a) π c name (σ room='R236' ∧ meets_ at>= '08:00:00' ∧ meets_ at<='19:00:00' (Class))
b) π major, age (σ s name='Jenny Walker' (Student))
c) π fid (Faculty) - π fid (Class)
d) π c name (σ room='R128' ∨ room='R15' (Class))
e) π s num (σ c name='Database Systems' (Enrolled)) ∩ π s num (σ c name='Operating System Design' (Enrolled))
f) π f name, c name, meets_ at ((Faculty ⋈ Class) ⋈ Enrolled) ⋈ (σ s name='Juan Rodriguez' (Student))
g) π s name ((Enrolled ⋈ Enrolled) - π s num (Enrolled))
h) π s name (Student) - π s name (Enrolled)
i) ρ DS(π s num (σ c name='Database Systems' (Enrolled)))
(Student ⋈ DS) ⋈ (avg(age))
j) π c name (σ c name LIKE 'D%' ∧ |(Enrolled) > 2 (Class))
k) ρ IT(π c id (Faculty ⋈ σ f name='Ivana Teach' (Class)))
ρ SIT (π s num (Enrolled ⋈ IT))
(Student ⋈ σ s num=SIT. c id (Student)) ⋈ (max(age))
l) π c name (σ room='R128' ∨ |(Enrolled) >= 5 (Class))
m) π f name, fid ((Faculty ⋈ Class) - π fid ((Faculty ⋈ Class) ⋈ ((Faculty ⋈ Class) - π cname (Class))))
n) π s name (σ major='Computer Science' (Student))
o) π s name, major (σ |(Enrolled) > 4 (Student ⋈ Enrolled))
a) σ(room='R236' ∧ meets_ at >= 8:00 ∧ meets_ at <= 19:00)(Class)
b) π(major, age)(σ(s name='Jenny Walker')(Student))
c) π(fid)(Faculty) - π(fid)(Class)
d) π(c name)(σ(room='R128' ∨ room='R15')(Class))
e) π(s num)(σ(c name='Database Systems')(Enrolled)) ⋂ π(s num)(σ(c name='Operating System Design')(Enrolled))
f) π(f name, c name, meets _at)(Faculty ⨝ (π(fid, c name, meets _at)(σ(s name='Juan Rodriguez')(Student ⨝ Enrolled)) ⨝ Class))
g) π(s name)(σ(∃x, y(x ≠ y ∧ x. meets_ at = y. meets_ at))(Student ⨝ Enrolled))
h) π(s name)(Student) - π(s name)(Enrolled ⨝ Student)
i) avg(π(age)(σ(c name='Database Systems')(Student ⨝ Enrolled)))
j) π(c name)(σ(∃count>=2)(Enrolled ⨝ σ(c name like 'D%')(Class)))
k) max(π(age)(σ(f name='Ivana Teach')(Student ⨝ (Enrolled ⨝ (Faculty ⨝ Class)))))
l) π(c name)(σ(room='R128' ∨ (∃count>=5)(Enrolled))(Class))
m) π(f name, fid)(σ(∃count=1)(Faculty ⨝ Class))
n) π(s name)(σ(major='Computer Science')(Student))
o) π(s name, major)(σ(∃count>4)(Student ⨝ Enrolled))
Learn more about Computer Science here;
https://brainly.com/question/20837448
#SPJ11
Choose the best translation: website red correo basura software sitio web
These terms refer to the technological part of online communication. A website network is a collection of websites that are related to each other.
Spam is unwanted messages that are sent over the network.The software refers to the computer software used to carry out specific tasks.A website is an online resource that contains a set of information and digital resources.It is important to know the appropriate terminology in the language in which you are working to avoid confusion and errors. In today's world, where technology and communication play a fundamental role, precision in the translation of technical terms is especially important.
In summary, it is essential to understand and correctly use technical terms in communication related to technology and information technology, as incorrect terminology can lead to confusion and misunderstandings. The proper translation of words and technical terms is fundamental to guarantee a clear and effective understanding of the information, whether in business, academic or personal communication.
Lear More About Software
https://brainly.com/question/28224061
#SPJ11
Answer:
Sitio web
Explanation:
how to get to meters to kilometer
Answer:
The length in kilometers is equal to the meters divided by 1,000.
Explanation:
The length in kilometers is equal to the meters divided by 1,000.
What is the purpose of the 300 Log?
Answer:
The OSHA Form 300 is a form for employers to record all reportable injuries and illnesses that occur in the workplace, where and when they occur, the nature of the case, the name and job title of the employee injured or made sick, and the number of days away from work or on restricted or light duty, if any.
Explanation: brainliest plzzzz!
4. How can a document's organization help us better understand the document's purpose?
Answer:
a document organization can help because it's organized and easy to read on a document.
In Python, why is is the math module useful?
Answer:
The Python math module provides functions that are useful in number theory as well as in representation theory, a related field. These functions allow you to calculate a range of important values, including the following: The factorials of a number. The greatest common divisor of two numbers.
Mark Brainlest
Answer:
in the article The Python math Module: Everything You Need to Know
it states that it "provides functions that are useful in number theory as well as in representation theory, a related field."
Explanation:
To do a return type for a function, you can do the following:
function1(argument: str)->None:
or
function1(argument:str)->str:
or
function2(argument:str)->list:
In the above functions, the return types are None, list and str, or string.
What would be the return type for pathlib.PosixPath be like using the examples above?
pathlib.PosixPath return type?
The return type for `pathlib.PosixPath` would be `pathlib.PosixPath`.
When using type hints in Python, we specify the return type of a function after the arrow `->`. In this case, since `pathlib.PosixPath` is a class representing a POSIX path, the return type of a function that returns an instance of `pathlib.PosixPath` would be `pathlib.PosixPath`.
By including this type hint, it provides clarity to developers and static type checkers about the expected return type of the function. It helps in ensuring type safety and allows for better understanding and documentation of the code. Functions returning `pathlib.PosixPath` can be used in a type-safe manner, leveraging the capabilities and methods provided by the `pathlib` module for POSIX path manipulation.
To know more about Posix related question visit:
https://brainly.com/question/32265473
#SPJ11
GUIDING QUESTIONS
1. What are two ways to effectively reach customers/clients?
Answer:
phone calls
Explanation:
when a customer comes and u keep their data and information.incase of anything u can likely reach them on phone
Select the correct answer. The sum of two numbers is -18. If the first number is 10, which equation represents this situation, and what is the second number? A. The equation that represents this situation is 10 − x = -18. The second number is 28. B. The equation that represents this situation is 10 + x = -18. The second number is -28. C. The equation that represents this situation is x − 10 = -18. The second number is -8. D. The equation that represents this situation is -10 + x = -18. The second number is -8.
Answer:
B. The equation that represents this situation is 10 + x = -18. The second number is -28.
Explanation:
A sum is a number that is calculated by adding together a set of other numbers. The sum of our equation is -18, which means that we will place this number on the right side of the equal sign.
We also know that one of the components of this sum is 10, so that would go on the left.
What we want to find out is what the other part of the sum is. We don't know this yet, but we can't just write the equation as 10 = -18, so we'll put an x in place of our hidden value.
\(10 + x = - 18\)
We already have one part of our answer, so now we need to find the value of x. First, we need to get the x by itself, so we'll subtract 10 from each side of the equation.
\(10 + x = - 18 \\ - 10 \: \: \: \: \: \: \: \: \: \: \: \: - 10 \\ x = - 18 - 10\)
Now we just need to add -18 and -10 together, which would give us -28.
\(x = - 18 - 10 \\ x = - 28\)
The parallax perspective says that objects that are close up appear to move __________ than far away objects.
A. More smoothly
B. More randomly
C. Slower
D. Faster
Answer:
It appears to move faster.
Help FAST PLS in complete sentences discuss the process used to determine your credit score. Do you think it is fair? Why or why not? Make sure to use complete sentences.
Answer:
A fair credit score just means that the credit reference agencies think you're doing an okay job of managing your credit history. ... This means lenders could reject you for some of the best credit cards or loans
how do I fix this plz help will mark brainliast
ram is also called __________________________________________________
Answer:
Alternatively referred to as main memory, primary memory, or system memory, RAM (random-access memory) is a hardware device that allows information to be stored and retrieved on a computer. RAM is usually associated with DRAM, which is a type of memory module.
Explanation:
explain web server?
Answer:
A web server is a computer that runs websites. It's a computer program that distributes web pages as they are requisitioned. The basic objective of the web server is to store, process and deliver web pages to the users. This intercommunication is done using Hypertext Transfer Protocol (HTTP).
What two names are given to UDP blocks of communication?
The two names given to UDP blocks of communication are datagrams and packets.
Datagram refers to a self-contained unit of data that is transmitted over a network and contains all the necessary information for its delivery, including source and destination addresses. It is a fundamental component of the User Datagram Protocol (UDP) that provides an unreliable, connectionless service for transmitting datagrams between network hosts.
A packet, on the other hand, is a similar unit of data that is used in various network protocols, including UDP and TCP (Transmission Control Protocol). A packet contains not only the data to be transmitted but also additional information such as header information, error detection codes, and other control information necessary for its successful transmission and reception. Unlike datagrams, packets can be guaranteed to arrive at their destination, as they are transmitted using connection-oriented protocols like TCP that ensure their reliable delivery.
In summary, datagrams and packets are both essential units of data used in network communication, with datagrams being used in connectionless, unreliable protocols like UDP, and packets being used in connection-oriented protocols like TCP. Understanding the differences between these terms is crucial for network engineers and administrators to effectively manage and troubleshoot network issues.
know more about User Datagram Protocol here:
https://brainly.com/question/20038618
#SPJ11
What is the best way to be notified of changes made to a file or folder?a. Click the padlock icon so that it's locked/closed
b. Move it into a private folder
c. Mark the "Make Private" checkbox under a document's "File Permissions" section
d. Use the built-in file tracking feature
The best way to be notified of changes made to a file or folder is to use the built-in file tracking feature. This feature allows you to monitor changes made to the file or folder and receive notifications when any modifications are made. You can also set up specific alerts or notifications for certain types of changes, such as when a file is deleted or when a specific user makes changes. This is a reliable way to stay informed about any updates or modifications to your files and folders, ensuring that you are always up-to-date and aware of any important changes that may affect your work.
Find the file or folder you wish to keep an eye on.When you do right-click on a file or folder, choose "Properties."The "Security" tab can be found in the Properties box.At the window's bottom, click the "Advanced" button.Select "Auditing" from the menu.On the "Add" button, click.Enter the user or group that you want to keep an eye out for changes in the "Select User, Computer, or Group" window.On the "OK" button, click.Choose the changes you wish to keep an eye on in the "Auditing Entry" window.To save the modifications, click the "OK" button.The Properties window must be closed.Now, whenever a change is made to a file or folder that you are keeping an eye on, you will be notified.You may configure the built-in file tracking capability to track alterations made to a file or folder and receive alerts when any changes are made by following these instructions. This is a dependable approach to keep track of any updates or changes made to your files and folders, ensuring that you are always alerted of any significant changes that might have an impact on your work.
Learn more about the file tracking feature:
https://brainly.com/question/14130419
#SPJ11
1.6
What do you call the two parts of the lift that goes down a mine?
Answer:
Sheave wheel and hoist cable
Explanation:
The sheave wheel is a pulley wheel that sits above the mine shaft. The hoist cable passes over the sheave wheel and then down the shaft of the mine. The sheave wheel reduces the sliding friction of the mine cable. The head frame is the structure that supports the sheave wheel.
The desktop operating system described in this chapter all have an optional character mode . command line interface (
False. The desktop operating systems described in this chapter do not have an optional character mode command line interface.
These operating systems typically have a graphical user interface (GUI) as the primary mode of interaction, which provides a visual representation of the operating system and allows users to interact with it using a mouse, keyboard, and graphical elements such as windows, icons, and menus.
While some of these operating systems may provide a command line interface as an additional option for advanced users or specific tasks, it is not the default or primary mode of interaction.
Some desktop operating systems primarily rely on graphical user interfaces (GUIs) and may not provide a character mode command line interface as an option. It depends on the specific operating system and its design.
To read more about operating systems, visit:
https://brainly.com/question/22811693
#SPJ11
When iterating over a list, a for loop is usually simpler to code than a while loop.
A.
True
B.
False
Answer:
A
Explanation:
static methods cannot group of answer choices invoke other static methods reference other objects reference any data invoke other non-static methods reference non-static instance data
Static methods can reference other static methods, reference any data, and reference non-static instance data. They cannot invoke other non-static methods or reference other objects.
What is Data?
Data is information that is collected and organized to be analyzed for a specific purpose. Data can be found in a variety of forms, such as numbers, words, measurements, observations, and even images. Data is typically collected from multiple sources, such as surveys, experiments, or other forms of research. The data is then organized and analyzed to draw conclusions, test hypotheses, or identify patterns. Data can also be used to develop predictions or to inform decisions.
To know more about Data
https://brainly.com/question/30395228
#SPJ4
What actions can you take to ensure the physical security of network devices?
Answer:
Here are some steps you can take to make sure your network is secure:
Take physical precautions. ...
Make sure all of your server's security features are enabled. ...
Use both hardware and software firewalls. ...
Install the latest version of your server's software. ...
Guard passwords. ...
Be Wi-Fi savvy.
Explanation:
PLEASE MARK ME AS BRAINLIEST
What makes a sequence of database operations a transaction? All database operations must either complete in its entirety or have no effect Atomicity, Consistency, Isolation, Durability All results must conform to existing constraints in the database Database operations cannot be transactions
Answer:
All database operations must either complete in its entirety or have no effect Atomicity, Consistency, Isolation, Durability
Explanation:
A database transaction must be atomic in the sense that it must either be complete in its entirety or would have no effect. Consistent-it should be by conforming to the constraints that are found in the database. Isolated - in the sense that it must not be seen to affect other transactions. Durable – there must be possibility for it to be written to a storage that is persistent.
The sequence of the database operations is made as a transaction as all the database operations must either complete in its entirety or have no effect Atomicity, Consistency, Isolation, Durability.
What is database transaction?The database transaction must fulfill all four characters, that is must be atomic- it should be complete within itself; it should be consistent- conforming to the existing database; it should have isolation- not affecting other transactions; and should have durability- for longer storage.
Therefore, option A. is correct.
Learn more about database, here:
https://brainly.com/question/1160209
#SPJ5
you have just partitioned a new disk into three volumes and formatted them with ntfs. you want to be able to access these volumes as folders on the current c: drive. what feature can you use?
The feature you can use is volume mount points. A drive or volume in Windows that is mounted to a folder using the NTFS file system is referred to as a volume mount point.
A drive or volume in Windows that is mounted to a folder using the NTFS file system is referred to as a volume mount point. Instead of a drive letter, a mounted drive is given a drive route. You can go above the 26-drive-letter limit with volume mount points. You can graft, or mount, a target partition onto a directory on another physical disk by using volume mount points.
The verification server and the mount point must be either dedicated or shared. You have the option to provide an NTFS directory or choose the option "Automatically assign available drive letter" when choosing Mount Point in Verification Settings.
The root of the provided mount point directory must also be in a clustered LUN if the verification server or the clone destination is a clustered instance. The mount point directory also has to be NTFS dedicated if the verification server or the clone target are independent servers.
To know more about volume mount point click here:
https://brainly.com/question/14096584
#SPJ4
Match term to description.
Primary storage for most computers, it often goes by the drive letter C. Today, the typical capacity for this type of storage is 500 gigabytes to 2 terabytes or more.
1 Choose. A type of optical storage generally used for music or data. The capacity for this type of storage is approximately 700 megabytes.
2 Choose. A type of optical storage generally used for movies or data. The capacity for this type of storage is in the range of 4. 7 to 8. 5 gigabytes
3 Choose. A type of solid-state storage, this device connects to the computer through a USB port. Common capacities are 8 GB to 256 GB though two terabyte drives are now available.
4 Choose. A place to plug in a secondary circuit board such as a modem or sound card.
5 Choose. The primary circuit board; everything must eventually connect to this component.
6 Choose. An external connection point where devices may be plugged into the computer.
7 Choose. Pathways on the motherboard over which data can travel from place to place
8 Choose. Contains instructions to get the computer started and the operating system loaded into RAM (non-volatile; read-only)
9 Choose. The primary microchip inside the computer, it oversees the operations of the computer and executes instructions
Primary storage for most computers, typically referred to as the C drive, has a capacity ranging from 500 gigabytes to 2 terabytes or more.
Optical storage used for music or data has a capacity of approximately 700 megabytes.
Optical storage used for movies or data has a capacity in the range of 4.7 to 8.5 gigabytes.
Solid-state storage that connects to the computer via a USB port has common capacities of 8 GB to 256 GB, with two terabyte drives now available.
A slot or connector on the motherboard where secondary circuit boards, such as modems or sound cards, can be plugged in.
The motherboard is the primary circuit board where all components of the computer connect.
An external connection point on the computer where devices can be plugged in, such as USB ports.
Pathways on the motherboard that allow data to travel between different components of the computer.
Read-only memory (ROM) contains the instructions to start the computer and load the operating system into RAM.
The central processing unit (CPU) is the primary microchip inside the computer that oversees operations and executes instructions.
In summary, the matching terms are as follows:
Primary Storage
Optical Storage for music or data
Optical Storage for movies or data
Solid-State Storage (USB-connected)
Slot for secondary circuit board
Motherboard
External connection point
Pathways on the motherboard
Read-only memory (ROM)
Central Processing Unit (CPU)
learn more about Primary storage here:
https://brainly.com/question/520781
#SPJ11
With bluetooth printing, the computer and printer need to be within an approximate ______-foot range.
The wireless technology used by Bluetooth printers can be set up to work with iOS, Android, and Windows devices. These systems use 2.4GHz low-power radio waves to convey data.
What does the term "wireless printer" mean?Wireless printers, also referred to as WiFi printers, may connect to a network without the need for a hard connection or cable. The laptops, cellphones, and tablets linked to a WiFi network can print to a wireless printer once it has been connected to the network.
Is a Bluetooth printer available? Inkjets, lasers, and even multifunction devices that print, scan, and copy are all options. A Bluetooth printer is the best option if you want a printer that can go anywhere you do and work with your laptop or other mobile devices.
If the network is congested, if there is network interference, or if the signal strength is weak, Wi-Fi printers may experience lengthy print times and print problems. With Bluetooth, printing is rapid and interference-free.
The two most common types of wireless printers are Bluetooth and Wi-Fi. Although Bluetooth is easy to set up and use, it is best suited for small offices with a small number of users. Wi-Fi can accommodate more users across a wider area, but it requires more time to set up.
To Learn more About Bluetooth printer, Refer:
https://brainly.com/question/27408724
#SPJ1
Type Souvenir Program in cell A8.
Type Soundtrack CD in cell A9, and then press ENTER [remaining data will autocomplete].
Select cell A1 and then spell check the worksheet. When prompted, change the misspelling of Suivineer to Souvenir.
The souvenir program contains information and pictures, including the official list of the passers of the CPA Board examinations, the top performing schools, the list of the examination top notchers, and write-ups on the BoA programs.
To perform the task using the terms "Souvenir program" and "soundtrack CD,"
1. Click on cell A8 in your worksheet.
2. Type "Souvenir Program" (without quotes) and press ENTER.
3. Click on cell A9 in your worksheet.
4. Type "soundtrack CD" (without quotes) and press ENTER. The remaining data will autocomplete if necessary.
5. Select cell A1 to begin the spell check process.
6. Click on the "Review" tab in the toolbar, and then click on "Spelling" or press F7.
7. When prompted, change the misspelling of "Suivineer" to "Souvenir" by selecting the correct suggestion or typing it manually.Now your worksheet should have the correct terms "Souvenir Program" in cell A8 and "Soundtrack CD" in cell A9, with the misspelling fixed.
Learn more about Souvenir Program: https://brainly.ph/question/18245304
#SPJ11
C++
Suppose that ch1, ch2, and ch3 are char variables, n is an int variable, and the input is:
B 29 17
What are the values after the following statement executes?
cin >> ch1 >> ch2 >> ch3 >> n;
1 . ch1 = 'B', ch2 = '2', ch3 = '9', n = 17
2. ch1 = 'B', ch2 = '\n', ch3 = '2', n = 9
3. ch1 = 'B', ch2 = ' ', ch3 = '2', n = 9
4. ch1 = 'B', ch2 = ' ', ch3 = '2', n = 17
The values of ch1, ch2, ch3 and n are as follows after the statement cin >> ch1 >> ch2 >> ch3 >> n; executes:ch1 = 'B', ch2 = ' ', ch3 = '2', n = 9The option 3: ch1 = 'B', ch2 = ' ', ch3 = '2', n = 9 is the correct option.
The correct option is 3.
In the given C++ statementcin >> ch1 >> ch2 >> ch3 >> n;The input is "B 29 17", so according to the statement, the value of ch1 will be 'B'.Then the input will move to ch2 but 29 is not a character, so only '2' will be assigned to ch2.
The input will then move to ch3 and '9' will be assigned to ch3.At last, the value of n is 17 which will be assigned to n.So the output will be ch1 = 'B', ch2 = ' ', ch3 = '2', n = 9, according to the statement, the value of ch1 will be 'B'.Then the input will move to ch2 but 29 is not a character, so only '2' will be assigned to ch2. This option is present in the given options.
To know more about statement visit:
https://brainly.com/question/17238106
#SPJ11
Need help with these
Answer:
1. D
2. B
3. D
Explanation:
vnasgbaenVmad7kDg Zg
lol do you like this?
Answer:
yea
Explanation:
iii) Imagine a close friend of yours shares with you that they are facing the physical/cognitive/emotional challenges related to gaming/over usage of technology, what would you recommend for them to improve all forms of their health?
If a close friend shares with me that they are facing challenges related to gaming or over-usage of technology that are affecting their physical, cognitive, and emotional well-being, I would recommend the following steps to improve their overall health:
1. Establish boundaries: Encourage your friend to set clear boundaries on gaming and technology usage. This may involve defining specific time limits for gaming or designating technology-free periods during the day.
2. Engage in physical activities: Encourage your friend to participate in regular physical activities, such as exercise, sports, or outdoor activities. Physical exercise not only improves physical health but also releases endorphins, which can positively impact mood and reduce stress.
3. Prioritize mental well-being: Suggest that your friend engages in activities that promote cognitive and emotional well-being, such as reading, pursuing hobbies, practicing mindfulness or meditation, or seeking professional help if needed.
4. Socialize offline: Encourage your friend to spend time with friends and family in person, engaging in meaningful social interactions. Face-to-face connections can provide emotional support and help reduce excessive reliance on technology.
5. Seek balance and diversify interests: Encourage your friend to explore new hobbies, interests, or activities outside of gaming and technology. Developing a range of interests can provide a sense of fulfillment, enhance cognitive abilities, and reduce dependency on digital entertainment.
It is important to approach the situation with empathy, understanding, and support, emphasizing the importance of a balanced and healthy lifestyle.
For more questions technology, click on:
https://brainly.com/question/7788080
#SPJ8
a program which randomly picks 5 cards from a deck. explain what functions of the deck are being utilized.
A program which randomly picks 5 cards from a deck. Explain what functions of the deck are being utilized.:A deck in programming is essentially an array of cards or an object. The deck can contain cards, as well as various functions that manipulate cards within the deck.
A program that selects five random cards from a deck is an excellent example of utilizing the function of a deck in a program.In order to pick five random cards from a deck in programming, the following functions of a deck are being utilized:1. Shuffling Function:In programming, shuffling is one of the most frequently used deck functions. The shuffle function is utilized to randomly rearrange the card order in the deck. It is critical to ensure that the deck is randomized before it is used to choose any cards, otherwise the result will not be truly random.2. Select Function:The select function is another vital function of a deck. It is responsible for choosing a specific number of cards from the deck. In this case, the select function is used to select five cards randomly from the deck.3. Remove Function:The remove function, or any other function that extracts cards from a deck, is used after the select function has chosen the desired number of cards. The remove function is utilized to remove the selected cards from the deck so that they do not appear again during the selection process.:
In the above problem, a program selects five random cards from a deck. A deck is an array of cards or an object in programming. It can contain cards as well as various functions that manipulate cards within the deck.In order to pick five random cards from a deck in programming, we use the following functions of a deck:1. Shuffling FunctionIn programming, shuffling is one of the most frequently used deck functions. The shuffle function is utilized to randomly rearrange the card order in the deck. It is critical to ensure that the deck is randomized before it is used to choose any cards, otherwise the result will not be truly random.In this program, we must use the shuffle function before selecting any cards from the deck. This will ensure that the cards are arranged randomly, and the five cards chosen will be truly random.2. Select FunctionThe select function is another vital function of a deck. It is responsible for choosing a specific number of cards from the deck. In this case, the select function is used to select five cards randomly from the deck.Once the shuffle function has randomized the deck, we can use the select function to pick five random cards from the deck.3. Remove FunctionThe remove function, or any other function that extracts cards from a deck, is used after the select function has chosen the desired number of cards.
To know more about program visit :
https://brainly.com/question/30613605
#SPJ11