an index purports to speed data retrieval. you, therefore, index every attribute in each table. select the likely consequence.

a. you optimize data retrieval by using a WHERE statement in your SELECT query.

b. data entry slows as every INSERT , UPDATE, or DELETE statement must also update every index.

c. data retrieval on the Gender column is optimized

d. this technique eliminates the need for a primary key

Answers

Answer 1

Answer:

b. data entry slows as every INSERT , UPDATE, or DELETE statement must also update every index.

Explanation:

This process help to improve the speed of get data , it takes each element in the indexed column and save the location to get faster the data. But if you index every attribute in a table it going to take a lot of time locating each column in the respective index in each query(update, delete and insert). For that reason is necesary be carefull with this process and only put index in the relevant columns


Related Questions

Convert 15 from decimal to binary. Show your work.

Answers

Answer: 1111

Explanation: As a decimal number can be decomposed in a sum of products involving powers of ten, it can be factored as a sum of products of powers of 2 in order to convert to binary.

In the example, we can write 15 as a decimal number in this way:

1* 10¹ + 5* 10⁰ = 15

Decomposing in powers of 2:

1*2³ + 1* 2² + 1*2¹ + 1.2⁰ = 1 1 1 1 = (15)₂

What is the importance of generalization bounds.

Answers

Answer:

The importance of generalization are as follow:

The generalization bounds are basically used in various ranking algorithm for supporting various vector machine and it is very helpful in the system. The generalization bounds are helpful for minimize and reducing the empirical convex risk in the system. It is also important for handling and controlling the complex hypothetical spaces also handle various types of VC dimensions complexity. The generalization bounds are basically free from all the distribution bounds so that is why it is used in many probability measures.

____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.

War driving
Wi-Fi driving
Wi-Fi finding
E-stalking

Answers

 Answer:War driving

Explanation: War driving is the activity which is done for searching for the Wi-Fi connection while driving vehicle .The main purpose of the war driving is gaining and accessing the network of Wi-Fi by being in slowly moving vehicle. The act is carried out by the individual or more people.

Other options are incorrect because Wifi driving and Wifi finding are not technical words in the computer field and E-stalking is the stacking activity with the help of internet enables electronic devices.Thus, the correct option is war driving.

The correct answer is Wardriving

Explanation:

Nowadays, it is common people want to access the internet most of the time even if this involves using networks without authorization by connecting a device such as a cellphone or a computer to a Wi-Fi network that is a wireless technology to access the internet. In this context, one common practice is wardriving in which you look for a Wi-Fi network by using a vehicle to move through different zones until finding one network you can access and use. This involves using networks from public places or private networks that do not require a password. According to this, it is wardriving the term that refers to driving around an area to find a Wi-Fi network to access and use it with no authorization.

Roman numeration uses 7 uppercase letters instead of numbers that make it easily adaptable in most MATH formulas when needed.

True
False

Answers

Answer:

TRUE

Explanation:

Roman numerals system is a system of numerical notations, that involves using combination of uppercase letters from the Latin alphabet to represent numbers. This system was used in the ancient Rome.

This system involves the use of seven uppercase letters from the Latin alphabet as symbols to represent a fixed integer value.

The symbol I represents the integer 1, V represents the integer 5, X represents the integer 10, L represents the integer 50, C represents the integer 100, D represents the integer 500 and M represents the integer 1000.

. List four different ways automation can be used in testing?

Answers

Answer:

Automation testing can be used for:

Input-output test : If the main function of your software is to transform input data into output data you can configure a new test by providing a new input/output pair, then the test will check to see if the output matches with the expected values.

Unit test : This test is a script to check the return values of a specific code by initializing it and calling his methods. This is a part of a test-driven development process.

Integration test : This test is a code level script that does a complete check process involving multiple objects. For example, you might make a test for “buy a product” which checks to see if the database is updated, if the data is correct of the person is correct, and if the person placing the order gets the right confirmation email.

Smoke Tests: This test is executed immediately after implementation on production to ensure that the application is still functioning.

Write a Java program HW2.java that asks the user to enter an array of integers in the main method. The program should prompt the user for the number of elements in the array and then the elements of the array. The program should then call a method named isSorted that accepts an array of and returns true if the list is in sorted (increasing) order and false otherwise. For example, if arrays named arr1 and arr2 store [10, 20, 30, 30, 56] and [2, 5, 3, 12, 10] respectively, the calls isSorted(arr1) and isSorted(arr2) should return true and false respectively. Assume the array has at least one element. A one-element array is considered to be sorted.

Answers

Answer:

The java program for the given scenario is given below.

This program can be saved as HW2.java.

import java.util.Scanner;

public class HW2 {

   public static void main(String args[]) {

      HW2 ob = new HW2();  

     Scanner sc = new Scanner(System.in);

     int len;      

     System.out.println( "Enter the number of elements to be entered in the array");

     len = sc.nextInt();

     int[] arr = new int[len];

     System.out.println( "Enter the elements in the array");

     for( int k=0; k<len; k++ )

     {

         arr[k] = sc.nextInt();

     }

     boolean sort = ob.isSorted(arr, len);

     System.out.println( "The elements of the array are sorted: " + sort );

   }    

   public boolean isSorted( int a[], int l )

   {

       int sort = 0;

       if( l==1 )

           return true;

       else

       {        

           for( int k=1; k<l; k++ )

           {

               if(a[k-1] < a[k])

                   continue;

               else

               {

                   sort = sort + 1;

                   break;

               }

           }

           if(sort == 0)

               return true;

           else

               return false;

       }

   }

}

OUTPUT

Enter the number of elements to be entered in the array

3

Enter the elements in the array

1

2

1

The elements of the array are sorted: false

Explanation:

1. First, integer variable, len, is declared for length of array. User input is taken for this variable.

2. Next, integer array is declared having the size, len. The user is prompted to enter the equivalent number of values for the array.

3. These values are directly stored in the array.

4. Next, the function isSorted() is called.

5. This method uses an integer variable sort which is declared and initialized to 0.

6. Inside for loop, all elements of the array are tested for ascending order. If the 1st and 2nd elements are sorted, the loop will continue else the variable sort is incremented by 1 and the loop is terminated.

7. Other values of the variable sort indicates array is not sorted.

8. A Boolean variable, sort, is declared to store the result returned by isSorted method.

9. Lastly, the message is displayed on the output whether the array is sorted in ascending order or not.

Using the command line, create a symbolic link to the /etc in the /root/Desktop folder.

Answers

Answer:

ln -s /etc /root/Desktop

Explanation:

ln is the command to create links and -s is the flag to create symbolic links between element1 and element2

Example:

ln -s /etc /root/Desktop

Create a symbolic link between folder etc and folder Desktop

What is the advantage of using the conditional operator?

Answers

Answer: Conditional operator are the ternary operator that work during a particular condition in which they returns a value as a result.This mechanism of the conditional operator helps in the making of the decision. The advantages of the conditional operator are as follows:-

It has faster executionIt can operate in many conditions even where the if-else condition is not executableCompact in nature Readable

Convert (35.125)10 to binary

Answers

Answer:

The answer is: 100011.001₂.

Explanation:

First, transform to binary the integer part: 35. Divide the number repeatedly by 2, keeping track of each remainder, until we get a quotient that is equal to 0:

35 ÷ 2 = 17 + 1; 17 ÷ 2 = 8 + 1; 8 ÷ 2 = 4 + 0; 4 ÷ 2 = 2 + 0; 2 ÷ 2 = 1 + 0; 1 ÷ 2 = 0 + 1;

Now, construct the integer part base 2 representation, by taking the remainders starting from the bottom of the list:

35₁₀ =  100011₂

Then, transform to binary the fractional part: 0.125. Multiply it repeatedly by 2, keeping track of each integer part of the results, until we get a fractional part that is equal to 0:

0.125 × 2 = 0 + 0.25; 0.25 × 2 = 0 + 0.5; 0.5 × 2 = 1 + 0;

Construct the fractional part base 2 representation by taking all the integer parts of the multiplying operations, starting from the top of the list.

0.125₁₀ =  0.001₂

Then you have:

35.125₁₀ =  100011.001₂

. What is suboptimization?

Answers

Answer: Suboptimization is referred to as a term that has been approved for common policy mistake. It usually refers to the practice of concentrating on a single component of a whole and thus making changes which are intended towards improving that component and also ignoring its effects on other components.

In an IPv.4 addressing scheme the router works at layer 3 on which addressing layer?

a. protocol b. data link c. transport d. network

Answers

Answer: d) Network

Explanation: IPv4(internet protocol version 4) is the decimal-digit numeric value  for the internet protocol.It helps in the identification of the hosts  through logical addresses. The functioning of  IPv4 helps in the routing of the information over the network.

The network layer contains router that is responsible for the routing of message between the nodes of the path.Router functions with internet protocol.Other options are incorrect because protocol is the set of riles,data link layer works for managing the movement of data and  transport layer monitors the transmission of data.Thus ,correct option is option(d)

Float and double variables should not be used _____. (Points : 4)

as counters
to perform mathematical calculations
as approximate representations of decimal numbers
for applications when precision is required

Answers

Answer: As approximate representations of decimal numbers

Explanation:

 In the computer programming language, the float and the double variable is basically used to represent the decimal numbers. In the C language, both the float is basically represent the decimal value of precision upto the 7 digits and the double variable represent upto 16 digit of the precision.

Float is the type of the data type that is used to represent the floating point in the programming language and it takes less memory so that is why it is faster in speed.

Double variable is basically used to represent the numeric variable and decimal number in the programming language and it hold very large number as compared to float.

What is unauthorized data disclosure?

Answers

Answer: Unauthorized data disclosure is the revealing of the confidential or private data to the unauthorized user. The disclosure of such data can be highly risk because it can lead to the several ways in which information can be misused . This incident can be due to attacking and stealing of data on purpose or by accident.

They purposely disclosure of data can be done through the methods like spoofing, sniffling etc.It is considered as the malicious activity which is a punishable crime if done on purpose.Top avoid such situation the exchange of information should be done carefully and in secure manner.

Write a method that take an integer array as a parameter and returns the sum of positive odd numbers and sum of positive even numbers.

Answers

Answer:

I will code in Javascript:

function sumOddAndEven(){

//Define and initialize variables.

var numbers = [1,2,3,4,5,6,7,8];

var sum = [0,0];

for ( var i = 0;  i < numbers.length ; i++ ){  // loop to go throght the numbers

if(numbers[i] > 0) { // if the number is positive

  if(numbers[i]%2 == 0) {  // if number is even and

     sum[0] = sum[0] + numbers[i];  //adds in the first place of sum

   }

   else{  

     sum[1] = sum[1] + numbers[i];  // else adds in the second place of sum

   }

 }

}

 return sum; //return an array with the sum of the positive evens numbers  in the first place and the sum of the positive odd numbers in the second place.

}  

Encryption that uses 16-character keys is known as ____. strong 128-bit encryption strong 256-bit encryption military-strength 512-bit encryption military-strength 1,024-bit encryption

Answers

Answer: Strong 128-bit encryption.

Explanation: An individual character corresponds to 8 bits . So if there are 16 characters then,

16[tex]\times[/tex]8=128 bits keys

This makes the 128 bit key encryption the strongest amongst all other options.It is strongest because it is almost impossible to decode the 128-character key  by any method e.g.-brute-force method.

Other options are incorrect because the characters given by the other bits are as follows:  [tex]{\frac{256}{8}[/tex]=32 characters

                         [tex]{\frac{512}{8}[/tex]=64 characters

                         [tex]{\frac{512}{8}[/tex]=128 characters  

Thus, the strongest character key is of 128 bits. for cipher.

In this type of password attack, the attacker has some information about the password. For example, the attacker knows the password contains a two- or three-digit number.



hybrid

nontechnical

rule-based

precomputed hashes

Answers

Answer: Non- technical

Explanation:

Non technical attacks also known as non- electronic attack. The non technical attack does not required any type of the technical domain knowledge and methods for intruding the other systems.

In the non technical password attack, the attacker contain some data or information regarding the password like two and three digits  and umber of the password. It basically search the data from the users trash bins and sticky notes from the users system.

On the other hand, all the the options are incorrect because it does not have some information and data regarding the password according to the given statement.

Therefore, non technical option is correct.  

The declarations and statements that compose the method definition are called the __________.

a.method body

b.method header

c.parameter list

d.method name

Answers

Answer:

a. method body.

Explanation:

A method contains the following components:

method namemethod argumentsmethod return typemethod implementation code

All of these together constitute the method body. The method body contains the declarations and statements constituting the method definition.

Apart from this, when the method is invoked at runtime, it needs to be called with method-name and the actual parameter list which gets substituted for the formal parameters in the method body.

What is database design?

Answers

Answer: Database design is the model created of data/information for any particular organization .the relation between the information and which data is to be stored is the most important factor for designing .These parameters are decided by the designer of the database.

After the decision of the designed the data is invoked in the database .The data representation in the theoretical manner is known as ontology.The classification and relation defining is the purpose of the database design.

A method variable a class variable with the same name. a) acquiesces to b) destroys c) overrides d) alters

Answers

Answer:

Option(c) is the correct answer for the given question.

Explanation:

The method variable overrides the class variable name with same name The method variable overrides of the class variable name .

Following are the example in java language

public class Main

{

int b=90; // class varaible or instance varaible

void sum()

{

   int b=34; // method having same name as class varaible name

   b=b+10;

   System.out.println(b); // display b

}

public static void main(String[] args)  // main method

{

 Main ob=new Main(); // craete object

 ob.sum(); // calling method sum

}

}

Output:

44

In this we declared a variable 'b' as int type in class and override this variable in sum() function it means same variable name is declared in function sum() .

acquiesces ,destroys,alters are the wrong for the given question.

So overrides is the correct answer

A class can inherit from a super class whose behavior is “near enough” and then adjust behavior as necessary thanks to the ability of a subclass to override a method. Thus, option C is correct.

What are the main uses of overrides as class variable?

The name, number, type, and return type of the overriding method are the same as those of the method it overrides.

In the case of method overriding, the overridden methods entirely replace the inherited method.

However, in the case of variable hiding, the child class conceals the inherited variables rather than replacing them.

In a nutshell, a class variable cannot be overridden. In Java, class variables are hidden rather than overridden. For example, overriding is for methods. Overriding differs from hiding.

Therefore, overrides  A method variable a class variable with the same name.

Learn more about overrides here:

https://brainly.com/question/20216755

#SPJ2

Why is a memory hierarchy of different memory types used instead of only one kind of memory?

Answers

Answer: Memory hierarchy is the hierarchy that is created on the basis of the response time of different memories. The performance obtained by the memory helps in creating a computer storage space in distinguished form. The factors considered for the creating of the hierarchy structure are usually response time, storage capacity, complexity etc.

Usage of different kind of memories take place due to different kind of requirements from the system which cannot be fulfilled using one memory device.The requirement is based on saving time, decreasing complexity , improving performance etc.Example of requirements can be like some functions and files do not require much space , some might require quick accessing,etc.

Thus hierarchy of any particular system is in the form of fast to slow order from registers,cache memory, Random access memory(RAM) and secondary memory.

Why is monitoring email, voice mail, and computer files considered legal?

Answers

Explanation:

Monitoring someone's emails,voice mails and computer files is considered is illegal because you are accessing someone's personal information which is not regarded as  ethical .

There are certain reasons where one's email,voice mails and computer files can be monitored are as following:

Protect the security information and security.Investigation of complaints of harassment.Preventing personal use of employer's facilities.

What is white noise and how does it affect a signal? Provide a business process example that could be affected and what would you recommend to minimize white noise?

Answers

Answer: White noise is the merging of the audible signal of different frequencies varying from high to low into a single unit. The number of frequencies combined  in white noise more than 20,000. It helps in masking the other noise in the environment.

In accordance with the signal, white noise acts as a statistical mode which merges all the signal into one with same intensity which results in the power spectral density being persistent.

E.g.- Any business process of company that requires attention and speedy working such as creating report, presentation can get affected by the white noise in positive  or negative manner depending on the person.It might lead to increment or decrement in the cognitive performance of employees.

White noise can be remove by several software present in the market, removing it by the "Noise removal" option from the Effects menu in operating system, etc.  

To write data to a binary file you create objects from the following classes:

a.)
File and Scanner

b.)
BinaryFileWriter and BinaryDataWriter

c.)
FileOutputStream and DataOutputStream

d.)
File and PrintWriter

Answers

Answer: (C) File Output Stream and Data Output Stream

Explanation:

 The File output stream and data output stream classes are basically created to write the data into the binary file. The data output steam class is the output steam used to write various data types in the java in the efficient way.

The file output steam class is basically used to create the text file and store the various type of the data into individual bytes.

The file in the file output steam class basically represent the storage of the various type of the data in the binary file.

To control for an InternalError exception you should use a(n) __________ connection.

a

Unbuffered

b

Buffered

c

Secure

d

Open

Answers

Answer: (B) Buffered

Explanation:

 Buffered connection is basically used to control the internal error exception. The buffer cursor are basically executed different queries like fetchall() and fetchone(), these are the row fetching method. It is basically used to return the row from set of the buffered row.

For creating the buffered cursor we can use the buffered argument and call the cursor connection.

On the other hand, all the other options are incorrect because it cannot control the internal error only buffered connection can do.

Therefore, Option (B) is correct.

The Python MySQL Connector library:
(a) come pre-installed with Linux
(b) comes pre-installed with the installation of MySQL8.
(c) comes pre-installed with the installation of Python3.
(d) must be downloaded and installed as a separate package.

Answers

Answer: (D) Must be downloaded and installed as a separate package.

Explanation:

  The python MySQL (Structured query language) connector library ought to be downloaded and introduced as separate package. It is utilized to interface MySQL database from python.

The MySQL Installer can introduce and deal with numerous, separate MySQL server occurrences on a similar host simultaneously.

MySQL Installer doesn't allow server updates among major and minor form numbers, however permits redesigns inside a discharge arrangement

The handle in a selected object’s upper-left corner is the ___________handle.

Answers

Answer: Move handle

Explanation: In the field of the database, the unique identifier for an object is created that is known as handle which is for the driving purpose in the database.It is also used for the connection of the database .The object in the database containing data keeps the management of the handle.

It has a handle named move handle ,which is responsible for the movement control of upper left corner in an object.It is in a large in form for the dragging of the object that is selected.

Broadly speaking, what are some of the benefits of an object-oriented approach when developing a system?

Answers

Answer: The benefits provided by object-oriented approach for the development of the operating system are as follows:-

It provides the facility of the re-utilization of the object-oriented componentsIt decrease the cost of development and also male the system faster for processingThe feature of binding the data into a single capsule unit is also present which is known as encapsulation.Improves the performance and quality of the operating systemSecurity feature is also present

As the performance of PCs steadily improves, computers that in the past were classified as midrange computers are now marketed as ____.
laptops
PC servers
PDAs
tablet PCs

Answers

Answer: PC servers

Explanation: PC(Personal computer) servers are the helps in the utilization of the network services to the software and hardware of the computer. It manages the network resources . In the past time ,Mindrange computers, mini computers etc are present time's PC servers.

Other options are incorrect because laptops ,PDA(Personal digital assistant) or tablets are the modern version of the computer units that are portable and compact with fast processing. Thus the correct option is option PC servers.

Business customers pay $0.006 per gallon for the first 8000 gallons. If the usage is more than 8000 gallons, the rate will be $0.008 per gallon after the first 8000 gallons. For example, a residential customer who has used 9000 gallons will pay $30 for the first 6000 gallons ($0.005 * 6000), plus $21 for the other 3000 gallons ($0.007 * 3000). The total bill will be $51. A business customer who has used 9000 gallons will pay $48 for the first 8000 gallons ($0.006 * 8000), plus $8 for the other 1000 gallons ($0.008 * 1000). The total bill will be $56. Write a program to do the following. Ask the user which type the customer it is and how many gallons of water have been used. Calculate and display the bill.

Answers

Answer:

#include <bits/stdc++.h>

using namespace std;

int main()

{

   // variables

   char cust_t;

   int no_gallon;

   double cost=0;

   cout<<"Enter the type of customer(B for business or R for residential):";

   // read the type of customer

   cin>>cust_t;

   // if type is business

   if(cust_t=='b'||cust_t=='B')

   {

       cout<<"please enter the number of gallons:";

       // read the number of gallons

       cin>>no_gallon;

       // if number of gallons are less or equal to 8000

       if(no_gallon<=8000)

       {

           // calculate cost

           cost=no_gallon*0.006;

           cout<<"total cost is: $"<<cost<<endl;

       }

       else

       {

           // if number of gallons is greater than 8000

           // calculate cost

           cost=(8000*0.006)+((no_gallon-8000)*0.008);

           cout<<"total cost is: $"<<cost<<endl;

           

       }

       

   }

   

   // if customer type is residential

   else if(cust_t=='r'||cust_t=='R')

        {

           

       cout<<"please enter the number of gallons:";

       // read the number of gallons

       cin>>no_gallon;

       // if number of gallons are less or equal to 8000

       if(no_gallon<=8000)

       {

           // calculate cost

           cost=no_gallon*0.007;

           cout<<"total cost is: $"<<cost<<endl;

       }

       else

       {// if number of gallons is greater than 8000

       // calculate cost

           cost=(8000*0.005)+((no_gallon-8000)*0.007);

           cout<<"total cost is: $"<<cost<<endl;      

       }        

   }

return 0;

}

Explanation:

Ask user to enter the type of customer and assign it to variable "cust_t". If the customer type is business then read the number of gallons from user and assign it to variable "no_gallon". Then calculate cost of gallons, if  gallons are less or equal to 800 then multiply it with 0.006.And if gallons are greater than 8000, cost for  first 8000 will be multiply by 0.006 and  for rest gallons multiply with 0.008.Similarly if customer type is residential then for first 8000 gallons cost will be multiply by 0.005 and for rest it will  multiply by 0.007. Then print the cost.

Output:

Enter the type of customer(B for business or R for residential):b                                                                                            

please enter the number of gallons:9000                                                                                                                      

total cost is: $56  

Which of the following are examples of IT careers? Check all of the boxes that apply.
software engineer
hardware engineer
lawyer
systems analyst
database administrator
computer support specialist

Answers

Answer:

software engineer hardware engineer systems analyst database administrator computer support specialist

Explanation:

Software engineer: This deals with the application development where engineers develop application related to system software and application software which is used for commercial purposes. Hardware engineer: Deals with problem in the hardware viz keyboard, mouse, mother board and other internal parts and also with network. Systems analyst: This is once again a profession which deals with the internal problems of the system and also to install softwares and troubleshoot if issues arise. Database administrator: Maintains the database, fix errors, monitor data, etc Computer support specialist: The responsibility depends on the company and it will be similar to a clerical role.

Lawyer  This option is irrelevant

Answer:

operating system

web browser

word processor

device driver

the clipboard

Explanation:

got these answers right and also got a 100 on it

Other Questions
Let S = {1, 3, 5, 7}. Define the set J = {2j^2 11 | j S}. List the elements of J. 3x = 15 - 2Help me Solve the following systems using substitution.X - 9y = 256x - 5y = 3 Which angles are acute? No, no s. l no quiso decrmelo. S, nos conocimos en la clase de qumica. Y sabes si Andrs tiene novia? Sabes si l va a la fiesta el sbado? Celia, conoces a Andrs? S. Supe por Marta que va a la fiesta. Wireshark is an example of what type of utility? A) Packet sniffer B) Port scanner C) Vulnerability scanner D) Content filter Free cash flow describes the net cash provided by operating activities after adjusting for A : current liabilities. B : both capital expenditure and dividends paid. C : capital expenditures only. D : dividends paid only. if a particle moving in straight line such that its position varies with time as x=5(t-2) + 6(t-2)^2 ,then intial acceleration is Which of the following best summarizes why the pilgrims chose to leave their homelandA. to gain wealth. My answer B. to explore new landsC. to live on land of their ownD. to practice their religious beliefsPlease help! Why is the structure of a dna molecule sometimes referred to as having the the shape of a spiral staircase Calculate the freezing point of the solution.After mixing these 2 bottles together, set Kf of water = 1.86 C / m.Bottle 1 contained 0.3 grams of glucose in 1000 grams of water.The 2nd bottle contains 0.5 mol fructose in 1000 grams of water. Surrealists emphasized _____________ instead of ____________.a.rationalism; irrationalismb.rationalism; fantasyc.irrationalism; rationalismd.irrationalism; conscious thought declaration a plane at the uniform rate of 8.0 meter/second ^2 , a pilot stops the plane in 484 meters. how fast was the plane going before breaking began ? Trucks that travel on highways have to stop at various locations to be weighed and inspected for safe brakes and light systems. Of these trucks, 76% are on interstate commerce while 24% are intrastate. Of the intrastate trucks, 3.4% are flagged for safety defects compared to 0.7% of those that are on interstate business. Complete parts a through c below. a. Calculate the probability that a randomly chosen truck is an interstate truck and is not flagged for a safety violation. The probability is nothing. (Round to three decimal places as needed.) How do we know our current money has value? People talk about money a lot. It is backed by gold. People accept it in exchange for goods or services. It has many security measures. What is 14/18 in simplist form A 35-mm single lens reflex (SLR) digital camera is using a lens of focal length 35.0 mm to photograph a person who is 1.80 m tall and located 3.60 m from the lens. (a) How far is the CCD sensor from the lens when the person is in focus?(b) How tall is the person's image on the CCD sensor? A certain corner of a room is selected as the origin of a rectangular coordinate system. If a fly is crawling on an adjacent wall at a point having coordinates (2.1, 1.9), where the units are meters, what is the distance of the fly from the corner of the room? In the Concepts in Play activity, Robert sought to bridge the cultural divide between his experience and his customers' culture by sharing relevant, intercultural information he learned from a TV show. Which of the following attributes of intercultural communication competence does he most strongly exhibit by sharing this detail?a. motivationb. tolerance for ambiguityc. open-mindednessd. knowledge and skill Jorge's cell phone plan costs $20.00 each month plus $0.15 per minute. If his bill for the month is58420, how many minutes did Jorge use? (Round to the nearest whole number).1064428561