using both order number and product code together as a primary key for an order entry system is used to elimiate what type of relationship

Answers

Answer 1

Using both order number and product code together as a primary key for an order entry system is used to eliminate the many-to-many relationship.

What is a primary key?

A primary key is a unique identifier that allows a user to recognize individual records in a database table. In a database, a primary key is used to define a specific record in a table. This identifier is a distinct set of one or more fields or columns that are used to retrieve records.

The purpose of using both the order number and the product code together as a primary key is to create a unique identifier for each order and eliminate any duplicate records.

It is possible for an order entry system to have a one-to-many relationship with product codes, implying that a single order number might have several product codes or items associated with it.

Learn more about primary key at:

https://brainly.com/question/32438912

#SPJ11


Related Questions

Give two benifets to the supermarket maneger and two benifets of customers of using barcods on all items

Answers

Answer:

The benefit of barcodes on items for the manager and the customers are as follow-

Explanation:

Benefits of using bar codes on all items to the manger are as follow -

The process of customer dealing increases by quickly scanning the item, rather than manually noting down the details.The track record of all the items can be maintained properly.

Benefits of using bar codes on all items to the customers are as follow -

The time period to purchase any item increases, hence the customer can shop for many items in short span of time.The chances of any mistake gets reduced, as everything is done digitally.

What is the process of improving something within your game or production workflow?

Answers

A workflow process is the automation of a business process, which may be done entirely automatically or perhaps partially.

What is a workflow process?

Workflow is crucial because it provides you with consistent insights into what is happening within your processes, and the individuals involved, and an understanding of how well your company meets its deadlines.

Since many startup studios lack prior expertise, it may be difficult for them to complete their first project due to the different difficulties in game production.

Therefore, the process may involve the movement of tasks, papers, or information in accordance with a set of procedural norms.

To learn more about the workflow process, refer to the link:

https://brainly.com/question/29355484

#SPJ9

A(n) ________ is a specific piece of information that is stored in every record.

Answers

A(n) attribute is a specific piece of information that is stored in every record. Attributes are used to describe and characterize the data in a database. They define the properties and characteristics of the entities in the database and provide details about them.

In other words, attributes define what kind of information can be stored in a particular field within a record. Attributes can be of different types, such as alphanumeric, numeric, date, or boolean, depending on the nature of the data they represent. For example, in a database of employee records, attributes could include the employee's name, ID number, date of birth, salary, and job title. Attributes are essential in organizing and structuring data within a database. They enable efficient retrieval, sorting, and filtering of data based on specific criteria.

Furthermore, attributes play a crucial role in establishing relationships between entities in a relational database. By defining attributes, we can establish the connections and dependencies between various records and ensure the integrity and accuracy of the data. In summary, attributes are specific pieces of information that are stored in every record. They provide detailed descriptions of the data and enable efficient data retrieval and organization within a database.

Learn more about attribute

https://brainly.com/question/29729029?

#SPJ11

How would you describe the relationship between blocks of code and commands?

Answers

Code and Commands have similar programs coding has only one thing to do or done but commands can be told anytime by an input device.

why do you think websites commonly require you to have at least 8 characters, and a mix of uppercase characters, lowercase characters, numbers, and symbols?

Answers

The reason why i think that  websites commonly require you to have at least 8 characters, and a mix of uppercase characters, lowercase characters, numbers, and symbols is because the combination is one that is often difficult to guess if an attacker want to access your account.

Why do passwords need to be 8 characters?

Setting a minimum password length of eight characters is one that tends to remove all three- to seven form of letter words and it is one that cannot be  easily cracked passwords.

Therefore, The reason why i think that  websites commonly require you to have at least 8 characters, and a mix of uppercase characters, lowercase characters, numbers, and symbols is because the combination is one that is often difficult to guess if an attacker want to access your account.

Learn more about websites from

https://brainly.com/question/17174600

#SPJ1

30 POINTS, ON A TIMER HELP ASAP

your answer will be removed if you steal my points!!

The history of the Internet dates back to the 1960s, when a group of scientists at Stanford University were entrusted to design which of the following as part of the competition between the US and its then Cold War enemy, the USSR?


a network of sophisticated computers

a mainframe to siphon information

a computer to control weapons

a super computer for the US government

Answers

b is not the answer

for c the goverment  dont  need a comptor to control weopons they have a briefase.      

for a it dont  make sense in that time

so it d pls mark barinliest    

Write a program that creates a two-dimensional array named height and stores the following data:

16 17 14
17 18 17
15 17 14
The program should also print the array.

Expected Output
[[16, 17, 14], [17, 18, 17], [15, 17, 14]]

Answers

Answer:

Explanation:

The following code is written in Java and it simply creates the 2-Dimensional int array with the data provided and then uses the Arrays class to easily print the entire array's data in each layer.

import java.util.Arrays;

class Brainly {

   public static void main(String[] args) {

       int[][] arr = {{16, 17, 14}, {17, 18, 17}, {15, 17, 14}};

   

     

      System.out.print(Arrays./*Remove this because brainly detects as swearword*/deepToString(arr));

   }

}

Write a program that creates a two-dimensional array named height and stores the following data:16 17

Answer:

height = []

height.append([16,17,14])

height.append([17,18,17])

height.append([15,17,14])

print(height)

Explanation:

I got 100%.

How should the teachers respond to the parental complaints of student C? If they fail the student, the student will likely be rejected from the Ivy League College and could lose scholarship opportunities. If they bow to the parent's pressure and allow a third try to make up the work, this student will have an unfair advantage over student B.

Answers

Answer:

the teacher should give the student some time to work with since they dont have the same avantage as the others

Explanation:

all should have an fair time as others

The Internet is based on a U.S. government project called ________. Today, the Internet is a collection of networks, tied together by common________ . Tier 1 networks form the Internet ________, a system of high-capacity routers and fiber-optic communication links arranged in a(n) ________ topology. Networks that form the Internet are maintained by ________that offer access to consumers. Before data travels over the Internet, it is divided ________ into by a protocol called ________, which also reassembles the data when it reaches its destination. Every device on the Internet uses an IP address ________. addresses are 32 bits long, whereas ________ addresses are 128 bits long, providing billions and billions of possible addresses. Addresses are assigned by ________servers.

Answers

The Internet is based on a U.S. government project called ARPANET.

Today, the Internet is a collection of networks, tied together by common protocols.

Tier 1 networks form the Internet backbone, a system of high-capacity routers and fiber-optic communication links arranged in a hierarchical topology.

Networks that form the Internet are maintained by Internet service providers (ISPs) that offer access to consumers.

Before data travels over the Internet, it is divided into packets by a protocol called IP (Internet Protocol), which also reassembles the data when it reaches its destination.

Every device on the Internet uses an IP address. IP addresses are 32 bits long, whereas IPv6 addresses are 128 bits long, providing billions and billions of possible addresses.

Addresses are assigned by DHCP servers.

Know more about Internet  here:

https://brainly.com/question/2780939

#SPJ11

4.2 Code Practice: Question 2
Instructions
Write a loop that continually asks the user what pets the user has until the user enters rock, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have a dog with a total of 1 pet(s) if they enter dog, and so on.

Sample Run
What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? rock
------------
Sample Output
You have a lemur with a total of 1 pet(s)
You have a parrot with a total of 2 pet(s)
You have a cat with a total of 3 pet(s)

Answers

In python 3:

total = 0

while True:

   pet = input("What pet do you have? ")

   if pet == "rock":

       break

   total += 1

   print("You have a {} with a total of {} pet(s)".format(pet, total))

I hope this helps!

Answer:

pet = input(str("What pet do you have?"))

totalPets = 1

while(pet!="rock"):

  print("You have a " + str(pet) + " with a total of " + str(int(totalPets)) + " pet(s)")

  totalPets = totalPets+ 1

  pet = input(str("What pet do you have?"))

what is the correct way to invoke methods on variables in java that are strings?

Answers

The variable name and the dot (.) notation are the proper syntax to use when calling methods on strings-contained variables in Java.

A string variable can be taken in what way?

The characters must be enclosed in single, double, or triple quotes in order to be turned into a string, which may then be assigned to a variable.

A string value can be assigned to a variable in what way?

When assigning a string, the = operator copies the actual bytes of the string from the source operand, up to and including the null byte, to the variable on the left-hand side, which needs to be of type string.

To know more about variables visit :-

https://brainly.com/question/29897053

#SPJ1

which feature of this module uses conditionals to retum different values?

O A The function parameter
O B The control structure
O C The function call O D The function name

which feature of this module uses conditionals to retum different values?O A The function parameterO

Answers

The control structure module uses conditionals to retum different values.

What is Control structure?

The basic elements of computer programs can be thought of as control structures. These are commands that provide a program the ability to "take decisions," choosing one course over another.

A program is typically not restricted to a linear sequence of instructions because it may split up, repeat code, or skip parts of the process.

Control structures are the building blocks that examine variables and select paths based on parameters.

The basic elements of computer programs can be thought of as control structures. These are commands that provide a program the ability to "take decisions," choosing one course over another.

Therefore, The control structure module uses conditionals to retum different values.

To learn more about control structure, refer to the link:

https://brainly.com/question/27960688

#SPJ2

write a recursive, string-valued method, replace, that accepts a string and returns a new string consisting of the original string with each blank replaced with an asterisk (*)

Answers

The recursive, string-valued method, replace, that accepts a string and returns a new string would be one that checks if the string 's' is empty.

How to write the method?

An example of a recursive method written in Java is :

public class Main {

   public static void main(String[] args) {

       System.out.println(replace("This is a sample string."));

   }

   public static String replace(String s) {

       if (s.isEmpty()) {

           return s;

       } else {

           char first = (s.charAt(0) == ' ') ? '*' : s.charAt(0);

           return first + replace(s.substring(1));

       }

   }

}

In this code, the replace method checks if the string s is empty. If it is, it simply returns the empty string (this is the base case of the recursion). If s is not empty, it checks if the first character of s is a blank space.

Find out more on recursive method at https://brainly.com/question/31313045

#SPJ4

does unturned game is good for low end PC that without graphics card?​

Answers

Answer:

What are your current PC specs and what operating system are you using?

Explanation:

Below are the minimum/recommended system requirements for Windows:

Minimum requirements:

OS: Windows 7 SP1+

Processor: 2 GHz

Memory: 4 GB RAM

DirectX: Version 10

Storage: 4 GB available space

Recommended Requirements:

OS: Windows 10 64-bit

Processor: 3 GHz

Memory: 8 GB RAM

DirectX: Version 11

Network: Broadband Internet connection

Storage: 6 GB available space

To  check your specs (Windows):

1. Right-click on the Windows start menu icon on the bottom left-hand side of your screen.

2. Click on ‘System’ in the menu that pops up.

3. Next to ‘Device/Windows Specifications’ it will list all the information

Saving a file as a new filename can be accomplished through the Save As dialog box.

True False

Answers

Answer:

True.

Explanation:

A dialog box is a small window that serves as a controlling element in computers. The name dialog box is suggestive that it is a window that helps the user to communicate and response with an answer.

There are several types of common dialog box such as open dialog box, save as dialog box, print dialog box, etc.

Save as dialog box is a window that enables the user to save a file with a new name and new location. Save as dialog box can be opened by going to the File menu and click Save as. After the Save as dialog box appears, the user is able to change file name, location, etc.

Thus the statement is true.

you are connecting a switch to a router. you just made a cable with each end configured differently, one 568a and the other 568b. when you plug in the cable, the devices cannot communicate. what is the most likely cause?

Answers

The most likely cause for the devices not being able to communicate when connecting a switch to a router with a cable that has one end configured as 568A and the other end configured as 568B is a mismatch in wiring standards.

What are the 568A and the 568B wiring?

The 568A and 568B are two different wiring standards used for Ethernet cables. In order for devices to communicate properly, both ends of the cable need to follow the same wiring standard.

Considering the given situation, maintaining uniformity in the wiring standard used on both ends of the cable would be the best course of action. Either utilize a pre-made cable with consistent wiring standards with either 568A or 568B on both ends or re-terminate one end of the cable to match the same standard as the other end.

Learn more about Ethernet cables at: https://brainly.com/question/30360112

#SPJ14

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

Which view would you need to use to make
changes to the design theme for the entire
presentation?

• Handout master
• Notes master
• Normal
• Slide master

Answers

Answer:

the answer is Slide Master

Explanation:

I just got it. I couldn't find my notes but it is right.


How can you ensure you don't go over your budget?
Find a friend that enjoys going shopping
Round up your expense estimates to add a buffer
Use most of your budget for entertainment
expenses
Buy all of your wants at one time.

Answers

Round up your experience estimates to add a buffer.

Answer:

second one

Explanation:

What is the output of the following line of code? print (“I\tLove Python”)

Answers

Answer: it will print:

I (4 spaces) Love Python

Explanation: the \t adds in a tab (4spaces) in a print statement

What is the output of the following line of code? print (I\tLove Python)
What is the output of the following line of code? print (I\tLove Python)

scheduling is approximated by predicting the next CPU burst with an exponential average of the measured lengths of previous CPU bursts.

Answers

SJF scheduling is approximated by predicting the next CPU burst with an exponential average of the measured lengths of previous CPU bursts.

What is SJF in operating system?

SJF is a term that connote Shortest Job First. It is said to be a type of CPU scheduling whose algorithm is linked with each as it is said to process the length of the next CPU burst.

Note that for one to be able to know the time for the next CPU burst to take place, one need to take the SJF into consideration as that is its function.

Hence, SJF scheduling is approximated by predicting the next CPU burst with an exponential average of the measured lengths of previous CPU bursts.

See options below

A) Multilevel queue

B) RR

C) FCFS

D) SJF

Learn more about scheduling from

https://brainly.com/question/19309520

#SPJ1

When creating a flowchart or pseudocode representation of a task, what type of structure is one in which one step follows another unconditionally

Answers

The type of structure in which one step follows another unconditionally is called a "sequence structure".

What is a Sequence Structure?

A sequence structure is a basic programming construct used to represent a series of steps that must be executed in a specific order, one after the other.

Each step in the sequence is executed unconditionally, meaning that it will always be executed, regardless of any other conditions or inputs.

Hence, it can be seen that in a sequence structure, the steps are executed in the order in which they are presented, without any conditions or branching.

Read more about flowcharts here:

https://brainly.com/question/6532130

#SPJ1

Mary is making some shirts for her school's drama department. The fabric store has yards of the fabric she wants in stock. But this quantity of fabric can make only shirts. What length of fabric does Mary need to buy if she wants to sew 2 shirts?

A.

yards

B.

yards

C.

yards






nuts in me yum

D.

yards

Answers

Mary needs to buy 4 yards of fabric if she wants to sew 2 shirts.

Mary needs to buy 4 yards of fabric if she wants to sew 2 shirts. Since the given quantity of fabric can only make 1 shirt, she would need to double that amount to accommodate the production of 2 shirts. Each shirt requires a certain length of fabric to cut out all the necessary components, including the front, back, sleeves, and any additional details. By purchasing 4 yards of fabric, Mary ensures that she has enough material to complete both shirts without running out. This accounts for any variations in fabric patterns, potential mistakes during cutting, and allowances for seams and hems. Having a sufficient quantity of fabric eliminates the risk of not having enough to complete the second shirt, ensuring that Mary can successfully sew 2 shirts for her school's drama department.

learn more about production here:

https://brainly.com/question/14143888

#SPJ11

What is the difference between static ip and dynamic ip?

Answers

A device's IP address does not change when given a static IP address. The majority of devices employ dynamic IP addresses, which the network issues to new connections and alter over time.

What use does dynamic IP serve?An ISP will let you to use a dynamic IP address for a brief period of time. A dynamic address may be automatically given to another device if it is not already in use. DHCP or PPPoE are used to assign dynamic IP addresses.For companies that host their own websites and internet services, static IP addresses are optimal. When distant employees are using a VPN to access the network at work, static IP addresses also perform effectively. For the majority of users, dynamic IP addresses are typically OK.A device's IP address does not change when given a static IP address. The majority of devices employ dynamic IP addresses, which the network issues to new connections and alter over time.

To learn more about dynamic ip refer to:

https://brainly.com/question/14234787

#SPJ4

Write a program that calculates the amount of money a person would earn over a period of time if his or her salary is on one penny the first day, two pennies the second day and continues to double each day. The program should ask the user for the number of days. Display a table showing what the salary was for each day, then show the total pay at the end of the period. The output should bd displayed in a dollar amount, not the number of pennies. Must use for loop statement. Need to check the input value is correct, otherwise an error message is displayed. Display a nicely formatted table. Display the salary in dollar and cents

Answers

The program that calculates the amount of money a person would earn over a period of time if his or her salary as well as other factors inclusive is written below.

What is the program about?

The raw form of the program is:

#include <iostream>

using namespace std;

int main(){

   const int increment=2;

   int day;

   float penny=.01,

          total=0.0;

   cout <<"How many days have you worked? ";

   cin  >>day;

   while (day<1){

       cout<<"The number must be greater than 1.\n";

       cout<<"Enter again: ";

       cin >> day;

   }

   for (int i=1; i<=day;i++){

       total+=penny;

       cout <<" Day "<< i <<" "<< " $"<<penny<<endl;

       penny*=increment;

   }

    cout<<"Total salary for  "<<day <<" days = $" <<total<<endl;

Learn more about program from

https://brainly.com/question/23275071

#SPJ1

You are working as a Software Developer at ‘MaxWare’, a company
specializing in developing software that mainly follows the
object-oriented paradigm. Your newest client "Meals on Wheels" is
co

Answers

As a Software Developer at MaxWare, it is your responsibility to develop software that mainly follows the object-oriented paradigm. Your newest client "Meals on Wheels" is concerned about data security and wants to ensure that their data remains safe and secure from unauthorized access and threats. Therefore, you must design and develop a secure software system for "Meals on Wheels" that meets their requirements and ensures data security.

To develop a secure software system for "Meals on Wheels," you should follow these guidelines:

1. Use a secure coding practice: Secure coding practices are essential to ensure the software system is free from vulnerabilities that hackers could exploit. Therefore, use a secure coding practice to prevent common security flaws in the software system.

2. Encrypt data in transit and at rest: Data encryption is essential to ensure that data is safe from unauthorized access during transmission and when stored. Use SSL or TLS encryption for data in transit and store data in an encrypted form.

3. Implement access control and authorization: Access control and authorization are crucial to prevent unauthorized access to sensitive data. Implement role-based access control and authorization to ensure that only authorized users have access to data.

4. Regularly update software: Regular software updates are essential to keep the software system free from security vulnerabilities and exploits. Therefore, ensure that the software system is regularly updated with the latest security patches and updates.

5. Use intrusion detection and prevention systems: Intrusion detection and prevention systems are essential to detect and prevent security threats. Use an IDS and IPS to monitor the software system and prevent security threats before they can cause any damage.

By following these guidelines, you can develop a secure software system for "Meals on Wheels" that meets their requirements and ensures data security.

To know more about Software Developer visit:

https://brainly.com/question/3188992

#SPJ11

about "How can computer help us in our life?​

Answers

Answer:

Explanation:

Computer also facilitate comfort to our life and provides convenience. For transportation, it facilitate the way people travel. Airways, Roadways and waterways uses computers to control their operation. It saves time and relieve severity of traveling difficulties.

A collection of entries posted on a web site and displayed in reverse chronological order (from newest to oldest entries), is known as: А social collaboration. B media sharing. С a blog D a tweet.​

Answers

A) Social Collaboration

Social Collaboration is a way for people to combine their information and make it easier to go through and to work well as a team.

what is full form COMPUTER????​

Answers

Explanation:

The full form of the Computer is Common Operating Machine Purposely Used for Technological and Educational Research.

Explanation:

The computer full form of common opreating machine purposely used for technical educational research

I hope you helps:)

Very complex type of processing is carried out by a which computer.

Answers

Supercomputers are used to process very complex type of processing. They are very powerful computers.

What are supercomputers?

Supercomputers are powerful computers that have very high processing and performance. They work very fast with in a fraction of second. They are used to doing heavy calculation and work.

Thus, the supercomputers are used to process very complex type of processing.

Learn more about supercomputers

https://brainly.com/question/23126369

#SPJ1

Other Questions
Use the region in the first quadrant bounded by x, y=2 and the y-axis to determine the volume when the region is revolved around the line y = -2. Evaluate the integral.A. 18.667B. 17.97C. 58.643D. 150.796E. 21.333F. 32.436G. 103.323H. 27.4 Select all that apply.Two different clothes detergents are on sale at Shop Mart. Clean White is priced at $8.63 for 32 fluid ounces. Clean Bright is priced at $7.20 for 24 fluid ounces. Which ratio tables are correct?is it a, b, c, or d? selections in the image below please be expert verified please if u don't know u don't know don't troll me In addition to product life cycle, product designers must also decide whether to consider __________ in their initial design work decision making.StandardizationDifferentiationUniquenessCharacteristic A mother finds out that her son is red-green color-blind. She is not color-blind. What can you conclude about her genotype? A copper telephone wire has essentially Help plzzzzzzzz Type the correct answer in the box. Spell all words correctly.Complete the sentence describing an analog signal.An analog video is a video signal transmitted by an analog signal, captured on a _____. Under the reign of Louis XIV, the government in France was a/an 4.why did the chinese government relax the hukou system in the 1980s? what have been the demographic implications of that decision? why are weak abdominal muscles frequently blamed for lower back pain? One day, the tank was filled with 330 cubic feet of water. The height of the water was what fraction of the height of the tank? Show your reasoning. which composer transformed the leipzig gewandhaus orchestra into one of europe's finest? To all those people being bullied- To all those people who have lost a loved one- To all those people who have lost a pet- To all those people being abused- To all those people going through depression- To all those people with anxiety- To all those people in poverty- To all those people going through a breakup- To all those people having a bad day- To all those people with insecurities- To all those people just having a hard timeDont forget- Your weakness today- Is your strength tomorrow- It always gets better- Your loved ones will remain in your hearts- You always have the memories- Love yourself- Stand up for yourself- Money cant buy happiness- Those lovers- Just werent right- Dont abuse yourself- Dont abuse others- Kill them with kindness- Treat people with kindness- Weve all had these times- There will always be a hole in our chestsBut- Lets all be each others strength- whether youre- Black- White- LGBTQ+- Christian- Atheist- Etc- Love yourself- Love others- Dont cut- Dont kill- Dont criticize- Dont beg- Dont do drugs- Dont starve yourself- Dont starve othersWe arent supposed to do any of that- Just keep your strength- Keep your faith- Dont change because you were told to- Be yourself- Sometimes playing a character,isnt the best thing to do. Have a great day,and dont stop spreading awareness about things that are happening currently in the world . this is not my text, that however doesn't mean that I don't agree with every single word said here. out of experience, it destroys people. Please don't be afraid to ask for help.Please, I beg you, please don't do it. You are worth it and there are people who love you.I need everyone to pass this on. what is the fractional equivalent of the repeating decimal 0.7? essay should plastic be banned What is the ICD-10 code for PAD with claudication? What is meant by the "Underutilization of employees" and what role does in play in Lean Production in manufacturing? The first hexagon is dilated to form the second hexagon.Select answers from the drop-down menus to correctly complete the statements.the scale factor is 0.80 or 1.25this represents a reduction or an enlargement Given F(4)=3,F(4)=2,F(5)=7,F(5)=4 and G(3)=2,G(3)=4,G(4)=5,G(4)=1, find each of the following. (Enter dne fo any derivative that cannot be computed from this information alone.) A. H(4) if H(x)=F(G(x)) B. H(4) if H(x)=F(G(x)) C. H(4) if H(x)=G(F(x)) D. H(4) if H(x)=G(F(x)) E. H(4) if H(x)=F(x)/G(x) Find the scalar and vector projection of a onto b if a = (-1, 3, 2), b = (3, 2, -6) 1. comp ba = __2. proj ba = __, __, __(enter integers or fractions)