The following two SQL statements will produce the same results. SELECT last_name, first_name FROM customer WHERE credit_limit > 99 AND credit_limit < 10001: SELECT last_name, first_name FROM customer WHERE credit_limit BETWEEN 100 AND 10000; A. B TRUE FALSE

Answers

Answer 1

The answer to this question is A. Both SQL statements will produce the same results. The first SQL statement uses the logical operators "greater than" and "less than" to specify a range of values for the credit_limit column.

The second SQL statement uses the "between" operator to specify the same range of values. Using the "between" operator can be more concise and easier to read than using the logical operators, especially when there are multiple conditions in the WHERE clause. However, both methods are valid and will produce the same results in this case.It's important to note that when using the "between" operator, the values specified in the range (100 and 10000 in this case) are inclusive. This means that records with a credit_limit of exactly 100 or 10000 will be included in the result set. In conclusion, the answer to the question is A. Both SQL statements will produce the same results, and it's up to the preference of the developer which method to use.

Learn more about logical here

https://brainly.com/question/28418750

#SPJ11


Related Questions

GoodArray hackerrank solution for a number N, a goodArray is the smallest possible array that consists of only powers of two

Answers

Using the knowledge in computational language in python it is possible to write a code that smallest possible array that consists of only powers of two.

Writting the code in python:

"public class GoodArray {"

"public static List<Integer> getQueryResults(long N, List<List<Integer>> queries) {"

 "List<Integer> res = new ArrayList<>();"

 int[][] arr = new int[queries.size()][3];

 "List<Integer> goodArray = new ArrayList<>();"

 "for (int i = 1; i <= N; i++) {"

  "int num = i;"

  "while (num % 2 == 0) {"

   "goodArray.add(num);"

   "num = num / 2;"

  }

 }

 int index = 0;

 for (List<Integer> l : queries) {

  arr[index][0] = l.get(0);

  arr[index][1] = l.get(1);

  arr[index][2] = l.get(2);

  index++;

 }

 Collections.sort(goodArray);

 "for (int i = 0; i < arr.length; i++) {"

  "int[] query = arr[i];"

  int l = query[0];

  int r = query[1];

  int m = query[2];

  int prod = 1;

  "for (int j = l - 1; j <= r - 1; j++) {"

   "prod = (int) (prod * goodArray.get(j)) % m;"

  }

  res.add(prod);

 }

 return res;

}

}

See more about python at brainly.com/question/18502436

#SPJ1

Orlando is home to some of the famous icons in the world. We even have a theme park that has an icon for each of the areas/buildings you can visit. Your task is to create an icon for yourself. It should have some sort of meaning behind it. It must use two different loops to create your icon. See the rubric for requirements.

Answers

Using the knowledges of python is possible to create a code that can create the icon.

Writting the code in phyton:

# header comment: This turtle python create a mathematical pattern that is formed by looping

# and creating circle at same time import turtle

# create a turtle named t

t = turtle. Turtle()

# set up background color, pensize and speed

turtle.Screen().bgcolor("black")

t.pensize(2)

t.speed(0)

# first loop: determines how many times the inner loop should be repeated

for i in range(8):

# loop over each color in the list of available colors

for j , color in enumerate(["red",  "magenta", "blue", "cyan", "green", "yellow"", "white"]):

t.pencolor(color)

if j % 2 # if j iss odd, draw a circle with radius 100

t.circle(100)

else: # if j is even, draw a circle with radius 50

t.circle(50)

t.left(10)

t.hideturtle()

See more about python at: brainly.com/question/18502436

#SPJ1

Variables that can take only 2 variables are referred to as which one of the following?

Answers

Answer:

Binary variable

Explanation:

These are variables that can only take 2 values.

When a variable has only two possible levels, it is referred to as binary or dichotomous. Most of the time, these variables can be asked in a “yes/no” manner. A binary variable is something like a person's smoking status.

What Variables that can take only 2 variables?

Numerical and categorical. Then, each category is divided into two subcategories: discrete or continuous for numeric variables, and nominal or ordinal for categorical variables.

In their investigations, psychologists frequently use several dependent variables. The main justification for this is that it makes it simple for them to quickly and cheaply respond to more study inquiries.

A naming scale is one in which variables are merely “named” or labelled, without regard to their order. Beyond just identifying them, the variables on an ordinal scale have a precise order.

Therefore, Labels, an order, and a specified interval are provided for each of the variable possibilities in an interval scale.

Learn more about variables here:

https://brainly.com/question/17344045

#SPJ2

You have been put in charge of S3 buckets for your company. The buckets are separated based on the type of data they are holding and the level of security required for that data. You have several buckets that have data you want to safeguard from accidental deletion. Which configuration will meet this requirement

Answers

The  configuration that will meet this requirement is the ones whose AWS Region(s) you are to store on your Amazon S3 data.

What are S3 buckets?

A bucket is known to be a kind of a container for objects that saves in Amazon S3.

Note that a person can save a lot of number of objects in a bucket and one can be able to  have up to 100 buckets in their account.

Note that  Amazon S3 is said to be a kind of  program that is made  to save, protect, and get back data from “buckets” at any point in time from any place on any device.

Therefore, The  configuration that will meet this requirement is the ones whose AWS Region(s) you are to store on your Amazon S3 data.

Learn more about  S3 buckets from

https://brainly.com/question/10666463

#SPJ1

What is the advantage of 2023 murano’s available intelligent awd working in conjunction with vehicle dynamic control?.

Answers

The advantage of 2023 Murano's available intelligent awd working in conjunction with vehicle dynamic control is that helps the driver to be able to stand or maintain cornering control.

What is cornering stability control?

The Cornering Stability Control is known to be the kicks in a car that if it senses that the car is going on a sharp corner, it can help to monitor the amount of braking force that is exerted on each wheel and help the car keep a straight line.

Hence, The advantage of 2023 Murano's available intelligent awd working in conjunction with vehicle dynamic control is that helps the driver to be able to stand or maintain cornering control.

Learn more about vehicle dynamic control from

https://brainly.com/question/14312189

#SPJ1

Modify the CharacterInfo class shown in Figure 7-3 so that the tested character is retrieved from user input.

Answers

The tested character is modified as given below. See the definition of tested character below.

What is characterization testing?

Michael Feathers created the phrase "characterization testing."

A characterization test (also known as Golden Master Testing) in computer programming.

It is a method of describing (characterizing) the actual behavior of an existing piece of software and thereby protecting legacy code against unwanted modifications through automated testing.

What is the modified characterInfo class?

Run on java, the modified characterInfo class is given as follows:

//import packages

import java.util.Scanner;

//Java class

public class InputCharacterInfo {

   //entry point of the program , main method

   public static void main(String[] args) {

       //creating object of Scanner class

       Scanner sc=new Scanner(System.in);

       //asking user to enter character

       System.out.print("Enter a character : ");

       //reading character

       char aChar=sc.next().charAt(0);

       System.out.println("The character is "+aChar);

       if(Character.isUpperCase(aChar))

           System.out.println(aChar+" is uppercase");

       else

           System.out.println(aChar+" is not uppercase");

       if(Character.isLowerCase(aChar))

           System.out.println(aChar+" is lowercase");

       else

           System.out.println(aChar+" is not lowercase");

       aChar=Character.toLowerCase(aChar);

           System.out.println("After toLowerCase(), aChar is "+aChar);

       aChar=Character.toUpperCase(aChar);

           System.out.println("After toUpperCase(), aChar is "+aChar);        

   }

}

Learn more about characterization testing in programming at;
https://brainly.com/question/13142406
#SPJ1

PPTP is the preferred vpn protocol.

a. true
b. false

Answers

This statement is false. PPTP is not the preferred VPN protocol.

What is a VPN protocol?

This can be defined to be the set of rules that helps to ascertain the way that the data routes that connects a computer affects the VPN server. The providers of the VPN help to ensure that there is a stable and a good connection between the protocols for the sake of security.

What is the PPTP

This is the term that stands for the point to point tunneling protocol. This was a VPN protocol that came into use in the year 1995.

Hence we can conclude that the  point to point tunneling protocol Is not a preferred VPN protocol.

Read more on VPN protocol here: https://brainly.com/question/10018259

#SPJ1

A project manager has designed a new secure data center and has decided to use multifactor locks on each door to prevent unauthorized access. Compare the following types of locks that the project manager may use to determine which example the facility is utilizing.

Answers

The types of locks that the project manager may use to determine which example the facility is utilizing is said to be a lock that needs an employee to be able to use a smart card and also a  pin to enter at the same time.

How does multi-factor authentication work?

Multi-factor Authentication (MFA) is known to be a kind of an authentication method that needs the user to give two or a lot of verification factors to be able to have access to a given resource e.g. application.

Note that it is said to be a vital aspect of a strong identity and access management (IAM) policy and therefore, the types of locks that the project manager may use to determine which example the facility is utilizing is said to be a lock that needs an employee to be able to use a smart card and also a  pin to enter at the same time.

Learn more about multifactor locks from

https://brainly.com/question/27560968

#SPJ1

1. (3)2 points possible (graded, results hidden)Suppose that we now find the linear separator that maximizes the margin instead of running the perceptron algorithm.What are the parameters and corresponding to the maximum margin separator

Answers

The parameters and corresponding to the maximum margin separator are:

Ө0=0 and Ө=(1/sqrt(2)), respectively.

What is a maximum margin separator?

In a two-dimensional space, a Maximal Margin Separator is a hyperplane (in this example, a line) that entirely separates two classes of observations while leaving the largest space between the line and the nearest observation.

The support vectors are the closest observations.

Learn more about maximum margin separators;
https://brainly.com/question/15798425
#SPJ1

Why is quantum computing potentially a better fit for weather forecasting than classical computers?.

Answers

The reason why quantum computing is potentially a better fit for weather forecasting than classical computers is that It can perform advanced simulations more efficiently.

What is quantum computing?

Quantum computing is known to be  a kind of technologies that is known to be futurists in nature.

Quantum computers is one that is seen to have the power to quickly process a lot of high numbers of quantities of weather data and carry out analysis that are said to be too complex for classical computers.

Hence, The reason why quantum computing is potentially a better fit for weather forecasting than classical computers is that It can perform advanced simulations more efficiently.

See full question below

Why is quantum computing potentially a better fit for weather forecasting than classical computers?

It can perform advanced simulations more efficiently.

It can be easily installed at locations around the globe.

It can function efficiently when stored at high temperatures.

It can store extensive data for better pattern recognition.

Learn more about quantum computing from

https://brainly.com/question/25513082

#SPJ1

The crosstab query wizard asks you to select fields for the _____, column headings, and values

Answers

The crosstab query wizard asks you to select fields for the row headings, column headings, and values.

What is crosstab?

Image result for Crosstab Query Wizard prompts you to select the fields for the row titles, column titles and values. A crosstab query is a type of query. When you run a crosstab query, the results are displayed in a datasheet that has a different structure than other types of datasheets.

The row heading or row header is the gray-colored column located to the left of column 1 in the worksheet containing the numbers (1, 2, 3, etc.) used to identify each row in the worksheet.

See more about crosstab at brainly.com/question/23716013

#SPJ1

Which technology keeps track of heart rate during a workout? (3 points) bathroom scale calculator pedometer wrist monitor

Answers

The technology keeps track of heart rate during a workout is pedometer. Option C is the answer

What is pedometer?

A pedometer is a device,that is used to know how many steps an individual takes during workout.

It is a good step-meter that keeps the heart rate in check especially during exercise.

Therefore, The technology keeps track of heart rate during a workout is pedometer. Option C is the answer

Learn more on pedometer below

https://brainly.com/question/12364238

#SPJ1

_____ is designed to prevent illegal distribution of movies, music, and other digital content?

Answers

A Digital rights management is designed to prevent illegal distribution of movies, music, and other digital content

What is Digital rights management?

Digital rights management (DRM) is the use of technological systems to prevent some users from the use of copyrighted digital materials.

DRM tools are software's that are designed for various website that can help restrict access and to protect the rights of the copyright holder.

It can be used for music, videos and other important programme.

Therefore,  A Digital rights management is designed to prevent illegal distribution of movies, music, and other digital content

Learn more copyright below

https://brainly.com/question/357686

#SPJ1

Match the column.
Description Shortcut key
Move to next cell in row page up

Answers

The matchup are:

1) move to next cell in row - tab

2) move to previous cell in row - shift+tab

3) up one screen - page up

4) down one screen - page down

5) move to next worksheet - ctrl + page down

6) move to previous worksheet - ctrl + page up

7) go to first cell in data region - ctrl+ home

8) go to last cell in data region - ctrl + end

What are computer shortcut keys?

A computer shortcut is known to be some group of one or a lot of keys that brings about a command in software or in any kind of operating system.

Hence, The matchup are:

1) move to next cell in row - tab

2) move to previous cell in row - shift+tab

3) up one screen - page up

4) down one screen - page down

5) move to next worksheet - ctrl + page down

6) move to previous worksheet - ctrl + page up

7) go to first cell in data region - ctrl+ home

8) go to last cell in data region - ctrl + end

Learn more about computer shortcut from

https://brainly.com/question/12531147

#SPJ1

What is the current situation of drone technology in emergency rescue and recovery

Answers

Drones are now being used by researchers, notably those at the University of Montana, to forecast how to respond to disasters, particularly forest fires. Drones are equipped with sensors that can monitor wind speed and direction, position, location, humidity, and temperature. Major utility companies are looking into how technologies like drones and artificial intelligence may help to lower the likelihood of future fires and for infrastructure assessment to help minimize fire risk. Drones are now being used by California's emergency services to help find forest fires, which can help determine the kind and quantity of supplies needed on the site. Drones can be equipped with thermal detection sensors, which utilize infrared light to identify heat signatures and aid first responders find hotspots for fires.

Q. Imagine you are a fashion designer. Research on how to start your own fashion clothing brand. Write down the process you need to follow to start your own fashion clothing brand. Think about the conditions one has to meet to ensure the quality of the clothes (manufacturing and the cost of clothes). If possible draw the flow chart to describe the steps, which will be taken by the fashion designer (or you) in making a decision.

Answers

The process you need to follow to start your own fashion clothing brand are:

Find a need in the market. Create a business plan Find your target audience. Begin designingIdentify a clothing manufacturer. Select a brand name, logo, and market profileSelect a price point for your items.Start the marketing process. Put done some realistic sales and distribution goals. Begin a soft launch, and also search for more investment and partnerships.

What is clothing line?

A clothing brand or a clothing line is known to be made up of a composition of apparel made for a target audience and sold mostly  in retail locations and via stores.

Note that The process you need to follow to start your own fashion clothing brand are:

Find a need in the market. Create a business plan Find your target audience. Begin designingIdentify a clothing manufacturer. Select a brand name, logo, and market profileSelect a price point for your items.Start the marketing process. Put done some realistic sales and distribution goals. Begin a soft launch, and also search for more investment and partnerships.

Learn more about clothing brand  from

https://brainly.com/question/24264007

#SPJ1

What is phishing? Answer

Answers

Answer:

Phishing is a type of online scam where an attacker sends a fraudulent email purporting to be from reputable companies, designed to deceive a person into revealing sensitive and personal information (card numbers, passwords etc).

Hope this helps.

Amber, a network administrator, is conducting VoIP training for other IT team members. Melanie, a new team member, is confused about the difference between latency and jitter. What is the BEST way to explain the difference

Answers

The best way to explain the difference is option A: Jitter is the up and down variation in latency.

What are VoIP services?

Voice over Internet Protocol (VoIP), is known to be a form of a technology that gives one room to be able to make voice calls via the use of a broadband Internet connection.

In the case above, The best way to explain the difference is option A: Jitter is the up and down variation in latency as it is the only best option.

See options below

Jitter is the up and down variation in latency.

Latency is the up and down variation in jitter.

Jitter is caused by an inadequate codec.

Latency is caused by sampling; jitter is not.

Learn more about latency from

https://brainly.com/question/27013190

#SPJ1

Select the correct text in the passage.
Which statement is true about depth-first search, or DFS?
1. Depth-first search follows multiple paths at the same depth.
2. It explores all nodes for all solutions.
3. It takes up less space than BFS.
4. The time
complexity for DFS is bm.

Answers

The statement that  is true about depth-first search, or DFS  is that It explores all nodes for all solutions.

Check more about DSF services below.

Does depth first search visit every node?

The DFS algorithm is known to be a kind of a recursive algorithm that is said to often make use of the idea of backtracking.

Note that this is one where there is an exhaustive searches of all the nodes by going ahead and also backtracking.

Hence, The statement that  is true about depth-first search, or DFS  is that It explores all nodes for all solutions.

Learn more about depth-first search, from

https://brainly.com/question/15142337

#SPJ1

.Match the following
.

misconfiguration. ............. Antivirus
Spoofing ..............Fake identity
Malware........ ..... No authentication
Infected files ..........Trojan horse​

Answers

The Match up are:

Malware - Antivirusmisconfiguration - No authenticationSpoofing - Fake identityInfected files -Trojan horse​What is spoofing?

Email spoofing is known to be a form of attack where an attacker is said to makes the 'from address' in an email to look a lot  like legitimate.

Hence, The Match up are:

Malware - Antivirusmisconfiguration - No authenticationSpoofing - Fake identityInfected files -Trojan horse​

Learn more about Spoofing from

https://brainly.com/question/11831402

#SPJ1

what are the uses of recycle bin​

Answers

Answer:

use of recycle bin-

It provides users the option to recover deleted files in Windows operating systems

Which type of network is best for shayne?

Answers

PAN is known to be the type of network  that is best for shayne.

What is PAN in a network?

A personal area network (PAN) is known to be a form of an interconnection that is made by information technology devices and it is one that is found in the range of a specific person.

Hence, based on the above scenario, PAN is known to be the type of network  that is best for shayne.

See options below

Shayne keeps his home office computer on his desk. He wants to use a wireless keyboard and mouse, and to send output to his printer and receive input from his scanner wirelessly. Which type of network is best for Shayne?

WAN

PAN

MAN

LAN

Learn more about PAN from

https://brainly.com/question/14704303

#SPJ1

____ versions of freeware and open source software are often available to the public for testing.
a. Benchmark.
b. Bug.
c. Alpha.
d. Beta.

Answers

Beta is correct cuz it’s new software

Your project requires new software. The IT department is going to research options to identify the best software to work with your project and existing infrastructure. The customer will approve their choice. In your responsibility matrix, which category would you use for the IT department for identifying the software

Answers

In your responsibility matrix, a category which you would use for the IT department in identifying the software is responsible.

What is a software?

A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task and proffer solutions to a particular problem.

In your responsibility matrix, a category which you should use for the IT department in identifying the best software to work with your developed project and existing infrastructure is responsible.

Read more on software here: https://brainly.com/question/26324021

#SPJ1

When charlie attaches a file to an email message, the computer's __________ is responsible for managing his access to the location where the file is stored.

Answers

Answer:Operating system

Explanation:

When charlie attaches a file to an email message, the computer's File Management System is responsible for managing his access to the location where the file is stored. Data files are managed using file management software systems, sometimes known as file managers or file tracking software. Even though it is made to manage individual or group files, including records, office documents, and similar data, its capabilities are somewhat limited.

How files are stored on the computer?

Folders and drives both contain storage for files and folders. A storage device is a piece of equipment that can keep data safe long after the computer has been turned off. Here are a few illustrations of storage units. A device that reads and writes data to the hard disk is a hard disk drive.

For file maintenance (or management) tasks, a file management system is utilized. It is a kind of software that controls how computer systems' data files are organized. A file management system, which is meant to manage individual or group files, such as unique office papers and records, has limited capabilities.

Learn more about File Management systems here:

https://brainly.com/question/13013721

#SPJ2

Consider the following code segment: if(!somethingIsTrue()) return false; else return true; } Which one of the following statements would be an accurate replacement for this code

Answers

Based on the code segment given, the accurate replacement for the code would be C) return somethingIsTrue()

What would replace the code accurately?

The code is a logical comparison code which means that it compares two or more values and returns a result based on if the comparison yields a true or false result.

The code segment,  if(!somethingIsTrue()) return false; else return true; } can be replaced by return somethingIsTrue() where the result would either be true or the value for false which is much like the first code.

Options for this question include:

A) return true;B) return false;C) return somethingIsTrue();D) return !somethingIsTrue();

Find out more on problems regarding code segments at https://brainly.com/question/13506144

#SPJ1

In a DTP project, Fiona is looking for a way to make a page layout attractive to readers. Help Fiona pick the correct word to complete the sentence.
You’ll need a(n) _____ to capture the attention of your audience. It can be an illustration, a photograph, a block of bold text, or a quote in a column of white space.

Answers

You’ll need a(n)  a block of bold text to capture the attention of your audience.

How do you make text bold in pages?

First one need to select Format  and then Font and then Bold.

Note that  by bolding a selected text, it can capture the mind of the people to the page layout.

Hence, You’ll need a(n)  a block of bold text to capture the attention of your audience.

Learn more about  page layout  from

https://brainly.com/question/12129748

#SPJ1

If the timer is started on November 17 at 4:00 pm and stopped three seconds later, what will display under Time elapsed:

Answers

If the timer is started on November 17 the thing that display under Time elapsed is that  seconds is undefined.

Which is an undefined variable?

An undefined variable is known to be a kind of a variable that is often used in a kind of a program that was said to be not previously declared in a source code.

In a lot of programming languages, this can lead to an error. Hence, If the timer is started on November 17 the thing that display under Time elapsed is that  seconds is undefined.

See full question below

Code Example 11-1

from datetime import datetime, time

def main():

input("Press Enter to start...")

start = datetime.now()

month = start.strftime("%B")

day = start.strftime("%d")

hours = start.strftime("%I")

minutes = start.strftime("%M")

am_pm = start.strftime("%p")

print("Start time:",month,day,"at",hours,":",minutes,am_pm)

input("Press Enter to stop...")

stop = datetime.now()

month = stop.strftime("%B")

day = stop.strftime("%d")

hours = stop.strftime("%I")

minutes = stop.strftime("%M")

am_pm = stop.strftime("%p")

print("Stop time: ",month,day,"at",hours,":",minutes,am_pm)

elapsed_time = stop - start

new_days = elapsed_time.days

new_minutes = elapsed_time.seconds // 60

new_hours = new_minutes // 60

new_minutes = new_minutes % 60

print("Time elapsed: ")

if new_days > 0:

print("days:",new_days)

print("hours:", new_hours, ", minutes:", new_minutes)

if __name__ == "__main__":

main()

Refer to Code Example 11-1: If the timer is started on November 17 at 4:00 pm and stopped on November 18 at 6:30 pm, what is the value of seconds at the end of the program?

a. 95400

b. seconds is undefined

c. 1800

d. cannot tell

Learn more about Code from

https://brainly.com/question/22654163

#SPJ1

What will be the available drive space in a raid 5 configured system with 3 250gb hard drives?.

Answers

500 GB will be the available drive space in a raid 5 configured system with 3 250gb hard drives.

How many GB is a gigabyte?

One gigabyte (GB) is known to be one that is made up of about a 1 billion bytes, or we can say that it is made up of 1 thousand megabytes.

Note that a computer is one that can have 4 GB of RAM as well as 16 GB and a gigabyte (GB)  is known to be seen with two hard G's  which is said to be the unit of data storage capacity that is known to be made up of  roughly about to 1 billion bytes.

Hence, based on the above, 500 GB will be the available drive space in a raid 5 configured system with 3 250gb hard drives.

Learn more about gigabytes from

https://brainly.com/question/289615

#SPJ1

To assist a user, a help desk technician is able to take advantage of a Windows proprietary network protocol that allows the technician to open a graphical interface to connect with the user's Windows computer. Which of the following TCP/IP port numbers is the default port used by this protocol

Answers

In order to assist an end user, a help desk technician can use the network protocol with a default TCP/IP port number of 3389.

What is the TCP/IP protocol suite?

The TCP/IP protocol suite is an abbreviation for Transmission Control Protocol and Internet Protocol and it's a standard framework for the transmission (prepare and forward) of information on digital computers over the Internet.

In the Transmission Control Protocol and Internet Protocol (TCP/IP) suite, a help desk technician can use the network protocol with a default TCP/IP port number of 3389 to assist an end user by opening a graphical user interface to connect with the end user's Windows computer.

Read more on TCP here: brainly.com/question/17387945

#SPJ1

Other Questions
In the geometric pattern below, n represents the number of blocks in the bottom row of each figure.n = 1n=2Write a function that models the total number of blocks in terms of n.OA f(1) = 2; f(n) = f(n-1) + 2n; for n 2OB. f(1) = 1; f(n) = f(n-1) + 2n; for n 2Oc f(1) = 1; f(n) = f(n-1) + n; for n 2OD. f(1) = 2; f(n) = f(n-1) + 4n; for n 2n=3 (Table: iPhones) This table shows data for a country producing only iPhones. Its real GDP in 2010 (in 2000 dollars) is: A scientist wants an 81milliliter of saline solution with a concentration of 5% she has concentrations of 3% and 9%. How much of each solution must she use to get the desired concentration What factors significantly affect the overall bandwidth demands of a compressed video flow Describe how the popular music of the 1950's (ie. Country music, jazz and rock and roll) affected to film scores of the time. Use specific examples Please help, I have been struggling with this:A. Complete the following SER sentences using the conjugated verbs given.l ______ de ChileYo ______ bajoUstedes ______ altosEllos ______ inteligentesElla ______ estudianteT ______ mi padreNosotras ______ amigasverbs: soy, es, somos, es, son, son, eresB. Complete the following ESTAR sentences using the conjugated verbs given.l ______ de ChileYo ______ aburridoUstedes ______ enfermosEllas ______ nerviosasElla ______ casadaT ______ cansadoNosotros ______ solterosverbs: est, estoy, estamos, ests, estn, est, estnC. Complete the following sentences using the conjugated verbs given. You also need to add why is that verb and not the other. (10 pts.) Ex. Ellos son de Colombia (nationality)Yo ______ de Costa RicaT ______ en la escuelaEllos ______ bajos y flacosNosotras ______ nerviosa por el examenl ______ un hombreElla ______ casadaCarlos no ______ solteroMi hermano y yo ______ de los EEUUYo no ______ en la casa de mi padreUstedes ______ muy Cmicosverbs: ests, soy, somos, es, estoy, estn, est, eres, estamos, sonA. Complete the following SER sentences using the conjugated verbs given.l ______ de ChileYo ______ bajoUstedes ______ altosEllos ______ inteligentesElla ______ estudianteT ______ mi padreNosotras ______ amigassoy, es, somos, es, son, son, eresB. Complete the following ESTAR sentences using the conjugated verbs given.l ______ de ChileYo ______ aburridoUstedes ______ enfermosEllas ______ nerviosasElla ______ casadaT ______ cansadoNosotros ______ solterosverbs: est, estoy, estamos, ests, estn, est, estnC. Complete the following sentences using the conjugated verbs given. You also need to add why is that verb and not the other. (10 pts.) Ex. Ellos son de Colombia (nationality)Yo ______ de Costa RicaT ______ en la escuelaEllos ______ bajos y flacosNosotras ______ nerviosa por el examenl ______ un hombreElla ______ casadaCarlos no ______ solteroMi hermano y yo ______ de los EEUUYo no ______ en la casa de mi padreUstedes ______ muy Cmicosverbs: ests, soy, somos, es, estoy, estn, est, eres, estamos, son How can you determine where the wavelength released from a transition will fall in the electromagnetic spectrum? The first modern management articles were published in ________ journals. What should be changed to make the following sentence true? "For centuries, psychological disorders were viewed from a natural perspective: attributed to a force beyond scientific understanding." PLEASE ANSWER ASAP What is the solution to the following system of equations? The Conservation Reserve Program pays farmers to ________. grow native crops such as corn and beans experiment growing new varieties of GM crops stop growing tobacco pasture cattle instead of growing crops stop cultivating highly erodible land The number of goldfish in a tank is 22, and the volume of the tank is 56 cubic feet. what is the density of the tank? 0.34 goldfish per cubic foot 0.39 goldfish per cubic foot 1.41 goldfish per cubic foot 2.55 goldfish per cubic foot The Smokey the Bear campaign attempted to suppress and eliminate wildfires from forested areas altogether. Explain how fire suppression can negatively impact the health of a forest ecosystem? Edie's Health Supply has 125,000 shares of stock outstanding with a par value of $1 per share and a market value of $5 a share. The company has retained earnings of $76,500 and capital in excess of par of $340,000. The company just announced a 1-for-5 reverse stock split. What will be the par value per share after the split 3.12.1: LAB: Instrument information (derived classes)class Instrument: def __init__(self, name, manufacturer, year_built, cost): self.name = name self.manufacturer = manufacturer self.year_built = year_built self.cost = cost def print_info(self): print('Instrument Information:') print(' Name:', self.name) print(' Manufacturer:', self.manufacturer) print(' Year built:', self.year_built) print(' Cost:', self.cost)class StringInstrument(Instrument): # TODO: Define constructor with attributes: # name, manufacturer, year_built, cost, num_strings, num_fretsif __name__ == "__main__": instrument_name = input() manufacturer_name = input() year_built = int(input()) cost = int(input()) string_instrument_name = input() string_manufacturer = input() string_year_built = int(input()) string_cost = int(input()) num_strings = int(input()) num_frets = int(input()) my_instrument = Instrument(instrument_name, manufacturer_name, year_built, cost) my_string_instrument = StringInstrument(string_instrument_name, string_manufacturer, string_year_built, string_cost, num_strings, num_frets) my_instrument.print_info() my_string_instrument.print_info() print(' Number of strings:', my_string_instrument.num_strings) print(' Number of frets:', my_string_instrument.num_frets)** I REALLY NEED HELP** What is the old age belief that spirts and forces reside in animals objects or dreams Which of the following sentences should be rewritten in passivevoice?A. The goalie makes a great save!B. Franklin bought a brand new car last week.C. Dr. Bender added sulfur to the mixture.D. I forgot to buy a gift for my grandmother's birthday. non pharmacological interventions for neonatal pain When an event takes place, the control responsible for the event creates an event? what do we call the outer layer of the nucleas?