​ You cannot commit and roll back data in SQL Server. T/F

Answers

Answer 1

False. In SQL Server, you can indeed commit and roll back data. The process of committing and rolling back data refers to the ability to either save or undo changes made within a transaction.

Transactions help maintain the integrity and consistency of data in a database by ensuring that a group of operations are executed completely, or not at all. In SQL Server, you can use the BEGIN TRANSACTION, COMMIT, and ROLLBACK statements to control transactions. The BEGIN TRANSACTION statement marks the starting point of a transaction. The COMMIT statement saves the changes made within the transaction, while the ROLLBACK statement undoes all the changes made since the beginning of the transaction. For example, if you want to update records in a table and then decide to revert the changes, you can use the ROLLBACK statement to undo them. If you're satisfied with the changes, you can use the COMMIT statement to save them permanently. These capabilities are essential in ensuring data consistency and accuracy in SQL Server.

Learn more about SQL Server here-

https://brainly.com/question/29417398

#SPJ11


Related Questions

The first computer available for commercial sale in the United States was made by Mauchly and Eckert in what year?
1974
1947
1940
1951

Answers

Answer:

1951

Explanation:

Answer the following questions regarding system requirements: a) Is it important to prioritize system requirements, and if so, when should the system requirements be prioritized? b) What is one techni

Answers

Yes, prioritizing system requirements is important. System requirements should be prioritized during the initial stages of the project, before design and development begin.

Prioritizing system requirements is crucial for project success. By establishing priorities early on, stakeholders can align their expectations, make informed decisions, and allocate resources effectively. Prioritization should ideally occur during the project's initiation and planning phases, before design and development activities commence. This allows for a clear understanding of essential features and functionalities, ensuring that critical requirements are addressed first. Prioritization also helps manage project scope and mitigate risks by identifying potential trade-offs or compromises. Regularly revisiting and updating system requirements throughout the project lifecycle is essential to adapt to changing needs and priorities.

To know more about project click the link below:

brainly.com/question/31710748

#SPJ11

Computer programs typically perform three steps: input is received, some process is performed on the input, and output is produced. true/ false

Answers

True. Most basic programs follow this structure.

The given statement input is received, some process is performed on the input, and output is produced about computer programs is true.

What are the basic steps computer programs typically perform?

Any computer program to perform it follows three basic steps, which make the program better to run:

Generally, a computer program receives a kind of data that is an input, this data may be a file or something provided by the user.This data is altered by the program in some specific way.The altered data is provided as output.

There is some basic software also that can run on computer system software, utility software and application software. These programs are running on the information. and provides output.

Therefore, the steps given in the question are true.

Learn more about computers, here:

https://brainly.com/question/3397678

#SPJ2

In Java, write a pay-raise program that requests a person’s first name, last name, and current annual salary, and then displays the person’s salary for next year. people earning less than $40,000 will receive a 5% raise, and those earning $40,000 or more will receive a raise of $2,000 plus 2% of the amount over $40,000. a possible outcome is presented in the figure below.

Answers

Here's a sample Java code for the pay-raise program that meets the requirements you mentioned:

The Java Program

import java.util.Scanner;

public class PayRaiseProgram {

   public static void main(String[] args) {

       Scanner scanner = new Scanner(System.in);

       // Request user's information

       System.out.print("Enter first name: ");

       String firstName = scanner.nextLine();

       System.out.print("Enter last name: ");

       String lastName = scanner.nextLine();

       System.out.print("Enter current annual salary: ");

       double currentSalary = scanner.nextDouble();

       // Calculate salary for next year based on the rules

       double nextYearSalary;

       if (currentSalary < 40000) {

           nextYearSalary = currentSalary * 1.05; // 5% raise

       } else {

           nextYearSalary = 2000 + (currentSalary - 40000) * 1.02; // $2,000 plus 2% raise

       }

       // Display the result

       System.out.printf("Next year salary for %s %s: $%.2f", firstName, lastName, nextYearSalary);

       scanner.close(); // close the scanner to free resources

   }

}

When you run this program, it will prompt the user to enter their first name, last name, and current annual salary. Then, it will calculate the salary for next year based on the given rules and display the result in the format of "Next year salary for [first name] [last name]: $[salary]". Here's an example output:

Enter first name: John

Enter last name: Doe

Enter current annual salary: 50000

Next year salary for John Doe: $51000.00

Read more about Java programs here:

https://brainly.com/question/25458754

#SPJ1

I need help in raft survival ocean nomad I was traveling and now I can't enter the island or go back home (raft). Please help me

Answers

Answer:

Raft Survival : Ocean Nomad is a survival game

Explanation:

The raft survival ocean nomad is a survival video game that is developed by a Swedish developer,  Redbeet Interactive. This game is published by Axolot Games.

In the game the player is moving in a raft in the middle of an ocean searching for his family. It is a survival and strategy game. The player needs to survive in the deserted ocean by whatever he finds and collect from the ocean and also protect himself from the attacks of the sharks.

The player moves by a small island which he can explore to eat something or collect other items to developed his raft.

In the context, if you can not enter the island or go back to the raft, then save the game at that point and press the escape button to start from the first.

In this way, you can refresh the game and start he game again to enter the island.

authentication refers to techniques for decrypting data when it accessed by authorized users.

Answers

Authentication refers to the process of verifying the identity of a user, device, or system before granting access to certain resources or services.

It is a critical security measure that helps to prevent unauthorized access and ensure that only authorized users are able to access sensitive information.

There are several different authentication techniques that can be used, including: Something you know: This type of authentication requires the user to provide a piece of information that only they would know, such as a password, PIN, or security question.

Something you have: This type of authentication requires the user to provide a physical object that only they would have, such as a smart card, key fob, or biometric device.

Something you are: This type of authentication uses biometric data, such as fingerprints, facial recognition, or voice recognition, to verify the user's identity.

Something you do: This type of authentication requires the user to perform a specific action, such as entering a sequence of characters or clicking on a specific button, to verify their identity.

Authentication is typically used in conjunction with authorization, which is the process of determining what actions a user is allowed to take once they have been authenticated. By verifying the user's identity and granting access to the appropriate resources or services, authentication helps to ensure the security and integrity of the system.  

Learn more about Authentication visit: brainly.com/question/13615355

#SPJ11

The Harrison Group Life Insurance company computes annual policy premiums based on the age the customer turns in the current calendar year. The premium is computed depending on the users age.

If the user is under the age of 50 – it is calculated by taking the decade of the customer’s age, adding 15 to it, and multiplying by 20. For example, a 34-year-old would pay $360, which is calculated by adding the decades (3) to 15, and then multiplying by 20.
If the user is over 50 – it is calculated by taking the decade of the customer’s age, adding 20 to it, and multiplying by 25. For example, a 54-year-old would pay $625, which is calculated by adding the decades (5) to 20, and then multiplying by 25.
Write an application that:

Declares the variables needed.
Prompts a user for their decade age (be clear in the instructions that you want only the 10s or 100s place).
Hits an IF statement that will call on a method named calculaterate and will pass it the decade, the addition number and the multiplier based on that IF statement.
The method should calculate the premium and return it to the main method.
The main will then display it out to the user.
The user will then be asked if they want to enter in another number. (While or Do While – your Choice) in persudo code please

Answers

Answer:

yea that is correct hope this works

what is the version number for mysql returned from port 3306

Answers

Answer:

For MySQL, the default port is 3306, which means if you have installed MySQL externally, it will listen to the 3306 port. But when it gets installed with the WAMP package, it is now 3308 in a new version of WAMP because, from the latest version of the WAMP server (3.2.

When we are talking about personal privacy. Some online activities carry more risk than others. Listed below are several popular online activities. Choose the one that carries the greatest risk.
Question 1 options:

Social Networking

Online gaming

Online purchases

Cyberbullying
PLEASE RESPOND QUICK ILL GIVE 50 POINTS

Answers

Answer:

I think it's cyberbullying ...

bcoz online gaming is ok.. purchases is also ok network is also but cyberbullying is not ok... it's carries a risk.. sometimes u also caught in a situation which u can't avoid...

Answer: Social Networking

Explanation: bc

Which is true of software bugs?

A.Bugs can only be identified when error messages appear B.The number of bugs are reduced by careful attention to programming conventions C.Bugs cannot cause long-term harm
D.Most software initially contains no bugs
It’s not A

Answers

Answer:

The answer is B

Explanation:

The only logical answer is B due to the fact that bugs are able to cause long-term harm and most software actually can contain a high variety of bugs depending on the programmers ability.

Software bugs, because flaws can cause long-term damage and the number of bugs is reduced by careful attention to the programming on the programmers' skill, the hence correct option is B.

What are software bugs?

Software-generated problems like general-protection faults, exception errors, and page faults are a few examples that might indicate that a software bug caused the memory error.

A general protection fault (GPF) is a fault (a type of interrupt) started by ISA-defined protection mechanisms when some executing code, whether in the kernel or a user application, violates access rights.

Therefore, the number of bugs is reduced that develop during the execution of a program that prohibits the instructions from being carried out as intended, hence correct option is B.

Learn more about software, here:

https://brainly.com/question/4490366

#SPJ6

state three differences between text data and number data​

Answers

Answer:

Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.

Answer:

Explanation:

text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech

number data is just numbers.

Select the correct answer.

Nina obtains an image in which birds are flying across the sky. Some parts of the image are blurry. In which stage of image processing will Nina fix the blurry parts?

A.
image acquisition
B.
preprocessing
C.
extracting features
D.
segmentation

Answers

Answer: Image Acquisition

Explanation:

A ______ device makes it possible for multiple computers to exchange instructions, data, and information.

Answers

A communications device makes it possible for multiple computers to exchange instructions, data, and information.

We can define a communication device as a kind of hardware device that makes it possible to transmit information between multiple computers.

Data, information, and instructions are passed from a sending system to a receiving system through communication devices. A communication device can exchange information with other kinds of electronic devices.

An example of a communication device is a modem. A modem is a hardware device that can change digital information from a computer to a signal that can be transmitted over the telephone. The modem also has the capability to transfer an analog system into a digital system so that it can be viewed on a computer.

To learn more about communication devices, click here:

https://brainly.com/question/14891213

#SPJ4

what is authenticity​

Answers

Answer:

the quality of being authentic

Explanation:

Consider a career as a multimedia artist. is there a company, film, game, or band whose signature multimedia design work interests you? choose one of them and on the internet, research the company responsible for the development of that design, exploring the about pages to learn about the multimedia artists responsible. choose one or two of those artists and find out how they learned their craft. in particular, check to see if the artist(s) invented some feature of that design or a development method that helped complete the work they envisioned.

organize your work. write a minimum three-page paper and include a media presentation:

-a slideshow with at least ten slides;
-a video of at least four minutes;
-another medium form of your choice, making sure it is of comparable length; or
-a multimedia presentation combining an appropriate amount of each medium form.

Answers

Based on the scenario above, The career as a multimedia that I chose is Multimedia Designer.

Who are Multimedia artists?

This is known to be a person who uses  computer programs and illustrations to form graphics and also create animation.

Note that they help in the creation of movie, game and others such as visual effect.

A multimedia presentation is known to be a kind of presentation that uses a lot of forms of digital communication, such as video, and others.

Learn more about career from

https://brainly.com/question/15169081

#SPJ4

simplify this question 3(4)(10)

Answers

Answer:

The answer is 3 2/5

What is the name of pre-configured Microsoft Management Console that you can launch to create a Local GPO on a Windows computer

Answers

The speedup of the CPI (Clocks Per Instruction) for the program can be determined by comparing the CPI of the original processor configuration with the CPI of the improved processor configuration. In this case, the memory delay is reduced, leading to a potential improvement in the overall performance.

To calculate the speedup of the CPI for the program, we need to compare the CPI of the original processor configuration with the CPI of the improved processor configuration. The CPI is determined by dividing the total clock cycles by the total number of instructions.  In the original processor configuration, all instructions require 5 clock pulses, except for memory access instructions which incur an additional 20 clock cycle delay. The program consists of 100 instructions, with 20 being memory access instructions. Thus, the total clock cycles for the original configuration can be calculated as:

Total clock cycles = (5 * (100 - 20)) + (25 * 20) = 950

The CPI for the original processor configuration is:

CPI = Total clock cycles / Total number of instructions = 950 / 100 = 9.5

In the improved processor configuration, the memory delay is reduced to 16 clock pulses. Consequently, the total clock cycles can be calculated as:

Total clock cycles = (5 * (100 - 20)) + (16 * 20) = 780

The CPI for the improved processor configuration is:

CPI = Total clock cycles / Total number of instructions = 780 / 100 = 7.8

To determine the speedup of the CPI, we divide the original CPI by the improved CPI:

Speedup = Original CPI / Improved CPI = 9.5 / 7.8 ≈ 1.22

Therefore, the speedup of the CPI for this program is approximately 1.22. This implies that the improved processor configuration is approximately 1.22 times faster than the original configuration in terms of the CPI for this specific program.

Learn more about program here: https://brainly.com/question/30613605

#SPJ11

Assume that the marginal cost of producing steel does not include the cost of the damage to the environment as a result of pollution. By producing where P = MC, the firm will be producing ________ the efficient amount of steel.
A) exactly
B) more than
C) less than
D) sometimes more and sometimes less than

Answers

Assume that the marginal cost of producing steel does not include the cost of the damage to the environment as a result of pollution. By producing where P = MC, the firm will be producing more than the efficient amount of steel.

When a firm produces where P = MC, it is maximizing its profits. However, if the marginal cost of producing steel does not include the cost of the damage to the environment as a result of pollution, then the firm is not taking into account the true cost of production. As a result, the firm will be producing more than the efficient amount of steel.
In other words, the firm's marginal cost is artificially low because it does not include the cost of the damage to the environment. This leads the firm to produce more steel than it would if it were taking into account the true cost of production. Therefore, the correct answer is B) more than the efficient amount of steel.

Learn more about marginal cost here:https://brainly.com/question/12231343

#SPJ11

let g be a directed graph. after running dfs algorithm on g, the vertex v of g ended up in a dfs tree containing only v, even though v has both incoming and outgoing edges in g. fully explain how this happened.

Answers

If vertex v ended up in a DFS tree containing only v, it means that v was the starting vertex for the DFS algorithm, and either the graph is not strongly connected or v is part of a strongly connected component that is not reachable from any other SCC.


The DFS algorithm starts by selecting a starting vertex in the graph and exploring as far as possible along each branch before backtracking. The algorithm maintains a stack to keep track of the vertices that have been visited but not yet fully explored.

When the algorithm encounters a vertex that has already been visited, it skips over it and continues exploring other branches. This is because DFS aims to explore the entire graph and not repeat already explored vertices.In the case where vertex v ended up in a DFS tree containing only v, this means that v was the starting vertex for the DFS algorithm. As a result, the algorithm explored all the outgoing edges of v, but did not explore any of its incoming edges since those vertices had already been visited.This situation can arise in cases where the graph is not strongly connected, which means that there are one or more vertices that are not reachable from other vertices. If v is one such vertex, then it is possible that the DFS algorithm only explores v and its outgoing edges, without exploring any other vertices in the graph.Another possibility is that v is part of a strongly connected component (SCC) that is not reachable from any other SCC. In this case, the DFS algorithm would only explore v and the other vertices in its SCC, without exploring any vertices in other SCCs.

Know more about the DFS algorithm,

https://brainly.com/question/28106599

#SPJ11

What's a lossles compression algorithm

Answers

DescriptionLossless compression is a class of data compression algorithms that allows the original data to be perfectly reconstructed from the compressed data. By contrast, lossy compression permits reconstruction only of an approximation of the original data, though usually with greatly improved compression rates.
DescriptionLossless compression is a class of data compression algorithms that allows the original data to be perfectly reconstructed from the compressed data. By contrast, lossy compression permits reconstruction only of an approximation of the original data, though usually with greatly improved compression rates.

A _____ shows how data moves through an information system but does not show program logic or processing steps.

Answers

A data flow diagram (DFD

Describe each of the principal factors risk factors in
information systems projects (20 marks)

Answers

The principal risk factors in information systems projects encompass various aspects such as project complexity, technology challenges, organizational factors, and external influences.

These factors contribute to the potential risks and uncertainties associated with the successful implementation of information systems projects.

Project Complexity: Information systems projects can be inherently complex due to factors such as scope, scale, and the integration of multiple components. The complexity may arise from intricate business processes, diverse stakeholder requirements, or the need for extensive data management. Complex projects pose risks in terms of project management, resource allocation, and potential delays or cost overruns.

Technology Challenges: Information systems projects often involve implementing new technologies, software systems, or infrastructure. Technological risks include compatibility issues, scalability limitations, security vulnerabilities, and the need for specialized expertise. These challenges may impact the project timeline, functionality, and long-term viability of the system.

Organizational Factors: The success of an information systems project depends on organizational factors such as leadership, communication, and stakeholder engagement. Risks in this domain include lack of management support, insufficient user involvement, resistance to change, inadequate training, and poor project governance. Failure to address these factors can lead to user dissatisfaction, low adoption rates, and project failure.

External Influences: External factors, such as changes in regulatory requirements, market dynamics, or economic conditions, can introduce risks to information systems projects. These factors may necessitate modifications to project scope, increased compliance efforts, or adjustments to business strategies. Failure to anticipate and adapt to external influences can disrupt project timelines and impact the project's overall success.

Understanding and managing these principal risk factors is crucial for effective project planning, risk mitigation, and successful implementation of information systems projects. Proper risk assessment, contingency planning, stakeholder involvement, and ongoing monitoring are essential to minimize the impact of these risks and ensure project success.

Learn more about  information systems here:

https://brainly.com/question/13081794

#SPJ11

Explain the major difference between the least effective hierarchy of controls and the other four controls. Why is it the least effective? Be specific in your response, and include examples of your work environment.
Your response must be at least 200 words in length.

Answers

Hierarchy of controls refers to the systematic elimination of workplace hazards to reduce or eliminate risks associated with these hazards.

The hierarchy of control measures follows a systematic approach of identifying, assessing, and controlling workplace hazards to promote safety in the workplace. There are five main types of the hierarchy of controls, including elimination, substitution, engineering controls, administrative controls, and personal protective equipment (PPE).

The elimination of hazards is the most effective control measure, while the least effective control measure is PPE. PPE is the last line of defense in the hierarchy of control measures, as it is not designed to eliminate or minimize workplace hazards. Instead, PPE is designed to protect workers from workplace hazards once all other control measures have been implemented and have failed to reduce the risk of exposure.

To know more about systematic visit :

https://brainly.com/question/28609441

#SPJ11

ASAP please
What is an algorithm?
1. a way to make an informed judgment
2. used only on a computer
3. used only with map directions
4. a set of directions for problem solving

Answers

I think it’s 4


a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

Answer:

Answer is D :)

Explanation:

Which of the following tasks is least effective at preventing a computer virus?
a
Anti-virus software is up-to-date.

b
Anti-virus software performs routine scans.

c
Anti-virus software is set to scan your computer weekly.

d
Anti-virus software scans all documents that are downloaded.

Answers

Answer:

all of the above mentioned

C is the answer to the question

the word item referred to as a: A.value B.label C.Formula​

Answers

I think it’s C If wrong I’m sorry

Complete the code to finish this program to analyze the inventory for a store that sells purses and backpacks. Each record is composed of the catalog number, the type of item, its color, the length, width, height, and the quantity in stock. Sample rows of the file are below. 234,purse,blue,12,4,14,10 138,purse,red,12,4,14,4 934,backpack,purple,25,10,15,3 925,backpack,green,25,10,15,7 import csv fileIn = open("data/bags.txt","r") countPurse = 0 textFile= csv.(fileIn) for bag in textFile: if bag[1] == 'purse': countPurse = countPurse + int(bag[6]) fileIn.close() print("Number of purses:",countPurse)

Answers

import csv
fileIn = open("data/bags.txt","r")
countPurse = 0
textFile= csv.reader(fileIn)
for bag in textFile:
if bag[ 1 ] == 'purse':
countPurse = countPurse + int(bag[6])
fileIn.close()
print("Number of purses:",countPurse)

A celebrity blogger you have followed for years advises readers to try a new beauty product. Before purchasing the product, a savvy consumer should (5 points)

accept the blogger knows what she is talking about
recognize the blogger is being paid by a competing beauty company
question if the blogger is qualified to evaluate beauty
assume the blogger is a beauty expert

Answers

Answer:

question if the blogger is qualified to evaluate beauty

Explanation:

In explicit priority scheduling, the scheduler always dispatches the ready thread that has been waiting the longest.

a. true
b. false

Answers

False. In explicit priority scheduling, the scheduler does not always dispatch the ready thread that has been waiting for the longest.

The statement is false. In explicit priority scheduling, the scheduler assigns priorities to threads or processes based on certain criteria, and the dispatching decision is made based on these priorities rather than the waiting time of the thread.

Explicit priority scheduling involves assigning a priority level to each thread or process, usually represented by a numerical value. The higher the priority value, the higher the priority of the thread. The scheduler then decides which thread to dispatch based on the priority assigned to each thread.

When multiple threads are ready to run, the scheduler will select the thread with the highest priority to be dispatched next. This means that the thread with the highest priority will be given precedence and executed first, regardless of how long it has been waiting.

The purpose of explicit priority scheduling is to allocate system resources efficiently based on the importance or urgency of each thread's task. It allows for the implementation of priority-based policies, where certain threads or processes can be given higher priority to ensure critical tasks are executed promptly.

In summary, explicit priority scheduling does not always dispatch the ready thread that has been waiting for the longest. Instead, it dispatches the thread with the highest priority according to the assigned priority

levels.

Learn more about priority scheduling here:

https://brainly.com/question/32333751

#SPJ11

how many different values can be represented using 4 bits?

Answers

16 different values can be represented using 4 bits. In digital electronics and computer science, a bit is a basic unit of information that can have two values, typically represented as 0 or 1.

The number of different values that can be represented using a certain number of bits is determined by 2 raised to the power of the number of bits. Bits are used to store and process data in computers and other digital devices, and they are the building blocks of all digital information. For example, the text of this message, the images and videos you see on your screen, and the music you listen to are all represented by a series of bits. They are also used in digital communications, such as data transmission over a network or the internet, where data is sent as a series of ones and zeroes.

In the case of 4 bits, the number of different values that can be represented is 2 raised to the power of 4, which is equal to:

2 x 2 x 2 x 2 = 16.

Therefore, 4 bits can represent 16 different values, ranging from 0 to 15 in decimal form.

Learn more about bit value, here https://brainly.com/question/14805132

#SPJ4

Other Questions
Find the missing side of this righttriangle.714x = A teacher has 35 markers. He wants to make 4 identical gift bags using as many as the markers as possible. How many markers will be left over? In the figure above, what is the area of righttriangle QRS? 11. most population growth is occurring in developed countries. a. true b. false 12. environmental racism is the placement of toxic producing waste sites and plants where? a. in rural, isolated areas b. in wealthy areas c. in poor communities d. along waterways 13. scholars agree on the number of people that the earth can support with its food production. a. true b. false 14. experts estimate that about 15 percent of people in the world suffer from chronic undernourishment. a. true b. false 15. by 2015, india will have a greater population than all of the developed nations combined. a. true b. false class- current affairs Use the equation from the previous problem to predict the price of bzg stock on day 30. Why does hot air rise and cold air sink?A. Cold air has more kinetic energy than hot air.B. Hot air has more potential energy than cold air.C. Cold air is more dense than hot air.D. Hot air is more dense than cold air. find the speed relative of the earth with whch the spacecraftA spacecraft is moving relative to the earth. An observer on the earth finds that, between 1 p.m. and 2 p.m. accord- ing to her clock, 3601 s elapse on the spacecraft's clock. What is the spacecraft's speed relative to the earth? Anyone wants me to do their math homework for then? I can do do elementary school, middle, and high school math homework Rachel received a demand loan for $7723 from her bank on January 30, 2011 at 5.39% p.a. simple interest. On May 24, 2011, the interest rate on the loan changed to 6.23% p.a. and Rachel settled the loan on July 16, 2011. Calculate the total interest paid on the loan. Round to the nearest cent what are the animation in Toy Story 2 chapter 16 1) which statement(s) is/are evidenced to be true? group of answer choices currently there is no reliable census for the number of deaf, asl-speaking population in the united states asl is the third most-used language in the u.s. asl is the fourth most-used language in the world asl is the first most taught foreign language at the college level Given f(x) = 6(1-x) , what is the value of f(-8) ? I need all of them pleaseeeUse as many of the five senses: sight, sound, smell, taste, smell to describe a phone Using segmentation by size, which type of organization would be most likely to be contacted by e-mail or outbound telemarketing?A) small sizeB) medium sizeC) large sizeD) governmental A distant space probe is programmed to emit aradio signal toward Earth at regular time intervals. One such pulsearrives on Earth 2.92 s after it is emitted from the probe. What isthe approximate distance from the Earth to the probe?A) 8.76 108 m B) 7.40 108 m C)6.94 108 m D) 4.12 108 mE) 3.50 108 m Which image shows an ion?A image 1 onlyB image 2 onlyC. image 1 and 2D neither imageSelect an answer 3.50 g of sodium bromide is dissolved in water to make a total volume of 125 mL of solution. What is the concentration of sodium bromide? 545 mM 181 mM 363 mM 454 mM 272 mM Consider the following balanced reaction. How many grams of water are required to form 75.9 g of HNO3? Assume that there is excess NO2 present. 3NO2(g) + H2O(l) 2HNO3(aq) + NO(g) Molar Mass (g*mol-1) H2O 18.02 HNO3 63.02 10.9 g H2O 43.4 g H2O 38.0 g H2O 26.5 g H2O 21.7 g H2O According to peacemaking criminology, which option is necessary to achieve peace?A. justiceB. warC. freedomD. political power The earths orbit around the sun is elliptical. What does this word mean?. Compose a three to four-sentence paragraph that contrasts the organelles and structures you might observe in the cell of a celery stalk and the skin cell of a human