Answer:
The .append() function adds the inserted value to a list. You are passing in floats.
In this case, you appended 5 things to the list, so the list looks like:
stuff = [1.0, 2.0, 3.0, 4.0, 5.0]
And, when you run print(stuff) you will end up with that list. However, when you run print(len(stuff)) you are counting the length of the list. You have 5 things in the list, so the output will be 5.
When you wish to specify a position in a list to print, that's when stuff[] comes in. Essentially, by running print(stuff[0]) you are specifying that you only want the first item in the list. This would output 1.0
You can always try this by putting this into an IDE, and running it.
Use the following initializer list:
w = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]
Create a second list named s . Then, using a for loop, store the lengths of each word in the list above. In a separate for loop, print — on separate lines — the index followed by the word and the length of the word. Follow the same format as the sample run below.
Sample Run
0: Algorithm, 9
1: Logic, 5
2: Filter, 6
3: Software, 8
4: Network, 7
5: Parameters, 10
6: Analyze, 7
7: Algorithm, 9
8: Functionality, 13
9: Viruses, 7
Answer:
Here's the code to create the second list and store the lengths of each word in the first list:
w = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]
s = []
for word in w:
s.append(len(word))
And here's the code to print the index, word, and length on separate lines:
for i in range(len(w)):
print(f"{i}: {w[i]}, {s[i]}")
Output:
0: Algorithm, 9
1: Logic, 5
2: Filter, 6
3: Software, 8
4: Network, 7
5: Parameters, 10
6: Analyze, 7
7: Algorithm, 9
8: Functionality, 13
9: Viruses, 7
Explanation:
An application has 1,000 heavy users at a peak of 2 IOPS each and 2,000 typical
users at a peak of 1 IOPS each, with a read/write ratio of 2: 1. It is estimated that
the application also experiences an overhead of 20 percent for other workloads.
Calculate the IOPS requirement for RAID 1, RAID 3, RAID 5, and RAID 6. Also
compute the number of drives required to support the application in different
RAID environments if 10K rpm drives with a rating of 130 IOPS per drive were
used
4000 x 1.20 = 4800 IOPS are produced by the entire program. This amount includes all associated overhead costs. In a 2:1 ratio, over 33.3% of data is written and 66.6% is read.
What are IOPS requirements?There is a 2 write penalty for RAID 1/0. As a result, the disk load for writes and reads is equal to 6,336 IOPS (0.66 x 4800 + 2x (0.33 x 4800)).
There is a 4 write penalty for RAID 5. The total amount of writes and reads on the disk are therefore 9.504 IOPS (0.66 x 4800 + 4x (0.33 x 4800)).
The write penalty for the RAID 6 is 6. Hence, the combined disk load of writes and reads is equal to 12,672 IOPS (0.66 x 4800 + 6x (0.33 x 4800)).
Therefore, 4000 x 1.20 = 4800 IOPS are produced by the entire program. This amount includes all associated overhead costs. In a 2:1 ratio, over 33.3% of data is written and 66.6% is read.
To learn more about IOPS, refer to the link:
https://brainly.com/question/30639436
#SPJ1
If i end user licence agreement with my cell phone service provider does thateam i can switch to a different carrier
Answer:
Yes, in most cases, an end-user license agreement (EULA) with a cell phone service provider does not prevent you from switching to a different carrier. While the EULA may contain certain terms and conditions related to the use of the phone or the service, it does not usually prohibit you from switching to a different service provider if you choose to do so. However, it's important to read the EULA carefully to understand any restrictions or limitations that may apply.
Explanation:
what is the difference between a know simple and a simple query ?
A know simple governs the process of actual methodology on the SQL. While a simple query deals with a query that significantly searches using just one parameter.
What are the two different types of queries in SQL?The two different types of queries present in the SQL database may include a simple query and a complex query. A simple query contains a single database table. While a complex query can be constructed on more than one base table.
According to the context of this question, a known query represents the simple facts and understanding in all prospectives. While a simple query deals with a simple and single database table specific to its structure and functions.
Therefore, a know simple governs the process of actual methodology on the SQL. While a simple query deals with a query that significantly searches using just one parameter.
To learn more about SQL queries, refer to the link:
https://brainly.com/question/25694408
#SPJ1
Find extreme value. C++
Integer numInput is read from input representing the number of integers to be read next. Use a loop to read the remaining integers from input. For each integer read, output "Value read: " followed by the value. Then, output "Smallest:" followed by the smallest of the integers read. End each output with a newline.
Ex: If the input is:
2
20 -405
then the output is:
Value read: 20
Value read: -405
Smallest: -405
---------------------------
#include
using namespace std;
int main() {
int numInput;
int inputValue;
int smallestVal;
int i;
cin >> numInput;
/* Your code goes here */
return 0;
}
Answer:
Here's the completed code to find the smallest value out of the given inputs:
#include <iostream>
using namespace std;
int main() {
int numInput;
int inputValue;
int smallestVal;
int i;
cin >> numInput;
// Read in the first value and assume it's the smallest
cin >> smallestVal;
cout << "Value read: " << smallestVal << endl;
// Loop through the remaining inputs
for (i = 1; i < numInput; i++) {
cin >> inputValue;
cout << "Value read: " << inputValue << endl;
// If the current input is smaller than the smallest so far, update smallestVal
if (inputValue < smallestVal) {
smallestVal = inputValue;
}
}
// Output the smallest value
cout << "Smallest: " << smallestVal << endl;
return 0;
}
Explanation:
The program reads in the number of inputs to expect, then reads in the first input and assumes it's the smallest. It then loops through the remaining inputs, reading them in one at a time, outputting each value as it goes. If the current input is smaller than the smallest so far, it updates the value of smallestVal. Finally, it outputs the smallest value found.
Which of the following is the only way to know exactly what your website will look like and whether it will work when published?
Question 2 options:
viewing it in dual view
publishing it
viewing it in source view
viewing it in wysiwyg
Answer:
Which of the following is the only way to know exactly what your website will look like and whether it will work when published?
the work of the computer memory
Answer:
Memory is the electronic holding place for the instructions and data a computer needs to reach quickly. It's where information is stored for immediate use. Memory is one of the basic functions of a computer, because without it, a computer would not be able to function properly.
please rate my answer
Using technology, calculate the difference between the arithmetic average ror and the weighted average ror. Round to the nearest tenth of a percent. 0. 5% 1. 1% 2. 3% 3. 5%.
Answer:
Explanation:
1.1 %
A _____ would be the BEST example of a type of personal letter.
A letter of condolence would be the best example of a type of personal letter.
What is the rationale for the above response?This type of letter is written to express sympathy and offer condolences to someone who has recently lost a loved one. Other examples of personal letters include letters of congratulations, letters of thanks, and letters of apology.
Personal letters are important as they allow individuals to express their thoughts and feelings in a more intimate and personal way than other forms of communication.
Personal letters provide an opportunity to share personal news, maintain connections with loved ones, offer emotional support, and express gratitude or apologies. They can help to strengthen relationships, build trust, and create lasting memories.
Learn more about Personal Letter at:
https://brainly.com/question/2548413
#SPJ1
Answer: a holiday message
Explanation:
I took a test over this.
A holiday message is for you and you alone or something like that.
Part A
Step 1 Starting at MIDNIGHT, (12:01am) ending 3 days later (72hr) at MIDNIGHT (11:59pm) You can start any day of the week, upto Sat Mar 04.
For a minimum of 3 consecutive days monitor the time you spend doing the 8 different activities listed below
NOTE: Avoid using weekends only in your monitoring and try to stay with mid-week,
e.g. Tues, Wed, Thurs, where majority of days are mid-week.
Use the attached time sheets to record blocks of time. Round off to the nearest hour. Precision isn’t the goal. e.g. 2hrs and 20 minutes, would be rounded down to 2 hours. 2 hrs and 30 minutes would be rounded up to 3 hrs.
The full 24 hours of each day must be accounted for.
The following 8 categories are recommended to cover the majority of possible activities one might perform in the course of a day.
Sleep
Personal maintenance (showers, laundry, housecleaning, grocery shopping, family requirements etc.)
Travel (to work, to school, or for appointments)
Work hours (total hours at the workplace, excluding lunch or breaks)
School (total hours in classes, plus time spent, studying, re-writing notes, completing assignments, time on blackboard)
Fitness (formal or informal, attending the gym or walking home from work)
Recreation (other than fitness related, TV, Movies, Leisure reading, online shopping, crafts, Video games, children’s sports activities, dates, coffee meet ups)
Volunteer activities (United Way, Big Brothers/Sisters, your religious institution activities, PTA with schools)
Three day's activities
Time day day day
Activities Activities Activities
12:01-
1:00am
1:00am-
2:00am
2:00am-
3:00am
3:00am-
4:00am
4:00am
5:00am
5:00am-
6:00am
6:00am=
7:00am
7:00am-
8:00am
8:00am-
9:00am
9:00am-
10:00am
10:00am
11:00am
11:00am-
12:00pm
12:00pm
1:00pm
1:00pm-
2:00pm
2:00pm-
13:00pm
3:00pm-
4:00pm
4:00pm-
5:00pm
5:00pm-
6:00pm
6:00pm-
7:00pm
17:00pm-
8:00pm
8:00pm-
9:00pm
9:00pm-
10:00pm
10 00pm
11:00pm
11:00pm-
11:59pm
I can provide you with guidance on how to fill in the time sheets for the three-day activity monitoring.
How to fill in the time sheetsTo start, divide the time sheet into 24-hour intervals for each of the three days. Label the days as Day 1, Day 2, and Day 3. Then, create a row for each of the eight activity categories listed in the instructions: Sleep, Personal Maintenance, Travel, Work Hours, School, Fitness, Recreation, and Volunteer Activities.
For each hour of the day, estimate the amount of time you spent on each activity category and record it in the corresponding box on the time sheet. Remember to round off to the nearest hour as instructed in the guidelines.
Be sure to account for the full 24 hours of each day, and try to be as accurate as possible in your estimates. The purpose of this activity is to gain insight into how you spend your time and identify any areas where you may want to make adjustments to improve your daily routine.
Read more about activity sheets here:
https://brainly.com/question/19788171
#SPJ1
Describe the difference between transactional and analytical information and determine how
robots could affect each for a grocery store such as Safeway.
Answer:
Transactional information refers to the real-time data related to the day-to-day operations of a business, such as sales transactions, inventory levels, and customer orders. Analytical information, on the other hand, is derived from transactional data and is used to gain insights and make strategic decisions.
In the case of a grocery store like Safeway, robots could have a significant impact on both types of information. For transactional information, robots could be used to automate tasks such as restocking shelves, cleaning, and even operating cash registers, providing real-time data on inventory levels and sales transactions.
For analytical information, robots could be used to gather and analyze data on customer behavior, such as purchasing patterns and preferences, as well as data on product performance and supply chain efficiency. This information could be used to optimize pricing strategies, improve product offerings, and streamline supply chain operations.
Overall, robots have the potential to greatly enhance the transactional and analytical information available to grocery stores like Safeway, enabling them to make data-driven decisions and improve operational efficiency.
Explanation:
explain byte addressable memory
Answer:
a single character can be read from or written to any memory byte
Explanation:
suppose you want to build a device where an output signal will light when two or more of the three feeding stations for your cattle are empty or when there is no water . the light should also glow if all three feeding stations become empty as well as when there is no water. draw the truth table, write down unsimplified logic expressions for the truth table, use k-map to produce the simplified logic expression ,draw the logic diagram for the above simplified logic expression
From red light we get product term— A’C
From green light we get product term— AB
K-Map logic diagram is given below.
What is K-Map?Finding expressions with the fewest possible variables is necessary for many digital circuits and real-world issues. Without requiring any Boolean algebra theorems, we can minimise Boolean expressions of 3, 4, or more variables very quickly and easily using K-map. According to the requirements of the problem, K-maps can be either Product of Sum (POS) or Sum of Product (SOP). K-maps are representations that resemble tables, but they provide more information than TRUTH TABLES. We solve the K-map by creating groups after filling the grid with 0s and 1s.
Learn more about Boolean algebra
https://brainly.com/question/30372407
#SPJ1
Sense HAT Emulator Loop Python Assignment
1. Create an instance of the SenseHat class.
2. Write a while loop that iterates count from 1 to 10 and scrolls the value of count in red text with a scroll speed of 0.1.
3. Write a while loop that iterates count from 0 to 30 but the iteration number is advanced by 5 rather than by 1 and scrolls
the value of count in green text with a scroll speed of 0.1.
4. Write a for loop that iterates count from 3 to 98 in steps of 5 and scrolls the value of count in blue text with a scroll speed
of 0.1.
SENSE HAT EMULATOR
Answer:
Here's the Python code for the Sense HAT emulator loop assignment:
from sense_emu import SenseHat
import time
sense = SenseHat()
# Loop 1 - red text, count from 1 to 10
for count in range(1, 11):
sense.show_message(str(count), text_colour=[255, 0, 0], scroll_speed=0.1)
time.sleep(1)
# Loop 2 - green text, count from 0 to 30 (by 5s)
for count in range(0, 31, 5):
sense.show_message(str(count), text_colour=[0, 255, 0], scroll_speed=0.1)
time.sleep(1)
# Loop 3 - blue text, count from 3 to 98 (by 5s)
for count in range(3, 99, 5):
sense.show_message(str(count), text_colour=[0, 0, 255], scroll_speed=0.1)
time.sleep(1)
Explanation:
This code uses the SenseHat class to create an instance of the Sense HAT emulator. It then includes three different loops, each with a different color and range of numbers to iterate through. The show_message() method is used to display the current count value in a scrolling text format, with the specified text color and scroll speed. The sleep() method is used to pause the loop for 1 second between each iteration, so that the text has time to scroll completely before the next iteration begins.
Which technology concept uses computer resources from multiple locations to solve a common problem?
Answer:
GRID COMPUTING is a computing infrastructure that combines computer resources spread over different geographical locations to achieve a common goal. All unused resources on multiple computers are pooled together and made available for a single task.
Explanation:
Types of Grid Computing With Examples
Computational grid computing.
Data grid computing.
Collaborative grid computing.
Manuscript grid computing.
Modular grid computing.
The editor of a movie is finalising the music score. They will send the final
version of the score to the movie producer by email attachment.
a) Describe how sampling is used to record the music sound clips.
b) The music sound clips need to undergo some form of data compression
before the music editor can send them via email.
Identify the type of compression, lossy or lossless, they should use.
Give a justification for your answer.
c) One method of data compression is known as run length encoding (RIF).
i) Explain what is meant by RLE.
ii) Show how RLE would be used to produce a compressed file for
the image below.
Write down the data you would expect to see in the RLE compressed
format (you may assume that the grey squares have a code value of 85
and the white squares have a code value of 255).
a) Sampling is the process of converting analog sound waves into a digital format by taking regular samples of the wave at specific intervals. In music recording, the sound is captured through a microphone and converted into a digital signal using an analog-to-digital converter (ADC). The sound is then represented by a series of digital values, each corresponding to the amplitude of the sound wave at a specific moment in time. These digital values are then stored in a computer file as sound clips.
b) The type of compression the music editor should use depends on the desired quality and file size of the compressed music clips. Lossy compression is a type of compression that reduces the size of a file by permanently discarding some data that is deemed less important, resulting in some loss of quality. Lossless compression, on the other hand, compresses the file without losing any data, resulting in no loss of quality. Since music files are usually large and the goal is to send them via email, lossy compression is typically used to achieve a smaller file size. However, if the music producer requires high-quality sound, lossless compression may be preferred.
c) i) Run length encoding (RLE) is a data compression technique that compresses a sequence of data by replacing repetitive occurrences of the same data value with a count and a single value. For example, a sequence of ten consecutive 0s can be compressed to "10 0".
ii) To compress the image using RLE, we would scan each row of the image from left to right and count the number of consecutive squares of the same color. We would then replace each sequence with a count and a single value. For example the image given below:
[ 85 85 85 85 85 255 255 255 255 255 ]
The compressed format using RLE would be:
[ 5 85 5 255 ]
This means that there are 5 consecutive squares with a value of 85, followed by 5 consecutive squares with a value of 255.
What is the music score about?Run length encoding (RLE) is a lossless data compression technique used to compress continuous data with repetitive values. The basic idea behind RLE is to reduce the size of the data by representing repeated values with a count of the number of repetitions, followed by the value being repeated. This can significantly reduce the size of the data, especially for data that has many consecutive repetitions.
Therefore, In the example image given, RLE would be used by starting at the first pixel in the top left corner and scanning from left to right and top to bottom. When a run of consecutive pixels of the same color is found, the number of pixels in the run is recorded along with the color value of the pixels in the run. For example, the first run would be 5 white pixels, so it would be recorded as "5, 255" in the compressed format.
Learn more about music score on:
https://brainly.com/question/805824
#SPJ1
2. Gross profit is the difference between net sales & cost of goo 3. Purchase records end up with paying the voucher. 4. Payment for janitors & clerks is calculated under direct lab hotween actual cost & standard cost
Answer:
Gross profit is the difference between net sales and the cost of goods. It represents the profit made after accounting for all expenses.
Purchase records are maintained in order for a business to track all purchases that have been made and ensure that the appropriate payment is made.
Payments for janitors and clerks are calculated based on direct labor costs, which represent the wages paid to employees for their time and expertise. It is the difference between the actual cost and the standard cost of the labor
Explanation:
2. Which one of the following sounds like an appropriate way to greet the front desk staff when you arrive for an interview?
(1 point)
A. "Hi. My name is Kayla Bryan, and I have an interview at 11am with Mr. Winters"
B. "Hi. I'm here for an interview, I got stuck in traffic.... I'm not sure who I'm interviewing with
C. Hi, I have an interview at 11am.
OD. I'm here for the interview
Answer:
Explanation:
A
1. Why is technology so important in business?
Answer:
To communicate
Explanation:
To be able to recieve messages and talk to people in work about upcoming events
Write a function named print_product that accepts three numbers as parameters and prints the product. First, write the print_product function. Then, prompt the user for three inputs, and call your print_product function on those inputs.
Sample Run
Enter the 1st number: 11
Enter the 2nd number: 9
Enter the 3rd number: 8
The product: 792
Answer:
Here's the code for the print_product function in Python:
def print_product(num1, num2, num3):
product = num1 * num2 * num3
print("The product:", product)
And here's the code to prompt the user for three inputs and call the print_product function:
num1 = int(input("Enter the 1st number: "))
num2 = int(input("Enter the 2nd number: "))
num3 = int(input("Enter the 3rd number: "))
print_product(num1, num2, num3)
When you run the code and enter the sample inputs, it should output:
Enter the 1st number: 11
Enter the 2nd number: 9
Enter the 3rd number: 8
The product: 792
what is transformation
Answer:
A marked change in form, nature, or appearance.
MATHEMATICS•LOGIC
a process by which one figure, expression, or function is converted into another one of similar value.
Explanation:
Read 2 one-byte numbers. Multiply number 1 * number 2. Print the result
Sample Input
2 4
output
8
Answer:
Here's a C++ code that reads two one-byte integers, multiplies them, and outputs the result:
#include <iostream>
int main() {
int num1, num2;
std::cin >> num1 >> num2;
std::cout << num1 * num2 << std::endl;
return 0;
}
Explanation:
For the sample input 2 4, the output will be 8.
Functions with loops. C++
Define the function OutputVal() that takes two integer parameters and outputs the product of all integers starting with the first and ending with the second parameter, followed by a newline. The function does not return any value.
Ex: If the input is 1 4, then the output is:
24
Note: Assume the first integer parameter is less than the second.
------------------------------
#include
using namespace std;
/* Your code goes here */
int main() {
int numberA;
int numberB;
cin >> numberA;
cin >> numberB;
OutputVal(numberA, numberB);
return 0;
}
Answer:
Here's the pseudocode for the OutputVal function:
function OutputVal(numberA, numberB)
result = 1
for i = numberA to numberB do
result = result * i
end for
output result followed by a newline
end function
Explanation:
This function initializes result to 1 and then multiplies it by every integer from numberA to numberB using a loop. Finally, it outputs the value of result followed by a newline.
What’s the best Halloween candy
Answer:
Snickers candy bars or Reese's pieces
Answer: Smarties
Explanation:
For work, you stay at home while communicating and collaborating with people on the Internet. This is called
O A. the digital divide.
O B. telecommuting.
O C. telegraphing.
O D. digital permanence.
For work, you stay at home while communicating and collaborating with people on the Internet. This is called telecommuting.
Option B is correct.
What exactly does "telecommuting" entail?The practice of completing work assignments via an internet and phone connection from a location other than an office is referred to as "telecommuting," and it is also referred to as "teleworking."
How will telecommuting evolve in the future?Among other advantages, telecommuting has the potential to reduce daily trips and traffic congestion, improve air quality, increase productivity and efficiency, provide schedule flexibility, and promote work-life harmony.
What is the drawback of working from home?Technical issues are without a doubt one of the most significant obstacles to telecommuting. Problems with software and apps, hardware, and IT glitches can stop work in its tracks. The cure: Software bugs and hardware failures cannot be avoided, but you can try to stay one step ahead of them.
Learn more about telecommuting:
brainly.com/question/1100595
#SPJ1
Nested for loops. C++
Integer userValue is read from input. For each number from 1 to userValue, output the number indented by the number's value of dash characters, '-'. End each output with a newline.
Ex: If the input is 5, then the output is:
-1
--2
---3
----4
-----5
------------------------
#include
using namespace std;
int main() {
int userValue;
int i;
int j;
cin >> userValue;
/* Your code goes here */
return 0;
}
Answer:
Here's the code that solves the problem using nested for loops in C++:
Read userValue from input
for i = 1 to userValue
// print i with i number of dashes
for j = 1 to i
print "-"
end for
print i and a newline character
end for
Explanation:
Explanation:
We first read the user input userValue from input.
We use a for loop to iterate from 1 to userValue.
Inside the loop, we use another for loop to print the required number of dashes before the number. The number of dashes is equal to the current value of i.
We print the number i after the dashes, and end the line with a newline character.
After the loop ends, the program terminates.
Note: This is a general pseudocode that can be implemented in any programming language. The actual implementation may vary depending on the programming language used.
Which of the following is NOT a full disk image back-up solution?
A) EaseUS Todo
B) Acronis
C) Norton Ghost
D) Dropbox
Dropbox is NOT a method for backing up complete disc images. The software packages EaseUS Todo, Acronis, and Norton Ghost can all produce complete disc image backup solutions.
Whole system image backup: what is it?The entire data set on your System is included in a full image backup, which requires more time to complete and storage space. The process is quicker and uses less storage space with file backup.
A whole disc image is what?An exact copy of a storage device's entire contents, such as a hard drive, DVD, or CD, is called a disc image. The data and structure information on the disc image are exactly as they are on the original storage device.
To know more about image backup visit:-
https://brainly.com/question/29423685
#SPJ1
Drag and drop the code statements to create a code segment that will prompt the user for a letter. Every time that letter appears in the word, the index value (or position) of the letter is displayed. If the letter is not found in the word, “not found” will display. The variable found is used as a flag to indicate the letter was found in the word.
The code statement and the related code segments are given below.
What is the code statement for the response?The required codes are given as follows:
letter = input("Enter a letter: ")
word = "supercalifragilisticexpialidocious"
index = 0
found = False
for char in word:
if char == letter:
print("Letter found at index:", index)
found = True
index = index + 1
if not found:
print("Not found")
In this code segment, the user is prompted to enter a letter which is stored in the variable letter. The variable word stores the word "supercalifragilisticexpialidocious" that we will search for the letter. The index variable is used to keep track of the position of the letter in the word. The found variable is initially set to False, and is used as a flag to indicate whether the letter was found in the word or not.
The for loop iterates over each character in the word, and checks if the character is equal to the input letter. If the character matches the letter, it prints the index of that character, sets found to True, and continues to the next character. The index variable is incremented in every iteration of the loop.
If the loop completes without finding the letter, the found variable will still be False, and the program will print "Not found" to indicate that the letter was not found in the word.
Learn more about code statement at:
https://brainly.com/question/29099843
#SPJ1
ABC Ltd plans to computerize its sales ordering and stock control system. A feasibility study has strongly suggested that a
relational database system be installed. The details of ABC's sales and stock control are as follows
A feasibility study has strongly suggested that a relational database system be installed are:•The company's customers and suppliers are registered with the company and their details stored on the system.
What is relational database system?A relational database system is a type of database management system (DBMS) based on the relational model. Relational databases store data in tables, which are composed of rows and columns. The columns represent the attributes of the data, while the rows represent individual records. Relationships can be established between tables by linking related data elements. This allows for data to be accessed and manipulated in a variety of ways, such as querying and joining tables.
•The company maintains a list of products which are available for sale, including the quantity available in stock.
•The system also stores customer orders, including the items ordered, the expected delivery date and the payment terms.
To learn more about relational database system
https://brainly.com/question/29762676
#SPJ9
Select all the correct answers.
Which two tasks are responsibilities of a network administrator?
setting up an internet connection for a network
designing a network
repairing faulty routers
ensuring there are no conflicting IP addresses on the network
maintaining a network
A malicious user launches an attack on a private network and believes the attack has been successful. However the target network is not compromised. What security measure is it most likely using?
A. Only a firewall
B. A demilitarized zone with a firewall
C. Network segmentation
D. A virtual private network
I also put a picture of another question. Help me fast bc the test is timed.
Explanation:
I hope this helps ;}
BTW PLATO