pete has created a database for employee management. the database has a table named employees. he wants to store the salary information for each employee. the database should also store salary history. how will he design the database so that he can query the last increment given to a particular employee?

Answers

Answer 1

To design the database in a way that enables Pete to query the last increment given to a particular employee, he can create two tables: one for the employee information and another for the salary history.

The employee table would contain the employee's unique identifier, name, contact information, and other relevant details. Meanwhile, the salary history table would store data on the employee's salary increments over time, including the date of each increment, the amount of the increment, and any other relevant details.

To ensure that the salary history table can be queried to retrieve the last increment given to an employee, the table can be sorted in descending order based on the date of each increment. Pete can then use a simple SQL query to retrieve the most recent salary increment for a particular employee by filtering the salary history table based on the employee's unique identifier and selecting the top row. By designing the database in this way, Pete can easily track and manage employee salaries and retrieve important information as needed.

To know more about database visit:

https://brainly.com/question/30163202

#SPJ11


Related Questions

If you want to be able to power up a computer remotely, what feature should you use?

QoS
RDP
RemoteApp
Wake-on LAN

Answers

Use the Wake-on-LAN capability if you wish to be capable of turning on a computer remotely.

There is no installed local wake-up feature for Remote Desktop.

How can my pc be woken up remotely?

Create a Remote Interface and Wirelessly Wake the Desktop.

Give your machine a static IP address.

Set up your router's port scanning so that it sends Port 9 to your PC's new fixed IP address.

1) Open the BIOS of your PC and enable WOL (Wake on LAN).

2) Modify the dip switches for your ethernet adapter in

3) Windows to permit the PC to be awakened.

4) Configure a third-party IP DNS service (if your ISP does not give you a static IP).

5) Select an approach for sending Magic Packets.

6) Select a remote data link.

To know more about ethernet click here

brainly.com/question/13441312

#SPJ4

.

Lori wants to set up a SOHO network in her apartment. The apartment comes with a Gigabit Ethernet network already installed. Lori's notebook computer has an integrated wireless network adapter. Her printer has an Ethernet card, but is not wireless enabled. Your task is to select the appropriate devices and cables (without spending more than necessary) to set up a network that provides wireless access for Lori's laptop and wired access for her printer.

Match the labels for the components on the left to the locations where they need to be installed in Lori's home office on the right.

Lori wants to set up a SOHO network in her apartment. The apartment comes with a Gigabit Ethernet network
Lori wants to set up a SOHO network in her apartment. The apartment comes with a Gigabit Ethernet network

Answers

hi there!

Answer:

1. cat6 cable

2. wireless ethernet router

3. cat5e cable

Explanation:

1. you need a cat6 cable to be capable to deliver the gigabyte ethernet data to the network device.

2. you need a wireless device to provide wireless connection to her notebook.

3. for a printer no cat6 is necessary you can use cat5e cable and it will be enough.

hope this helps.

Connection to the gigabit ethernet network must be done with Cat6 Cable. Using the wireless ethernet router as the network device and connecting the cable to the printer must be done with Cat5e Cable.

We can arrive at this answer because:

The Cat6 Cable will be responsible for establishing a bridge between the gigabyte Ethernet and the network device, allowing data delivery to be made between the two systems.This connection must be made with a wireless device, to keep it more stabilized and it needs, mainly, for the notebook to receive the internet signal. This will be done using the wireless ethernet router.The printer needs a softer, less rigid connection, so a Cat5e cable will be a convenient option.

In this case, we can see that using these devices will allow Lori to have a more stable and efficient connection to meet her needs.

More information on network connection at the link:

https://brainly.com/question/8118353

Please help! Why is my windows homepage like this with no desktop pictures for apps? It has like a mail logo for everything. How do I fix it?

Please help! Why is my windows homepage like this with no desktop pictures for apps? It has like a mail

Answers

is your computer able to flip into tablet mode?? if not try restarting it and clearing all tabs

What is more important, the individual or the collective (the group)? Why?
Least 2 paragraphs

Answers

Answer:

It's complicated.

Explanation:

I don't want to write the entire thing for you. However, there are multiple ways to think about this. Individualism vs. collectivism (groupthink) is a big debate itself.

---

Couple of points for the individual:

- Choice of personal freedom

- Not overly complicated (focuses on the self)

- The needs of the self comes before the needs of the many (in some situations, this might prove helpful)

Couple of points for the group:

- Shared thoughts and feelings may result in a bigger camaraderie than the thoughts of the self

- Compassion for humanity vs. selfishness

- A tendency to forge alliances

---

Interpret these for yourself. One's own mind is crucial in understanding the philosophical structures of life's biggest questions. And for it only being 2 paragraphs. Like, isn't that 10 sentences? I don't know what your teacher is looking for but your own personal thoughts on the matter may be good writing.

---

Here's a very-hard-to-see-the-text-but-helpful website, from the City University of New York (this talks about the theories of the individual and group interest in relation to government, but it may provide useful to you in understanding): https://www.qcc.cuny.edu/socialsciences/ppecorino/intro_text/Chapter%2010%20Political%20Philosophy/Group_vs_Individual_Interest.htm

What is a semiconductor

Answers

A semiconductor material has an electrical conductivity value falling between that of a conductor, such as metallic copper, and an insulator, such as glass. Its resistivity falls as its temperature rises; metals behave in the opposite way. I hope this helps and have a great day! (Also brainliest would be appreciated but you don’t have to) :)

Answer:

Explanation:

Semiconductors are materials which have a conductivity between conductors  and nonconductors or insulators.

Semiconductors can be pure elements

Which system is preferred for 802.11 WLANs that operate at speeds in excess of 11 Mbps? a) 802.11b b) 802.11g c) 802.11n d) 802.11ac

Answers

The system that is preferred for 802.11 WLANs that operate at speeds in excess of 11 Mbps is the 802.11n system (option c).

This system uses multiple antennas to increase both the range and speed of the wireless network. It also operates on both the 2.4 GHz and 5 GHz frequency bands, which allows for greater flexibility in network design and helps to reduce interference from other wireless devices.

While the 802.11b and 802.11g systems were popular in the past, they are now considered outdated and are not capable of achieving the higher speeds that are required for modern wireless networks. The 802.11ac system is also capable of achieving high speeds, but it is primarily designed for use in larger networks where many devices are connected at once.

Overall, the 802.11n system is the preferred choice for WLANs that operate at speeds in excess of 11 Mbps because of its superior range, speed, and flexibility. It is also compatible with a wide range of devices and is widely supported by manufacturers and vendors.

Learn more on WLAN here:

https://brainly.com/question/31765506

#SPJ11

What is the purpose of the LCD screen on a digital camera?

Answers

Explanation:

LCD, or Liquid Crystal Display, is the display technology used to create the screens embedded in the back of nearly all digital cameras. In a digital camera, the LCD works for reviewing photos, displaying menu options and serving as a live viewfinder

Can someone please answer this? It isn't Insert

Can someone please answer this? It isn't Insert

Answers

Answer:

The answer for this question is b Add to

Joe is a florist and wants to increase his client base. How can he achieve this with the help of a computer?
A.
advertise his products
B.
email his friends
C.
calculate his sales for the year
D.
analyze marketing trends

Answers

A because sounds like the correct answer

Answer:

its A I just took the test

Explanation:

HELP!!!
To see the shortcuts on the ribbon in MS Word, hold down the _____ keys at the same time. A) CTRL & X B) Shift & Alt C) Shift & Delete D) CTRL & ALT

Answers

To see the shortcuts on the ribbon in MS Word, hold down the  D) CTRL & ALT keys at the same time.

How can I display keyboard shortcuts in Word?

When you hit Alt, tabs or Quick Access buttons on the ribbon display letters or KeyTips. To open ribbon tabs, use the keyboard shortcuts shown in this table. There may be more KeyTips visible depending on the tab you choose.

Therefore, Control+Alt+Delete is seen as the combination of the Ctrl key, the Alt key, and the Del key that a user can press simultaneously on a personal computer running the Microsoft Windows operating system to end an application task or restart the operating system.


Learn more about shortcuts  keys from

https://brainly.com/question/28223521
#SPJ1

What is Inheritence in computer science? Explain in your won words with examples.

Answers

Answer:

Inheritance is when one class or script, inherits the properties and methods of another class. They can be re-used which makes it useful. This is why there are parent classes and child classes. Child classes inherit the properties of the parent class. An example is when a "car", "truck" are subclasses of a class called vehicle. Allowing you to make more vehicle using the same parent class.

Hope this makes sense!

A Career Cluster is a group of related careers true or false

Answers

Answer:

true

Explanation:

there are 16 different types so each cluster is related in some way.

A Career Cluster is a group of related careers or occupations that share common skills, knowledge, and pathways. This statement is true

These clusters are used in career exploration and education to organize and categorize careers based on similarities in the types of work they involve.

Each cluster encompasses a range of careers that share similar attributes and can be connected through similar educational pathways or skill sets.

For example, the STEM (Science, Technology, Engineering, and Mathematics) cluster includes careers such as biologist, software developer, engineer, and mathematician, all related to science and technology fields.

Career Clusters provide a useful framework for students and job seekers to explore and navigate various career options effectively.

Know more about Career Cluster:

https://brainly.com/question/8825832

#SPJ6

Which of the following characteristics below are associated with a TCP socket? Check one or more that apply. provides unreliable transfer of a group of bytes (a "datagram"), from client to server the application must explicitly specify the IP destination address and port number for each group of bytes written into a socket data from different clients can be received on the same socket socket (AF_INET, SOCK_STREAM) creates this type of socket provides reliable, in-order byte-stream transfer (a "pipe"), from client to server when contacted, the server will create a new server-side socket to communicate with that client socket (AF_INET, SOCK_DGRAM) creates this type of socket a server can perform an accept() on this type of socket

Answers

Answer:

The correct options are:

- The application must explicitly specify the IP destination address and port number for each group of bytes written into a socket.

- Data from different clients can be received on the same socket.

- The socket (AF_INET, SOCK_STREAM) creates this type of socket, providing reliable, in-order byte-stream transfer (a "pipe") from client to server.

- A server can perform an accept() on this type of socket.

Explanation:

The following characteristics are associated with a TCP socket:

- The application must explicitly specify the IP destination address and port number for each group of bytes written into a socket.

- Data from different clients can be received on the same socket.

- The socket (AF_INET, SOCK_STREAM) creates this type of socket, providing reliable, in-order byte-stream transfer (a "pipe") from client to server.

- A server can perform an accept() on this type of socket.

A TCP (Transmission Control Protocol) socket is a communication endpoint used in network programming to establish a reliable, connection-oriented communication channel between a client and a server. TCP sockets have the following characteristics:

1. Provides reliable, in-order byte-stream transfer: TCP ensures that data sent from the client to the server or vice versa is reliably delivered in the order it was sent. It handles packet retransmission and flow control mechanisms to guarantee the integrity and sequencing of data.

2. Uses IP destination address and port number: To establish a TCP connection, the application must explicitly specify the IP address and port number of the destination server. This allows the client and server to identify and communicate with each other.

3. Connection-oriented: TCP sockets establish a connection between the client and server before data transfer begins. This connection remains open until explicitly closed, allowing for continuous bidirectional communication.

4. Supports full-duplex communication: TCP sockets enable simultaneous two-way communication between the client and server. Both parties can send and receive data at the same time.

5. Provides stream-based communication: TCP treats data as a continuous stream of bytes rather than discrete packets. It ensures that the entire stream is received in the correct order without any gaps or duplication.

6. Dynamic server-side socket creation: When a server socket receives an incoming connection request (using the accept() function), it creates a new socket specific to that client. This allows the server to handle multiple simultaneous connections from different clients.

In summary, TCP sockets offer reliable, ordered, and connection-oriented communication between clients and servers, using IP addresses and port numbers to establish connections and ensuring the integrity and sequencing of data transmitted over the network.

Therefore, the correct options are:

- The application must explicitly specify the IP destination address and port number for each group of bytes written into a socket.

- Data from different clients can be received on the same socket.

- The socket (AF_INET, SOCK_STREAM) creates this type of socket, providing reliable, in-order byte-stream transfer (a "pipe") from client to server.

- A server can perform an accept() on this type of socket.

Learn more about TCP:https://brainly.com/question/17387945

#SPJ11

How can we work together to fix problems with our websites

Answers

Add a Value Proposition. ...
Website Navigation. ...
Call to Action Text. ...
Call to Action Colors. ...
Try The 10-Foot Test. ...
Carousels. ...
Social Proof. ...
Testimonial Pages.

The question "How can we work together to fix problems with our websites" is not peculiar to programmers who are consulted to solve a website problem.

The best response to the question includes we will"

add a value propositioncreate a website navigationcall to action textcall to action colorstry the 10-foot testuse a social proofcreate a testimonial pages.

Read more about website problem

brainly.com/question/25537936

If you Buy my group clothing in R.o.b.l.o.x for a donation i will make you brainliest
My group is One Percenters

Answers

Answer:kk ima do it

Explanation:

Answer:

this and that

Explanation:

this and that

Vulnerabilities and risks are evaluated based on their threats against which of the following?This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Data usefulness B Due care C Extent of liability D One or more of the CIA Triad principles

Answers

Answer:

The answer is "Option D".

Explanation:

The CIA Trilogue is a model for interpretation of security policies within an organization that is designed for direct confidentiality, integrity, and availability. This design is also sometimes related to it as the AIC triad, which avoids overlap with the central intelligence community.

In option A, it is used to process and analyze the data, that's why it is wrong. In option B, It is wrong because it tracks the measurement of financial assets, determines risks in an organization, and focus on areas for further study. In option C, It is wrong because it is regulated by contracts.

In phishing scams, a scam artist obtains the victim's personal information by collecting it on websites. Asking for it. Stealing it. Searching for it online.

Answers

Answer:

B. Asking for it

Explanation:

In phishing scams, a scam artist obtains the victim's personal information by Asking for it. Hence, option B is correct.

What is phishing scams?

Phishing is a sort of online scam that preys on consumers by sending them emails that appear to be from reputable companies, such as banks, mortgage lenders, or internet service providers.

Phishing can occur by text message, social media, or phone calls, although the phrase is most frequently used to refer to attacks that come in the form of emails. Phishing emails can directly reach millions of users and can blend in with the countless good emails that busy users receive.

The victim receives an email from app stating that their account has been compromised and will be canceled until they confirm their credit card information. The victim visits a phony website after clicking the link in the phishing email, where the stolen.

Thus, option B is correct.

For more information about phishing scams, click here:

https://brainly.com/question/2880574

#SPJ2

Dave is a recruiter for a large video and animation firm. He is looking for an employee who is willing to give productive hours to activities related to the job. Which quality is he looking for? A. responsibility B. flexibility C. trust D. reliability E. integrity

Answers

Answer:

reliabitlity

Explanation:

How to fix "to avoid confusion, you may not change your username while connected to live chess or registered for any live chess competition. please try again after you are done playing." ?

Answers

If you are playing Live Chess in another window, you won't be able to change your username. If this happens, shut all other tabs and try again. You can use a dash (-) or an underscore (_) as a separator.

How can I modify my username on Chess.com more than once?

You can get in touch with chess.com and let them know you want to modify your username. This is accessible by clicking support. So you can email chess.com if you want it altered once more.

How can I modify my username on Chess.com?

Your profile may be found under settings. Select "Change Name." Enter your new username here. But keep in mind that you cannot modify your username once.

To know more about window visit:-

https://brainly.com/question/13502522

#SPJ4

Which is self incrementing looping statement​

Answers

The self-incrementing looping statement in programming is usually called a for loop. A for loop allows you to execute a block of code repeatedly for a fixed number of times or until a certain condition is met.

What is the looping statement​?

In most programming languages, the for loop includes an index variable that is incremented or decremented automatically as the loop iterates. This is what makes it a self-incrementing looping statement.

For example, in Python, the following for loop counts from 0 to 4 and prints the value of the index variable at each iteration:

scss

for i in range(5):

   print(i)

Therefore, In this example, i is the index variable, and range(5) specifies the range of values for i to take on. As the loop iterates, i will be automatically incremented by 1 at each iteration until it reaches the maximum value of 4.

Read more about looping statement​ here:

https://brainly.com/question/23419814

#SPJ1

which gallery will allow a user to access a variety of preconfigured formatting styles for images that are added to a PowerPoint presentation

Answers

Answer:

Picture Effects gallery.

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation. Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

To format an image on PowerPoint, you can either use the Artistic Effects or Picture Effects.

The Picture Effects gallery allows a user to access a variety of preconfigured formatting styles for images that are added to a PowerPoint presentation.

Basically, the Picture Effects consist of the following preconfigured formatting styles; transparent shadow, soft edge, reflection, glow, 3-D rotation, metal frame, bevels, perspectives etc.

Answer: Picture Styles gallery

Explanation: He is correct he just typed it wrong.

state three differences between text data and number data​

Answers

Answer:

Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.

Answer:

Explanation:

text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech

number data is just numbers.

which place is recommended for the storage of your prospect's information? a knowledge base a notepad a crm system an email provider

Answers

A CRM system is recommended for the storage of your prospect's information. Thus, option C is correct.

What is information?

It is a collection of information that was arranged for human utilization since knowledge aids in decision-making. this is termed the information that is utilized by the people.

Companies utilize the Customer Relationship Management (CRM) technique to control interaction with current and potential customers. CRM enables businesses to develop client connections, boost sales, improve customer service ultimately improve profitability.

Therefore, option C is the correct option.

Learn more about information, here:

https://brainly.com/question/13629038

#SPJ1

Sora is preparing a presentation describing policies included in President Lyndon Johnson’s "Great Society” and wants to use a relevant online source.


Which source is the most relevant for the presentation?


a]-an interview with history students about the “Great Society”


b]-a photograph of Johnson making his “Great Society” speech


c]-a chart describing the conditions that led to the “Great Society”


d]-an audio recording of Johnson’s “Great Society” speech

Answers

Answer:

Option d) is correct

Explanation:

To prepare a presentation describing policies included in President Lyndon Johnson’s "Great Society”, the most relevant source that Sora should use is an audio recording of Johnson’s “Great Society” speech.

An audio recording of Johnson’s “Great Society” speech can give a more proper clarification and information regarding policies included in President Lyndon Johnson’s "Great Society”.

So,

Option d) is correct

Answer:

the answer is D

Explanation:

I just took the quiz :)

The four main parts of a computer system are the Input, output, processor, and:
O A core.
OB. hardware.
OC. software.
OD. storage.

Answers

Answer:D) Storage

Explanation:

what os the full form of cpu​

Answers

Answer:

central processing unit

Central processing unit

plz help me

Marie has never used a word processor. in 3 to 4 sentences describe how she could benefit from using a word processor to complete school writing assignment.​

Answers

Her info would be clear to read. This means it cold flow better, and make more sense when reading it. If she didn't use it, she might have unclear sentences.

What is the result of the arithmetic operation? 5**2 =

Answers

Answer:

25

Explanation:

5^2

The result of the arithmetic operation 5**2 will be 25, as it indicate two as a power of five.

What is arithmetic operators?

It is a mathematical operator that works with both groups and numbers. In AHDL, the prefix and the binary plus (+) and minus (-) symbols are supported arithmetic operators in Boolean statements.

The addition, subtraction, multiplication, division, exponentiation, and modulus operations are carried out via the arithmetic operators.

The term "arithmetic operation" refers to a function that can add, subtract, multiply, or divide numbers.

A programming tool known as an operator performs a function on one or more inputs, such as arithmetic operators.

For numerical values, the double asterisk (**) is used as an exponentiation operator. It enables the programmer to enter many arguments and parameters when used in a function definition.

Thus, answer is 25.

For more details regarding arithmetic operators, visit:

https://brainly.com/question/25834626

#SPJ6

You’ve been given a new cell phone with a 2 gigabyte data plan. You plan to use your phone for text messages, images, video, and music. Which of these categories are best compressed using lossless compression? Which of these categories are best compressed using lossy compression? Why?

a. Video should use lossy compression because it usually has a large file size which we need to reduce.
b. Text should use lossy compression because it always has a large file size which we need to reduce.
c. Audio should use lossy compression to save data and transmit quickly.

Answers

Answer: I think that it should all use lossless compression.

Explanation: it will reduce the space it take up in the files and it was be able to save data and help with transmission.

A Lossy compression should be applied to text messages and music while lossless compression should be applied to images and videos

What is Lossy compression?

A lossy compression of a file implies that the quality of the file is reduced in order to get the file compressed.

The type of compression can be applied to text messages and music because a reduction in the size and quality will only reduce few details about the text messages and music file.

Since lossless compression is such that even after the file size is reduced, the quality remains unchanged. There are type of compression can be applied to video and pictures because even if the size is reduced, the quality of the files are not expected to change.

Hence, Lossy compression should be applied to text messages and music. Lossless compression should be applied to images and videos.

Read more about file compressions at:

brainly.com/question/13663721

#SPJ2

why is hip hop and rap so popular

Answers

Answer:

its popular because hip hop and rap is a way for people to express themselves whether it be their feelings or something that happened in their life and it also evolved from different people

Other Questions
By showing a thorough understanding of your survey results, organizing your content in a clear manner, and generally showing you are prepared for this presentation, you are most demonstrating what aspect of credibility? Multiple Choice character caring competence true or fales bodies of water,moutains,rainforest.and costal Is plains provide resources for the development of Mesoamerican cililization PHYSICAL EDUCATIONII.Match column A to column B. Write your answer on the space provided before each number. Column AColumn B ________ 13. Point, close A. Hop step ________14. Change step, arms in reverse T B. National while doing the kumintang clockwise. ________15. Step, close, step (arms in lateral position)C. Regional ________16. Step, close, stepD. Touch step ________17. Step, hop E. Close step ________18. step, close F. Change step, arms in reverse T ________19. It refers to dance particular to one locale/areaG. Change step, arms in lateral position ________20. It refers to dance performed all over the countryH. Change step Which of the following does NOT contribute to setting the tone of a news story?A. setting and clothingB. languageC. musicD. the 5 Ws +1H a person got 10percent increase in his salary . If his salary was Rs50000 then find increase in salary which subatomic particles have no charge (they are neutral)? What are 2 self management strategies to quitting smoking???? Given a total-revenue function R(x) = 700/x? - 0.2x and a total-cost function 1 3 C(x) = 1400(x + 2) +600, both in thousands of dollars, find the rate at which total profit is changing when x items have been produced and sold. P'(x) = One of the big topics in this lesson is diversity and the benefits of diversity: In addition to benefits, there may be deficits. In this lesson we look at both. Again we look at the ethical considerations, not the practicalities or admission of the program.Employee Jones writes, " Can you stop the employees chattering all day in Tagalog and Spanish. They all can speak English but they keep lapsing into their own lingo and I don't understand it. I know they're not talking about me, they use a few English words, but is annoying and excludes us Americans. Sounds like discrimination to me.."Your first is to the complaining employee, ad dressing the complaint and (after the email)explaining the ethical rationale behind it. You do not need to use the term "ethics". Follow up with a list of the ethical issues involved.Your second email to to the HR department addressing any ethical concerns that the disgruntled employee made you think of.Thank you! Point #5 from the Study Guide: Gregory Navas approach to migration and border crossers in this film in the early 1980s.Answer with a clear thesis statement: Is Nava's approach in El Norte more similar to Anzaldas intersectional method to empower "atravesados" in Borderlands/La Frontera, or to De Lens complex anthropological project to expose human rights violations at the US-Mexico border in the 21st century? Provide at least one specific example from the film to illustrate your thesis. When buying materials, the purchasing agent for Alco Pillow Manufacturing Company considers a variety of factors. Which one of the following is least likely to concern this buyer?A) Does the quality of the goods meet company specifications?B) Does the supplier consistently deliver on time?C) Does the supplier also sell to my competitors?D) Does the supplier offer the services required?E) Does the price meet company budget requirements? What is an example of cognitive stressors what do mars, pluto, and Jupiter have in common (science) in 8th grade. (Be Simple)In 3-4 complete French sentences, describe the things in nature that you like most. Why do you like those particular things? b What is SI and CGs unit of force Examine the linear graph. Determine the y-intercept and write the y-intercept in coordinate form. Then write the equation of the line in slope-intercept form. including the value of (enter one word in the blank) goods along with the value of final goods in the calculation of gdp would amount to multiple counting of goods and distort gdp. How is a Cordillera music described?. Aiden has a gross income of $63,000 and takes the standard deduction. Their total taxes due are $6,847.50.a) What is their taxable income?b) What is their marginal tax rate?c) What is their effective tax rate? Round to the nearest hundredth of a percent. help me plz...........