Consider the following tables:
CREATE TABLE [partner] ([id] INT PRIMARY KEY, [name] NVARCHAR(300))
CREATE TABLE [order] ([id] INT PRIMARY KEY, [idPartner] INT REFERENCES [partner]([id]), [number] NVARCHAR(300), [issuedate] DATETIME2(7), [amount] DECIMAL(15, 4))
CREATE TABLE [invoice] ([id] INT PRIMARY KEY, [idPartner] INT REFERENCES [partner]([id]), [number] NVARCHAR(300), [issuedate] DATETIME2(7), [amount] DECIMAL(15, 4))
Which of the following statements correctly compute the correct totals?
I SELECT p.[name], SUM([o].[amount]) [OrdersAmount], SUM([i].[amount]) [InvoicesAmount] FROM [partner] [p] JOIN [order] [o] ON [p].[id] = [o].[idPartner] JOIN [invoice] [i] ON [p].[id] = [i].[idPartner] GROUP BY p.[name] II SELECT p.[name], [OrdersAmount], [InvoicesAmount] FROM [partner] [p] LEFT JOIN (SELECT [idPartner], SUM([amount]) [OrdersAmount] FROM [order] GROUP BY [idPartner] ) [o] ON [p].[id] = [o].[idPartner] LEFT JOIN (SELECT [idPartner], SUM([amount]) [InvoicesAmount] FROM [invoice] GROUP BY [idPartner] ) [i] ON [p].[id] = [i].[idPartner] FORMAT([o].[issuedate], 'yyyyMM') [OrderDate], FORMAT([i].[issuedate], 'yyyyMM') [InvoiceDate], SUM([o].[amount]) [OrdersAmount], SUM([i].[amount]) [InvoicesAmount] FROM [partner] [p] JOIN [order] [o] ON [p].[id] = [o].[idPartner] JOIN [invoice] [i] ON [p].[id] = [i].[idPartner] GROUP BY p.[name], FORMAT([o].[issuedate], 'yyyyMM'), FORMAT([i].[issuedate], 'yyyyMM') IV SELECT p.[name], [OrderDate], [InvoiceDate], [OrdersAmount], [InvoicesAmount] FROM [partner] [p] LEFT JOIN (SELECT [idPartner], SUM([amount]) [OrdersAmount], FORMAT([issuedate], 'yyyyMM') [OrderDate] FROM [order] GROUP BY [idPartner], FORMAT([issuedate], 'yyyyMM') ) [o] ON [p].[id] = [o].[idPartner] LEFT JOIN (SELECT [idPartner], SUM([amount]) [InvoicesAmount], FORMAT([issuedate], 'yyyyMM') [InvoiceDate] FROM [invoice] GROUP BY [idPartner], FORMAT([issuedate], 'yyyyMM') ) [i] ON [p].[id] = [i].[idPartner] V SELECT p.[name], [Order Date], [InvoiceDate], [OrdersAmount], [invoices Amount] FROM [partner] [p] LEFT JOIN (SELECT [idPartner], SUM([amount]) [OrdersAmount], FORMAT([issuedate], 'yyyyMM') [Order Date] FROM [order] GROUP BY [idPartner], FORMAT([issuedate], 'yyyyMM') ) [o] ON [p].[id] = [o].[idPartner] LEFT JOIN (SELECT [idPartner], SUM([amount]) [Invoices Amount], FORMAT([issuedate], "yyyyMM') [InvoiceDate] FROM [invoice] GROUP BY [idPartner], FORMAT([issuedate], 'yyyyMM') ) [i] ON [p].[id] = [i].[id Partner] AND [Order Date] = [InvoiceDate] III SELECT p.[name],

Answers

Answer 1

The correct statements that compute the correct totals are statements I and V.

Statement I correctly computes the total amount of orders and invoices for each partner by joining the order and invoice tables on the idPartner column. The SUM() function is used to calculate the total amount for each type of transaction. Statement V correctly computes the total amount of orders and invoices for each partner by joining the order and invoice tables on the idPartner and Order Date columns. The SUM() function is used to calculate the total amount for each type of transaction.

Statement II does not compute the correct totals because it does not join the order and invoice tables on the idPartner column. As a result, the total amount of orders and invoices for each partner is incorrect. Statement III does not compute the correct totals because it does not join the order and invoice tables on the Order Date column. As a result, the total amount of orders and invoices for each partner is incorrect. Statement IV does not compute the correct totals because it uses the AND operator to join the order and invoice tables on the Order Date column. As a result, only the orders and invoices that have the same Order Date are included in the calculation.

To learn more about SUM() function click here : brainly.com/question/31680880

#SPJ11


Related Questions

True or False: To create a function in python, you start with the keyword "def"

Answers: True or False

Answers

Answer:

true i think

Explanation:

Answer:

true

Explanation:

i saw the other answer and wanted to contribute to your knowledge

A tool with which you can take a quick snapshot of part of a screen, and then add it to your document:a. sectionb. suppressc. screen clippingd. justified

Answers

A tool with which you can take a quick snapshot of part of a screen, and then add it to your document is screen clipping.

Screen Clipping is a feature in the Microsoft Office Suite that enables you to capture a portion of a screen or a window from which you want to extract data. It is a built-in utility that can be used to capture and store the most important elements of a digital document or a web page. It allows you to copy a portion of your screen and paste it into your documents, such as a word document or a presentation slide, without needing to save it as a separate file. The steps to take a screen clipping are as follows:

Open the document, file, or window from which you want to capture the screen clipping.On the Insert tab, in the Illustrations group, click the Screenshot button.On the drop-down list, pick Screen Clipping.On the screen, you'll see a cross-hair cursor that you can drag to pick the portion of the screen you want to capture. After you've chosen the region, release the mouse button. A clipping of the chosen area will be added to your document.

Learn more about screen clipping visit:

https://brainly.com/question/11726720

#SPJ11

what type of fuzzer requires the user to give it predefined inputs? generation fuzzer mutation fuzzer protocol-based fuzzer

Answers

A generation fuzzer requires the user to give it predefined inputs.

In fuzz testing, there are three main types of fuzzers: generation fuzzers, mutation fuzzers, and protocol-based fuzzers. A generation fuzzer creates test data from scratch based on predefined inputs or rules specified by the user. This type of fuzzer is more suitable for situations where the input format is well-defined and understood. On the other hand, mutation fuzzers modify existing test data to create new test cases, while protocol-based fuzzers focus on testing communication protocols.

Among the three types of fuzzers mentioned, it is the generation fuzzer that requires predefined inputs from the user to generate test data.

To know more about fuzzer visit:

https://brainly.com/question/20314591

#SPJ11

A
is a document that thanks an interviewer and restates an applicant's interest in the job.
a. thank-you letter
D. letter of acceptance
c. rejection letter

Answers

Answer: D. thank you letter

Explanation:

Which of these is a common problem with data transmission? a.File format b.Network Speed c.File size d.Data routing

Answers

Answer:

Answer is b

Explanation:

a. File format had nothing to do with the data transmission

c. File size matters only if the network speed is low, so, it again a fault of network speed.

d. Data routing has noting to do with data transfer, only network routing is required.

Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.

Answers

Answer:

Following are the letter to this question:

Explanation:

Dear Raju:

For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.  

For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.

And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.  

If you determine that option fits your needs, let me learn and I'll support you there.

Yours sincerely,

Dev

Y’all got your tickets for Spider-Man No Way Home? I do

Yall got your tickets for Spider-Man No Way Home? I do

Answers

Answer:

IS IT THE NEW MARVEL MVOIE

Explanation:

You can add the word ____ to an ip address command and configure the address as a second IP address for the interface.

Answers

Answer:

Secondary.

Explanation:

This word assigns the IP as the secondary IP address

PLEASE HELP!! This is a question. Please answer using python. Only if you have experience. I will give the first person brainliest!

PLEASE HELP!! This is a question. Please answer using python. Only if you have experience. I will give

Answers

Answer:

what question is this ?? can you be more specific i need more details on the question

Explanation:

The program written in Python programming language that performs the required computations is:

n = int(input("n: "))

while n != 1:

   if n%2 == 0:

       n = int(n/2)

   else:

       n = int(3 * n + 1)

   print(n)

How to write the program in Python programming language?

The program written in Python programming language, where comments are used to explain each line is as follows:

#This gets input for n

n = int(input("n: "))

#The following loop is repeated until the value of n is 1

while n != 1:

#This checks if n is an even number; n is halved, if this condition is true

   if n%2 == 0:

       n = int(n/2)

#If n is an odd number; n is tripled and increased by 1

   else:

       n = int(3 * n + 1)

#This prints the sequence of numbers generated

   print(n)

The above program generates the sequence of numbers for n

Read more about python programs at

https://brainly.com/question/26497128

#SPJ1

A(n) Blank______ database management system allows users to create, read, update, and delete data in a relational database. Multiple choice question. relational primary key real

Answers

Answer:

relational DBMS

Explanation:

Examples MSSQL

45 points

Multiple Choice: Choose the answer that best fits each statement below.

______ 5. Which of the following can be found by clicking the AutoSum drop‐down?
a. Average
b. Min
c. Sum
d. All of the above

______ 6. Which option is used to prevent a cell reference from changing when a formula is copied to
another location?
a. Named ranges
b. Absolute cell reference

______ 7. An advantage to defining range names is:
a. Selections can be larger
b. Selections can be any format
c. Name ranges are easy to remember
d. Name ranges clear cell contents

True/False: Answer True or False for each statement below.
______ 8. You can only increase or decrease the decimal places by two.
______ 9. The comma style allows you to format with a thousands separator.
______ 10. Excel does not allow you to copy and paste formulas with AutoFill.

Answers

Answer:

5 its either a or b and 6 is b 7 is d  and 8 t 9 f 10 f

Explanat ion:

Do you think employers are impressed with someone who knows how to use Excel? Why or Why not?

Answers

Answer:

Explanation:

Yes, but it depends on who your applying your job for. If it's a computer based job than they will be impressed.

8.
A customer wants to use the computer only to send emails to family members. Is a fast processor
required? Why or why not?

Answers

Answer:

yes

Explanation:

the faster the processor the better the computer loads things and works faster, there's little to no latency depending on the wifi

A customer wants to use the computer only to send emails to family members. Is the required the fast processor as well as fast internet connection was to send the easily.

What is customer?

The term customer refers to the purchased the goods and the services, The customer are to fulfill the needs and the wants as the exchange of the money. The customer is the receiving the information of the product with the help of customer.

The term email refers to the part of the communication. The email are the medium of the communication as the mostly used to the marketing and the information purposes. The email are the official purposes are the used. A person was to send the email to the family was the need to the fast processor as well as the need of the internet to share the email are quickly delivered.

As a result, the email was to share the quickly with the help of the internet and the fast processor.

Learn more about on email, here:

https://brainly.com/question/14666241

#SPJ2

which type of attack is wep extremely vulnerable to?

Answers

WEP is extremely vulnerable to a variety of attack types, including cracking, brute-force, IV (Initialization Vector) attack, and replay attack.

What is Initialization Vector?

An Initialization Vector (IV) is a random number used in cryptography that helps to ensure the uniqueness and randomness of data used in an encryption process. The IV is typically used as part of an encryption algorithm, where it is combined with a secret key to encrypt a message. The IV is unique for each encryption session, and must be unpredictable and non-repeating. A good IV should not be reused across multiple encryption sessions, and it should be kept secret from anyone who does not have access to the decryption key. Without a good IV, a cryptographic system can be vulnerable to attacks such as replay attacks, where an attacker can gain access to the system by repeating an encrypted message.

To learn more about Initialization Vector
https://brainly.com/question/27737295
#SPJ4

1. Harold Worden, then 56-years-old, stole Kodak property
that was worth millions of dollars. He had worked for
Kodak for over 30 years and did not return confidential
documentation when he left the company in 1992.
He attempted to try and sell his ill-gotten gains to Kodak's
competitors while trying to start his own consulting firm.

The following scenario is an example of?​

Answers

Answer:

Industrial espionage

Explanation:

Espionage is defined as the act of spying or the use of spies to acquire information on the activities and plans of a government of another country or those of a company in a competitive market

It is the practice of obtaining confidential or secret information and can be considered a felony depending on the case circumstances and the manner of damages caused by the act which is provable and made by the claimant

Industrial espionage is also known as economic espionage

Linux would be a good example of?

Answers

open source software

A man is a network that is frequently used as links between office buildings that are located throughout a city.a. trueb. false

Answers

The statement "A MAN is a network that is frequently used as links between office buildings that are located throughout a city" is true (a).

The term "MAN" refers to a Metropolitan Area Network, which is a type of network designed to connect various office buildings, institutions, or facilities within a city or metropolitan area. This type of network allows for efficient communication and data sharing among the connected locations.

MANs enable efficient communication and data sharing among the connected locations, facilitating seamless connectivity and information exchange within a specific geographical area. As technology continues to advance, MANs play a crucial role in supporting communication and data transfer needs for businesses, organizations, and institutions operating within a metropolitan area. By providing connectivity between different locations, MANs contribute to the efficient functioning of urban areas and support the growth of businesses and institutions in the modern digital age.

Learn more about network: https://brainly.com/question/8118353

#SPJ11

connection speed is technically a measure of capacity: T/F

Answers

The statement "connection speed is technically a measure of capacity" is;

False.

Connection speed and capacity are not the same thing.

Connection speed, also known as bandwidth, is a measure of how quickly data can be transferred over a network connection. It is typically measured in bits per second (bps) or bytes per second (Bps). It is a measure of the rate of data transfer, and it is typically used to measure the speed of internet connections.

Capacity, on the other hand, is a measure of how much data can be stored or transmitted over a network connection. It is typically measured in bytes (B) or bits (b). It is a measure of the amount of data that can be transferred over a network connection, and it is typically used to measure the storage capacity of a hard drive or the number of users that can be supported on a network.

Therefore, connection speed is not a measure of capacity. The two are different from each other. Connection speed it is a measure of the rate at which data can be transferred over a network connection.

To find more on connection speed look into:

brainly.com/question/8152317

#SPJ4


\( \underline{ \large{ \sf{ \purple{Question:-}}}}\)
Differentiate between executing the applet with appletviewer and HTML file.
\( \\ \\ \\ \)
Thank You ! ​

Answers

Answer:

When you run an applet using the appletviewer tool, it does not need to be embedded within an HTML file; instead, it can be launched directly. HTML file: On the other hand, applets can also be embedded within HTML files. To run the applet, you would open the HTML file in a web browser that has a JVM.

Explanation:

THIS ANS WILL HELP U :D

When it comes to executing an applet, there are two common approaches: using the appletviewer command and embedding the applet in an HTML file. Let's differentiate between these two methods:

1. Appletviewer:

- The appletviewer is a tool provided by Java Development Kit (JDK) specifically designed for running Java applets. - It is a standalone application that allows you to view and test your applets without the need for a web browser. - You execute the appletviewer from the command line by specifying the HTML file that references the applet. - The appletviewer creates a window to display the applet and provides a separate environment for running the applet. - It provides a more isolated and controlled environment for applet execution, making it easier to debug and test applets.

2. HTML File:

- Applets can also be embedded in HTML files and run through web browsers that support Java applets. - In this approach, you write an HTML file that includes the necessary applet tags to specify the applet class and any required parameters. - When the HTML file is loaded in a Java-enabled web browser, it interprets the applet tags and invokes the Java Virtual Machine (JVM) to execute the applet. - The applet runs within the web browser's context and shares resources and functionalities with other web page elements. - The HTML file approach allows you to integrate applets seamlessly into web pages and leverage the full capabilities of HTML and JavaScript along with the applet.

In summary, the key differences between executing an applet with appletviewer and HTML file are:

- The appletviewer is a standalone application for running applets, while the HTML file approach relies on a web browser with Java support.- Appletviewer provides a controlled environment for applet execution, separate from the web browser, facilitating debugging and testing.- The HTML file approach allows applets to be seamlessly integrated into web pages, taking advantage of HTML and JavaScript features.- Appletviewer requires running a command from the command line and specifying the HTML file, whereas HTML files can be loaded directly in a web browser.

\(\huge{\mathfrak{\colorbox{black}{\textcolor{lime}{I\:hope\:this\:helps\:!\:\:}}}}\)

♥️ \(\large{\textcolor{red}{\underline{\mathcal{SUMIT\:\:ROY\:\:(:\:\:}}}}\)

Which is a cybercrime in which someone uses computer code to open and read files on computers, websites, or other digital locations?O online etiquetteO hackingO privacy settingsO virus

Answers

Hacking is a type of cybercrime that occurs when someone opens and reads files on machines, websites, or any other digital locations using computer code.

What does cybercrime mean in plain English?

Any illegal behavior involving a computer, a system component, or a network is considered a cybercrime. While the majority of cybercrimes are committed to make money for the perpetrators, others are committed against specific systems or devices in order to harm or disable them.

How can online crime be stopped?

Make sure you only download software from reliable sources. Avoid downloading programs or software from untrusted sources. Additionally essential is that you maintain your operating system current. Make sure you utilize a secure device screen in addition to installing anti-virus software.

To know more about Cybercrime visit:

https://brainly.com/question/13109173

#SPJ4

Your server runs in quadruple-channel memory mode. How many memory controllers are being used?.

Answers

Answer: four

Explanation:

Servers and high-end workstations has been commonly used which buffered memory, which has specialized memory as it has additional circuitry to manage large amounts of ram.

What is Vertical scaling?

Vertical scaling has meaning that the ability to increase the capacity of the existing hardware or the software just by adding the resources. In this case, more GB has been added (8GB) to the server or to address the problem. So the vertical scaling has been the resultant type john has been expecting.

Buffered memory would help just to speed up some process by reserving the particular amount of the RAM for it. A hypervisor does not need 20% of the physical server memory which is assigned to just it. 20 percent buffer has been saved for Instant RAM that can be used by the system.

It has been true that 20 percent memory buffer has kept, but it has not meant for the exclusive use of the hypervisor, but it has been used by the operating system entirely.

Therefore, there are many memory controllers are being used.

Learn more about server on:

https://brainly.com/question/30168195

#SPJ2

Mi laptop dice the computer restarted unexpectedly or encountered an unexpected error.Windows installation cannot procced.To install Windows,

Answers

Answer:

Explanation:

There are two reasons as to what could have happened with your laptop. The first one is that your laptop was installing a critical windows update which got corrupted when the laptop's battery died causing windows itself to become corrupted. In this case, you would need to format the hard drive and reinstall windows. The second reason could be that your hard drive is failing and not allowing Windows to load or properly be installed on it. In this second scenario you would need to buy and replace the hard drive.


A friend wants to design an app but has never done so before and isn't sure how to begin. What would you suggest they do first?
А.research
В.STAIR
C.iterative processing
D. analysis

Answers

Answer:

(A) Research

Explanation:

I would suggest this because you need to understand how the whole thing is created and how it works along with how to code.

A friend wants to design an app but has never done so before and isn't sure how to begin. The thing that would you suggest they do first is А.research.

What is research?

Research is described because the advent of the latest understanding and/or the usage of present understanding in a brand new and innovative manner with a purpose to generate new concepts, methodologies and understandings. This may want to encompass synthesis and evaluation of preceding studies to the quantity that it ends in new and innovative outcomes.

The suggestion that has to be given would be to do А.research as to attain a good experience.

Read more about the research:

https://brainly.com/question/968894

#SPJ2

what type of image digital image is shown here?​

Answers

Answer:

2,4,6,8,10,12,14,16,18,20

Explanation:

Sam types Practice makes perfect. Assuming he types all the words correctly and takes a minute to type, what is his Gross Words per Minute score?

A. 4.6
B. 4.1
C. 4.2
D. 3.5

Answers

I think it’s B I’m not sure

WHAT IS A GOOD APP FOR REMOVING VIRUSES AND IT YOU DONT HAVE TO PAY MUCH FOR IT ????? PLEASE HELP ME

Answers

Answer:

Best free virus removal and free malware removal tools

Avira Free Antivirus – Offers a larger package of free security tools than most competitors, including real-time AV, malware removal, and a VPN. Bitdefender Antivirus Free Edition: Award-winning free version

Norton is a good one

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company

Answers

Answer:

Losing jobs. Fire. Destruction of property.

Explanation:

Having a company shut down due to lack of protection and having people testify products unsafe. If software blows up it could cause desturction of property therefore causing the effect of many people losing their jobs.

if the internet rate is 3% and you invest $12,000 today. How much will you have in 20 years?

a. 21,673
b. 23,108
c.25,998
d.22,304
e. 24,974

Answers

If the internet rate is 3% and you invest $12,000 today, you will have approximately $24,974 in 20 years.

To calculate the future value of an investment, we can use the compound interest formula. Given an initial investment of $12,000 and an interest rate of 3%, we can calculate the future value after 20 years. Using the formula: FV = PV * (1 + r)^n, where FV is the future value, PV is the present value, r is the interest rate, and n is the number of periods.

Applying the values to the formula, we have FV = $12,000 * (1 + 0.03)^20. Solving this equation, the result is approximately $24,974.

Therefore, the correct answer is e. $24,974, which represents the future value of the investment after 20 years with a 3% interest rate.

Learn more about internet

brainly.com/question/17649121

#SPJ11

Formatting codes can be added to documents using a(n)_____, such as slashes // and angle brackets < >.

Answers

Using a delimiter like slashes or angle brackets, formatting codes can be applied to documents.

What are boundaries and shading mean?

Word documents often utilize borders and shading to highlight specific passages of text and make them the reader's initial impression.

We can use Borders and Shading in MS Word to make written text, paragraphs, and other elements appear lovely and attractive.

Formatting codes can be used to apply formatting to documents using a delimiter like slashes or angle brackets.

In order to add formatting codes to documents, a delimiter like slashes or angle brackets can be used.

The complete question is:

Formatting codes can be added to documents using a ___ such as slashes and angle brackets

Learn more about the borders and Shading here:

https://brainly.com/question/1553849?

#SPJ1

Other Questions
Please help me!f(x)=x^2-2 What is the central idea of Beyond Vietnam A time to break silence Please answer quick thanks 1. Douglass says in chunk i that he was "compelled to resort to various stratagems" in order to learn to read and write. Why would Douglass' background put him in such a position? Explain.2. What do you think Douglass means when he says that he would have been in "mental darkness without the assistance of his mistress? Who was she, and what was his relationship to her? What game was everyone playing at the arcade bushnell managed You want to walk from home to a shoe store that is 7/8 miles away. You stop for a rest after 1/4 miles. How much farther do you have to walk? Write your answer as a fraction in simplest form How do currencies of Latin American countries compare to Americancurrency? Explain the similarities and differences in 2 to 4 Englishsentences. Find the measure of unlabeled angle in the quadrilateral 7. Which of the following is an example of government in action?A. a schoolB. a houseC. a storeD. a hotel8. What is the rule of law?A. People elect representatives to create the laws.B. Officials must follow certain procedures to make law.C. Everyone in a society must follow the laws equallyD. Certain individuals must be trained to make laws.9. What kind of government allows for elections to choose officials who stand for the peoples' interest?A. a limited governmentB. an absolute governmentC. a representative governmentD. the rule of law 1.Rank the following ions in order of decreasing radius: F,Cl,Br,I, and At. Use the periodic table as necessary.Rank from largest to smallest radius. To rank items as equivalent, overlap them.At-, F-, Br-, I-, Cl-2.The following ions contain the same number of electrons. Rank them in order of decreasing ionic radii.Rank from largest to smallest radius. To rank items as equivalent, overlap them.Cl-, P3-, S2-, Ca2+, Sc3+, K+3. Based on position in the periodic table and electron configuration, arrange these elements in order of decreasing Ei1.Rank the elements from highest to lowest ionization energy. .Na, F, Li, N, B, O A liter of water contains about (first image) molecules. A certain river discharges about (second image) L of water every second. About how many molecules does the river discharge every minute? Write your answer in scientific notation. let a and b be events in a sample space with positive probability. prove that p(b|a) > p(b) if and only if p(a|b) > p(a). What is cognitive overload?A. The notion that too many images can create fatigue in theaudience.B. The concept that too much textual information needs to bebalanced with media.O C. A state of confusion brought on by a person processing too muinformation at once.O D. A theory backed by current research that states that the humanmind can only comprehend five new concepts in an hour. The model and concepts used to develop the economics of international trade are? Two quantities, x and y, are directly proportional. If x is doubled, what happens to y? clear check it is multiplied by 4. It is multiplied by 12. It depends on the starting value of x. It is doubled. Order the following expressions by their values from least to greatest. suppose your parents earn rs 30000 pre mont they spend their income on different sectors they spend rs 6000 on rent rs 10000 on food rs 5000 on education rs 3000 on entertainment and save rs 6000 in each month show this data in a pie chart and than explain it in detail The measure of an angle is 119. What is the measure of its supplementary angle? this is my questions and I have these to pick which one should I pick? HELP PLEASE!!!!Which of the following statements best describes all-hazards emergencyplanning?A. All-hazards emergency plans enable medical providers andcommunities to work together in response to a variety man-madedisasters.B. All-hazards emergency plans enable medical providers andcommunities to work together in response to a variety ofemergencies.C. All-hazards emergency plans enable medical providers andcommunities to work together in response to a variety of naturaldisasters,D. All-hazards emergency plans enable medical providers andcommunities to work together in response to natural disastersspecific to their location.POWOLIS