A company transports many chemical Products from one location to another on behalf of a registered Customer. Each transport operation is called a Job, which involves picking up one or more Loads of the same product from a customer's requested start location and delivers it to a customer's requested destination. A

unique number is given for each Job and for each Load when they are created. A Load is transported using a particular Transport Unit, which consists of a lorry, a driver, a container (for carrying the product) and occasionally specialist loading equipment (such as Jacks and Pumps). A container is fixed to a trailer so it needs to be coupled to a lorry at the start of a Job. Transport operations are run from 5 regional Depots. Jobs are allocated to individual depots to service. Depots are usually located near to pick up points such as chemical plants. Depots hold, manage and maintain their own transport units which are permanently allocated to them to

service Jobs. A container, and sometimes associated loading equipment, may on occasions be left at destinations or pick-ups after a Job is finished. But normally transport units are held at the base Depot they belong.


1. draw an ER diagram for the described database.


2.Map the logical data model for the ER diagram you drew in


1 above. Show the resultant relations at each Normal Form up to 3NF


3. Present the physical data model.

Answers

Answer 1

In addition to having precise data types, constraints, and indexes for each attribute in the tables, the physical data model is a reflection of the logical data model.

In programming, a data types defines the type of data that can be stored and manipulated in a program. Common data types include integers, floating-point numbers, characters, strings, and Boolean values. Each data type has a range of possible values and operations that can be performed on those values. For example, integers can be added, subtracted, multiplied, and divided, while strings can be concatenated and searched. Choosing the appropriate data type for a variable is important to ensure that it can store the necessary information and that the program runs efficiently. In addition to built-in data types, many programming languages allow for the creation of custom data types, such as structs and classes, which can be used to represent complex data structures.

Learn more about  Data types here:

https://brainly.com/question/18033010

#SPJ11


Related Questions

A company is monitoring the number of cars in a parking lot each hour. each hour they save the number of cars currently in the lot into an array of integers, numcars. the company would like to query numcars such that given a starting hour hj denoting the index in numcars, they know how many times the parking lot reached peak capacity by the end of the data collection. the peak capacity is defined as the maximum number of cars that parked in the lot from hj to the end of data collection, inclusively

Answers

For this question i used JAVA.

import java.time.Duration;

import java.util.Arrays;;

class chegg1{

 public static int getRandom (int min, int max){

       

       return (int)(Math.random()*((max-min)+1))+min;

   }

public static void display(int[] array){

    for(int j=0; j< array.length; j++){

     System.out.print("   " + array[j]);}

     System.out.println("----TIME SLOT----");

}

public static void main(String[] args){

   int[] parkingSlots= new int[]{ -1, -1, -1, -1, -1 };

   

   display(parkingSlots);

   for (int i = 1; i <= 5; i++) {

     

     for(int ij=0; ij< parkingSlots.length; ij++){

       if(parkingSlots[ij] >= 0){

           parkingSlots[ij] -= 1;

       }

       

       else if(parkingSlots[ij]< 0){

           parkingSlots[ij] = getRandom(2, 8);

       }

       

       

       }

      display(parkingSlots);

   

    // System.out.println('\n');

     try {

       Thread.sleep(2000);

     } catch (InterruptedException e) {

       e.printStackTrace();

     }

   }

   }

}

output:

-1   -1   -1   -1   -1----TIME SLOT----

  8   6   4   6   2----TIME SLOT----

  7   5   3   5   1----TIME SLOT----

  6   4   2   4   0----TIME SLOT----

  5   3   1   3   -1----TIME SLOT----

  4   2   0   2   4----TIME SLOT----

You can learn more through link below:

https://brainly.com/question/26803644#SPJ4

An application is getting downloaded, the total size is 52GB. So the speed of the WiFi is like.. 10mb per second, so the question was, how much time would it take to get downloaded? ​

Answers

Size=52GB=52(1024MB)=53248MBSpeed=10MB/s

Time

\(\\ \tt\longmapsto \dfrac{Size}{Speed}\)

\(\\ \tt\longmapsto \dfrac{53248}{10}\)

\(\\ \tt\longmapsto 5324.8s\)

\(\\ \tt\longmapsto 88.74min\)

\(\\ \tt\longmapsto 1h\:28.7min\)

What are the effects of air pollution on human life.​

Answers

Answer:

Heart disease

Lung cancer

Respiratory infection

Explanation:

Air pollution is very dangerous to human health or contains lots of dust particles and air particulate. When these air pollutants get into the body through different external openings it can be very detrimental to the human body.

what are some possible questions that you think would be helpful for an entrepreneur to ask people who are interacting with their prototype?

Answers

Answer:

What challenges did you encounter while using the prototype, which may have made it difficult to use?

Would you recommend the prototype to others? Why or why not?
What do you think could be improved in the prototype?

Explanation:

These questions are open-ended and allow for the audience at hand to give their personal thoughts and opinions, rather than confining them to yes or no questions that provide little constructive feedback.

In excel online what is it called when you join connecting cells together to span across more than one column and/or row?
Combine
Connect
Merge
Unite

Answers

Answer:

Combinar

Explanation:

Answer:

Merge

Explanation:

eastern europe uses nuclear energy for electricity production at a higher proportion compared to other parts of the world.

Answers

Yes, that is correct that Eastern Europe has a high proportion of nuclear energy use for electricity production compared to other regions in the world.

What is energy?

In the context of coding, energy typically refers to the amount of computational resources (such as CPU cycles, memory usage, or battery life) required to execute a program or perform a specific task. Energy efficiency is an important consideration in the design and development of software, particularly for mobile devices or other systems with limited resources. Improving the energy efficiency of code can help extend battery life, reduce operating costs, and improve performance. Techniques for optimizing energy efficiency include code optimization, reducing unnecessary computations, and minimizing data transfers.

Here,

According to the International Atomic Energy Agency, in 2020, the share of nuclear energy in electricity production was 47% in Eastern Europe, while the global average was 10%.

The countries in Eastern Europe with the highest proportion of nuclear energy use for electricity production include Ukraine, Slovakia, Hungary, and the Czech Republic.

To know more about energy,

https://brainly.com/question/21439267

#SPJ4

Using the sequences x[n]={−5,8,2} and h[n]={3,−1,0,5}, aUse the circular convolution command 'cconv' in MATLAB to compute the 4-point circular convolution. Turn in a copy of your code and the output which you can copy from the Workspace (or from the command window if you leave off the semicolon on the line where you calculate the convolution). b. Add another line to your code to find the output of the circular convolution command in the previous part if you do not specify the number of points for the circular convolution . This is the same as the linear convolution. Turn in a copy of the output.

Answers

The code in MATLAB to compute the 4-point circular convolution is in the explanation part below.

Here's an example MATLAB code that uses the above sequences to execute circular and linear convolution:

% Circular convolution

x = [-5, 8, 2];

h = [3, -1, 0, 5];

conv_circular = cconv(x, h, 4);

disp('Circular Convolution:');

disp(conv_circular);

% Linear convolution

conv_linear = conv(x, h);

disp('Linear Convolution:');

disp(conv_linear);

Thus, in this code, we define the input sequences x and h.

For more details regarding MATLAB, visit:

https://brainly.com/question/30763780

#SPJ4

Help!! Its not working at all and idk what to do!

Help!! Its not working at all and idk what to do!

Answers

Answer:

1st. Let the teacher know

2nd. Check your internet

3rd. Make sure all other tabs are closed

Explanation:

This always helps me I hope it helps you too !! :3

The conflicts between design efficiency, information requirements, and processing speed are often resolved through ____.

Answers

The conflicts between design efficiency, information requirements, and processing speed are often resolved through trade-offs.

For example, in designing a computer system, the hardware and software engineers may seek a processing speed that is as fast as possible while the system's users and information analysts may want to perform complex computations, graphics rendering, and data mining that require substantial processing power and storage capacity.

The designers may also seek to keep the system's power consumption, size, and cost within reasonable bounds, while the users and analysts may want more capabilities and features, more data inputs and outputs, and more integration with other systems. Overall, the resolution of conflicts between design efficiency, information requirements, and processing speed requires a careful balancing of trade-offs that takes into account the needs and preferences of all stakeholders, as well as the technological and economic constraints of the system.

To know more about technological visit:

https://brainly.com/question/9171028

#SPJ11

Jesse purchases a new smartphone and is immediately able to use it to send a photo over the Internet to a friend who lives in a different country. Which of the following is NOT necessary to make this possible?

Answers

Since Jesse is able to use it to send a photo over the Internet to a friend who lives in a different country,  the option that is not necessary to make this possible is option B:  A single direct connection is established between any two devices connected to the Internet.

What Exactly Is a Direct Connection?

In a direct connection, a cable is used to connect one computer to another computer, as opposed to using a network. Perhaps a crossover cable is being used in place of an Ethernet switch in this instance. Compared to using a network, this type of connection is often quicker.

Note that ISP stands for Internet Service Provider  by its  definition. The datacenter serves as the ISP if a server receives its internet from there. Because there is no single entity that owns the internet, servers do not connect "directly" to it.

Therefore,  A network solution called Direct Connect offers an alternative to using the Internet to access AWS cloud services.

Learn more about direct connection from

https://brainly.com/question/14102796
#SPJ1

See full question below

.

Jesse purchases a new smartphone and is immediately able to use it to send a photo over the Internet to a friend who lives in a different country. Which of the following is NOT necessary to make this possible?

answer choices

Both devices are using the same shared and open protocols

A single direct connection is established between any two devices connected to the Internet

The data of the image is routed through a sequence of directly connected devices before arriving at its destination.

Both devices are directly connected to at least one part of the Internet

You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices

Answers

Complete Question:

You administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. You want the routers on the network to send you notices when they have exceeded specified performance thresholds. Which protocol should you use to enable the routers to send the notices?

Group of answer choices

A. ARP

B. SMTP

C. SNMP

D. Telnet

Answer:

C. SNMP.

Explanation:

In this scenario, you administer your company's 100BaseTX Ethernet network. TCP/IP is the networking protocol used on the network. Also, you want the routers on the network to send you notices when they have exceeded specified performance thresholds. Hence, you should use the SNMP to enable the routers to send the notices.

SNMP is an acronym for simple network management protocol, which is a standardized application-layer protocol that is used for monitoring and organizing management information about network devices on either a wide area network (WAN) or local area network (LAN).

Basically, the SNMP helps to provide a common language for network devices such as switches, routers, printers, servers etc to share information with a network management system.

A simple network management protocol (SNMP) is part of the Transmission Control Protocol and Internet Protocol (TCP⁄IP) suite.

what describes an ipv6 address of ::1? loopback broadcast public multicast see all questions back next question

Answers

An IPv6 address of ::1 is a loopback address.

IPv6 is the Internet Protocol version 6, a new version of IP that is based on IPv4. IPv6 addresses are 128 bits in length, and they are written in a hexadecimal form separated by colons.IPv6 addresses come in three forms: Unicast, Multicast, and Anycast.

A loopback address is a unique IP address that is utilized to check network software without having to use the network. As a result, no physical device is required to use it. A loopback address is also known as a virtual IP address.::1 is the loopback address in IPv6, which is similar to 127.0.0.1 in IPv4.

To know more about IPV6 Address of ::1; https://brainly.com/question/31103106

#SPJ11

Please help me on this

Please help me on this

Answers

Runs application layer - proxy firewall
Monitors data packet - packet filter firewall
Examines network connections - state fuel inspection firewall

This is what is think.

Tactic, technique, or procedure (TTP) is a generalized statement of adversary behavior. Which would prove TTP is found on an organization's network?

Answers

The presence of TTP on an organization's network can be determined by observing specific indicators or evidence of adversary behavior.

This can include detecting patterns, signatures, or activities that align with known TTPs used by adversaries. By analyzing network logs, system events, and security alerts, security analysts can identify TTPs such as specific attack methods, tools, or behaviors employed by threat actors. Additionally, threat intelligence and information sharing can help in identifying TTPs by comparing known adversary tactics with the observed activities on the network.

You can learn more about network at

https://brainly.com/question/28342757

#SPJ11

Does public domain status allow the user of the material unrestricted access and unlimited creativity and can it be used freely by anyone

Answers

Yes, public domain material can be used freely by anyone without restriction, including for commercial purposes. Public domain material is not protected by copyright and does not require attribution. However, it is always good to verify the public domain status of a work before using it, as the laws around public domain can vary by jurisdiction.

An object is identified by its
characteristics
state
class
attribute​

Answers

Answer:

Characteristics is the correct answer to the given question .

Explanation:

The main objective of object is for accessing the member of class .When we have to access the member of class we can create the object of that class The object  is is identified by there characteristics.The characteristics describe the behavior and state of a class.

With the help of class and object we can implement the real world concept .The object is the run time entity of a class where as the class is physical entity .Without the object we can not implemented the object oriented programming.All the other option are not correct for the object because they are not described the identification of object .

Which features of Word are used to separate numbers and text into columns? Check all that apply.
ruler
Tab key
left tab
right tab
decimal tab

Answers

Answer:

ruler and decimal tab

Explanation:

The features of Word are used to separate numbers and text into columns are the ruler and the decimal tab.

In order to split text into columns, the following processes are required:

The user has to open the document.Then, one will select the page layout tab.The user will click on columns command in the page setup group.Then, there is a list of options that's used in splitting the text into columns.Then, the user will select the desired option.

In conclusion, the correct options are A and E.

Read related link on:

https://brainly.com/question/8950542

A Card class has been defined with the following data fields. Notice that the rank of a Card only includes the values from Ace - 10 (face cards have been removed):

class Card {

private int rank; // values Ace (1) to 10
private int suit; // club - 0, diamond - 1, heart - 2, spade - 3

public Card(int rank, int suit) {
this.rank = rank;
this.suit = suit;
}
}

A deck of cards has been defined with the following array:

Card[] cards = new Card[40];

Which of the following for loops will populate cards so there is a Card object of each suit and rank (e.g: an ace of clubs, and ace of diamonds, an ace of hearts, an ace of spades, a 1 of clubs, etc)?

Note: This question is best answered after completion of the programming practice activity for this section.

a
int index = 0;
for (int suit = 1; suit < = 10; suit++) {
for (int rank = 0; rank < = 3; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}

b
int index = 0;
for (int suit = 0; suit < = 4; suit++) {
for (int rank = 0; rank < = 10; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}

c
int index = 0;
for (int rank = 1; rank <= 10; rank++) {
for (int suit = 0; suit <= 3; suit++) {
cards[index] = new Card (rank, suit);
index++;
}

d
int index = 0;
for (int suit = 0; suit < = 3; suit++) {
for (int rank = 1; rank < 10; rank++) {
cards[index] = new Card (rank, suit);
index++;
}
}

Answers

Answer: b

Explanation: i did this one!!!!!!!!!!

When you instruct a computer or mobile device to run an application, the computer or mobile device answer its software, which means the application is copied from storage to memory?

Answers

I believe loads

not for sure what the question is

To say that a c# application is event-driven means that it responds to? a. user events only b. class events only c. application events only d. user events and other types of events

Answers

To say that a C# application is event-driven means that it responds to a variety of events, including user events and other types of events. In C#, events are used to trigger actions or behaviors in response to certain occurrences.

These occurrences can be initiated by user interactions, such as clicking a button or typing in a textbox, or they can be triggered by other events happening within the application or the system.

User events, such as button clicks or keystrokes, are a common type of event that a C# application can respond to. These events are typically associated with user interfaces and are used to capture user input and perform corresponding actions.

In addition to user events, a C# application can also respond to other types of events. These can include system events, such as a change in the system's state or a notification from the operating system, or class events, which are events specific to a particular class or object within the application.

The event-driven nature of C# allows developers to create applications that are interactive and responsive. By responding to events, the application can react to user input and dynamically update its behavior accordingly.

In summary, a C# application is event-driven, meaning it responds to a variety of events, including user events and other types of events such as system events or class events.

Learn more about C# application here:-

https://brainly.com/question/33043620

#SPJ11

the ____ is the parent organization for all the various internet boards and task forces.

Answers

The Internet Engineering Task Force (IETF) is the parent organization for all the various Internet boards and task forces

The Internet Engineering Task Force (IETF) is a large, open, international community of engineers, researchers, and other professionals concerned with the evolution and smooth operation of the Internet. The IETF is responsible for the development and promotion of Internet standards, as well as the discussion and resolution of technical issues related to the Internet. The IETF operates through working groups, which focus on specific technical issues and develop proposed solutions, or "Internet drafts." These drafts are then reviewed by the broader community, revised as necessary, and ultimately published as "Request for Comments" (RFCs), which are the official standards for the Internet.

The IETF is not the only organization involved in the development and operation of the Internet, but it is one of the most important. Other organizations, such as the Internet Corporation for Assigned Names and Numbers (ICANN) and the World Wide Web Consortium (W3C), also play important roles in shaping the future of the Internet.

Learn more about World Wide Web Consortium (W3C) here:

brainly.com/question/29678693

#SPJ11

Write a program in Java to input a letter. If it is an uppercase letter then

encode it by next 5th letter, otherwise encode it with 3rd previous letter in the

ASCII table.​

Answers

Answer:

The program is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 char chr;

 System.out.print("Input Character: ");

 chr = input.next().charAt(0);

 if(Character.isUpperCase(chr) == true){      chr+=5;  }

 else{      chr-=3;  }

 System.out.println("Encode Character: "+chr);

}

}

Explanation:

This declares the character

 char chr;

This prompts for input

 System.out.print("Input Character: ");

This gets the input from the user

 chr = input.next().charAt(0);

This checks for uppercase; if true, it is encoded by the next 5th

 if(Character.isUpperCase(chr) == true){      chr+=5;  }

If lowercase, it is encoded by the previous 3rd

 else{      chr-=3;  }

This prints the encoded character

 System.out.println("Encode Character: "+chr);

In which phase of hijacking does the attacker change the sequence number or the acknowledgment number of the server?

Answers

Answer:

The statement is true

Explanation:

The attacker changes the sequence number or the acknowledgment number of the server to desynchronize the connection.

What is meant by desynchronization?

Desynchronization is useful for scheduling the execution of tasks by nodes at different times. This property benefits resource sharing, TDMA scheduling, and collision avoidance.

We present DWARF (Desynchronization With an ARtificial Force field), a novel method for wireless network desynchronization inspired by robotic circular formation. Each neighboring node employs artificial forces to deter other nodes from performing activities at various time intervals.

The attacker changes the sequence number or the acknowledgment number of the server to desynchronize the connection.

In the time domain, the forces that pull nodes apart are stronger for nodes with similar time phases. Each node modifies its time phase in response to the forces it receives. Once the received forces are balanced, nodes are desynchronized.

TOSSIM, a wireless sensor network simulator, is used to test our DWARF implementation. DWARF scales far better than existing methods, according to simulation results, and has far fewer desynchronization faults.

To learn more about hijacking refer to:

https://brainly.com/question/28364108

#SPJ4

you are configuring acls on a router, and you want to deny traffic being sent to the 10.10.16.0/21 network. which wildcard mask should you use with the access-list statement?

Answers

When configuring ACLs (Access Control Lists) on a router to deny traffic sent to the 10.10.16.0/21 network, you should use the wildcard mask 0.0.7.255.

The /21 subnet mask is equivalent to 255.255.248.0. To find the wildcard mask, subtract each octet in the subnet mask from 255 (e.g., 255-255, 255-255, 255-248, 255-0). This results in the wildcard mask 0.0.7.255. In the access-list statement, use this wildcard mask to define the range of IP addresses that should be denied. For example, you could use "access-list 101 deny ip any 10.10.16.0 0.0.7.255" to deny all IP traffic from any source to the specified network.

To know more about IP addresses visit:

brainly.com/question/31026862

#SPJ11

por que se dice que las TIC´S son las integracion de las TI y las TC?

Answers

La respuesta correcta para esta pregunta abierta es la siguiente.

A pesar de que no se anexan opciones o incisos para responder, podemos comentar lo siguiente.

Se dice que las TIC´S son las integración de las TI y las TC porque ambas actividades se han integrado o fusionado en una solo concepto al momento de juntar las herramientas tecnológicas para almacenar, procesar y mandar información a través de los recursos tecnológicos utilizando los canales o recursos de los medios masivas de comunicación como lo son las redes satelitales o las comunicaciones vía microondas.

Al fusionarse las TI (Tecnologías de la Información) con las TC (Tecnologías de Comunicación), se maximiza la capacidad de enviar una mayor cantidad de información al momento a diferentes lugares del planeta.

To display the grid limits, you must right-click on the

Answers

Answer:

????????????????????? very confused

Explanation:

Right click on the Grid icon to access the grid settings. In the Drafting Settings dialogue box, untick Display Grid beyond limits to see the boundary of your drawing limits. You can set the limits of the drawing grid by typing limits and following the prompts on the command line.

need help on question 5! no links pls

need help on question 5! no links pls

Answers

Answer: less than 50%, it’s about 49%

Explanation:

Answer:

59.5

so I would say the 3 third option

Project stem
Assignment 7: calender

Answers

Answer:

import calendar

year = int(input("Enter a year: "))

month = int(input("Enter a month: "))

print(calendar.month(year, month))

Explanation:

since you didnt mention what program to use, im going to answer using python.

Based on what you know about the Sort and Find functions, return to the database file to determine the answers to the following questions.

In which year did most people update their contact information?

1988

2010

2011

2012

Answers

Answer:

2010

Explanation:

Most of the people updated their information in the database in the year 2010. The database files have different functions which enable the sorting of data according to the contact information with year wise filter.

Answer:

It’s 2012

Explanation:

What important technology has done the most to allow small businesses a chance to compete with larger international companies

Answers

Answer:

wireless networks

Explanation:

Answer:

Wireless network

Explanation:

Ap.ex ;) (i know the answer is right there but I just verified it so ya)

Other Questions
Please help me with this Compare the effect of an active enhancer at the level of RNA transcription with the effect of an active enhancer at the level of RNA splicing. What are inequality? When do we use inequalities?What type of inequalities are there? Which symbols are used for each type?Are the following expressions variable inequalities? Why?a. 13z=27b. x11d. y+511e. 7-1>- 32 you conduct a study in which you ask the parents of 50 randomly selected children about how many hours of violent television they watch weekly and then observe the children on the playground and count the number of aggressive behaviors they exhibit. as a result of this study, you can determine: How many moles of water form from one gram of magnesium hydroxidePlease help!!! Max points! Which part of the digestive system do you think is most affected and why? Exercise 1 Add commas where necessary. Delete commas used incorrectly using the delete symbol .Uncle Mervyn likes to work in his flower garden and Aunt Jane spends most of her time spinning wool on her spinning wheel. A. No solution B. All solutions C. One solution Who carries out the roles of chief diplomat, commander in chief, and chief executive in the United States?A. The presidentB. The Secretary of State and the head of the joint chiefsC. The Secretary of State and the head of the joint chiefsD. The Senate majority leader I NEED AN ANSWER IN 30 MINUTES PLEASE HELPContrast the experience of a young adult today with that of a young adult in the 1950s. Give three differences. Which statement best describes how to determine whether a precipitate will form?If Q > Ksp, a precipitate forms to reduce the concentrations of ions.If Q > Ksp, more solid dissolves to increase the concentrations of ions.If Q < Ksp, a precipitate forms to increase the concentrations of ions.If Q < Ksp, more solid dissolves to reduce the concentrations of ions. Mrs. Allen made 8 pitchers of fruit punch for a party. She used 2 liters of waterto make each pitcher of fruit punch. How many liters of water did Mrs. Allenuse in all? _____ are the most widely used national norm-referenced standardized tests. compare all the complexities for the sorting algorithms radix sort, counting sort, bin sort. what information can be obtained by knowing the electronegativity differences between two elements? Which of the following statements is a side effect of companies employing more and more international workers. A. As countries are becoming more interdependent, the shared interest in maintaining peace is growing. B. Countries are becoming more independent and are pulling away from peace efforts. C. Companies are spending half of their annual budgets on diversity training. D. TRUE/FALSE. capacity planning involves determining how much of a product or service a firm should be able to produce. The students set up their experiments.They set up quickly.The science fair began.whenever although joining wordsbeforeCombine the sentences into one sentence. Use one of the joining woRds help plz: 12. Multiply the following binomials:a. (x + 3)(x - 4)b. (s - 2)(2s - 12)c. (4s - 12)(2s + 4)d. (2x - 4)(2x - 4) What is the area and perimeter of a square that has side lengths that are all 8 inches long?