Technician A says tires that are badly worn, mismatched in size or tread condition, or incorrectly inflated can cause brake problems. Technician B says simple inspection and checking with a pressure and a depth gauge can diagnose many tire problems. Who is correct?

Answers

Answer 1

The technicians are both accurate. Badly worn or underinflated tyres can lead to brake issues, and tyre issues are frequently detectable with a quick checkup and some pressure and depth gauge checks.

What's wrong with tyres that aren't the same size?

If you keep using wheels and tyres that aren't compatible, they'll wear down unevenly and might cause issues in the future. The same problems may arise if you decide to drive your car with mismatched wheels. Uneven wear and tear will result from mismatched wheels and tyres.

What is the main reason why tyres wear unevenly?

Uneven tyre wear is typically brought on by poor alignment, excessive or inadequate air pressure, or a worn-out suspension. Understanding the various irregular tyre wear patterns shown below can be useful.

To know more about technicians visit:-

https://brainly.com/question/29486799

#SPJ1


Related Questions

3.14.1: String access operations.

444686.3221032.qx3zqy7


Jump to level 1

Given string strInput, output "A question" if the string's last character is '?'. Otherwise, output "Not a question". End with a newline.


Ex: If the input is:


Where are you from?


then the output is:


A question

IN C++

Answers

Here's a possible C++ code solution for the given problem:

The Program

#include <iostream>

#include <string>

using namespace std;

int main() {

   string strInput;

   getline(cin, strInput); // read the input string from standard input

   

   if (strInput.back() == '?') {

      cout << "A question" << endl;

   } else {

       cout << "Not a question" << endl;

   }

   

   return 0;

}

In this code, we use the std::string class from the <string> header to represent the input string. We read the input string from standard input using the getline function, which reads a whole line of input until a newline character is encountered.

Then we check if the last character of the string is '?' using the back member function, which returns a reference to the last character of the string. If it's '?', we output "A question", otherwise we output "Not a question", both followed by a newline character (\n) to match the problem statement.

Note that this code assumes that the input string does not contain any leading or trailing white space characters (spaces, tabs, etc.), since getline removes them by default. If you want to preserve them, you can use the std::getline function with a delimiter parameter, or a combination of std::cin >> std::ws and std::getline.

Read more about programs here:

https://brainly.com/question/26134656
#SPJ1

If you want to see multiple pages of your document which menu option would you choose to change the way the screen displays what you are seeing?

Question 2 options:

Layout


View


Review


Insert

Answers

First, select the Print Layout option from the View menu.

Next, choose Several Pages from the menu.When you select Multiple Pages, your document is shown on two pages simultaneously.

What does the view menu serve?There is a drop-down menu at the top of the screen called the View menu, and it has the following commands: Sheets: Upon selection, a cascade menu shows a list of all the documents' sheets, arranged from left to right.The Functions View menu gives you access to a variety of options in the Camera view, including selecting and editing objects in various views, altering the display, and using a variety of other tools. Click the menu button in the upper-left corner of the Function view.There are several commands available, including web layout, print layout, outline, task pane, toolbars, ruler, header and footer, footnotes, full screen view.

To learn more about View menu, refer to:

https://brainly.com/question/25469594

What is the initial value of the “outer_loop” variable on the first iteration of the nested "inner_loop"? Your answer should be only one number.

for outer_loop in range(2, 6+1):
for inner_loop in range(outer_loop):
if inner_loop % 2 == 0:
print(inner_loop)

Answers

On the first iteration of the nested "inner loop," the initial value of the "outer loop" variable would be 2. This is due to the range function in the outer loop, which ranges from 2 to 6.

What distinguishes an A++ from an A++?

After being increased, an's value is returned by ++a. As ++ appears before the operand, it is a pre-increment operator. The value of a prior to incrementing is returned by a++. As ++ comes after the operand, it is a post-increment operator.

Can a for loop be included within another for loop?

Moreover, a for loop may be nested inside of another for loop. In this example, we loop through each element in the first list and each element in the second list.

To know more about loop visit:-

https://brainly.com/question/30494342

#SPJ1

BCC leadership has requested the chief information security officer (CISO) develop a feasibility study and recommendation for outsourcing the security department labor to a third-party vendor. The CISO will remain with the company as an internal BCC employee.
Part 1
Create an 8- to 10-slide Microsoft® PowerPoint® feasibility study and vendor selection criteria presentation for outsourcing the information security personnel. The feasibility study presentation should include the following:
Title slide
Analysis of the situation
Business case analysis comparing in-house vs outsourced
Cost-benefit analysis (CBA)
Total cost of ownership (TCO)
Return on investment (ROI)
Cost differential/net present value
Vendor selection process
At least three critical criteria for selecting a vendor to provide information security services
At least two significant challenges associated with managing a vendor within a hospital environment

Answers

The CISO will remain with the company as an internal BCC employee. Three critical criteria for selecting a vendor to provide information security services are:

Expertise and experience: The vendor should have expertise and experience in information security services that are relevant to the hospital environment. This includes but is not limited to access control, network security, data encryption, disaster recovery, and incident response. The vendor should also have a good reputation in the industry and a proven track record of delivering high-quality services to similar clientsCompliance and certification: The vendor should comply with all relevant laws, regulations, and industry standards for information security, such as HIPAA, HITECH, PCI-DSS, and ISO 27001. The vendor should also have the necessary certifications, such as CISM, CISSP, and CRISC, to demonstrate its competence and professionalism. Cost and value: The vendor should provide a cost-effective and competitive pricing model that aligns with the hospital's budget and expectations. The vendor should also provide a clear and transparent proposal that outlines the scope, deliverables, timelines, and milestones of the project, as well as the service level agreements (SLAs) and performance metrics that will be used to measure the vendor's performance.Two significant challenges associated with managing a vendor within a hospital environment are:Security and privacy: The hospital must ensure that the vendor complies with all security and privacy policies and procedures that are applicable to the hospital's data and systems. This includes but is not limited to data encryption, access control, user authentication, and incident response. The hospital must also monitor and audit the vendor's activities to detect and prevent any unauthorized access, use, or disclosure of confidential information.Communication and coordination: The hospital must establish and maintain effective communication and coordination channels with the vendor to ensure that the project is delivered on time, within budget, and with high quality. The hospital must also define and enforce the roles and responsibilities of both parties, and resolve any conflicts or issues that may arise during the project. The hospital must also ensure that the vendor understands the hospital's culture, values, and mission, and that the vendor's activities do not conflict with the hospital's interests.

for more such question on professionalism

https://brainly.com/question/13964646

#SPJ11

1. When is it appropriate to yell at a user?
O A. After he or she screws up the second time.
O B. When he or she interrupts your troubleshooting.
C. It's never appropriate to yell at a user.
D. Anytime he or she ignores your guidance.

Answers

C - it’s never appropriate to yell at a user

is it necessary to keep a record of software activation codes because your computer remembers these codes forever

Answers

It is important to keep a record of software activation codes, even if your computer remembers them, for a few reasons:

1- Moving to a new computer: If you get a new computer or reinstall the software on your current computer, you will need to enter the activation code again. If you don't have a record of the code, you may not be able to use the software.

2- Security: If someone gains access to your computer, they may be able to access your activation codes. If you keep a record of the codes in a secure place (such as a password-protected file), you can prevent unauthorized access.

3- License agreements: Some software licenses require you to keep a record of the activation code as proof of ownership. If you need to reinstall the software or transfer the license to a different computer, you may be required to provide the activation code.

Overall, it is a good practice to keep a record of software activation codes, even if your computer remembers them. This can help ensure that you can continue to use the software in the future and protect your ownership rights.

Software activation boils down to a simple license check. If a valid license is available the application starts. If not, the user is alerted to enter valid credentials or upgrade their account. The installed software either stores the product activation key locally and checks whether it is valid or invalid, or for more modern cloud-based activation methods, the software periodically checks online to determine access rights.

n java program code All permutations of names Write a program that lists all ways people can line up for a photo (all permutations of a list of Strings). The program will read a list of one word names (until -1), and use a recursive method to create and output all possible orderings of those names separated by a comma, one ordering per line. When the input is: Julia Lucas Mia -1 then the output is (must match the below ordering): Julia, Lucas, Mia Julia, Mia, Lucas Lucas, Julia, Mia Lucas, Mia, Julia Mia, Julia, Lucas Mia, Lucas, Julia

Answers

Answer:

import java.util.*;

public class Permutations {

   public static void main(String[] args) {

       Scanner sc = new Scanner(System.in);

       List<String> names = new ArrayList<>();

       System.out.println("Enter names (enter -1 to stop):");

       String name = sc.nextLine().trim();

       while (!name.equals("-1")) {

           names.add(name);

           name = sc.nextLine().trim();

       }

       List<List<String>> permutations = getPermutations(names);

       for (List<String> permutation : permutations) {

           System.out.println(String.join(", ", permutation));

       }

   }

   public static List<List<String>> getPermutations(List<String> names) {

       List<List<String>> result = new ArrayList<>();

       getPermutationsHelper(names, new ArrayList<>(), result);

       return result;

   }

   private static void getPermutationsHelper(List<String> names, List<String> permutation, List<List<String>> result) {

       if (names.isEmpty()) {

           result.add(permutation);

       } else {

           for (int i = 0; i < names.size(); i++) {

               List<String> newNames = new ArrayList<>(names);

               List<String> newPermutation = new ArrayList<>(permutation);

               String name = newNames.remove(i);

               newPermutation.add(name);

               getPermutationsHelper(newNames, newPermutation, result);

           }

       }

   }

}

Explanation:

The program starts by reading a list of names entered by the user, terminated by the string "-1". It then calls the getPermutations method to generate all possible permutations of the list of names. The getPermutations method is a recursive function that takes a list of names and a partial permutation, and adds all complete permutations to a result list.

The getPermutationsHelper method is the actual recursive function that generates the permutations. It takes the current list of names, the current partial permutation, and the result list. If the list of names is empty, it means that we have generated a complete permutation, so we add the current permutation to the result list. Otherwise, we loop through the remaining names, remove one name at a time, and recursively call getPermutationsHelper with the remaining names and the updated permutation.

Finally, the program prints out all permutations by looping through the result list and joining the names with commas.

I need help with my C++ class I need to learn how to do a multiplication table but in reverse please any help will do

Answers

Answer:

You can use a nested for loop to create a multiplication table in reverse. Start with the outer loop and set it to iterate from 10 down to 1. Inside the loop, set up a second loop to iterate from 10 to 1 and print out the result of the multiplication each time.

#include <iostream>

using namespace std;

int main()

{

   for (int i = 10; i >= 1; i--)

   {

       for (int j = 10; j >= 1; j--)

       {

           cout << i << " * " << j << " = " << i*j << endl;

       }

   }

   return 0;

}

This code initialises two variables, num1 and num2, to 12 before iterating through each pair of numbers in reverse order using a while loop. It prints the outcome of multiplying num1 by num2 inside the loop.

How can I print a table from 1 to 10 in C?

Algorithm. Step 1: Input a value to print a table dynamically. Read that number off the keyboard in step two. Step 3: Print number*I ten times using the for loop. / for(i=1; i=10; i++) Print num*I 10 times, with I ranging from 0 to 10.

#include

num1 = 12 int main();

num2 (int) = 12;

"Table of 12 in reverse," std::cout, followed by std::endl;

as long as (num1 >= 1) num1 * num2 std::endl; num2--; if (num2 == 0) num2 = 12; num1--; std::cout num1 " by " std::cout num2 " = "

returning 0;

To know more about code visit:-

https://brainly.com/question/17293834

#SPJ1

Alex wants another way to compare the editing projects by level, but not by group. Collapse the outline in the Editing Projects PivotTable to display the Level names and to hide the Group IDs. Insert a PivotChart based on the Editing Projects PivotTable using the Stacked Column chart type. Resize and reposition the PivotChart so that the upper- left corner is located within cell A12 and the lower-right corner is located within cell F25. Change the PivotChart colors to Monochromatic Palette 5 to coordinate with the PivotTable.​

Answers

[tex] \rm answer[/tex]

This activity appears to be related to using Microsoft Excel to create a PivotTable and PivotChart for comparing editing projects by level. The instructions involve collapsing the outline in the Editing Projects PivotTable to display the Level names and hiding the Group IDs. Then, a PivotChart is inserted based on the Editing Projects PivotTable using the Stacked Column chart type. The PivotChart is resized and repositioned to fit within specific cells, and its colors are changed to match the PivotTable using the Monochromatic Palette 5.

Overall, this activity is likely part of a larger task or project that involves analyzing and visualizing data using Excel. It demonstrates how to use PivotTables and PivotCharts to summarize and compare large data sets, and how to customize the appearance of these visualizations to make them more useful and visually appealing.

a. In cell C15, create a formula without using a function that subtracts the vendor cost (cell C7) and the shipping cost (cell C9) from the sales price (cell C8), and then multiplies the result by the projected number of units for sale in 2021 (cell C10). Use absolute references to each cell in the formula.

Answers

Answer:

To create a formula in cell C15 that subtracts the vendor cost (cell C7) and the shipping cost (cell C9) from the sales price (cell C8), and then multiplies the result by the projected number of units for sale in 2021 (cell C10), you can use the following formula:

=($C$8-$C$7-$C$9)*$C$10

This formula subtracts the vendor cost and the shipping cost from the sales price and then multiplies the result by the projected number of units for sale in 2021. The dollar signs before the cell references ensure that the formula uses absolute references to each cell, so the cell references don't change when you copy the formula to other cells.

in java program code Recursive method: Writing the recursive case. Write code to complete printFactorial()'s recursive case. Sample output if input is 5: 5! = 5 * 4 * 3 * 2 * 1 = 120

Answers

The recursive code has been written below

How to write the Java code

Here's an example code for the printFactorial() method in Java using recursion to calculate the factorial of a given number:

csharp

Copy code

public static int printFactorial(int num) {

  if (num == 0) {

      return 1;

  } else {

      int factorial = num * printFactorial(num - 1);

      System.out.print(num);

      if (num > 1) {

          System.out.print(" * ");

      }

      return factorial;

  }

}

public static void main(String[] args) {

  int num = 5;

  System.out.print(num + "! = ");

  System.out.print(printFactorial(num));

}

When executed, the code will output:

Copy code

5! = 5 * 4 * 3 * 2 * 1 = 120

The printFactorial() method takes an integer input num and recursively calculates its factorial. In the base case, if num equals zero, the method returns 1, which is the base case for the factorial function. In the recursive case, the method multiplies num with the result of calling printFactorial() with num - 1. It also prints num and a multiplication sign if num is greater than 1.

The main() method calls the printFactorial() method with the value 5 and prints the final output in the required format.

Read more on Java code here:https://brainly.com/question/25458754

#SPJ1

What kind of virtual machine uses the JAVA language, how does it work?

Answers

Answer:

there are two types of machine operates on two kinds of types primitive types and references types.

Explanation:

I have this question to answer in Python ,can you help me please?
I had answered the question but I think that are wrongs my answers .There are more than 1 correct answer .
Question 1:
We want to write the function f1 in such a way that it accepts an unspesified number of arguments.Which of the following ways of declaring f1 are correct for this purpose?

Answers

It is acceptable to define the function f1 to accept an unspecified number by using the *args argument, the **kwargs parameter, or a combination of necessary parameters and the *args parameter.

Where can I find Python solutions?

The Python community's usage queries and responses are posted in the Users category of the discuss.python.org website. The tutor list provides live assistance. There are plenty other mailing lists and newsgroups available if the tutor list isn't your cup of tea. Several Python queries and responses can be found on Stack Overflow.

def f1(*args): # body of the function

Function Body: def f1(arg1, arg2, *args); Function Body: def f1(**kwargs);

To know more about function visit:-

https://brainly.com/question/28939774

#SPJ1

basil telecommunications have hired you as a network manager for providing a network system that will include redundant processors, backup generators, and earthquake-resilient installation. you have decided that the average downtime per year cannot be more than 5 minutes 15 seconds. which of the following will you use in this scenario?
a. two 9s
b. five 9s
c. four 9s
d. three 9s

Answers

The correct option to use in this scenario is option b, five 9s of reliability.

A network system with five 9s of reliability means that it has an uptime of 99.999%, which corresponds to a maximum allowable downtime of just 5.26 minutes per year.

This level of reliability ensures that the network system experiences minimal downtime, providing uninterrupted service to customers of Basil telecommunications.

To achieve this level of reliability, the network system should have redundant components, such as processors and backup generators, as well as earthquake-resilient installations. These measures ensure that the network system can quickly recover from any outages, reducing the impact of any failure on the overall uptime of the system.

Overall, a network system with five 9s of reliability provides the highest level of availability and uptime, making it the best option to meet the uptime requirements of Basil telecommunications.

To know more about network system click here:

brainly.com/question/1326000

#SPJ4

You need to update continuouYou have an Azure virtual machine named VM1.

You need to update continuous delivery for VM1.

What should you create first?s delivery for VM1.


- an Azure storage account
- a Log Analytics workspace
- an Azure automation account
- an Azure DevOps Organization

Answers

To update continuous delivery for an Azure virtual machine named VM1, the first thing you should create is an "Azure DevOps Organization".

What to create first

Azure DevOps is a comprehensive set of tools and services that enable development teams to plan, build, test, and deploy applications to the cloud. It includes a range of features, including continuous integration and delivery (CI/CD), version control, and project management tools, that can be used to automate the deployment of applications to Azure virtual machines.

By creating an Azure DevOps Organization, you can set up pipelines and other deployment processes that will enable you to update continuous delivery for your VM1.

Read more on Azure DevOps Organization here:https://brainly.com/question/30243089

#SPJ1

After renovations, each room will have more capacity. You want to determine the projected revenue after the renovations have been completed.

In cell I6, using the named range in cell B14, enter a formula to determine the projected increase in revenue for the Musica Room based on the revenue figure in cell H6 and the increase in revenue percentage in cell B14.
Copy this formula through cell I10.

Answers

Calculate the expected income gain for the Musica Room following renovations by entering =[tex]H6*(1+B14)[/tex]in cell I6. To determine the increase in revenue for other rooms, paste this formula into cells I7 through I10.

How do you multiply cells in Excel using a formula?

Use the asterisk () arithmetic operator to complete this job. For instance, if you enter =[tex]5*10[/tex] in a cell, the cell will show 50 as the outcome.

How do I multiply a number in many cells in Excel?

When multiplying a set of cells, place a comma between the names of the two cells to specify that the entire range should be multiplied. For example, when "=PRODUCT(A2:A5)" is used, the cells A2, A3, A4, and A5 should be multiplied.

To know more about operator  visit:-

https://brainly.com/question/29949119

#SPJ1

what scap component provides a list of entries that contains an identification number, a description, and a public reference for each publicly known weakness in a piece of software? xccdf cve cce cpe see all questions back next question course content course content overview q

Answers

The scap component that provides a list of entries that contains an identification number, a description, and a public reference for each publicly known weakness in a piece of software is CVE

Security Content Automation Protocol (SCAP) is a comprehensive and standardized protocol for ensuring the security of computer systems. SCAP was created by the National Institute of Standards and Technology (NIST) to provide a framework for managing and maintaining system security.SCAP consists of several distinct parts, including:CVE - Common Vulnerabilities and Exposures, a database of known vulnerabilities CPE - Common Platform Enumeration, a standard way of identifying IT productsCCE - Common Configuration Enumeration, a standard way of describing system configurations XCCDF - Extensible Configuration Checklist Description Format, a standard language for defining security checklistsOVAL - Open Vulnerability and Assessment Language, a standard way of defining security testsBy using SCAP, system administrators can automate the process of vulnerability management and ensure that their systems remain secure and up to date with the latest security patches and updates.

for more such question on vulnerabilities

https://brainly.com/question/29023779

#SPJ11

Describe the important types of PPT

Answers

Please make me brainalist and keep smiling dude I hope you will be satisfied with my answer

6 Different Types of Presentations

6 Different Types of PresentationsInformative PresentationsInformative PresentationsInstructive PresentationsInformative PresentationsInstructive PresentationsPersuasive PresentationsInformative PresentationsInstructive PresentationsPersuasive PresentationsMotivational PresentationsInformative PresentationsInstructive PresentationsPersuasive PresentationsMotivational PresentationsDecision-making PresentationsInformative PresentationsInstructive PresentationsPersuasive PresentationsMotivational PresentationsDecision-making PresentationsProgress Presentations

Prepare a simple lesson plan and
demonstrate how you will integrate
technology in order to achieve your lesson
objective(s).
Follow Technohella (2021) 4 technology
integration lesson planning process.

Answers

Answer: Here is a simple lesson plan for college students that incorporates technology:

Explanation:

Lesson Title: Introduction to Data Analysis with Excel

Objective: Students will be able to use basic data analysis tools in Excel to interpret and present data.

Materials:

*Computers with Microsoft Excel installed

*Projector and screen for demonstrations

Technology Integration:

Step 1: Substitution

Students will use computers with Excel to input and organize data instead of using pen and paper.

Step 2: Augmentation

Students will use Excel’s built-in functions, such as SUM and AVERAGE, to perform calculations more efficiently than manually computing.

Step 3: Modification

Students will use Excel’s chart and graph functions to visually represent their data instead of creating hand-drawn charts.

Step 4: Redefinition

Students will use online resources, such as video tutorials and Excel forums, to expand their knowledge beyond the basic tools covered in class.

Procedure:

Introduction (10 minutes): The instructor will introduce the lesson objective and demonstrate basic data input and organization in Excel.

Guided Practice (30 minutes): The instructor will guide students through the use of Excel functions and demonstrate chart and graph creation.

Independent Practice (30 minutes): Students will work independently to input and analyze their own data using Excel.

Presentation (20 minutes): Students will present their findings to the class using Excel charts and graphs.

Closure (10 minutes): The instructor will summarize the lesson and provide additional resources for students to continue learning about Excel data analysis.

Assessment:

Students will be assessed on their ability to input and analyze data using Excel, as well as their presentation of findings using charts and graphs.

Overall, this lesson plan integrates technology in a meaningful way by using Excel to improve data analysis efficiency and create visually appealing presentations. Students will be engaged in the learning process through guided and independent practice, and the use of online resources allows for individual exploration beyond the scope of the lesson.

2. Which statements regarding client-server applications and their protocols used on networks and the Internet are FALSE (More than one statement applies)?

a.
The primary protocol used by Web servers and browsers (clients) is HTTP (Hypertext Transfer Protocol).


b.
In e-mail services, the recipient’s mail server delivers the message to the receiving client using one of two protocols: POP3 (Post Office Protocol, version 3) or IMAP (Internet Message Access Protocol, version 4). Using IMAP4, the email is downloaded to the client computer and typically removed from the server. Using POP3 the client application manages the email while it remains stored on the server.


c.
FTP (File Transfer Protocol) is a client-server application that transfers files between two computers, primarily using FTP. FTP uses encryption and is therefore extremely secure.


d.
The Telnet protocol is a command-line application included in many operating systems, but transmissions in Telnet are not encrypted. This has caused Telnet to be largely replaced by other, more secure programs, such as the ssh command in the Linux operating system.

Answers

The correct answer is There are two statements in the given options that are false. FTP File Transfer Protocol is a client-server application that transfers files between two computers, primarily using FTP.

However, FTP does not use encryption by default and is, therefore, not considered a secure protocol for transferring sensitive data over the internet. The Telnet protocol is a command-line application included in many operating systems, and transmissions in Telnet are not encrypted. This makes Telnet an insecure protocol for remote access to computers over the internet. As a result, it has largely been replaced by more secure alternatives, such as SSH (Secure Shell) in the Linux operating system The statement "The primary protocol used by Web servers and browsers (clients) is HTTP (Hypertext Transfer Protocol)" is true. HTTP is a client-server protocol used for the transfer of web-based data, including text, images, videos, and other multimedia files. The statement "Using IMAP4, the email is downloaded to the client computer and typically removed from the server. Using POP3 the client application manages the email while it remains stored on the server" is also true. IMAP and POP are two protocols used for email retrieval, and they differ in how they handle email storage and access. In summary, FTP is not considered a secure protocol, and Telnet is not a secure protocol for remote access, whereas HTTP is the primary protocol for web-based data transfer, and IMAP and POP are two protocols used for email retrieval.

To learn more about  File Transfer Protocol click on the link below:

brainly.com/question/30725806

#SPJ1

Display items ordered for customer #10449, its standard price, and total price for all items ordered. Use label for Total Price. (HINT: Total price is Sum(quantity*price). Also, don’t forget the GROUP BY statement.

Answers

Answer:

Assuming you have a database with tables orders, order_details, and products with the necessary columns, here's an SQL query that retrieves the items ordered for customer #10449, their standard price, and the total price for all items ordered:

SELECT

 products.productName AS ItemOrdered,

 order_details.pricePerUnit AS StandardPrice,

 SUM(order_details.quantity * order_details.pricePerUnit) AS TotalPrice

FROM

 orders

 INNER JOIN order_details ON orders.orderID = order_details.orderID

 INNER JOIN products ON order_details.productID = products.productID

WHERE

 orders.customerID = '10449'

GROUP BY

 products.productName,

 order_details.pricePerUnit;

Explanation:

This query joins the orders, order_details, and products tables and filters the result to only include rows where the customerID is '10449'. It then groups the result by productName and pricePerUnit, and calculates the total price for each group using the SUM function.

The result will have three columns: ItemOrdered, StandardPrice, and TotalPrice, where ItemOrdered is the name of the product ordered, StandardPrice is the standard price for that product, and TotalPrice is the total price for all items of that product ordered by customer #10449. The TotalPrice column is labeled "Total Price" based on the instructions.

Now that you have the discount_pct, use your code from that calculation and multiply it by the original_price to see if it matches the discount_amount you calculated . Again, do this calculation in a new column and name the column check.

Want a hint?
For this new column, use the same code that you used for the last column, but multiply it by the original_price field.
Remember, you cannot reference a column name (like discount_amount) within the same query, so you will have to copy the calculation you used previously. Be careful of parentheses

Answers

Use the formula "=ROUND((D2/C2-1)*C2,2)" to create a new column called "check." (assumed that original price is in column C, discount amount is in column F, and discount pct is in column E).

What does Excel's check formula do?

Choose the worksheet you want to review for mistakes. Press F9 to perform a new calculation if the worksheet was calculated manually. Click the Formulas tab > Formula Auditing > Error Checking button if the Error Checking dialogue is not visible.

How should a formula be used in a column?

After selecting the cell containing the formula, decide which of the adjacent cells you want to fill in. Choose either Down, Right, Up, or Left under Home > Fill. Shortcut key: Alternatively, you can use Ctrl+R or Ctrl+D to fill the formula in a row.

To know more about column  visit:-

brainly.com/question/13602816

#SPJ1

how to write a program in c language

Answers

INT PRI () Every programme written in C begins with the main() function. Printing data to the console is done using the printf() function.

What exactly are the fundamentals of the C programming language?The programming language C is all-purpose for computers. Dennis Ritchie came up with it back in the '70s, and it's still heavily utilised and important today. The features of C, by design, accurately mirror the capabilities of the CPUs it is intended to run on. The structural or procedural programming language C was utilised for system applications and low-level programming applications. C++, on the other hand, is an object-oriented programming language with some additional features like encapsulation, data hiding, data abstraction, inheritance, polymorphism, etc.At Bell Labs in 1972, Dennis Ritchie developed the general-purpose computer language C. Despite being ancient, it is a relatively common language. Due to its development for the UNIX operating system, C has a close connection to UNIX.

To learn more about C language, refer to:

https://brainly.com/question/26535599

Answer:

Martin Fowler once said:

“ Any fool can write code that a computer can understand. Good programmers write code that humans can understand. ”

Explanation:

Header file: #include<stdio.h>

Main function: int main(){

   //code here;

printing statement: printf("format string");

printing statement: printf("format string", specifiers if used);

user input statement: scanf("format specifiers", &variable);

// Format Specifiers Type of Output

   %d or %i A decimal integer or signed integer

   %c         Signed character

   %f         Signed float

   %e         A floating-point number

   %s                A string

}

Example program:

#include<stdio.h>

int main(){

    int i, j, a;

    printf("enter two values:");

    scanf("%d %d", &i, &j);

    a=i*j;

    printf("area: %d", a);

    //return 0;

}

What would be the output of the following programs } int a = 300, b, c; if (a >= 400) b = 300; c = 200; printf ("\n%d %d", b, c);​

Answers

The output of the program would be:

0 200

This is because the variable a has a value of '300', which is not greater than or equal to '400', so the statement b = 300 is not executed. Therefore, the value of b remains uninitialized and contains an unspecified value. The statement c = 200 is executed, so the variable c has a value of 200.

When the printf statement is executed, the value of b is printed, which is uninitialized and therefore has an unspecified value (in this case, 0), followed by the value of c, which is '200'. Therefore, the output is '0 200'.

[tex] \: [/tex]

write the definition of a function named half, which receives an integer argument and returns an integer that is half the value of the parameter. (use integer division!) so if the argument's value is 7, the function returns the value 3. if the argument's value happens to be 44, the functions returns the value 22.

Answers

The half function takes an integer argument and returns an integer that is half the value of the argument using integer division.

This means that any remainder from the division is discarded, and the result is rounded down to the nearest integer.

The function is defined with a single parameter, num, which represents the integer argument. The // operator is used to perform integer division on the num parameter, and the result is returned.

For example, if we call the half function with an argument of 7, the function performs integer division on 7 divided by 2, which results in 3 with no remainder. The function returns the integer value of 3. Similarly, if we call the function with an argument of 44, the function performs integer division on 44 divided by 2, which results in 22 with no remainder. The function returns the integer value of 22.

To know more about integer argument click here:

brainly.com/question/29383925

#SPJ4

Given string inputStr on one line and character userChar on a second line, output "Found match" if the fifth character of inputStr matches userChar. Otherwise, output "No match". End with a newline.

Ex: If the input is:

quart
t

then the output is:

Found match

Answers

If the fifth character of inputStr matches userChar, the result will read "Found match." Otherwise, it will read "InputStr not found" are:-

What does strchr in C do?

A pointer to the first instance of c in a string that is transformed to a character is returned by the strchr() method. If failing to locate the requested character, the method returns NULL.

C lacks a String type that would allow for the quick creation of string variables, in contrast to many other programming languages. Instead, in order to generate a string in C, you must use the char type and an array of characters: Remember that you must use double quotes with greetings[] = "Hello World!" ( "" ).

//use respective lines for provided code

  if (userInput.charAt(0) == firstLetter) {

  System.out.println("Found match: " + firstLetter);

  }

else {

    System.out.println("No match: " + firstLetter);

   }

//use remaining lines from the provided code

To know more about inputStr visit:-  

https://brainly.com/question/30364578

#SPJ1

x = int(input ("Enter a value: "))
C = 0
sum = 0
while (x != 0):
x = int(input ("Enter a value: "))
C = c + 1
sum sum + X
print ("\n\nSum: " + str(sum))


Pls help ASAP

Answers

Answer:

python code

C = 0

sum = 0

x = 1 # Initialize x to a non-zero value

while (x != 0):

   x = int(input("Enter a value: "))

   C = C + 1

   sum = sum + x

print("\n\nSum: " + str(sum))

Explanation: asked an ai and here we go.

The given code is written in Python and appears to prompt the user to input a value repeatedly until the user enters 0. During each iteration, the code increments a variable C by 1 and adds the input value to a variable sum. Once the user enters 0, the code prints the value of sum.

However, there are a couple of errors in the code:

The initial value of variable C is incorrectly written as c (lowercase) instead of C (uppercase).

The variable sum is not initialized to 0 before the loop begins.

Here's the corrected code above

In this corrected code, C is correctly initialized to 0, sum is initialized to 0, and x is initialized to a non-zero value to ensure that the loop runs at least once. Additionally, the variable sum is updated with the user input value during each iteration, and the loop continues until the user enters 0. Finally, the code prints the value of sum after the loop has completed.

see attached for question

Answers

Robotics Helps in Developing Critical-Thinking and Problem-Solving Abilities. Students will be better prepared for the competitive educational and professional society by acquiring the necessary abilities.

How do gender and prior robotics experience affect students' attitudes towards STEM and robotics?

The findings indicate that the pupils had favourable attitudes about STEM and robotics. STEM attitudes were not impacted by gender. Yet, when it came to attitudes towards learning robotics, female students considerably lacked the confidence and ambition of male students.

What results does robots produce?

Robots can have a significant impact on a variety of industries, including: military activities, particularly in the transport and search and rescue sectors. manufacture in the industrial sector, to do assembly-line duties. weed control in agricultural productivity with drones.

To know more about Robotics visit:-

https://brainly.com/question/29379022

#SPJ1

which of the following terms describes the component that is generated following authentication and is used to gain access to resources following login?
a. access token
b. user account password
c. user ACL
d. user account

Answers

The correct answer is a. access token. An access token is a component that is generated following authentication and is used to gain access to resources following login.

It is a unique identifier that is granted to an authenticated user and is used to verify their identity when requesting access to a resource. Access tokens can be used to access a wide range of resources, such as web applications, APIs, and cloud services.

Access tokens typically have a limited lifespan and can be revoked or invalidated if a user's permissions change or if there is suspicious activity detected on their account. This helps to ensure the security of the system and prevent unauthorized access to resources.

Overall, access tokens play a critical role in modern authentication systems by providing a secure and flexible way for users to access resources following login.

To know more about access token click here:

brainly.com/question/17079128

#SPJ4

in java program code Artwork label (classes/constructors) Given main(), define the Artist class (in file Artist.java) with constructors to initialize an artist's information, get methods, and a printInfo() method. The default constructor should initialize the artist's name to "unknown" and the years of birth and death to -1. printInfo() displays "Artist:", then a space, then the artist's name, then another space, then the birth and death dates in one of three formats: (XXXX to YYYY) if both the birth and death years are nonnegative (XXXX to present) if the birth year is nonnegative and the death year is negative (unknown) otherwise Define the Artwork class (in file Artwork.java) with constructors to initialize an artwork's information, get methods, and a printInfo() method. The default constructor should initialize the title to "unknown", the year created to -1. printInfo() displays an artist's information by calling the printInfo() method in Artist.java, followed by the artwork's title and the year created. Declare a private field of type Artist in the Artwork class.

Answers

The Artist and Artwork classes can be defined with constructors and printInfo() methods to initialize and display an artist's and an artwork's information.

Java code snippet of the solution

Artist.java

public class Artist {

   private String name;

   private int birthYear;

   private int "";

   

   public Artist() {

       this.name = "unknown";

       this.birthYear = -1;

       this."" = -1;

   }

   

   public Artist(String name, int birthYear, int "") {

       this.name = name;

       this.birthYear = birthYear;

       this."" = "";

   }

   

   public String getName() {

       return this.name;

   }

   

   public int getBirthYear() {

       return this.birthYear;

   }

   

   public int getDeathYear() {

       return this."";

   }

   

   public void printInfo() {

       System.out.print("Artist: " + this.name + " ");

       if (this.birthYear >= 0 && this."" >= 0) {

           System.out.println(this.birthYear + " to " + this."");

Learn more about Java here:

https://brainly.com/question/25458754

#SPJ1

Other Questions
Identify the type and then write the balanced chemical equation for the reaction described below aluminum oxide breaks down when D heated What is the purpose of accounting in society? Identify four kinds of external users and describe how they use accounting information. Identify three actual businesses that offer services and three actual businesses that offer products. What information is reported in an income statement? What does the concept of objectivity imply for information reported in financial statements? Why? Why is the revenue recognition principle needed? What does it demand? Describe the three basic forms of business organization and their key attributes. Define (a) assets, (b) liabilities, (c) equity, and (d) net assets. Identify the following users of accounting information as either an internal (I) or an exter- nal (E) user. _______ A. Shareholders _______ E. Purchasing manager _______ B. Creditors _______ F. Human resources director _______ C. Nonexecutive employee _______ G. Production supervisors _______ D. Research and development director _______ H. Distribution managers Indicate in which financial statement each item would most likely appear: income statement (I), balance sheet (B), statement of owners equity (OE), or statement of cash flows (CF). a. Assets d. Equipment g. Total liabilities and equity b. Revenues e. Withdrawals h. Cash from operating activities c. Liabilities f. Expenses i. Net decrease (or increase) in cash Provide an example of a transaction that creates the described effects for the separate cases a through g. a. Increases an asset and decreases an asset. e. Decreases an asset and decreases equity. b. Decreases an asset and decreases a liability. f. Increases a liability and decreases equity. c. Decreases a liability and increases a liability. g. Increases an asset and increases equity. d. Increases an asset and increases a liability Lena Gold began a professional practice on June 1 and plans to prepare financial statements at the end of each month. During June, Gold (the owner) completed these transactions: A. Owner invested $50,000 cash in the company along with equipment that had a $10,000 market value. B. The company paid $1,600 cash for rent of office space for the month. C. The company purchased $12,000 of additional equipment on credit (payment due within 30 days). D. The company completed work for a client and immediately collected the $2,000 cash earned. E. The company completed work for a client and sent a bill for $7,000 to be received within 30 days. F. The company purchased additional equipment for $8,000 cash. G. The company paid an assistant $2,400 cash as wages for the month. H. The company collected $5,000 cash as a partial payment for the amount owed by the client in trans- action e. I. The company paid $12,000 cash to settle the liability created in transaction c. J. Owner withdrew $500 cash from the company for personal use. Required Create a table using the following headings for columns: Cash; Accounts Receivable; Equipment; Accounts Payable; L. Gold, Capital; L. Gold, Withdrawals; Revenues; and Expenses. Then use additions and subtractions to show the effects of the transactions on individual items of the accounting equation. Show new balances after each transaction. The following are selected business transactions for business called W/o Mihret Company during its first year of operation. The assets and liabilities of White dry cleaners on December 1, 2016 of the current year are as follows: Cash Br.1,000, Accounts Receivable, Br.2,200, Supplies Br. 850, Equipment Br. 3,500, Land Br. 11,450. Accounts Payable, Br 4,030. A white dry cleaner is a sole proprietor owned and managed by W/o Mihret. Currently the building, and delivery truck, is being rented, pending expansion to new facilities. Another company at wholesale rates of does the company work of dry cleaning. Business transactions during December are summarized as follows. Received cash from customers for dry cleaning service Br. 4,928. Paid creditors on account Br. 1,755. Received cash from W/o Mihret as additional investment Br. 3,700. Paid rent for the month Br. 1,200. Charged customers for dry cleaning service delivered on account Br.1, 025. Purchased supplies on account, Br. 245 Received cash from customers on account Br. 2,000 Received a monthly bill for electricity for the month December(To be paid on January 2, Br. 1,635, Paid the following: Wages expense, Br. 850, Truck Expense, Br. 250, Utilities Expense, Br.325, miscellaneous expense.Br. 75 W/o Mihret the owner withdraws cash Br. 1,800 for her personal use. Determined by taking an inventory count, the cost of supplies used during the month Br. Required: Journalize the above transactions using General Journal. Post from Journa What is the length of the unknown leg of the right triangle? **NEED QUICKLY*** if there are 300,000 servicemen buried on 624 acres wut is the unit rate of average number of servicemen buried for acre A rubber ball dropped from a height of 50mrebounds at every impact from the floor to a height half of that from which it has fallen. Find the total distance described by the time it comes to rest. if a condominium association in florida violates the parameters under which certain contractors may design and install fire sprinkler systems, how much may the association be fined? thor is working as a contractor for the department of defense (dod). to better secure their systems, each laptop is equipped with a device that requires all employees to insert their employee identification badges into the computer to log in. each identification badge has an electronic chip embedded into the badge. the employee must enter a pin to unlock the digital certificate stored in this badge to authenticate to the login server. which of the following technologies is used to read the employee's badge? smart card reader barcode scanner adf magnetic reader see all questions back skip question 2. Just as stage designers use lightning to spotlight a performer, painters will often ............. important elements in paintings. The measures of the angles of a triangle are shown in the figure below. Solve for x. what is the probability of being delt 4 hearts from a standard 52 card deck if only 4 cards are to be delt Charlie's net worth is $-35,354. Which of the following is true?ResponsesHe has a negative net worth which means his liabilities are greater than his assets.He has a negative net worth which means his liabilities are greater than his assets., EndFragment,He has a negative net worth which means his assets are greater than his liabilitiesHe has a negative net worth which means his assets are greater than his liabilities , EndFragment,He has a positive net worth which means his assets are greater than his liabilities.He has a positive net worth which means his assets are greater than his liabilities. , EndFragment,He has a positive net worth which means his liabilities are greater than his assets one star has a temperature of 10,000 k and another star has a temperature of 5,000 k. how would you describe the difference in energy between the two stars? 1. El sol tenue penda en el cielo como una moneda de cobre.Qu dos cosas compara el autor? 1. El sol tenue penda en el cielo como una moneda de cobre.Qu dos cosas compara el autor? a producer can raise profit by expanding output if his: group of answer choices marginal revenue is equal to marginal cost. marginal revenue is less than marginal cost. marginal revenue is negative. marginal cost is negative. marginal revenue is greater than marginal cost. numerically speaking is the rate of disappearance of reactants always the same number as the rate of the appearance of products? psychiatric disorders in children (adhd, conduct and oppositional defiant disorders) please give the introduction for this in your own words I have a presentation Three numbers of the repeating decimal produced by the fraction 3/9 i need help finding x adjectives of osceloas These religions were created in reaction to the rigidity of the ancient caste system?JanismBuddhismUpanishadicAll of the above