656
#SPJ1

what is technology and it uses​

Answers

Answer:

Technology is the application of knowledge for achieving practical goals in a reproducible way. The word technology can also mean the products resulting from such efforts, including both tangible tools such as utensils or machines, and intangible ones such as software.

uses

Communication

social media

health care

Answer:

We use technologies to exchange information, to clean our clothes, to prepare our meals and to get from one place to another. But even everyday items like door locks, floor panels and furniture are technologies that we now take for granted and that seem less impressive to us than self-driving cars or 3D printing. But technology doesn’t automatically have to be complicated. Simply put, we are always using technology when we use scientific knowledge to achieve a specific purpose, whether in  industry or in our daily lives. From the discovery of the wheel to computers and from mp3 players to the latest technologies like self-driving cars, countless technological innovations have shaped daily life and will continue to influence it in the future.

Im completely lost trying to create these tables. Can someone help? This is what I'm currently working on..


Create the following tables with appropriate data types and constraints in an SQL file.

Person

customer_ID, first_name, last_name, address, city, state, zip
Insert at least 4 rows of data
Add a birth_day column using an ALTER TABLE statement
using update statements add birthdays for each person (can be same date)


Gifts

gift_id, gift_desc
Fill table with 5 to 10 gifts
Example: gift_id = 10112, gift_desc = Pool Table

Birth_days

customer_id, gift_id
Fill this table with data coming from the People and Gifts tables. Make sure every row in People has a gift associated to them
no single person can have duplicate gifts

QUERIES

display each person and their gift descriptions
display each person’s name and how many gifts they received
display the name of the person who received the most gifts

Everything should be scripted out. DO NOT use any wizards to help you.

Answers

To create tables in SQL, utilize the following code:

The SQL Codes

CREATE TABLE Person with customer_ID INT as the primary key along with columns first_name, last_name , address, city, state and zip which cannot be empty. Additionally, include birth_day under DATE.  

The next step would be to INSERT values into the above mentioned 'Person' table. The sample values I provide give information such as the ID of the customer- John Doe being assigned a value of 1 along with his address, state or even zip code. Similarly, we have records for Jane Doe, Bob Smith and Samantha Johnson variously spread out all over the country.

Adding an extra column with birth_day under DATE can be done using ALTER TABLE Person ADD COLUMN birth_day date code.

Thereafter, UPDATE Person SET birth_day= '2000-01-01' needs to run so that customer's birth day gets updated automatically.

Create another table called "Gifts" with gift_id being assigned as PRIMARY KEY INTEGER data type and gift_desc described under

Further insert gifts such as pool table, guitar, smartphone, watch and camera into the Gift table that was just created.

Making use of JOIN operations, connect the Customers and Gifts tables  through referential integrity by utilizing FOREIGN KEY constraints based on both customer_id and gift_id in the third newly generated table - Birth_days. ForeignKey connects each record across two tables using these shared columns to generate unique results.

To display all three interlinked tables together presented in unison, SELECT person's first name, last name and matching gift descriptions, only customers who have received birthday gifts are shown. To further enhance understanding, COUNT(*), used to count up the total occurrences treated equally regardless if they are Red vs Green etc, lists down number of gifts each person has been given. Finally, resorted numerically according to number of gifts per gender descending order LIMIT 1%.

Read more about SQL here:

https://brainly.com/question/25694408

#SPJ1

You have been assigned to design and implement a data structure that will be used to store and retrieve student records. The data structure should be able to store the following information for each student: name, ID number, major, and GPA. You are required to use array, linked list, and stack in the implementation of this data structure using python.

1. Design the Data Structure:
a. Decide on the format for storing student records.
b. Choose the data types for each field (name, ID number, major, and GPA).
c. Determine the operations that the data structure should support (insert, delete, search).
d. Choose the appropriate data structure for each operation (array, linked list, or stack).
e. Create a diagram to show how the different data structures will be used together.

2. Implement the Data Structure:
a. Implement each data structure to store the students records.
b. Write functions to insert, delete, and search student records.

3. Test the Implementation:
a. Write a test function to insert several student records into the data structure.
b. Write a test function to delete some of the records.
c. Write a test function to search for a specific record.
d. Verify that the data structure is working correctly by running the test functions.​

Answers

Answer:

1.

Design the Data Structure:

a. Format for storing student records:

We can store student records in a table format, where each row represents a student record, and the columns represent the different attributes, i.e., name, ID number, major, and GPA.

b. Data types for each field:

For each field, we can use the following data types:

Name: stringID number: integerMajor: stringGPA: float

c. Operations that the data structure should support:

Insert a new student recordDelete an existing student recordSearch for a specific student recordd. Appropriate data structure for each operation:Array: An array can be used to store the student records in a contiguous block of memory. We can use an array to store the student records when we know the maximum number of records that we will store in advance.Linked List: A linked list can be used to store student records in a non-contiguous block of memory. We can use a linked list to store the student records when we don't know the maximum number of records that we will store in advance.Stack: A stack can be used to store the student records when we want to retrieve the most recently added record first.

e. Diagram showing how the different data structures will be used together:

See Attachment

Implement the Data Structure:

a. Implementation of each data structure to store the student records:

# Array implementation

MAX_RECORDS = 100

students = [None] * MAX_RECORDS

# Linked List implementation

class StudentNode:

   def __init__(self, name, id_num, major, gpa):

       self.name = name

       self.id_num = id_num

       self.major = major

       self.gpa = gpa

       self.next = None

class StudentLinkedList:

   def __init__(self):

       self.head = None

   def insert(self, name, id_num, major, gpa):

       new_node = StudentNode(name, id_num, major, gpa)

       if self.head is None:

           self.head = new_node

       else:

           curr = self.head

           while curr.next is not None:

               curr = curr.next

           curr.next = new_node

# Stack implementation

class StudentStack:

   def __init__(self):

       self.stack = []

   def push(self, name, id_num, major, gpa):

       self.stack.append((name, id_num, major, gpa))

   def pop(self):

       if len(self.stack) > 0:

           return self.stack.pop()

       else:

           return None

b. Functions to insert, delete, and search student records:

# Insert a new student record

def insert_record(name, id_num, major, gpa):

   # Insert into array

   for i in range(len(students)):

       if students[i] is None:

           students[i] = (name, id_num, major, gpa)

           break

   # Insert into linked list

   student_list.insert(name, id_num, major, gpa)

   # Insert into stack

   student_stack.push(name, id_num, major, gpa)

# Delete an existing student record

def delete_record(id_num):

   # Delete from array

   for i in range(len(students)):

       if students[i] is not None

1)Design the Data Structure:

We can store student records in a table format, where each row represents a student record, and the columns represent the different attributes, i.e., name, ID number, major, and GPA. Other part is discussed below:

What is an Array?

An array can be used to store the student records in a contiguous block of memory. We can use an array to store the student records when we know the maximum number of records that we will store in advance.

Linked List: A linked list can be used to store student records in a non-contiguous block of memory. We can use a linked list to store the student records when we don't know the maximum number of records that we will store in advance.

Stack: A stack can be used to store the student records when we want to retrieve the most recently added record first. Diagram showing how the different data structures will be used together:

Implement the Data Structure:

a. Implementation of each data structure to store the student records:

# Array implementation

MAX_RECORDS = 100

students = [None] * MAX_RECORDS

# Linked List implementation

Learn more about array on:

https://brainly.com/question/30757831

#SPJ2

3. Give the trace of your machine in the previous problem processing the strings 1011 and 10

Answers

A Mealy machine and a Moore machine can be designed to detect the sequence "1011". For the Mealy machine, states represent the matched part of the sequence, and output depends on transitions.

For the Moore machine, states also represent the matched part, and output depends on states.

To design a Mealy machine, follow these steps:

1. Create states (S0, S1, S2, S3) representing matched parts of the sequence.

2. Add input edges and output labels for each transition (0 or 1).

3. For correct input, transition to the next state (e.g., S0 -> S1 on input 1).

4. For incorrect input, transition back to the appropriate state.

5. Set output 1 when the final state is reached (S3), and 0 otherwise.

Learn more about transition on:

https://brainly.com/question/17998935

#SPJ1

PLEASE HELP ASAP WILL GIVE 100 POINTS!!!!
Suppose a packet that is transmitted across the internet contains the following information (from left to right):

Bits 1-4: Packet sequence number within the message.
Bits 5-8: Total number of packets in the message.
Bits 9-16: Number identifying the sender.
Bits 17-24: Number identifying the receiver.
Bits 25-64: Part of the actual message being sent.

Here is one of the packets being sent over the internet:
01111011 10000001 11001110 01010110 00111100 10011100 11100010 10001111

Which of the following statements about this packet is true? Select one answer

A)This is packet 1 out of 8 total packets in the message.
B)This is packet 7 out of 11 total packets in the message.
C)This is packet 14 out of 22 total packets in the message.
D)This is packet 123 out of 129 total packets in the message.

Answers

Answer:

The correct answer is C.

The packet sequence number is stored in bits 1-4, which in this case is 10011100. This is equal to 23 in decimal.

The total number of packets in the message is stored in bits 5-8, which in this case is 01010110. This is equal to 22 in decimal.

Therefore, this is packet 23 out of 22 total packets in the message.

* * *

Here is a breakdown of the bits in the packet:

```

Bits | Description

------- | --------

1-4 | Packet sequence number

5-8 | Total number of packets in the message

9-16 | Sender ID

17-24 | Receiver ID

25-64 | Message data

`

Part II: additional problems 1, 2, and 3 listed below.
For each problem:
a. Identify the given table as 1NF, 2NF, 3NF, or UNF (contains repeating group).
b. Identify all partial and transitive dependencies by drawing a dependency diagram
(for a UNF table, transform it to 1NF, then draw the dependency diagram).
c. Transform all tables into 3NF by following the steps below. For c, you do NOT have
to draw dependency diagrams.

1. STUDENT (STUDENT SSN, ST_NAME, MAJOR, ADVISOR NUM, ADV_NAME,
ADV OFFICE. ADV PHONE ST CREDITHRS, CLASS STANDING)
where:
STUDENT SSN
- All other attributes
ADVISOR NUM› ADV_NAME, ADV OFFICE, ADV PHONE
ST CREDIT HRS > CLASS STANDING
Note: XYZ > ORS means that XYZ determines ORS
You can also find this notation in figure 6.3 and definition of determination on page
62.
2. MOVIE (MOVIE NUM, MOVIE TITLE, STAR NUM, STAR NAME)
Sample data: (You can determine primary key based on the sample data.)
MOVIE NUM
MOVIE TITLE
STAR NUM
I STAR NAME
M001
The Mummy
S001
Brendan Fraser
S002
Rachel Weisz
M002
Crash
S001
Brendan Fraser
S003
Sandra Bullock
(You may notice one movie can feature many stars and one star can act in many movies.)
3. MOVIE (MOVIE NUM, MOVIE TITLE, DIRECTOR NUM, DIR NAME)
where:
MOVIE NUM
> MOVIE TITLE, DIRECTOR NUM, DIR NAME
DIRECTOR_NUM >
DIR NAME

Answers

The problem involves analyzing given tables and identifying their normal form, dependencies, and transforming them to 3NF if necessary.

What is the explanation for the above response?



1) a. UNF (contains a repeating group)

b.

STUDENT SSN > ST_NAME, MAJOR, ADVISOR NUM, ST CREDITHRS, CLASS STANDING

ADVISOR NUM > ADV_NAME, ADV OFFICE, ADV PHONE

STUDENT SSN is the primary key of the table.

c.

1NF:

STUDENT (STUDENT SSN, ST_NAME, MAJOR, ADVISOR NUM, ST CREDITHRS, CLASS STANDING)

ADVISOR (ADVISOR NUM, ADV_NAME, ADV OFFICE, ADV PHONE)



2)

a. 1NF

b.

MOVIE NUM > MOVIE TITLE

STAR NUM > STAR NAME

MOVIE NUM, STAR NUM is the primary key of the table.

c.

1NF:

MOVIE_STAR (MOVIE NUM, STAR NUM)

STAR (STAR NUM, STAR NAME)

MOVIE (MOVIE NUM, MOVIE TITLE)


3)

a. 3NF

b.

MOVIE NUM > MOVIE TITLE

DIRECTOR NUM > DIR NAME

MOVIE NUM is the primary key of the table.

c.

The given table is already in 3NF, so no transformation is needed.

Learn more about tables  at:

https://brainly.com/question/3355185

#SPJ1

Given a partial main.py and PlaneQueue class in PlaneQueue.py, write the push() and pop() instance methods for PlaneQueue. Then complete main.py to read in whether flights are arriving or have landed at an airport.

An "arriving" flight is pushed onto the queue.
A "landed" flight is popped from the front of the queue.
Output the queue after each plane is pushed or popped. Entering -1 exits the program.

Click the orange triangle next to "Current file:" at the top of the editing window to view or edit the other files.

Note: Do not edit any existing code in the files. Type your code in the TODO sections of the files only. Modifying any existing code may result in failing the auto-graded tests.

Important Coding Guidelines:

Use comments, and whitespaces around operators and assignments.
Use line breaks and indent your code.
Use naming conventions for variables, functions, methods, and more. This makes it easier to understand the code.
Write simple code and do not over complicate the logic. Code exhibits simplicity when it’s well organized, logically minimal, and easily readable.
Ex: If the input is:

arriving AA213
arriving DAL23
arriving UA628
landed
-1
the output is:

Air-traffic control queue
Next to land: AA213

Air-traffic control queue
Next to land: AA213
Arriving flights:
DAL23

Air-traffic control queue
Next to land: AA213
Arriving flights:
DAL23
UA628

AA213 has landed.
Air-traffic control queue
Next to land: DAL23
Arriving flights:
UA628
code:
from PlaneQueue import PlaneQueue
from PlaneNode import PlaneNode

if __name__ == "__main__":
plane_queue = PlaneQueue()

# TODO: Read in arriving flight codes and whether a flight has landed.
# Print the queue after every push() or pop() operation. If the user
# entered "landed", print which flight has landed. Continue until -1
# is read.

Answers

The Python code is created to imitate a simple ground monitors of aircraft system. It imports two classes from two various Python files: PlaneQueue from PlaneQueue.py and PlaneNode from PlaneNode.py. The code is given in the image attached.

What is the code about?

The PlaneQueue class is used to constitute a queue dossier structure to hold succeeding flights, while the PlaneNode class is used to conceive instances of individual planes.

The main.py file contains the main program that establishes an instance of the PlaneQueue class and reads in flight codes and either a departure has landed.

Learn more about code  from

https://brainly.com/question/26134656

#SPJ1

Other Questions
allison jogged around lions park for one hour and according to her pedometer she covered 4.5 miles. if allison jogs at the same rate for 1 and a half hours how many miles will she jog? Why did settlers and colonists go to Rhode Island in the late 1700s? Roger can finish his math homework in 6 hours. Trish can finish the same homework in 5 hours. What part of the homework will Roger and Trish finish if they work together for 1 hours? This is an example of a(n) Anoher spanish work sheet i need help with In 1921, realtor Billy Ingram closed his company and opened White Castle restaurants to sell hamburgers. In 1921, hamburgers were thought to be made from rotten beef and not fit for human consumption. Ingram ground fresh beef in front of customers to prove it was safe and was the first to successfully sell hamburgers to the middle class. Today Ingram is credited as the founder of the fast-food industry. Understanding that Midwesterners wanted clean, convenient food when they were away from home was the information Ingram used to: Karen learns that her new job at the bookstore has no other female employees. Thinking that this could lead her employers and coworkers to treat her unfairly, she declines the offer. This is an example of Elizabeth is considering buying a $30,000 car. Which of these financing optionswill likely lead to the LOWEST monthly payment?$3000 down payment, 6% interest, 84 months$3000 down payment, 6% interest, 60 months$0 down payment, 6% interest, 60 months$0 down payment, 0% interest, 36 months As survey found that women's heights are normally distributed with am mean 62.1 in. and standard deviation 2.9. the survey also found that men's heights are normally distributed with mean 67.8 and standard deviation 3.1 in. consider an executive jet that seats six with a doorway height of 55.8 in.a) what percentage of adult men can fit through the door without bending?b) does the door design with a height of 55.8 in. appear to be adequate? why didn't the engineers design a larger door?a. the door design is inadequate, but because the jet is relatively small and seats only six people, a much higher door would require major changes in the design and cost of the jet, making a larger height not practical.b. the door design is adequate, because although many men will not be able to fit without bending, most women will be able to fit without bending. thus, a larger door is not needed.c. the door design is inadequate, because every person needs to be able to get into the aircraft without bending. there is no reason why this should not be implemented.d. the door design is adequate, because the majority of people will be able to fit without bending. thus, a larger door is not needed. a machine in a manufacturing plant has on the average two breakdowns per month. find the probability that during the next three months it has (a) at least five breakdowns, (b) at most eight breakdowns, (c) more than five breakdowns. Each phrase in the table describes two variables which are strongly correlated. select all phrases that imply correlation without causation.the number of stuffed animals produced at a factory and the number of newborn babiesthe number of hits by a baseball team in a game and the number of runs they scorethe number of people at a store and the number of coupons given outthe amount of snow plows on the street and the amount of snowfallthe number of videos rented and the number of new films in theatersthe number of pets in a neighborhood and the amount of grass fields nearby Which is most directly involved in causing neurotransmitter release from the presynaptic membrane?. Which quotation best demonstrates how a characters dialogue conveys a theme about the dangers of isolation? Question 3(Multiple Choice Worth 3 points)(06. 03 LC)What are some of the immune functions of the lymphatic system?O Cleaning red blood cells from the blood and creating lymph fluidsTransporting lymph to the tissues and creating lymph fluidsO Removing infectious agents and making white blood cellsO Making red blood cells and removing infectious agentsQuestion 4 Multiple Choice Worth 3 points)(06. 03 MC) What volume of a 4.5 m hcl solution do you need to dilute and prepare a 65 l of a 0.050 m solution of hcl? (2 s.f) Select the expressions that are equivalent to 3v+2v. A. V*5B. V+5C. V+5vD. V+v+v+v+v naproxen 375 mg PO daily. If each scored tablet contains 250 mg,how many tablets will you administer? Which are true of richter or local magnitude calculations?. Adding cookie dough ice cream and hot fudge to the menu next month will cost 42 dollars if your total sales remain the same would you make a profit if so how much Azman was involved in an accident that caused his vision to become blur. According to the doctor who treated him, Azman had to undergo surgery to relocate structure X to its original position. Predict what is X and justify it.