an ER
Q: Task 1: Find the even multiples of any number chosen by the user in a given range - the user should ...
A: The solution to the given problem is below.
Q: List 5 types of cybercrime
A: Cybercrime refers to the crime which takes place using system or computer and network. Due to the in...
Q: analyst who is gathering requirements for an applicationwhich will record the details of the trainin...
A: Computer Science Mehmet is a system analyst who is gathering requirements for an applicationwhich wi...
Q: *************************PLEASE READ This paragrah first************* How would I go about using a ...
A: The solution to the given program is below.
Q: use C# programming Write a program that prints multiples of 7 in ascending * order up to 100 on a ...
A: We have to write a c# program that prints multiples of 7 in ascending order up to 100 on a single li...
Q: 14. Assume NSU is a class which occupies 9 bytes of space for each object. NSU twoDArray[512][639] i...
A: Solution :: Let's see first what is two dimensional array ? Answer :: A 2D organized row has a ty...
Q: Draw and describe (2-3 sentences each) ERD (Entity relationship diagram) with at least four tables. ...
A:
Q: Write the Python code that will create a list with 50 elements. Populate (fill) the list using a loo...
A: inputList = [0] * 50 for i in range(len(inputList)): inputList[i] = int(input("Enter the value : "))...
Q: In Python, Write a program that replaces words in a sentence. The input begins with word replacemen...
A: Python program to solve the given problem is below.
Q: Write a complete code for an HTML page containing a JavaScript program that prompts the user for 2 n...
A: Solution: Given, Write a complete code for an HTML page containing a JavaScript program that prom...
Q: What are the key distinctions between TCP and UPD session hijacking?
A: Introduction: Because UDP does not have a session state like TCP, there is no way to hijack a sessio...
Q: Is it possible to make a computer "run faster" by adding more memory?
A: Introduction: If you've been using your computer for more than a year or two, you've probably notice...
Q: In a UNIX-like file system, a directory typically contains: A. filenames and i-nodes B. permis...
A: Unix file system is a logical method of organizing and storing large amounts of information in a way...
Q: The recurrence relation for the following is given by Blank 1 int power (int a, int n) { if (n == 0)...
A: In the given recurrence relation, If we consider total time complexity of the function as T(n) and I...
Q: Following the example of the Rectangle class of Chapter 9 Exercise 1, design a class named Cuboid to...
A: Solution: Given,
Q: Write a c++ program that asks the user to enter an integer number and then by a recursive function f...
A: Code: #include <iostream> using namespace std; int addNumbers(int n); int main() { int n...
Q: 9. Rank the following functions by increasing order of growth. Explain your results. fi(n) = n + log...
A: Here in this question we have given some function and we have asked to arrange them in their increas...
Q: List are immutable in python True or false?
A: The anwer is
Q: Q4/ In an experiment to study the relationship of hypertension and smoking habits, the following dat...
A: Solution:
Q: A C program containing the function food has been compiled into LC-3 assembly language. The partial ...
A:
Q: please code in python. Create a program that has takes in a string and uses list comprehension to g...
A: Start Take the input string Replace vowels in input string with special characters Print new string ...
Q: What does an LSR do if it receives labeled packets with a top label which cannot be found in its LFI...
A: Normally, an LSR should receive only a labeled packet with a label at the top of the stack that is k...
Q: Select the lines of code in the right order to create a Scheme function that generates a list of X c...
A: Answer is ( Y X) (lambda (Y X) (lambda Y X)
Q: Launch action center from the system tray to troubleshoot the system problems
A: Action center is the one of the pre installed software in windows, Action center is a central place ...
Q: ERD (Entity relationship diagram)
A: Given :- An ERD (Entity relationship diagram) is given in the above given question Need to write t...
Q: 6. The GCD My CodeChum Adnn Expected Output The greatest common diviso, o knonaOCo. the greatet numb...
A: Ans : Code: #include <stdio.h>int main(){ int n1, n2, i, gcd; printf("Enter the first ...
Q: Multiple lines containing message prompts to input integers. The last line contain the sum of the ne...
A: Write a program to find the sum of negative numbers in an array.Input Format:Input consists of n+1 i...
Q: One of the famous proofs of modern mathematics is Georg Cantor’s demonstration that the set of ratio...
A: Solution: Given, In the above diagram, the first term is 1/1, the second term is 1/2, the third...
Q: Lists can contain elements of any type in Python. True or false?
A: Here in this question we have asked true or false weather Lists in python can contain elements of an...
Q: Write the java code body of the method countPunctuations. The method will return the number of punct...
A: The program is written in Java. Please find the source code and output in the following steps.
Q: The Magazine table contains three fields. The Cost field is numeric. The Code and Name fields contai...
A: As per guidelines we are supposed to answer only first 3-sub parts at time. please repost the quest...
Q: Python Write a program when you enter the operation of addition + adds two numbers and when you ente...
A: The program is written in Python language. Check the program screenshot for the correct indentation....
Q: Operation System Suppose that there are five computers across the Internet, how to make distributed...
A: Given: Suppose that there are five computers across the Internet, how to make distributed consensu...
Q: 1) A very famous example in real life about database system would be "Hospital Management system" 2)...
A: 1. A very famous example in real life about database system would be "Hospital Management system" 2....
Q: The Magazine table contains three fields. The Cost field is numeric. The Code and Name fields contai...
A: select * from Magazine where Name like 'Visual Basic';
Q: What does the term "important consideration" mean? Within the context of software engineering.
A: Introduction: Software engineering: It is a field of computer science that is dedicated to the study...
Q: 11. What is the primary conceptual difference between a stack and a queue? Briefly describe how to e...
A: Lets see the solution in the next steps
Q: Write a function int solution(int N, int M, char CH) that accepts two integers (N and M) and one cha...
A: Since the programming language is not mentioned so I have used the C++ programming language. Require...
Q: 6. Draw the binary search tree whose elements are inserted in the following order: 50,72, 96, 94, 10...
A: As per our company guidelines, we are supposed to answer only one question per post and kindly resub...
Q: Write a function int solution(int N, int M, char CH) that accepts two integers (N and M) and one cha...
A: According to the Question below the Solution: Programming language is not mention so i am using Py...
Q: You can create a sequence of numbers with the range() function in Python. True or false?
A: To state true or false for given statement "You can create a sequence of numbers with the range() fu...
Q: Thoughts on video conversation
A: Given: Suggestions for a video chat.
Q: Consider the following for loop, what will be the output? for (int i = 5; i >= 0; i--) { printf("%c"...
A: Task :- choose the correct option for given C code snippet . 'A' + x , will move to the xth charac...
Q: What is the output of the following program? int main(void) { int z = 2; int *pz = &z; z = 4; *pz = ...
A: #include <stdio.h>int main(void){int z = 2;int *pz = &z;z = 4;*pz = 7;printf("z is %d", z)...
Q: Wbite a program that stores first faur and then memery from your name in the vme en lood meme the co...
A: Answer: I have done code and also I have attached code.
Q: Write short notes on any three different data sources.
A: Step 1 Introduction Information assortment is the procedure involved with securing, collecting, sp...
Q: In computer security, what are intrusion detection and prevention systems?
A: Intrusion detection and prevention system in computer security
Q: Explain the TCP connection termination process
A: Given: Explain the TCP connection termination process
Q: Explain how data security laws differ between the US and the EU. Your answer should include an overa...
A: Given: Explain the differences in data security rules between the United States and the European Uni...
Q: 1.Challenge in using AI,IoT &Robot 2.what is digital privacy? Why it use? 3.explain digital privacy ...
A: The IoT or Internet of Things are considered to be the next biggest thing in the Financial services....
Using the tables below – Please draw an ER- Diagram
Step by step
Solved in 2 steps with 1 images
- CUSTOMERColumns = 7, Rows = 10 CustomerID LastName FirstName Address ZIP Phone Email 1 Shire Robert 6225 Evanston Ave N 98103 206-524-2433 Robert.Shire@somewhere.com 2 Goodyear Katherine 7335 11th Ave NE 98105 206-524-3544 Katherine.Goodyear@somewhere.com 3 Bancroft Chris 12605 NE 6th Street 98005 425-635-9788 Chris.Bancroft@somewhere.com 4 Griffith John 335 Aloha Street 98109 206-524-4655 John.Griffith@somewhere.com 5 Tierney Doris 14510 NE 4th Street 98005 425-635-8677 Doris.Tierney@somewhere.com 6 Anderson Donna 1410 Hillcrest Parkway 98273 360-538-7566 Donna.Anderson@elsewhere.com 7 Svane Jack 3211 42nd Street 98115 206-524-5766 Jack.Svane@somewhere.com 8 Walsh Denesha 6712 24th Avenue NE 98053 425-635-7566 Denesha.Walsh@somewhere.com 9 Enquist Craig 534 15th Street 98225 360-538-6455 Craig.Enquist@elsewhere.com 10 Anderson Rose 6823 17th Ave NE 98105 206-524-6877 Rose.Anderson@elsewhere.com EMPLOYEEColumns = 5, Rows = 5 EmployeeID LastName FirstName…The following table shows a list of pets and their owners that is used by a veterinarian service. P_Name Type Breed DOB Owner O_Phone O_E-mail Kino Dog Std. Poodle 3/27/97 M. Downs 5551236 md@abc.com Teddy Cat Chartraux 4/2/98 M. Downs 1232343 md@abc.com Filo Dog Std. Poodle 2/24/02 R. James 2343454 rj@abc.com AJ Dog Collie Mix 11/12/95 Liz Frier 3456567 liz@abc.com Cedro Cat Unknown 12/10/96 R.James 7865432 rj@abc.com Woolley Cat Unknown 10/2/00 M. Trent 9870678 mt@abc.com Buster Dog Collie 4/4/01 Ronny 4565433 ron@abc.com a. Describe 4 problems that are likely to occur when using this table. b. Break the table into two tables in a way that fixes the four problems.Every campus has full time students who attend classes between 8h00 and 17h00 during theweek. Every campus also has part time students who attend classes between 18h00 and 21h00 onweekdays. It is stated that no student shouldbe allowed to access the campus after 12h00. The campus has decided to change this rule to state“no full-time student will be allowed to access the campus after 12h00. Part time students canaccess the campus as from 17h00”. By making use of a class diagram, demonstrate how the concept of inheritancecan be used to represent the scenario provided at the beginning of thisquestion. 1 Class diagram showing inheritance; 2 Attributes; 3 Instance methods; 4 Access specifiers. By means of pseudocode, demonstrate how overloaded methods can be usedin the COVID-19 application you are designing. Use java language
- Every campus has full time students who attend classes between 8h00 and 17h00 during theweek. Every campus also has part time students who attend classes between 18h00 and 21h00 onweekdays. It is stated that no student shouldbe allowed to access the campus after 12h00. The campus has decided to change this rule to state“no full-time student will be allowed to access the campus after 12h00. Part time students canaccess the campus as from 17h00”. By making use of a class diagram, demonstrate how the concept of inheritancecan be used to represent the scenario provided at the beginning of thisquestion. use java languageEvery campus has full time students who attend classes between 8h00 and 17h00 during theweek. Every campus also has part time students who attend classes between 18h00 and 21h00 onweekdays. It is stated that no student shouldbe allowed to access the campus after 12h00. The campus has decided to change this rule to state“no full-time student will be allowed to access the campus after 12h00. Part time students canaccess the campus as from 17h00”. By means of pseudocode, demonstrate how overloaded methods can be used use java languageEvery campus has full time students who attend classes between 8h00 and 17h00 during theweek. Every campus also has part time students who attend classes between 18h00 and 21h00 onweekdays. It is stated that no student shouldbe allowed to access the campus after 12h00. The campus has decided to change this rule to state“no full-time student will be allowed to access the campus after 12h00. Part time students canaccess the campus as from 17h00”. By means of pseudocode, demonstrate how overloaded methods can be used
- As per our guidelines, we are supposed to answer only 1st three parts. Kindly repost the remaining questions separately. 4.1 use gym_29876543 4.2 db.createCollection("userProfiles") db.userProfiles.insertMany([ {"Name" : "Dominic","Surname":"Badeaux","Date_of_Birth":1982-09-04,"FitnessLevel":1}, {"Name" : "John","Surname":"Dlamini","Date_of_Birth":1974-05-18,"FitnessLevel":2} ]) 4.3 db.userProfiles.find() arrow_forward Step 2 Complete code: use gym_29876543 db.createCollection("userProfiles") db.userProfiles.insertMany([ {"Name" : "Dominic","Surname":"Badeaux","Date_of_Birth":1982-09-04,"FitnessLevel":1}, {"Name" : "John","Surname":"Dlamini","Date_of_Birth":1974-05-18,"FitnessLevel":2} ]) db.userProfiles.find() Q.4.4 Query all the user profiles where the fitness level of the user is equal to 2. Q.4.5 Query all the user profiles where the date of birth of the user is from 1980‐01‐01 to1982‐12‐31 (including both dates)# Begin constantsCOLUMN_ID = 0COLUMN_NAME = 1COLUMN_HIGHWAY = 2COLUMN_LAT = 3COLUMN_LON = 4COLUMN_YEAR_BUILT = 5COLUMN_LAST_MAJOR_REHAB = 6COLUMN_LAST_MINOR_REHAB = 7COLUMN_NUM_SPANS = 8COLUMN_SPAN_DETAILS = 9COLUMN_DECK_LENGTH = 10COLUMN_LAST_INSPECTED = 11COLUMN_BCI = 12 INDEX_BCI_YEARS = 0INDEX_BCI_SCORES = 1MISSING_BCI = -1.0 EARTH_RADIUS = 6371 # Sample data for docstring examplesdef create_example_bridge_1() -> list:"""Return a bridge in our list-format to use for doctest examples. This bridge is the same as the bridge from row 3 of the dataset.""" return [1, 'Highway 24 Underpass at Highway 403','403', 43.167233, -80.275567, '1965', '2014', '2009', 4,[12.0, 19.0, 21.0, 12.0], 65.0, '04/13/2012',[['2013', '2012', '2011', '2010', '2009', '2008', '2007','2006', '2005', '2004', '2003', '2002', '2001', '2000'],[MISSING_BCI, 72.3, MISSING_BCI, 69.5, MISSING_BCI, 70.0, MISSING_BCI,70.3, MISSING_BCI, 70.5, MISSING_BCI, 70.7, 72.9, MISSING_BCI]]] def create_example_bridge_2() ->…When a work’s author is designated as “Anonymous,” which of the following is the correct APA 7.0 format for entry on the reference list? Answer choices: A.) Anonymous. (2017). Managing diabetes through diet. Diabetes Management, 28(2), 4-9. B.) Managing diabetes through diet. (2017). Diabetes Management, 28(2), 4-9.
- 1. Create/ a sequence, GOV_SEQUENCE_xx, that begins with 100 and increments by 100 and uses all other defaults. Use your initials instead of the xx in the sequence name. 2. Select the next value of your sequence. 3.Use the next value of the sequence you created , GOV_SEQUENCE_xx as the value for the employee ID for every row insertedThe Great Bear Lodge is a hotel with an adjoining indoor waterpark and indoor minature golf center. The hotel sells packages which include overnight hotel stays with waterpark passes and minature golf passes. The hotel also has a plicy of selling daily passes to the indoor waterpakr and daily passes to the indoor minature golf center (in other words people do not need to stay at the hotel to use the indoor waterpark or indoor minature golf center.) Hotel guests may also choose to reserve just a hotel room without purchasing the waterpark or minature golf center passes. Great Bear Lodge is offering an incentive for the month of April. They are offering a package in which guests who reserve an overnight stay with the waterpark pass package will receive a free pass to the minature golf center. The total price for this package is $225 per night. The typical pricing for each of these sold independently are: One night hotel stay: $180, Daily Waterpark pass: $90, Minature Golf…56. A: SELECT CUSTNAME FROM CUSTOMER WHERE HQCITY IN (‘Atlanta’, ‘Chicago’, ‘Washington’); B: SELECT* FROM CUSTOMER WHERE HQCITY = ‘Atlanta’ OR HQCITY=‘Chicago’ AND HQCITY=‘Washington’; C: SELECT* FROM CUSTOMER WHERE HQCITY IN (‘Atlanta; ‘Chicago’, ‘Washington’; D: SELECT CUSTNAME FROM CUSTOMER WHERE HQCITY =‘Atlanta’ AND HQCITY = ‘Chicago’ AND HQCITY=‘Washington’;