Answer:
In DBMS, an index is a physical structure that stores the values for a specific column in a table. An index can be used to extract specific information from data and access records within a table more quickly without having to scan the whole table.
An Index can be made up of one or more columns of a table and each index maintains a list of values within that field that are sorted in ascending or descending order. Indexes cannot be seen by the users, but they are just used to speed up the queries and improve the performance of a database application
Hello! So I have been practising some coding, however, there seems to be an error in my code. I have been trying to figure out what is wrong, however, I just can't seem to find it. There is no syntax error but, there seems to be a problem with my input. I am currently using repl.it and I am making a calculator. I would input something like "multiply" however, the calculator would only square. I have tried changing the variables but it just keeps coming back to the first "if" statement. I would appreciate some help.
Answer:
You OR expressions are wrong.
Explanation:
Rather than writing:
if method == "Square" or "square":
You should write:
if method == "Square" or method == "square":
The expression should evaluate to something that is true or false.
In the above case, the expression is method == "Square" or method == "square" which can are actually two sub-expressions with an or in between them:
subexpr1 or subexpr2
each of the sub-expressions should evaluate to true or false.
method == "Square" is one of those sub-expressions.
That is how an expression is broken down by the compiler.
TIP: If you would add method = method.lower() right after the input, you could simplify all the if statements by removing the uppercase variants.
list out various computer generation long with their basic characteristic
Answer:
1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ... 1956 – 1963: Second Generation – Transistors. ... 1964 – 1971: Third Generation – Integrated Circuits. ... 1972 – 2010: Fourth Generation – MicroprocessorsExplanation:
there are 4 generations ok
please mark me as brainlist
It is important to create a strong password because it will
let someone steal your personal information
allow your friends to easily guess it
keep your private information safe and secure
give your computer a virus
Write code to take two words from the user. The program should convert these to lower case, then compare them: printing a positive number if string1 appears after string2 alphabetically, a negative number if string1 appears before string2 alphabetically and zero if the two strings are identical. Make sure your program does not produce any additional numerical output other than this number or it may not be graded correctly.
Answer:
Use compareTo.
Explanation:
import java.util.Scanner;
public class U2_L3_Activity_Three{
public static void main(String[] args){
Scanner scan = new Scanner(System.in);
System.out.println("Enter first word: ");
String word1 = scan.nextLine();
System.out.println("Enter second word: ");
String word2 = scan.nextLine();
//I had to make the string all lowercase or all uppercase for when I did this
word1 = word1.toLowerCase();
word2 = word2.toLowerCase();
System.out.println("Result: " + word1.compareTo(word2));
}
}
Following are the program to converting string value into lowercase and compare with an input string value.
Program Explanation:
Import package.Defining a class Dat.Inside the class defining the main method, and in the method, two string variable "string1, string2" is declared.After input, the value a "toLowerCase" method is used that converts string value into lower case. After converting value into the lower case a "compareTo" method is used that compares value and prints its value.Program:
import java.util.*;//import package for input
public class Dat //defining a Dat
{
public static void main(String[] ax)//main method
{
String string1 ,string2; //defining String variable
Scanner sc = new Scanner(System.in);//creating Scanner class object to input value
System.out.println("Enter values: ");//print message
string1= sc.next();//input value
string2= sc.next();//input value
string1= string1.toLowerCase();//convert string value into LowerCase
string2 = string2.toLowerCase();//convert string value into LowerCase
System.out.println("Result: " + string1.compareTo(string2));//using compareTo method
}
}
Output:
Please find the attached file.
Learn more:
brainly.com/question/15706308
1, How can technology serve to promote or restrict human rights? [2 points]
Answer:
Examples of how technology can be used as a powerful tool for human rights are ever expanding. Newer technologies such as artificial intelligence, automation, and blockchain have the potential to make significant positive contributions to the promotion and protection of human rights.
You are asked to write a program that prompts the user for the size of two integer arrays, user input for the size must not exceed 50, you must validate this. We will use these arrays to represent our sets. These arrays will be randomly populated in the range that is 1 through double the size of the array. So if the array is of size 20, you will randomly populate it with values in the range 1-40 inclusive.
Answer:
In Java:
import java.util.*;
public class MyClass{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Length of array 1: ");
int lent1 = input.nextInt();
while(lent1 <= 0 || lent1 > 50){
System.out.print("Length of array 1: ");
lent1 = input.nextInt();
}
int[] array1 = new int[lent1];
System.out.print("Length of array 2: ");
int lent2 = input.nextInt();
while(lent2 <= 0 || lent2 > 50){
System.out.print("Length of array 2: ");
lent2 = input.nextInt();
}
int[] array2 = new int[lent2];
for(int i =0;i<lent1;i++){
array1[i] = (int)(Math.random() * (lent1*2) + 1);
}
for(int i =0;i<lent2;i++){
array2[i] = (int)(Math.random() * (lent2*2) + 1);
}
System.out.print("Array 1: ");
for(int i =0;i<lent1;i++){
System.out.print(array1[i]+" ");
}
System.out.println("Array 2: ");
for(int i =0;i<lent2;i++){
System.out.print(array2[i]+" ");
}
}
}
Explanation:
This prompts the user for length of the first array
System.out.print("Length of array 1: ");
This declares and gets input for the length of the first array
int lent1 = input.nextInt();
This validates the length of first array
while(lent1 <= 0 || lent1 > 50){
System.out.print("Length of array 1: ");
lent1 = input.nextInt(); }
This declares the first array
int[] array1 = new int[lent1];
This prompts the user for length of the second array
System.out.print("Length of array 2: ");
This declares and gets input for the length of the second array
int lent2 = input.nextInt();
This validates the length of the second array
while(lent2 <= 0 || lent2 > 50){
System.out.print("Length of array 2: ");
lent2 = input.nextInt(); }
This declares the second array
int[] array2 = new int[lent2];
The following generates random integers between 1 and lent1*2 to array 1
for(int i =0;i<lent1;i++){
array1[i] = (int)(Math.random() * (lent1*2) + 1); }
The following generates random integers between 1 and lent2*2 to array 2
for(int i =0;i<lent2;i++){
array2[i] = (int)(Math.random() * (lent2*2) + 1); }
This prints the header Array 1
System.out.print("Array 1: ");
The following iteration prints the content of the first array
for(int i =0;i<lent1;i++){
System.out.print(array1[i]+" ");
}
This prints the header Array 2
System.out.println("Array 2: ");
The following iteration prints the content of the second array
for(int i =0;i<lent2;i++){
System.out.print(array2[i]+" ");
}
Cole has to edit and resize hundreds of photographs for a website. Which Adobe
software program would be the best choice to complete this task?
a.) Animate b.) Dreamweaver c.) Illustrator d.) Photoshop
What does the abbreviation JPEG stand for?
A. Japanese Photographic Examination Group
B. Joint Photo Examination Group
C. Joint Photographic Expert Group
D. Jefferson Photo Exclusive Group
E. Jacket Photo Extension Group
Answer:
c) giant photographic experts group
Answer:
C
Explanation:
(often seen with its file extension stands for
"Joint Photographic Experts Group",
Implement the function permutations() that takes a list lst as input and returns a list of all permutations of lst (so the returned value is a list of lists). Do this recursively as follows: If the input list lst is of size 1 or 0, just return a list containing list lst. Otherwise, make a recursive call on the sublist l[1:] to obtain the list of all permutations of all elements of lst except the first element l[0]. Then, for each such permutation (i.e., list) perm, generate permutations of lst by inserting lst[0] into all possible positions of perm.
>>> permutations([1, 2])
[[1, 2], [2, 1]]
>>> permutations([1, 2, 3])
[[1, 2, 3], [2, 1, 3], [2, 3, 1], [1, 3, 2], [3, 1, 2], [3, 2, 1]]
>>> permutations([1, 2, 3, 4])
[[1, 2, 3, 4], [2, 1, 3, 4], [2, 3, 1, 4], [2, 3, 4, 1],
[1, 3, 2, 4], [3, 1, 2, 4], [3, 2, 1, 4], [3, 2, 4, 1],
[1, 3, 4, 2], [3, 1, 4, 2], [3, 4, 1, 2], [3, 4, 2, 1],
[1, 2, 4, 3], [2, 1, 4, 3], [2, 4, 1, 3], [2, 4, 3, 1],
[1, 4, 2, 3], [4, 1, 2, 3], [4, 2, 1, 3], [4, 2, 3, 1],
[1, 4, 3, 2], [4, 1, 3, 2], [4, 3, 1, 2], [4, 3, 2, 1]]
Answer:
def permutations(myList: list)-> list:
if len(myList) <= 1:
return [myList]
perm = []
for i in range(len(myList)):
item = myList[i]
seglists = myList[:i] + myList[i+1:]
for num in permutations(seglists):
perm.append([item] + num)
return perm
data = [1,2,3]
result = permutations(data)
print(result)
Explanation:
The program defines a python function that returns the list of permutations. The program checks if the length of the input list is less than or equal to one. The function declaration identifies the input and output as lists.
The for loop iterate through the list and the permutations are saved in an empty list in the next loop statement. At the end of the program, the list of lists is returned.
Do you think it's easier to be mean online than offline? why?
Answer:
Yes because on online we can talk all we want and they don't know us irl so it's funny lol
Explanation:
I have a question about this programming assignment. The outcome when the user puts in Taylor for guest one and Fernando for guest 2 should be, "Your party is ruined and another bad pop song will be written." However, it does not. What do I add to get this outcome? Do I need more brackets?
Use guestNumber1.equals(Fernando) instead of the double equal signs. You cant compare strings with ==
Use EBNF notation to describe the syntax of the following language constructs.
A. A Java return statement, which could be either a return keyword followed by a semicolon, or a return keyword followed an expression then followed by a semicolon. Assume the grammar for expression has been defined as expr-> e
B. A Python return statement, either a return keyword, or return one or more expressions separated by comma.
C. Based on your syntax definition in (b), is return x+y; a valid Python return statement?
Answer:
Following are the description to the given points:
Explanation:
To resolve basic design restrictions, EBNF has also been developed.This principle was its lack of support can identify repeatings easily. It implies that popular BNF models, like the description of a sequence of replicable elements, are complicated and rely on contra intuitive logical math.
To set a list of words divided by commas (e.g. john, coffee, logic) for instance, we would like to say something like "a list is a word accompanied by a few commas or terms." Through EBNF, they may say so. However, there have been no "many" alternatives in the standard BNF format. So, to describe something such as "a list is a term or a number accompanied by a pair with notation and script," you have to say the same thing. Which functions, although it is difficult, as it specifies a variety of lists instead of a specific list.
Essentially, "john, coffee, logic is John's list, accompanied by coffees or, and logic" would be the earlier link. That's why in Option (a):
The return statement in Java is:
return ('”‘ (~[“] | ” [”e‘])*);
In option (c), it is the valid statement.
when working with smart which tab would provide the ability to change the shape or size of the smart art shapes
Answer:
B) Format
Explanation:
. A digital computer has a memory unit with 24 bits per word. The instruction set consists of 150 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.
a) How many bits are needed for the opcode?
b) How many bits are left for the address part of the instruction?
c) What is the maximum allowable size for memory?
d) What is the largest unsigned binary number that can be accommodated in one word of memory?
Explanation:
d answer
gzjxubejeiizbtozueg
Q3: Create a class called Employee that includes three instance variables—a first name (typeString), a last name (type String) and a monthly salary (double). Provide a constructor that initializesthe three instance variables. Provide a set and a get method for each instance variable. If the monthly salary is not positive, do not set its value. {Do not write a full program, only a class}
Answer:
Follows are the code to the given question:
public class Employee //defining a class Employee
{
String first_name,last_name;
Double monthly_salary;
Employee(String first_name,String last_name,Double monthly_salary)
{
this first_name=f_name// initialize value in first_name
this last_name = l_name; // initialize value in the last_name
this monthly_salary = m_salary; // initialize value in the monthly_salary
if (monthly_salary < 0.0)//use if to check monthly_salary is positive
monthly_salary = 0.0;//set value 0
}
void setfirst_name (String f_name)//defining set method to store first_name
{
first_name = f_name; //holding the value of first_name
}
public String getfirst_name ()//defining get method to return first_name
{
return first_name;//return first_name
}
public void setlast_name (String l_name)//defining set method to store last_name
{
last_name = l_name; // holding the value of the last_name
}
public String getlast_name ()//defining get method to return last_name
{
return last_name;//return last_name
}
public void setmonthly_salary(double m_salary)//defining set method to store monthly_salary
{
monthly_salary = m_salary; // holding the value of the monthly_salary
}
public double getmonthly_salary ()//defining get method to return monthly_salary
{
return monthly_salary;//return monthly_salary
}
}
Explanation:
In this code, a class "Employee" is declared that defines two string variables "first_name,last_name", and one double variable "monthly_salary". In the next step, a parameterized constructor is defined that stores the value into the variable, and use if block to check "monthly_salary" is a positive. It also uses the getter and setter method to hold and return its value.
Lets say if my computer shut down every 10 minutes. What can you do to solve the problem. Hint: Use these word in you answer: handy man, restart, shut down, call, and thank you.
Answer:
You should restart your computer
Answer:
You could call a handy man to take a look at your computer if you are having drastic issues. You could also restart or shut down you computer a few times because it might need a massive update. You might need to call the company you bought your computer from and ask about what to do when that problem is happening. Thank you for reading my answer!
Explanation:
I think these answers make since.
starting a computer or computer embedded devices is called
Answer:
Booting
Explanation:
starting a computer is called booting. In addition restarting is known as rebooting.
can anyone teach me the basics of lua scripts 50 points
like how do i tell lua to move a object or send me a prompt asking me to do something
Answer:
are you talking about about a game, or coding?
Write a SELECT statement that returns three columns: VendorName from Vendors table, DefaultAccount No from Vendors table, AccountDescription from Invoice table. The result set should have one row for each vendor, with the account number and account description for that vendor’s default account number. Sort the result set by AccountDescription, then by VendorName
Answer:
SELECT VendorName, InvoiceNumber, InvoiceDate,
InvoiceTotal - PaymentTotal - CreditTotal AS Balance
FROM Vendors JOIN Invoices
ON Vendors.VendorID = Invoices.VendorID
WHERE InvoiceTotal - PaymentTotal - CreditTotal > 0
ORDER BY VendorName;
Answer:
C
Explanation:
We are supposed to go to the concert tomorrow, but it has been raining for three days straight. I just know that we won’t be able to go.
7. What is the author’s tone?
Its the worried tone
Hope this helps!
There Will Come Soft Rains is a warning story about nuclear war and how, in the end, technology won't keep us safe. In response to the atomic bombings of Hiroshima and Nagasaki, Bradbury penned the tale.
What author’s worried tone indicate about rain?Ray Bradbury wrote the classic science fiction short tale “There Will Come Soft Rains” in 1950. The narrative is narrated in a detached, emotionless tone, as though the events that are taking place are a normal part of everyday life.
The story's meaning can be found in the story's complete lack of human beings, not even corpses.
Soft rain rays will appear in the short story. Bradbury creates a disorganized, somewhat post-apocalyptic atmosphere. To better understand the zeitgeist of the world, he employs a variety of literary techniques.
Therefore, It's the worried tone author’s.
Learn more about author’s here:
https://brainly.com/question/1308695
#SPJ5
Write a SELECT statement that returns one row for each customer that has orders with these columns: The email_address from the Customers table
A count of the number of orders
The total amount for each order
(Hint: First, subtract the discount amount from the price. Then, multiply by the quantity.) Return only those rows where the customer has more than 1 order. Sort the result set in descending sequence by the total amount . Hint: You will join three tables together. Returns 3rows of data.
Questions done up until #4: https://pastebin.com/LwSKknPi
all questions before and after:
Write a SELECT statement that returns these columns:
The count of the number of orders in the Orders table
The sum of the tax_amount columns in the Orders table
Returns 1 row of data.
Write a SELECT statement that returns one row for each category that has products with these columns:
The category_name column from the Categories table
The count of the products in the Products table
The list price of the most expensive product in the Products table
Sort the result set so the category with the most products appears first.
Hint: You will join two tables together. Returns 3 rows of data.
Write a SELECT statement that returns one row for each customer that has orders with these columns:
The email_address column from the Customers table
The sum of the item price in the Order_Items table multiplied by the quantity in the Order_Items table
The sum of the discount amount column in the Order_Items table multiplied by the quantity in the Order_Items table
Sort the result set in descending sequence by the item price total for each customer.
Hint: You will join three tables together. Returns 7 rows of data.
Modify the solution to exercise 4 so it only counts and totals line items that have an item_price value that’s greater than 400. Returns 2 rows of data.
Write a SELECT statement that answers this question: What is the total amount ordered for each product? Return these columns:
The product name from the Products table
The total amount for each product in the Order_Items (Hint: You can calculate the total amount by subtracting the discount amount from the item price and then multiplying it by the quantity)
Use the WITH ROLLUP operator to include a row that gives the grand total.
Hint: You will join two tables together. Returns 10 rows of data.
Write a SELECT statement that answers this question: Which customers have ordered more than one product? Return these columns:
The email address from the Customers table
The count of distinct products from the customer’s orders
Hint: You will join three tables together. . Returns 3 rows of
Answer:
Please find the attachment files of the queries:
Explanation:
In the all queries the select statement is used that selects the defined columns and use the function like sum, join, orderby, and groupby to perform the various operations, in which the sum is used to add columns or rows values, join is used for joining two or more tables, and orderby is used for return the table into ascending or descending order, and groupby is used for the count the value, calculate average and perform other operation and gives its return value.
Name the eight areas in which computers are used.
1.
2.
3.
4.
5.
6.
7
8.
s Review (Page 121
Answer:
pakistan
india
usa
china
uk
afghanistan
iran
iraq
israel
Consider the security of a mobile device you use
(a) Explain how transitive trust applies to your use of an operating system on a
mobile device (e.g. smartphone). Then, explain how an attacker can exploit this
transitive trust to violate the CIA properties of the software and data on your
device
Answer:
keep it private
Explanation:
In Linux, users are internally represented using a unique number called user ID or uid.
a. True
b. False
Answer:
a. True
Explanation:
An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.
This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.
Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.
In Linux, users are internally represented using a unique number called user ID or UID. Thus, this unique number serves as an internal identifier in the Linux Kernel and as such determines what system resources may be accessible to each user. Oftentimes, these unique numbers are not put into use but rather a name is linked with the number and are used instead.
Also, users can be organized logically into a group and are represented uniquely with a group ID or GID, which serves as a global identifier for the users.
Which of the following algorithms is the same as the flowchart shown below?
Start
mylum - RANDOM(1,10)
false
DISPLAY("Done
DISPLAY()
O Amylum - RANDOM (1, 19)
IF (byllum > 8)
(
DISPLAY("Done")
ELSE
(
DISPLAY(myNum)
}
OB. myllum - RANDOM(1, 18)
REPEAT UNTIL (byllum > 8)
{
DISPLAY(myNum)
myllum - RANDOM(1,18)
}
DISPLAY("Done")
Octylum - RANDOM(1, 18)
IF (myllum < 8)
{
DISPLAY("Done")
ELSE
{
DISPLAY(myllum)
)
O D. myllum - RANDOM(1, 18)
REPEAT UNTIL (myNun > 8)
{
DISPLAY("Done")
DISPLAY(byllum)
Answer:
choice b
Explanation:
The algorithms are the same as the flowchart shown below is myllum - RANDOM(1, 18), REPEAT UNTIL (byllum > 8) { DISPLAY(myNum)myllum - RANDOM(1,18)} DISPLAY("Done"). The correct option is B.
What is an algorithm?The definition of algorithms in computer science. An algorithm is a list of instructions used in computer science to solve problems or carry out activities based on knowledge of potential solutions.
Think of a "black box," or a container where nobody can see what is occurring within. The box accepts our input and produces the output we require, but the process by which input is transformed into the intended output—and which we may need to understand—is an ALGORITHM.
Therefore, the correct option is B. myllum - RANDOM(1, 18)REPEAT UNTIL (byllum > 8){DISPLAY(myNum)myllum - RANDOM(1,18)}DISPLAY("Done").
To learn more about an algorithm, refer to the link:
https://brainly.com/question/22984934
#SPJ5
What are the three types of networks?
A) Internet, PowerPoint, Excel
B) Internet, LAD, WAN
C) Internet, WAN, LAN
D) None of the above
Answer:
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Wide area network (WAN)
(So C, I'm pretty sure.)
Answer:
LAN,MAN,WANExplanation:
are the three types of networkThe components of hardware include:
A) Monitor, CPU, Disk Drives, Printer, Keyboard/Mouse
B) Monitor, CPU, Disk Drives, Touch Screen, Keyboard/Mouse
C) Monitor, CPU, Software, Printer, Keyboard/Mouse
D) None of the above
Answer:
A
Explanation:
Monitor, CPU, Disk Drives, Printer, Keyboard/mouse
Answer:
B.monitor,cpu,disk drives,touch screen,keyboard/Mouse
the _ and _ services help us to keep in touch with our family and friends
Answer:
Internet and communication technology
full meaning of ENDVAC
Answer:
EDVAC was one of the earliest electronic computers. Unlike its predecessor the ENIAC, it was binary rather than decimal, and was designed to be a stored-program computer. ENIAC inventors John Mauchly and J. Presper Eckert proposed the EDVAC's construction in August 1944.
Explanation:
Here is the full meaning
Write a print statement that uses an f-string to output $5,242.83
Answer:
print("${:,.2f}".format(5242.83))
Explanation:
Given
$5,242.83
Required
Use an f string to output the above
The syntax of an f-string to format a number in that regard is: "${:,.2f}".format(number)
$ means that a dollar sign be printed before the required number
., means that the number be separated with commas
2f means that the number be presented in 2 decimal places
So:
"${:,.2f}".format(number) becomes
"${:,.2f}".format(5242.83)
In a print statement, the full instruction is:
print("${:,.2f}".format(5242.83))