a distributed database is a single logical database that is physically divided among computers at several sites on a network.

Answers

Answer 1

The statement for distributed database is a single logical database that is physically divided among computers at several sites on a network is true.

What is distributed database?

Distributed database is a single database but its stored in different location it can be in different computer but in same physical location it called as data center or in different physical location which it required connections from network.

Distributed database don't share any physical component. So basically distributed database have multiple of computer and it will improve performance at end-user worksite. For access, only system administrator can distribute the data across multiple computer.

You question is incomplete, but most probably your full question was

A distributed database is a single logical database that is physically divided among computers at several sites on a network.

True

False

Learn more about data center here:

brainly.com/question/13441094

#SPJ4


Related Questions

Write a Java program for user defined exception that checks the internal and external marks; if the internal marks is greater than 30 it raises the exception “Internal mark exceeded”; if the external marks is greater than 70 it raises the exception and displays the message “External mark exceeded”, Create the above exception and test the exceptions.

Answers

Answer:

class MarksException extends Exception {

   public MarksException(String message) {

       super(message);

   }

}

public class Main {

   public static void main(String[] args) {

       try {

           checkMarks(35, 80);

       } catch (MarksException e) {

           System.out.println(e.getMessage());

       }

   }

   public static void checkMarks(int internal, int external) throws MarksException {

       if (internal > 30) {

           throw new MarksException("Internal mark exceeded");

       }

       if (external > 70) {

           throw new MarksException("External mark exceeded");

       }

   }

}

Explanation:

Q. Describe the T.V. as an ICT tool.​

Answers

Answer:

TV or modern televisions are also a type of ICT tool because we get a wide amount of information about mass communication through the various news channels on the TV. TV is now also the most popular as well as a cheap medium of mass communication.

Declare an array to store objects of the class defined by the UML. Use a method from the JOPTIONPANE class to request the length of the array the use

Answers

Here's the code snippet that declares an array to store objects of a class defined by a UML and uses the showInputDialog method from the JOptionPane class to request the length of the array from the user:

The Code Snippet

import javax.swing.JOptionPane;

public class MyClass {

   public static void main(String[] args) {

       int length = Integer.parseInt(JOptionPane.showInputDialog("Enter the length of the array:"));

      MyUMLClass[] array = new MyUMLClass[length];

       

       // Rest of the code...

   }

}

class MyUMLClass {

   // Class definition...

}

This instance entails that the user is requested to provide the quantity of items in the array with the use of the showInputDialog method, and subsequently, the input value is saved into the length variable. Subsequently, a collection of MyUMLClass instances is generated with a predetermined size.

Read more about arrays here:

https://brainly.com/question/29989214

#SPJ1

Your company is designing a multi-tenant application that will use elastic pools and Azure SQL databases. The application will be used by 30 customers.
You need to design a storage solution for the application. The solution must meet the following requirements:
✑ Operational costs must be minimized.
✑ All customers must have their own database.
✑ The customer databases will be in one of the following three Azure regions: East US, North Europe, or South Africa North.
What is the minimum number of elastic pools and Azure SQL Database servers required?

Answers

Answer:

The minimum number of elastic pools and Azure SQL Database servers required is:

three elastic pools and one Azure SQL Database server.

Explanation:

The above will ensure that the Azure regions of East US, North Europe, or South Africa North are grouped into their three elastic pools.  Since cost minimization must be achieved, at the same time, one Azure SQL Database server will be enough to manage the 30 databases required, with one for each customer.  Creating more than one Database server will increase the operational costs.

QUESTION 1 Choose a term from COLUMN B that matches a description in COLUMN A. Write only the letter (A-L) next to the question number (1.1-1.10) in the ANSWER BOOK. COLUMN A 1.1. Substances that provide nourishment to the body 1.2. How you think and feel about something 1.3. Helps to cope with the challenges of being a student Exercise relating to increasing your heart rate 1.5. Having traits or qualities traditionally associated with 1.4. men 1.6. Seeing, hearing, or sensing something that is not really there 1.7. 1.8. Leaving everything till the last minute Is Chapter 2 in the Constitution of SA 1.9. Group of people who share notes and information 1.10. Ability to exercise for extended period of time COLUMN B A hallucination B nutrients C study group D procrastinate E endurance F Bill of Rights G Cardio-vascular H masculine I attitude J resilience K strength L flexibility ​

Answers

Answer:

1.1 B nutrients 1.2 I attitude 1.3 J resilience 1.4 H masculine 1.5 L flexibility 1.6 A hallucination 1.7 D procrastinate 1.8 F Bill of Rights 1.9 C study group 1.10 E endurance

Explanation:

______ are single numbers or values, which may include integers, floating-point decimals, or strings of characters.
A(n) _____ is a group of scalar or individual values that are stored in one entity.
A(n) ____ is a data type that is assigned a true or false value by a programmer.
A(n) ____is a data type that can be assigned multiple values.

Answers

Scalar Values are single numbers or values, which may include integers, floating-point decimals, or strings of characters.

A(n) array is a group of scalar or individual values that are stored in one entity.

A(n) user-defined type is a data type that is assigned a true or false value by a programmer.

A(n) abstract data type is a data type that can be assigned multiple values.

Answer:

they were so right and deserve brainlyist

Explanation:

Give two example computer applications for which connection-oriented service is appropriate. Now give two examples for which connectionless service is best.

Answers

Answer:

File transfer, remote login, and video on demand need connection-oriented service.

Explanation:

I HOPE THIS HELPS

A connection-oriented service is a data transfer mechanism used at the session layer. Connectionless service is an in-data communication that is used to convey data at the OSI model's transport layer.

What is a connection-oriented service?

A connection-oriented service is a data transfer mechanism used at the session layer. Unlike its opposite, connectionless service, connection-oriented service necessitates the establishment of a session connection between the sender and recipient, similar to a phone conversation. Although not all connection-oriented protocols are considered reliable, this method is generally thought to be more reliable than a connectionless service.

What is a connection-less service?

Connectionless service is a notion in data communications that is used to convey data at the OSI model's transport layer (layer 4). It refers to data transmission between two nodes or terminals in which data is transferred from one node to the other without first confirming that the destination is accessible and ready to accept the data. There is no need for a session connection between the sender and the receiver; the sender just begins delivering data.

Telnet, rlogin, and FTP are examples of services that leverage connection-oriented transport services. And Connectionless services include User Datagram Protocol (UDP), Internet Protocol (IP), and Internet Control Message Protocol (ICMP).

Learn more about Connection-Oriented Services:

https://brainly.com/question/13151080

#SPJ2

Describe what social engineering is and explain its existence and prevalence.
Explain why SE is an important part of an information technology security course.
Perform statistical research in the social engineering area providing the following: (1) Describe the current percentage of cyber attacks relying on social engineering and the percentage of attacks from both internal and externa sources; and (2) Describe how these percentages impact the current corporate social engineering incident response effort.
Discuss employee and management responsibilities with regard to information security and combating SE. Make sure your work clarifies your opinion as to who carries more responsibility for preventing SE-the employees or management. Provide examples to back up your statements.

Answers

Social engineering is a tactic used by attackers to manipulate individuals into divulging sensitive information or performing actions that may be harmful to the organization.

Social engineering attacks exploit human psychology, emotions, and trust to trick people into revealing sensitive information or performing actions that they otherwise wouldn't. The attacks can take many forms, such as phishing emails, phone scams, pretexting, and baiting.

What is social engineering?

The prevalence of social engineering attacks has increased in recent years, as attackers have become more sophisticated and creative in their methods.

According to the Verizon Data Breach Investigations Report (DBIR) in 2020, social engineering is used in 84% of successful cyber attacks and the most common form of social engineering is phishing. It is also reported that around 30% of phishing messages are opened and 12% of recipients click on the malicious link.

When it comes to combating social engineering, both employees and management carry some level of responsibility. Employees are the first line of defense and play a vital role in protecting the organization's sensitive information. They should be educated and trained on how to identify and avoid social engineering attacks. Management, on the other hand, is

Learn more about social engineering  from

https://brainly.com/question/29024098

#SPJ1

Fill in the blank: To keep your content calendar agile, it shouldn’t extend more than ___________.

two weeks

one month

three months

six month

Answers

To keep your content calendar agile, it shouldn’t extend more than three months.

Thus, A written schedule for when and where content will be published is known as a content calendar.

Maintaining a well-organized content marketing strategy is crucial since it protects you from last-minute crisis scenarios and enables you to consistently generate new material and calender agile.

As a result, after the additional three months, it was unable to maintain your content calendar's agility.

Thus, To keep your content calendar agile, it shouldn’t extend more than three months.

Learn more about Calendar, refer to the link:

https://brainly.com/question/4657906

#SPJ1

If I am designing an application, which code to I input to create a link​

Answers

Answer:

\({ \tt{ < a \: href = url > < a > }}\)

The last must be a closing tag

Please help me with this
For the three Ontario University (U or T, York, Ryerson) are the courses that I have taken good when wanting to get admitted into Computer Science

6 U/M Courses:

- ENG 4UO (English)
- SPH 4UO (Physics)
- ICS 4UO (Computer Science)
- MHF 4UO (Advanced Functions)
- MCV 4UO (Calculus and Vectors)
- TEJ 4MO (Computer Engineering Technology)

* DO I NEED SCH 4UO (Chemistry) for computer science

Answers

Although Chemistry (SCH 4UO) is not usually a mandatory prerequisite for entering Computer Science programs, it is wise to carefully scrutinize the individual admission standards of the universities that catch your eye to guarantee that you satisfy their prerequisites.

What are the Courses about

Judging from the courses above,  Having a good grasp of written communication is often a prerequisite for enrollment in a wide range of university programs, and taking English (ENG 4UO) serves as proof of this skillset.

Your interest and background in the field are evident through your enrollment in Computer Science (ICS 4UO). Enrolling in this course can significantly enhance your chances of getting accepted into a Computer Science program, and it offers significant practical benefits.

Learn more about University  from

https://brainly.com/question/1086066

#SPJ1

Why does excel include so many different ways to execute the same commands ?.

Answers

Excel includes so many different ways to execute the same commands for sake of flexibility and speed.

What is excel?

Microsoft Excel is a spreadsheet program developed by Microsoft that is available for Windows, macOS, Android, and iOS. It includes calculating or computation skills, graphing tools, pivot tables, and Visual Basic for Applications, a macro programming language. Excel is part of the Microsoft Office software suite.

Excel is a spreadsheet program that is used to store, analyze, and report on enormous quantities of data. Accounting teams frequently use it for financial analysis, but it can be used by any professional to handle vast and cumbersome information. Balance sheets, budgets, and editorial calendars are examples of Excel applications.

Learn more about excel:
https://brainly.com/question/24202382
#SPJ1

Create a query that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan. Show in the query results only the sum of the balance due, grouped by PaymentPian. Name the summation column Balances. Run the query, resize all columns in the datasheet to their best fit, save the query as TotaiBalancesByPian, and then close it.

Answers

A query has been created that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan.

In order to list the total outstanding balances for students on a payment plan and for those students that are not on a payment plan, a query must be created in the database management system. Below are the steps that need to be followed in order to achieve the required output:

Open the Microsoft Access and select the desired database. Go to the create tab and select the Query Design option.A new window named Show Table will appear.

From the window select the tables that need to be used in the query, here Student and PaymentPlan tables are selected.Select the desired fields from each table, here we need StudentID, PaymentPlan, and BalanceDue from the Student table and StudentID, PaymentPlan from PaymentPlan table.Drag and drop the desired fields to the Query Design grid.

Now comes the main part of the query that is grouping. Here we need to group the total outstanding balances of students who are on a payment plan and who are not on a payment plan. We will group the data by PaymentPlan field.

The query design grid should look like this:

Now, to show the query results only the sum of the balance due, grouped by PaymentPlan, a new column Balances needs to be created. In the field row, enter Balances:

Sum([BalanceDue]). It will calculate the sum of all balance dues and rename it as Balances. Save the query by the name TotalBalancesByPlan.Close the query design window. The final query window should look like this:

The above image shows that the balance due for Payment Plan A is $19,214.10, while for Payment Plan B it is $9,150.50.

Now, in order to resize all columns in the datasheet to their best fit, select the Home tab and go to the Formatting group. From here select the AutoFit Column Width option.

The final output should look like this:

Thus, a query has been created that lists the total outstanding balances for students on a payment plan and for those students that are not on a payment plan.

For more such questions on query, click on:

https://brainly.com/question/30622425

#SPJ8

A customer uses an app to order pizza for delivery. Which component includes
aspects of the customer's interaction with an enterprise platform?

Answers

~frestoripongetosarangeou

A consumer orders pizza for delivery via an app. The element of the data component covers how a customer interacts with an enterprise platform

What is the data component?

A data component is a tool that provides information on the activities taking place on a certain enterprise platform. This application also aids in keeping track of the available inventory.

In this approach, customers place their orders through a smartphone app.

Therefore, while ordering pizza the consumer uses the data component.

To know more about the Data component, visit the link below:

https://brainly.com/question/27976243

#SPJ2

2. Select the things you can do when working with rows in columns in a spreadsheet:
Freeze a row or column
Delete a row or column
Hide a row or column
Add a row or column
Move rows or columns

Answers

I think you can do all of those things to rows and columns when working with a spreadsheet.

CLS
N-8
C-1
DO
P-N MOD C
IF F-0 THEN PRINT C
N=N1
C-Cri
LOOP WHILE

Answers

This snippet of code was created in a computer language, and it stores the value of N modulo C in P. The value of C is displayed if F is zero. Until a particular condition is satisfied, N is updated to N1, and C is decreased by 1 in a cycle.

What purpose does the CLS instruction serve in basic?

CLS. The monitor screen is cleared by this instruction. It typically occurs in the first line of a program, leaving a blank screen at the start of the programme's execution.

What three categories do QBASIC programmers fall under?

The five arithmetic operators + (addition), - (subtraction), * (multiplication), / (division), and  can be used in math expressions in QBASIC. (exponentiation).

To know more about snippet visit:

https://brainly.com/question/30772469

#SPJ9

1. What is a situation—other than developing software—where it would be useful to follow the software development life cycle? Describe what this process might look like.

2. In this unit, you learned about four types of operating systems. Imagine that you had been hired as a consultant to a new start-up that was going to create and sell a new emergency medical device. Which kind of operating system would you recommend to them? As part of your answer, explain why the other three types of operating systems would be less appropriate.

3. Describe three different software applications that you have used recently.

4. In this unit, you learned about procedural, object-oriented, and event-driven programming. Describe an example of each one in commonly used software.

5. Many people express frustration when they have to contact customer support for help with their software. Describe two things that companies can do to make customer support a more pleasant experience for its users.

Answers

There are different kinds of software. Requirement Gathering and also designing is another stage where it would be useful to follow the software development life cycle.

Why is important to know the software development life cycle?

The software development life cycle is said to be one that increase the value to software development as it helps to give an efficient structure and method to create software applications.

Windows operating systems is the one I would recommend to them as it is much easier to operate than other types.

The three different software applications that you have used mostly are  Electronic Health Record (EHR) Software, Medical database software and Medical imaging software. They are often used in the healthcare system on daily basis.

Event-driven programming software is the often used in graphical user interfaces and other kinds of system applications such as JavaScript web applications. They are based on carrying out some task in response to user input.

Companies can make customer support a more better by actively to them especially their complains and make sure it is handled immediate. They should also list out the cases of high priority and work on them.

Learn more about Developing software from

https://brainly.com/question/22654163

frist step in science

Answers

Answer: Ask a question.

Specifications and Cloud Service Providers will be given. (a) You have to find the best provider (b) Determine the cost using THREE BIG cloud providers in the world (c) In case of any failure how you handle.

Answers

Your team has a unified view of every customer, from their initial click to their final call, thanks to Service Cloud. By viewing all customer information and interactions on one screen, handling time can be decreased.

Who are the top three providers of cloud services?

The three cloud service providers with the greatest market shares—Web Services (AWS), Azure, and Cloud Platform (GCP)—acquire approximately 65% of the money spent on cloud infrastructure services.

Which services do cloud service providers offer in total?

Cloud computing refers to the delivery of services including networking, storage, servers, and databases over the internet. It is a novel approach to resource provisioning, application staging, and platform-agnostic user access to services.

to know more about Specifications and Cloud Service here:

brainly.com/question/29707159

#SPJ1

If you had to make a choice between studies and games during a holiday, you would use the _______ control structure. If you had to fill in your name and address on ten assignment books, you would use the ______ control structure.



The answers for the blanks are Selection and looping. Saw that this hasn't been answered before and so just wanted to share.

Answers

The missing words are "if-else" and "looping".

What is the completed sentence?

If you had to make a choice between studies and games during a holiday, you would use the if-else control structure. If you had to fill in your name and address on ten assignment books, you would use the looping control structure.

A loop is a set of instructions in computer programming that is repeatedly repeated until a given condition is met. Typically, a process is performed, such as retrieving and modifying data, and then a condition is verified, such as whether a counter has reached a predetermined number.

Learn more about looping:
https://brainly.com/question/30706582
#SPJ1

With _____, devices embedded in accessories, clothing, or the users body and connect to the internet of things to process and store data.

Answers

Answer:

Wearables

Explanation:

Wearables is a term that describes some certain forms of electronic devices that are embedded in accessories, clothing, or the user's body and connect to the internet of things to process and store data. For example fitness tracker, body-mounted sensor, etc. It is sometimes referred to as Wearable Technology

Hence, the correct answer to this question is simply termed  WEARABLES.

what were the social, political, cultural, or economic context in which the was invention made?

Answers

Answer:

wait what

Explanation:

An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so?

Answers

Answer:

Redundant networks are generally more reliable.

Explanation:

The complete question is in this brainly link;

https://brainly.com/question/18302186

This is based on knowing the importance of a redundant network.

C. Redundant networks are more reliable

A redundant network is one that helps to increase the reliability of a computer system.

Now, this is possible because the more critical the ISP NETWORK is, the more important it will be for the time it takes to resolve from a fault would be reduced.

This implies that, by adding one redundant device to their connection, the time it will take to resolve from a fault would be drastically reduced and this will lead to a far more reliable system.

Thus, redundant networks are more reliable.

Read more at; brainly.com/question/17878589

Explain two methods which the operating system may use to maintain the security of data stored on disk

Answers

Answer:

Measures that can be taken to keep data secure include: making regular backups of files (backup copies should be stored in fireproof safes or in another building) protecting yourself against viruses by running anti-virus software. using a system of passwords so that access to data is restricted.

Explanation:

The methods that the operating system may use to maintain security  are:

Regularly logging off or locking.

The use of data encryption methods to code data.

How do operating systems keeps security of data?

In the areas of Security utilities, there is often the use of encryption  to maintain data.

In this process, one can encrypt data as at the time it is been saved, or when one is trying to transmit it over a network. One can also use anti-virus software so as to check and blocks viruses.

Conclusively, the use of the methods above in the operating system may can help you to maintain security.

Learn more about operating system from

https://brainly.com/question/22811693

#SPJ2

some context free languages are undecidable

Answers

yess they are and have been for awhile although they’re already

Write a script which appends a line counter to an input file. This script creates a program listing from a source program. This script should prompt the user for the names of two files. The script copies the lines of text from the input file to the output file, numbering each line as it goes.

Answers

Programs can be used to read, write and append to a file

This question illustrates the read, write and append, as implemented in the following program.

The program in Python, where comments are used to explain each line is as follows;

#This initializes the line numbers to 0

num = 0

#This gets the input filename from the user

file1 = input("Input filename: ")

#This gets the output filename from the user

file2 = input("Output filename: ")

#This reads the content of file1 and appends it to file2

with open(file1, 'r') as f1, open (file2, 'w') as f2:

       #This iterates through the file 1

       for lines in f1:

               #This calculates the line numbers

               num = num + 1

               #This writes into file 2, the line number and the content of the line

               f2.write(num,lines)

At the end of the program, the content of the input file and the line numbers are appended to the output file.                        

Read more about file operations at:

https://brainly.com/question/15586761

Question 2: Fill in the blanks i. In MS Excel, keyboard shortcut keys to create a new workbook is ii. The extension of a Microsoft Excel file is xx iii. The intersection of a column and a row in a worksheet is called ell dri+x iv. To return frequent value of the cell in a given range, mode function is used. v. Applying a formatting without any criteria is called_normal formatting [5]​

Answers

It is to be noted tht the words used to fill in the blanks for the MS Excel prompt above are:

i. Ctrl + N

ii. .xlsx

iii. cell

iv. mode

v. default formatting.

What are the completed sentences?

The completed sentences are

i. In MS Excel, keyboard   shortcut keys to create a new workbook is "Ctrl + N".

ii. The extension of aMicrosoft Excel file is ".xlsx".

iii. The intersection of a column and a row in a worksheet is called a "cell".

iv. To return the most   frequent value of a cell in a given range, the mode function is used.

v. Applying formatting without any criteria is called "default formatting".

Learn more about MS Excel at:

https://brainly.com/question/24749457

#SPJ1

You are a systems analyst. Many a time have you heard friends and colleagues complaining that their jobs and businesses are being negatively impacted by e-commerce. As a systems analyst, you decide to research whether this is true or not. Examine the impact of e-commerce on trade and employment/unemployment, and present your findings as a research essay.

Answers

E-commerce, the online buying and selling of goods and services, has significantly impacted trade, employment, and unemployment. This research essay provides a comprehensive analysis of its effects.

What happens with  e-commerce

Contrary to popular belief, e-commerce has led to the growth and expansion of trade by breaking down geographical barriers and providing access to global markets for businesses, particularly SMEs. It has also created job opportunities in areas such as operations, logistics, customer service, web development, and digital marketing.

While certain sectors have experienced disruption, traditional businesses can adapt and benefit from e-commerce by adopting omni-channel strategies. The retail industry, in particular, has undergone significant transformation. E-commerce has empowered small businesses, allowing them to compete with larger enterprises and fostered entrepreneurial growth and innovation. However, there have been job displacements in some areas, necessitating individuals to transition and acquire new skills.

Read mroe on  e-commerce here  https://brainly.com/question/29115983

#SPJ1

Now let's build a calorie counter. The NHS recommends that
an adult male takes on board 2,500 calories per-day and an
adult woman takes on 2,000 calories per-day. Build your
program in python for a woman or a man.

Answers

The building of a program in python for a calorie intake per day by a woman or a man is represented as follows:

print("Your calorie counter")

calories = int(input("How many calories have you eaten today? "))

s=2000-calories

print("You can eat", s, "calories today")

What is Python programming?

Python programming may be characterized as a kind of high-level computer programming language that is often utilized in order to construct websites and software, automate tasks, and conduct data analysis.

There are various factors and characteristics of python programming. Each program is built based on specific attributes. They are strings (text), numbers (for integers), lists (flexible sequences), tuples, and dictionaries. The most important components are expression, statements, comments, conclusion, etc.

Therefore, the python programming for a calorie intake per day by a woman or a man is mentioned above.

To learn more about Python programming, refer to the link:

https://brainly.com/question/26497128

#SPJ1

When virtual team members are working in different time zones, meetings _____.
Responses

should follow a consistent schedule
should follow a consistent schedule

must be asynchronous and informal
must be asynchronous and informal

require that everyone works the same hours, no matter where they live
require that everyone works the same hours, no matter where they live

should be scheduled separately for each time zone

Answers

Answer:

should be scheduled separately for each time zone

Explanation:

When virtual team members are working in different time zones, meetings " should be scheduled separately for each time zone" (Option D)

Why is this so?

When virtual team members are working in different time zones, scheduling meetings separately for each time zone is necessary to accommodate the availability of team members in their respective time zones.

This approach ensures that all team members can participate in the meetings without having to work at inconvenient hours or compromise their work-life balance. It promotes inclusivity, flexibility, and effective communication within the virtual team.

Learn more about virtual teams at:

https://brainly.com/question/29560013

#SPJ1

Other Questions
A program that converts a program to binary all at once and runs the entire program when finished with the conversion. The State of the Union address is Group of answer choices only given once every four years. based on tradition but was discontinued during the Great Depression and World War II. mandated by the Constitution. required by Congressional law. which expression is equivalent to 6x+y-5x+2y Pleas help me! I will give you guys 25 points! you are given a colourless solution, it turned blue litmus paper red (c) 5 points possible (graded) The problem you encountered in part (b) is called separation . It occurs when the can be perfectly recovered by a linear classifier, i.e., when there is a such that In order to avoid this behavior, one option is to use a prior on . Let us investigate what happens if we assume that is drawn from a distribution, i.e., What is the joint log likelihood of this Bayesian model What is the purpose of the dna ladder in gel electrophoresis. Write the meaning of the following word. abbreviate 10.The school auditorium can seat 200 people. The middle school was putting up a school playon two different days. On the first day, people sat in 70% of the seats. On the second day,people sat in 81% of the seats. What was the total number of people for both days? A class's default constructor _________.a. sets numeric fields to 0b. is parameterlessc. both of thesed. none of these You walk into Mr Rosa's after his lunch tray was delivered. You observe him clutching his throat and having difficulty talking. What action should you take? If your client receives a letter from SilverScript requesting proof of Creditable Coverage, and the client has already submitted proof of creditable coverage with the enrollment application, they can ignore the letter. What is the equivalent resistance between points a and b when R = 30? a. 27 b. 21 c. 24 d. 18 e.. 7.5 Which of the following will be accomplished by efficient allocations of the factors of production? Considering the expression x/2 + y2. Which statements are true?Mark all that apply.A.When x=4 and y=9,the value of the expression is 37.B.When x=12 and y= -5,the value of the expression is 61 C.When x=6 and y=7,the value of the expression is 61D.When x=8 and y= -10, the value of the expression is 104 Plz give me a step by step explanation cliff has been working at an after-school job so that he can buy a car. he is very careful with his money. when his mother offers to buy him a new laptop, however, he asks for one of the most expensive models on the market. after all, the costs of buying a new laptop have been: Calculate the deadweight loss associated with electricity generation by the power plants. Give your answer in millions of dollars 2. A psychologist predicts that entering students with high SAT or ACT scores will have high Grade Point Averages (GPAs) all through college. This testable prediction is an example of a: * (5 Points) theory. hypothesis. confirmation. principle. 3. If a psychologist wants to know if eating chocolate lowers depression levels, she should begin creating a well-designed: * (5 Points) Experiment Case study Survey Naturalistic observation4. Miguel wants to see how extracurricular activities might impact academics. He creates an experiment and predicts that children randomly assigned to take piano lessons will show greater improvement on math assessments than children assigned to take tennis lessons. In this experiment, is the independent variable and _is the dependent variable: * (5 Points) Tennis Lessons, Piano Lessons Children, Piano Lessons Tennis or Piano lesson, Math assessment score Math assessment score, Tennis or Piano lesson what is thissssss oneeeeeeeeee Please help :)Carly worked for 5 1/4 hours and earned $46.20 How much would she earn if she worked for 6 3/4 hours? Enter your answer in the box