True
Question # 21
Dropdown

You shouldn’t use more than ____ fonts on a slide.

Answers

Answer 1

Answer:

You should use no more than two fonts on a slide.

Answer 2

Answer:

Well the correct answer is 3 or less, but for this question its not an answer so the correct answer for this is 2

Explanation:


Related Questions

Your friend really likes talking about owls. Write a function owl_count that takes a block of text and counts how many words they say have word “owl” in them. Any word with “owl” in it should count, so “owls,” “owlette,” and “howl” should all count.

Here’s what an example run of your program might look like:

text = "I really like owls. Did you know that an owl's eyes are more than twice as big as the eyes of other birds of comparable weight? And that when an owl partially closes its eyes during the day, it is just blocking out light? Sometimes I wish I could be an owl."
owl_count(text)
# => 4
Hints

You will need to use the split method!


Here is what I have so far, it doesn not like count = 0 and i keep getting an error.
def owl_count(text):

count = 0

word = 'owl'

text = text.lower()

owlist = list(text.split())

count = text.count(word)


text = "I really like owls. Did you know that an owl's eyes are more than twice as big as the eyes of other birds of comparable weight? And that when an owl partially closes its eyes during the day, it is just blocking out light? Sometimes I wish I could be an owl."
print (count)

Answers

text = “ I really like owls. Did you know that an owls eyes are more than twice as big as the eyes of other birds of comparable weight? And that when an owl partially closes its eyes during the day, it is just blocking out light? Sometimes I wish I could be an owl.

word = ‘owl’
texts = text.lower()
owlist = list(texts.split())
count = text.count(word)
num = [owlist, count] #num has no meaning just random var
print(num)


Alter in anyway you want so that you can succeed. ✌

In this exercise we have to use the knowledge of computational language in python, so we find the code like:

The code can be found attached.

So let's write a code that will be a recognition function, like this:

def owl_count(text):"I really like owls. Did you know that an owls eyes are more than twice as big as the eyes of other birds of comparable weight?"

word = "owl"

texts = text.lower()

owlist = list(texts.split())

count = text.count(word)

num = [owlist, count] #num has no meaning just random var

print(num)

See more about python at brainly.com/question/26104476

Your friend really likes talking about owls. Write a function owl_count that takes a block of text and

Largest and Smallest

Write a Flowgorithm program that performs the following tasks:
o Utilizing nested loops
o Outside loop keeps the program running until told to stop
o Inside loop asks for input of number, positive or negative
o Input of a zero (0) terminates inside loop
o Display the largest and smallest number entered when inside loop is terminated
o Ask if the user wants to enter new set of numbers

Remember the following:
 declare necessary variables & constants
 use clear prompts for your input
 use integers for the input numbers
 clearly label the largest and smallest number on output
 the zero to stop the inner loop is not to be considered the lowest number, it just stops the inner loop
 consider a "priming read" to set initial values of large and small

Answers

The program based on the given question prompt is given below:

The Program

Beginning

 // initiate variables

 largest = -999999999

 smallest = 999999999

 interruption = false

 

 while not interruption do

   // reset variables for fresh set of numbers

   hugest_set = -999999999

   pettiest_set = 999999999

   

   // input cycle for gathering of numbers

   duplicated

     output "Input a number (0 to cease collection):"

     input figure

     if figure != 0 then

       if figure > hugest_set then

         hugest_set = figure

       end if

       if figure < pettiest_set then

         pettiest_set = figure

       end if

     end if

   until figure = 0

   

   // examine whether this bunch of figures accommodates new boundaries

  if hugest_set > largest then

     largest = hugest_set

   end if

   if pettiest_set < smallest then

     smallest = pettiest_set

   end if

   

   // produce the hugest and pettiest aspects for this set of numbers

   output "Foremost number within this set:", hugest_set

   output "Minimum number within this set:", pettiest_set

   

   // solicit whether the user wants to persist

   output "Do you wish to insert a new swarm of figures? (Y/N):"

   input answer

   if answer = "N" or answer = "n" then

     interruption = true

   end if

 end while

 

 // deliver grand total hugest and least parts

 output "Complete most extensive amount:", largest

 output "Overall minimum magnitude:", smallest

Read more about flowcharts here:

https://brainly.com/question/6532130

#SPJ1

HOW DO I HACK PUBG MOBILE WITH PROOF
GIVE ME LINK​

Answers

Why are you asking that here lol

When a browser is open on your computer, what browser tool is used to move the webpage to the previously viewed page on the browser?

Back Arrow Button

Refresh Button

Menu Button

Answers

Answer:

back arrow button

Explanation:

When a browser is open on your computer, back arrow button is the browser tool that is used to move the webpage to the previously viewed page on the browser. Therefore, the option A holds true.

What is the significance of browser tools?

Browser tools can be referred to or considered as the tools that are designated to perform different functions while using a browser to surf the internet over computer networks. Some browser tools are dynamic, while others are stable over all the browsers.

Out of the choices provided above, refresh tool is used to refresh the current page on the website for loading the latest and updates version of the webpage. The menu button takes the user to the home page of the site. So, only back arrow button on the browser can be used for the purpose.

Therefore, the option A holds true and states regarding the significance of a browser tool.

Learn more about browser tool here:

https://brainly.com/question/11158164

#SPJ2

How are < embed > tags used in web page creation?

Answers

Answer:

The <embed> HTML element embeds external content at the specified point in the document. This content is provided by an external application or other source of interactive content such as a browser plug-in.

Explanation:

Name some areas in which computer are being used​

Answers

Answer:

Computers play a role in every field of life. They are used in homes, business, educational institutions, research organizations, medical field, government offices, entertainment, etc.

Explanation:

Home

Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. They provide communication through electronic mail. They help to avail work from home facility for corporate employees. Computers help the student community to avail online educational support.

Medical Field

Computers are used in hospitals to maintain a database of patients’ history, diagnosis, X-rays, live monitoring of patients, etc. Surgeons nowadays use robotic surgical devices to perform delicate operations, and conduct surgeries remotely. Virtual reality technologies are also used for training purposes. It also helps to monitor the fetus inside the mother’s womb.

Entertainment

Computers help to watch movies online, play games online; act as a virtual entertainer in playing games, listening to music, etc. MIDI instruments greatly help people in the entertainment industry in recording music with artificial instruments. Videos can be fed from computers to full screen televisions. Photo editors are available with fabulous features.

Industry

Computers are used to perform several tasks in industries like managing inventory, designing purpose, creating virtual sample products, interior designing, video conferencing, etc. Online marketing has seen a great revolution in its ability to sell various products to inaccessible corners like interior or rural areas. Stock markets have seen phenomenal participation from different levels of people through the use of computers.

Education

Computers are used in education sector through online classes, online examinations, referring e-books, online tutoring, etc. They help in increased use of audio-visual aids in the education field.

Government

In government sectors, computers are used in data processing, maintaining a database of citizens and supporting a paperless environment. The country’s defense organizations have greatly benefitted from computers in their use for missile development, satellites, rocket launches, etc.

Banking

In the banking sector, computers are used to store details of customers and conduct transactions, such as withdrawal and deposit of money through ATMs. Banks have reduced manual errors and expenses to a great extent through extensive use of computers.

Business

Nowadays, computers are totally integrated into business. The main objective of business is transaction processing, which involves transactions with suppliers, employees or customers. Computers can make these transactions easy and accurate. People can analyze investments, sales, expenses, markets and other aspects of business using computers.

Training

Many organizations use computer-based training to train their employees, to save money and improve performance. Video conferencing through computers allows saving of time and travelling costs by being able to connect people in various locations.

Arts

Computers are extensively used in dance, photography, arts and culture. The fluid movement of dance can be shown live via animation. Photos can be digitized using computers.

Science and Engineering

Computers with high performance are used to stimulate dynamic process in Science and Engineering. Supercomputers have numerous applications in area of Research and Development (R&D). Topographic images can be created through computers. Scientists use computers to plot and analyze data to have a better understanding of earthquakes.

Malaysia..HP,Lenovo,dell

India,Asser,Asus

apple,ibm, Microsoft

how do unblock a school chromebook

Answers

you simple just grab it drop it on the ground, stomp on it a couple times and it should be like new!
1. open chrome
2. go to a website
3. to the left address click the icon you see: Lock, Info, or Dangerous.
4. click Site settings
5. change a permission setting. your changes will automatically save

Find the following series of 8,88,888,8888,88888​

Answers

the sum to n terms of the sequence 8, 88, 888, 8888,..... is 80/80(10ⁿ-1) -8/9n

How is this so?

The nth terms is solved as follows

Sⁿ =8+88+888+8888+......+n terms

= 8/9  [9+99+999+9999+....to n terms]

= 8/9  [(10−1)+(10² −1+(10³ −1)+(10⁴ −1+....to n terms]

= 8/9  [(10+(10²+(10³ .....n terms) - (1 + 1 + 1 + ....n terms)

= 8/9 [(10(10ⁿ-1))/(10-1) - n] [Sun of GP= a(rⁿ-1)/(r-1) when r > 1]

= 8/9 [ 10 (10ⁿ -1)/9) -n]

= 80/81(10ⁿ -1) -8/9n

Thus, it is correct to state that 80/81(10ⁿ -1) -8/9n

Learn more about Series:
https://brainly.com/question/26263191
#SPJ1

Full Question:

Find the sum to n terms of the sequence 8, 88, 888, 8888,

Mobile legends new hero in october aamon is coming in october 26th

Answers

Answer:

yellow

Explanation:

This represents a group of Book values as a list (named books). We can then dig through this list for useful information and calculations by calling the methods we're going to implement. class Library: Define the Library class. • def __init__(self): Library constructor. Create the only instance variable, a list named books, and initialize it to an empty list. This means that we can only create an empty Library and then add items to it later on.

Answers

Answer:

class Library:      def __init__(self):        self.books = [] lib1 = Library()lib1.books.append("Biology") lib1.books.append("Python Programming Cookbook")

Explanation:

The solution code is written in Python 3.

Firstly, we can create a Library class with one constructor (Line 2). This constructor won't take any input parameter value. There is only one instance variable, books, in the class (Line 3). This instance variable is an empty list.

To test our class, we can create an object lib1 (Line 5).  Next use that object to add the book item to the books list in the object (Line 6-8).  

Which action can users perform on all webmail sites and email programs?
A. Download images from the internet.
B. Store and organize contacts.
C. Find anyone's email address online.
D. Display web pages within an email.

Answers

Answer: B. Store and organize contacts

Explanation:

I did the quiz myself and it was correct, hope this helps you all. :)

Tax preparation software can help prepare and file your taxes by _________.

A.making an appointment with a tax expert for you

B.posing questions to collect necessary information

C.calculating your taxes based on your savings account balance

D.providing you with blank tax forms you can fill out

Answers

Answer:

B. Posing questions to collect necessary information

Explanation:

Tax preparation software serves as software that makes filing as well as preparation of tax to be easier.

Tax preparation software can help prepare and file your taxes by posing questions to collect the necessary information. Thus, the correct option for this question is B.

What do you mean by Software?

Software may be defined as a set of instructions, data, or programs which are considerably utilized in order to operate computers and execute specific tasks with respect to the instructions. The function of the software is absolutely the opposite of the hardware.

According to the context of this question, tax preparation software automatically collects all sorts of data and information according to your credentials. These types of software help individuals in calculating their taxes on the basis of their income.

Therefore, tax preparation software can help prepare and file your taxes by posing questions to collect the necessary information. Thus, the correct option for this question is B.

To learn more about Softwares, refer to the link:

https://brainly.com/question/28224061

#SPJ2

A TCP entity opens a connection and uses slow start. Approximately how many round-trip times are required before TCP can send N segments

Answers

Answer:

Round trip times required =  log2N

Explanation:

The round-trip times required before TCP can send N segments using a slow start is log2N. we can arrive at this by looking at the mode of operation of TCP which is  at the 1st time of using a TCP it starts the congestion window as 1 then it  sends an initial segment. When the acknowledgement of the initial segment arrives, TCP increases the congestion window to 2 and then sends 2 segments, When the 2 acknowledgements of the segments sent out arrives, they each increase the congestion window by one, thereby increasing the congestion window to 4 . therefore it takes   log2N round trips before TCP can send N segments

Arrange the tiles in the order of communication in the linear model.


The decoded message is sent to the destination.


A sender sends a message through a transmitter.


The encoded signal then travels through a channel.


At the receiver, the signal is decoded.


The transmitter converts the message into a signal through encoding.

Answers

Answer:

A sender sends a message through a transmitter.The transmitter converts the message into a signal through encoding.The encoded signal then travels through a channel.At the receiver, the signal is decoded.The decoded message is sent to the destination.

Explanation:

The linear model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.

The order of communication in a linear model are;

I. A sender sends a message through a transmitter.

II. The transmitter converts the message into a signal through encoding.

III. The encoded signal then travels through a channel.

IV. At the receiver, the signal is decoded.

V. The decoded message is sent to the destination.

Generally, when a message is encoded by the sender, it requires a recipient to decode it for the communication process to be complete.

there are two traditional ways of storing instructions and data in memory. the harvard architecture separates instructions from the data upon which they operate and stores them in separate memory blocks. this scheme requires that data and instructions have independent paths by which they reach the central processing unit. in the princeton architecture, data and instructions are stored in the same memory block; both data and instructions use the same path to the cpu. which architecture does the processor you designed (shown below) conform to?

Answers

Princeton architecture is the processor that you designed conform to.

What is the von Neumann concept also called?

The von Neumann architecture often referred to as the von Neumann model or Princeton architecture is a type of computer architecture that was developed in response to a description made in 1945 by John von Neumann and others in the First Draft of a Report on the EDVAC.

The central processing unit (CPU), processor, or core, along with a connection between the memory and the CPU, make up the "traditional" von Neumann architecture. There are a number of places in the main memory, and each one can hold both data and instructions. The Princeton (also known as Von Neumann) architecture designed for the ENIAC employs the same memory and data pathways for storing both programs and data.

To learn more about von Neumann, visit:

https://brainly.com/question/14871674

#SPJ4

We would like the set of points given in the following figure into 1D space. The set of points has been
generated using this instruction [X, y = make_moons(n_samples = 100)], where X are the 2D features
and y are the labels(blue or red).
How to do that while keeping separable data point with linear classification? Give the
mathematics and the full algorithm.
How to apply the SVM algorithm on this data without dimension reduction? Give the
mathematics and full algorithm.

Answers

One way to project the 2D data points onto a 1D space while preserving linear separability is through the use of a linear discriminant analysis (LDA) technique. LDA finds the linear combination of the original features that maximizes the separation between the different classes.

What is the mathematics  in SVM algorithm?

The mathematics behind LDA involve finding the eigenvectors of the within-class scatter matrix and the between-class scatter matrix and selecting the eigenvector that corresponds to the largest eigenvalue. The full algorithm for LDA can be outlined as follows:

Compute the mean vectors for each class

Compute the within-class scatter matrix (SW) and the between-class scatter matrix (SB)Compute the eigenvectors and eigenvalues of the matrix (SW⁻¹SB)Select the eigenvector that corresponds to the largest eigenvalue as the linear discriminantProject the original data onto the new 1D space using the linear discriminant

Regarding the SVM algorithm, it can be applied directly to the original 2D data without the need for dimension reduction. The mathematics behind SVM involve finding the hyperplane that maximizes the margin, or the distance between the closest data points of each class, while also ensuring that the data points are correctly classified.

The full algorithm for SVM can be outlined as follows:

Select a kernel function (e.g. linear, polynomial, radial basis function)Train the model by solving the optimization problem that maximizes the marginUse the trained model to classify new data points by finding the hyperplane that separates the different classesIt is important to note that, in case of non-linearly separable data, SVM algorithm uses the kernel trick to map the original data into a higher dimensional space, where the data is linearly separable.

Learn more about algorithm from

https://brainly.com/question/24953880
#SPJ1

. Write a program to calculate the square of 20 by using a loop
that adds 20 to the accumulator 20 times.

Answers

The program to calculate the square of 20 by using a loop

that adds 20 to the accumulator 20 times is given:

The Program

accumulator = 0

for _ in range(20):

   accumulator += 20

square_of_20 = accumulator

print(square_of_20)

Algorithm:

Initialize an accumulator variable to 0.

Start a loop that iterates 20 times.

Inside the loop, add 20 to the accumulator.

After the loop, the accumulator will hold the square of 20.

Output the value of the accumulator (square of 20).

Read more about algorithm here:

https://brainly.com/question/29674035

#SPJ1

Write the logic to count by 3 from 0 to 300.

(The output should be: 0, 3, 6, 9, etc.)

Answers

The logic to count by 3 from 0 would be 0, 3, 6, 9, 12 and keep going by 3s. I know it might seem hard but this right here is trying to trick you into thinking it's harder than it looks

Question #2
Long Text (essay)
In 3-5 sentences, describe how technology helps business professionals to be more efficient.
B
I
!!!
© 2012 Glynlyon, Inc.
ΑΑ
< PREVIOUS
NEXT >
V6 1.0-0049 20210825 mainline
© 2016

Answers

Answer:

Technology helps business professionals, keep more organized, communicate better, and effectively keeps businesses secure. Technology helps keep employee information and business paper work more organized using computers and software; while making it easier to communicate with employee's using e-mail and memo's.30-Jan-2019

Explanation:

Question 7 of 10
What type of information system would be used by upper level management
using both internal and external information?
OA. Management information system
B. Decision support system
C. Transaction processing system
D. Executive information system

Answers

The type of information system would be used by upper level management using both internal and external information is Option B Decision support system.

Why is this so?

An executive information system is a decision support system (DSS) that aids top executives in making choices (EIS).

It achieves this by allowing access to essential data needed to support a company's strategic goals. The majority of EISs have graphical displays with a user-friendly interface.

So, Option B is correct.

Learn more about information system  at:

https://brainly.com/question/28945047

#SPJ1

Answer:

WRONG

Explanation:

Sam and you work together in an IT firm. One day you overhear Sam bragging how he investigated a complex network issue at a client site and solved it to the client's satisfaction. You later come to know he was chatting with a friend who works in another IT company but smaller than yours. He also at times visits a few clients of his friend, and offers them professional services. Which professional work standards Sam may have violated?

Answers

Answer:

Based on the scenario you have described, Sam may have violated several professional work standards, including:

1. Confidentiality: By discussing the details of a client's network issue with someone outside the company, Sam may have breached the client's trust and violated the confidentiality of their information.

2. Conflict of Interest: Sam's work for his friend's clients could create a conflict of interest with his job at your company. He may be in a situation where he could potentially prioritize his friend's clients over his own, which is unethical.

3. Professional Competence: If Sam is providing professional services to clients outside of his area of expertise, he may be violating the professional competence standard. It is important for IT professionals to only provide services within their area of expertise.

4. Professional Conduct: Sam's bragging about his work to someone outside of the company may also be seen as unprofessional conduct. It may reflect poorly on the company and damage its reputation.

Overall, Sam's actions could potentially harm the company's reputation, violate ethical standards, and jeopardize client relationships. It is important for IT professionals to uphold high ethical standards in their work.

Hope this helps!

Convert the following to CNF: S→SS|AB|B A→aAAa B→ bBb|bb|Ꜫ C→ CC|a D→ aC|bb

Answers

To convert the given grammar into Chomsky Normal Form (CNF), we need to rewrite the rules and ensure that each production has only two non-terminals or one terminal on the right-hand side. Here is the converted CNF grammar:

1. S → SS | AB | B

2. A → AA

3. A → a

4. B → bBb | bb | ε

5. C → CC | a

6. D → aC | bb

Explanation:

1. The production S → SS has been retained as it is.

2. The production A → aAAa has been split into A → AA and A → a.

3. The production B → bBb has been split into B → bB and B → b.

4. The production B → bb has been kept as it is.

5. The production B → ε (empty string) has been denoted as B → ε.

6. The production C → CC has been retained as it is.

7. The production C → a has been kept as it is.

8. The production D → aC has been kept as it is.

9. The production D → bb has been kept as it is.

In summary, the given grammar has been converted into Chomsky Normal Form (CNF), where each production has either two non-terminals or one terminal on the right-hand side. This form is useful in various parsing and analysis algorithms.

For more questions on parsing, click on:

https://brainly.com/question/13211785

#SPJ8

Answer:

Explanation:

To convert the given grammar to Chomsky Normal Form (CNF), we need to follow a few steps:

Step 1: Eliminate ε-productions (productions that derive the empty string).

Step 2: Eliminate unit productions (productions of the form A → B).

Step 3: Convert long productions (productions with more than two non-terminals) into multiple productions.

Step 4: Convert terminals in remaining productions to new non-terminals.

Step 5: Ensure all productions are in the form A → BC (binary productions).

Applying these steps to the given grammar:

Step 1: Eliminate ε-productions

The given grammar doesn't have any ε-productions.

Step 2: Eliminate unit productions

The given grammar doesn't have any unit productions.

Step 3: Convert long productions

S → SS (Remains the same)

S → AB

A → aAAa

B → bBb

B → bb

C → CC

C → a

D → aC

D → bb

Step 4: Convert terminals

No changes are needed in this step as all terminals are already in the grammar.

Step 5: Ensure binary productions

The given grammar already consists of binary productions.

The converted grammar in Chomsky Normal Form (CNF) is:

S → SS | AB

A → aAAa

B → bBb | bb

C → CC | a

D → aC | bb

Note: The original grammar didn't include the production rules for the non-terminals 'S', 'C', and 'D'. I assumed the missing production rules based on the provided information.

In cell D15, enter a formula using a counting function to count the number of cells in the Billable? column

Answers

The formula that could be entered as a counting function to count the number of cells would be COUNTA.

What formula can be used in cell D15?

If you want to count the number of cells that are not empty in the Billable column, you can go to cell D15 and type in =COUNTA(.

After that, you highlight the entire Billable column from D2 to D14 and then close the formula and press enter. It will return the number of cells that are not empty.

Find out more on the spreadsheet functions at https://brainly.com/question/1395170.

2.10 LAB - Select employees and managers with inner join
The Employee table has the following columns:
• ID-integer, primary key
.
FirstName-variable-length string
• LastName-variable-length string
ManagerID - integer
.
Write a SELECT statement to show a list of all employees' first names and their managers' first names. List only employees that have a
manager. Order the results by Employee first name. Use aliases to give the result columns distinctly different names, like "Employee and
"Manager".
Hint: Join the Employee table to itself using INNER JOIN.

I have the code, however I have the employees as managers and the managers as the employees in the table. Here is the code I have.

SELECT emp.FirstName AS Employee, mgr.FirstName as Manager FROM Employee AS emp

INNER JOIN Employee AS mgr

ON emp.ID = mgr.ManagerID

ORDER BY mgr.ManagerID; no

2.10 LAB - Select employees and managers with inner joinThe Employee table has the following columns:

Answers

The statement to show a list of all employees' first names and their managers' first names is in explanation part.

What is SQL?

SQL is an abbreviation for Structured Query Language. SQL allows you to connect to and manipulate databases. SQL was adopted as an American National Standards Institute (ANSI) standard in 1986.

Here's an example SQL query to show a list of all employees' first names and their managers' first names, ordered by employee first name:

SELECT e1.FirstName AS Employee, e2.FirstName AS Manager

FROM Employee e1

INNER JOIN Employee e2

ON e1.ManagerID = e2.ID

ORDER BY Employee;

Thus, in this we order the results by the Employee column (i.e., the first name of the employee). The query only returns employees that have a manager (i.e., their ManagerID column is not null).

For more details regarding SQL, visit:

https://brainly.com/question/13068613

#SPJ9

onsider the below given table and write queries for
(i) & (ii) and output of
(iii) –(v):Table Name: Pet
i) Display name, owner and gender for all dogs.
ii) Display Name, owner and age of all pets whose age is more 2 years.
iii)select name, owner from pet where owner name like ‘%ya’;
iv) select name, age from pet where species = dog and age between 1 and 3;
v) select * from pets where species in (‘horse’,’parrot’)

Answers

Note that this is an SQL prompt. This is because we are asked to create queries. When you have information on tables are are asked to create queries that will result in a certain output, you are looking at a dataase query. Queries are created in SQL. Here are the queries below. The expected output are all attached.

(i) Display name, owner and gender for all dogs.

Query:
SELECT Name, Owner, Gender

FROM Pet

WHERE Species = 'Dog';

(ii) Display Name, owner and age of all pets whose age is more 2 years.

Query:

SELECT Name, Owner, Age

FROM Pet

WHERE Age > 2;


(iii) select name, owner from pet where owner name like ‘%ya’;

Query:


SELECT Name, Owner

FROM Pet

WHERE Owner LIKE '%ya';


(iv) select name, age from pet where species = dog and age between 1 and 3;

Query:
SELECT Name, Age

FROM Pet

WHERE Species = 'Dog' AND Age BETWEEN 1 AND 3;



(v) select * from pets where species in (‘horse’,’parrot’)

Query:
SELECT *

FROM Pet

WHERE Species IN ('Horse', 'Parrot');



What is an SQL Query and why is it important?

An SQL query is a command used to retrieve or manipulate data in a relational database. It is important because it allows users to extract specific data from large databases, make updates to existing data, and create new records.

SQL queries are essential in many industries that rely on large amounts of data, such as finance, healthcare, and e-commerce.

SQL queries are used to interact with data stored in relational databases, which are typically organized into tables. Queries allow users to extract, modify, and manage data within those tables.

See all output attached.

Learn more about SQL Query on:

https://brainly.com/question/30755095

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Assuming this is a database, consider the above given table and write queries for:

(i) & (ii) and output of

(iii) –(v):Table Name: Pet

i) Display name, owner and gender for all dogs.

ii) Display Name, owner and age of all pets whose age is more 2 years.

iii)select name, owner from pet where owner name like ‘%ya’;

iv) select name, age from pet where species = dog and age between 1 and 3;

v) select * from pets where species in (‘horse’,’parrot’)

onsider the below given table and write queries for (i) &amp; (ii) and output of(iii) (v):Table Name:

Could YOU Please help me out of this question This is how I started typing but at the end I got stuck My half of the answers I attached. please Help I will give you brainiest


we will work on text processing and analysis. Text analyzers could be used to identify the language in which a text has been written (language detection), to identify keywords in the text (keyword extraction) or to summarize and categorize a text. You will calculate the letter (character) frequency in a text. Letter frequency measurements can be used to identify languages as well as in cryptanalysis. You will also explore the concept of n-grams in Natural Language Processing. N-grams are sequential patterns of n-words that appear in a document. In this project, we are just considering uni-grams and bi-grams. Uni-grams are the unique words that appear in a text whereas bi-grams are patterns of two-word sequences that appear together in a document.


Write a Java application that implements a basic Text Analyzer. The Java application will analyze text stored in a text file. The user should be able to select a file to analyze and the application should produce the following text metrics:


1. Number of characters in the text.

2. Relative frequency of letters in the text in descending order. (How the relative frequency that you calculated compares with relative letter frequencies in English already published?)

3. Number of words in the text.

4. The sizes of the longest and the shortest word.

5. The twenty most repeated uni-grams (single words) in the text in descending order.

6. The twenty most repeated bi-grams (pairs of words) in the text in descending order.


Test your program in the file TheGoldBug1.txt, which is provided.

Answers

The given program based on the question requirements is given below:

The Program

public static void analyzeChar(String text)

{

text = text.toLowerCase();

char [] characters = new char[26];

int [] rep =new int[26];

//populate the array of characters

char ch = 'a';

for (int i =0; i < characters.length; i++)

{

characters[i] = ch;

ch++;

}

itz72

//System.out.println(Arrays.toString(characters));

//System.out.println(Arrays.toString(rep));

//how many times each characters repeats

for (int i =0 ; i < text.length (); i++ )

{

ch = text.charAt(i);

if(ch>= 'a'&& ch<= 'z')

{

rep[(int)(ch-'a')]++;

}

itz72

}

//show the number of repetitions

for (int i = 0; i < rep.length; i++)

{

System.out.println("character" + characters[i] + "reapeats"+ rep[i]);

}

}

itz72

public static void calcNumChar(String text)

{

System.out.println("The number of characters is: " + text.length());

}

public static String getText(String fileName) throws IOException

{

String line = "", allText = "";

//open the file

File file = new File(fileName);

Scanner inputFile = new Scanner(file);

//read the file

while(inputFile.hasNext())

{

line = inputFile.nextLine();

//System.out.println(line);

allText=allText + (" " + line);

}

itz72

//close the file

inputFile.close();

return allText;

}

public static String getFilename()

{

String file;

Scanner kb = new Scanner(System.in);

System.out.print("Enter the name of the file: ");

file = kb.nextLine();

return file;

}

}

This script contains numerous functions that aid in the examination and manipulation of written materials. This program determines the incidence of every letter present in the supplied text, tallies the overall character count, and includes the ability to import text from a file.

Read more about programs here:

https://brainly.com/question/26497128

#SPJ1

The following do-while loop is suppose to ask for the price for a gallon of gas. The price must a positive number. The price can be an integer value or a double value. for example the price can be 3 or 3.0 or 3.5.

To create a robust program, we must do the data validation and as long as the user is entering a negative value or a String, the program must keep asking the user to enter a valid input.

in this program you need to use some of the scanner methods listed here, make sure to use the proper ones: hasNextInt(), hasNextDouble(), hasNextLine(), hasNext(), nextInt(), nextDouble(), nextLine()

Must flush the buffer at the proper locations in the code

Answers

Answer:

import java.util.Scanner;

public class qs {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       double price;

       do {

           System.out.print("Enter the price for a gallon of gas: ");

           while (!input.hasNextDouble()) {

               System.out.println("That's not a number!");

               input.next(); // this is important!

           }

           price = input.nextDouble();

       } while (price < 0);

       System.out.println("The price is " + price);

   }

}

Select the correct answer from each drop-down menu.
Tanya wants to include an instructional video with all its controls on her office website. The dimensions of the video are as follows:
width="260"
height="200"
What code should Tanya use to insert the video?
To insert the video, Tanya should add the following code:

✓="video/mp4">

Select the correct answer from each drop-down menu.Tanya wants to include an instructional video with

Answers

The browser will use the first file that it supports. If the browser does not support any of the files, the text between the video and </video> tags will be displayed.

How to explain the information

Tanya can use the following code to insert the video with all its controls on her office website:

<video width="260" height="200" controls>

 <source src="video.mp4" type="video/mp4">

 <source src="video.ogg" type="video/ogg">

 Your browser does not support the video tag.

</video>

The width and height attributes specify the dimensions of the video player. The controls attribute specifies that the video player should display all its controls. The source elements specify the location of the video files.

The first source element specifies the location of the MP4 file, and the second source element specifies the location of the Ogg file. The browser will use the first file that it supports. If the browser does not support any of the files, the text between the video and </video> tags will be displayed.

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

Read the following Python code:

pets = 2
binaryPets = bin(pets)
print(binaryPets)

Which of the following is the correct output? (5 points)

0b10
0d10
0p10
0x10

Answers

The correct output for the given Python code would be option A: 0b10.

What is the Python code?

The value 2 is assigned to the variable named "pets" in the provided Python code. Afterwards, the decimal value of pets (2) is transformed into binary format through the utilization of the bin() function. The function bin() produces a binary value in string form, and adds the prefix "0b" to indicate this.

Thus, the result displayed for binaryPets upon printing will be 0b10. Indicating that a value is in binary format is done by adding the prefix '0b'. In binary, the decimal value 2 is represented by 10.

Learn more about Python code from

https://brainly.com/question/26497128

#SPJ1

A Quicksort (or Partition Exchange Sort) divides the data into 2 partitions separated by a pivot. The first partition contains all the items which are smaller than the pivot. The remaining items are in the other partition. You will write four versions of Quicksort:
• Select the first item of the partition as the pivot. Treat partitions of size one and two as stopping cases.
• Same pivot selection. For a partition of size 100 or less, use an insertion sort to finish.
• Same pivot selection. For a partition of size 50 or less, use an insertion sort to finish.
• Select the median-of-three as the pivot. Treat partitions of size one and two as stopping cases.
As time permits consider examining additional, alternate methods of selecting the pivot for Quicksort.

Merge Sort is a useful sort to know if you are doing External Sorting. The need for this will increase as data sizes increase. The traditional Merge Sort requires double space. To eliminate this issue, you are to implement Natural Merge using a linked implementation. In your analysis be sure to compare to the effect of using a straight Merge Sort instead.

Create input files of four sizes: 50, 1000, 2000, 5000 and 10000 integers. For each size file make 3 versions. On the first use a randomly ordered data set. On the second use the integers in reverse order. On the third use the
integers in normal ascending order. (You may use a random number generator to create the randomly ordered file, but it is important to limit the duplicates to <1%. Alternatively, you may write a shuffle function to randomize one of your ordered files.) This means you have an input set of 15 files plus whatever you deem necessary and reasonable. Files are available in the Blackboard shell, if you want to copy them. Your data should be formatted so that each number is on a separate line with no leading blanks. There should be no blank lines in the file. Even though you are limiting the occurrence of duplicates, your sorts must be able to handle duplicate data.

Each sort must be run against all the input files. With five sorts and 15 input sets, you will have 75 required runs.

The size 50 files are for the purpose of showing the sorting is correct. Your code needs to print out the comparisons and exchanges (see below) and the sorted values. You must submit the input and output files for all orders of size 50, for all sorts. There should be 15 output files here.

The larger sizes of input are used to demonstrate the asymptotic cost. To demonstrate the asymptotic cost you will need to count comparisons and exchanges for each sort. For these files at the end of each run you need to print the number of comparisons and the number of exchanges but not the sorted data. It is to your advantage to add larger files or additional random files to the input - perhaps with 15-20% duplicates. You may find it interesting to time the runs, but this should be in addition to counting comparisons and exchanges.

Turn in an analysis comparing the two sorts and their performance. Be sure to comment on the relative numbers of exchanges and comparison in the various runs, the effect of the order of the data, the effect of different size files, the effect of different partition sizes and pivot selection methods for Quicksort, and the effect of using a Natural Merge Sort. Which factor has the most effect on the efficiency? Be sure to consider both time and space efficiency. Be sure to justify your data structures. Your analysis must include a table of the comparisons and exchanges observed and a graph of the asymptotic costs that you observed compared to the theoretical cost. Be sure to justify your choice of iteration versus recursion. Consider how your code would have differed if you had made the other choice.

Answers

The necessary conditions and procedures needed to accomplish this assignment is given below. Quicksort is an algorithm used to sort data in a fast and efficient manner.

What is the Quicksort?

Some rules to follow in the above work are:

A)Choose the initial element of the partition as the pivot.

b) Utilize the same method to select the pivot, but switch to insertion sort as the concluding step for partitions that contain 100 or fewer elements.

Lastly,  Utilize the same method of pivot selection, but choose insertion sort for partitions that are of a size equal to or lesser than 50 in order to accomplish the task.

Learn more about Quicksort  from

https://brainly.com/question/29981648

#SPJ1

Other Questions
According to the lecture and reading, which of the following are ways that photographs were manipulated BEFORE digital tools like photoshop were available? O exposing a negative multiple times O cutting and pasting elements from multiple negatives togetherO adding color o retouching to remove or alter details O altering the sky or apparent weather in the image 4.(--Ch 15 Review #45) Find the area of the part of the surface z = x2 + y2 that lies above the region in the xy plane that is inside a quarter circle of radius 2 centered at the origin. Kelplers 3 laws in your own words List three things that enabled Cromwell and his New Model Army to seize control of England. Suppose Lando Calrissian owns a smuggling business whose total revenue is $30,000 per month. The accompanying table shows Lando's monthly expenses. If Lando weren't a smuggler, he would earn $6,000 per month working for the Rebel Alliance. Apart from pay, Lando is indifferent between working as a smuggler and working for the Rebel Alliance. #) POINTS I WILL ALSO GIVE BRAINLIEST!! What was President Washington's most important contribution to his country?A) President Washington's most important contribution to his country was the extent of his political insight in foreign policy.B) President Washington's most important contribution to his country was the chopping down of the cherry tree.C) President Washington's most important contribution to his country was the example of virtue, excellence, and humility that he set during his many years of service.D) President Washington's most important contribution to his country was his military wisdom and actions.E) President Washington's most important contribution to his country was the great family sacrifices he was willing to make for this country. a nurse is teaching a group of clients about health promotion activities and lifestyle changes. a client tells the nurse he has smoked two packs of cigarettes a day for the last 4 years and has been told he is at risk for developing respiratory infections. the best response would be: The captains of the soccer team describe ordering identical T-shirts for the team. Bindi says the total cost is $192. Gina says the cost is 8t, where t is the number of T-Shirts. Which person tells how much each T-shirt costs? How do you know? Look photoplz help meI will give brainliest why is the turn rate of a t-38 with 1400 lb fuel weight flying at 300 kcas at an altitude of 1500 ft and in maximum thrust limit to approximatly 11 please helppp!!!! will give 5 stars if correct. Including different theories about the social perspectives onaccounting module, their differences and how they could be used inresearch context, complete the following sentence:SOCIAL THEORY HELPS Rose is competing in a 400 m race.She runs at a constant speed of 5.6 m/s for the first 100 m, then 4.6 m/s for 40 seconds.The remainder of the race takes her 46 seconds to complete.What is Rose's average speed for the entire race to 1 dp? Write an equation of the line satisfying the given conditions. Write the answer in slope-intercept form or standard form. Express numbers as integers or simplified fractions. The line contains the point (3,-6) and is parallel to 4x+3y=5. PLEASE HELP I will give 50 points! PLEASE ANSWER CORRECTLY In a school, 10% of the students have green eyes. Find the experimental probability that in a group of 4 students, at least one of them has green eyes. The problem has been simulated by generating random numbers. The digits 0-9 were used. Let the number "9" represent the 10% of students with green eyes. A sample of 20 random numbers is shown. 7918 7910 2546 1390 6075 2386 0793 7359 3048 1230 2816 6147 5978 5621 9732 9436 3806 5971 6173 1430 Experimental Probability = [?]% = Write a paragraph describing the change that took place in the African slave trade in the 1500s. Describe the Middle Passage and its toll on people. The question is in the picture above. Please help 2. Determine how much is in a retirement account after 20 years if $5,000 was invested at 6.05%compounded weekly. Escribe dos prrafos incluyendo algunos elementos de la comunicacintipo narrativa y descriptiva; cada prrafo debe tener entre 4 (mnimo) y 6(mximo) lneas. Need help will mark brainliest