Answer:
The queries for each question are explained.
1. Find the sids and snames of students who took "Database" course (i.e., cname = ‘Database’) in Fall 2019.
The columns sid and sname are taken from students table.
The course name belong to the courses table.
The semester and year belong to the grades table.
To get the final query, all these tables need to be joined in the FROM clause using JOIN ON keywords.
select s.sid, sname
from students s join grades g on g.sid = s.sid
join courses c on g.cid = c.cid
where cname like 'database%'
and semester like 'Fall'
and year=2019
2. Find the average grade of all the students who took "CS327" (i.e., cid=‘CS327’) in Fall 2019. You can assume grade is a numerical attribute.
The grade column is taken from grades table.
The course id belongs to the grades table.
The semester and year also belong to the grades table.
The final query is formed using the grades table only.
select avg(grade)
from grades
where cid like 'CS327'
and semester like 'Fall'
and year=2019
3. Find the number of distinct courses offered by each department in Fall 2019.
The department id belongs to the courses table.
The course id belongs to the grades table.
The semester and year also belong to the grades table.
To get the final query, the courses and the grades tables are joined in the FROM clause using JOIN ON keywords.
select dept_id, count(distinct g.cid)
from courses c join grades g on c.cid = g.cid
where semester like 'Fall'
and year=2019
group by dept_id
The intent of a Do query is to accomplish a goal or engage in an activity on a phone.
False. The intent of a Do query is to accomplish a goal or engage in an activity on a phone.
The intent of a Do queryA computer query is a request for information or data made to a computer system or a database. It involves specifying specific criteria or conditions to retrieve relevant information from a database or perform a specific action.
Queries are commonly used in database management systems, where they allow users to search, filter, and sort data based on specific criteria. A query typically consists of a structured query language (SQL) statement that defines the desired data and any conditions or constraints to be applied.
Read mroe on query here query
#SPJ1
The index used by the OS to manage computer files is called _____.
RAM
API
GUI
FAT
Answer:
GUI
Explanation:
Answer:
FAT
Explanation:
Hope this helps!!!
Which of the following vendors offers the largest variety of editions for its operating system?
Answer:
Microsoft Windows offers the largest variety of editions for its operating system.
You need to deploy virtual machines in the cloud to support big data processing. The virtual machines must not be reachable from the Internet. Data processing summaries will be uploaded from the virtual machines to an on-premises database server. The on-premises network is already configured to allow incoming connections from the Internet. What should you do to allow the required functionality while maximizing security
On-site servers have virtualization deployed. A server is essentially running in your own server on your own premises when you virtualize it. Your establishment's server.
What virtual machines to an on-premises database server?It is possible to host solutions either on-premises (private cloud), on the public cloud (such as AWS, Azure, or Rackspace). Or with a combination of both, which is known as the hybrid cloud, thanks to the flexibility given by various virtualization solutions.
Therefore, You enter, launch virtualization on it, and create as many sessions on that system as you desire or are able.
Learn more about virtual machines here:
https://brainly.com/question/29535108
#SPJ1
RAM requires a power source to store data.
Question 10 options:
True
False
RAM is a type of memory which requires a power source to store data is referred to as a true statement.
What is RAM?This is referred to as Random Access Memory and is a volatile memory which is used in the storage of working data and machine codes.
This type of memory requires a power source for the data to be retrieved or stored at that point in time which is why True was chosen as the most appropriate choice in this context.
Read more about RAM here https://brainly.com/question/13748829
#SPJ1
Answer:
true
Explanation:
took test
Reynold is writing a news story about the government handling a health epidemic. He reads a report from a different news organization to use as a reference. His deadline for the story is coming up soon, so Reynold heavily paraphrases parts from the other organization's report to help him write. While Reynold's story also includes some of the same quotes as the other report, he forgets to attribute the sources at the end. Reynold says that since no one can copyright the facts of world news, he is not plagiarizing.
a) What unethical or illegal actions has Reynold taken in writing his news article? (3 points)
b) What kind of consequences might result from Reynold's actions? (2 points)
Answer:
1. He was plagiarizing
2. He might get sued, bad reputation, and he might get fired.
Explanation:
If he Paraphrasing from something online and doesn't cite the website he is plagiarizing.
Question #9
Long Text (essay)
Consider what you have learned about Internet regulation and deregulation. Take a position and argue for or
against regulating the use of the Internet. Your answer should be at least 150 words.
B. IU 13 á
I
< PREVIOUS
O Word(s)
NEXT >
SA
Answer: Check Below
Explanation:
The internet is a vital tool for communication, commerce, and entertainment, but it is not without its downsides. The internet can be used to spread false information, cyberbully, and promote illegal activity. This is why there has been a growing call for the regulation of the internet to curb these negative effects. While there are some who argue that regulating the internet would infringe on free speech, there are many benefits to regulating internet use.
One of the main benefits of regulating the internet is that it can help prevent cyberbullying and other forms of online harassment. By requiring social media companies to monitor and remove harmful content, the internet can be a safer space for everyone. Regulating the internet can also help prevent the spread of fake news and misinformation, which has become a significant problem in recent years. By holding websites accountable for the content they host, we can prevent the spread of propaganda and conspiracy theories that harm public health and democratic institutions.
Another benefit of regulating the internet is that it can help protect children from online predators and inappropriate content. By requiring age verification and limiting access to certain sites, we can ensure that children are not exposed to harmful content. Regulating the internet can also help prevent illegal activities like piracy and online scams. By holding websites and individuals accountable for these crimes, we can protect consumers and prevent economic harm.
In conclusion, while there are concerns about infringing on free speech, there are many benefits to regulating the internet. By preventing cyberbullying, limiting the spread of fake news, protecting children, and preventing illegal activities, we can create a safer and more secure internet for everyone to use. The regulation of the internet is not a perfect solution, but it is an important step towards ensuring that the internet remains a valuable resource for communication and commerce while protecting individuals and society as a whole.
Name a wireless technology tat may work with one device and not another?
Answer:
WPAN/Bluetooth, Coexistence, High Rate WPAN, Low Rate WPAN, mesh Networking, Body Area Networks, and Visible Light Communication.
A web administrator notices a few security vulnerabilities that need to be addressed on the company Intranet site. The portal must force a secure browsing connection, mitigate script injection, and prevent caching on shared client devices. Determine the secure options to set on the web server's response headers.
Answer: Set a Cache-Control header to 0 to prevent caching on client browsers. Set a Strict-Transport-Security header to 31536000 (1 year) to force the client to remember to only connect to the server with HTTP(S) secure. Lastly, set a Content Security Policy(CSP) HTTP header to tell the client what sources it can load scripts or images from and how to handle the execution of JS that is on the page which can allow to mitigate script injection.
Explanation:
Cache-Control is a server response header that controls how long a browser should have cache for before it becomes stale. Setting it 0 tells the browser that it should never cache.
Strict-Transport-Security is a server response header that tells the client that after the first initial visit; that the browser should remember to only connect to it via HTTPS for the time that was set by header.
Content Security Policy (CSP) is a policy and also a header that can be in the response of a server that explains to the browser the limitations of content that can be loaded. Examples include: images, videos, JS sources, etc. The policy can also tell the browser that only an ad analytics software should be the only script that can run thus mitigating any other scripts that may be injected onto the site.
which one is exit controllefd loop ?
1.while loop
2. for loop
3. do loop
4. none
Answer:
2 is the ans
Explanation:
bye bye, gonna go to studyy
Choose the correct option.
Which of the following infection types can send information on how you use your computer
to a third party without you realizing it?
Spyware accumulates your personal information and passes it on to curious third parties without your knowledge or consent.
Spyware is also learned for installing Trojan viruses.
What is spyware?
Spyware is a type of malicious software or malware that is established on a computing device without the end user's knowledge. It plagues the device, steals exposed information and internet usage data, and relays it to advertisers, data firms, or external users.
How do hackers utilize spyware?
Spyware monitors and logs computer use and activity. It celebrates the user's behavior and finds vulnerabilities that allows the hacker to see data and other personal details that you'd normally consider confidential or sensitive.
To learn more about Spyware, refer
https://brainly.com/question/7126046
#SPJ9
Which of the following is a positional argument?
a) ABOVE
b) MIN
c) AVERAGE
d) MAX
why computer known as tool of information
Answer:
because it has the ability to capture the whole information you need or downloaded
What is one lighting technique that is used to simulate a strong sun?
Answer:
Heat lamp.
Explanation:
Like the sun, a heat lamp gives off light and heat, mimicking the actions of a sun. To simulate a strong sun, turn the heat lamp up higher to create brighter light and warmer heat.
Hope this helps!
Online education students need to be taught
the reasons why they should be ethical
how to be friends with their instructors
how to waive their right to privacy
how to communicate professionally
how to commit academic fraud
Online education is a teaching practice delivered through the internet. The students learning from online platforms must be taught to be ethical.
What is the importance of ethics and integrity?In the online education system, the students should learn to be ethical and integral as it enables the students and their teachers to be creative, free to create ideas, and acknowledge others' work.
Ethics teaches the students to develop their personalities and behavior. Students' integrity allows them to be honest, responsible, and fair towards their work and instructor.
Therefore, option A. online learning students must be taught to be ethical.
Learn more about online learning here:
https://brainly.com/question/14708323
#SPJ1
Answer:
-the reasons why they should be ethical
-how to communicate professionally
Explanation:
Use the drop-down menus to complete statements about how to use the database documenter
options for 2: Home crate external data database tools
options for 3: reports analyze relationships documentation
options for 5: end finish ok run
To use the database documenter, follow these steps -
2: Select "Database Tools" from the dropdown menu.3: Choose "Analyze" from the dropdown menu.5: Click on "OK" to run the documenter and generate the desired reports and documentation.How is this so?This is the suggested sequence of steps to use the database documenter based on the given options.
By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.
Learn more about database documenter at:
https://brainly.com/question/31450253
#SPJ1
Describe the certifications developed by SANS. How are they different from InfoSec certifications like CISSP and SSCP?
Answer:
The certification developed by the SANS is GIAC certification .In this there are 3 certification GSEC,GISF and GCED .The description of these certification is given below .
Explanation:
The GIAC certification course is providing the knowledge of the security like cryptography ,networkig knowledge etc .
GSEC:The GSEC Certification is the certification of the security.It simply means this certification certified about the security risk in the computer system .
GISF: This certification gives the knowledge of the networking as well as the security in the computer system also it gives the knowledge of the cryptography.
GCED :This certification is also providing the knowledge of security as well as networking.
Difference between GIAC and InfoSec certifications is given below
The SANS certification is giving the knowledge about the security risk as well as cryptography by the professional where as the InfoSec certifications providing the knowledge of the hacking by the professional .The SANS is including the certification of GIAC certification where as the InfoSec certifications is including the CISSP and SSCP certification .A sandbox is known as a holding area for website or .
Answer:
blog
Explanation:
some context free languages are undecidable
how convert ac to dc in computer
The same way anything converts AC to DC. It rectifies it and smooths the ripple using diodes and capacitor(s).
G00gle DC rectifier.
you need to determine the hash file of several files that you will be sending to a u.s. government agency. you need to use a hash function that is approved. which algorithm should you use?
If one needs to determine the hash file of several files that are to be sent to a U.S. government agency. The authorized hash functions that can be used are:
SHA-1 (Secure Hash Algorithm-1), and the. SHA-2 family of hash algorithms: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256.
When you hash a message, you take any length string of data as input and run it through a mathematical method that produces an output of a set length.
Some hashing algorithms divide the original data input into smaller chunks of equal size. If there isn't enough data in any of the blocks to fill it up, padding (1s and 0s) can be used to fill it out. The separate blocks of data are then passed through a hashing algorithm, which produces a hash value as an output.
Learn more about Hash Functions:
https://brainly.com/question/13106914
#SPJ1
Write short notes on the different elements of a multimedia.
Answer:
There are five basic elements of multimedia: text, images, audio, video and animation. Example - Text in fax, Photographic images, Geographic information system maps, Voice commands, Audio messages, Music, Graphics, Moving graphics animation, Full-motion stored and live video, Holographic image
(◔‿◔)(◔‿◔)(◔‿◔)
Audio: alludes to a sound or spoken content, including music, exchange, and audio effects.
Video: alludes to a moving visual substance, including true to life film, movement, and embellishments.
Text: alludes to composed or composed content, including inscriptions, captions, and composed portrayals.
Images: alludes to static visual substance, including photos, representations, and illustrations.
Interactive elements: alludes to components that permit the client to cooperate with the media, like buttons, connections, and route menus.
Animation: alludes to the utilization of moving pictures and designs to make the deception of movement.
Hypertext: alludes to the utilization of connections inside the media that permit the client to explore to other sight and sound or website pages.
Streaming Technology: alludes to innovation that permits mixed media to be played progressively over the web without the need to download the whole document.
These components can be utilized in different blends to make a media piece that is connecting with, educational and intelligent.
Could anyone help :)
Answer:
2
Explanation:
This code segment iterates through the array checks to see if each element equals y if so, increments the counter variable count
Essentially, this code is taking in two parameters an array x and an integer y and counting the number of times y appears in the array x
look(numList, 1) counts the number of times the integer 1 appears in numList
1 appears two times and therefore 2 is the value returned by the function and therefore the answer
Cryptography is an example of which part of the CIA triad?
Availability
Confidentiality
Integrity
Truthfulness
Cryptography is an example of ensuring Confidentiality in the CIA triad. (Option B)
How is this so?Cryptography is an essentialcomponent of ensuring Confidentiality within the CIA triad.
It involves the use of encryption techniques to protect sensitive information from unauthorized access.
By converting data into an unreadable format, cryptography ensures that only authorized individuals with the necessary decryption keys can access and understand the information,preserving its confidentiality and preventing unauthorized disclosure.
Learn more about Cryptography at:
https://brainly.com/question/88001
#SPJ1
3. A year contains 365 days normally, so on
what number day does Christmas fall on?
Answer:
359 is December 25 in a 365 day year.
Explanation:
Answer:
For western christian churches, Christmas day always occurs on December 25, though some cultures observe the main celebration on the night prior, Christmas Eve.
What software programming language was first
used to power the Internet (.com, .net)?
Answer:
the answer should be .com, because the very first domain was Symbolics.com
Explanation:
hope this helps, have a great day.
Can someone please help me figure this out and let me know what I'm missing. It is on CodeHs and it's 1.3.8 Freely Falling Bodies
The code is in Java.
It calculates the height and velocity of a dropped pebble using the given formulas.
Comments are used to explain the each line.
//FallingBodies.java
public class FallingBodies
{
public static void main(String[] args) {
//Declare the g as a constant
final double g = 9.8;
//Declare the other variables
double t, height, velocity;
//Set the time
t = 23;
//Calculate the height using the given formula
height = 0.5 * g * t * t;
//Calculate the velocity using the given formula
velocity = g * t;
//Print the height and velocity
System.out.println("The height is " + height + " m");
System.out.println("The velocity is " + velocity + " m/s");
}
}
You may read more about Java in the following link:
brainly.com/question/13153130
The small flash memory used in
protable device like Laptop
Answer: flash drive
Explanation:
Flash drives are refered to as small, portable storage devices which makes use of a USB interface in order to be connected to a laptop.
Flash cards are removable and rewritable. They are mainly used to store data. Flash cards can be found in computers, laptops, digital cameras etc.
You would like the cell reference in a formula to remain the same when you copy
it from cell A9 to cell B9. This is called a/an _______ cell reference.
a) absolute
b) active
c) mixed
d) relative
Answer:
The answer is:
A) Absolute cell reference
Explanation:
An absolute cell reference is used in Excel when you want to keep a specific cell reference constant in a formula, regardless of where the formula is copied. Absolute cell references in a formula are identified by the dollar sign ($) before the column letter and row number.
Hope this helped you!! Have a good day/night!!
Answer:
A is the right option absoluteAssignment
Write a assembly program that can display the following shapes:
Rectangle
Triangle
Diamond
The program will read an input from the user. The input is terminated with a period. So the program will continue to run until a period is read.
The data the program reads is as follows:
A shape command followed by parameters.
R stands for Rectangle. The parameters are height (rows) and width (columns)
T stands for Triangle. The parameters is base width
D stands for Diamond. The parameters
Your program needs to read the input and based on the input do the following:
Print your name
Then print the name of the shape
Then the shape below it.
Sample input:
R 03 10
T 05
D 11
.
Output:
Loay Alnaji
Rectangle
**********
**********
**********
Triangle
*
***
*****
Diamond
*
***
*****
*******
*********
***********
*********
*******
*****
***
*
Requirements
Your main should only be the driver. It should only read the "shape type", based on that, call the proper function to read the parameters and draw the shape.
Example of your main (just example, pseudocode):
loop:
read shape
if shape is '.' then exit
if shape is 'R'
call Rectangle Function
if shape is 'D'
call Diamond Function
if shape is 'T'
Call Triangle Function
go to loop
The program above is one that begins with the _begin name, which is the passage point of the program.
What is the program about?The program uses framework call int 0x80 to print your title on the screen utilizing the compose framework call. It loads the suitable values into the registers (eax, ebx, ecx, edx) to indicate the framework call number, record descriptor, buffer address (where the title is put away), and length of the title.
It checks in case the shape input may be a period (.), which demonstrates the conclusion of input. In case so, it bounced to the exit name to exit the program.
Learn more about program from
https://brainly.com/question/23275071
#SPJ1